1 July 2003
Source: http://www.access.gpo.gov/su_docs/aces/fr-cont.html

Six rules and notice on martime security published today:

1. General provisions

2. Area maritime security

3. Vessel security

4. Facility security

5. Outer Continental Shelf facility security

6. Automatic Identification System; vessel carriage requirements

7. Automatic Identification System; carriage requirements expansion for U.S. waters


[Federal Register: July 1, 2003 (Volume 68, Number 126)]
[Rules and Regulations]
[Page 39239-39284]
From the Federal Register Online via GPO Access [wais.access.gpo.gov]
[DOCID:fr01jy03-14]

[[Page 39239]]

-----------------------------------------------------------------------

Part II

Department of Homeland Security

-----------------------------------------------------------------------

Coast Guard

-----------------------------------------------------------------------

33 CFR Parts 101, 102, 103, et al.

46 CFR Parts 2, 31, 71, et al.

National Maritime Security Initiatives; Area Maritime, Vessel,
Facility, and Outer Continental Shelf Security; Automatic
Identification System, Vessel Carriage Requirement; Temporary Interim
Rules Automatic Identification System, Expansion of Carriage
Requirements for U.S. Waters; Notice

[[Page 39240]]

-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

Coast Guard

33 CFR Parts 101 and 102

[USCG-2003-14792]
RIN 1625-AA69


Implementation of National Maritime Security Initiatives

AGENCY: Coast Guard, DHS.

ACTION: Temporary interim rule with request for comments and notice of
meeting.

-----------------------------------------------------------------------

SUMMARY: The Coast Guard has published a series of six interim rules in
today's Federal Register to promulgate maritime security requirements
mandated by the Maritime Transportation Security Act of 2002. The six
interim rules consist of: Implementation of National Maritime Security
Initiatives; Area Maritime Security; Vessel Security; Facility
Security; Outer Continental Shelf Facility Security; and Automatic
Identification System. In addition to the Automatic Identification
System interim rule, we have issued a separate request for comments for
further expanding the implementation of the Automatic Identification
System. The series of interim rules addresses security assessments and
plans, as well as other security standards, measures, and provisions
that, with the exception of Automatic Identification System, will be
codified in the new subchapter H of Title 33 of the Code of Federal
Regulations.
    This interim rule, the Implementation of National Maritime Security
Initiatives, establishes the general regulations for subchapter H. It
does so by providing a comprehensive discussion of industry-related
maritime security requirements and a summary of the cost and benefit
assessments of the entire suite of interim rules. The alignment of
domestic maritime security requirements with the International Ship and
Port Facility Security Code and recent amendments to the International
Convention for the Safety of Life at Sea is also addressed here.
    The discussions provided within each of the other five interim
rules are limited to the specific requirements they contain.

DATES: Effective date. This interim rule is effective from July 1, 2003
until November 25, 2003. On July 1, 2003, the Director of the Federal
Register approved the incorporation by reference of certain
publications listed in this rule.
    Comments. Comments and related material must reach the Docket
Management Facility on or before July 31, 2003. Comments on collection
of information sent to the Office of Management and Budget (OMB) must
reach OMB on or before July 31, 2003.
    Meeting. A public meeting will be held on July 23, 2003, from 9
a.m. to 5 p.m., in Washington, DC.

ADDRESSES: Comments. To ensure that your comments and related material
are not entered more than once in the docket, please submit them by
only one of the following means:
    (1) Electronically to the Docket Management System at http://dms.dot.gov
.
    (2) By mail to the Docket Management Facility (USCG-2003-14792) at
the U.S. Department of Transportation, room PL-401, 400 Seventh Street
SW., Washington, DC 20590-0001.
    (3) By fax to the Docket Management Facility at 202-493-2251.
    (4) By delivery to room PL-401 on the Plaza level of the Nassif
Building, 400 Seventh Street SW., Washington, DC, between 9 a.m. and 5
p.m., Monday through Friday, except Federal holidays. The telephone
number is 202-366-9329.
    You must also mail comments on collection of information to the
Office of Information and Regulatory Affairs, Office of Management and
Budget, 725 17th Street NW., Washington, DC 20503, Attn: Desk Officer,
U.S. Coast Guard.
    Meeting. A public meeting will be held on July 23, 2003 in
Washington, DC at the Grand Hyatt Washington, DC, 1000 H Street, NW.,
Washington, DC 20001.
    Availability. You may inspect the material incorporated by
reference at room 2110, U.S. Coast Guard Headquarters, 2100 Second
Street SW., Washington, DC 20593-0001 between 8 a.m. and 4 p.m., Monday
through Friday, except Federal holidays. The telephone number is 202-
267-0257. Copies of the material are available as indicated in the
``Incorporation by Reference'' section of this preamble.

FOR FURTHER INFORMATION CONTACT: If you have questions on this rule,
call Commander Suzanne Englebert (G-M-1), U.S. Coast Guard by telephone
202-267-1103, toll-free telephone 1-800-842-8740 ext. 7-1103, or by
electronic mail msregs@comdt.uscg.mil. If you have questions on viewing
or submitting material to the docket, call Dorothy Beard, Chief,
Dockets, Department of Transportation, telephone 202-366-5149.

SUPPLEMENTARY INFORMATION: Due to the short timeframe given to
implement these National Maritime Transportation Security initiatives,
as directed by the Maritime Transportation Security Act (MTSA) of 2002
(MTSA, Public Law 107-295, 116 Stat. 2064), and to ensure all comments
are in the public venue for these important rulemakings, we are not
accepting comments containing protected information for these interim
rules. We request you submit comments, as explained in the Request for
Comments section below, and discuss your concerns or support in a
manner that is not security sensitive. We also request that you not
submit proprietary information as part of your comment.
    The Docket Management Facility maintains the public docket for this
rulemaking. Comments and material received from the public, as well as
documents mentioned in this preamble as being available in the docket,
will be available for inspection or copying at room PL-401 on the Plaza
level of the Nassif Building, 400 Seventh Street SW., Washington, DC,
between 9 a.m. and 5 p.m., Monday through Friday, except Federal
holidays. You may also find this docket on the Internet at http://dms.dot.gov
.
    Electronic forms of all comments received into any of our dockets
can be searched by the name of the individual submitting the comment
(or signing the comment, if submitted on behalf of an association,
business, labor unit, etc.) and is open to the public without
restriction. You may also review the Department of Transportation's
complete Privacy Act Statement published in the Federal Register on
April 11, 2000 (65 FR 19477-78), or you may visit http://dms.dot.gov/.

Request for Comments

    We encourage you to participate in this rulemaking by submitting
comments and related material. Your comments will be considered for the
final rule we plan to issue before November 25, 2003, to replace this
interim rule. If you choose to comment on this rule, please include
your name and address, identify the specific docket number for this

interim rule (USCG-2003-14792), indicate the specific heading of this
document to which each comment applies, and give the reason for each
comment. If you have comments on another rule please submit those
comments in a separate letter to the docket for that rulemaking.
    You may submit your public comments and material electronically, by
fax, by delivery, or by mail to the Docket Management Facility at the
address under ADDRESSES. Please submit

[[Page 39241]]

your public comments and material by only one means. If you submit them
by mail or delivery, submit them in an unbound format, no larger than
8\1/2\ by 11 inches, suitable for copying and electronic filing. If you
submit them by mail and would like to know that they reached the
Facility, please enclose a stamped, self-addressed postcard or
envelope. We will consider all comments and material received during
the comment period.

Public Meetings

    We will hold a public meeting on July 23, 2003, in Washington, DC
at the Grand Hyatt Hotel, at the address listed under ADDRESSES. The
meeting will be from 9 a.m. to 5 p.m. to discuss all of the maritime
security interim rules, and the Automatic Identification System (AIS)
interim rule, found in today's Federal Register. In addition, you may
submit a request for other public meetings to the Docket Management
Facility at the address under ADDRESSES explaining why another one
would be beneficial. If we determine that other meetings would aid this
rulemaking, we will hold them at a time and place announced by a later
notice in the Federal Register.

Regulatory Information

    We did not publish a notice of proposed rulemaking (NPRM) for this
rulemaking and are making this rule effective upon publication. Section
102(d)(1) of the MTSA requires the publication of an interim rule as
soon as practicable without regard to the provisions of chapter 5 of
title 5, U.S. Code (Administrative Procedure Act). The MTSA also states
that any interim rule issued to implement its provisions shall expire
on November 25, 2003, unless it has been superseded by a final
regulation. The Coast Guard finds that harmonization of U.S.
regulations with maritime security measures adopted by the
International Maritime Organization (IMO) in December 2002, and the
need to institute measures for the protection of U.S. maritime security
as soon as practicable, furnish good cause for this interim rule to
take effect immediately under both the Administrative Procedure Act and
section 808 of the Congressional Review Act.

Background and Purpose

    In the aftermath of September 11, 2001, the Commandant of the Coast
Guard reaffirmed the Coast Guard's Maritime Homeland Security mission
and its lead role--in coordination with the Department of Defense;
Federal, State, and local agencies; owners and operators of vessels and
marine facilities; and others with interests in our nation's Marine
Transportation System--to detect, deter, disrupt, and respond to
attacks against U.S. territory, population, vessels, facilities, and
critical maritime infrastructure by terrorist organizations.
    In November 2001, the Commandant of the Coast Guard addressed the
IMO General Assembly, urging that body to consider an international
scheme for port and shipping security. Recommendations and proposals
for comprehensive security requirements, including amendments to
International Convention for Safety of Life at Sea, 1974, (SOLAS) and
the new ISPS Code, were developed at a series of intersessional
maritime security work group meetings held at the direction of the
IMO's Maritime Safety Committee.
    The Coast Guard submitted comprehensive security proposals in
January 2002 to the intersessional maritime security work group
meetings based on work we had been coordinating since October 2001.
Prior to each intersessional meeting, the Coast Guard held public
meetings as well as coordinated several outreach meetings with
representatives from major U.S. and foreign associations for shipping,
labor, and ports. We also discussed maritime security at each of our
Federal Advisory Committee meetings and held meetings with other
Federal agencies having security responsibilities.
    In January 2002, the Coast Guard also held a 2-day public workshop
in Washington, DC, attended by more than 300 individuals, including
members of the public and private sectors, and representatives of the
national and international marine community (66 FR 65020, December 17,
2001; docket number USCG-2001-11138). Their comments indicated the need
for specific threat identification, analysis of threats, and methods
for developing performance standards to plan for response to maritime
threats. Additionally, the public comments stressed the importance of
uniformity in the application and enforcement of requirements and the
need to establish threat levels with a means to communicate threats to
the Marine Transportation System.
    At the Marine Safety Committee's 76th session and subsequent
discussions internationally, we considered and advanced U.S. proposals
for maritime security that took into account this public and agency
input. The Coast Guard considers both the SOLAS amendments and the ISPS
Code, as adopted by IMO Diplomatic Conference in December 2002, to
reflect current industry, public, and agency concerns. The entry into
force date of both the ISPS Code and related SOLAS amendments is July
1, 2004, with the exception of the Automatic Identification System
(AIS) whose implementation for vessels on international voyages was
accelerated to no later than December 31, 2004, depending on the
particular class of SOLAS vessel.
    Domestically, the Coast Guard had previously developed regulations
for security of large passenger vessels that are contained in 33 CFR
parts 120 and 128. Complementary guidance can be found in Navigation
and Vessel Inspection Circular (NVIC) 3-96, Change 1, Security for
Passenger Vessels and Passenger Terminals. Prior to development of
additional regulations, the Coast Guard, with input from the public,
needed to assess the current state of port and vessel security and
their vulnerabilities. As mentioned previously, to accomplish this, the
Coast Guard conducted a public workshop January 28-30, 2002, to assess
existing Marine Transportation System security standards and measures
and to gather ideas on possible improvements. Based on the comments
received at the workshop, the Coast Guard cancelled NVIC 3-96 (Security
for Passenger Vessels and Passenger Terminals) and issued a new NVIC 4-
02 (Security for Passenger Vessels and Passenger Terminals), developed
in conjunction with the International Council of Cruise Lines, that
incorporated guidelines consistent with international initiatives (the
ISPS Code and SOLAS). Additional NVICs were also published to further
guide maritime security efforts, including NVIC 9-02 (Guidelines for
Port Security Committees, and Port Security Plans Required for U.S.
Ports), NVIC 10-02 (Security Guidelines for Vessels); and NVIC 11-02
(Security Guidelines for Facilities). The documents are available in
the public docket (USCG-2002-14069) for review at the locations under
ADDRESSES.
    On November 25, 2002, President George W. Bush signed into effect
Public Law 107-295, MTSA, 2002, which had been proposed to Congress the
year before as the Port and Maritime Security Act (S. 1214). The MTSA
requires the Secretary to issue an interim rule, as soon as
practicable, as a temporary regulation to implement the Port Security
section of the Act. The MTSA expressly waives the requirements of the
Administrative Procedure Act, including notice and comment, for this
purpose.
    Nevertheless, the Coast Guard, in coordination with other agencies
of the Department of Homeland Security

[[Page 39242]]

(DHS) (e.g., the Transportation Security Administration (TSA)) and the
Department of Transportation (e.g., the Maritime Administration
(MARAD)), held seven public meetings in areas of high maritime interest
to engage the public in discussions about the impact of its maritime
security requirements. Prior to issuing this interim rule, the Coast
Guard wanted to receive preliminary comments that helped to structure
the rulemakings published today. The seven public meetings were
announced in a ``notice of meeting; request for comment'' document that
was published in the Federal Register on December 20, 2002 (67 FR
78742). The comprehensive notice of meeting requested comments
addressing 40 issues as well as comments on the concepts presented in
the ISPS Code and the MTSA. Comments made during the public meetings
and those submitted to the public docket are available in the public
docket (USCG-2002-14069) for review at the locations under ADDRESSES. A
discussion of these comments is contained in this preamble under the
Discussion of Comments to Maritime Security Public Meetings. The Coast
Guard plans to publish a final rule by November 2003. This date is
critical to meeting the timeline set in the MTSA for finalizing these
security requirements. It is just as critical in order to uniformly
implement the ISPS Code and SOLAS amendments.
    To comply with the mandates of the MTSA, the Coast Guard is
implementing portions of section 102 of the MTSA (46 U.S.C. sections
70102, 70103b through 70103d, 70104, 70114, and 70117) through this and
a series of five other interim rules published elsewhere in today's
Federal Register. Within this common preamble, we will generally
discuss each of the six interim rules. This common preamble will also
discuss the National Maritime Transportation Security Plan, found in 46
U.S.C. 70103a, transportation security cards, found in 46 U.S.C. 70105,
and foreign port assessments, found in 46 U.S.C. 70108, as they relate
to the requirements established in the six interim rules.

Organization

    As already stated, we have segmented the maritime security
regulations into six separate interim rules. The entire series of
rulemakings establishes a new subchapter H, containing six new parts,
in Title 33 of the Code of Federal Regulations. For the ease of reading
and comprehension, the rulemakings were written to highlight each
segment of the maritime community and structured based on the
organization of the regulations rather than in one single interim rule.
A brief description of each of the six interim rules follows:
    1. Implementation of National Maritime Security Initiatives. This
general discussion includes the introduction of the new subchapter H
into Title 33 of the Code of Federal Regulations. It also discusses the
General Provisions within part 101 of that subchapter, and reserves
part 102 for the National Maritime Security plan and Advisory Committee
requirements. This discussion covers the overall methodology we used to
determine the appropriate application of security measures in
accordance with the MTSA. A summary of the costs and benefits
associated with implementing security requirements used for subchapter
H are presented as well as a discussion of the security-related benefit
for AIS. The requirements set out in this interim rule include the
definitions for the entire subchapter and the provisions that pertain
to all parts. It is strongly recommended that this interim rule be read
prior to consulting one or more of the other specific parts or the AIS
interim rule, which are published elsewhere in today's Federal
Register, to ensure terms and applicability issues are understood.
Additionally, the preamble to this interim rule includes a discussion
of the comments made during the public meetings held on Maritime
Security in January and February of 2003 and the comments submitted to
the docket [USCG-2002-14069] that were received by February 28, 2003.
All comments received after February 28, 2003, will be considered prior
to the issuance of the final rules.
    2. Area Maritime Security (AMS). The discussion in the preamble of
the ``Area Maritime Security'' (USCG-2003-14733) interim rule found
elsewhere in today's Federal Register relates to the provisions within
part 103 of subchapter H. Discussions about cost and benefit assessment
for the Area Maritime Security regulations are also found in the Area
Maritime Security preamble.
    3. Vessel Security. The discussion in the preamble of the ``Vessel
Security'' (USCG-2003-14749) interim rule found elsewhere in today's
Federal Register relates to the provisions within part 104, titled
Vessel Security, of subchapter H. It also includes a discussion of the
additional parts of 33 CFR and 46 CFR amended or revised by the Vessel
Security interim rule. Discussions about cost and benefit assessments
for the vessel security regulations are found in the preamble of the
interim rule ``Vessel Security.''. Consistent with customary
international law, the requirements in part 104 do not apply to vessels
engaged in innocent passage through the territorial sea of the U.S. or
in transit passage through the navigable waters of the U.S. that form
part of an international strait.
    4. Facility Security. The discussion in the preamble of the
``Facility Security'' (USCG-2003-14732) interim rule found elsewhere in
today's Federal Register relates to the provisions within part 105,
titled Facility Security, of subchapter H. Discussions about cost and
benefit assessments for the facility security regulations are found in
the preamble of the interim rule ``Facility Security.''
    5. Outer Continental Shelf (OCS) Facility Security. The discussion
in the preamble of the ``Outer Continental Shelf Facility Security''
(USCG-2003-14759) interim rule found elsewhere in today's Federal
Register relates to the provisions within part 106, titled ``Outer
Continental Shelf Facility Security,'' of subchapter H. Discussions
about cost and benefit assessments for the OCS facility security
regulations are found in the preamble of the interim rule ``Outer
Continental Shelf Facility Security.''
    6. Automatic Identification Systems (AIS). The discussion in the
preamble of the ``Automatic Identification System; Vessel Carriage
Requirement'' (USCG-2003-14757) interim rule found elsewhere in today's
Federal Register relates to the provisions within 33 CFR parts 26, 161,
164, and 165. These requirements relate to the fitting of AIS on
certain vessels as mandated in 46 U.S.C. 70114 and MTSA section 102(e).
Discussions about cost and benefit assessments for the AIS regulations
with respect to both safety and security are found in the preamble of
the interim rule ``Automatic Identification System; Vessel Carriage
Requirement.''

Coordination With the SOLAS Requirements

    For each interim rule, the requirements of the MTSA Section 102
align, where appropriate, with the security requirements embodied in
the SOLAS amendments and the ISPS Code; however, the MTSA has broader
application that includes domestic vessels and facilities. Thus, where
appropriate, the Coast Guard intends to implement the MTSA through the
requirements in the SOLAS amendments and the ISPS Code, parts A and B,
for all vessels and facilities that are currently required to meet
SOLAS, as well as those vessels on international voyages that fall
below the mandated 500 gross tonnage, ITC (International Convention on
Tonnage Measurement of Ships, 1969 (ITC)) threshold and facilities that
are at risk of being

[[Page 39243]]

involved in a transportation security incident. Further discussion on
this risk and how we developed and assessed it for the maritime
community is presented in the Applicability of National Maritime
Security Initiatives discussion in this preamble.
    In aligning the MTSA Section 102 requirements with the SOLAS
amendments and the ISPS Code security requirements, we consider that
the implementation of these requirements is best done through mandating
compliance with the SOLAS amendments and the ISPS Code. The Coast Guard
considers ISPS Code, part B, an essential element to ensure full and
effective compliance with the intent of the MTSA. Foreign flag vessels
entering the U.S. will be expected to carry valid International Ship
Security Certificates (ISSC) and have the security plans fully
implemented. The relevant provisions in ISPS Code, part B, will be
taken into account by Port State Control Officers to assess if the
security plan is fully implemented as required by the interim rules
found elsewhere in today's Federal Register. The flag administration
may also choose to provide a document or endorsement to the ISSC to
verify that the security plan was based upon full compliance with the
relevant provisions of ISPS Code, part B, to assist Coast Guard Port
State Control Officers. We intend to implement strong Port State
Control measures to aggressively enforce these regulations that will
include tracking the performance of all owners, operators, flag
administrations, recognized security organizations, charterers, and
port facilities. Noncompliance will subject the vessel to a range of
control and compliance measures, which could include denial of entry
into port or significant delay. We will strictly enforce compliance
with SOLAS and the ISPS Code for foreign SOLAS vessels, including
assessing the risks posed by such vessels and any control measures that
may be required when they call on foreign port facilities that do not
comply with SOLAS and the ISPS Code, and we will similarly ensure that
other vessels or port facilities covered by these regulations meet the
requirements of this subchapter. A vessel's or port facility's history
of compliance, or lack thereof, or security incidents involving a
vessel or port facility, will be important factors in determining what
actions are deemed appropriate by Coast Guard Port State Control
Officers to ensure that maritime security is preserved. As mentioned,
the performance of the owner, operator, flag administration, recognized
security organization, charterer, or port facility related to maritime
security will also be some of the other factors that will be considered
for the enforcement of maritime security in the U.S.
    In addition to tracking performance, the Coast Guard's Port State
Control program will also closely scrutinize an Administration's
designation of recognized security organizations to ensure that those
organizations fully meet the competencies and qualifications in the
ISPS Code. Vessels with International Ship Security Certificates issued
by recognized security organizations that are not properly designated,
or that do not meet the required competencies and qualifications, will
be subject to strict control measures, including possible expulsion
from port and denial of entry into the United States. Therefore, it is
imperative that Administrations carefully evaluate an organization
through a rational process, adhering to the stringent criteria in the
ISPS Code and any future standards that are developed by IMO, before
designating the organization as a recognized security organization and
delegating certain security functions to it.
    The requirements for the AIS interim rule found elsewhere in
today's Federal Register align with the recent amendments to SOLAS
Chapter V, Regulation 19 that were adopted during the IMO Diplomatic
Conference in December 2002 and the MTSA (specifically, MTSA sec.
102(e) and 46 U.S.C. 70114).

Impact on Existing Domestic Requirements

    Many current requirements for security exist that are impacted by
the interim rules published in today's Federal Register. 33 CFR part
120, Security of Vessels, and 33 CFR part 128, Security of Passenger
Terminals, currently exist but apply only to certain cruise ships. We
do not intend to revise 33 CFR parts 120 or 128 in the Vessel Security
interim rule found elsewhere in today's Federal Register. However, in
the future, this part may be revised or entirely deleted. This will
consolidate the security requirements for all vessels in subchapter H.
If this change to 33 CFR part 120 is made, foreign vessels that are
required to comply with part 120 will be required to meet the
requirements of part 104 including Sec.  104.295 Additional
requirements--Cruise Ships and passenger terminals that are required to
comply with part 128 will be required to meet part 105.
    The requirements in the interim rules also refer to and amend
certain parts of 46 CFR and 49 CFR to ensure certificate of inspection
requirements and other sections pertaining to facilities will include
the new subchapter H requirements.
    Notice of arrival requirements found in 33 CFR 160 have also been
amended in the Vessel Security interim rule found elsewhere in today's
Federal Register to ensure security-related information is provided to
appropriate authorities prior to a vessel's entry into port.
Additionally, the Captain of the Port (COTP) authorities within 33 CFR
have been revised to ensure security-related elements and authorities
are clearly highlighted.

Applicability of National Maritime Security Initiatives

    As required in section 102 of the MTSA (46 U.S.C. section 70102a),
the Coast Guard conducted an assessment of vessel types and U.S.
facilities on or adjacent to the waters subject to the jurisdiction of
the U.S. to identify those vessel types and U.S. facilities that pose a
high risk of being involved in a transportation security incident. The
MTSA defines a transportation security incident as a security incident
resulting in a significant loss of life, environmental damage, a
disruption to the transportation system, or economic disruption in a
particular area.

Method of Assessment

    In October 2001, the U.S. Coast Guard urgently needed to prioritize
vessels and facilities based on the vulnerabilities to potential
security threats and the consequences of potential incidents. We used a
systematic, scenario-based process known as Risk-Based Decision Making
(RBDM) to meet those needs. RBDM ensured a comprehensive evaluation by
considering the relative risks of various target and attack mode
combinations or scenarios. This provided a more realistic estimation of
risk (and more efficient risk management activities) than a simple
``worst-case outcome'' assessment where only the worst possible
consequences were considered.
    In addition, the RBDM approach was based on the recommendations
from the U.S. General Accounting Office (GAO). Managing risk is one of
the best tools to complete a security assessment and to determine
appropriate security measures (GAO-01-822). The GAO recommended a
comprehensive security threat and risk assessment process (GAO-01-
1158T).
    Another GAO report, Homeland Security: A Risk Management Approach
Can Guide Preparedness Efforts, illustrated a scenario-based, risk

[[Page 39244]]

management approach as used within the private sector. This GAO report
explained how a company successfully created a security plan using a
risk-based approach. Like the company described in the GAO report, the
Coast Guard's approach to commercial maritime security featured the
systematic development and consideration of potential scenarios of
concern. The generation of scenarios ensured completeness of the risk-
based method (GAO/NSIAD-98-74).

Principles of Risk Management

    Risk management principles acknowledge that while risk generally
cannot be eliminated, it can be reduced. Risk reduction is done by
adjusting operations to reduce consequences, threats, or vulnerability
of a security threat (consequences, threats and vulnerability will be
discussed later in this document). Generally, it is easier to reduce
vulnerabilities by adding security measures than to reduce consequences
or threats (although reductions in all three are possible).
    Risk assessments provide visibility into those elements of the risk
equation that exert the greatest influence on risk. Those elements
become the priorities in the risk management approach. The goal for
maritime security is to ensure that if the level of threat increases,
either the consequences or vulnerabilities decrease enough to offset
that increase.

Process of Developing Maritime Security Risk Assessments

    First, to look at risk from the port level, local experts in the
area of commercial maritime safety and security met with a team of
professional risk consultants. Together we developed the Port Security
Risk Assessment Tool (PS-RAT). The PS-RAT was provided to local
authorities to evaluate vessels, facilities and infrastructure within
their areas of responsibility for a variety of threat scenarios. The
approach used for the PS-RAT was as previously described and advocated
by GAO, where risk was assessed in terms of threat, vulnerability and
consequence. The PS-RAT was initially implemented Coast Guard wide on
16 November 2001 and the individual COTPs completed baseline risk
assessments on vessels, facilities, and infrastructure within their
area of responsibility. Nationwide, the local assessors evaluated
nearly 5200 scenarios on more than 2000 unique assets and
infrastructure elements.
    Second, at the area level, regional Coast Guard and other maritime
experts in the area of commercial maritime safety and security compiled
and analyzed the local level PS-RAT results to gain a better
understanding of the security risks affecting their Coast Guard
Districts and Areas. This assessment identified some recurring
scenarios and common issues that needed to be addressed beyond the
local level. It also helped clarify the need for another tool with a
wider perspective that would be capable of evaluating risks at the
national level.
    Because of the local, relative nature of these assessments the PS-
RAT did not support the national comparisons that were necessary for
strategic planning. To accomplish strategic planning at the national
level, a third team of Coast Guard subject matter and risk experts
produced the National Maritime Homeland Security Risk Assessment Tool.
Referred to in maritime circles as the National Risk Assessment Tool
(N-RAT), the N-RAT provided a foundation for risk-based prioritization
and subsequent regulatory assessment closely aligned with the guidance
on conducting security risk assessments recommended by the GAO (GAO/
NSIAD-98-74, GAO-02-150T, GAO-03-616T). The results of the N-RAT
provided a national evaluation of the relative security risk facing the
Marine Transportation System of the U.S. The experts compared the
results from the national assessment with the previously performed
local assessments (PS-RAT) to ensure that consistent assumptions were
made and that comparable measures of risk were produced.

What Was Assessed

    The Coast Guard used the N-RAT to determine risks associated with
specific threat scenarios against various classes of targets within the
Marine Transportation System. The targets considered included vessels,
facilities, waterways, and marine-related transportation systems. This
allowed the Coast Guard to systematically consider all segments of the
commercial maritime community to evaluate their potential for being
involved in a transportation security incident.

Maritime Security Incident Scenarios

    The scenarios considered each element within the maritime community
with respect to three general exposures: Susceptibility as a target;
Use as a means of transferring or enabling the transfer of terrorists
or terrorism-related materials; and Use of vessel or facility as a
weapon.
    The three above-mentioned general threat scenarios integrate
multiple circumstances considered as specific attack modes. That is,
there are subordinate scenarios under each general scenario. For
example in the basic threat scenario of ``susceptibility as a target'',
a ``boat loaded with explosives exploding alongside a docked tank
vessel'' is one attack mode while ``tank vessel being commandeered and
intentionally damaged'' is another.
    The N-RAT included over 50 target classes and 12 specific attack
modes. This resulted in a matrix consisting of over 600 possible
target/attack scenarios. Next, the 600 scenarios were screened for
credibility by the expert panel. The credibility of a threat was based
on the plausibility of an enemy actually carrying out the attack mode.
For example, the ``use as a means of transferring or enabling the
transfer of terrorists or terrorism-related materials;'' scenarios were
screened out as ``not credible attack modes'' for military targets due
to the inherent security measures in place. However, external attacks
on these same targets were considered to be credible and were evaluated
by the team. To balance comprehensiveness with efficiency, all
scenarios were considered but only those scenarios deemed credible by
the expert panel were further evaluated for risk.
    Each credible threat scenario was evaluated by the panel of experts
to determine the risk associated with a given attack against a specific
target. The evaluation is based on a model showing the possible
outcomes from any potential transfer or attack mode. Using previously
cited GAO guidance in this area; the N-RAT risk was modeled as a
function of the threat, vulnerability and consequences associated with
each target/attack scenario. Each element is explained in the following
sections. We realize that the terms used to identify each element may
have recognized meanings in other contexts. In order to reduce
confusion, we have included, as the first sentence in each element's
discussion, the meaning associated with these terms for the purposes of
the N-RAT.

Threat

    The term ``threat'' is a measure of the likelihood of an attack. It
represents the perceived probability of an attack based on maritime
domain awareness and the existence of intelligence.
    Within the N-RAT, five threat levels were identified. The threat
magnitude was described, and scoring benchmarks were provided for each
level. Each benchmark of threat intensity was assigned a probability of
occurrence for use in risk calculations. For each scenario, the experts
estimated the threat associated with an attack after considering the
intent of hostile groups, prior security incidents, the capability

[[Page 39245]]

to carry out the attack mode and any intelligence that indicated an
organization was planning an attack. Lacking specific, credible
intelligence that would allow an increase or reduction in the threat
score for a specific attack mode, this was fixed at a constant value
consistent with the Maritime Security (MARSEC) Levels previously
established by the Coast Guard. The baseline assumption was that
terrorist cells were operating with unknown targets and methods of
attack. Changes in MARSEC Levels or specific, credible intelligence
would trigger an appropriate modification in threat.

Vulnerability

    The term ``vulnerability'' measures the conditional probability of
success given that a threat scenario occurs. It evaluates the adequacy
and effectiveness of safeguards (both existing and proposed).
    For the N-RAT, an attack was estimated as likely to succeed only
if: the target was available, the target was physically accessible to
be attacked, organic security associated with the target would not
detect and defeat the intended attack, and the mode of attack would be
capable of producing the intended consequences by overcoming the
inherent safeguards designed into the system.
    If all of the above mentioned barriers fail to halt the intended
attack, then the attack would result in one or more outcomes. Outcomes
ranged from relatively minor to catastrophic levels. The above
mentioned four elements described the targets' overall vulnerability
and were scored by the expert team.
    The availability of a target measured its presence and
predictability as it relates to an enemy's ability to plan and conduct
an attack. The accessibility of a target, evaluated its physical
deterrence (i.e., location, perimeter fencing, etc.) against different
attack modes. It related to physical and geographic barriers that deter
the threat without organic security. Organic security of a target
assessed the ability of the target's security measures to deter the
attack. It included security plans, communication capabilities, guard
forces, intrusion detection systems, and ability of outside law
enforcement to prevent the attack. Target hardness was a measure of the
ability of a target to withstand attack. It is based on the complexity
of target design and material construction characteristics.
    Each vulnerability type was scored over five levels of magnitude
(1-5--lowest to highest). Again, scoring benchmarks were used to help
ensure consistency. Each level of magnitude in every vulnerability
category was assigned a probability of allowing an attack mode to
proceed. The probability for each vulnerability category was factored,
along with the threat probability, in risk calculations to determine
the probability term of the risk equation. The individual probabilities
were then multiplied together to derive the overall probability
assessment for the target/attack scenario under consideration.

Consequence

    The term ``consequence'' is the estimation of adverse effect from
the target/attack scenario and is an important consideration in risk
evaluation and security planning. Six categories of effects were
considered in evaluating the consequence of an attack: death/injury,
economic, environmental, national defense, symbolic effect, and
secondary (follow-on) national security threat. Inherent in this
consideration was the criticality of the target. For each effect
category, five levels of severity were described, and scoring
benchmarks are provided. Unlike vulnerability, each severity level was
assigned a common consequence value for use in risk calculations. For
example, the most severe economic impact consequences were considered
equivalent to the most severe death/injury and symbolic effect
consequences. The selected level for each factor was then converted to
a representative value of potential loss for the consequence factor.
These consequence scores were then summed across all appropriate
categories to develop the consequence values for the target/attack
scenario combination.
    The estimated probability and consequence values were multiplied to
calculate the overall risk for each target/attack scenario. This is
essentially an estimate of the expected losses should a specific
target/attack scenario occur.

Assessment Results

    The following graph is a demonstration of the type of the relative-
risk results the N-RAT gave. Specific results, including scores, have
been designated as sensitive security information (SSI). This graph
simply displays the relationship between some types/classes of vessels
and facilities or port infrastructure based on their relative risk. In
each line, the parenthetical (I) and (D) stands for ``international''
or ``domestic,'' respectively.
BILLING CODE 4910-15-U

[[Page 39246]]

[GRAPHIC] [TIFF OMITTED] TR01JY03.000

BILLING CODE 4910-15-C
    Below is a summary of the application requirements for these
interim rules based on the N-RAT results:

Applicability Evaluation for Ports

    The N-RAT results focused on individual vessel types and facilities
subject to the authority of the Coast Guard. Scenarios were also
developed that involved port transportation infrastructure that is
vital to the port communities such as bridges, channel openings, and
tunnels. This evaluation led to the conclusion that many structures
within a port are also at risk of a transportation security incident
and therefore should be covered by security measures. Therefore, we
determined it would be appropriate to include specific guidance in part
103 to have the Area Maritime Security (AMS) Plan address these types
of transportation infrastructure as well as those smaller vessels or
facilities that fall below the transportation security incident
threshold. This application for the AMS ensures all maritime concerns
are assessed and security is systematically evaluated nationwide.

Applicability Evaluation for Vessels

    The N-RAT results indicate the following vessel types are at a high
risk of a transportation security incident and therefore are required
to meet specific security measures as laid out in part 104 of
subchapter H:
    [sbull] All ships, both cargo and passenger, that are subject to
SOLAS;
    [sbull] All vessels greater than 100 gross register tons that are
subject to 46 CFR subchapter I (this includes vessels on the Great
Lakes);
    [sbull] All barges subject to 46 CFR subchapter I engaged on an
international voyage;
    [sbull] All domestic passenger vessels subject to 46 CFR
subchapters H and K;
    [sbull] All barges, regardless of route, which are subject to 46
CFR subchapter D and O;
    [sbull] All tank ships, regardless of route, which are subject to
46 CFR subchapters D and O;
    [sbull] All Mobile Offshore Drilling Units (MODUs) subject to 46
CFR subchapter I-A;
    [sbull] All vessels subject to 46 CFR subchapter L;
    [sbull] All towing vessels greater than 8 meters in registered
length that are engaged in towing barges which are subject to 46 CFR
subchapter D & O; and
    [sbull] All towing vessels greater than 8 meters in registered
length that are

[[Page 39247]]

engaged in towing barges that are subject to 46 CFR subchapter I on an
international voyage.
    The N-RAT results indicate that the following vessel types are at a
lower risk of a transportation security incident and are therefore
subject to parts 101 through 103 of subchapter H:
    [sbull] Uninspected vessels, unless otherwise noted;
    [sbull] Domestic small passenger vessels certificated under 46 CFR
subchapter T;
    [sbull] Barges subject to 46 CFR subchapter I engaged exclusively
on domestic voyages;
    [sbull] Towing vessels engaged in towing 46 CFR subchapter I barges
not on international voyages;
    [sbull] Vessels certificated under 46 CFR subchapter I engaged
exclusively on domestic voyages;
    [sbull] Fleeting tugs or harbor tugs; and
    [sbull] Other vessels not specifically addressed in part 104 (as an
example, recreational vessels).
    The inclusion of towing vessels (traditionally included with other
uninspected vessels) was done because these vessels interface with and
are responsible for the movement of barges that carry higher
consequence cargoes, such as Certain Dangerous Cargoes (CDCs). When
scored on the N-RAT, the high consequence of the barge cargoes
significantly adds to the risk of a transportation security incident
for the towing vessel.
    The N-RAT was not able to provide the sensitivity needed to assess
certain elements of the definition of a transportation security
incident. For example, the transportation security incident calls for a
determination of what the term ``significant loss of life'' should be
or where the threshold for an ``economic disruption in a particular
area'' should be placed. In order to determine these elements of a
transportation security incident, the Coast Guard used the N-RAT model
itself as a guide along with a comparison with other transportation
modes. We also used the preliminary intermodal comparison work of the
other agencies of the DHS (e.g., TSA).
    First, using the N-RAT, we assessed what consequences or
combination of consequences would result given a vessel, facility, or
port structure that had a high baseline vulnerability. Recalling from
the previous N-RAT explanation that the consequence assessment portion
of the N-RAT evaluation was based on six categories and five levels (as
shown in Table 2), we looked at the numerical results of a scenario
when given some vulnerability benefits assumed for implemented AMS
Plans, and other general security measures in place for a port.

                                                                  Table 2.--Consequence
--------------------------------------------------------------------------------------------------------------------------------------------------------
                                                                             Economic      Environmental     National        Symbolic      Follow-on HLS
               Consequence category--Level                 Death/injury       impact          impact          defense         effect          threat
--------------------------------------------------------------------------------------------------------------------------------------------------------
Catastrophic
---------------------------------------------------------
High
---------------------------------------------------------
Medium
---------------------------------------------------------
Moderate
---------------------------------------------------------
Low
--------------------------------------------------------------------------------------------------------------------------------------------------------

    The results showed that a score of at least one consequence factor
at the ``Catastrophic'' level or a combination of two ``High'' scores
could not be offset by the vulnerability reduction achieved by the AMS
Plan or general port security efforts. The risk to these types of
vessels, facilities, or port structures would need further
vulnerability reduction to get out of the potentially ``Catastrophic''
or ``High'' consequence arena. This then, is the threshold that the
Coast Guard determined could be considered a transportation security
incident.
    To further determine the thresholds of a transportation security
incident with respect to the ``loss for life'' category, the Coast
Guard compared the potential loss of life between various
transportation modes and various operations. To look at the ``economic
disruption'' category of transportation security incident as well as
its other elements, we looked at damage and casualty data to determine
if comparisons between modes could be used to formulate thresholds
based on vessel size.

Passenger Vessel Threshold Determination

    To compare potential loss of life between transportation modes, we
examined probable fatalities given an accident to the air, rail, or
maritime mode. The first step in this process included a comparison of
the current regulatory and operational thresholds that currently exist
in each industry.
    In aviation, regulations cover aircraft carrying 20 or more
passengers as a commuter airline (14 CFR part 125). Most commercial
aircraft are larger than this smaller commuter, with 69 percent of the
U.S. market dominated by an aircraft with a capacity of 189 passengers.
    In rail, we considered transit service (light, heavy, or commuter)
and long-haul rail travel. Light rail can carry up to 150 passengers in
each car of the train. Heavy rail cars typically carry 100 passengers,
though they can carry twice that many during periods of peak traffic.
Commuter rail cars carry an average of 125 passengers, with peak
capacities of over 200 passengers per car for certain seating
configurations. Inter-city rail passenger coaches typically carry about
80 passengers per car depending on the configuration. The average train
length is reported to be 6 to 8 cars.
    In the maritime passenger trade, we have small passenger vessels,
commuter ferries of all sizes, large passenger vessels, and cruise
ships. The average passenger capacity on small passenger vessels is 49.
The average capacity for commuter ferries is 587 and for large
passenger vessels the average capacity is 1154 passengers.
    Looking at casualty statistics for these three modes and different
passenger operations, we estimated the probable fatalities given a
successful transportation security incident occurred. We assume that,
in general, a transportation security incident would have a higher
fatality rate than that of an accident because of the hostile
motivation behind perpetrators' actions deliberately produce more
severe consequences. For aircraft, the more severe airline crashes were
used to estimate the transportation security incident fatality rate.
The hostile intent

[[Page 39248]]

may also render certain safety measures less effective in a
transportation security incident compared to their demonstrated
performance in an accident. We also considered average occupancy rates
for each mode into the calculations to estimate a relative potential
loss of life comparison. The table below compares the average estimated
fatality rates across modes for various passenger-carrying operations.

                                        Table 3.--Comparison of Estimated Fatalities by Mode and Type of Incident
--------------------------------------------------------------------------------------------------------------------------------------------------------
                                          Representative     Estimated       Estimated    Fatality average rate \1\  (in   Estimated average fatalities
                                             passenger        average         average                percent)            -------------------------------
                  Mode                       capacity        occupancy       occupancy   --------------------------------
                                            (potential      (percent of     (number of                                       Accident           TSI
                                            fatalities)      capacity)      passengers)      Accident           TSI
--------------------------------------------------------------------------------------------------------------------------------------------------------
Air (14 CFR 135) Commuter Plane.........              80              78              62              74              80              46              50
Air (14 CFR 121) Large Pass. Plane......             189              75             142              74              80             105             113
Rail (single commuter car)..............             180              66             119               5              25               6              30
Rail (6 car commuter Train).............            1080              66             713               5              25              36             178
Rail (8 car long-haul Pass. Train)......             640              66             422               5              25              21             106
Maritime \2\............................
(Subchapter H) Large Pass. Vessels (100 GT).........................
Maritime \2\ (Ferries--Sub. H & K)......             587              72             423              32              46             135             194
Maritime \2\ (Subchapter T) Small Pass.               49              72              35              32              46              11             16
 Vessels (<150 pax.)....................
--------------------------------------------------------------------------------------------------------------------------------------------------------
\1\ Accident data from the National Transportation Safety Board and USCG.
\2\ Typical passenger capacity for USCG Documented vessels.

    Table 3 shows that per plane/rail-car/vessel, the estimated loss of
life from a transportation security incident is estimated to range from
a low of 16 per a typical small passenger vessel to a high of 382 for
large passenger vessels. The Coast Guard determined that based on the
above comparison and the results of the N-RAT vulnerability scores for
vessels that result in two ``High'' consequence scores, that a
threshold of 150 passengers is appropriate. We also looked at the N-RAT
vulnerability condition for a ``Catastrophic'' consequence score and
determined that added measures were appropriate for vessels carrying
2,000 or more passengers. These additional security measure
requirements for larger passenger vessels and the terminals that serve
them are justified to offset their elevated risk from a transportation
security incident.

Gross Tonnage Threshold Determination

    The N-RAT was also limited in its sensitivity to identify the
vessel gross tonnage that sufficiently pointed to a determination of
the terms ``economic disruption in a particular area, transportation
system disruption, or environmental damage'' which are required
elements of the transportation security incident definition.
    Small, dry-cargo vessels (gross tonnage less than 500) were
identified by the N-RAT results as vessels of concern. These vessels,
regulated under 46 CFR subchapter I and in the gross tonnage range of
15 to 500, are not required to comply with SOLAS and thus are exempt
from ISPS Code requirements. We believe this creates a significant
security vulnerability that must be considered and addressed at an
appropriate level. To establish the appropriate threshold, we evaluated
the risk for a transportation security incident posed by smaller
vessels (gross tonnage <500) to determine where a reasonable threshold
should be drawn.
    The N-RAT results showed a significantly greater risk for vessels
of gross tonnage above 100 being involved in a transportation security
incident than for smaller vessels. Based on the N-RAT assessment, the
smaller vessels (gross tonnage <100) are unlikely to be involved in a
transportation security incident because of the limited consequences
they are expected to produce due to their limited size and speed. A
review of the domestic freight vessels that are documented with gross
tonnage under 100 reveals that less than 2 percent of these vessels are
capable of causing significant consequences to facilities or other
vessels, and that some of these vessels are already regulated under
this rule due to the nature of the cargo carried. However, because of
their greater dimensions and the trades in which they operate, vessels
with gross tonnage above the 100 threshold do present the potential of
being involved in a transportation security incident. A limited
analysis of potential collision effects leads us to the conclusion that
these vessels may not be able to cause catastrophic personnel
casualties or environmental damage. However, based on our knowledge of
port operations, navigable waterways, and vessel design, construction,
and operations, we believe that a significant risk of a transportation
security incident (one ``Catastrophic'' or two or more ``High''
consequence ratings) exists for vessels with gross tonnage above 100.
This is primarily driven by potential impact on the economy, national
defense, or secondary national security threat from certain scenarios.
Examples of these potential effects exist in Coast Guard accident
reports where incidents documenting the blockage of channels in various
rivers and ports occurred due to vessel casualties. These blockages
resulted in substantial economic impacts as the mobility and commerce
within the port was seriously affected.
    As for the difference in the Convention Measurement tonnage and the
Regulatory Measurement tonnage within this analysis, we used the
Regulatory Measurement where

[[Page 39249]]

assigned. There was also an impelling reason to use the Regulatory
Measurement for implementing maritime security measures because there
is a significant body of existing regulations that are constructed
around this measurement system. Therefore, for application, the
Regulatory Measurement tonnage (gross register tons) was primarily used
unless a certain maritime security requirement was solely meant to
reduce risk on vessels that engage in international voyages.
    Based on the above, we believe that 100 gross register tons (and
not 15 gross register tons) is a reasonable lower end for applicability
for dry-cargo vessels. We are also regulating those vessels in the
range of 100-500 gross register tons that are not covered by SOLAS and
are therefore exempt from ISPS Code requirements.

AIS Threshold Determination

    The applicability thresholds used for the implementation of AIS on
certain vessels is a separate issue, for which we did not use the N-
RAT. The MTSA clearly mandates AIS applicability in 46 U.S.C. 70114 and
the installation dates are included in MTSA sec. 102(e). The thresholds
for vessels: a self-propelled commercial vessel of at least 65 feet in
overall length; or a passenger vessel, carrying more than a number of
passengers for hire determined by the Secretary; or a towing vessel of
more than 26 feet in overall length and 600 horsepower; as well as any
other vessel for which the Secretary decides that an AIS is necessary
for the safe navigation of the vessel, are related to both safety and
security. Thus the thresholds are somewhat lower than those discussed
above for vessels at a high risk of a transportation security incident.

Applicability Evaluation for Facilities

    The N-RAT results indicate that the following facilities are at a
high risk of a transportation security incident and therefore are
required to meet specific security measures as laid out in part 105 of
subchapter H:
    [sbull] Facilities that handle cargo subject to 33 CFR parts 126,
127, or 154;
    [sbull] Facilities that receive vessels certified to carry more
than 150 passengers;
    [sbull] Facilities that receive commercial vessels greater than 100
gross register tons on international voyages, including vessels solely
navigating the Great Lakes; and
    [sbull] Fleeting facilities/areas for barges carrying cargoes in
bulk, regulated by 46 CFR subchapter D or O or carrying certain
dangerous cargoes.
    The N-RAT results indicate that the following facility types are at
a lower risk of a transportation security incident and are therefore
subject to parts 101 through 103 of subchapter H:
    [sbull] Facilities adjacent to the navigable water that handle/
store cargo that is hazardous or a pollutant;
    [sbull] Facilities that receive only domestic bulk non-hazardous
cargo;
    [sbull] Facilities that service a vessel that carries fewer than
150 passengers;
    [sbull] Fleeting facilities/areas that service barges subject only
to 46 CFR subchapter I or barges that are certified to be gas-free that
are certificated under subchapter D and O; and
    [sbull] Oil and natural gas production, exploration, or development
facilities regulated by 33 CFR part 154 that engage solely in the
exploration, development, or production of oil and natural gas; and do
not meet or exceed the operating conditions in Sec.  106.105 of the
Outer Continental Shelf (OCS) Facilities rulemaking published elsewhere
in today's Federal Register;
    [sbull] Facilities supporting the production, exploration, or
development of oil and natural gas regulated by 33 CFR parts 126 or 154
that engage solely in the support of exploration, development, or
production of oil and natural gas; and transport or store quantities of
hazardous materials that do not meet and exceed those specified in 49
CFR 172.800(b)(1)-(6); or stores less than 42,000 gallons of cargo
regulated by 33 CFR part 154;
    [sbull] Mobile facilities regulated by 33 CFR part 154;
    [sbull] Isolated facilities that receive materials regulated by 33
CFR parts 126 or 154 by vessels due to the lack of road access to the
facilities and do not distribute the material through secondary marine
transfers; and
    [sbull] Other facilities not specifically addressed in part 105.
    As mentioned in the above Applicability for Vessels discussion, the
150-passenger threshold will be reviewed for the maritime community
when other agencies of DHS (e.g., TSA) have completed their assessment
of the national transportation system as a whole and has provided
guidance on intermodal thresholds that may refine the ``significant
loss of life'' determination for the implementation of the MTSA. We are
concerned about the gap that may be created by requiring only
facilities that service larger passenger vessels to have plans, when
some other facilities that service only smaller vessels may, at any
point in time, have an aggregation of more than 150 passengers on a
facility or pier (such as commuters at small passenger vessel
terminals). In addition, small passenger vessels that are not required
by subchapter H to have vessel security plans may share the same
facility as a larger passenger vessel for which a plan is required.
This distinction may put the facility at a higher risk from the small
passenger vessel and therefore is a potential ``weak link'' in the
security system. Even though the Vessel Security interim rule found
elsewhere in today's Federal Register does not directly regulate these
types of small passenger vessels, the facility security plan must
nevertheless address the risks presented by accommodating multiple
vessel types, even if some of those vessels may not have individual
security plans. Additionally, the AMS assessment may indicate that the
COTP should impose security requirements on small passenger vessels
through the use of orders or security zones to complement those
measures being implemented by the facility. The AMS Plan will reflect
what additional necessary measures may be imposed by the COTP on
vessels and facilities not subject to parts 104 to 106 of subchapter H,
and other activities within the port area, at the three Maritime
Security (MARSEC) Levels.
    It is important to note the N-RAT focused on the potential for
certain vessels and facilities to be involved in a marine-related
incident, and its results reflect that relative risk. The Coast Guard
took this approach because of our longstanding familiarity with vessel
and waterfront facilities, because it was a logical follow-on to the
PS-RAT efforts of the COTPs, and because it allowed us to meet the
initial mandates of the MTSA to promulgate these interim rules as soon
as practicable. However, the MTSA is broader and permits direct
regulation of any vessel and facility that may be involved in a
transportation security incident, as that term is broadly defined. This
could include those facilities and infrastructure not traditionally
regulated by the Coast Guard, such as facilities that do not have
accommodations for vessels but are nonetheless on or adjacent to waters
subject to the jurisdiction of the U.S. The Coast Guard is currently
working with other agencies of DHS (e.g., TSA) and other federal
agencies to assess the security requirements of these other vessels and
facilities located on or adjacent to waters subject to the jurisdiction
of the U.S. Therefore, the interim rules published today, especially
the applicability sections of parts 104, 105, and 106, do not exhaust
the types of vessels and facilities that may be regulated under the
MTSA. We

[[Page 39250]]

may be involved in follow-on regulations to address these adjacent
facilities in the future. In the interim, the AMS Plan will address
these types of facilities and COTPs may require specific facilities
storing dangerous or pollutant cargoes to add security measures
appropriate to their operations and the MARSEC Level.

Applicability Evaluation for Outer Continental Shelf (OCS) Facilities

    The N-RAT results indicate that the following OCS facilities are at
a high risk of a transportation security incident and are therefore
subject to part 106 of subchapter H:
    [sbull] OCS facilities that produce 100 thousand barrels of oil or
200 million cubic feet of natural gas per day or regularly host more
than 150 personnel on a daily basis (may exceed this number for periods
of time not in excess of 90 days).
    The N-RAT results indicate that the following OCS facilities are at
a lower risk of a transportation security incident and are therefore
subject to parts 101 through 103 of subchapter H:
    [sbull] Unmanned platforms and lower production level platforms.
    The N-RAT was also not able to provide sensitivity to the OCS
facility size or production level that sufficiently pointed to a
determination of the terms ``significant loss of life, economic
disruption in a particular area, transportation system disruption, or
environmental damage'' which are required elements of the
transportation security incident definition. To develop this threshold,
we worked in conjunction with the Minerals Management Service (MMS) to
compare OCS facility production rates and operations throughout the
industry. The 150-person threshold was also used to remain consistent
with the vessel and facility thresholds. Those OCS facilities that do
not fall within the rather narrow parameters of this threshold should
consider security measures. We will continue to work with the MMS to
validate this threshold as the results of the other agencies of DHS
(e.g., TSA) intermodal comparisons are completed. In the interim, the
AMS Plan will address these types of OCS facilities and COTPs may
require specific offshore facilities with unique or higher-risk
operations to add security measures appropriate to their operations and
the MARSEC Level.

Assessment Limitations

    While the N-RAT is a very useful tool and offers an excellent way
to collect and organize expert judgments about security risk issues, it
is not perfect. One limitation is that the quality of the results
depends directly on the knowledge and expertise of the expert
assessors. Inexperienced personnel with limited perspectives will
produce results with limited value. It is essential that seasoned
evaluators with a broad experience base be used to ensure full
consideration of multiple aspects of the issues. The Coast Guard
assessment teams included mid-career and senior professionals with
experience in ship design, construction and operation, hazardous
materials and facility inspections as well as waterways management and
port operations.
    Another limitation of the N-RAT is that it looks at risk in a
relative way. The N-RAT is considered a ``relative risk-indexing''
tool, meaning that it is only useful in comparing scenarios evaluated
with the tool. The N-RAT does not provide a measure of absolute risk
that can be compared to other situations not evaluated in this tool.
    A third limitation is that the N-RAT is unable to measure all of
the benefits attributable to intelligence or information gathering
initiatives, which are commonly called ``Maritime Domain Awareness
(MDA) initiatives.'' Measures such as AIS increase awareness and may
provide earlier detection or even serve as a deterrent to a
transportation security incident, but the assessment tool is unable to
capture this effect based on the factors evaluated and the sensitivity
of the rating scales. Increased awareness by itself does not decrease
the threat or vulnerability at a measurable level subject to the
sensitivities of the model. Therefore, the expert panel was unable to
account for all of the benefits we believe should be derived from
specific MDA initiatives.
    Since the N-RAT results highlight the worst-credible case
scenarios, a fourth limitation is that the listed results are not
sensitive to all scenarios, such as a high profile historically-based
incident. We know that small boats loaded with explosives were used as
weapons to attack the USS COLE and the tank ship LIMBURG. We cannot
discount the possibility of this type of incident in the U.S. or
against U.S. vessels outside of the U.S. It is our belief that the best
means of deterring such an incident, to the maximum extent practical,
is to require certain facilities used in maritime commerce to conduct
an assessment of their vulnerability to being used as a staging area
for terrorist activities. These facilities would then construct a
detailed plan to control access to the facility, permitting the
movement or entrance of only authorized persons and cargoes onto and
through the facility. This plan will enable the facility to have
increased vigilance, awareness and control over those vessels and
persons that are served by the facility. We also believe the
possibility of a ``COLE-like'' incident can be reduced by requiring
vessels that would likely be the target of such an attack to likewise
assess their vulnerability to such an incident and similarly develop a
security plan. This plan would include procedures for security
monitoring and increased security vigilance, including security with
respect to vessel-to-vessel activities. In addition, vessel and
facility plans should include how they would address recreational
vessels approaching that they reasonably suspect may pose a threat to
them. These facility and vessel security requirements will be
complemented by the development of an AMS Plan involving port
stakeholders. This plan will address the security measures to be
implemented for all port activities at different security levels. The
control and movement of vessels, such as small vessels that could be
used as a weapon, will be considered and addressed in the AMS Plan.
These controls would include such measures as the possible restriction
of all small vessel movements, the implementation and through
enforcement of security zones and the coordination of all security
patrols in the port.
    Lastly, the threat, vulnerability, and consequence scores each have
discrete values associated with them. Because there were only 5 scores
(1 through 5) for each input variable, the level of resolution (or
``granularity'') of the risk calculations was limited. This was
especially true when assessing the impact of risk reduction initiatives
or actions. In many cases, a new initiative or action may have a
distinct improvement, but not enough to change a score assignment
(e.g., changing the accessibility score from a score of 4 to a score of
3).

Discussion of Comments to Maritime Security Public Meetings

    As mentioned, the notice of meeting published on December 30, 2002,
requested comments on requirements that align domestic maritime
security requirements with the ISPS Code and recent SOLAS amendments,
to comply with section 102 (Port Security) of the MTSA, 2002.
    General Comments for all public meetings. Several comments and
issues were discussed at all seven public meetings that reflect
general, overarching concerns of the maritime community for
implementing National Maritime Security requirements. These

[[Page 39251]]

common issues are included in the following discussion.
    Commenters voiced the desire to ensure we align the maritime
security requirements with other agencies and States that have already
tightened security. We have been working with all federal agencies that
have security or response related functions and in multiple venues to
facilitate the various security initiatives related to homeland
security. The joint team that worked on the interim rules found in
today's Federal Register is just one example of this type of
coordination. Other joint efforts include the ongoing work to implement
the Presidential Decision Directive PDD-63 on critical infrastructure
protection and The National Strategy for The Physical Protection of
Critical Infrastructures and Key Assets. The Department of Homeland
Security (e.g., Information Analysis and Infrastructure Protection) is
leading this critical infrastructure program. We have also worked with
State officials that have implemented maritime security requirements
and have broadened this discussion to include all State level homeland
security representatives to raise the awareness of maritime security
and the importance of the marine elements of the national
transportation system throughout our nation. Further interagency
coordination on maritime security issues will also be established when
the National Maritime Transportation Advisory Committee is in place. We
anticipate that this Committee will assist in ensuring the continued
coordination of all involved in maritime security on a national scope.
    On a related issue, commenters requested to know how other cargo-
handling requirements or proposals by other agencies would affect the
maritime industry. Cargo security measures are addressed in 46 U.S.C.
70116, Secure Systems of Transportation, and Section 111, Performance
Standards, of the MTSA. Section 111 has an implementation date of
January 1, 2004. Other agencies of DHS (e.g., TSA and the Bureau of
Customs and Border Protection) are responsible for these sections of
the MTSA and will work with the Coast Guard in implementing them. The
other agencies of DHS (e.g., TSA and the Bureau of Customs and Border
Protection) are actively working toward developing the cargo security
measures called for in these sections. They have assembled an
interagency team to evaluate the proposals for supply chain security
submitted for Operation Safe Commerce (OSC) and hope to have
cooperative agreements signed by summer 2003 to analyze supply chain
security and to prototype procedural and technological solutions to
supply chain security.
    The information gleaned from the OSC effort, as well as information
gleaned from other cargo security and productivity initiatives and from
experience in other cargo security programs, will form the foundation
of forthcoming cargo security regulations. We recognize that, although
cargo security will be a component in vessel and facility security
plans, facilities and vessels will not want to create and install cargo
security technologies in advance of these cargo security requirements,
out of a concern that the technologies they create or install will not
meet the requirements. Guidelines will be developed and provided for
acceptable cargo security measures that can be used until the cargo
security requirements are promulgated. These guidelines will address
procedural measures.
    Again, related to interagency coordination, some commenters
stressed the need to harmonize any requirements with the Research and
Special Program Administration (RSPA). RSPA published a final rule
amending 49 CFR part 172 in the Federal Register on Tuesday, March 25,
2003, (68 FR 14510). The final rule established new requirements to
enhance the security of hazardous materials transported in commerce.
Like the maritime security interim rules discussed in this rulemaking,
shippers and carriers of certain highly hazardous materials must
develop and implement security plans that address three issues:
personnel security; unauthorized access; and enroute security. In
addition, all shippers and carriers of hazardous materials must assure
that their employee training includes security awareness training and,
for shippers or carriers of certain highly hazardous materials, in
depth employee training for each hazardous material employee. While
RSPA's final rule allows training that is conducted and security plans
that are prepared to meet regulations, standards, protocols, or
guidelines issued by other entities, the final rule comes into effect
before the interim rules for maritime security. Shippers and carriers
must be in compliance with the RSPA final rule by September 26, 2003.
Shippers and carriers that are required to meet the interim rules for
maritime security discussed in this rulemaking will have to submit
security plans no later than December 2003. As a result, shippers and
carriers that must comply with both the RSPA requirements and the
maritime security requirements will need to ensure the September date
is met. In order to minimize duplicative efforts, we recommend those
shippers and carriers develop and implement the training and security
plan components of the maritime security interim rules that also meet
the standards of the revised 49 CFR 172.800 by September 26, 2003 in
order to comply with the RSPA requirements. Because the RSPA
regulations do not require plan review, by completing and implementing
those portions of the maritime security interim rules that fulfill the
RSPA regulations, a shipper or carrier will comply with the RSPA
regulations. In other words, if a Vessel or Facility Security Plan is
completed and implemented but not yet approved by the Coast Guard, if
it contains the elements mandated by the RSPA regulations the shipper
or carrier will comply with RSPA. Once the Vessel or Facility Security
Plan is approved, both requirements will be met.
    Finally, the Environmental Protection Agency (EPA) also has
existing regulations for non-transportation-related onshore facilities
and certain offshore facilities to prevent the discharge of oil and to
prepare plans for responding to discharges of oil or substantial
threats of discharges of oil. The Coast Guard and the EPA will continue
to explore the impacts of these maritime security interim rules on
facilities under EPA jurisdiction and will clarify the impacts of the
maritime security regulations, if any, before publishing a final rule.
These maritime security interim rules are not intended to require the
owner or operator of a facility under EPA jurisdiction to amend the
Facility Response Plan (FRP) or Spill Prevention Control and
Countermeasure (SPCC) Plan. We do not intend to require the National
Schedule Coordination Committee to modify the existing schedule for
exercise. Additionally, we do not intend to require the owner or
operator of a facility under EPA jurisdiction to amend the facility's
EPA-approved training program, exercises, or drills or record keeping
of such training, exercises, or drills. The maritime security
regulations for training, exercises, drills, and record keeping in
these interim rules are strictly within the purview of the new
legislative mandate for security and may be combined with existing
training, exercises, or drills, where appropriate.
    Commenters requested that we recognize industry-developed standards
that achieve an equivalent level of security to the SOLAS and ISPS Code
requirements. We have been working on

[[Page 39252]]

security-related issues and have discussed or required security
measures on vessels and facilities (including offshore facilities)
since well before the development of the ISPS Code or the MTSA. In this
work, we have reviewed and assisted in the development of many industry
standards for security that implement high security standards and are
effective in preventing security-related incidents. In addition, we
have worked with many States that have successfully developed crime
prevention standards for the maritime community that are substantial
and effective. Recognizing the substantial body of work in various
maritime industry sectors on security, we anticipate recognized
industry-developed standards to provide the backbone for implementing
many of the security measures contained in the maritime security
interim rules found in today's Federal Register. Key to this
recognition will be a comprehensive review of the industry-developed
standard to determine whether it is equivalent to the security
requirements being met by those using the standards found in the
maritime security interim rules in today's Federal Register. It is
imperative that the industry-developed standards be deemed equivalent
in order to ensure that those vessels and facilities that use the
industry-developed standards and have a high likelihood of experiencing
a transportation security incident have adequately reduced their risk
to the benefit of the entire U.S. Marine Transportation System (MTS).
    Commenters requested that the requirements be flexible enough to
tailor measures to different industries and be performance based rather
than prescriptive. Fundamental to the requirements for security has
been the concept of a security assessment. This assessment is
specifically linked to security plans and is focused on a vessel,
facility, or port as a unique operation. Thus, the assessment results
drive the security measures implemented to set or increase each
security level and, thus, make each plan unique as well as performance-
based. The enforcement of security measures is always difficult when
dealing with a purely performance-based system, as opposed to a
prescriptive one; however, in this case, it will be clear whether
access control, for example, exists or does not. The requirements
contained in the maritime security interim rules found in today's
Federal Register include clear measures to conduct standard security
assessments and draft standard security plans throughout the maritime
community. This approach will result in security plans which
incorporate specific measures, unique to the operation, but in overall
alignment with the objectives of all plans, to detect and deter a
transportation security incident.
    Commenters requested that the requirements be consistent among
ports. We recognized the need for industry to have requirements
tailored to their specific and diverse operations yet be afforded the
consistency of the larger port-wide security measures. This said, no
port has the same critical operations or geographic constraints, which
make mandating the same security measures ineffective. However, we
believe the framework of assessments and plans as laid out in the
maritime security interim rules found in today's Federal Register,
provides the consistency between ports and will be effective. This
approach should ensure industry concerns are addressed within each
COTP's area of responsibility. Each AMS Plan will also be reviewed and
approved at both the District and Area level to assess consistency
across the maritime community and to emphasize coordination across all
borders. Additionally, we have included some flexibility in the AMS
Plan requirements so that some geographic areas can be treated as
systems, such as the Western Rivers, the Great Lakes, or the OCS. This
geographic coordination of security measures to encompass an entire
system will promote effective as well as efficient maritime security
for all.
    Commenters raised concern on the restrictions to mariner shore
leave, detention aboard their vessels, and service provider access to
mariners, such as port chaplains, union representatives, etc. This is a
very important issue and it is addressed in the Vessel and Facility
Security interim rules found elsewhere in today's Federal Register. The
interim rules encourage both the vessel and the facility operators to
coordinate shore leave for mariners, as well as procedures for access
through the facility by visitors, including port chaplains and union
representatives.
    Commenters raised concern over the high cost of requirements and
disparity between federal funds for the maritime versus the aviation
sectors. We understand that many believe the cost of security is
overwhelming. The requirements in this set of interim rules focus on
those on those vessels and facilities that are at a higher risk of
having a transportation security incident. We have developed flexible
measures to meet the security requirements. The disparity between
funding available between transportation modes is outside the scope of
this rulemaking. There are, however, programs, such as the Maritime
Security Grant Program, which is funded through the Transportation
Security Administration and jointly administered by the Maritime
Administration, Coast Guard and the Transportation Security
Administration. This grant program can provide some funding for owners
and operators regulated under subchapter H. An excellent reference for
this program can be found at https://www.portsecuritygrants.dot.tsa.net
.
    Commenters voiced a desire to have the Transportation Security Card
requirements promulgated quickly. As discussed under issue number 37 in
the Specific Comments on the 40 issues listed in the public notice
section below, there are many credentialing efforts in development. 46
U.S.C. 70105, Transportation Security Cards, addresses unescorted
personnel access to secure areas of facilities and vessels. Other
agencies of DHS (e.g., TSA) are responsible for implementing this
section of the MTSA. Other agencies of DHS (e.g., TSA) are developing
the Transportation Worker Identification Credential (TWIC) that will be
a transportation system-wide common credential, used across all modes,
for all U.S. transportation workers requiring unescorted physical and
logical access to secure areas of our transportation system. The goal
is to have one standardized credential that is universally recognized
and accepted across our transportation system and can be used locally
within the current facility infrastructure. We recognize that personnel
access control will be a component in vessel and facility security
plans, and understanding that facilities and vessels will not want to
create and install personnel access control systems in advance of the
TWIC infrastructure. In order to address these competing concerns,
guidelines will be developed jointly by other agencies of DHS (e.g.,
TSA) and the modal administrations, and will provide for acceptable
personnel access control measures that can be used until the TWIC is
available. These guidelines will address procedural measures.
    Commenters requested that we provide guidelines on training
requirements for vessel and facility security. The ISPS Code specifies
the designation of a Company Security Officer, Ship Security Officer
and a Port Facility Security Officer and details their required
competencies, duties, and responsibilities. To supplement these

[[Page 39253]]

requirements, the IMO is developing model courses that identify the key
competencies for each of the three security officer positions. The U.S.
and India have been asked by the IMO to develop these model courses by
September 2003.
    In addition to the ongoing international training initiatives,
section 109 of the MTSA requires the Secretary of Transportation to
develop standards and curricula to allow for the education, training,
and certification of maritime security personnel. This task has been
delegated to MARAD, which has charged a group of experts at the U.S.
Merchant Marine Academy (USMMA) with developing the training
requirements for the three security officer positions as well as the
requirements for any other personnel with security duties. The USMMA
working group has developed a base-level curriculum for maritime
security education. This curriculum was refined through public outreach
that included an international conference hosted by MARAD at the USMMA
on March 20, 2003.
    The ``Conference on Maritime Security Standards and Curricula''
drew 136 delegates from the U.S. and numerous other countries. The
meeting focused on the framework for seven model courses that had been
provided to attendees prior to the conference. The seven model course
frameworks discussed were:
    1. ``Vessel Security Officer;''
    2. ``Company Security Officer;''
    3. ``Facility Security Officer;''
    4. ``Maritime Security for Vessel Personnel with Specific Security
Duties;''
    5. ``Maritime Security for Facility Personnel with Specific
Security Duties;''
    6. ``Maritime Security for Military, Security and Law Enforcement
Personnel;'' and
    7. ``Maritime Security Awareness.''
    The discussions also included issues related to certification of
personnel and quality control of training courses. A panel consisting
of the USMMA working group members and representatives from the Coast
Guard, TSA and MARAD also responded to questions and comments from
participants as part of the conference forum.
    Ongoing interagency collaboration and efforts to harmonize
international and U.S. requirements have led to the expansion of this
project to include the development of three model maritime security
courses for the IMO. In cooperation with the government of India, the
working group prepared and submitted draft model courses for the Ship
Security Officer, the Company Security Officer, and the Port Facility
Security Officer to the IMO by May 30, 2003. Following review by an IMO
validation panel, the finalized courses will be forwarded to the IMO
not later than September 8, 2003.
    Therefore, the requirements in the vessel security and facility
security interim rules found elsewhere in today's Federal Register
require the Vessel Security Officer, Company Security Officer and
Facility Security Officer positions to have designated personnel and
company-certified qualifications until other training provisions are
complete. For company-certified qualifications, we anticipate that
owners and operators will use the model courses as guidance. Further
work on training requirements and implementation of the security
measures may indicate a need to require formal training for these
positions, which could be promulgated under a separate rulemaking.
    Commenters requested that the process used to determine the
applicability of security requirements and their value be explained. We
have discussed the initial assessment and subsequent application of
these interim rules in the Applicability of National Maritime Security
Initiatives discussion above. Additionally we have discussed the value
of implementing security measures throughout the maritime community in
the Benefit Assessment section of this rule.
    Some commenters were concerned about the idea of applying
international standards to domestic trade. In the public notice of
meeting, we included an appendix that had the ISPS Code and the new
security-related SOLAS amendments. We took this approach to provide the
public with an opportunity to comment on a body of work that
substantially represented the international security requirements and
current best practices for maritime security. As stated previously, we
had been working on security-related issues and discussed or required
security measures on vessels and facilities since well before the
development of the ISPS Code or the MTSA. We took these requirements
and discussions further by proposing comprehensive measures for
security in our submission to the MSC76 IMO meeting in May 2002. These
proposals were developed with respect to security as a system, because
fundamental security must be universal--terrorists attack foreign and
domestic targets without bias. The flexibility to tailor security plans
and measures based on a security assessment is a key to ensuring that a
vessel, on either a domestic or non-domestic route, has operational
security sufficient to deter, to the maximum extent practical, a
transportation security incident. The fact that domestic transportation
links are as viable as international avenues for a terrorist attack
makes this systems approach even more important, i.e., foreign and
domestic vessels must have security measures in place on the same
timeframe, making it more difficult to transfer the threat of a
transportation security incident to a ``softer'' target. Finally, the
application of ISPS, part B, to all vessels ensures a consistency of
security measures implemented while in U.S. ports.

Specific Comments on the 40 Issues Listed in the Public Notice

    In the notice, we specifically requested response to 40 issues,
helping to shape the regulations published in all six interim rules. A
discussion of the responses to each of the issues raised in the notice
follows.
    1. Obligations of Contracting Government with Respect to Security.
The SOLAS amendments (Regulation 3) and ISPS Code (part A, section 4,
and part B, paragraph 4) lay out a series of requirements for
Contracting Governments and Administrations to mandate security levels
that are appropriate for their vessels and ports. In the notice, we
explained our intention to implement these requirements in coordination
with the Homeland Security Advisory System (HSAS) and asked for
comments on how to relay information to the maritime community on
changes in security levels, as well as methods to provide the public a
forum to report suspicious acts.
    Many commenters viewed as imperative that the threat and security
level information be provided quickly and by all means available,
including secure Web sites or e-mail. They also felt that the
information should be provided to all components of the maritime
community, including recreational boaters and shore-side personnel,
should be formalized, and should be provided proactively. In this
interim rule, the process for this communication is formalized through
the AMS Plan, which will include all forms of communication available
to the COTP in coordination with the private sector, State, local, and
Federal agencies. Therefore, a standard communication method will be
established across the nation, complemented with regional methods to
ensure wide dissemination of threat information and security
requirements.

[[Page 39254]]

As discussed in the Notice for Meeting, the Coast Pilot and Broadcast
Notice to mariners will remain key communication tools for vessels
underway or coming to the U.S. from foreign ports.
    Other commenters suggested that the MARSEC Level should be directly
linked to the HSAS at all levels. This contrasts with the comments of
many others who voiced a concern about changing levels due to the HSAS
system, based on threat information not specifically related to the
maritime community nor a specific region. Therefore, they suggested
adopting a separate security level mechanism or incorporating some
flexibility into the alignment of HSAS to the MARSEC Level. We stated
in our notice of meeting that we were considering a link with the HSAS
levels and were implementing the MARSEC Level system to ensure both
flexibility for the maritime community, as well as to align with the 3-
level international security level system. This remains our intent and
we have coordinated these alignments with DHS. The regulations lay out
further discussion of the MARSEC Levels and their alignment with HSAS
Threat Conditions (see Table 101.205).
    Some commenters stressed that coordination with other agencies was
needed, and that two-way communications was important to the security
of the waterfront and its operations, as is the ability to report
incidents that are out of the ordinary. Concern was also noted by some
that the communications procedures should directly inform the Facility
Security Officers, the Company Security Officers, and the Vessel
Security Officers while underway, in lay up, or after hours, since
toll-free numbers do not always work from overseas locations or are
sometimes reported as busy. We have included other means for
communication at the local and national levels in this interim rule to
provide alternative means for providing information on suspicious
activity. We are working to develop advanced information technologies
to interconnect agencies, organizations, vessels, and personnel. The
advanced information technologies will facilitate the rapid
transmission of critical safety and security information both
vertically and horizontally. Additionally, we expect to build a strong
communication process with Company Security Officers, Vessel Security
Officers, and Facility Security Officers at both the national and area
levels once these Officers are designated and the owner or operator
provides their contact information to us.
    2. Procedures for Authorizing a Recognized Security Organization
(RSO). The ISPS Code (part A, section 4, and part B, paragraph 4)
allows Contracting Governments to delegate certain security related
duties to a RSO. In order to ensure proper initial implementation of
the MTSA and SOLAS, particularly with the accelerated implementation
timelines, the Coast Guard discussed in the Notice of Meeting its
intent not to delegate authority to an RSO and requested comments on
RSO authorities, qualifications, and competencies (other than those
listed in the ISPS Code, part B, paragraph 4.5).
    Some comments indicated that class societies, while possibly
suitable for RSO delegation, should not be considered because of the
aggressive timeline to review assessments and plans. Similarly, others
indicated their strong support for the Coast Guard to retain all
approval authorities, citing that delegation would defeat the purpose
and intent of the MTSA. In contrast, some commenters disagreed, stating
that the Coast Guard did not have adequate resources. They requested
that the Coast Guard delegate its authority to an RSO, establish a
timeline for when we would begin consideration of RSOs, and provide
instructions on how RSOs should request consideration. We have retained
in this regulation the intent to keep the approval of assessments,
plans, and other security measures as a Coast Guard function. While it
is understandable that organizations within the maritime community
would seek to have their security expertise recognized, the Coast Guard
believes it is imperative to maritime and homeland security to ensure
consistent application of the requirements found in the interim rules
and will conduct the required reviews and approvals without delegation,
at this time. A timeline and further delegation discussions may be
provided, once a stable, nationwide foundation for maritime security
has been established.
    As for the adequacy of the list of RSO competencies provided in the
ISPS Code, part B, some commenters considered it an adequate list,
while others indicated that there should be additional qualifications,
such as a familiarity with national and local security plans. We
believe this list encompasses the essential qualifications and
competencies of organizations that wish to assist the maritime industry
in the development of their security assessments and plans. The comment
on knowledge of local security plans has merit and should be considered
in addition to the ISPS Code, part B, competencies by those hiring
security personnel.
    3. Consideration of Other Organizations Competent in Maritime
Security. In our Notice of Meeting, we discussed the potential need
within the maritime community for assistance with the development of
security assessments and plans from organizations advertising maritime
security competency. We asked for comments on whether we should
establish a standard for these organizations or companies and vet them
against a benchmark, such as the one in the ISPS Code, part B,
paragraph 4.5.
    Several commenters requested that we develop standards or at least
an outline of what they should expect from a company that professes
maritime security competency and many also stated that the ISPS Code,
part B, list was sufficient. Some commenters went further to suggest
that we put this standard into guidance rather than regulations or
leave it to the trade organizations to develop, because of concern over
rigid requirements favoring larger companies and, therefore, limiting
the flexibility of owners and operators. Many commenters did not
believe the Coast Guard needed to vet these maritime security
organizations, however, many suggested that examples of acceptable
plans would be helpful to smaller operators. In contrast, other
commenters stated that a list of organizations which meet industry or
trade organization standards should be provided, and some went further
to recommend the Coast Guard certify organizations, thus creating the
basis for a new industry. Finally, some commenters requested that we
develop and mandate industry standards for waterborne security and
armed guards.
    In these interim rules, we reference ISPS Code, part B, paragraph
4.5, as a list of competencies all owners and operators should use to
guide their decision on hiring a company to assist with meeting the
regulations. We may provide further guidance on competencies for
maritime security organizations, as necessary, but do not intend to
list organizations, provide standards within the regulations, or
certify organizations. We consider standards and requirements for
waterborne security and armed guards a subset of the above discussion.
While these security measures may be appropriate for some vessels or
facilities at a particular MARSEC Level, they are not necessary for all
situations. Thus,

[[Page 39255]]

we have indicated, in only the vessel and facility security interim
rules found elsewhere in today's Federal Register, that they are among
the additional measures that owners or operators may consider
implementing, specifically at heightened security levels, and COTPs may
impose, when deemed necessary to ensure maritime security in certain
situations. The standards for private armed security guards are a
matter of State and local law, as are the legal parameters for use of
force. There are also differing standards that apply to armed private
waterborne security in some States and local jurisdictions. Even though
the interim rules do not address standards for private security guards
in subchapter H, considering this a matter of State and local law and
private contract between the owners and operators of vessels and
facilities and the security company, we intend to work with State
homeland security representatives to encourage the review of all
standards related to armed personnel and the services that they provide
to the maritime community.
    4. Procedures for Accepting Alternatives and Equivalencies. The
Notice of Meeting discussed that the SOLAS amendments to Chapter XI-2,
Regulation 11 and 12 along with ISPS Code, part B, paragraphs 4.26 and
4.27, allow us to permit alternatives and equivalencies to the security
requirements for U.S. flag vessels if they are at least as effective as
the mandates and are reported to IMO. This provision is relevant to
those vessels operating on international voyages and certificated by
the U.S. The issue of industry standards was raised to cover domestic
requirements, and is separate from the alternative and equivalencies
provisions in SOLAS. The Coast Guard indicated its intent in the Notice
of Meeting to make alternative and equivalency determinations at the
national level and requested comment on the provisions of alternatives
and equivalencies, as well as the process to submit a proposal to us
for consideration (suggesting a process similar to 46 CFR 30.15 or
70.15).
    Many commenters suggested that alternatives and equivalency
determinations were needed to ensure compliance, yet allow for the
unique international operations within some regions or in specific
industries. Many commenters also supported the idea of a ``master
plan'' for their vessel fleet or facilities that would eliminate some
work and still effectively capture the security measures for the
individual vessels or facilities covered. Some also asked if an appeals
process would be included so a higher authority could reconsider
equivalency and alternative determinations. A few commenters requested
that this provision be delegated to the local level rather than be done
at Coast Guard Headquarters to account for unique regional operations.
Many commenters also stated that the submission process, as it exists
for safety (46 CFR 70.15) or subchapter W, is adequate as long as it is
timely.
    We have included the alternatives and equivalency provisions in
this interim rule to provide vessel and facility owners and operators
the flexibility to request them. However, they will only be approved if
they are determined to be equivalent to the security requirements in
subchapter H and 33 CFR parts 120 and 128, if applicable. The
provisions of submission and the appeal process are also included in
the regulations presented in this interim rule. Because the equivalency
and alternative determinations are obligations under SOLAS and the ISPS
Code, the Coast Guard is placing the decision to accept equivalents and
alternatives at the Commandant level, at this time. This will ensure
consistency and retain control over the U.S. flag administration
obligation. As always, State, local and regional expertise will be used
when reviewing alternatives and equivalencies, as appropriate for the
proposals.
    5. Procedures for Accepting Industry Standards. In addition to the
equivalencies and alternative provisions discussed above, we discussed
in the Notice of Meeting that, for those vessels that are currently not
required to meet SOLAS, industry standards could be accepted as an
equivalent or alternative. We sought comment on the concept of
accepting industry standards and asked whether an independent audit
could also be used in conjunction with this system. We also requested
comment on the intent to review these standards at the national level
and provide a submission process similar to that found at 46 CFR 50.20-
30.
    An overwhelming number of commenters strongly supported this
proposal and voiced endorsements for various industry standards, both
for vessels and facilities, which are either published and in use or
currently under development. Some commenters recommended that industry
standards for assessments already exist that could be determined
equivalent to the assessment requirements proposed in the Notice of
Meeting and should be considered. Many commenters indicated they intend
to submit their standards for approval and will also seek approval for
plans or assessments already conducted to meet State requirements.
Several commenters also stated that an independent audit should not be
required if the vessel is already inspected by the Coast Guard. Many
commenters also requested that the industry standards or alternatives
be approved at the local or regional level rather than at the
Commandant level. Additionally, some commenters expressed the desire to
have the industry standards reflect lower security measures
requirements that would not be equivalent to those discussed in the
Notice of Meeting.
    We have considered the acceptance of industry standards to be a key
element of implementing the requirements of the MTSA. The public
meeting response to our questions on this issue indicates that the
industry is willing to tailor security standards to their industries'
needs and work with us to implement them. The issue of equivalency is
fundamental to implementing an effective system of maritime security.
Therefore, equivalency is a requirement for the acceptance of industry
standards in the regulations presented in this interim rule. When a
security assessment is conducted on a vessel or facility operation, the
resultant security measures that can logically mitigate and meet the
security risks are tailored to the situation. Thus, an industry
standard for the small passenger industry will be different from the
industry standard for chemical ships, simply based on the difference in
their respective vulnerabilities and the associated consequence of a
transportation security incident. To accommodate this wide diversity of
industry standards and substantiate their equivalency to the
requirements in subchapter H, the review and approval of industry
standards will remain at the Commandant level. However, we intend to
coordinate review of industry proposals with the local and regional
levels, if appropriate. In addition, standards already developed to
meet State requirements or other industry concerns may be submitted for
an equivalency review and subsequently approved under the requirements
of this section, if found appropriate. In the requirements of this
interim rule, we have titled this industry standard concept,
``Alternative Security Programs,'' because it is a broader term that
implies a program or system that is more inclusive, i.e., an industry
association or a company could submit these requests for consideration.
    6. Declaration of Security (DoS). The ISPS Code (part A, section 5)
requires Contracting Governments to determine when a DoS is required
for vessels and facilities conducting vessel-to-port or

[[Page 39256]]

vessel-to-vessel activities. A DoS is a document that establishes an
agreement between a vessel and a facility, or between vessels, on their
security arrangements to ensure their coordination and communication is
clearly set out.
    In the notice of meeting, we requested comments addressing
recommendations for those operations or security levels when the DoS
would be appropriate to facilitate coordination of security measures
between a vessel and facility. As requested, we received comments
addressing our question. Comments supported the intent of the
requirements but expressed confusion at when it was needed. In
particular, ferry operators questioned if they would be required to
submit a DoS for every transit. Other commenters suggested that the DoS
only be required at higher MARSEC Levels (2 and 3) for specific
operations and are not appropriate for domestic vessels. Additionally,
commenters suggested that transfers that are brief or involve barges
should not have DoS requirements.
    We believe a DoS is a valuable security communication tool for
vessels, facilities and for COTPs. While a DoS is generally a MARSEC
Levels 2 or 3 tool, there are certain operations that benefit from
added coordination between the facility and the vessel. In the AMS
requirements found elsewhere in today's Federal Register, each AMS Plan
will be required to address DoS requirements for certain operations
within the ports, especially related to MARSEC Levels 2 and 3. In
addition, the AMS Plan will be required to include the procedures for
what actions to take when vessels are at a higher MARSEC Level than the
Port and request a DoS or other security measures in order to enter the
Port. A DoS will not be required for all vessels and all facilities in
all operations. In addition to the requirements found in the AMS Plan,
both the Vessel Security and the Facility Security interim rules found
elsewhere in today's Federal Register discuss when and for what
operations a DoS will be required. We have determined that some
operations always require a DoS and therefore vessels engaged in those
operations may need to complete a DoS on a regular basis, due to their
high-risk operations or locations. However, we believe a standing
procedure or agreement can be used to meet this requirement. The COTP
may determine, based on the localized repetitive nature of an
operation, that a standing agreement which lays out the information in
a DoS, can replace the daily use of the DoS.
    We also requested comments in our public notice on how long a DoS
should be kept on file (we suggested 2 years) and asked how the format
of a DoS should be promulgated (guidance or regulation). In addition,
the ISPS Code allows flag administrations to give guidance on when
their ships should request a DoS during a port call or when interacting
with other vessels. Many commenters suggested that a 2-year time frame
for record retention was much too long. Many commenters also noted that
they preferred guidance rather than regulation on the format for a DoS.
Based on comments we received and to further align with the ISPS Code
requirements, the Vessel Security requirements found elsewhere in
today's Federal Register include requirements to keep DoS's on file for
the vessel's last 10 port calls. The Facility Security requirements
found elsewhere in today's Federal Register include requirements to
keep DoS's on file for at least 90 days. As for DoS format, the interim
rules mentioned above specify required elements for a DoS to ensure
facility and vessel forms are acceptable for COTP reviews. For U.S.
flag vessels, we intend to provide guidance to Company Security
Officers on when to request a DoS based on vessel operations and world
threat conditions.
    7. Security of Information Contained in Port, Vessel and Facility
Security Assessments and Plans. The ISPS Code, part A, sections 9 and
16, and the MTSA (46 U.S.C. section 70101(d)) require documents related
to security, especially security assessments and plans, to be kept in a
manner that is protected from unauthorized access or disclosure. In our
notice of meeting, we asked for comments on whether a classification
for sensitive security material would be useful in the implementation
of National Maritime Security initiatives.
    The majority of commenters supported a designation for all
security-related materials to ensure this information is not available
to the general public and some requested a higher security designation
such as what the Defense Department is using. Some other commenters did
not want a security-related designation because they wished to ensure
the Freedom of Information Act remained primary to all information.
Other commenters suggested that individuals should have clearances to
see this material or that the Coast Guard be the only agency allowed to
review the material. In contrast, some State and local government
representatives stated their wish to have access to the material and
wanted us to include provisions for this access. Additionally, some
commenters stated that a federal preemption clause was needed for this
designation to ensure that if material was protected from disclosure at
the federal level, a loophole at the State or regional level did not
compromise its security.
    Security-related information has traditionally not been in the
public forum since it inherently puts at risk the very system that is
being protected. Understanding the imperative need to safeguard
maritime security material to ensure its dissemination does not make
the vessel, facility, or port vulnerable to a transportation security
incident, we have included provisions in this interim rule noting this
type of material is to be designated as SSI in accordance with 49 CFR
part 1520. Information designated as SSI is generally exempt under
FOIA, and we believe that State disclosure laws that conflict with 49
CFR part 1520 are preempted by that regulation.
    We did not believe that a security designation above SSI was needed
for this material however, we did include provisions in this interim
rule for a COTP to designate a higher level of security if there are
provisions in the AMS Plan that indicate a higher level is appropriate.
Access to the AMS Plan will be limited to those on the Area Maritime
Security (AMS) Committee that have agreed to protect the material in a
manner appropriate to its security sensitivity and have a need to know
the material. Guidance on SSI and its use will be issued to assist AMS
Committee members, consistent with 49 CFR part 1520. For material that
is designated at a level higher than SSI, the COTP will screen AMS
Committee members for appropriate clearances and take precautions
appropriate to the material's sensitivity. Individuals and Federal
agencies outside those with transportation oversight authority will not
be allowed to view plans or assessments of vessels and facilities
unless circumstances provide a need to view it. As stated in the Vessel
Security interim rule found elsewhere in today's Federal Register,
certain portions of each vessel security plan and assessment must be
made accessible to authorities; however, those portions not required to
be disclosed are protected with the SSI designation and need-to-know
criteria. Owners and operators of vessels and facilities may also
request a determination of a higher designation than SSI for their
plans. The Commandant or the COTP, whoever is responsible for reviewing
the security plan, will retain the designation authority. In all cases,
the material, if retained by a Federal agency, must be

[[Page 39257]]

safeguarded to the appropriate designation.

Port Security Provisions

    8. Port Security Plans and Committees. The requirements for port
plans stem from the development of the new SOLAS amendments and the
ISPS Code as well as the MTSA (46 U.S.C. sections 70103, 70104 and
70112). The definition of port facilities is broad and covers all
aspects of the interface between a ship and a facility, including
anchorages and other areas typically considered by the U.S. as public
waterways, as well as other structures located under, in, on, or
adjacent to U.S. navigable waters. Thus, in the public meeting notice,
we discussed our intention to invoke the alternative provided in ISPS
Code, part A, section 16.4, and combine facility plans with a port plan
to encompass all waters subject to the jurisdiction of the U.S. The
majority of the SOLAS amendments and ISPS Code requirements would be
applied to U.S. facilities to ensure a seamless ship-to-facility
security interface. However, the port security requirements will be the
overarching instrument for implementing security communications and
ensuring compliance. These port requirements will be developed through
a port area plan (AMS Plan) and the port security committee (AMS
Committee). In our notice, we asked for comments on who should be on
the port committee and how we could ensure participation.
    The comments we received on the committee's membership included a
very broad range of suggestions. Some commenters suggested that only
law enforcement entities and relevant government agencies participate.
In contrast, many commenters requested that the committee's membership
be truly inclusive--representing the smallest of recreational boater,
to the largest facility; all types of shore-side service providers,
labor representatives, and the myriad government agencies on all
levels. Many comments stated the COTP should head the committee and a
few comments stated that the COTP and the Port Authority should co-
chair the committee.
    Commenters suggested that COTPs could ensure participation in the
committees by widely disseminating notices about committee meetings,
have general public meetings, and hold working meetings to develop
security plans. Some commenters recommended a small executive decision-
making group with a large inclusive group for input. Some commenters
felt there should be Port Security Committees in coastal ports only and
voluntary participation with public meetings. Others added that Port
Security Committees should be limited to port users and those with
security expertise.
    Because the AMS Plan is pivotal to the U.S. implementation of the
international security requirements and is also key to our MTSA
mandates, we have included provisions prescribing the development of
AMS Plans, committees, and other port-level security measures in the
``Area Maritime Security'' (USCG-2003-14733) interim rule found
elsewhere in today's Federal Register. This part establishes the AMS
Committee, under the direction of the COTP, and indicates that
membership to the committee is meant for those with certain skills,
port operational knowledge, and should represent all aspects of the
maritime community.
    9. Port Security Assessments Requirement. In our notice, we also
discussed Port Security Assessments (PSAs), as discussed in ISPS Code
(part A, section 15, and part B paragraphs 15.1 through 15.16) as well
as the MTSA (46 U.S.C. section 70102). Many assessments of this type
have already been performed in ports and should be a good foundation
for this requirement. Since the assessment will be integral in the
development of the AMS Plan, we requested comments on if the committees
would be able to provide the experience and expertise needed to do a
security assessment and if assessments had already been conducted.
    Several commenters stated that they felt that, with the assistance
of the local Coast Guard, there would be adequate expertise within the
port area to conduct a port wide assessment. In contrast a few
commenters stated that the Coast Guard or a third party should conduct
the assessments because the knowledge level within the port is not
sufficient. Other commenters stated they did not think certain ports
even needed to do an assessment because of the port's location. Several
commenters also noted that the Coast Guard, both nationally and
locally, has already conducted port security assessments.
    Our COTPs have been working with Port Security Committees and
Harbor Safety Committees successfully for some time. From this positive
and participatory interaction, we strongly believe that the knowledge
and expertise to successfully accomplish an AMS assessment currently
resides in each port, notably within the membership of the current Port
Security Committee. We believe that every port needs to conduct a port
security assessment regardless of its location. It is important to
remember that the current regulations and the international code are
intended to strengthen marine elements of the national transportation
system as well as lay out a baseline for each section of the system to
attain. It is not our intent for ports that have already undertaken
security assessments to have to reinvent the wheel, rather we encourage
AMS Committees to take any assessment that has previously been
conducted and use it as a reference document.
    10. Port Security Control of Vessels, Facilities, and Operations.
The requirements for control of vessels are outlined in the SOLAS
amendments, Regulation XI-2/9, and the ISPS Code, part B, paragraphs
4.29 through 4.46. In the notice, we discussed our intention to
implement control measures as detailed in the SOLAS amendments and ISPS
Code requirements. However, these measures are not exhaustive and,
where appropriate, COTPs will exercise authority under 50 U.S.C. 191,
as implemented at 33 CFR part 6, 33 U.S.C. 1226, 33 CFR parts 160 and
165, and other measures consistent with international law, to ensure
maritime security. In addition, we outlined our intent to ask the Port
Security Committee (AMS Committee) to review areas within the port,
such as fleeting areas, regulated navigation areas, anchorages, and
areas near facilities, to assess whether these areas should have
security zones or patrol requirements established at certain security
levels. We asked for comments on the concept of a set of security zones
or requirements set out in this pre-designated fashion with a specific
procedure for triggering its implementation through a broadcast notice
to mariners or security level communication to the maritime community.
We asked if such a pre-designation would assist mariners and if other
possible control measures would be recommended.
    Many commenters supported the concept of a pre-designated system of
waterway and facility restrictions and stated it would be advantageous
for planning and preparation. They continued by suggesting that at
times of heightened security, we should use existing maritime
communications procedures as well as any other means to ensure vessels
are advised to hold, or move to designated anchorage outside of port.
Other commenters wanted to ensure that the barge and towing industry
was consulted on any decisions to restrict the waterway. Some
commenters stressed that communication methods of these pre-
designations should include the entire maritime community such as
recreational boaters and shore-side

[[Page 39258]]

interests. A few commenters also suggested that other control measures
would include setting barriers and booms to deter seaward access.
    As stated previously, the AMS Plan and the supporting committee is
an integral part of the port security initiative. Measures that
mitigate security risks to the port for each security level will be a
main element of the AMS Plan as discussed in the ``Area Maritime
Security'' (USCG-2003-14733) interim rule found elsewhere in today's
Federal Register. We have outlined in these requirements a broad range
of communication methods intended to include all sections of the port
community and requirements for the AMS Committee to evaluate all
options available to restrict or control activities in each port at
each MARSEC Level. However, the COTP may independently exercise his or
her broad statutory and regulatory authority to implement any measures
deemed necessary to ensure maritime security.
    11. Port Security Training and Exercises. In the notice, we
explained that ISPS Code (part A, section 18 and part B, paragraphs
18.1 through 18.6) detail training, drills, and exercise requirements
for port facilities. We requested comments on whether the maritime
community would participate in port-level security exercises and what
type of exercise is most desirable. We also asked for comments on
existing port security training programs. Most commenters stated that
while they would participate in port-level security exercises, a 12 to
18 months frequency was preferred. They also suggested that the COTP
should vary drill schedules to reflect local conditions/threats.
Commenters also suggested that only small portions of the Security Plan
be exercised at a time and recommended that communications be tested
more frequently than other sections of the plan. Some commenters
stressed that combining security exercises with port pollution/disaster
exercise is preferable, and that tabletop exercises or seminars should
be considered in lieu of a full exercise. A few commenters stated that
industry already trains security personnel and others commented that
there should be no requirements for training. Other commenters
recommended self-certified security training at the port-level and some
believed Coast Guard auxiliaries need security training.
    We believe that exercises and training are imperative to keeping
security measures and plan requirements current. To ensure that the
entire port community participates, we want to establish exercise
programs that are inclusive and training that is exportable. In the
``Area Maritime Security'' (USCG-2003-14733) interim rule found
elsewhere in today's Federal Register, requirements for exercises and
drills are included. To add flexibility, provisions have been made to
credit tabletop exercises as well as full deployment exercises. We
anticipate that security will be a part of all port-level exercises
such as pollution response or rescue drills. In addition, due to the
nature of most ports, high-profile public events such as marine parades
or festivals will likely mean an actual exercise of the ATMS plan that
meets the intent of the exercise requirements. While these high-profile
public events would require a marine event permit, we will not require
that marine event permits be obtained for port-level training
exercises. Training requirements for port personnel have not been
included in the interim rule. It should be noted however, that the
MARAD is developing education and training guidelines for maritime
security professionals, some of which are intended for port security
personnel. We intend to evaluate these guidelines when developed, and
determine at that time whether further requirements are needed to
ensure the competency of security personnel at the port-level.

Vessel Security Provisions

    12. Incorporation by Reference. In the notice of public meeting, we
discussed the concept of accepting national, State, and industry
security standards to meet certain security requirement(s), such as a
vessel security plan that incorporates the use of motion detection
equipment that meets an accepted national standard. We requested that
commenters share known national, State, or industry standards that
could be used as an equivalent to our requirements in the marine
environment and we asked them if they would use such standards, if
available.
    Many commenters supported our concept noting the flexibility of
using existing standards, such as the ones prepared by the intrusion
detection and surveillance industries. A few commenters stated that
while they supported using existing standards, they were concerned
about conflicts and incompatibility between current security equipment
and equipment used for shipboard operations, while several others
approved of the flexibility of using equivalent standards and stated
that as long as we approved the use of the standard they would submit
it as an equivalent standard to the requirements. Other commenters
stated that they were against the use of industry standards and feared
the Coast Guard would micro-manage vessel security operations.
    Traditionally we incorporate by reference equipment standards we
feel are appropriate to use in the maritime environment to enable
vessel and facility owners and operators the flexibility to use
standards they are familiar with as well as ones that are appropriate
to meet the requirements. In the maritime security regulations for
subchapter H found in today's Federal Register, there are no national,
State, or industry equipment standards incorporated by reference
because specific standards were not identified. However, a section in
this interim rule (part 101) has been reserved for listing equipment
standards for incorporation, if found appropriate in the future.
    13. Obligations of the Company. In the public notice we discussed
the concepts in SOLAS amendments (Regulation 4 and 5) and the ISPS Code
(part A, section 6, and part B, paragraphs 6.1 through 6.8) that
obligate the company for certain requirements. We requested comments on
these obligations and whether they were sufficient to address maritime
security. We also asked for comments on how to treat the special
relationship between towing companies and barges.
    Many commenters felt that this provision would clarify the
companies' responsibility to the vessel and address any potential
manning issues, while a few comments stated that the requirements for a
company were ``excessive'' or that the ISPS Code did not address the
requirements needed. Many comments stated that an independent audit of
the Vessel Security Plan would be valuable in determining if the
company's obligations and responsibilities were addressed and properly
implemented.
    In regards to the relationship between tows and barges, a large
number of comments stated that the towing vessel should be responsible
for the security of the barge while it is under their control. Several
other comments recommended that security at fleeting areas be
regulated.
    We support holding the company to security-related obligations that
will ensure companies and the vessels communicate on issues related to
security, and help to ensure that any problems are resolved in an
efficient manner. We believe proper implementation cannot work without
the company and the vessel fulfilling their obligations as stated in
the ISPS code. The company is essential to ensuring that the right
people with the right skills are in the Company Security

[[Page 39259]]

Officer, and Vessel Security Officer positions. A company will not need
to establish new internal guidance to satisfy the requirements if it
already has guidance in another document that meets the requirements of
the ISPS Code.
    We reviewed the concept of an independent audit and have addressed
it in the Vessel Security interim rule found in today's Federal
Register. The unique relationship between a towing vessel and its tow
has been considered and requirements for both are included in the
vessel security requirements found elsewhere in today's Federal
Register. Fleeting areas are also addressed in the Facility Security
interim rule found in today's Federal Register.
    14. Vessel Security Requirements. In the public notice we discussed
that the SOLAS amendments (Regulation 4) and the ISPS Code, part A,
section 7, require vessels act upon security levels set by Contracting
Governments through appropriate protective measures by carrying out
certain specified activities (ISPS Code, part A, section 7.2). We also
asked whether the security measures should apply to other vessels that
were not listed in the notice and whether these activities and
protective measures adequately address the security of a vessel.
    A very large number of commenters addressed the issue of which
vessels the regulations should be applicable to. This issue has been
discussed in the General Information section above, under the
subheading Applicability of National Maritime Security Initiatives.
    Several commenters noted possible alternative measures to be used
in meeting the requirements, which are not specifically listed in the
ISPS Code. The requirements in this general interim rule give
provisions for both vessels and facilities to use Alternative Security
Programs to meet the requirements. We will continue to provide feedback
to industry, via Internet Web page and public notice, on all
Alternative Security Programs that are approved by the Coast Guard (G-
MP) as alternatives.
    15. Vessel Security Assessments (VSA) Requirement. In the notice we
discussed the requirements for a Vessel Security Assessment contained
in the ISPS Code and the MTSA. We also discussed our desire to have a
Vessel Security Assessment for each vessel that has to develop a
security plan. In the notice of public meeting we asked for
recommendations on how to conduct a Vessel Security Assessment for a
vessel on a domestic voyage, and whether we should consider any
existing alternatives to a Vessel Security Assessment.
    Commenters recommended that we allow industry produced assessment
tools, or require all assessments to be conducted by an objective third
party, while others requested that we develop a template to be used in
a self-assessment process. A few commenters claimed that a security
assessment had already been done by the Coast Guard and requested that
it be used in place of the required Vessel Security Assessment to avoid
duplication of effort.
    We strongly support the use of third-party assessments and audits
to ensure quality as well as consistency. However, we are not including
this provision as a mandatory requirement in the Vessel Security
interim rule found elsewhere in today's Federal Register because the
assessment is one part of the vessel security plan that we will be
closely reviewing prior to the plan approval. We are assisting in the
development of several assessment tools and templates. We recommend
that vessel owners and operators seek tools from appropriate industry
sectors that support or represent them to aid in completing the
security assessments. To reduce the duplication of effort, we also
strongly encourage vessel owners and operators to use any information
that was previously collected during a security assessment as reference
material for completion of the applicable areas of the new assessment.
    16. Vessel Security Plan Requirement. In the public notice we
discussed the development of a Vessel Security Plan that takes into
consideration a Vessel Security Assessment, and makes provisions for
actions at each of the three MARSEC Levels. In the notice we referenced
the vessel security plan requirements in the ISPS Code and asked for
suggestions about additional items or best practices to be addressed by
the Vessel Security Plan. We also inquired whether an outline would aid
you in developing a vessel security plan.
    We did not receive comments suggesting additional items be
addressed in the Vessel Security Plan, but we did receive multiple
industry and organization submissions of their standards for
consideration as a vessel security plan best practice. Many commenters
stated that allowing an existing industry standard to be used would
greatly streamline the review process. A number of others asked if we
could provide a ``model plan'' for them to use. Many commenters also
requested the acceptance of fleet-wide plans. Several owners also asked
if a vessel and a facility, which have an exclusive docking arrangement
(one in which no other vessels dock at the facility and the vessel only
docks at the facility pier), could submit a uniform vessel/facility
security plan.
    The strong response and industry standards submitted as examples of
best practices lead us to believe that the maritime industry is
implementing security measures in many sectors. Many of these industry
standards did have ``model plans'' incorporated into them as a
development aid. As discussed previously, we will allow organizations
to submit their security programs for consideration as an alternative
to the requirements in the vessel security interim rule found elsewhere
in today's Federal Register. The concept of accepting fleet-wide plans
or plans that discuss exclusive docking arrangements or a single plan
to cover both a terminal and a vessel, could also be considered
Alternative Security Programs and be accepted if they meet the
specified requirements.
    17. Submission of Vessel Security Plans for Approval. The public
notice discussed the need for a vessel to carry on board an approved
Vessel Security Plan. In the notice of meeting, we requested
suggestions on how vessel security plan approvals could be streamlined.
We also asked if the format we proposed was appropriate or if an
alternative process existed that we should consider.
    Several commenters questioned the consistency of Vessel Security
Plans approved by varying COTPs and asked what safeguards would be in
place to ensure consistent enforcement for vessels that operate across
COTP boundaries. In contrast, many other commenters felt the approval
at the local COTP level would ease the process and allow for someone
familiar with the vessel's operations to review the Vessel Security
Plan. Finally, some commenters were also curious about the procedure
for reviewing foreign vessel security plans.
    To ensure a consistent approval process, we have decided that the
Marine Safety Center (MSC) will review and approve all vessel security
plans. This requirement is included in the Vessel Security interim
rule, found in today's Federal Register. For those Vessel Security
Plans with specific local or regional considerations, we will ensure
that the local COTP or District personnel will be able to interject any
industry or geographic specific information into the approval process.
    It is not our intent to individually approve vessel security plans
for foreign SOLAS vessels coming to the U.S. Consistent with our
international

[[Page 39260]]

obligations under SOLAS and the ISPS Code, we will deem flag
administration approval of a ship security plan to constitute approval
under 46 U.S.C. 70103, provided the ship security plan complies with
SOLAS and ISPS Code, part A, having fully applied the relevant
provisions of ISPS Code, part B. Compliance by foreign SOLAS vessels
will be addressed under the Port State Control program, with plans
being reviewed by the vessel's flag administration as required by SOLAS
and the ISPS Code.
    However, in certain cases, foreign vessel operators may be required
to submit the vessel security plan to the U.S. for approval, as
required in the Vessel Security interim rule found elsewhere in today's
Federal Register. These foreign vessels are an exception because they
fall outside of the tonnage or route thresholds for SOLAS obligations,
yet trade with us and, for security consistency, should meet the same
security requirements as those vessels covered under domestic law.
    18. Existing Security Measures for Certain Vessels. As mentioned in
the notice of meeting, we are evaluating the need for retaining
existing security requirements that are contained in 33 CFR part 120,
for certain vessels (e.g., large passenger vessels) that could be
involved in a transportation security incident. More specifically, the
notice asked whether additional security requirements are needed for
certain vessel types.
    Many commenters noted that the standards of the ISPS Code provided
more than adequate security measures and could be considered equivalent
to the existing 33 CFR part 120 requirements.
    Because we are still evaluating the equivalency of 33 CFR 120 to
the requirements in the Vessel Security interim rule found elsewhere in
today's Federal Register, we do not intend to revise 33 CFR part 120 at
this time. However, in the future, this part may be revised or entirely
deleted. This will consolidate the security requirements for all
vessels in subchapter H.
    19. Vessel Security Recordkeeping. In the notice of meeting, we
requested suggestions or best practices related to recordkeeping. We
also asked whether we should prescribe a format for these records.
    Numerous commenters asked that industry standards be accepted for
recordkeeping and that companies and vessels be allowed to decide where
to keep records. Several commenters questioned the need to keep records
for two years, while others stated that there was no need to keep
records. Several commenters asked that a format not be specified but
that the Coast Guard provide clear guidance on what type of information
should be kept.
    We believe that industries have developed suitable internal
guidance for keeping records. These records are essential to ensuring
compliance and for this reason we are requiring security records be
maintained for 2 years. Specific guidance on what type of information
must be kept is included in the Vessel Security interim rule found in
today's Federal Register, with flexibility to choose their format and
where the records are kept.
    20. Company Security Officer Designation. In the notice of public
meeting, we asked whether Company Security Officers should be required
to attend training and if company certification is appropriate to
verify the Company Security Officer's qualifications. We also
acknowledged that many companies already have training programs in
place.
    Several commenters stated that it was reasonable for the company to
train and certificate the Company Security Officer, while other
commenters believed it was a conflict of interest. Others commented on
whether records should even be kept; some stated that no records should
be kept and some recommended that the records should be kept for a
period of 1 to 3 years.
    We recognize there are no approved courses for the Company Security
Officer at this time. In the absence of approved formal training, we
intend to allow companies to certify that personnel holding the Company
Security Officer position have received appropriate training or possess
the job experience required to fulfill their Company Security Officer
duties, based on the requirements in the Vessel Security interim rule
found in today's Federal Register.
    We believe that the Company Security Officer's participation in
exercises is critical to improving security. In order to ensure the
Company Security Officer has participated in appropriate port-level
exercises, we are requiring records, including a list of participants,
to be kept for 2 years.
    In addition to the questions we asked in the notice of meeting, we
received several comments outside of those questions regarding the
Company Security Officer. Several commenters expressed confusion about
the requirements for a Company Security Officer. To clarify, a company
with a large fleet may decide to group its vessels and assign a Company
Security Officer to each group. This company would then have several
Company Security Officers, one Company Security Officer per vessel
group. While the Company Security Officers are responsible for the
security of the vessels in their group, they may not act as Vessel
Security Officer, except as exempted by the requirements in Vessel
Security interim rule found in today's Federal Register.
    21. Vessel Security Officer Designation. In the notice of public
meeting, we asked whether Vessel Security Officers should be required
to attend training and if company certification is appropriate to
verify the Vessel Security Officer's qualifications. We also
acknowledged that many companies already have training programs in
place.
    Numerous commenters supported allowing company certification and
felt formalized training was a good system to certificate personnel. A
small group of commenters saw no need for any formalized training or
company certification. We did not receive any comments to our request
for suggestions for certain classes of vessels being allowed an
alternative to a Vessel Security Officer.
    We recognize that Vessel Security Officer security training is not
currently formalized, however, it would be beneficial as previously
discussed in the Discussion of Comments to Maritime Security Public
Meetings section of this preamble. In the absence of approved formal
training, we intend to allow companies to certify that personnel
holding the Vessel Security Officer position have received appropriate
training or possess the job experience required to fulfill their Vessel
Security Officer duties, based on the requirements in the Vessel
Security interim rule found in today's Federal Register. Although we
did not receive any suggestions on alternatives to a Vessel Security
Officer, provisions within the Vessel Security requirements found
elsewhere in today's Federal Register, do not preclude a Company
Security Officer from also acting as a Vessel Security Officer.
    22. Security Training and Drill Requirements for Vessel Personnel.
In the notice of public meeting we requested comments on whether we
should require vessel security personnel to attend formal training. We
discussed the concept of allowing the company, and its Company Security
Officer, Vessel Security Officer, Facility Security Officer, or Vessel
Master to certificate security officers and train the vessel personnel
in accordance with the requirements. We also asked if prescribing the
format for training records would assist the companies.

[[Page 39261]]

    Several commenters agreed that the company and its Company Security
Officer, Vessel Security Officer, Facility Security Officer or Vessel
Master should certificate security officers and train the vessel
personnel, while a few commenters saw no need for formalized training.
A few commenters also stated that the drill and exercise requirements
were excessive. Several commenters recommended we provide specific
requirements on the type of information that should be recorded, but
not require a specific format for record keeping.
    As previously stated, there are no approved courses for vessel
personnel. In the absence of approved formal training, we intend to
allow companies, Vessel Masters, Vessel Security Officers, Facility
Security Officers, or Company Security Officers to certify that
personnel holding a security position have received the training
required to fulfill their security duties.
    When training is developed, we will reassess the training and
certification requirements in the Vessel Security interim rule found in
today's Federal Register. We will then propose alternatives or
additional requirements in a separate rulemaking, as appropriate.
    We have included the specific requirements in the Vessel Security
interim rule, found in today's Federal Register, on what type of
information must be kept, with the vessel owner or operator deciding
what format and where the records will be kept.
    We believe it is imperative that exercises and drills be conducted
to ensure the plans are current and that the personnel are familiar
with their responsibilities. Therefore, we have included exercise and
drill requirements in the Vessel Security interim rule found in today's
Federal Register. Security drills and exercises can be incorporated
into existing response exercises and drills and we believe that by
combining exercises, when possible, the exercises and drilling
requirements can be made more efficient.
    23. Certification for Vessels. In the notice of public meeting we
discussed the certification requirements for an ISSC and requested
suggestions for how best to verify and certificate compliance.
    Many commenters suggested that amending a vessel's Certificate of
Inspection or a letter stating compliance with security requirements
would be adequate. Other commenters recommended allowing third-party
certification rather than Coast Guard certification.
    We believe certification and verification can be accomplished
during a regular Coast Guard Inspection and the vessel's certificate
can adequately reflect compliance. In addition, for those uninspected
vessels requiring security measures, other provisions for documentation
are provided in the Vessel Security interim rule, found elsewhere in
today's Federal Register. We have not included provisions for third-
party certification, however we have included provisions for
Alternative Security Programs that could streamline the certification
process.

Facility Security Provisions

    24. Incorporation by Reference. In the notice of public meeting, we
stated we were considering accepting national, State, and industry
security standards to meet certain security requirement(s), such as a
facility security plan that incorporates lighting or fencing equipment
that meet an accepted national standard. We requested that commenters
share known national, State, or industry standards that could be used
as an equivalent to our requirements in the marine environment and we
asked them if they would use such standards, if available.
    Many commenters supported our position of including a provision for
accepting national, State, and industry security standards as an
equivalent to meet certain security requirements. Several commenters
confirmed that those within the security industry, such as the fence
and lighting industries, should be allowed to continue providing their
own security standards and that in general, companies would meet marine
industry-wide standards once the Coast Guard approved them. Finally,
many commenters expressed concern that if the Coast Guard prescribed
measures to be used as industry standards that the measures would be in
excess of what is needed.
    Traditionally, we incorporate by reference equipment standards we
feel are appropriate to use in the maritime environment to enable
vessel and facility owners and operators the flexibility to use
standards they are familiar with as well as ones that are appropriate
to meet the requirements. In the maritime security regulations for
subchapter H found in today's Federal Register, there is no national,
State, or industry equipment standards incorporated by reference
because specific standards were not identified. However, a section in
this interim rule (part 101) has been reserved for listing equipment
standards for incorporation, if found appropriate in the future.
    25. Facility Security Requirement. In the public notice, we
discussed that the SOLAS amendments (chapter XI-2, regulation 10) and
the Code (part A and part B, section 14) require facilities to act upon
security levels set by Contracting Governments through appropriate
protective measures by carrying out certain specified activities (ISPS
Code, part A, section 14.2). We also asked whether the security
measures should apply to other facilities that were not listed in the
notice and whether current activities and protective measures
adequately address the security of a facility.
    A large number of commenters addressed the issue of which
facilities the regulations should be applicable to. This issue has been
discussed in the Applicability of National Maritime Security
Initiatives section above.
    We did not receive any comments specifically addressing the request
for suggestions on additional requirements that could be used.
    Several commenters stated that barge fleeting areas should be
covered under the new requirements. To address fleeting areas and the
security of the barges that use them we have included fleeting areas in
the Facility Security interim rule found in today's Federal Register.
    26. Facility Security Assessments Requirement. In the notice, we
discussed the requirements for a facility security assessment contained
in the ISPS code and the MTSA. We also discussed our desire to have a
facility security assessment for each facility that has to develop a
facility security plan. In addition, we asked if there were any
recommendations on how to conduct a facility security assessment and if
any appropriate alternatives to a facility security assessment already
existed that we should consider.
    Several commenters stated that they have used NVIC 11-02 titled,
``Security Guidelines for Facilities'' or similar approaches in
developing a company assessment plan and found them easy to follow.
Other commenters offered alternatives, such as a Coast Guard facility
inspection or a Navy facility security assessment.
    We have included requirements for facility assessments in the
Facility Security interim rule found elsewhere in today's Federal
Register. In addition we have been assisting in the development of
several industry and Federal assessment tools and templates. We are
aware that other agencies of DHS (e.g., TSA) are developing a self-
assessment tool. We understand that they intend to mandate use of this
tool in the future. We recommend that facility owners and operators
seek tools from appropriate industry sectors that support or represent
them to aid in completing the security assessments. To

[[Page 39262]]

reduce the duplication of effort, we also strongly encourage facility
owners and operators to use any information that was previously
collected during a security assessment as reference material for
completion of the applicable areas within the new assessment. There are
also provisions in this interim rule for the use of alternative
assessment tools however; tools such as the Department of Defense
assessment have not been specified because we have focused on the
specific needs required for transportation-related assessments.
    27. Facility Security Plans Requirements. In the public notice, we
discussed the ISPS Code (part A and part B, section 16) as well as the
MTSA (46 U.S.C. sections 70103 and 70104) that takes into consideration
a facility security assessment, and makes provisions for actions at
each of the three MARSEC Levels. We also asked for suggestions about
additional items or best practices to be addressed within the facility
security plan requirements.
    We did not receive any comments specifically addressing additional
items that the facility security plan should cover, however, many
commenters did state that an outline would be a useful tool for
development. Several of these commenters went on to say that a ``model
plan'' would prove to be a better guide because it would clearly show
our expectations of a plan. Several commenters noted that there are
companies that own many facilities and vessels, and asked if one
combined security plan could be submitted to avoid redundancies in
submissions.
    The strong response and industry standards submitted as examples of
best practices lead us to believe that the maritime community is
implementing security measures in many sectors. Many of these industry
standards did have ``model plans'' incorporated into them as a
development aid. As discussed previously, we will allow organizations
to submit their security programs for consideration as an alternative
to the requirements in Facility Security interim rule found elsewhere
in today's Federal Register. The concept of accepting fleet-wide plans
or plans that discuss exclusive docking arrangements, or a single plan
to cover both a terminal and a vessel, could also be considered
Alternative Security Programs and be accepted if they meet the
specified requirements.
    28. Submission of Facility Security Plans for Approval. In the
public notice we discussed the ISPS Code, part A, section 16, requiring
facilities to develop and maintain a facility security plan that is
approved by the Contracting Government in whose territory the facility
is located. We asked for suggestions on how facility security plan
approvals could be streamlined. We also asked if the format we proposed
was appropriate or if an alternative process existed that we should
consider.
    There was large support for the local COTP to approve facility
security plans. Some commenters asked how the Coast Guard would ensure
consistency across COTP zones. Several commenters approved of the
format Coast Guard presented, but did not want a mandated format.
    As stated in the notice of meeting, we intend for the COTP to
approve facility security plans and we will also work to ensure there
is consistency between COTP zones. The Facility Security interim rule
found elsewhere in today's Federal Register contains an outline to be
followed when constructing a facility security plan. This outline
format provides facilities with leeway during the development process
of their facility security plan. Contracting Governments to SOLAS will
approve the security plans for port facilities within their territory.
These Contracting Governments are also responsible for notifying the
IMO regarding which port facilities within their territory have
approved security plans. As discussed previously, a vessel calling on a
foreign port facility that does not comply with SOLAS and the ISPS Code
or at a port that does not maintain effective anti-terrorism measures,
will be subject to scrutiny under our Port State Control Program to
ensure that the security intended to be achieved by this subchapter
will not be compromised.
    29. Facility Security Recordkeeping. In the notice of meeting, we
requested suggestions or best practices related to recordkeeping. We
also asked whether we should prescribe a format for these records.
    Many commenters supported our position on keeping records for 2
years, while others questioned it and some opposed the concept of
maintaining these records at all. Numerous commenters asked that
industry standards be accepted or that companies and facilities be
allowed to decide where to keep records. Several commenters requested
specific guidance on the type of information that should be kept, but
did want the format not be specified. Some commenters proposed that
third parties be required for record keeping.
    We believe that industries have developed suitable internal
guidance for keeping records. These records essential to ensuring
compliance and for this reason we are requiring security records be
maintained for 2 years. Specific guidance on what type of information
must be kept is included in the Facility Security interim rule found in
today's Federal Register, with flexibility to choose their format and
where the records are kept. Finally, we feel requiring a third party to
keep all records would cause undue burden to the facilities.
    30. Facility Security Officer. In the notice of public meeting, we
asked whether Facility Security Officers should be required to attend
training and if company certification is appropriate to verify the
Facility Security Officer's qualifications. We acknowledged that many
companies already have training programs in place. We also asked if
Facility Security Officers might be performing their duties for more
than one facility.
    The majority of the commenters stated that companies should be
allowed to verify qualifications and certificate Facility Security
Officers. A few commenters felt it was a conflict of interest for the
company to certificate a Facility Security Officer as meeting the
knowledge level. We also received many comments about required formal
training; some of the comments were in favor and some felt it was not
necessary. Several commenters submitted examples of cases where the
Facility Security Officer could be responsible for more than one
facility. Finally, many commenters stated that the record keeping
requirements were reasonable and could be easily instituted, while
others stated this task would be too time consuming.
    We recognize that Facility Security Officer security training is
not currently formalized, however, it would be beneficial as previously
discussed in the Discussion of Comments to Maritime Security Public
Meetings section of this preamble. In the absence of approved formal
training, we intend to allow companies to certify that personnel
holding the Facility Security Officer position have received
appropriate training or possess the job experience required to fulfill
their Facility Security Officer duties, based on the requirements in
the Facility Security interim rule found in today's Federal Register.
We do not see this authority as a conflict of interest.
    We agree that a Facility Security Officer could oversee the
security operations at more than one facility, where facility security
plans are very similar because of similar operations and in close
proximity of each other. This decision will be left to the local COTP
when plans are being approved.

[[Page 39263]]

    31. Security Training, Drills and Exercises for Facility Personnel.
In the notice of public meeting we requested comments on whether we
should require facility security personnel to attend formal training.
We discussed the concept of allowing the Facility Security Officer to
certificate security officers and train the facility personnel in
accordance with the requirements. We also asked if prescribing the
format for training records would assist the companies.
    Several commenters recommended that we provide specific guidance on
the type of information that should be recorded, but not require a
specific format for the recordkeeping. Other commenters stated that the
drill and exercise requirements were excessive.
    As previously stated, there are no approved courses for facility
personnel. In the absence of approved formal training, we intend to
allow Facility Security Officers to certify that personnel holding a
security position have received the training required to fulfill their
security duties.
    When training is developed, we will reassess the training and
certification requirements in the Facility Security interim rule found
in today's Federal Register. We will then propose alternatives or
additional requirements in a separate rulemaking, as appropriate.
    We have included the specific requirements in the Facility Security
interim rule, found in today's Federal Register, on what type of
information must be kept, with the facility owner or operator deciding
what format and where the records will be kept.
    We believe it is imperative that exercises and drills be conducted
to ensure security plans are current and that the personnel are
familiar with their responsibilities. We also believe that the Facility
Security Officer's participation in exercises is critical to improving
security. Therefore, we have included exercise and drill requirements
in the Facility Security interim rule found in today's Federal
Register. Security drills and exercises can be incorporated into
existing response exercises and drills and we believe that by combining
exercises, when possible, the exercises and drilling requirements can
be made more efficient.
    32. Certification for Facilities. In the notice of meeting, we
requested suggestions for verification and certification that
facilities do comply with the security regulations. We also asked
whether we should allow companies to certify their facilities.
    A large number of commenters stated that self-certification which
reflects a current industry standard and has an independent audit would
be appropriate. Other commenters supported the role of the Coast Guard
in oversight during the certification process.
    We intend to approve all facility security plans and compliance
with the requirements in the Facility Security Interim rule found in
today's Federal Register. We believe certification and verification can
be accomplished during a Coast Guard Inspection and the facility's plan
approval letter sufficiently documents compliance when viewed in
conjunction with other security-related records. We have not included
provisions for third-party certification in the Facility Security
interim rule, found in today's Federal Register however we have
included provisions for Alternative Security Programs that could
streamline the certification process.

Other Security Provisions

    33. Permanent Hull Marking Requirement. In our notice of meeting,
we discussed the SOLAS amendments creating a new regulation in Chapter
XI-1 (Regulation 3) that requires vessels to have their identification
number permanently marked on their hull and in an easily accessible
place on the transverse bulkhead of the machinery space or on another
suitable interior location, as specified. We discussed our intention
not to extend the application of this requirement to vessels limited to
domestic voyages and requested comments on this SOLAS provision and its
application to the domestic trade.
    An extremely large number of comments were received on this issue.
Almost every comment strongly supported our concept to not require the
hull markings for vessels that only engage in domestic voyages,
including all international voyages not subject to SOLAS. Several
commenters asked for exemptions for certain vessel types such as
historically significant vessels. We believe that the requirement
should not be extended to domestic vessels and, in the Vessel Security
requirements found elsewhere in today's Federal Register, we have only
applied the requirement to those vessels obligated to meet the SOLAS
requirement. In accordance with SOLAS, a passenger vessel of 100 gross
tonnage, ITC and upwards, and cargo vessels of 300 gross tonnage, ITC
and upwards, on an international SOLAS voyage should be marked in
accordance with its guidance.
    34. Continuous Synopsis Record Requirement. In our notice of
meeting, we discussed the SOLAS amendments that created a new
regulation in Chapter XI-1 (regulation 5) that requires vessels to
maintain and update a Continuous Synopsis Record, to be kept on board,
that contains information such as the name of the flag administration,
the date of the vessel's registry, the vessel's identification number,
etc. We discussed our intention not to extend the application of this
requirement to vessels limited to domestic voyages and requested
comments on this SOLAS provision and its application to the domestic
trade.
    An extremely large number of comments were received on this issue.
Almost every comment strongly supported the Coast Guard position of not
requiring the Continuous Synopsis Record for vessels that only engage
in domestic voyages. Many of the comments stated that the information
was already on board the vessel and readily available. A few comments
were in favor of requiring the information for domestic vessels stating
that if the information were in one place it would be useful. While we
believe that having the information in one document would be helpful in
certain instances, we feel that the value added by requiring another
document to be carried on a domestic vessel is not sufficient to do so.
The information on the Continuous Synopsis Record is currently
maintained on the Certificate of Inspection and the Certificate of
Documentation, both of which are required to be on a vessel when it is
operating. Therefore, we believe that the requirement should not be
extended to domestic vessels and, in the Vessel Security requirements
found elsewhere in today's Federal Register, we have only applied the
requirement to those vessels obligated to meet the SOLAS requirement.
    35. Security Alert System Requirement. In our notice of meeting, we
discussed the SOLAS amendments that created a new regulation in Chapter
XI-2 (regulation 6) that requires vessels to have a security alert
system. The Coast Guard is considering applying the requirement to
vessels limited to domestic voyages that are engaged in the transport
of certain dangerous cargos. We discussed our intention to extend the
application of this requirement to vessels on international voyages and
also requested comment on whether this type of system could be useful
on certain domestic voyages such as those involving the transportation
of certain dangerous cargos or large passenger vessels.
    Many commenters supported extending the requirement to other
cargoes and noted the need for alerting us if there were any problems
in a quick

[[Page 39264]]

and efficient manner. In contrast, many other commenters strongly
opposed the extension of this system to the domestic fleet and
questioned the functionality of it; asking what would be the resulting
action once an alert was sent, especially from a remote location.
Additionally, some commenters stated a desire to voluntarily install
the equipment and use the system once it has been proven effective on a
large scale.
    While we believe an alert system is a valuable way to communicate
to law enforcement if a vessel operator perceives a threat or a
security incident is imminent, alternatives can also be used that may
also prove effective (such as code words in a routine radio call or a
pre-designated call word). Until vessel plans and AMS Plans are
established and exercised to evaluate communications and identify gaps,
we do not intend to extend this requirement to domestic vessels.
However, if future communication exercises prove that alert systems
already within the maritime community do not adequately address the
appropriate vessels, we may require them in a separate rulemaking.
Therefore, in the Vessel Security requirements found elsewhere in
today's Federal Register, we have only applied the requirement to those
vessels obligated to meet the SOLAS requirement.
    36. Fixed and Floating Platforms Requirements. The International
Maritime Organization issued a resolution titled, ``Establishment of
Appropriate Measures to Enhance the Security of Ships, Port Facilities,
MODUs on Location and Fixed and Floating Platforms not covered by
Chapter XI-2 of the 1974 SOLAS Convention'' which was adopted by the
Conference on Maritime Security as Resolution 7 on December 12, 2002.
This resolution encourages Contracting Governments to consider security
requirements for these maritime operators and platforms. In the notice,
we discussed these international efforts and requested comments on
whether security requirements should be placed on the offshore fixed
and floating platforms.
    Many comments were received which emphasized that fixed and
floating platforms should be addressed within the port security plan.
However, some commenters disagreed stating that even if included in a
port security plan, the degree of security would be very different
among platforms due to the potential for different enforcement
procedures. Other commenters supported the position that while security
measures are appropriate for MODUs and fixed and floating platforms,
but believed that any regulations should be carefully tailored to the
unique operating environment of the offshore oil and natural gas
exploration industry. These commenters also noted that, in their
opinion, only a minimal amount of offshore platforms actually pose a
viable security risk.
    In accordance with the MTSA, we conducted an initial assessment on
vessels and U.S. facilities as discussed in the Applicability of
National Maritime Security Initiatives section above. Working with the
Mineral Management Service (MMS) we identified certain operational
quantities and personnel thresholds that are at a higher risk of a
transportation security incident. Therefore, in the OCS Facility
Security requirements found elsewhere in today's Federal Register, we
have only applied requirements to those offshore platforms. However, we
are also concerned about the consistency of security measures
throughout the offshore community and have worked extensively with
industry to develop standards that substantially improve security for
this industry. The American Petroleum Institute (API) recommended
practice titled, ``API RP70 Security for Offshore Oil and Natural Gas
Operations, 1st Edition'' is available and its use is strongly
encouraged for all owners and operators in this industry. Other
platforms not included in the narrow operational category discussed
above will be covered as part of the AMS Plan requirements in the
``Area Maritime Security'' (USCG-2003-14733) interim rule found
elsewhere in today's Federal Register. However, in the future, we
intend to review the need for further security requirements related to
the offshore industry and may require compliance with industry
standards such as API RP70 under a separate rulemaking.
    37. Seafarers' Identification Criteria Requirements. In our notice
of meeting, we noted the MTSA (46 U.S.C. 70111) requires the Secretary
to establish enhanced crewmember identification. In addition, section
103 of the MTSA encourages the Secretary to negotiate an agreement for
an international system of identification for seafarers. The Coast
Guard has been working with other agencies of DHS (e.g., TSA and
Immigration and Naturalization Service), the Department of State, the
Maritime Administration, and others to support the work of the
International Labour Organization (ILO). In the notice, we stated our
intent to await the outcome of the June 2003 ILO conference prior to
developing further seafarer identification domestic policy. Because
this interim rule has been published in a timeframe that did not allow
us to incorporate the results of the ILO conference into it, we will
issue any further requirements pertaining to seafarer identification
under a separate rulemaking, if appropriate.
    In addition to the above, the U.S. Government is mandated through
the MTSA (46 U.S.C. 70105) to develop and implement a Transportation
Security Card to control access to secure areas on a vessel or
facility. Other agencies of DHS (e.g., TSA) have been developing the
TWIC to satisfy the MTSA requirement. Pilot testing of the TWIC is
scheduled for two ports, each in communication with a Transportation
Security Administration central control point. This pilot project
allows the other agencies of the DHS (e.g., TSA) to leverage key
regional stakeholders and analyze life cycle and cost benefits, as well
as the performance of various forms of identification technologies.
    Recognizing that the implementation of the TWIC and the ILO efforts
on seafarers identification involve substantial negotiation and
development, we requested comments on our existing clarification of
regulations notice titled ``Maritime Identification Credentials''
published in the Federal Register on April 7, 2002 (67 FR 51082). This
document can be viewed on the DOT Document Management System at http://dms.dot.gov
 under Docket  USCG-2002-12917. We requested
comments in the notice of whether changes to this clarification were
needed or if other forms of identification should be recognized in the
interim.
    Many commenters suggested that we accept merchant mariner documents
(MMD) and facility-issued ID cards as a form of identification. Some
commenters stated that the existing requirements the Coast Guard set
out in its clarification notice are sufficient until the TWIC project
is complete. The majority of commenters submitted specific
recommendations or suggestions with regard to the TWIC.
    Under the current clarification notice, identification such as an
MMD or a facility-issued card meeting the requirements set out in the
notice are acceptable. Based on the lack of comments requesting
amendments to the clarification, we will not amend the requirements at
this time. We have incorporated them into this interim rule in order to
ensure personal identification is addressed in subchapter H. We will
also continue furthering the identification efforts at ILO and through
the TWIC project. Comments received on this docket that relate to the
TWIC project have been

[[Page 39265]]

forwarded to the Transportation Security Administration's docket on
that subject for consideration under that rulemaking, as appropriate.
    38. Advanced Notice of Arrival (ANOA) Requirements. In our notice
of meeting, we discussed that the Coast Guard had a notice of proposed
rule titled ``Notification of Arrival in U.S. Ports'' published in the
Federal Register on June 19, 2002 (67 FR 41659). In the meeting notice,
we discussed our intent to review the notification requirements based
on the additional provisions contained in the SOLAS amendments and the
ISPS Code and asked for comments relating to these provisions
(specifically SOLAS Chapter XI-2 Regulation 9). Additionally, we
requested comments on how foreign flag vessel owners or operators could
provide us advance notification on their compliance with the ISPS Code,
part B. Finally, we asked if any notification requirements for the
upper Mississippi River (above mile marker 235) should be considered
for security purposes.
    Several commenters suggested that it would be difficult for the
vessel to provide the proper information mentioned in the SOLAS
amendments or the ISPS Code. Several other commenters stated that the
ANOA would be the proper place for a vessel to affirm that it is in
compliance with the ISPS Code. Several comments were submitted with
respect to the NOA rulemaking published in the Federal Register on June
19, 2002 (67 FR 41659). Several commenters expressed reservation at the
value of requiring ANOA above mile marker 235 on the Mississippi River
or any other remote locations and suggested it not be required.
    We have reviewed the issue and currently believe that an
alternative process being developed locally could be more effective. We
are incorporating notice of arrival requirements in the Vessel Security
interim rule found elsewhere in today's Federal Register to capture the
information needed to assess a vessel's compliance with the security
requirements of SOLAS Chapter XI-2 and the ISPS Code. The reporting
requirements are similar to those required when the International
Safety Management Code was implemented and will allow us to have the
basic information needed for the evaluation of vessel's security
compliance prior to the vessel entering port. Since the publication of
the notice of meeting, the Coast Guard published its final rulemaking
titled ``Notification of Arrival in U.S. Ports'' published in the
Federal Register on February 28. 2003 (68 FR 9537). Comments submitted
to the public meeting notice that related to the proposed Notification
of Arrival (NOA) rulemaking docket were not considered, because the
proposed rulemaking comment period for the NOA rulemaking closed prior
to the end of the public meeting notice comment period. As for the
Mississippi River above mile marker 235 and other remote location
reporting requirements, the interim rule does not add any further
requirements to the notice of arrival requirements. We will continue
reviewing notice of arrival information and the reporting requirements
in the future to determine if further requirements are needed to ensure
the security provisions are covered. Any additional requirements would
be proposed in a future rulemaking.
    39. Foreign Port Assessments. In our notice of meeting, we
discussed Section 102 of the MTSA (46 U.S.C. 70108) which requires the
Secretary to assess the effectiveness of antiterrorism measures
maintained at a foreign port that serves vessels departing on a voyage
to the U.S. In the notice, we discussed the concept of accepting a
foreign government's approval of the respective port facility security
plans, thereby attesting to their compliance with SOLAS and the ISPS
Code, to provide the initial assessment of that foreign port's
antiterrorism security. We also suggested that we were considering any
other relevant information or the possibility of conducting audits in
foreign ports and requested comments on these ideas.
    Several commenters stated that accepting the foreign government's
approval of a port facility security plan supports the international
provisions and places the responsibility in the proper place. Many
commenters did ask how the U.S. would keep track of those not meeting
their obligations internationally with respect to the port facility
requirements in SOLAS Chapter XI-2 and the ISPS Code. Many commenters
also stated that the level of compliance of a facility would be
directly related to the importance the Contracting Government places
upon their obligations to meet the ISPS Code requirements.
    It is each Contracting Government's responsibility to ensure
compliance; however, it remains our intent to verify the compliance of
foreign port facilities in the future and we will work with relevant
Contacting Governments to facilitate these evaluations. In the ``Area
Maritime Security'' (USCG-2003-14733) interim final rule found
elsewhere in today's Federal Register, recognition of another
Contracting Government's port facility security plan is discussed.
However, as mentioned, those vessels calling on foreign port facilities
that do not meet the requirements of SOLAS and the ISPS Code may be
subject to control and compliance measures, even if the vessel itself
has a valid ISSC and an approved security plan.
    40. Automatic Identification System (AIS) Requirements. In our
notice of meeting, we discussed regulation V/19 of SOLAS, which sets
forth the international requirements for the carriage of AIS, including
an implementation schedule that was recently accelerated by the newly
adopted amendments to SOLAS. Domestically, section 102 of the MTSA (46
U.S.C. 70114) gives the Secretary additional broad discretion to
require AIS on any vessel operating on the navigable waters of the U.S.
if necessary for the safety of navigation. In the notice, we discussed
our consideration of AIS for security purposes as an essential element
in ensuring the safety of navigation. We also noted that the Department
of Transportation's Fall 2002 Unified Agenda (67 FR 74853, December 9,
2002), reflected a separate AIS notice of proposed rulemaking (NPRM)
which we anticipated publishing during the early months of 2003.
However, since the SOLAS amendments made in December 2002 and the MTSA
enactment directly impacted this intended notice of proposed
rulemaking, which had not taken into account the provisions of the
MTSA, we withdrew the NPRM from consideration to assess the impact of
both and evaluate options for further development. We did ask for
comments in the notice of public meetings on whether certain vessel
types currently listed in the MTSA AIS requirements should be
considered candidates for exemption or if the MTSA AIS application was
too limited and should be expanded. We also requested comments on
whether there are navigable waters of the U.S. where the AIS carriage
requirement should be waived because no security benefit would be
derived from the requirement.
    Several commenters stated that they believed small passenger
vessels should not be required to carry AIS due to the equipment
expense. Several other commenters asked that certain vessel types such
as fleeting tugs, commercial assistance tugs, barges, and vessels of
gross tonnage less than 300 on domestic voyages be exempted from the
regulations. In contrast, a few commenters suggested that all vessels
be required to carry AIS. Several other commenters provided specific
areas and types of operations where the system

[[Page 39266]]

would be beneficial. A series of commenters asked what the policy would
be if the SOLAS dates and the MTSA dates were in conflict. Several
comments also suggested that vessels operating on remote waterways not
be required to carry the system because it was not of any value to the
safe navigation of the vessel.
    We believe that the MTSA AIS application is consistent with SOLAS
and the domestic application is appropriate for the safety and security
of navigation within our ports and waterways. Therefore, we have
included this application in the AIS interim rule and notice for
comment found elsewhere in today's Federal Register. We have also
included a process for vessel owners and operators to request to waive
or exempt the AIS requirements.
    Several comments were submitted that did not reflect the questions
asked; however, a few are germane to the general subject of security. A
few commenters asked how the Coast Guard intends to receive the AIS
signal. A few commenters questioned the security of AIS and stated that
they believed it could be used against a vessel or a port by
terrorists; these comments went on to suggest that AIS had no benefit
from a security aspect and was not applicable. Several commenters also
proposed alternatives to AIS at different MARSEC Levels. Finally, a few
commenters strongly suggested that we not require AIS in an interim
rule but rather issue a notice of proposed rulemaking to ensure
adequate notice and comment for this equipment requirement.
    We believe that there are quantifiable security and safety benefits
from AIS. We are currently upgrading the Vessel Traffic Service (VTS)
systems within the ports to be able to receive and process AIS
information. As for the security of AIS, the signal is not secure
however; we believe that the benefit of being able to quickly identify
and warn mariners about threats directly related to their vessels out
weighs the potential security gap presented by AIS's open broadcast
nature. We are not considering alternates to AIS for those vessels that
are not included in the MTSA requirements but have requested comments
on the AIS equipment standards and requirements as well as nationwide
implementation in the notice for comments on AIS that is found
elsewhere in today's Federal Register. In the future, we may explore
other long range tracking alternates and we will continue work in
expanding AIS functionality (e.g., long range communication
interfacing) and progeny (e.g., AIS Class A derivatives, AIS Class B),
in pursuit of other options for those vessels not required to have AIS
though could benefit from the safety and security aspects of this
technology.
    We thoroughly considered the option of issuing a notice of proposed
rule for AIS prior to issuing the interim rule found elsewhere in
today's Federal Register. Based on the strong language of section
102(d) of the MTSA, which includes ``The Secretary shall issue an
interim final rule as a temporary regulation implementing this section
* * * as soon as practicable after the date of enactment of this
section, without the regard to the provisions of chapter 5 of title 5,
* * *'', we determined that AIS, as part 102, needed the same
accelerated treatment as the other security requirements presented in
the interim rules issued by the Coast Guard and found elsewhere in
today's Federal Register. We have provisions for comments to this
interim rule and will consider your input prior to the final
rulemaking. Additionally, we have included a separate notice of comment
found elsewhere in today's Federal Register to ensure that vessel
owners and operators are afforded ample opportunity to comment on this
equipment carriage requirement in the broad nationwide application that
MTSA suggests.

Discussion of Interim Rule

    This Interim rule establishes parts 101 and 102 in new subchapter H
to title 33 of the Code of Federal Regulations. It provides the General
Provisions for all of subchapter H, and is broken down into five
subparts, which we will now discuss in order.

Part 101--Subpart A--General

    Subpart A, section 101.100 explains the purpose behind all of the
Regulations found in subchapter H. That purpose is to increase the
level of maritime security found in our nation's ports, while at the
same time aligning our domestic maritime security regulations with
international standards, wherever such alignment is appropriate. These
regulations should dissuade those persons or groups that would seek to
disrupt the maritime elements of the national transportation system by
ensuring that security arrangements are as compatible as possible for
vessels trading internationally.
    Subpart A, section 101.105 goes on to define the terms that are
used in subchapter H. Definitions found in this section of part 101,
subpart A are applicable to the entire subchapter. We have included all
definitions in part 101 in order to give the reader a common place for
reference, a ``one stop shopping'' of sorts.
    Many of the definitions are self-explanatory, so we have not gone
into detail about them here. For brevity, we are limiting this
discussion to those definitions that we think may be confusing or
novel. For instance, the MTSA and the ISPS Code use different terms to
define similar, if not identical, persons or things. These differing
terms sometimes match up with the terms used in subchapter H, but
sometimes they do not. Thus, in some definitions you will find
references to other terms, used in the MTSA or the ISPS Code. We are
including a table of these terms here, for easy reference.

                                           Table 4.--Equivalent Terms
----------------------------------------------------------------------------------------------------------------
          Subchapter H terms                  USCG terms               MTSA terms            ISPS code terms
----------------------------------------------------------------------------------------------------------------
                                                      Plans
----------------------------------------------------------------------------------------------------------------
Area Maritime Security (AMS) Plan....  Port Security Plan.....  Area Maritime Security   Port Facility Security
                                                                 Transportation Plan.     Plan.
Vessel Security Plan.................  Vessel Security Plan...  Vessel Security Plan...  Ship Security Plan.
Facility Security Plan...............  Facility Security Plan.  Facility Security Plan.  None.
--------------------------------------
                                                   Assessments
----------------------------------------------------------------------------------------------------------------
Area Maritime Security (AMS)           Port Security            None...................  Port Facility Security
 Assessment.                            Assessment.                                       Assessment.
Vessel Security Assessment...........  Vessel Security          Vessel Security          Ship Security
                                        Assessment.              Assessment.              Assessment.

[[Page 39267]]

Facility Security Assessment.........  Facility Security        Facility Security        None.
                                        Assessment.              Assessment.
--------------------------------------
                                                     People
----------------------------------------------------------------------------------------------------------------
Captain of the Port (COTP)...........  Captain of the Port      Federal Maritime         Port Facility Security
                                        (COTP).                  Security Coordinator     Officer (PFSO).
                                                                 (FMSC).
Company Security Officer.............  Company Security         Company Security         Company Security
                                        Officer.                 Officer.                 Officer.
Vessel Security Officer..............  Vessel Security Officer  Qualified Individual...  Ship Security Officer.
Facility Security Officer............  Facility Security        Qualified Individual...  None.
                                        Officer.
Area Maritime Security (AMS)           Port Security Committee  Area Maritime Security   None.
 Committee.                                                      Advisory Committee.
----------------------------------------------------------------------------------------------------------------

    We defined ``company'' broadly in order to ensure that we captured
all persons and/or legal entities that may in fact own or operate a
vessel or facility under this subchapter. We did not list out specific
legal entities, in order to avoid unintentionally omitting one, making
enforcement more difficult as new legal entities are created. We
interpret our definition to include the following legal entities:
Corporations, partnerships, business trusts, associations, joint
ventures, sole proprietorships, and unincorporated organizations.
    We chose the term ``dangerous substances and devices'' for specific
reasons. The ISPS Code uses the phrase ``weapons, dangerous substances
or devices'' when identifying the intent of certain security measures.
We use dangerous substances and devices because these interim rules do
not prohibit weapons that are carried in accordance with the applicable
local, State, or federal laws. However, vessel or facility owners or
operators, in their own proprietary capacity, may prohibit lawfully
possessed weapons as a condition of carriage/entrance. They may also
develop and implement procedures whereby weapons and ammunition are
temporarily relinquished to the vessel or facility owner or operator
and placed in a secure location for the duration of the voyage or stay
at the facility. The Coast Guard will retain the authority to impose
restrictions on owners or operators when necessary to ensure safety or
security, or to secure the observance of rights or obligations of the
U.S., especially at heightened threat conditions. The Coast Guard is
working with DHS (e.g., TSA) to develop an intermodal policy regarding
items that passengers may be prohibited from carrying. The policy is
still being developed but may affect the carriage of certain weapons
onboard certain passenger vessels.
    We defined ``international voyage'' to include those vessels that
solely navigate the Great Lakes and the St. Lawrence River as far east
as a straight line drawn from Cap des Rosiers to West Point, Antiocosti
Island and, on the north side of Anticosti Island, the 63rd meridian.
    We chose to apply length thresholds using the definition of
``registered length'' instead of overall length, under the authority of
46 U.S.C. 70114(2). This was done to facilitate enforcement and
minimize confusion for vessel owners. Registered lengths are assigned
for all documented vessels of the U.S. and appear in Coast Guard
databases and on Certificates of Documentation. Conversely, overall
lengths can vary as a function of voyage type, and are not assigned for
all documented vessels of the U.S. In many cases the two definitions
coincide, and where they do not coincide, the registered length is
slightly less than overall length.
    We have expressed gross tonnage thresholds in one of two ways. If
the threshold must be applied using the vessel's gross tonnage
measurement under 46 U.S.C. Chapter 143, Convention Measurement, the
threshold is expressed in terms of ``gross tonnage, ITC.'' If the
threshold must be applied using the vessel's gross tonnage measurement
under 46 U.S.C. Chapter 145, Regulatory Measurement, the threshold is
expressed in terms of ``gross register tons.'' For those vessels that
only have a gross tonnage, ITC measurement, yet the requirement calls
for a gross register tons threshold, then the gross tonnage, ITC

measurement must be used.
    We have included a definition of the phrase ``Maritime Security
(MARSEC) Level,'' as well as definitions for each individual MARSEC
Level. MARSEC Level, in general, refers to the prevailing threat
environment to the maritime elements of the national transportation
system. As the threat of a transportation security incident increases,
the individual MARSEC Level moves higher, from one to three. Additional
discussion on the concept of MARSEC Levels and how they interplay with
DHS's HSAS is included below in the discussion for subpart B.
    We have also defined a new document, called a Maritime Security
(MARSEC) Directive. All MARSEC Directives will qualify as SSI under 49
CFR 1520.7 of the Transportation Security Administration interim rule
on SSI, that will be published in the near future. Once published, we
will post a copy of this interim rule to the docket. The Coast Guard
MARSEC Directives will be consistent with the National Transportation
System Security Plan (NTSSP) and in accordance with Transportation
Security Directives, as established by the Transportation Security
Administration. Additional discussion on what a MARSEC Directive is,
how MARSEC Directives will be issued and the proper response to a
MARSEC Directive is included below in the discussion for subpart D.
    We have adopted the MTSA definition for ``transportation security
incident.'' We also adopted the ISPS Code definitions for ``Company
Security Officer'' and ``Vessel Security Officer.'' Using these two
definitions as our basis, we were able to also define ``Facility
Security Officer.''
    We have also defined the phrase ``waters subject to the
jurisdiction of the U.S.'' to include the navigable waters of the U.S.,
the Exclusive Economic Zone (EEZ), the seabed and subsoil of the OCS of
the U.S. and the resources thereof and the waters adjacent thereto.
    Subpart A section 101.110 sets the applicability for all of
subchapter H. As stated, it is very broad, covering all vessels,
structures, and facilities of any kind, located in, on, or adjacent to
waters subject to the jurisdiction of the U.S. This broad application
is necessary to cover all entities affected by at least one part of new
subchapter H. Each individual part contains a separate applicability
section, which is more

[[Page 39268]]

narrow than that contained in the General Provisions of part 101.
    In section 101.115 we have incorporated by reference the ISPS Code,
2003 Edition. Specifically, we are incorporating the amendments adopted
on 12 December 2002 to the Annex to The International Convention for
SOLAS, 1974 and the ISPS Code, parts A and B, also adopted on 12
December 2002. The material is incorporated for all of subchapter H.
    Sections 101.120 and 101.125 of subpart A reflect the flexibility
that the Coast Guard has tried to build into these regulations. Section
101.120(a) reflects one of the SOLAS amendments, and allows the U.S. to
agree upon alternative security arrangements with other SOLAS
contracting governments, but only to cover short, international voyages
on fixed routes between facilities subject to the jurisdiction of the
U.S. and facilities subject to the jurisdiction of the other
contracting government. Any vessel covered by one of the agreements is
prohibited from engaging in any vessel-to-vessel activity, unless it
would be conducting the vessel-to-vessel activity with another vessel
covered by the same agreement.
    Section 101.120(b)-(c) allows applications for approval of
Alternative Security Programs. As noted in the discussion of comments
section above, we received many comments supporting the idea of
allowing vessels or facilities to submit security plans or programs
that meet, as an example, an industry standard, instead of requiring
them to follow the plan requirements included in this subchapter,
SOLAS, or ISPS Code, parts A and B. We have, accordingly, built this
flexibility into the regulation. Once an Alternative Security Program
is approved, it will be added to Section 101.125. An up-to-date list
will also be kept by G-MP, and will be accessible on the Internet.
    Section 101.120(c) details the information that must be included in
an application for approval. Part of that application includes an
assessment of what vessels or facilities may use the proposed
Alternative Security Program. This is important because not all
Alternative Security Program will be appropriate for all vessels or
facilities. For example, not all approved Alternative Security Programs
for facilities will fit the security planning requirements necessary
for a CDC facility. As part of the approval process, the Commandant
will indicate, in his approval letter, those types of vessels or
facilities that may use the approved Alternative Security Programs.
    Section 101.130 allows the Commandant to accept equivalent security
measures, so long as they are at least as effective as those that are
mandated in subchapter H, SOLAS, or ISPS Code, parts A and B. This
allowance is made for both vessels and facilities required to have
security programs under parts 104, 105, or 106. Equivalent security
measures differ from Alternative Security Programs. Once an Alternative
Security Program is approved, any vessel or facility that meets the
approval qualifications may meet the provisions of the Alternative
Security Program in lieu of meeting the security plan requirements of
the applicable part of this subchapter. Equivalent security measures,
once approved, are only approved for the particular vessel or facility
making the application.
    Equivalent security measures are those distinct security measures,
such as fences or alarm systems, which may be required within a
security plan. Requests for approval of equivalent security measures
should be made at the time that a vessel or facility is submitting
their security plan for approval, and they should be made to the
appropriate plan approval authority under part 104, 105, or 106.

Part 101--Subpart B--Maritime Security Levels

    The SOLAS Amendments and ISPS Code lay out a series of requirements
for Contracting Governments and Administrations to mandate security
levels that are appropriate for their vessels and ports. The Coast
Guard is implementing these requirements in coordination with the HSAS.
Homeland Security Presidential Directive (HSPD)-3 defines a five-tiered
system for setting threat levels. We are implementing MARSEC Levels,
which directly correspond to the security levels as discussed in the
SOLAS amendments and the ISPS Code. The MARSEC Levels will be linked to
the HSAS as shown in the table below. This table is also included in
the regulation itself.

                Table 5.--Relation Between HSAS, MARSEC Levels and SOLAS-Required Security Levels
----------------------------------------------------------------------------------------------------------------
   Homeland security advisory     Equivalent maritime security (MARSEC)     Equivalent SOLAS-required security
 system (HSAS) threat condition                   level                                    level
----------------------------------------------------------------------------------------------------------------
Low: Green.....................  Maritime Security Level 1..............  Security Level 1.
Elevated: Blue.................
Guarded: Yellow................
----------------------------------------------------------------------------------------------------------------
High: Orange...................  Maritime Security Level 2..............  Security Level 2.
----------------------------------------------------------------------------------------------------------------
Severe: Red....................  Maritime Security Level 3..............  Security Level 3.
----------------------------------------------------------------------------------------------------------------

    At all times, the Commandant retains the discretion to adjust the
MARSEC Level when necessary to address any particular concerns or
circumstances related to the maritime elements of the national
transportation system. Additionally, the COTP retains the authority to
temporarily raise the MARSEC Level for his/her AOR, or a specific
segment thereof, when necessary to address exigent circumstances
immediately affecting the security of the maritime elements of the
national transportation system within his/her AOR.

Part 101--Subpart C--Communication

    Subpart C, section 101.300 details the methods the COTP will use to
communicate changes in the MARSEC Level. Note that individual ATMS
Plans may outline additional communication methods that are particular
to the Plan's covered area. It also details the threat information that
the COTP will, when appropriate, communicate to the port stakeholders,
vessels, and facilities located within his or her AOR. Finally, this
section requires vessel and facility security plan holders to confirm
that they have implemented the measures and/or actions in their
security plans that correspond to the MARSEC Level.
    Subpart C, section 101.305 describes the reporting requirements
placed on vessel and facility security plan holders. First, it requires
that they report suspicious activities that may result in a
transportation security incident. These reports are to be made to the
National Response Center (NRC), and the

[[Page 39269]]

regulation lists several methods of contacting the NRC. We also require
that security plan holders call the NRC to report breaches of security.
This captures a broader range of activities that, while not severe
enough to pose a threat of a transportation security incident, are
still considered serious. Examples of breaches of security include
attempts to smuggle dangerous substances or devices onto a facility or
vessel, attempts to break into the facility or vessel, or attempts to
tamper with, alter, or mix cargos. They would not, however, include
acts of vandalism.
    It is advised, although not required, that vessel and facility
security plan holders familiarize themselves with the type of
information that will be asked of them when placing a call to the NRC.
They may do this by visiting the NRC's Web site at http://www.nrc.uscg.mil
, clicking on ``Services,'' then clicking on ``Online
Reporting.'' This will call up a menu of several different types of
incidents, such as vessel, pipeline, and aircraft. Clicking on any of
these types will open the reporting form.
    This section also encourages other persons or entities to call the
NRC to report suspicious activities that may result in a security
incident.
    Vessel and facility security plan holders are also required to
report the onset of an actual transportation security incident to their
local COTP or, if a facility regulated by part 106 of this subchapter,
their District Commander. They must also immediately begin implementing
the provisions of their security plan, including contacting any other
individuals or entities (such as the NRC or local authorities) listed
within their security plan.
    Section 101.310 of subpart C lists two methods of communication,
alert systems and AIS, which may be used to augment the communications
methods listed in a vessel's security plan. Alert systems are discussed
in more detail in part 104 of this subchapter; AIS is covered in 33 CFR
parts 26, 161, 164 and 165.

Part 101--Subpart D--Control Measures for Security

    This section also explicitly states that the provisions of
subchapter H do not limit the powers conferred by any other law or
regulation upon any Coast Guard commissioned, warrant, or petty
officer.
    Subpart D, section 101.405 describes when the Coast Guard will
issue a Maritime Security (MARSEC) Directive. MARSEC Directives will
set mandatory measures that all defined entities must meet in a
specified time. These entities will also be required to verbally
confirm, to the local COTP or District Commander (as appropriate),
receipt of the MARSEC Directive, as well as specify the method by which
the mandatory measures have been (or will be) met. This section also
builds in some flexibility by allowing the MARSEC Directive recipient
to submit proposed equivalent security measures to the local COTP or
District Commander (as appropriate), if the MARSEC Directive recipient
is unable to implement the measures mandated in the MARSEC Directive.
However, the entity will only be able to propose such alternatives for
the length of time specified in the MARSEC Directive, and he/she will
be required to implement any alternative measure that the COTP does
approve.
    The Coast Guard plans to use MARSEC Directives to mandate
additional security measures that are SSI. They may be applicable to
all maritime elements of the national transportation system, or they
may impose additional security measures on specific maritime elements
of the national transportation system. As stated, only the Commandant
or his/her delegate will issue these MARSEC Directives at the national
level. All MARSEC Directives will be designated and disseminated as
SSI, in accordance with 49 CFR part 1520 (to be amended by the
Transportation Security Administration). As a result, the MARSEC
Directives will only be issued to those persons who can demonstrate
that they are a covered person and that they have a need to know, as
those terms are defined in the SSI regulation. Company, Vessel, and
Facility Security Officers should familiarize themselves with the SSI
regulation.
    When a new MARSEC Directive is issued, the Coast Guard plans to
publish, in the Federal Register and through other means (local notices
to mariners, press releases, etc.), that it has issued a new MARSEC
Directive. The MARSEC Directives will be individually numbered, and
will be assigned to a series that corresponds with the part of this
subchapter to which the MARSEC Directive refers. For example, the first
MARSEC Directive addressing a new requirement for vessels regulated
under part 104 of this subchapter would be identified as MARSEC
Directive 104-01.
    Upon receiving notice that a new MARSEC Directive has been issued,
affected entities would contact or be contacted by their local COTP
(or, if appropriate, their District Commander) to receive a copy of the
MARSEC Directive. The COTP or District Commander will confirm, prior to
distributing the MARSEC Directive, that the requesting entity is a
covered person with a need to know, and that the requesting entity will
safeguard the MARSEC Directive as SSI. Thus, continuing with the
example from the previous paragraph, upon receiving notice that a
MARSEC Directive in the 104 series has been issued, owners and
operators of vessels covered by part 104 of this subchapter would need
to contact their local COTP to obtain a copy of the MARSEC Directive.
They would then be required to comply with the MARSEC Directive, or
follow the procedures set out in the MARSEC Directive for gaining
approval of an equivalent security measure. COTPs may also use the AMS
Committee as a mechanism for disseminating the MARSEC Directive to
those with a need to know.
    MARSEC Directives will be issued under an extension of the Coast
Guard's existing COTP authorities regarding maritime security, found in
33 U.S.C. 1226 and 50 U.S.C. 191. In part, the implementing regulations
for 50 U.S.C. 191, found at 33 CFR 6.14-1 and promulgated by Executive
Order 10277, contemplate action by the Commandant that is national in
scope. Specifically, these regulations authorize the Commandant to
prescribe such conditions and restrictions deemed necessary under
existing circumstances for the safety of waterfront facilities and
vessels. Additionally, 43 U.S.C. 1333(d) authorizes the Coast Guard to
establish certain requirements for OCS facilities. Moreover, MARSEC
Directives are a necessary and integral part of exercising the Coast
Guard's authorities in 46 U.S.C. Chapter 701, to ensure that that
Chapter's security requirements are met.
    The MARSEC Directives will provide specific instruction to the
regulated maritime community to achieve the performance standards
required by this subchapter and 46 U.S.C. Chapter 701. For example, the
plans required by 46 U.S.C. 70103 are not subject to public disclosure,
in accordance with 46 U.S.C. 70103(d), and contain SSI that, if
disclosed, could be used to subvert or exploit the security program for
vessels, facilities, OCS facilities, or ports. This could include
passenger screening levels, means of monitoring restricted areas, and
other requirements that may be necessary to ensure that the security
plans remain viable. Like civil aviation security, these specific
requirements cannot be placed in a public regulation and are better
suited for issuance through a MARSEC Directive that is itself not
subject to public disclosure.
    Since MARSEC Directives would be issued when necessary to protect
national security and to preserve the rights and obligations of the
U.S. with

[[Page 39270]]

regarding maritime security, the Coast Guard has determined that the
issuance of MARSEC Directives do not fall within the requirements of
the Administrative Procedure Act by virtue of the military and foreign
affairs exemption (5 U.S.C. 553(a)(1)). Furthermore, the basis for the
MARSEC Directive would also constitute ``good cause'' within the
meaning of the Administrative Procedure Act (5 U.S.C. 553(b)(3)(B) and
(d)(3)) regarding notice and comment rulemaking and effective dates
since it would be contrary to the public interest and impracticable to
provide SSI relating to maritime security and methods of detection,
deterrence, and response in a public forum.
    Subpart D, section 101.410 lists examples of the types of control
and compliance measures that a COTP may take on vessels and/or
facilities within his/her AOR that are not in compliance with
subchapter H. The lists of measures are not meant to be exhaustive.
This section also notes that the COTP may impose one or more of these
control and compliance measures on a vessel that is in compliance with
subchapter H, if that vessel has called on a facility that is not in
compliance, or if it has called on a port that does not maintain
adequate security measures to ensure that the level of security
achieved by subchapter H has not been compromised.
    Section 101.415 outlines the penalty provisions that may be taken
against persons for violating the provisions of this subchapter. Civil
and criminal penalties may be imposed under 33 U.S.C. 1232 or 50 U.S.C.
192, as appropriate, for violations of control and compliance measures,
including COTP orders and security zones. This simply restates the
current law applicable under the Magnuson Act, 590 U.S.C. 191,
implemented at 33 CFR part 6, and the Ports and Waterways Safety Act,
33 U.S.C. 1221 et seq., implemented in part at 33 CFR parts 160 and
165. Pursuant to 46 U.S.C. 70117, civil penalties may also be assessed
for non-compliance with any other requirement in this subchapter,
including those imposed by a MARSEC Directive.
    Finally, section 101.420 outlines the appeal rights available to
persons directly affected by a decision or action taken by the COTP or
the Commanding Officer of the Marine Safety Center.

Part 101--Subpart E--Other Provisions

    Subpart E sets out the remaining regulations that apply to all of
subchapter H that do not fit in any of the subparts discussed above. We
have reserved the first section in this subpart for procedures for
authorizing a Recognized Security Organization (RSO). As noted above in
the discussion of comments, the Coast Guard is authorized, under SOLAS,
to delegate its assessment and plan approval authority to an RSO. The
Coast Guard has decided to retain this authority for the time being. We
may, however, delegate some (or all) of this authority to RSOs in the
future. As a result, we are reserving this section for outlining the
procedures an organization will need to follow in order to qualify as
an RSO in the future.
    Section 101.505 describes the purpose behind a Declaration of
Security (DoS). A DoS is intended to clarify the specific security
responsibilities of a vessel and a facility (or another vessel) with
which it will be conducting some activity. It will be used to eliminate
situations where confusion leads the vessel to believe that the
facility (or other vessel) will take care of certain security measures,
while the facility (or other vessel) believes that the vessel will take
care of the same security measure. Parts 104 through 106 of subchapter
H describe in detail the who, what, where, when and how of completing a
DoS for their respective regulated entities. Additionally, to ensure
that vessels and facilities coordinate security during special marine
events such as festivals that draw large numbers of people to the
waterfront or vessels that wish to enter port with a higher MARSEC
Level than what has been set for the port, we have included a provision
to ensure the COTP's ability to mandate a DoS.
    Section 101.510 of subpart E lists the various assessment tools
that may be used to meet the risk assessment requirements in parts 103
through 106 of this subchapter. This list is provided to ensure that
security assessments done to meet these requirements are consistent
with other modal assessments and are sufficient enough to enable the
development of security plans. We have been working with other agencies
to develop assessment tools that are sensitive to a diversity of
transportation modes to ensure equity of security throughout the entire
National transportation system. We anticipate that eventually one
security assessment tool will be mandated for all transportation modes.
In the interim, the list provided in Section 101.510 enables the
maritime security provisions to advance until the national
transportation security assessment mandate is complete. Even when a
national transportation security assessment is in place, we intend to
provide a ``grandfather clause'' to those security assessments done to
meet the maritime security requirements found elsewhere in today's
Federal Register.
    The Transportation Security Administration intends to publish a
Notice of Proposed rulemaking with request for comment that promulgates
rules in 49 CFR part 1574 to manage the access to and use of a user-
friendly risk-based vulnerability assessment tool. This tool will be
the result of inter-agency work, under the leadership of TSA thus far
to establish a national transportation security assessment. It will be
designed as a self-assessment tool for the owner or operator, and is
one of the tools an owner or operator may use to meet the risk
assessment requirements in parts 103, 104, 105 and 106 of subchapter H.
    Section 101.515 of subpart E prescribes the minimum requirements
for personal identification credentials for purposes of access control
under this subchapter. As discussed in the Discussion of Comments to
Maritime Security Public Meetings section above, these requirements are
consistent with the Coast Guard's previous policy notice on maritime
credentials acceptable under 33 CFR part 125.

Part 102--National Maritime Transportation Security Plan

    Part 102 in subchapter H has been reserved for the National
Maritime Transportation Security (NMTS) Plan that is required under 46
U.S.C. 70103a. At this time we are coordinating the implementation of
the National Maritime Security Advisory Committee (NMSAC) as required
in the MTSA (46 U.S.C. 70112a). While the development of this
overarching plan and the establishment of the National Advisory
Committee are key sustaining National Maritime Security initiatives, we
do not feel their development is necessary prior to the implementation
of these interim rule requirements. We believe the concepts found in
the interim rules published in today's Federal Register represent the
foundation of National Maritime Transportation Security and intend to
incorporate them in the development of the NMTS plan. We will
promulgate the NMTS plan and Advisory Committee charter and membership
requirements under a separate notice and rulemaking in the future.
    Additionally, the Aviation and Transportation Security Act (ATSA)
assigns responsibility for managing the security of the nation's
transportation modes to the Transportation Security Administration. In
its role as the National Transportation System Security Manager,
Transportation Security Administration intends to

[[Page 39271]]

develop a National Transportation System Security Plan (NTSSP) to
define national strategy and provide tools to help manage risk across
the nation's multi-modal transportation system.
    The NTSSP will provide a comprehensive and systematic approach to
the national transportation system's risk management. It will set the
framework and establish goals for National Security Plans for each of
the transportation modes.

Incorporation by Reference

    The Director of the Federal Register has approved the material in
Sec.  101.115 for incorporation by reference under 5 U.S.C. 552 and 1
CFR part 51. You may inspect this material at U.S. Coast Guard
Headquarters where indicated under ADDRESSES. Copies of the material
are available from the sources listed in Sec.  101.115.
    This interim rule incorporates by reference the International Ship
and Port Facility Security (ISPS) Code, 2003 Edition. Specifically, we
are incorporating the amendments adopted on 12 December 2002 to the
Annex to The International Convention for the Safety of Life at Sea
(SOLAS), 1974 and The International Code For the Security of Ships and
of Port Facilities, also adopted on 12 December 2002. The material is
incorporated for all of subchapter H. The interim rule titled
``Automatic Identification System; Vessel Carriage Requirement'' (USCG-
2003-14757), found elsewhere in today's Federal Register, also
incorporates material by reference.

Regulatory Assessment

    This interim rule is a ``significant regulatory action'' under
section 3(f) of Executive Order 12866, Regulatory Planning and Review,
and has been reviewed by the Office of Management and Budget (OMB)
under that Order. It requires an assessment of potential costs and
benefits under section 6(a)(3) of that Order. It is significant under
the regulatory policies and procedures of DHS. A draft assessment is
available in the docket as indicated under ADDRESSES.

Summary of Changes in the Cost Assessment From the Meeting Notice

    In a December 30, 2002, meeting notice [67 FR 79742], the Coast
Guard presented a preliminary cost assessment estimating the cost to
the regulated public of implementing MTSA, the ISPS code, and complying
with applicable security NVICs. We asked for comments on our estimates
and have changed portions of our cost assessments for the interim rules
based on those comments.
    We received a wide range of comments on the preliminary assessment.
In some areas, commenters believed we were overestimating costs, in
other areas they believed we were understating costs, and in many
instances commenters believed we had accurately accounted for costs. As
a result of the comments, our cost estimates for vessels and facilities
increased, while our estimates for ports remained about the same.
Additionally, the summary of costs we present below includes estimates
for the OCS interim rule and the AIS interim rule, which were not part
of our original assessment for the meeting notice.
    For vessels, we decreased the population of U.S. flag SOLAS fishing
vessels from 39 to 1. We also removed domestic MODUs and domestic
freight barges regulated under 46 CFR subchapter I from our assessment,
as the Coast Guard is not regulating these vessels in these interim
rules. We added 70 foreign vessels that make port calls in the United
States but are not subject to SOLAS. We increased the cost for hand-
held radios and portable vapor detectors based on information received
in the comments.
    In our preliminary assessment, we assumed that equipment would be
replaced every 10 years. Several commenters believed that this
underestimated the replacement costs for several of the pieces of
equipment that we considered. Specifically, several commenters stated
some equipment would be broken, lost, or stolen before the 10-year
replacement. We agreed that we should increase equipment costs to
account for these situations. Because the replacement cycle of
equipment will vary considerably among types of equipment and its uses,
we increased the annual operations and maintenance (O&M) costs to more
accurately capture increased replacement and repair. In the preliminary
cost estimates, we assumed that annual O&M costs would be 5 percent of
the initial capital purchase cost. In the Cost Assessment for this
rulemaking, we increased annual O&M to 10 percent of the initial
purchase cost. We also changed the annual cost for Vessel Security
Officers to more accurately reflect the annual costs of the mariners
that will perform security duties aboard their vessels. The net effect
of these changes was to increase initial and annual costs for vessels.
    Based on comments, we found there was some confusion about labor
costs. Labor costs presented in our assessment are not the hourly wage
paid to the employee; rather, they are the fully loaded cost to the
company of carrying the position and providing employee benefits.
Additionally, there was some confusion about our estimates for Vessel
Security Assessments and Vessel Security Plans. We believe that most
companies will choose to develop one overarching assessment or plan,
and then take that overarching document and add documentation specific
to each vessel in their fleets. The ``incremental'' costs that we
presented for each vessel type in the preliminary assessment
represented the cost to add the vessel to the overarching company
assessment or plan. Thus, in our preliminary cost assessment it may
have seemed that it cost only a few dollars to develop a Vessel
Security Assessment or Vessel Security Plan for a particular vessel. In
fact, we believe that Vessel Security Assessments and Vessel Security
Plans will represent a substantial initial cost, but adding vessels to
an overarching plan will be a smaller, incremental cost. For annual
updates to Vessel Security Assessments and Vessel Security Plans, we
have increased the time required to amend these documents from 1 minute
per vessel (0.02 hours) to 15 minutes per vessel (0.25 hours). The net
effect of this change was to increase our annual costs slightly.
    For facilities, we added certain fleeting areas to our population
based on our assessment of the risk these areas pose. We also increased
equipment costs for most items for Group A facilities in response to
several comments. (We recognize that not all facilities will incur the
same cost for personnel salaries, hire the same number of security
guards, or spend the same amount of time drafting Facility Security
Assessments and Facility Security Plans. For the purpose of this
assessment, we have divided the facility population in two groups. One
group is composed of one third of all facilities and will have more
security duties, hire more guards, and spend more time drafting
Facility Security Assessments and Facility Security Plans than the
other group that is composed of the remaining two-thirds of the total
population. Facilities in the first group are addressed in this
assessment as ``A'' and facilities in the second group as ``B.'') As in
our vessel assessment, we increased annual O&M costs from 5 percent of
purchase cost to 10 percent of purchase cost to more accurately capture
annual repair and replacement. We received several comments on the cost
estimated for security guards. Commenters stated the $40,000 annual
cost presented was either too low, too high, or accurate. We believe
these diverging opinions could be explained by the cost of living and
the

[[Page 39272]]

corresponding wage variation among different regions of the country.
The costs presented in the assessment are national averages, and we
fully expect different regions of the country to pay different wage
rates. However, we do believe that the $40,000 per year estimated per
security guard may be lower than what could be expected. Consequently,
we have revised our estimate from $40,000 per year to $50,000 per year
per security guard. Finally, we included the cost of making Declaration
of Security (DoS) annual. The net effect of these changes was to
increase initial and annual costs for facilities.
    A detailed summary of the changes made from the December 2002
meeting notice and the Cost Assessment for the interim rules for
security is presented in Table 6.

                              Table 6.--Summary of Changes Made to Cost Assessment
----------------------------------------------------------------------------------------------------------------
                                        December 2002 meeting
                 Item                           notice           Cost assessment for IR          Comment
----------------------------------------------------------------------------------------------------------------
Population of fishing vessels........  39 vessels.............  1 vessel...............  Revised based on new
                                                                                          information from
                                                                                          commenter.
Population of domestic MODUs.........  159 vessels............  0 vessels..............  IR will not be
                                                                                          applicable to domestic
                                                                                          MODUs.
Population of domestic freight barges  262 vessels............  0 vessels..............  IR will not be
                                                                                          applicable to domestic
                                                                                          freight barges
                                                                                          regulated under
                                                                                          Subchapter I.
Population of foreign non-SOLAS        0 vessels..............  70 vessels.............  IR will be applicable
 vessels.                                                                                 to these vessels
                                                                                          regulated under
                                                                                          Subchapter I.
Hand-held radio (vessels)............  $200 per item..........  $500 per item..........  Revised based on
                                                                                          comment.
Portable vapor detector (vessels)....  $8,000 per item........  $15,000 per item.......  Revised based on
                                                                                          comment.
O&M costs for equipment (vessels)....  5% of purchase cost....  10% of purchase cost...  Revised based on
                                                                                          comment.
Annual incremental costs to amend      $0.02 per vessel per     $25 per vessel per year  Revised based on
 VSAs and VSPs.                         year.                                             comment.
Vessel Security Officers.............  $5,000 per vessel per    $8,500 per non-towing    Revised based on
                                        year, non-towing         vessel per year;         comment.
                                        vessels only.            $4,250 per towing
                                                                 vessel per year.
Fleeting areas.......................  0 areas................  600 areas..............  Population added to IR.
Communications system (group A         $300,000 per facility..  $400,000 per facility..  Revised based on
 facilities).                                                                             comment.
Gates (group A facilities)...........  $100,000 per facility..  $200,000 per facility..  Revised based on
                                                                                          comment.
CCTVs (group A facilities)...........  $130,000 per facility..  $260,000 per facility..  Revised based on
                                                                                          comment.
Lights (group A facilities)..........  $200,000 per facility..  $400,000 per facility..  Revised based on
                                                                                          comment.
Fencing (group A facilities).........  $500,000 per facility..  $750,000 per facility..  Revised based on
                                                                                          comment.
Hand-held radio (group A and B         $200 per item..........  $500 per item..........  Revised based on
 facilities).                                                                             comment.
O&M costs for equipment (facilities).  5% of purchase cost....  10% of purchase cost...  Revised based on
                                                                                          comment.
Security guard.......................  $40,000 per year.......  $50,000 per year.......  Revised based on
                                                                                          comment.
Declaration of Security..............  No cost estimated......  Cost estimated.........  Added requirement to
                                                                                          IR.
----------------------------------------------------------------------------------------------------------------

Cost Assessment Summary

    The following summary presents the estimated costs of complying
with the interim rules on Vessel Security, Facility Security, OCS
Facility Security, Area Maritime Security, and AIS, which are published
elsewhere in today's Federal Register.
    For the purposes of good business practice, or to comply with
regulations promulgated by other Federal and State agencies, many
companies already have spent a substantial amount of money and
resources to upgrade and improve security. The costs shown in this
summary do not include the security measures these companies have
already taken to enhance security.
    We realize that every company engaged in maritime commerce would
not implement the interim rules exactly as presented in this
assessment. Depending on each company's choices, some companies could
spend much less than what is estimated herein, while others could spend
significantly more. In general, we assume that each company would
implement the interim rules based on the type of vessels or facilities
it owns or operates, whether it engages in international or domestic
trade, and the ports where it operates.
    This assessment presents the estimated cost if vessels, facilities,
OCS facilities, and ports are operating at MARSEC Level 1, the current
level of operations since the events of September 11, 2001. We also
estimate the costs for operating for a brief period at MARSEC Level 2,
an elevated level of security. We also discuss the potential effects of
operating at MARSEC Level 3, the highest level of maritime security.
    We do not anticipate that implementing the interim rules will
require additional manning aboard vessels or OCS facilities; existing
personnel can assume the duties envisioned. For facilities, we
anticipate additional personnel in the form of security guards that can
be hired through contracting with a private firm specializing in
security.
    Based on our assessment, the first-year cost of implementing the
interim rules is approximately $1.507 billion. Following initial
implementation, the annual cost is approximately $884 million, with
costs of present value (PV) $7.348 billion over the next 10 years
(2003-2012, 7 percent discount rate). Estimated costs are as follows.

Vessel Security

    Implementing the interim rule will affect about 10,300 U.S. flag
SOLAS, domestic (non-SOLAS), and foreign non-SOLAS vessels. The first-
year cost of purchasing and installing equipment, hiring security
officers, and preparing paperwork is approximately $218 million.
Following initial implementation, the annual cost is approximately $176
million. Over the

[[Page 39273]]

next 10 years, the cost would be PV $1.368 billion.

Facility Security

    Implementing the interim rule will affect about 5,000 facilities.
The first-year cost of purchasing and installing equipment, hiring
security officers, and preparing paperwork is an estimated $1.125
billion. Following initial implementation, the annual cost is
approximately $656 million. Over the next 10 years, the cost would be
PV $5.399 billion.

OCS Facility Security

    Implementing the interim rule will affect about 40 OCS facilities
under U.S. jurisdiction. The first-year cost of purchasing equipment
and preparing paperwork is an estimated $3 million. Following initial
implementation, the annual cost is approximately $5 million. Over the
next 10 years, the cost would be PV $37 million.

Port Security

    Implementing the interim rule will affect about 47 maritime areas
containing 361 ports. The initial cost of the startup period (June
2003-December 2003) is estimated to be $120 million. Following the
startup period, the first year of implementation (2004) is estimated to
be $106 million. After the first year of implementation, the annual
cost is approximately $46 million. Over the next 10 years, the cost
would be PV $477 million.

Automatic Identification System (AIS)

    Implementing the interim rule will affect about 4,600 U.S. flag
SOLAS and domestic (non-SOLAS) vessels in VTS areas. The first-year
cost of purchasing equipment and training for U.S. vessels (SOLAS and
domestic) is approximately $40 million. Following initial
implementation, the annual cost for U.S. vessels is approximately $1
million. Over the next 10 years, the cost for these vessels would be PV
$66 million (with replacement of the units occurring 8 years after
installation).
    An additional 70 foreign flag, non-SOLAS vessels will also be
affected. The first-year cost of purchasing and installing equipment
and training personnel for these vessels is approximately $0.6 million.
Following initial implementation, the annual cost is less than $0.1
million. Over the next 10 years, the cost for these vessels would be PV
$1 million.

Maritime Security Levels 2 and 3

    MARSEC Level 2 is a heightened threat of a security incident, and
intelligence indicates that terrorists are likely to be active within a
specific target or class of targets. MARSEC Level 3 is a probable or
imminent threat of a security incident. MARSEC Levels 2 and 3 costs are
not included in the above summaries because of the uncertainty that
arises from the unknown frequency of elevation of the MARSEC Level and
the unknown duration of the elevation.
    The costs to implement MARSEC Levels 2 and 3 security measures in
response to these increased threats do not include the costs of
security measures and resources needed to meet MARSEC Level 1
(summarized above) and will vary depending on the type of security
measures required to counter the specific nature of higher levels of
threat. Such measures could include additional personnel or assigning
additional responsibilities to current personnel for a limited period
of time.
    We did not consider capital improvements, such as building a fence,
to be true MARSEC Levels 2 or 3 costs. The nature of the response to
MARSEC Levels 2 and 3 is intended to be a quick surge of resources to
counter an increased threat level. Capital improvements generally take
time to plan and implement and could not be in place rapidly. Capital
improvement costs are estimated under MARSEC Level 1 costs.
    We did not calculate MARSEC Level 2 cost for the AMS because this
will be primarily a cost to the Coast Guard for administering the
heightened MARSEC Level in port and maritime areas.
    In order to estimate a cost for MARSEC Level 2, we made assumptions
about the length of time the nation's ports can be expected to operate
at the heightened security level. For the purpose of this assessment
only, we estimate costs to the nation's ports elevating to MARSEC Level
2 twice a year, for 3 weeks each time, for a total period of 6 weeks at
MARSEC Level 2. Again, this estimate of 6 weeks annually at MARSEC
Level 2 is for the purposes of illustrating the order of magnitude of
cost we can expect. Our estimate should not be interpreted as the Coast
Guard's official position on how often the nation's ports will operate
at MARSEC Level 2.
    We estimate that there are Vessel Security Officers aboard all U.S.
flag SOLAS vessels and most domestic vessels. We estimate that there
will also be key crewmembers that can assist with security duties
during MARSEC Level 2 aboard these vessels. We assume that both Vessel
Security Officers and key crewmembers will work 12 hours a day (8 hours
of regular time, 4 hours of overtime) during the 42 days that the ports
are at MARSEC Level 2. We then estimate daily and overtime rates for
Vessel Security Officers and key crewmembers. Given these assumptions,
we estimate that elevating the security level to MARSEC Level 2 twice a
year each for 21 days will cost vessel owners and operators
approximately $235 million annually.
    We estimate that every regulated facility will have a Facility
Security Officer assigned to it. We also estimate that there will also
be a key person that can assist with security duties during MARSEC
Level 2 at each facility. We assume that both Facility Security
Officers and key personnel will work 12 hours a day (8 hours of regular
time, 4 hours of overtime). For facilities that have to acquire
security personnel for MARSEC Level 1, we assumed that during MARSEC
Level 2 the number security guards would double for this limited time.
For the facilities for which we did not assume any additional guards at
MARSEC Level 1, we assumed that during MARSEC Level 2 these would have
to acquire a minimal number of security guards. Given these
assumptions, we estimate that elevating the security level to MARSEC
Level 2 twice a year each for 21 days will cost facility owners and
operators approximately $424 million annually.
    We estimate that elevating the security level to MARSEC Level 2
twice a year each for 21 days will cost the regulated OCS facility
owners and operators approximately $4 million annually. This cost is
primarily due to increased cost for OCS Facility Security Officers and
available key security personnel.
    Other costs that we did not attempt to quantify include possible
operational restrictions such as limiting cargo operations to daylight
hours or greatly limiting access to facilities or vessels.
    MARSEC Level 3 will involve significant restriction of maritime
operations that could result in the temporary closure of individual
facilities, ports, and waterways either in a region of the U.S. or the
entire nation. Depending on the nature of the specific threat, this
highest level of maritime security may have a considerable impact on
the stakeholders in the affected ports or maritime areas. The ability
to estimate the costs to business and government for even a short
period at MARSEC Level 3 is virtually impossible with any level of
accuracy or analytical confidence due to the infinite range of threats
and scenarios that could trigger MARSEC Level 3.
    The length and the duration of the increased security level to
MARSEC Level 3 will be entirely dependent on the intelligence received
and the scope

[[Page 39274]]

of transportation security incidents or disasters that have already
occurred or are imminent. While we can reasonably expect MARSEC Level 3
to increase the direct costs to businesses attributable to increased
personnel or modified operations, we believe the indirect costs to
society of the ``ripple effects'' associated with sustained port
closures would greatly outweigh the direct costs to individual
businesses.

The U.S. Marine Transportation System

    The cost of MARSEC Level 3 can best be appreciated by the benefits
of the U.S. MTS to the economy. Maritime commerce is the lifeblood of
the modern U.S. trade-based economy, touching virtually every sector of
our daily business and personal activities.
    Annually, the U.S. MTS contributes significant benefits to the
economy. More than 95 percent of all overseas trade that enters or
exits this country moves by ship, including 9 million barrels of oil a
day that heats homes and businesses and fuels our automobiles.\1\ In
addition, over $738 billion of goods are transported annually through
U.S. ports and waterways.\2\
---------------------------------------------------------------------------

    \1\ See MTS Fact Sheet available at www.dot.gov/mts/fact_sheet.htm
.
    \2\ See 2000 Exports and Imports by U.S. Customs District and
Port available at www.marad.dot.gov/statististcs/usfwts/.
---------------------------------------------------------------------------

    Other benefits include the water transportation and shipping
industry that generates over $24 billion in revenue and provides nearly
$3 billion of payrolls.\3\ The annual economic impact of cruise lines,
passengers, and their suppliers is more than $11.6 billion in revenue
and 176,000 in jobs for the U.S. economy.\4\ Our national defense is
also dependent on the MTS. Approximately 90 percent of all equipment
and supplies for Desert Storm were shipped from strategic ports via our
inland and coastal waterways.\5\
---------------------------------------------------------------------------

    \3\ U.S. Census Bureau, 1997 Economic Census, Transportation and
Warehousing-Subject Series.
    \4\ See footnote 1.
    \5\ See footnote 1.
---------------------------------------------------------------------------

The Ripple Effect of Port Closures on the U.S. Economy

    We could expect not just the immediate effects of port and waterway
closures on waterborne commerce as described above, but also serious
``ripple effects'' for the entire U.S. economy that could last for
months or more, including delayed commerce, decreased productivity,
price increases, increased unemployment, unstable financial markets
worldwide, and economic recession.
    To appreciate the impact, we can examine one sector of the economy:
agriculture. Many farm exports are just-in-time commodities, such as
cotton shipped to Japan, South Korea, Indonesia, and Taiwan. Asian
textile mills receive cotton on a just-in-time basis because these
mills do not have warehousing capabilities. A port shutdown may cause
U.S. cotton wholesalers to lose markets, as textile producers find
suppliers from other nations. U.S. wholesalers would lose sales until
shipping is restored.
    Another example is the auto industry. A recent shutdown of West
Coast ports due to a labor dispute caused an automobile manufacturer to
delay production because it was not receiving parts to make its cars.
We can see that a port shutdown can create a domino effect, from
stalling the distribution of materials to causing stoppages and delays
in production to triggering job losses, higher consumer prices, and
limited selection.
    The macroeconomic effects of the recent shutdown of West Coast
ports, while not in response to a security threat, are a good example
of the economic costs that we could experience when a threat would
necessitate broad-based port closures. The cost estimates of this 11-
day interruption in cargo flow and closure of 29 West Coast ports have
ranged between $140 million to $2 billion a day, but are obviously high
enough to cause significant losses to the U.S. economy.\6\
---------------------------------------------------------------------------

    \6\ See Lost Earnings Due to West Coast Port Shutdown--
Preliminary Estimate, Patrick Anderson, October 7, 2002, available
at http://www.AndersonEconomicGroup.com; An Assessment of the Impact
of West Coast Container Operations and the Potential Impacts of an
Interruption of Port Operations, 2000, Martin Associates, October
23, 2001, available from the Pacific Maritime Association. These two
studies were widely quoted by most U.S. news services including Sam
Zuckerman, San Francisco Chronicle, October 2002.
---------------------------------------------------------------------------

    Another proxy for the estimated costs to society of nationwide port
closures and the consequential impact on the U.S. supply chain can be
seen by a recent war game played by businesses and government
agencies.\7\ In that recent war game, a terrorist threat caused 2 major
ports to close for 3 days, and then caused a nationwide port closure
for an additional 9 days. This closure spanned only 12 days, but
resulted in a delay of approximately 3 months to clear the resulting
containerized cargo backlog. The economic costs of the closings
attributable to manufacturing slowdowns and halts in production, lost
sales, and spoilage was estimated at approximately 58 billion. The
simulation gauged how participants would respond to an attack and the
ensuing economic consequences. Furthermore, a well-coordinated direct
attack of multiple U.S. ports could shutdown the world economy by
effectively halting international trade flows to and from the U.S.
market--the largest market for goods and services in the world.
---------------------------------------------------------------------------

    \7\ The war game simulation was designed and sponsored by Booz
Allen Hamilton and The Conference Board, details available at http://www.boozallen.com/
.
---------------------------------------------------------------------------

    We believe that the cost to the national economy of a port shutdown
due to extreme security threats, while not insignificant, would be
relatively small if it only persisted for a few days and involved very
few ports. However, if the interruption in cargo flows would persist
much longer than the 11-day shutdown recently experienced on the West
Coast, the economic loss is estimated to geometrically increase
(double) every additional 10 days the ports were closed.\8\ At a
certain point, companies would start declaring bankruptcies, people
would be laid off indefinitely, and the prices of goods would increase.
This effect would continue and intensify until alternate economic
activities took place, such as the unemployed finding less desirable
jobs or companies finding secondary lines of operations and suppliers.
Regardless, the economic hardship suffered by industry, labor, and the
loss of public welfare due to a sustained nationwide port shutdown may
have as significant an effect on the U.S. as the act of terror itself.
---------------------------------------------------------------------------

    \8\ See Anderson footnote 6.
---------------------------------------------------------------------------

Benefit Assessment

Why We Measured Benefits Using the N-RAT

    A team of experts considered the benefits of various security
measures that will be implemented and used the N-RAT to estimate the
reduction in risk associated with these security measures. Before the
results of this assessment are discussed, it is helpful to understand
why the Coast Guard chose this methodology to measure regulatory
benefits.
    Traditionally, the Coast Guard's regulations intended to decrease
marine-related casualties, which in turn reduced number of injuries,
fatalities, and pollution (primarily oil) spilled into the marine
environment. These sorts of safety and environmental benefits could be
estimated with some degree of accuracy; the well-documented and
detailed history of maritime incidents provides a solid foundation to
estimate the ``costs to society'' that could be

[[Page 39275]]

avoided through enhanced requirements. By reviewing incident trends
over time and the costs to society imposed by these incidents, the
Coast Guard could determine if changes to the status quo were
justified.
    Consequently, our environmental protection and marine safety
regulations were generally accompanied by estimates of reduced
injuries, fatalities, and pollution attributable to a specific
regulation. For example, the recently promulgated Final Rule titled
Tank Level or Pressure Monitoring Devices (published September 17,
2002) [67 FR 58515] estimated a benefit to society of approximately 900
barrels of oil not spilled into the environment over the period of
assessment, though the regulation was not expected to prevent injuries
or fatalities.
    Estimating the benefits of new security requirements, however, is
more challenging. Incident causation probabilities, based on historic
trends and analysis, can be estimated in a manner that terrorist
activities cannot. Currently, we believe it is virtually impossible to
estimate benefits for security regulations in the way benefits are
estimated for non-security regulations. We do not believe we can state
with any degree of certainty that a specific security regulation would
save a number or a range of fatalities, as no viable baseline exists
from which to project these benefits. We realize though, that the
burden on the regulated public of bearing the costs of new security
regulations will be high, and we must balance the benefits of these
regulations with their associated costs. We must also consider the
consequences of taking no action.
    We do not assume the benefits of the interim rules automatically
offset their costs simply because these rules are security related. By
using RBDM, however, we have measured the relative risk reduction
resulting from these security measures, permitting us to estimate the
``value'' these regulations will have. In considering the applicability
of the interim rules, we have strived to apply requirements to those
maritime entities that pose the greatest risk, and the N-RAT was an
important and powerful tool in our Risk-Based Decision Making process.
We believe that through better-informed judgments that came, in part,
from the results of the N-RAT, we are appropriately balancing the
benefits of the interim rules with their costs.

Results of the N-RAT Based Assessment

    The expert review and scoring process was complex and challenging.
The fundamental principles of the N-RAT, however, are relatively simple
to understand. For each applicable entity in the interim rules, we
assigned an annual ``baseline'' risk score. We then considered the
requirements of the six interim rules described herein and assigned an
annual post-regulation risk score. The benefits attributable to part
101--General Provisions--were not considered separately because it is
an overarching section for all the subparts. The benefits for part 101
are represented in each of the remaining security subparts. The
difference between the baseline risk score and the post-regulation risk
score is the quantified benefit of the remaining five interim rules.
    Besides the complex procedure to assign risk scores to the
applicable maritime entities, we were faced with the further
complication that rules will have multiple benefits; thus, we have the
potential to double-count the risk reduced. For example, if the owner
or operator of a petroleum tanker enhances his vessel's security, this
will also benefit the receiving facility where this vessel transfers
its cargo. The reverse is also true: If the owner or operator of the
facility enhances his facility's security, this will benefit the
vessels that arrive there. We recognize that the interim rules are a
``family'' of rulemakings that will reinforce and support one another
in their implementation. We must ensure, however, that risk reduction
that is credited in one rulemaking is not also credited in another.
    To avoid double-counting risk reduced, we first determined the
``universe'' of total benefits of all security measures recently
implemented, about to be implemented, or planned for future
rulemakings. Examples of other rules that were considered in the
``universal'' risk points are the Coast Guard's Notice of Arrival (96-
Hour Rule), Custom's rulemaking regarding cargo manifests (24-Hour
Rule), and a future rulemaking for transportation security cards. We
then apportioned the total benefits to specific regulations. By
approaching the benefits assessment in this manner, we were able to
address the limitations of the N-RAT. The threat, vulnerability, and
consequence scores are whole numbers between 1 and 5. The N-RAT did not
allow us to score a relatively minor security initiative only 0.1 or
0.5 of a risk point, even though the initiative contributes to risk
reduction. When we considered the rules as a group, however, security
initiatives that could not be scored individually due to the limited
granularity of the N-RAT can be scored when considered with the rest of
the rules because of their cumulative risk reduction benefits.
    Once we determined the total risk reduction benefits of the all the
applicable rules, we ``apportioned'' the total risk points back to each
individual regulation. We avoided double-counting benefits among the
rulemakings as each risk point was counted only once. While there was
subjectivity in this apportionment of risk points back to the
individual rulemakings, we believe this methodology's strength of
allowing a systematic quantification of risk reduction for each
regulation outweighs its subjectivity.

Results of the N-RAT

    We determined annual risk points reduced for each of the six
interim rules using the N-RAT. Table 7 presents the annual risk points
reduced by the rules. As shown, the interim rule for vessel security
plans reduces the most risk points annually. The interim rule for AIS
reduces the least.

                            Table 7.--Annual Risk Points Reduced by the Interim Rules
----------------------------------------------------------------------------------------------------------------
                                                     Annual risk points reduced by rulemaking
                                 -------------------------------------------------------------------------------
         Maritime entity              Vessel         Facility      OCS facility
                                  security plans  security plans  security plans     AMS plans          AIS
----------------------------------------------------------------------------------------------------------------
Vessels.........................         778,633           3,385           3,385           3,385           1,448
Facilities......................           2,025         469,686  ..............           2,025  ..............
OCS Facilities..................              41  ..............           9,903  ..............  ..............
Port Areas......................             587             587  ..............         129,792             105
                                 -----------------
    Total.......................         781,285         473,659          13,288         135,202           1,553
----------------------------------------------------------------------------------------------------------------

[[Page 39276]]

    Once we determined the annual risk points reduced, we discounted
these estimates to their PV (7 percent discount rate, 2003-2012) so
that they could be compared to the costs. We presented the cost
effectiveness, or dollars per risk point reduced, in two ways: First,
we compared first-year cost to first-year benefit, because first-year
cost is the highest in our assessment as companies develop security
plans and purchase equipment. Second, we compared the 10-year PV cost
to the 10-year PV benefit. The results of our assessment are presented
in Table 8.

                    Table 8.--First-Year and 10-Year PV Cost and Benefit of the Interim Rules
----------------------------------------------------------------------------------------------------------------
                                                                   Interim rule
                                 -------------------------------------------------------------------------------
              Item                    Vessel         Facility      OCS facility
                                  security plans  security plans  security plans     AMS plans        AIS \1\
----------------------------------------------------------------------------------------------------------------
First-Year Cost (millions)......            $218          $1,125              $3            $120             $41
First-Year Benefit..............         781,285         473,659          13,288         135,202           1,553
First-Year Cost Effectiveness ($/           $279          $2,375            $205            $890         $26,391
 Risk Point Reduced)............
10-Year PV Cost (millions)......          $1,368          $5,399             $37            $477             $42
10-Year PV Benefit..............       5,871,540       3,559,655          99,863       1,016,074          11,671
10-Year PV Cost Effectiveness ($/           $233          $1,517            $368            $469          $3,624
 Risk Point Reduced)............
----------------------------------------------------------------------------------------------------------------
\1\ Cost less monetized safety benefit.

    As shown, the rulemaking for vessel security plans is the most cost
effective. This is due to the nature of the security measures we expect
vessels will have to take to ensure compliance as well as the level of
risk that is reduced by those measures. Facility security plans are
less cost effective because they incur higher costs for capital
purchases (such as gates and fences) and require more labor (such as
security guards) to ensure security. OCS Facility and AMS Plans are
almost equally cost effective; the entities these rules cover do not
incur the highest expenses for capital equipment, but on this relative
scale, they do not receive higher risk reduction in the N-RAT, either.
The AIS rulemaking is the least cost effective, though it is important
to remember that AIS provides increased maritime domain awareness and
navigation safety, which is not robustly captured using the N-RAT.

Small Entities

    Under the Regulatory Flexibility Act (5 U.S.C. 601-612), we have
considered whether these interim rules would have a significant
economic impact on a substantial number of small entities. The term
``small entities'' comprises small businesses, not-for-profit
organizations that are independently owned and operated and are not
dominant in their fields, and governmental jurisdictions with
populations of less than 50,000. These interim rules do not require a
general notice of proposed rulemaking and, therefore, are exempt from
the requirements of the Regulatory Flexibility Act.
    Although these interim rules are exempt, we have reviewed each rule
for potential economic impacts on small entities. We found that the
facilities, vessels, and AIS rules may have a significant impact on a
substantial number of small entities. However, we did certify no
significant economic impact on a substantial number of small entities
for the Area Maritime Security and OCS facility security rules.
Additional information on small entity impacts is available in the
Regulatory Assessment or Cost Assessment for each interim rule in their
associated docket, where indicated in the ADDRESSES section for each
interim rule.

Assistance for Small Entities

    Under section 213(a) of the Small Business Regulatory Enforcement
Fairness Act of 1996 (Public Law 104-121), we want to assist small
entities in understanding these rules so that they can better evaluate
the effects on them and participate in the rulemaking. If these rules
affect your small business, organization, or governmental jurisdiction
and you have questions concerning their provisions or options for
compliance, please consult CDR Suzanne Englebert, G-M-1 by telephone
202-267-1103, toll-free telephone 1-800-842-8740 ext. 7-1103, or by
electronic mail msregs@comdt.uscg.mil.    Small businesses may send comments on the actions of Federal
employees who enforce, or otherwise determine compliance with, Federal
regulations to the Small Business and Agriculture Regulatory
Enforcement Ombudsman and the Regional Small Business Regulatory
Fairness Boards. The Ombudsman evaluates these actions annually and
rates each agency's responsiveness to small business. If you wish to
comment on actions by employees of the Coast Guard, call 1-888-REG-FAIR
(1-888-734-3247).

Collection of Information

    The interim rules published in today's Federal Register contain
collection of information requirements under the Paperwork Reduction
Act of 1995 (44 U.S.C. 3501-3520). As defined in 5 CFR 1320.3(c),
``collection of information'' comprises reporting, recordkeeping,
monitoring, posting, labeling, and other, similar actions. The rules
modify two existing OMB-approved collections--1625-0100 [formerly 2115-
0557] and 1625-0077 [formerly 2115-0622]. Details of the revision to
1625-0100 can be found in the ``Vessel Security'' [USCG-2003-14749]
interim rule published elsewhere in today's Federal Register. A summary
of the revised collection 1625-0077 follows.
    TITLE: Security Plans for Ports, Vessels, Facilities, and Outer
Continental Shelf Facilities and Other Security-Related Requirements.
    OMB Control Number: 1625-0077.
    Summary of the Collection of Information: The Coast Guard requires
security plans and communication procedures for U.S. ports and maritime
areas as detailed in the interim rules. These rules provide a framework
to ensure adequate security planning, drilling, and communication
procedures for Ports, Vessels, Facilities, and OCS Facilities.
    Need for Information: The primary need for information would be to
determine if stakeholders are in compliance with security standards.
    Proposed Use of Information: This information can help to determine
appropriate security measures for the affected population. This
information also can help determine, in the case of a transportation
security incident, whether failure to meet these regulations
contributed to the transportation security incident.

[[Page 39277]]

    Description of the Respondents: This rule will affect owners,
operators, and personnel operating in the U.S. Marine Transportation
System. The respondents are regulated public and private stakeholders
as detailed in the interim rules.
    Number of Respondents: 16,607 total respondents for the interim
rules.
    Frequency of Response: Varies as specified in each interim rule.
Security assessments and security plans are submitted for approval
initially, and reviewed annually. After the first year, drills
generally occur at various schedules. All frequencies are at the
discretion of the COTP. Depending on the port or maritime area, there
may be additional requirements and reporting frequencies.
    Burden of Response: Varies per each type of regulated population in
the interim rules.
    Estimate of Total Annual Burden: The existing OMB-approved
collection total annual burden is 1,811 hours. These interim rules are
a program change that will increase the total annual burden. The new
estimated total collection burden is indicated in the table below.

     Table 9.--Summary of Initial and Annual Burden Hours and Costs
------------------------------------------------------------------------
                                                     Burden (hours)
                                               -------------------------
                                                  Initial       Annual
------------------------------------------------------------------------
Port Security (AMS)...........................    1,203,200      488,800
Vessel Security...............................      135,269       11,700
Facility Security.............................      528,240      608,187
OCS Facility Security.........................        3,200          160
                                               --------------
    Subtotal..................................    1,869,909    1,108,847
Pre 9/11 Security.............................      * 3,549        3,549
                                               --------------
    Total.....................................    1,873,458   1,112,396
------------------------------------------------------------------------
* As pre-9/11/01 security requirements are existing regulations, they
  are included in both initial and annual burden calculations. (Note
  burden revised from year 2000 Estimate).

    As required by the Paperwork Reduction Act of 1995 (44 U.S.C.
3507(d)), we have submitted a copy of the interim rules to the OMB for
its review of the collection of information. Due to the circumstances
surrounding this temporary rule, we asked for ``emergency processing''
of our request. We received OMB approval for these collections of
information on June 16, 2003. They are valid until December 31, 2003.
    We ask for public comment on the collection of information to help
us determine how useful the information is; whether it can help us
perform our functions better; whether it is readily available
elsewhere; how accurate our estimate of the burden of collection is;
how valid our methods for determining burden are; how we can improve
the quality, usefulness, and clarity of the information; and how we can
minimize the burden of collection.
    If you submit comments on the collection of information, submit
them both to OMB and to the Docket Management Facility where indicated
under ADDRESSES, by the date under DATES.
    You need not respond to a collection of information unless it
displays a currently valid control number from OMB. We received OMB
approval for these collections of information on June 16, 2003. They
are valid until December 31, 2003.

Federalism

    Executive Order 13132 requires USCG to develop an accountable
process to ensure ``meaningful and timely input by State and local
officials in the development of regulatory policies that have
federalism implications.'' ``Policies that have federalism
implications'' is defined in the Executive Order to include regulations
that have ``substantial direct effects on the States, on the
relationship between the national government and the States, or on the
distribution of power and responsibilities among the various levels of
government.'' Under the Executive Order, USCG may construe a Federal
statute to preempt State law only where, among other things, the
exercise of State authority conflicts with the exercise of Federal
authority under the Federal statute.
    This action has been analyzed in accordance with the principles and
criteria in the Executive Order, and it has been determined that this
interim rule does have Federalism implications or a substantial direct
effect on the States. This rulemaking requires those States which own
or operate vessels or facilities that may be involved in a
transportation security incident to conduct vulnerability assessments
of their vessels and facilities and to develop security plans for their
protection. These plans must contain measures that will be implemented
at each of the three MARSEC Levels, and must be reviewed and approved
by the Coast Guard.
    Additionally, the Coast Guard has reviewed the MTSA with a view to
whether we may construe it as non-preemptive of State authority over
the same subject matter. We have determined that it would be
inconsistent with the federalism principles stated in the Executive
Order to construe the MTSA as not preempting State regulations which
conflict with the regulations in this rulemaking. This is because
owners or operators of facilities and vessels that are subject to the
requirements for conducting vulnerability assessments, planning to
secure their facilities and vessels against threats revealed by those
assessments and complying with the standards, both performance and
specific construction, design, equipment and operating requirements,
must have one uniform, national standard which they must meet. Vessels
and shipping companies, particularly, would be confronted with an
unreasonable burden if they had to comply with varying requirements as
they moved from State to State. Therefore, we believe that the
federalism principles enunciated by the Supreme Court in U.S. v. Locke,
529 U.S. 89 (2000) regarding field preemption of certain State vessel
safety, equipment and operating requirements extends equally to this
rulemaking, especially regarding the longstanding history of
significant Coast Guard maritime security regulation and control of
vessels for security purposes. But, the same considerations apply to
facilities, at least insofar as a State law or regulation applicable to
the same subject for the purpose of protecting the security of the
facility would conflict with a federal regulation, i.e. it would either
actually conflict or would frustrate an over-riding federal need for
uniformity.
    Finally, it is important to note that the regulations implemented
by this rulemaking bear on national and international commerce where
there is no constitutional presumption of concurrent State regulation.
Many aspects of these regulations are based on the U.S. international
treaty obligations regarding vessel and port facility security
contained in the International Convention for the SOLAS, 1974 and the
complementary ISPS Code. These international obligations reinforce the
need for uniformity regarding maritime commerce.
    Notwithstanding the foregoing preemption determinations and
findings, the Coast Guard has consulted extensively with appropriate
State officials, as well as private stakeholders during the development
of this rule. Specifically, we have held seven public meetings across
the country with invitation letters to all State homeland security
representatives. Many State representatives attended these meetings and
submitted comments to the public notice docket that we have considered
for these interim rules. The State

[[Page 39278]]

comments ranged from State Boating Law Administrators concerns about
recreational boating impacts and security for smaller marinas to State
security representatives voicing concern about alignment with their
State maritime security requirements. We also presented the SOLAS
Amendments and ISPS Code, parts A and B, in the public notice and
requested comments from the State homeland security advisors at a
National Governors Association meeting on March 14, 2003. We encourage
States to send in comments specifically on this Federalism analysis.

Unfunded Mandates Reform Act

    The Unfunded Mandates Reform Act of 1995 (2 U.S.C. 1531-1538)
requires Federal agencies to assess the effects of their discretionary
regulatory actions. In particular, the Act addresses actions that may
result in the expenditure by a State, local, or tribal government, in
the aggregate, or by the private sector of $100,000,000 or more in any
one year. This rule is exempted from assessing the effects of the
regulatory action as required by the Act because it is necessary for
the national security of the U.S. (2 U.S.C. 1503(5)).

Taking of Private Property

    This rule will not effect a taking of private property or otherwise
have taking implications under Executive Order 12630, Governmental
Actions and Interference with Constitutionally Protected Property
Rights.

Civil Justice Reform

    This rule meets applicable standards in sections 3(a) and 3(b)(2)
of Executive Order 12988, Civil Justice Reform, to minimize litigation,
eliminate ambiguity, and reduce burden.

Protection of Children

    We have analyzed this rule under Executive Order 13045, Protection
of Children from Environmental Health Risks and Safety Risks. While
this rule is an economically significant rule, it does not create an
environmental risk to health or risk to safety that may
disproportionately affect children.

Indian Tribal Governments

    This rule does not have tribal implications under Executive Order
13175, Consultation and Coordination with Indian Tribal Governments,
because it does not have a substantial disproportionate effect on one
or more Indian tribes, on the relationship between the Federal
Government and Indian tribes, or on the distribution of power and
responsibilities between the Federal Government and Indian tribes. We
would appreciate any comments, however, if you disagree with this
conclusion.

Energy Effects

    We have analyzed this rule under Executive Order 13211, Actions
Concerning Regulations That Significantly Affect Energy Supply,
Distribution, or Use. We have determined that it is not a ``significant
energy action'' under that order. Although it is a ``significant
regulatory action'' under Executive Order 12866, it is not likely to
have a significant adverse effect on the supply, distribution, or use
of energy. Additionally, the Administrator of the Office of Information
and Regulatory Affairs has not designated it as a significant energy
action. Therefore, it does not require a Statement of Energy Effects
under Executive Order 13211.
    This rule has a positive effect on the supply, distribution, and
use of energy. The rule provides for security assessments, plans,
procedures, and standards, which will prove beneficial for the supply,
distribution, and use of energy at increased levels of maritime
security.

Environment

    We have considered the environmental impact of this rule and
concluded that under figure 2-1, paragraph (34)(a), (34)(c), (34)(d),
and (34)(e) of Commandant Instruction M16475.lD, this rule is
categorically excluded from further environmental documentation. A
``Categorical Exclusion Determination'' is available in the docket
where indicated under ADDRESSES or SUPPLEMENTARY INFORMATION.
    This final rule concerns security assessments, plans, training,
security positions, and organizations along with vessel equipment
requirements that will contribute to a higher level of marine safety
and security for U.S. ports. A ``Categorical Exclusion Determination''
is available in the docket where indicated under ADDRESSES or
SUPPLEMENTARY INFORMATION.
    This rulemaking will not significantly impact the coastal zone.
Further, the rulemaking and the execution of this rule will be done in
conjunction with appropriate State coastal authorities. The Coast Guard
will, therefore, comply with the requirements of the Coastal Zone
Management Act while furthering its intent to protect the coastal zone.

Trade Impact Assessment

    The Trade Agreement Act of 1979 prohibits federal agencies from
engaging in any standards or related activities that create unnecessary
obstacles to the foreign commerce of the U.S. Legitimate domestic
objectives, such as safety and security, are not considered unnecessary
obstacles. The Act also requires consideration of international
standards and, where appropriate, that they be the basis for U.S.
standards. We have assessed the potential effect of this regulation,
and have determined that it would likely create obstacles to the
foreign commerce of the U.S.. However, because these regulations are
being put in place in order to further a legitimate domestic objective,
namely to increase the security of the U.S., any obstacles created by
the regulation are not considered unnecessary obstacles.

List of Subjects

33 CFR Part 101

    Facilities, Harbors, Incorporation by reference, Maritime security,
Ports, Security assessments, Security plans, Reporting and
recordkeeping requirements, Vessels, Waterways.

33 CFR Part 102

    Maritime security.

0
For the reasons discussed in the preamble, the Coast Guard is adding
subchapter H consisting of part 101 and reserved part 102 to 33 CFR
chapter I to read as follows:

SUBCHAPTER H--MARITIME SECURITY

PART 101--GENERAL PROVISIONS

Subpart A--General
Sec.
101.100 Purpose.
101.105 Definitions.
101.110 Applicability.
101.115 Incorporation by reference.
101.120 Alternatives.
101.125 Approved Alternative Security Programs. [Reserved]
101.130 Equivalent security measures.
Subpart B--Maritime Security (MARSEC) Levels
101.200 MARSEC Levels.
101.205 Department of Homeland Security alignment.
Subpart C--Communication (Port-Facility-Vessel)
101.300 Preparedness communications.
101.305 Reporting.
101.310 Additional communication devices.
Subpart D--Control Measures for Security
101.400 Enforcement.
101.405 Maritime Security (MARSEC) Directives.
101.410 Control and Compliance Measures.
101.415 Penalties.
101.420 Right to appeal.

[[Page 39279]]

Subpart E--Other Provisions
101.500 Procedures for authorizing a Recognized Security
Organization (RSO). [RESERVED]
101.505 Declaration of Security (DoS).
101.510 Assessment Tools.
101.515 Personal Identification.

    Authority: 33 U.S.C. 1231, 1226; 46 U.S.C. Chapter 701; 50
U.S.C. 191, 192; E.O. 12656, 3 CFR 1988 Comp. p. 585; 33 CFR 1.05-1,
6.04-11, 6.14, 6.16, and 6.19; Department of Homeland Security
Delegation No. 0170.

PART 101--GENERAL PROVISIONS

Subpart A--General

Sec.  101.100  Purpose.

    (a) The purpose of this part is:
    (1) To implement portions of the maritime security regime required
by the Maritime Transportation Security Act of 2002, as codified in 46
U.S.C. Chapter 701;
    (2) To align, where appropriate, the requirements of domestic
maritime security regulations with the international maritime security
standards in the International Convention for the Safety of Life at
Sea, 1974 (SOLAS Chapter XI-2) and the International Code for the
Security of Ships and of Port Facilities, parts A and B, adopted on 12
December 2002; and
    (3) To ensure security arrangements are as compatible as possible
for vessels trading internationally.
    (b) For those maritime elements of the national transportation
system where international standards do not directly apply, the
requirements in this subchapter emphasize cooperation and coordination
with local port community stakeholders, and are based on existing
domestic standards, as well as established industry security practices.

Sec.  101.105  Definitions.

    Unless otherwise specified, as used in this subchapter:
    Alternative Security Program means a third-party or industry
organization developed standard that the Commandant has determined
provides an equivalent level of security to that established by this
subchapter.
    Area Commander means the U.S. Coast Guard officer designated by the
Commandant to command a Coast Guard Area as described in 33 CFR part 3.
    Area Maritime Security (AMS) Assessment means an analysis that
examines and evaluates the infrastructure and operations of a port
taking into account possible threats, vulnerabilities, and existing
protective measures, procedures and operations.
    Area Maritime Security (AMS) Committee means the committee
established pursuant to 46 U.S.C. 70112(a)(2)(A). This committee can be
the Port Security Committee established pursuant to Navigation and
Vessel Inspection Circular (NVIC) 09-02, available from the cognizant
Captain of the Port (COTP) or at http://www.uscg.mil/hq/g-m/nvic.
    Area Maritime Security (AMS) Plan means the plan developed pursuant
to 46 U.S.C. 70103(b). This plan may be the Port Security plan
developed pursuant to NVIC 09-02 provided it meets the requirements of
part 103 of this subchapter.
    Area of Responsibility (AOR) means a Coast Guard area, district,
marine inspection zone or COTP zone described in 33 CFR part 3.
    Audit means an evaluation of a security assessment or security plan
performed by an owner or operator, the owner or operator's designee, or
an approved third-party, intended to identify deficiencies, non-
conformities and/or inadequacies that would render the assessment or
plan insufficient.
    Barge means a non-self-propelled vessel (46 CFR 24.10-1).
    Barge fleeting facility means a commercial area, permitted by the
Army Corps of Engineers, as provided in 33 CFR part 322, the purpose of
which is for the making up, breaking down, or staging of barge tows.
    Bulk or in bulk means a commodity that is loaded or carried on
board a vessel without containers or labels, and that is received and
handled without mark or count.
    Bunkers means a vessel's fuel supply.
    Captain of the Port (COTP) means the local officer exercising
authority for the COTP zones described in 33 CFR part 3. The COTP is
the Federal Maritime Security Coordinator described in 46 U.S.C.
70103(a)(2)(G) and also the Port Facility Security Officer as described
in the ISPS Code, part A.
    Cargo means any goods, wares, or merchandise carried, or to be
carried, for consideration, whether directly or indirectly flowing to
the owner, charterer, operator, agent, or any other person interested
in the vessel, facility, or OCS facility.
    Certain Dangerous Cargo (CDC) means the same as defined in 33 CFR
160.203.
    Commandant means the Commandant of the U.S. Coast Guard.
    Company means any person or entity that owns any facility, vessel,
or OCS facility subject to the requirements of this subchapter, or has
assumed the responsibility for operation of any facility, vessel, or
OCS facility subject to the requirements of this subchapter, including
the duties and responsibilities imposed by this subchapter.
    Company Security Officer (CSO) means the person designated by the
Company as responsible for the security of the vessel or OSC facility,
including implementation and maintenance of the vessel or OSC facility
security plan, and for liaison with their respective vessel or facility
security officer and the COTP.
    Contracting Government means any government of a nation that is a
signatory to SOLAS, other than the U.S.
    Cruise ship means any vessel over 100 gross register tons, carrying
more than 12 passengers for hire which makes voyages lasting more than
24 hours, of which any part is on the high seas. Passengers from cruise
ships are embarked or disembarked in the U.S. or its territories.
Cruise ships do not include ferries that hold Coast Guard Certificates
of Inspection endorsed for ``Lakes, Bays, and Sounds'', that transit
international waters for only short periods of time on frequent
schedules.
    Dangerous substances or devices means any material, substance, or
item that may cause damage or injury to any person, vessel, facility,
harbor, port, or waters subject to the jurisdiction of the U.S. and
that:
    (1) Is unlawful to possess under applicable Federal, State, or
local law;
    (2) That has not been approved for entry onto the vessel, facility,
or OCS facility by the owner or operator of the vessel, facility, or
OCS facility; or
    (3) Has not been approved for entry onto a public area or property
in a port by the government or property management official with
jurisdictional responsibility of that area.
    Declaration of Security (DoS) means an agreement executed between
the responsible Vessel and Facility Security Officer, or between Vessel
Security Officers in the case of a vessel-to-vessel interface, that
provides a means for ensuring that all shared security concerns are
properly addressed and security will remain in place throughout the
time a vessel is moored to the facility or for the duration of the
vessel-to-vessel interface, respectively.
    District Commander means the U.S. Coast Guard officer designated by
the Commandant to command a Coast Guard District described in 33 CFR
part 3.
    Drill means a training event that tests at least one component of
the AMS, vessel, or facility security plan and is used to maintain a
high level of security readiness.
    Exercise means a comprehensive training event that involves several
of the functional elements of the AMS, vessel, or facility security
plan and tests

[[Page 39280]]

communications, coordination, resource availability, and response.
    Facility means any structure or facility of any kind located in,
on, under, or adjacent to any waters subject to the jurisdiction of the
U.S. and used, operated, or maintained by a public or private entity,
including any contiguous or adjoining property under common ownership
or operation.
    Facility Security Assessment (FSA) means an analysis that examines
and evaluates the infrastructure and operations of the facility taking
into account possible threats, vulnerabilities, consequences, and
existing protective measures, procedures and operations.
    Facility Security Officer (FSO) means the person designated as
responsible for the development, implementation, revision and
maintenance of the facility security plan and for liaison with the COTP
and Company and Vessel Security Officers.
    Facility Security Plan (FSP) means the plan developed to ensure the
application of security measures designed to protect the facility and
its servicing vessels or those vessels interfacing with the facility,
their cargoes, and persons on board at the respective MARSEC Levels.
    Ferry means a vessel which is limited in its use to the carriage of
deck passengers or vehicles or both, operates on a short run on a
frequent schedule between two or more points over the most direct water
route, other than in ocean or coastwise service.
    Foreign vessel means a vessel of foreign registry or a vessel
operated under the authority of a country, except the U.S., that is
engaged in commerce.
    Gross register tons (GRT) means the gross ton measurement of the
vessel under 46 U.S.C. chapter 145, Regulatory Measurement. For a
vessel measured under only 46 U.S.C. chapter 143, Convention
Measurement, the vessel's gross tonnage, ITC is used to apply all
thresholds expressed in terms of gross register tons.
    Gross tonnage, ITC (GT ITC) means the gross tonnage measurement of
the vessel under 46 U.S.C. chapter 143, Convention Measurement. Under
international conventions, this parameter may be referred to as ``gross
tonnage (GT).''
    Hazardous materials means hazardous materials subject to regulation
under 46 CFR parts 148, 150, 151, 153, or 154, or 49 CFR parts 171
through 180.
    Infrastructure means facilities, structures, systems, assets, or
services so vital to the port and its economy that their disruption,
incapacity, or destruction would have a debilitating impact on defense,
security, the environment, long-term economic prosperity, public health
or safety of the port.
    International voyage means a voyage between a country to which
SOLAS applies and a port outside that country. A country, as used in
this definition, includes every territory for the internal relations of
which a contracting government to the convention is responsible or for
which the United Nations is the administering authority. For the U.S.,
the term ``territory'' includes the Commonwealth of Puerto Rico, all
possessions of the United States, and all lands held by the U.S. under
a protectorate or mandate. For the purposes of this subchapter, vessels
are considered as being on an ``international voyage'' when solely
navigating the Great Lakes and the St. Lawrence River as far east as a
straight line drawn from Cap des Rosiers to West Point, Anticosti
Island and, on the north side of Anticosti Island, the 63rd meridian.
    ISPS Code means the International Ship and Port Facility Security
Code, as incorporated into SOLAS.
    Maritime Security (MARSEC) Directive means an instruction issued by
the Commandant, or his/her delegee, mandating specific security
measures for vessels and facilities that may be involved in a
transportation security incident.
    Maritime Security (MARSEC) Level means the level set to reflect the
prevailing threat environment to the marine elements of the national
transportation system, including ports, vessels, facilities, and
critical assets and infrastructure located on or adjacent to waters
subject to the jurisdiction of the U.S.
    MARSEC Level 1 means the level for which minimum appropriate
protective security measures shall be maintained at all times.
    MARSEC Level 2 means the level for which appropriate additional
protective security measures shall be maintained for a period of time
as a result of heightened risk of a transportation security incident.
    MARSEC Level 3 means the level for which further specific
protective security measures shall be maintained for a limited period
of time when a transportation security incident is probable or
imminent, although it may not be possible to identify the specific
target.
    Master means the holder of a valid license that authorizes the
individual to serve as a Master, operator, or person in charge of the
rated vessel. For the purposes of this subchapter, Master also includes
the Person in Charge of a MODU, and the operator of an uninspected
towing vessel.
    OCS Facility means any artificial island, installation, or other
complex of one or more structures permanently or temporarily attached
to the subsoil or seabed of the OCS, erected for the purpose of
exploring for, developing or producing oil, natural gas or mineral
resources. This definition includes all mobile offshore drilling units
(MODUs) not covered under part 104 of this subchapter, when attached to
the subsoil or seabed of offshore locations, but does not include
deepwater ports, as defined by 33 U.S.C. 1502, or pipelines.
    Operator, Uninspected Towing Vessel means an individual who holds a
license described in 46 CFR 15.805(a)(5) or 46 CFR 15.810(d).
    Owner or operator means any person or entity that maintains
operational control over any facility, vessel, or OCS facility subject
to the requirements of this subchapter.
    Passenger vessel means--
    (1) On an international voyage, a vessel carrying more than 12
passengers; and
    (2) On other than an international voyage:
    (i) A vessel of at least 100 gross register tons carrying more than
12 passengers, including at least one passenger-for-hire;
    (ii) A vessel of less than 100 gross register tons carrying more
than 6 passengers, including at least one passenger-for-hire;
    (iii) A vessel that is chartered and carrying more than 12
passengers;
    (iv) A submersible vessel that is carrying at least one passenger-
for-hire; or
    (v) A wing-in-ground craft, regardless of tonnage, that is carrying
at least one passenger-for-hire.
    Passenger-for-hire means a passenger for whom consideration is
contributed as a condition of carriage on the vessel, whether directly
or indirectly flowing to the owner, charterer, operator, agent, or any
other person having an interest in the vessel.
    Registered length means the registered length as defined in 46 CFR
part 69.
    Restricted areas mean the infrastructures or locations identified
in an area, vessel, or facility security assessment or by the operator
that require limited access and a higher degree of security protection.
The entire facility may be designated the restricted area, as long as
the entire facility is provided the appropriate level of security.
    Review and approval means the process whereby Coast Guard officials
evaluate a plan or proposal to determine

[[Page 39281]]

if it complies with this subchapter and/or provides an equivalent level
of security.
    Screening means a reasonable examination of persons, cargo,
vehicles, or baggage for the protection of the vessel, its passengers
and crew. The purpose of the screening is to secure the vital
government interest of protecting vessels, harbors, and waterfront
facilities from destruction, loss, or injury from sabotage or other
causes of similar nature. Such screening is intended to ensure that
dangerous substances and devices, or other items that pose a real
danger of violence or a threat to security are not present.
    Security sweep means a walkthrough to visually inspect unrestricted
areas to identify unattended packages, briefcases, or luggage and
determine that all restricted areas are secure.
    Security system means a device or multiple devices designed,
installed and operated to monitor, detect, observe or communicate about
activity that may pose a security threat in a location or locations on
a vessel or facility.
    Sensitive security information (SSI) means information within the
scope of 49 CFR part 1520.
    SOLAS means the International Convention for the Safety of Life at
Sea Convention, 1974, as amended.
    Survey means an on-scene examination and evaluation of the physical
characteristics of a vessel or facility, and its security systems,
processes, procedures, and personnel.
    Transportation security incident (TSI) means a security incident
resulting in a significant loss of life, environmental damage,
transportation system disruption, or economic disruption in a
particular area.
    Unaccompanied baggage means any baggage, including personal
effects, which are not with the passenger, crewmember or any other
person at the point of inspection or screening prior to boarding the
vessel.
    Vessel-to-facility interface means the interaction that occurs when
a vessel is directly and immediately affected by actions involving the
movement of persons, goods or the provisions of facility services to or
from the vessel.
    Vessel-to-port interface means the interaction that occurs when a
vessel is directly and immediately affected by actions involving the
movement of persons, goods or the provisions of port services to or
from the vessel.
    Vessel Security Assessment (VSA) means an analysis that examines
and evaluates the vessel and its operations taking into account
possible threats, vulnerabilities, consequences, and existing
protective measures, procedures and operations.
    Vessel Security Plan (VSP) means the plan developed to ensure the
application of security measures designed to protect the vessel and the
facility that the vessel is servicing or interacting with, the vessel's
cargoes, and persons on board at the respective MARSEC Levels.
    Vessel Security Officer (VSO) means the person onboard the vessel,
accountable to the Master, designated by the Company as responsible for
security of the vessel, including implementation and maintenance of the
Vessel Security Plan, and for liaison with the Facility Security
Officer and the vessel's Company Security Officer.
    Vessel stores means--
    (1) Materials that are on board a vessel for the upkeep,
maintenance, safety, operation or navigation of the vessel; and
    (2) Materials for the safety or comfort of the vessel's passengers
or crew, including any provisions for the vessel's passengers or crew.
    Vessel-to-vessel activity means any activity not related to a
facility or port that involves the transfer of goods or persons from
one vessel to another.
    Waters subject to the jurisdiction of the U.S., for purposes of
this subchapter, means the navigable waters of the U.S., as defined in
46 U.S.C. 2101(17a); the Exclusive Economic Zone in respect to the
living and non-living resources therein; and in respect to facilities
located on the Outer Continental Shelf of the U.S., the waters
superadjacent thereto.

Sec.  101.110  Applicability.

    Unless otherwise specified, this subchapter applies to vessels,
structures, and facilities of any kind, located under, in, on, or
adjacent to waters subject to the jurisdiction of the U.S.

Sec.  101.115  Incorporation by reference.

    (a) Certain material is incorporated by reference into this
subchapter with the approval of the Director of the Federal Register
under 5 U.S.C. 552(a) and 1 CFR part 51. To enforce any edition other
than that specified in paragraph (b) of this section, the Coast Guard
must publish notice of change in the Federal Register and the material
must be available to the public. All approved material is on file at
the Office of the Federal Register, 800 North Capitol Street, NW.,
Suite 700, Washington, DC, and at the Office of the Coast Guard Port
Security Directorate (G-MP), Coast Guard Headquarters, 2100 Second
Street, SW., Washington, DC 20593-0001, and is available from the
sources indicated in paragraph (b) of this section.
    (b) The materials approved for incorporation by reference in this
subchapter are as follows:

International Maritime Organization (IMO)

    Publication Section, 4 Albert Embankment, London SE1 7SR, United
Kingdom.

Conference resolution 1, Adoption of        101.120; 101.310; 101.410;
 amendments to the Annex to the              101.505; 104.105; 104.115;
 International Convention for the Safety     104.120; 104.297; 104.400.
 of Life at Sea, 1974, and amendments to
 Chapter XI of SOLAS 1974, adopted
 December 12, 2002, (SOLAS Chapter XI-1 or
 SOLAS Chapter XI-2).
Conference resolution 2, Adoption of the    101.410; 101.505; 104.105;
 International Code for the Security of      104.115; 104.120; 104.297;
 Ships and of Port Facilities, parts A and   104.400.
 B, adopted on December 12, 2002 (ISPS
 Code).

Sec.  101.120  Alternatives.

    (a) Alternative Security Agreements. (1) The U.S. may conclude in
writing, as provided in SOLAS Chapter XI-2, Regulation 11 (Incorporated
by reference, see Sec.  101.115), a bilateral or multilateral
agreements with other Contracting Governments to SOLAS on Alternative
Security Arrangements covering short international voyages on fixed
routes between facilities subject to the jurisdiction of the U.S. and
facilities in the territories of those Contracting Governments.
    (2) As further provided in SOLAS Chapter XI-2, Regulation 11, a
vessel covered by such an agreement shall not conduct any vessel-to-
vessel activity with any vessel not covered by the agreement.
    (b) Alternative Security Programs. (1) Owners and operators of
vessels and facilities required to have security plans under part 104,
105, or 106 of this subchapter, other than vessels that engage on
international voyages and facilities that serve only vessels on
international voyages, may meet an Alternative Security Program that
has been reviewed and approved by the Commandant (G-MP) as meeting the
requirements of part 104, 105, or 106, as applicable.

[[Page 39282]]

    (2) Owners or operators must implement an approved Alternative
Security Program in its entirety to be deemed in compliance with either
part 104, 105, or 106.
    (3) Owners or operators who have implemented an Alternative
Security Program must send a letter to the appropriate plan approval
authority under part 104, 105, or 106 of this subchapter identifying
which Alternative Security Program they have implemented, identifying
those vessels or facilities that will implement the Alternative
Security Program, and attesting that they are in full compliance
therewith. A copy of this letter shall be retained on board the vessel
or kept at the facility to which it pertains along with a copy of the
Alternative Security Program.
    (c) Approval of Alternative Security Programs. You must submit to
the Commandant (G-MP) for review and approval the Alternative Security
Program and the following information to assess the adequacy of the
proposed Alternative Security Program:
    (1) A list of the vessel and facility type that the Alternative
Security Program is intended to apply;
    (2) A security assessment for the vessel or facility type;
    (3) Explanation of how the Alternative Security Program addresses
the requirements of parts 104, 105, or 106, as applicable; and
    (4) Explanation of how owners and operators must implement the
Alternative Security Program in its entirety, including performing an
operational and vessel or facility specific assessment and verification
of implementation.
    (d) The Commandant (G-MP) will examine each submission for
compliance with this part, and either:
    (1) Approve it and specify any conditions of approval, returning to
the submitter a letter stating its acceptance and any conditions, or
    (2) Disapprove it, returning a copy to the submitter with a brief
statement of the reasons for disapproval.

Sec.  101.125  Approved Alternative Security Programs. [Reserved]

Sec.  101.130  Equivalent security measures.

    (a) For any measure required by part 104, 105, or 106 of this
subchapter, the owner or operator may substitute an equivalent security
measure that has been approved by the Commandant (G-MP) as meeting or
exceeding the effectiveness of the required measure. The Commandant (G-
MP) may require that the owner or operator provide data for use in
assessing the effectiveness of the proposed equivalent security
measure.
    (b) Requests for approval of equivalent security measures should be
made to the appropriate plan approval authority under parts 104, 105 or
106 of this subchapter.

Subpart B--Maritime Security (MARSEC) Levels

Sec.  101.200  MARSEC Levels.

    (a) MARSEC Levels advise the maritime community and the public of
the level of risk to the maritime elements of the national
transportation system. Ports, under direction of the local COTP, will
respond to changes in the MARSEC Level by implementing the measures
specified in the AMS Plan. Similarly, vessels and facilities required
to have security plans under part 104, 105, or 106 of this subchapter
shall implement the measures specified in their security plans for the
applicable MARSEC Level.
    (b) Unless otherwise directed, each port, vessel, and facility
shall operate at MARSEC Level 1.
    (c) The Commandant will set the MARSEC Level consistent with the
equivalent Homeland Security Advisory System (HSAS) Threat Condition
and that Threat Condition's scope of application. Notwithstanding the
HSAS, the Commandant retains discretion to adjust the MARSEC Level when
necessary to address any particular security concerns or circumstances
related to the maritime elements of the national transportation system.
    (d) The COTP may temporarily raise the MARSEC Level for the port, a
specific marine operation within the port, or a specific industry
within the port, when necessary to address an exigent circumstance
immediately affecting the security of the maritime elements of the
transportation system in his/her area of responsibility.

Sec.  101.205  Department of Homeland Security alignment.

    The MARSEC Levels are aligned with the Department of Homeland
Security's Homeland Security Advisory System (HSAS), established by
Homeland Security Presidential Directive 3. Table 101.205, titled
``Relation between HSAS and MARSEC Levels'' in this section, shows this
alignment.

         Table 101.205.--Relation Between HSAS and MARSEC Levels
------------------------------------------------------------------------
  Homeland security advisory system       Equivalent maritime security
       (HSAS) threat condition                   (MARSEC) level
------------------------------------------------------------------------
Low: Green...........................  MARSEC Level 1.
Elevated: Blue.......................
Guarded: Yellow......................
------------------------------------------------------------------------
High: Orange.........................  MARSEC Level 2.
------------------------------------------------------------------------
Severe: Red..........................  MARSEC Level 3.
------------------------------------------------------------------------

Subpart C--Communication (Port--Facility--Vessel)

Sec.  101.300  Preparedness communications.

    (a) Notification of MARSEC Level change. The COTP will communicate
any changes in the MARSEC Levels through a local Broadcast Notice to
Mariners, a Maritime Security Directive issued under section 101.405 of
this part, or as detailed in the AMS Plan.
    (b) Communication of threats. When the COTP is made aware of a
threat that may cause a transportation security incident, the COTP
will, when appropriate, communicate to the port stakeholders, vessels,
and facilities in his or her AOR the following details:
    (1) Geographic area potentially impacted by the probable threat;
    (2) Any appropriate information identifying potential targets;
    (3) Onset and expected duration of probable threat;
    (4) Type of probable threat; and
    (5) Required actions to minimize risk.
    (c) Attainment. (1) Each owner or operator of a vessel or facility
required to have a security plan under parts 104 or 105 of this
subchapter affected by a change in the MARSEC Level must confirm to
their local COTP the attainment of measures or actions described in
their security plan and any other requirements imposed by the COTP that
correspond with the MARSEC Level being imposed by the change.
    (2) Each owner or operator of a facility required to have a
security plan under part 106 of this subchapter affected by a change in
the MARSEC Level must confirm to their cognizant District Commander the
attainment of measures or actions described in their security plan and
any other requirements imposed by the District Commander or COTP that
correspond with the MARSEC Level being imposed by the change.

Sec.  101.305  Reporting.

    (a) Notification of suspicious activities. An owner or operator
required to have a security plan under

[[Page 39283]]

part 104, 105, or 106 of this subchapter shall, without delay, report
activities that may result in a transportation security incident to the
National Response Center at the following toll free telephone: 1-800-
424-8802, direct telephone: 202-267-2675, fax: 202-267-2165, TDD: 202-
267-4477, or Email: lst-nrcinfo@comdt.uscg.mil.    Any other person or entity is also encouraged to report activities
that may result in a transportation security incident to the National
Response Center.
    (b) Notification of breaches of security. An owner or operator
required to have a security plan under parts 104, 105, or 106 of this
subchapter shall, without delay, report breaches of security to the
National Response Center via one of the means listed in paragraph (a)
of this section.
    (c) Notification of transportation security incident (TSI). (1) Any
owner or operator required to have a security plan under part 104 or
105 of this subchapter shall, without delay, report a TSI to their
local COTP and immediately thereafter begin following the procedures
set out in their security plan, which may include contacting the
National Response Center via one of the means listed in paragraph (a)
of this section.
    (2) Any owner or operator required to have a security plan under
part 106 of this subchapter shall, without delay, report a TSI to their
cognizant District Commander and immediately thereafter begin following
the procedures set out in their security plan, which may include
contacting the National Response Center via one of the means listed in
paragraph (a) of this section.
    (d) Callers to the National Response Center should be prepared to
provide as much of the following information as possible:
    (1) Their own name and contact information;
    (2) The name and contact information of the suspicious or
responsible party;
    (3) The location of the incident, as specifically as possible; and
    (4) The description of the incident or activity involved.

Sec.  101.310  Additional communication devices.

    (a) Alert Systems. Alert systems, such as the ship security alert
system required in SOLAS Chapter XI-2, Regulation 6 (Incorporated by
reference, see Sec.  101.115), may be used to augment communication and
may be one of the communication methods listed in a vessel or facility
security plan under part 104, 105, or 106 of this subchapter.
    (b) Automated Identification Systems (AIS). AIS may be used to
augment communication, and may be one of the communication methods
listed in a vessel security plan under part 104 of this subchapter. See
33 CFR part 164 for additional information on AIS device requirements.

Subpart D--Control Measures for Security

Sec.  101.400  Enforcement.

    (a) The rules and regulations in this subchapter are enforced by
the COTP under the supervision and general direction of the District
Commander, Area Commander, and the Commandant. All authority and power
vested in the COTP by the rules and regulations in this subchapter is
also vested in, and may be exercised by, the District Commander, Area
Commander, and the Commandant.
    (b) The COTP, District Commander, Area Commander, or Commandant may
assign the enforcement authority described in paragraph (a) of this
section to any other officer or petty officer of the Coast Guard or
other designees authorized by the Commandant.
    (c) The provisions in this subchapter do not limit the powers
conferred upon Coast Guard commissioned, warrant, or petty officers by
any other law or regulation, including but not limited to 33 CFR parts
6, 160, and 165.

Sec.  101.405  Maritime Security (MARSEC) Directives.

    (a)(1) When the Coast Guard determines that additional security
measures are necessary to respond to a threat assessment or to a
specific threat against the maritime elements of the national
transportation system, the Coast Guard may issue a MARSEC Directive
setting forth mandatory measures. Only the Commandant or his/her
delegee may issue MARSEC Directives under this section. Prior to
issuing a MARSEC Directive, the Commandant or his/her delegee will
consult with those Federal agencies having an interest in the subject
matter of that MARSEC Directive. All MARSEC Directives issued under
this section shall be marked as sensitive security information (SSI) in
accordance with 49 CFR part 1520.
    (2) When a MARSEC Directive is issued, the Coast Guard will
immediately publish a notice in the Federal Register, and affected
owners and operators will need to go to their local COTP or cognizant
District Commander to acquire a copy of the MARSEC Directive. COTPs and
District Commanders will require the owner or operator to prove that
they have a ``need to know'' the information in the MARSEC Directive
and that they are a ``covered person,'' as those terms are defined in
49 CFR part 1520.
    (b) Each owner or operator of a vessel or facility to whom a MARSEC
Directive applies is required to comply with the relevant instructions
contained in a MARSEC Directive issued under this section within the
time prescribed by that MARSEC Directive.
    (c) Each owner or operator of a vessel or facility required to have
a security plan under parts 104, 105 or 106 of this subchapter that
receives a MARSEC Directive must:
    (1) Within the time prescribed in the MARSEC Directive, acknowledge
receipt of the MARSEC Directive to their local COTP or, if a facility
regulated under part 106 of this subchapter, to their cognizant
District Commander; and
    (2) Within the time prescribed in the MARSEC Directive, specify the
method by which the measures in the MARSEC Directive have been
implemented (or will be implemented, if the MARSEC Directive is not yet
effective).
    (d) In the event that the owner or operator of a vessel or facility
required to have a security plan under part 104, 105, or 106 of this
subchapter is unable to implement the measures in the MARSEC Directive,
the owner or operator must submit proposed equivalent security measures
and the basis for submitting the equivalent security measures to the
COTP or, if a facility regulated under part 106 of this subchapter, to
their cognizant District Commander, for approval.
    (e) The owner or operator must submit the proposed equivalent
security measures within the time prescribed in the MARSEC Directive.
The owner or operator must implement any equivalent security measures
approved by the COTP, or, if a facility regulated under part 106 of
this subchapter, by their cognizant District Commander.

Sec.  101.410  Control and Compliance Measures.

    (a) The COTP may exercise authority pursuant to 33 CFR parts 6, 160
and 165, as appropriate, to rectify non-compliance with this
subchapter. COTPs or their designees are the officers duly authorized
to exercise control and compliance measures under SOLAS Chapter XI-2,
Regulation 9, and the ISPS Code (Incorporated by reference, see Sec.
101.115).
    (b) Control and compliance measures for vessels not in compliance
with this

[[Page 39284]]

subchapter may include, but are not limited to, one or more of the
following:
    (1) Inspection of the vessel;
    (2) Delay of the vessel;
    (3) Detention of the vessel;
    (4) Restriction of vessel operations;
    (5) Denial of port entry;
    (6) Expulsion from port;
    (7) Lesser administrative and corrective measures; or
    (8) For U.S. vessels, suspension or revocation of security plan
approval, thereby making that vessel ineligible to operate in, on, or
under waters subject to the jurisdiction of the U.S. in accordance with
46 U.S.C. 70103(c)(5).
    (c) Control and compliance measures for facilities not in
compliance with this subchapter may include, but are not limited to,
one or more of the following:
    (1) Restrictions on facility access;
    (2) Conditions on facility operations;
    (3) Suspension of facility operations;
    (4) Lesser administrative and corrective measures; or
    (5) Suspension or revocation of security plan approval, thereby
making that facility ineligible to operate in, on, under or adjacent to
waters subject to the jurisdiction of the U.S. in accordance with 46
U.S.C. 70103(c)(5).
    (d) Control and compliance measures under this section may be
imposed on a vessel when it has called on a facility or at a port that
does not maintain adequate security measures to ensure that the level
of security to be achieved by this subchapter has not been compromised.

Sec.  101.415  Penalties.

    (a) Civil and criminal penalty. Violation of any order or other
requirement imposed under section 101.405 of this part is punishable by
the civil and criminal penalties prescribed in 33 U.S.C. 1232 or 50
U.S.C. 192, as appropriate.
    (b) Civil penalty. As provided in 46 U.S.C. 70117, any person who
does not comply with any other applicable requirement under this
subchapter, including a Maritime Security Directive, shall be liable to
the U.S. for a civil penalty of not more than $ 25,000 for each
violation. Enforcement and administration of this provision will be in
accordance with 33 CFR 1.07.

Sec.  101.420  Right to appeal.

    (a) Any person directly affected by a decision or action taken by a
COTP under this subchapter, may appeal that action or decision to the
cognizant District Commander according to the procedures in 46 CFR
1.03-15.
    (b) Any person directly affected by a decision or action taken by a
District Commander, whether made under this subchapter generally or
pursuant to paragraph (a) of this section, may be appealed to the
Commandant (G-MP), according to the procedures in 46 CFR 1.03-15.
    (c) Any person directly affected by a decision or action taken by
the Commanding Officer, Marine Safety Center, under this subchapter,
may appeal that action or decision to the Commandant (G-MP) according
to the procedures in 46 CFR 1.03-15.
    (d) Decisions made by Commandant (G-MP), whether made under this
subchapter generally or pursuant to the appeal provisions of this
section, are considered final agency action.

Subpart E--Other Provisions

Sec.  101.500  Procedures for authorizing a Recognized Security
Organization (RSO). [Reserved]

Sec.  101.505  Declaration of Security (DoS).

    (a) The purpose of a DoS, as described in SOLAS Chapter XI-2,
Regulation 10, and the ISPS Code (Incorporated by reference, see Sec.
101.115), is to state the agreement reached between a vessel and a
facility, or between vessels in the case of a vessel-to-vessel
activity, as to the respective security measures each must undertake
during a specific vessel-to-facility interface, during a series of
interfaces between the vessel and the facility, or during a vessel-to-
vessel activity.
    (b) Details as to who must complete a DoS, when a DoS must be
completed, and how long a DoS must be retained are included in parts
104 through 106 of this subchapter.
    (c) All vessels and facilities required to comply with parts 104,
105, and 106 of this subchapter must, at a minimum, comply with the DoS
requirements of the MARSEC Level set for the port.
    (d) The COTP may also require a DoS be completed for vessels and
facilities during periods of critical port operations, special marine
events, or when vessels give notification of a higher MARSEC Level than
that set in the COTP's Area of Responsibility (AOR).

Sec.  101.510  Assessment tools.

    Ports, vessels, and facilities required to conduct risk assessments
by part 103, 104, 105, or 106 of this subchapter may use any assessment
tool that meets the standards set out in part 103, 104, 105, or 106, as
applicable. These tools include:
    (a) DHS/TSA's vulnerability self-assessment tool located at http://www.tsa.gov/risk
; and
    (b) USCG assessment tools, available from the cognizant COTP or at
http://www.uscg.mil/hq/g-m/nvic, as set out in the following:
    (1) Navigation and Vessel Inspection Circular titled, ``Guidelines
for Port Security Committees, and Port Security Plans Required for U.S.
Ports'' (NVIC 9-02);
    (2) Navigation and Vessel Inspection Circular titled, ``Security
Guidelines for Vessels'', (NVIC 10-02); and
    (3) Navigation and Vessel Inspection Circular titled, ``Security
Guidelines for Facilities'', (NVIC 11-02).

Sec.  101.515  Personal identification.

    (a) Any personal identification credential accepted under the
access control provisions of this subchapter must, at a minimum, meet
the following requirements:
    (1) Be laminated or otherwise secure against tampering;
    (2) Contain the individual's full name (full first and last names,
middle initial is acceptable);
    (3) Contain a photo that accurately depicts that individual's
current facial appearance; and
    (4) Bear the name of the issuing authority.
    (b) The issuing authority in paragraph (a)(4) of this section must
be:
    (1) A government authority, or an organization authorized to act on
behalf of a government authority; or
    (2) The individual's employer, union, or trade association.

PART 102--NATIONAL MARITIME TRANSPORTATION SECURITY [RESERVED]

    Dated: June 23, 2003.
Thomas H. Collins,
Admiral, Coast Guard Commandant.
[FR Doc. 03-16186 Filed 6-27-03; 8:45 am]

BILLING CODE 4910-15-U


[Federal Register: July 1, 2003 (Volume 68, Number 126)]
[Rules and Regulations]
[Page 39284-39292]
From the Federal Register Online via GPO Access [wais.access.gpo.gov]
[DOCID:fr01jy03-15]

-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

Coast Guard

33 CFR Part 103

[USCG-2003-14733]
RIN 1625-AA42


Area Maritime Security

AGENCY: Coast Guard, DHS.

ACTION: Temporary interim rule with request for comments and notice of
meeting.

-----------------------------------------------------------------------

SUMMARY: This interim rule establishes U.S. Coast Guard Captains of the
Ports as Federal Maritime Security Coordinators, and establishes

[[Page 39285]]

requirements for Area Maritime Security Plans and Area Maritime
Security Committees. This rule is one of six interim rules in today's
Federal Register that comprise a new subchapter on the requirements for
maritime security mandated by the Maritime Transportation Security Act
of 2002. These six interim rules implement national maritime security
initiatives concerning general provisions, Area Maritime Security
(ports), vessels, facilities, Outer Continental Shelf facilities, and
the Automatic Identification System. Where appropriate, they align
domestic maritime security requirements with those of the International
Ship and Port Facility Security Code and recent amendments to the
International Convention for the Safety of Life at Sea. To best
understand these interim rules, first read the interim rule titled
``Implementation of National Maritime Security Initiatives'' (USCG-
2003-14792).

DATES: Effective date. This interim rule is effective from July 1, 2003
until November 25, 2003.
    Comments. Comments and related material must reach the Docket
Management Facility on or before July 31, 2003. Comments on collection
of information sent to the Office of Management and Budget (OMB) must
reach OMB on or before July 31, 2003.
    Meeting. A public meeting will be held on July 23, 2003, from 9
a.m. to 5 p.m., in Washington, DC.

ADDRESSES: Comments. To ensure that your comments and related material
are not entered more than once in the docket, please submit them by
only one of the following means:
    (1) Electronically to the Docket Management System website at
http://dms.dot.gov.
    (2) By mail to the Docket Management Facility (USCG-2003-14733),
U.S. Department of Transportation, room PL-401, 400 Seventh Street,
SW., Washington, DC 20590-0001.
    (3) By fax to the Docket Management Facility at (202) 493-2251.
    (4) By delivery to room PL-401 on the Plaza level of the Nassif
Building, 400 Seventh Street SW., Washington, DC between 9 a.m. and 5
p.m., Monday through Friday, except Federal holidays. The telephone
number is (202) 366-9329.
    You must also mail comments on collection of information to the
Office of Information and Regulatory Affairs, Office of Management and
Budget, 725 17th Street NW., Washington, DC 20503, ATTN: Desk Officer,
U.S. Coast Guard.
    Meeting. A public meeting will be held on July 23, 2003 in
Washington, DC at the Grand Hyatt Washington, D.C., 1000 H Street, NW.,
Washington, DC 20001.

FOR FURTHER INFORMATION CONTACT: If you have questions on this rule,
call Lieutenant Commander Richard Teubner, U.S. Coast Guard by
telephone (202) 267-1103, toll-free telephone 1-800-842-8740 ext. 7-
1103, or electronic mail msregs@comdt.uscg.mil. If you have questions
on viewing or submitting material to the docket, call Ms. Dorothy
Beard, Chief, Dockets, Department of Transportation, at (202) 366-5149.

SUPPLEMENTARY INFORMATION: Due to the short timeframe given to
implement these National Maritime Transportation Security initiatives,
as directed by the Maritime Transportation Security Act (MTSA) of 2002
(MTSA, Public Law 107-295, 116 STAT. 2064), and to ensure all comments
are in the public venue for these important rulemakings, we are not
accepting comments containing protected information for these interim
rules. We request you submit comments, as explained in the Request for
Comments section below, and discuss your concerns or support in a
manner that is not security sensitive. We also request that you not
submit proprietary information as part of your comment.
    The Docket Management Facility maintains the public docket for this
rulemaking. Comments and material received from the public, as well as
documents mentioned in this preamble as being available in the docket,
will be available for inspection or copying at room PL-401 on the Plaza
level of the Nassif Building, 400 Seventh Street, SW., Washington, DC,
between 9 a.m. and 5 p.m., Monday through Friday, except Federal
holidays. You may also find this docket on the Internet at http://dms.dot.gov
.
    Electronic forms of all comments received into any of our dockets
can be searched by the name of the individual submitting the comment
(or signing the comment, if submitted on behalf of an association,
business, labor unit, etc.) and is open to the public without
restriction. You may also review the Department of Transportation's
complete Privacy Act Statement published in the Federal Register on
April 11, 2000 (65 FR 19477-78), or you may visit http://dms.dot.gov/.

Request for Comments

    We encourage you to participate in this rulemaking by submitting
comments and related material. Your comments will be considered for the
final rule we plan to issue before November 25, 2003, to replace this
interim rule. If you choose to comment on this rule, please include
your name and address, identify the specific docket number for this
interim rule (USCG-2003-14733), indicate the specific heading of this
document to which each comment applies, and give the reason for each
comment. If you have comments on another rule, please submit those
comments in a separate letter to the docket for that rulemaking. You
may submit your comments and material by mail, hand delivery, fax, or
electronic means to the Docket Management Facility at the address under
ADDRESSES. Please submit your comments and material by only one means.
If you submit them by mail or hand delivery, submit them in an unbound
format, no larger than 8\1/2\ by 11 inches, suitable for copying and
electronic filing. If you submit them by mail and would like to know
that they reached the Facility, please enclose a stamped, self-
addressed postcard or envelope. We will consider all comments and
material received during the comment period. We may change this rule in
view of them.

Public Meeting

    We will hold a public meeting on July 23, 2003, in Washington, DC
at the Grand Hyatt Hotel, at the address listed under ADDRESSES. The
meeting will be from 9 a.m. to 5 p.m. to discuss all of the maritime
security interim rules, and the Automatic Identification System (AIS)
interim rule, found in today's Federal Register. In addition, you may
submit a request for other public meetings to the Docket Management
Facility at the address under ADDRESSES explaining why another one
would be beneficial. If we determine that other meetings would aid this
rulemaking, we will hold them at a time and place announced by a later
notice in the Federal Register.

Regulatory Information

    We did not publish a notice of proposed rulemaking for this
rulemaking and are making this rule effective upon publication. Section
102(d)(1) of the MTSA of 2002 (Pub. L. 107-295, 116 STAT. 2064)
requires the publication of an interim rule as soon as practicable
without regard to the provisions of chapter 5 of title 5, U.S. Code
(Administrative Procedure Act). The Coast Guard finds that
harmonization of U.S. regulations with maritime security measures
adopted by the International Maritime Organization (IMO) in December
2002, and the need to institute measures for the protection

[[Page 39286]]

of U.S. maritime security as soon as practicable, furnish good cause
for this interim rule to take effect immediately under both the
Administrative Procedure Act and section 808 of the Congressional
Review Act.

Background and Purpose

    A summary of the Coast Guard's regulatory initiatives for maritime
security can be found under the Background and Purpose section in the
preamble to the interim rule titled: ``Implementation of National
Maritime Security Initiatives'' (USCG-2003-14792), published elsewhere
in this issue of the Federal Register.

Discussion of Comments Addressing Port Issues in the Notice of Meeting
Docket

    For a discussion of comments on ports at the public meetings and in
the docket, see the interim rule titled: ``Implementation of National
Maritime Security Initiatives'' (USCG-2003-14792), published elsewhere
in today's issue of the Federal Register.

Discussion of Interim Rule

    This interim rule adds part 103--Area Maritime Security to a new
Subchapter H of Title 33 of the Code of Federal Regulations. This
interim rule integrates port security-related requirements in the MTSA
of 2002 and the International Ship and Port Facility Security (ISPS)
Code. In the MTSA, the port security-related requirements are contained
in the elements that address Area Maritime Security Plans and Federal
Maritime Security Coordinators. In the ISPS Code, the port security-
related requirements are contained in elements that address Port
Facility Security Plans and Port Facility Security Officers. A detailed
discussion on the MTSA and the ISPS Code and the need for these
regulations can be found in the interim rule titled: ``Implementation
of National Maritime Security Initiatives'' (USCG-2003-14792),
published elsewhere in today's Federal Register.
    Part 103--Port Security is composed of the following five subparts.

Subpart A--General.

    This subpart applies to all vessels and facilities located in, on,
under, or adjacent to waters subject to the jurisdiction of the U.S. A
detailed discussion on applicability can be found in the interim rule
titled: ``Implementation of National Maritime Security Initiatives''
(USCG-2003-14792), published elsewhere in today's Federal Register.
    The MTSA and the International Ship and Port Facility Security
(ISPS) Code use different terms to define similar, if not identical,
persons or things. These differing terms sometimes match up with the
terms used in subchapter H, but sometimes they do not. For a table of
the terms used in subchapter H and their related terms in the MTSA and
the ISPS Code, see the Discussion of Interim Rule section in the
preamble for the interim rule titled ``Implementation of National
Maritime Security Initiatives'' (USCG-2003-14792), published elsewhere
in today's Federal Register.
    To provide flexibility and a systems approach to security measures
for certain areas, we will allow several Area Maritime Security Plans
to be combined, if appropriate. This strategy is currently being used
to combine the inland river systems into one Area Maritime Security
Plan; a similar system-wide concept is being developed for the Great
Lakes. In addition, Outer Continental Shelf (OCS) facilities in the
Gulf of Mexico will be covered by a single, district-wide plan
implemented by the Eighth Coast Guard District. This process includes
using each Area Maritime Security Assessment to form building blocks
that will be used to create a system-wide security plan methodology
that identifies vulnerabilities and consequences to be mitigated using
regional strategies and resources. The resulting Area Maritime Security
Plan will be a single document that provides consistent security
measures throughout multiple Captain of the Port (COTP) zones.

Subpart B--Federal Maritime Security Coordinator (FMSC) Designation and
Authorities.

    This subpart designates the Coast Guard COTP as the Federal
Maritime Security Coordinator. This designation, along with a
description of the COTP's authority as Federal Maritime Security
Coordinator to establish, convene, and direct the Area Maritime
Security (AMS) Committee, fulfills the MTSA requirement to designate a
Coast Guard official as the Federal Maritime Security Coordinator.

Subpart C--Area Maritime Security (AMS) Committee.

    This subpart describes the composition and responsibilities of the
AMS Committee. The AMS Committee brings appropriately experienced
representatives from a variety of sources in the port together to
continually assess security risks to the port and determine appropriate
risk mitigation strategies, develop, revise, and implement the AMS
Plan. The AMS Committee may also be the mechanism by which security
threats and changes in Maritime Security (MARSEC) Levels are
communicated to port stakeholders. AMS Committee membership
requirements and terms of office align with the criteria established in
the MTSA for ``Area Maritime Security Advisory Committees.'' Port
Security Committees, such as those operating under the guidelines of
U.S. Coast Guard Navigation and Vessel Inspection Circular (NVIC) 9-02,
that were established prior to the publication of this rule, are
considered AMS Committees, provided they conform to the procedures set
forth in these rules. The AMS Committee members may include, but are
not limited to, the following stakeholders: U.S. Coast Guard, Federal,
State, and local law enforcement, emergency response and public safety
organizations, recreational vessel associations, environmental response
organizations, labor organizations, port managers, and vessel and
facility owner/operator security representatives. There must at least
seven members in the AMS Committee however; there could be as many as
200 or more representatives.

Subpart D--Area Maritime Security (AMS) Assessment.

    This subpart directs the AMS Committee to ensure development of a
risk-based AMS Assessment. The AMS Assessment is the important first
step in developing an AMS Plan. This subpart lists the essential
elements of an AMS Assessment, and these provisions are consistent with
the elements of a ``port facility security assessment'' set forth in
the ISPS Code. The AMS Assessment may be conducted by the AMS Committee
members themselves or by persons acting on behalf of the AMS Committee.
This subpart also establishes the skills and knowledge that persons
conducting an AMS Assessment must possess. This subpart further
identifies the process of evaluations that must be performed in the
course of conducting the AMS Assessment: identification of activities
or operations critical to the port area; a threat assessment; a
consequence and vulnerability assessment; a categorization of each
target/scenario combination; and measures that will be implemented at
all MARSEC Levels. This process is consistent with the Port Security
Assessment model identified in NVIC 9-02.
    The following is a list of activities, operations, and
infrastructure that may require assessment in the development of the
AMS Plan: Highway bridges, railroad bridges, stadiums, tourist
attractions, significant symbolic structures, commercial attractions,

[[Page 39287]]

marinas, fishing vessels, recreational boats, airports, nuclear
facilities, power plants, oil and gas pipelines, anchorages, mid-stream
operations (e.g., bunkering), under-and-over water cables,
communication networks, utilities providing service to key
transportation assets, barge-fleeting areas, oil and gas production
platforms, tunnels, non-regulated vessels, non-regulated facilities,
Outer Continental Shelf (OCS) facilities, lock and dams, public water
supplies (e.g., aqueducts), boat ramps, docks, un-inspected commercial
vessels, passenger terminals, grain and aggregate facilities, ship
yards, rail yards, tank farms, dikes, levees, sewer and water utility
facilities, major marine or special events, waterways. Additional
consideration should be given to the criticality of port operations as
they relate to vessels and facilities that are directly regulated in
parts 104 through 106 of Subchapter H.
    The Coast Guard has also funded and contracted Port Security
Assessments (PSA) in certain port areas throughout the U.S. The Coast
Guard-sponsored PSA team, when completing the PSA, should review the
AMS Assessment and AMS Plan for content and consistency. As part of the
PSA, recommendations will be made to the COTP on strategies to improve
their AMS Plan in the port area that was covered by the PSA. These
recommendations will be part of the AMS Plan review process to ensure
the AMS Committee becomes aware of the PSA results and revises the AMS
Plan appropriately.

Subpart E--Area Maritime Security (AMS) Plan

    The AMS Plan is primarily a communication and coordination
document. This subpart establishes the core elements of the AMS Plan
and its relationship to other plans. Core elements include: Details of
operational and physical measures that must be in place at all MARSEC
Levels; expected timeframes for responding to security threats and
changes of MARSEC Levels; communications procedures; measures to ensure
the security of vessels, facilities, and operations that are not
covered by the security requirements in other parts of this subchapter;
measures to ensure the security of the information in the AMS Plan;
periodic review, audit, and updating procedures; and procedures for
reporting security incidents. These requirements are consistent with
the elements of a ``port facility security plan'' established in the
ISPS Code.
    This subpart also describes the review and approval process for the
AMS Plan. The COTP will submit an AMS Plan to the cognizant District
Commander for review, with the Area Commander, or his/her designee,
having the authority to approve or disapprove the plan. Approving
officers may require additional assessment, mitigation strategies, or
other measures by parties subject to Coast Guard jurisdiction as a
condition of approving AMS Plans. This review chain has been
established to promote plan coordination and consistency within and
among Coast Guard Districts and Areas. AMS Plans will form the basis
for the National Maritime Transportation Security Plan, established in
the MTSA, and will be consistent with the National Transportation
Security Plan. This subpart establishes exercise requirements under the
AMS Plan. Exercises are an important way to improve system performance
and ensure the AMS Plan remains current.
    Although the exercise requirements established in this interim rule
may be satisfied by a tabletop exercise, as our experience with AMS
Plans matures, it may be desirable to require periodic field training
exercises for the future. Therefore, public comment is requested on a
requirement to conduct a maritime security field training exercise in
each area covered by an AMS Plan at least once every 3 years. A
maritime security field training exercise would require the deployment
of personnel and equipment in accordance with the AMS Plan for the
transportation security incident used for the exercise scenario. The
purpose of the field training exercise would include: Evaluating the
adequacy of the AMS Plan, exercising coordination and interoperability
between responding security forces and exercising coordination and
interoperability amongst command personnel of responding agencies
(i.e., Unified Command) as well as their ability to effectively command
and control the response to the transportation security incident. The
maritime security field training exercise may be combined with other
exercises (e.g., National Preparedness for Response Program (PREP) area
exercises) provided a significant security/terrorist attack aspect is
included in the scenario.
    Finally, this subpart prescribes AMS Assessment and AMS Plan
records to be maintained by the COTP for 5 years, and exercise records
for 2 years.

Regulatory Assessment

    This rule is a ``significant regulatory action'' under section 3(f)
of Executive Order 12866, Regulatory Planning and Review, and has been
reviewed by the Office of Management and Budget under that Order. It
requires an assessment of potential costs and benefits under section
6(a)(3) of that Order. It is significant under the regulatory policies
and procedures of the Department of Homeland Security. An Assessment is
available in the docket as indicated under ADDRESSES. A summary of the
Assessment follows:

Cost Assessment

    This rule will affect stakeholders in 47 maritime areas containing
361 ports. The regulatory assessment and analysis documentation (see
docket) details estimated costs to public and private stakeholders and
does not include costs to the Coast Guard.
    The total cost estimate of the rule, as it pertains to AMS, is
present value (PV) $477 million (2003-2012, 7 percent discount rate).
The initial cost of the startup period (June 2003-December 2003) for
establishing AMS Committees and creating AMS Plans is estimated to be
$120 million (non-discounted) for all areas. Following the startup
period, the first year of implementation (2004), consisting of monthly
AMS Committee meetings and AMS Plan exercises and drills for all areas,
is estimated to be $106 million (non-discounted). After the first year
of implementation, the annual cost of quarterly AMS Committee meetings
and AMS Plan exercises and drills for all areas is estimated to be $46
million (non-discounted). The startup period cost associated with
creating AMS Committees and AMS Plans for each area is the primary cost
driver of the rule. Both the startup and implementation year period
(2003-2004) combined is nearly half of the total 10-year PV cost
estimate, making initial development, planning, and testing the primary
costs of Area Maritime Security.
    This rule will require all COTPs to establish security committees,
plans, training drills, and exercises for their areas, with the
participation of port stakeholders in their areas. The above costs to
stakeholders will be paperwork, travel, and communication costs
associated with participation in AMS Plan implementation.
    We estimate 1,203,200 hours of paperwork and other associated
planning activities during 2003, the initial period of security
meetings and development. In 2004, the first year of implementation, we
estimate the value will fall slightly to 1,090,400 hours of paperwork
and other related information and communication activities related to
monthly AMS Committee meetings. In subsequent years, we estimate the
hours will fall to 488,800 hours--annually associated

[[Page 39288]]

with AMS Committee meetings, AMS Plan revisions, and information
exercises and drills.

Benefit Assessment

    This interim rule is one of six interim rules that implement
national maritime security initiatives concerning general provisions,
Area Maritime Security (ports), vessels, facilities, Outer Continental
Shelf (OCS) facilities, and the Automatic Identification System (AIS).
The Coast Guard used the National Risk Assessment Tool (N-RAT) to
assess benefits that would result from increased security for vessels,
facilities, Outer Continental Shelf (OCS) facilities, and ports. The N-
RAT considers threat, vulnerability, and consequences for several
maritime entities in various security-related scenarios. For a more
detailed discussion on the N-RAT and how we employed this tool, refer
to ``Applicability of National Maritime Security Initiatives'' in the
interim rule titled ``Implementation of National Maritime Security
Initiatives'' (USCG-2003-14792) published elsewhere in today's Federal
Register. For this benefit assessment, the Coast Guard used a team of
experts to calculate a risk score for each entity and scenario before
and after the implementation of required security measures. The
difference in before and after scores indicates the benefit of the
proposed action.
    We recognized that the interim rules are a ``family'' of rules that
will reinforce and support one another in their implementation. We must
ensure, however, that risk reduction that is credited in one rulemaking
is not also credited in another. For a more detailed discussion on the
benefit assessment and how we addressed the potential to double-count
the risk reduced, refer to Benefit Assessment in the interim rule
titled ``Implementation of National Maritime Security Initiatives''
(USCG-2003-14792) published elsewhere in today's Federal Register.
    We determined annual risk points reduced for each of the six
interim rules using the N-RAT. The benefits are apportioned among the
Vessel, Facility, OCS Facility, AMS, and AIS requirements. As shown in
Table 1, the implementation of AMS Plans for the affected population
reduces 135,202 risk points annually through 2012. The benefits
attributable for part 101--General Provisions--were not considered
separately since it is an overarching section for all the parts.

                           Table 1.--Annual Risk Points Reduced by the Interim Rules.
----------------------------------------------------------------------------------------------------------------
                                                     Annual risk points reduced by rulemaking
                                 -------------------------------------------------------------------------------
         Maritime entity              Vessel         Facility      OCS facility
                                  security plans  security plans  security plans     AMS plans          AIS
----------------------------------------------------------------------------------------------------------------
Vessels.........................         778,633           3,385           3,385           3,385           1,448
Facilities......................           2,025         469,686  ..............           2,025  ..............
OCS Facilities..................              41  ..............           9,903  ..............  ..............
Port Areas......................             587             587  ..............         129,792             105
=================================
----------------------------------------------------------------------------------------------------------------

    Once we determined the annual risk points reduced, we discounted
these estimates to their PV (7 percent discount rate, 2003-2012) so
that they could be compared to the costs. We presented the cost
effectiveness, or dollars per risk point reduced, in two ways: First,
we compared the first-year cost and first-year benefit because the
first-year cost is the highest in our assessment as companies develop
security plans and purchase equipment. Second, we compared the 10-year
PV cost to the 10-year PV benefit. The results of our assessment are
presented in Table 2.

                    Table 2.--First-Year and 10-Year PV Cost and Benefit of the Interim rules
----------------------------------------------------------------------------------------------------------------
                                                                           Interim rule
                                                ----------------------------------------------------------------
                                                                               OCS
                      Item                          Vessel      Facility     facility
                                                   security     security     security    AMS plans      AIS *
                                                    plans        plans        plans
----------------------------------------------------------------------------------------------------------------
First-Year Cost (millions).....................         $218       $1,125           $3         $120          $41
First-Year Benefit.............................      781,285      473,659       13,288      135,202        1,553
First-Year Cost Effectiveness ($/Risk Point             $279       $2,375         $205         $890      $26,391
 Reduced)......................................
10-Year PV Cost (millions).....................       $1,368       $5,399          $37         $477          $42
10-Year PV Benefit.............................    5,871,540    3,559,655       99,863    1,016,074       11,671
10-Year PV Cost Effectiveness ($/Risk Point             $233       $1,517         $368         $469      $3,624
 Reduced)......................................
----------------------------------------------------------------------------------------------------------------
* Cost less monetized safety benefit.

Small Entities

    Under the Regulatory Flexibility Act (5 U.S.C. 601-612), we have
considered whether this rule would have a significant economic impact
on a substantial number of small entities. The term ``small entities''
comprises small businesses, not-for-profit organizations that are
independently owned and operated and are not dominant in their fields,
and governmental jurisdictions with populations of less than 50,000.
    The stakeholders affected by this rule include a variety of
businesses and governments. The COTP will designate approximately 200
stakeholders, per maritime area, to engage in security planning,
meetings, and drills. Full participation by these stakeholders will be
voluntary. We estimate the first-year cost, per stakeholder, to be
$12,800 (non-discounted). In subsequent years, the annual cost, per
stakeholder (full participation in this rule), falls to $4,940 (non-
discounted).
    The results from our assessment (copy available in the docket)
suggest that the impact of this rule is not significant for port and
maritime area authorities,

[[Page 39289]]

owners, or operators because of the low average annual cost per
stakeholder and the voluntary nature of participating in this rule.
    We estimated the majority of small entities have a less than 3
percent impact on revenue if they choose to fully participate in this
rule. We anticipate the few remaining small entities that may have a
greater than 3 percent impact on annual revenue will either opt out
(not participate) or partially participate in the rule to the extent
that the impact on revenue is not a burden.
    There are other stakeholders affected by this rule in addition to
port authorities, owners, and operators. The stakeholders could be any
entity that the COTP invites to partially or fully participate. We
anticipate the impact on other possible small entity stakeholders to be
minimal because of the low average annual cost per stakeholder and the
voluntary nature of participating in this rule.
    Therefore, the Coast Guard certifies, under 5 U.S.C. 605(b), that
this rule will not have a significant economic impact on a substantial
number of small entities. If you think that your business,
organization, or governmental jurisdiction qualifies as a small entity
and that this rule will have a significant economic impact on it,
please submit a comment to the Docket Management Facility at the
address under ADDRESSES. In your comment, explain why you think it
qualifies and how and to what degree this rule would economically
affect it.

Assistance for Small Entities

    Under section 213(a) of the Small Business Regulatory Enforcement
Fairness Act of 1996 (Pub. L. 104-121), we want to assist small
entities in understanding this rule so that they can better evaluate
its effects on them and participate in the rulemaking. If the rule
would affect your small business, organization, or governmental
jurisdiction, and you have questions concerning its provisions or
options for compliance, please consult LCDR Richard Teubner, USCG-MPS-2
by telephone, 202-267-1103, toll-free telephone, 1-800-842-8740 ext. 7-
1103, or electronic mail, msregs@comdt.uscg.mil.    Small businesses may send comments on the actions of Federal
employees who enforce, or, otherwise determine compliance with, Federal
regulations to the Small Business and Agriculture Regulatory
Enforcement Ombudsman and the Regional Small Business Regulatory
Fairness Boards. The Ombudsman evaluates these actions annually and
rates each agency's responsiveness to small business. If you wish to
comment on actions by employees of the Coast Guard, call 1-888-REG-FAIR
(1-888-734-3247).

Collection of Information

    This rule calls for a collection of information under the Paperwork
Reduction Act of 1995 (44 U.S.C. 3501-3520). As defined in 5 CFR
1320.3(c), ``collection of information'' comprises reporting,
recordkeeping, monitoring, posting, labeling, and other, similar
actions. It modifies an existing OMB-approved collection--1625-0077
[formerly 2115-0622]. A summary of the revised collection follows.
    Title: Security Plans for Ports, Vessels, Facilities, and Outer
Continental Shelf Facilities and Other Security-Related Requirements.
    OMB Control Number: 1625-0077
    Summary of the Collection of Information: The Coast Guard requires
security plans and communication procedures for U.S. ports and maritime
areas. This rule provides a framework to ensure adequate security
planning, exercises, drilling, and communication procedures by inviting
port and maritime area stakeholders (at the discretion of the COTP) to
participate in security planning events including, but not limited to,
meetings and information drills as detailed in part 103.
    Need for Information: The primary need for information would be to
determine if stakeholders are in compliance with security standards.
    Proposed Use of Information: This information can help to determine
appropriate security measures for the affected population. This
information also can help determine, in the case of a transportation
security incident, whether failure to meet these regulations
contributed to the transportation security incident.
    Description of the Respondents: This rule will affect approximately
200 stakeholders in 47 maritime areas containing 361 ports. The
respondents are public and private stakeholders in the affected port
areas (at the discretion of the COTP).
    Number of Respondents: 9,400 (200 stakeholders in 47 maritime
areas).
    Frequency of Response: Varies. Initial AMS Plan planning occurs
throughout the first year on an undefined schedule. AMS Committee
meetings may occur monthly in the first two years of this rule with
quarterly AMS Committee meetings in subsequent years. Frequency of AMS
Committee meetings is established in the AMS Committee Charter. After
the first year, AMS Plan exercises occur once each calendar year with
no more than 18 months between exercises.
    Burden of Response: The burden of response is approximately 128
hours for the first year per stakeholder. The second year burden of
response is 116 hours per stakeholder. In the subsequent years, the
annual burden of response is approximately 52 hours per stakeholder.
    Estimate of Total Annual Burden: During the initial year the burden
will be 1,203,200 hours. Subsequently, the average annual reporting
burden is 488,800 hours for all stakeholders in all 47 COTP zones. For
a summary of all revisions to this existing OMB-approved collection,
refer to Collection of Information in the interim rule titled
``Implementation of National Maritime Security Initiatives'' (USCG-
2003-14792) published elsewhere in today's Federal Register.
    As required by the Paperwork Reduction Act of 1995 (44 U.S.C.
3507(d)), we have submitted a copy of this rule to OMB for its review
of the collection of information. Due to the circumstances surrounding
this temporary rule, we asked for ``emergency processing'' of our
request. We received OMB approval for the collection of information on
June 16, 2003. It is valid until December 31, 2003.
    We ask for public comment on the collection of information to help
us determine how useful the information is; whether it can help us
perform our functions better; whether it is readily available
elsewhere; how accurate our estimate of the burden of collection is;
how valid our methods for determining burden are; how we can improve
the quality, usefulness, and clarity of the information; and how we can
minimize the burden of collection.
    If you submit comments on the collection of information, submit
them both to OMB and to the Docket Management Facility where indicated
under ADDRESSES, by the date under DATES.
    You need not respond to a collection of information, unless it
displays a currently valid control number from OMB. We received OMB
approval for the collection of information on June 16, 2003. It is
valid until December 31, 2003.

Federalism

    A rule has implications for federalism under Executive Order 13132,
Federalism, if it has a substantial direct effect on State or local
governments and would either preempt State law or impose a substantial
direct cost of compliance on them. See the Federalism section in the
preamble to the interim

[[Page 39290]]

rule titled: ``Implementation of National Maritime Security
Initiatives'' (USCG-2003-14792) published elsewhere in today's Federal
Register, for a discussion of our analysis under this Executive Order.

Unfunded Mandates Reform Act

    The Unfunded Mandates Reform Act of 1995 (2 U.S.C. 1531-1538)
requires Federal agencies to assess the effects of their discretionary
regulatory actions. In particular, the Act addresses actions that may
result in the expenditure by a State, local, or tribal government, in
the aggregate, or by the private sector of $100,000,000 or more in any
one year. This rule is exempted from assessing the effect of the
regulatory action as required by the Act because it is necessary for
the national security of the U.S. (2 U.S.C. 1503(5)).

Taking of Private Property

    This interim rule will not effect taking of private property or,
otherwise, have taking implications under Executive Order 12630,
Governmental Actions and Interference with Constitutionally Protected
Property Rights.

Civil Justice Reform

    This interim rule meets applicable standards in sections 3(a) and
3(b)(2) of Executive Order 12988, Civil Justice Reform, to minimize
litigation, eliminate ambiguity, and reduce burden.

Protection of Children

    We have analyzed this interim rule under Executive Order 13045,
Protection of Children from Environmental Health Risks and Safety
Risks. While this rule is an economically significant rule, it does not
create an environmental risk to health or risk to safety that may
disproportionately affect children.

Indian Tribal Governments

    This interim rule does not have tribal implications under Executive
Order 13175, Consultation and Coordination with Indian Tribal
Governments, because it does not have a substantial direct effect on
one or more Indian tribes, on the relationship between the Federal
Government and Indian tribes, or on the distribution of power and
responsibilities between the Federal Government and Indian tribes.

Energy Effects

    We have analyzed this interim rule under Executive Order 13211,
Actions Concerning Regulations That Significantly Affect Energy Supply,
Distribution, or Use. We have determined that it is not a ``significant
energy action'' under that order. Although it is a ``significant
regulatory action'' under Executive Order 12866, it is not likely to
have a significant adverse effect on the supply, distribution, or use
of energy. The Administrator of the Office of Information and
Regulatory Affairs has not designated it as a significant energy
action. Therefore, it does not require a Statement of Energy Effects
under Executive Order 13211.
    This interim rule has a positive effect on the supply,
distribution, and use of energy. The interim rule provides for security
assessments, plans, procedures, and standards, which will prove
beneficial for the supply, distribution, and use of energy at increased
levels of maritime security.

Trade Impact Assessment

    The Trade Agreement Act of 1979 (19 U.S.C. 2501-2582) prohibits
Federal agencies from engaging in any standards or related activities
that create unnecessary obstacles to the foreign commerce of the U.S.
Legitimate domestic objectives, such as safety and security, are not
considered unnecessary obstacles. The Act also requires consideration
of international standards and, where appropriate, that they be the
basis for U.S. standards. We have assessed the potential effect of this
interim rule and have determined that it would likely create obstacles
to the foreign commerce of the U.S. However, because these regulations
are being put in place in order to further a legitimate domestic
objective, namely to increase the security of the U.S., any obstacles
created by the regulation are not considered unnecessary obstacles.

Environment

    We have considered the environmental impact of this rule and
concluded that, under figure 2-1, paragraph (34)(a) and (34)(c) of
Commandant Instruction M16475.lD, this rule is categorically excluded
from further environmental documentation. This interim rule concerns
security assessments and the establishment of security committees and
coordinators that will contribute to a higher level of marine safety
and security for U.S. ports. A ``Categorical Exclusion Determination''
is available in the docket where indicated under ADDRESSES or
SUPPLEMENTARY INFORMATION.
    This rulemaking will not significantly impact the coastal zone.
Further, the rulemaking and the execution of this rule will be done in
conjunction with appropriate State coastal authorities. The Coast Guard
will, therefore, comply with the requirements of the Coastal Zone
Management Act while furthering its intent to protect the coastal zone.

List of Subjects in 33 CFR Part 103

    Facilities, Harbors, Maritime security, Ports, Reporting and
recordkeeping requirements, Security measures, Vessels, Waterways.

0
For the reasons discussed in the preamble, the Coast Guard is adding
part 103 to subchapter H of chapter I of title 33 in the CFR to read as
follows:

SUBCHAPTER H--MARITIME SECURITY

PART 103--AREA MARITIME SECURITY

Subpart A--General
Sec.
103.100 Applicability.
103.105 Definitions.
Subpart B--Federal Maritime Security Coordinator (FMSC) Designation and
Authorities
103.200 Designation of the Federal Maritime Security Coordinator
(FMSC).
103.205 Authority of the COTP as the Federal Maritime Security
Coordinator (FMSC).
Subpart C--Area Maritime Security (AMS) Committee
103.300 Area Maritime Security (AMS) Committee.
103.305 Composition of an Area Maritime Security (AMS) Committee.
103.310 Responsibilities of the Area Maritime Security (AMS)
Committee.
Subpart D--Area Maritime Security (AMS) Assessment
103.400 General.
103.405 Elements of the Area Maritime Security (AMS) Assessment.
103.410 Persons involved in the Area Maritime Security (AMS).
Subpart E--Area Maritime Security (AMS) Plan
103.500 General.
103.505 Elements of the Area Maritime Security (AMS) Plan.
103.510 Area Maritime Security (AMS) Plan review and approval.
103.515 Exercises.
103.520 Recordkeeping.

    Authority: 33 U.S.C. 1226, 1231; 46 U.S.C. 70102, 70103, 70104,
70112; 50 U.S.C. 191; 33 CFR 1.05-1, 6.04-11, 6.14, 6.16, and 6.19;
Department of Homeland Security Delegation No. 0170.

Subpart A--General

Sec.  103.100  Applicability.

    This part applies to all vessels and facilities located in, on,
under, or adjacent to waters subject to the jurisdiction of the U.S.

[[Page 39291]]

Sec.  103.105  Definitions.

    Except as specifically stated in this subpart, the definitions in
part 101 of this subchapter apply to this part.

Subpart B--Federal Maritime Security Coordinator (FMSC) Designation
and Authorities

Sec.  103.200  Designation of the Federal Maritime Security Coordinator
(FMSC).

    The COTPs are the Federal Maritime Security Coordinators for their
respective COTP zones described in 33 CFR part 3, including all ports
and areas located therein.

Sec.  103.205  Authority of the COTP as the Federal Maritime Security
Coordinator (FMSC).

    (a) Without limitation to the authority vested in the COTP by
statute or regulation, and in addition to authority prescribed
elsewhere in this part, the COTP as the FMSC is authorized to:
    (1) Establish, convene, and direct the Area Maritime Security (AMS)
Committee;
    (2) Appoint members to the AMS Committee;
    (3) Develop and maintain, in coordination with the AMS Committee,
the AMS Plan;
    (4) Implement and exercise the AMS Plan; and
    (5) Maintain the records required by Sec.  103.520 of this part.
    (b) The authorizations in paragraph (a) of this section do not
limit any other existing authority of the COTP.

Subpart C--Area Maritime Security (AMS) Committee

Sec.  103.300  Area Maritime Security (AMS) Committee.

    (a) The AMS Committee is established under the direction of the
COTP and shall assist in the development, review, and update of the AMS
Plan for their area of responsibility. For the purposes of this
subchapter, Port Security Committees that were established prior to
July 1, 2003, according to guidance issued by the Coast Guard, may be
considered AMS Committees, provided they conform to the procedures
established by this part and satisfy the membership requirements of
Sec.  103.305 of this part.
    (b) The AMS Committee will operate under terms specified in a
written charter. At a minimum, the charter must address:
    (1) The AMS Committee's purpose and geographic area of
responsibility;
    (2) Rules for membership;
    (3) The AMS Committee's organizational structure and procedural
rules of order;
    (4) Frequency of meetings, to include not less than once in a
calendar year or when requested by a majority of the AMS Committee
members;
    (5) Guidelines for public access to AMS Committee meetings and
records; and
    (6) Rules for handling and protecting classified, sensitive
security, commercially sensitive, and proprietary information.

Sec.  103.305  Composition of an Area Maritime Security (AMS)
Committee.

    (a) An AMS Committee must be composed of not less than seven
members, each having at least 5 years of experience related to maritime
or port security operations, and who may be selected from:
    (1) The Federal, Territorial, or Tribal government;
    (2) The State government and political subdivisions thereof;
    (3) Local public safety, crisis management and emergency response
agencies;
    (4) Law enforcement and security organizations;
    (5) Maritime industry;
    (6) Other port stakeholders having a special competence in maritime
security; and
    (7) Port stakeholders affected by security practices and policies.
    (b) Members appointed under this section serve for a term of not
more than 5 years. In appointing members, the COTP should consider the
skills required by Sec.  103.410 of this part. Prior to the appointment
of an individual to a position on the AMS Committee, the COTP may
require an appropriate security background examination of the candidate
member.

Sec.  103.310  Responsibilities of the Area Maritime Security (AMS)
Committee.

    (a) The AMS Committee shall:
    (1) Identify critical port infrastructure and operations;
    (2) Identify risks (threats, vulnerabilities, and consequences);
    (3) Determine mitigation strategies and implementation methods;
    (4) Develop and describe the process to continually evaluate
overall port security by considering consequences and vulnerabilities,
how they may change over time, and what additional mitigation
strategies can be applied; and
    (5) Provide advice to, and assist the COTP in, developing the AMS
Plan.
    (b) The AMS Committee shall also serve as a link for communicating
threats and changes in MARSEC Levels, and disseminating appropriate
security information to port stakeholders.

Subpart D--Area Maritime Security (AMS) Assessment

Sec.  103.400  General.

    (a) The Area Maritime Security (AMS) Committee will ensure that a
risk based AMS Assessment, is completed and meets the requirements
specified in Sec.  103.310 of this part and Sec.  101.510 of this
subchapter, incorporating the elements specified in Sec.  103.405 of
this part.
    (b) AMS Assessments can be completed by the COTP, the AMS
Committee, a Coast Guard Port Security Assessment team, or by another
third party approved by the AMS Committee.
    (c) Upon completion of each AMS Assessment, a written report, which
is designated sensitive security information, must be prepared
consisting of:
    (1) A summary of how the AMS Assessment was conducted;
    (2) A description of each vulnerability and consequences found
during the AMS Assessment; and
    (3) A description of risk reduction strategies that could be used
to ensure continued operation at an acceptable risk level.

Sec.  103.405  Elements of the Area Maritime Security (AMS) Assessment.

    (a) The AMS Assessment must include the following elements:
    (1) Identification of the critical Marine Transportation System
infrastructure and operations in the port;
    (2) Threat assessment that identifies and evaluates each potential
threat on the basis of various factors, including capability and
intention;
    (3) Consequence and vulnerability assessment for each target/
scenario combination; and
    (4) A determination of the required security measures for the three
MARSEC Levels.
    (b) In order to meet the elements listed in paragraph (a) of this
section, an AMS Assessment should consider each of the following:
    (1) Physical security of infrastructure and operations at the port;
    (2) Structures considered critical for the continued operation of
the port;
    (3) Existing security systems and equipment available to protect
maritime personnel;
    (4) Procedural policies;
    (5) Radio and telecommunication systems, including computer systems
and networks;
    (6) Relevant transportation infrastructure;
    (7) Utilities;
    (8) Security resources and capabilities; and

[[Page 39292]]

    (9) Other areas that may, if damaged, pose a risk to people,
infrastructure, or operations within the port.
    (c) AMS Assessments are sensitive security information and must be
protected in accordance with 49 CFR part 1520.

Sec.  103.410  Persons involved in the Area Maritime Security (AMS)
Assessment.

    The persons carrying out the AMS Assessment must have the
appropriate skills to evaluate the security of the port in accordance
with this part. This includes being able to draw upon expert assistance
in relation to:
    (a) Knowledge of current security threats and patterns;
    (b) Recognition and detection of dangerous substances, and devices;
    (c) Recognition, on a non-discriminatory basis, of characteristics
and behavioral patterns of persons who are likely to threaten security;
    (d) Techniques used to circumvent security measures;
    (e) Methods used to cause a transportation security incident;
    (f) Effects of dangerous substances and devices on structures and
port services;
    (g) Port security requirements;
    (h) Port business practices;
    (i) Contingency planning, emergency preparedness, and response;
    (j) Physical security measures;
    (k) Radio and telecommunications systems, including computer
systems and networks;
    (l) Transportation and civil engineering;
    (m) Vessel and port operations; and
    (n) Knowledge of the impact, including cost impacts of implementing
security measures on port operations.

Subpart E--Area Maritime Security (AMS) Plan

Sec.  103.500  General.

    (a) The Area Maritime Security (AMS) Plan is developed by the COTP,
in consultation with the AMS Committee, and is based on an AMS
Assessment that meets the provisions of subpart D of this part. The AMS
Plan must be consistent with the National Maritime Transportation
Security Plan and the National Transportation Security Plan.
    (b) AMS Plans are sensitive security information and must be
protected in accordance with 49 CFR part 1520.

Sec.  103.505  Elements of the Area Maritime Security (AMS) Plan.

    The AMS Plan should address the following elements, as applicable:
    (a) Details of both operational and physical measures that are in
place in the port at MARSEC Level 1;
    (b) Details of the additional security measures that enable the
port to progress, without delay, to MARSEC Level 2 and, when necessary,
to MARSEC Level 3;
    (c) Details of the security incident command-and-response
structure;
    (d) Details for regular audit of the AMS Plan, and for its
amendment in response to experience or changing circumstances;
    (e) Measures to prevent the introduction of dangerous substances
and devices into designated restricted areas within the port;
    (f) Measures to prevent unauthorized access to designated
restricted areas within the port;
    (g) Procedures and expected timeframes for responding to security
threats or breaches of security, including provisions for maintaining
infrastructure and operations in the port;
    (h) Procedures for responding to any security instructions the
Coast Guard announces at MARSEC Level 3;
    (i) Procedures for evacuation within the port in case of security
threats or breaches of security;
    (j) Procedures for periodic plan review, exercise, and updating;
    (k) Procedures for reporting transportation security incidents
(TSI);
    (l) Identification of, and methods to communicate with, Facility
Security Officers (FSO), Company Security Officers (CSO), Vessel
Security Officers (VSO), public safety officers, emergency response
personnel, and crisis management organization representatives within
the port, including 24-hour contact details;
    (m) Measures to ensure the security of the information contained in
the AMS Plan;
    (n) Security measures designed to ensure effective security of
infrastructure, special events, vessels, passengers, cargo, and cargo
handling equipment at facilities within the port not otherwise covered
by a Vessel or Facility Security Plan, approved under part 104, 105, or
106 of this subchapter;
    (o) Procedures to be taken when a vessel is at a higher security
level than the facility or port it is visiting;
    (p) Procedures for responding if a vessel security alert system on
board a vessel within or near the port has been activated;
    (q) Procedures for communicating appropriate security and threat
information to the public;
    (r) Procedures for handling reports from the public and maritime
industry regarding suspicious activity;
    (s) Security resources available for incident response and their
capabilities;
    (t) Procedures for responding to a TSI; and
    (u) Procedures to facilitate the recovery of the Marine
Transportation System after a TSI.

Sec.  103.510  Area Maritime Security (AMS) Plan review and approval.

    Each AMS Plan will be submitted to the cognizant District Commander
for review and then forwarded to the Area Commander for approval.

Sec.  103.515  Exercises.

    (a) The COTP shall coordinate with the Area Maritime Security (AMS)
Committee to conduct an exercise at least once each calendar year, with
no more than 18 months between exercises, to test the effectiveness of
the AMS Plan.
    (b) An exercise may consist of any of the following:
    (1) A tabletop exercise to validate the AMS Plan. No equipment or
personnel deployment is required;
    (2) A field training exercise consisting of personnel deployment
and use of security equipment; or
    (3) A combination of Sec.  103.515(b)(1) and (b)(2).
    (c) Upon concurrence of the cognizant District Commander, an actual
increase in MARSEC Level, or implementation of enhanced security
measures during periods of critical port operations or special marine
events may satisfy the exercise requirements of this section.

Sec.  103.520  Recordkeeping.

    (a) All records pertaining to the Area Maritime Security (AMS)
Assessment and AMS Plan will be retained by the COTP for 5 years.
    (b) Exercise documentation will be kept by the COTP for 2 years.

    Dated: June 23, 2003.
Thomas H. Collins,
Admiral, Coast Guard Commandant.
[FR Doc. 03-16187 Filed 6-27-03; 8:45 am]

BILLING CODE 4910-15-P

[Federal Register: July 1, 2003 (Volume 68, Number 126)]
[Rules and Regulations]
[Page 39292-39315]
From the Federal Register Online via GPO Access [wais.access.gpo.gov]
[DOCID:fr01jy03-16]

-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

Coast Guard

33 CFR Parts 104, 160, and 165

46 CFR Parts 2, 31, 71, 91, 115, 126, and 176

[USCG-2003-14749]
RIN 1625-AA46


Vessel Security

AGENCY: Coast Guard, DHS.

[[Page 39293]]

ACTION: Temporary interim rule with request for comments and notice of
meeting.

-----------------------------------------------------------------------

SUMMARY: This interim rule provides security measures for certain
vessels calling on U.S. ports. It requires the owners or operators of
vessels to designate security officers for vessels, develop security
plans based on security assessments, implement security measures
specific to the vessel's operation, and comply with Maritime Security
Levels. This interim rule is one of six interim rules in today's
Federal Register that comprise a new subchapter on the requirements for
maritime security mandated by the Maritime Transportation Security Act
of 2002. These six interim rules implement national maritime security
initiatives concerning general provisions, Area Maritime Security
(ports), vessels, facilities, Outer Continental Shelf facilities, and
the Automatic Identification System. Where appropriate, they align
these domestic maritime security requirements with those of the
International Ship and Port Facility Security Code and recent
amendments to the International Convention for the Safety of Life at
Sea. To best understand these interim rules, first read the interim
rule titled ``Implementation of National Maritime Security
Initiatives'' (USCG-2003-14792).

DATES: Effective date. This interim rule is effective from July 1, 2003
until November 25, 2003, with the exception of amendatory instructions
2, 5, 6, 8, 9, 10, 12, 14, 15, 16, 18, and 19 which are effective July
1, 2003. The Coast Guard intends to finalize these amendments by
November 25, 2003. On July 31, 2003, the Director of the Federal
Register approved the incorporation by reference of certain
publications listed in this rule.
    Comments. Comments and related material must reach the Docket
Management Facility on or before. Comments on collection of information
sent to the Office of Management and Budget (OMB) must reach OMB on or
before July 31, 2003.
    Meeting. A public meeting will be held on July 23, 2003, from 9
a.m. to 5 p.m., in Washington, DC.

ADDRESSES: Comments. To ensure that your comments and related material
are not entered more than once in the docket, please submit them by
only one of the following means:
    (1) Electronically to the Docket Management System Web site at
http://dms.dot.gov.
    (2) By mail to the Docket Management Facility (USCG-2003-14749),
U.S. Department of Transportation, room PL-401, 400 Seventh Street,
SW., Washington, DC 20590-0001.
    (3) By fax to the Docket Management Facility at 202-493-2251.
    (4) By delivery to room PL-401 on the Plaza level of the Nassif
Building, 400 Seventh Street SW., Washington, DC, between 9 a.m. and 5
p.m., Monday through Friday, except Federal holidays. The telephone
number is 202-366-9329.
    You must also mail comments on collection of information to the
Office of Information and Regulatory Affairs, Office of Management and
Budget, 725 17th Street NW., Washington, DC 20503, ATTN: Desk Officer,
U.S. Coast Guard.
    Meeting. A public meeting will be held on July 23, 2003 in
Washington, DC at the Grand Hyatt Washington, DC, 1000 H Street, NW.,
Washington, DC 20001.
    Availability. Electronic forms of all comments received into any of
our dockets can be searched by the name of the individual submitting
the comment (or signing the comment, if submitted on behalf of an
association, business, labor unit, etc.) and is open to the public
without restriction. You may also review the Department of
Transportation's complete Privacy Act Statement in the Federal Register
published on April 11, 2000 (65 FR 19477-78), or you may visit http://dms.dot.gov/
.

FOR FURTHER INFORMATION CONTACT: If you have questions on this rule,
call Lieutenant Kevin Oditt (G-MP), U.S. Coast Guard by telephone 202-
267-1103, toll-free telephone 1-800-842-8740 ext. 7-1103, or electronic
mail msregs@comdt.uscg.mil.    If you have questions on viewing or submitting material to the
docket, call Ms. Dorothy Beard, Chief, Dockets, Department of
Transportation, and telephone 202-366-5149.

SUPPLEMENTARY INFORMATION: Due to the short timeframe given to
implement these National Maritime Transportation Security initiatives,
as directed by the Maritime Transportation Security Act (MTSA), and to
ensure all comments are in the public venue for these important
rulemakings, we are not accepting comments containing protected
information for these interim rules. We request you submit comments, as
explained in the Request for Comments section below, and discuss your
concerns or support in a manner that is not security sensitive. We also
request that you not submit proprietary information as part of your
comment.
    The Docket Management Facility maintains the public docket for this
rulemaking. Comments and material received from the public, as well as
documents mentioned in this preamble as being available in the docket,
will become part of this docket and will be available for inspection or
copying at room PL-401 on the Plaza level of the Nassif Building, 400
Seventh Street SW., Washington, DC, between 9 a.m. and 5 p.m., Monday
through Friday, except Federal holidays. You may also find this docket
on the Internet at http://dms.dot.gov.

Request for Comments

    We encourage you to participate in this rulemaking by submitting
comments and related material. Your comments will be considered for the
final rule we plan to issue before November 25, 2003, to replace this
interim rule. If you choose to comment on this rule, please include
your name and address, identify the specific docket number for this
interim rule (USCG-2003-14749), indicate the specific heading of this
document to which each comment applies, and give the reason for each
comment. If you have comments on another rule, please submit those
comments in a separate letter to the docket for that rulemaking. You
may submit your comments and material by mail, hand delivery, fax, or
electronic means to the Docket Management Facility at the address under
ADDRESSES. Please submit your comments and material by only one means.
If you submit them by mail or hand delivery, submit them in an unbound
format, no larger than 8\1/2\ by 11 inches, suitable for copying and
electronic filing. If you submit them by mail and would like to know
that they reached the facility, please enclose a stamped, self-
addressed postcard or envelope. We will consider all comments and
material received during the comment period. We may change this rule in
view of them.

Public Meetings

    We will hold a public meeting on July 23, 2003, in Washington, DC
at the Grand Hyatt Hotel, at the address listed under ADDRESSES. The
meeting will be from 9 a.m. to 5 p.m. to discuss all of the maritime
security interim rules, and the Automatic Identification System (AIS)
interim rule, found in today's Federal Register. In addition, you may
submit a request for other public meetings to the Docket Management
Facility at the address under ADDRESSES explaining why another one
would be beneficial. If we determine that other meetings would aid this
rulemaking, we will hold them at a time and place

[[Page 39294]]

announced by a later notice in the Federal Register.

Regulatory Information

    We did not publish a notice of proposed rulemaking for this
rulemaking and are making this rule effective upon publication. Section
102(d)(1) of the Maritime Transportation Security Act of 2002 (MTSA,
Pub. L. 107-295, 116 STAT. 2064) requires the publication of an interim
rule as soon as practicable without regard to the provisions of chapter
5 of title 5, U.S. Code (Administrative Procedure Act). The Coast Guard
finds that harmonization of U.S. regulations with maritime security
measures adopted by the International Maritime Organization (IMO) in
December 2002, and the need to institute measures for the protection of
U.S. maritime security as soon as practicable, furnish good cause for
this interim rule to take effect immediately under both the
Administrative Procedure Act and section 808 of the Congressional
Review Act.

Background and Purpose

    A summary of the Coast Guard's regulatory initiatives for maritime
security can be found under the Background and Purpose section in the
preamble to the interim rule titled ``Implementation of National
Maritime Security Initiatives'' (USCG-2003-14792) published elsewhere
in today's Federal Register.

Discussion of Comments Addressing Vessel Issues in the Notice of
Meeting

    For a discussion of comments on vessels at the public meetings and
in the docket, see the interim rule titled ``Implementation of National
Maritime Security Initiatives'' (USCG-2003-14792) published elsewhere
in today's Federal Register.

Discussion of Interim Rule

    This interim rule regulates the owners or operators of certain
classes of vessels, in order to provide greater security to these
vessels and to other vessels or ports with which a vessel interfaces.
The interim rule adds part 104, Vessel Security, to the new subchapter
H, Maritime Security of Title 33 of the Code of Federal Regulation. A
general description of the process used in developing subchapter H and
its component parts appears in the interim rule titled ``Implementation
of National Maritime Security Initiatives'' (USCG-2003-14792).
    The MTSA and the International Ship and Port Facility Security
(ISPS) Code use different terms to define similar, if not identical,
persons or things. These differing terms sometimes match up with the
terms used in subchapter H, but sometimes they do not. For a table of
the terms used in subchapter H and their related terms in the MTSA and
the ISPS Code, see the Discussion of Interim Rule section in the
preamble for the interim rule titled ``Implementation of National
Maritime Security Initiatives'' (USCG-2003-14792), published elsewhere
in today's Federal Register.
    The purpose of this rulemaking is to require certain vessels to
perform security assessments, develop security plans, and implement
security measures and procedures in order to reduce the risk of and to
mitigate the results of an act that threatens the security of the crew,
the vessel, or the public. This rulemaking combines international
requirements and existing domestic policy and is published as a part of
a new subchapter on maritime security. The MTSA mandates vessels that
are required to conduct security assessments and develop security plans
to submit their vessel security plan within 6 months of the publication
of this interim rule. It also mandates that the vessels shall be in
compliance with their approved security plan within 12 months of the
publication of this interim rule. However, consistent with customary
international law, the requirements in part 104 do not apply to vessels
engaged in innocent passage through the territorial sea of the U.S. or
in transit passage through the navigable waters of the U.S. that form
part of an international strait.
    Part 104 consists of four Subparts: Subpart A (General), subpart B
(Vessel Security Requirements), subpart C (Vessel Security Assessment),
and subpart D (Vessel Security Plan). Where appropriate, the
requirements discussed in part 104 are consistent with requirements in
the ISPS Code, and include the requirements discussed below.

Compliance

    U.S. flag vessel compliance with this part will be verified during
inspections by the Coast Guard as provided in 46 CFR part 2. 46 CFR
subchapters D, H, I, K, L, and T will be amended to require that a
certificate of inspection be based on the condition that the vessel
meets the requirements of 33 CFR subchapter H and specifically this
part.
    Foreign vessels that have on board a valid International Ship
Security Certificate that attests to the vessel's compliance with
International Convention for Safety of Life at Sea, 1974, (SOLAS) and
the ISPS Code, part A, and the relevant provisions in the ISPS Code,
part B, of will be deemed in compliance with this part, except for
those sections otherwise specified. Foreign vessel compliance will be
verified during Port State Control verification exams.
    The interim rule also affects the Notice of Arrival rule in part
160 of title 33, U.S. Code. These changes provide the Coast Guard with
additional information essential to our exercise of Port State Control
functions and to our imposition of control and compliance measures on
foreign vessels bound for a port or place in the U.S., consistent with
MTSA and with SOLAS regulation XI-2/9. A foreign vessel already covered
by the Notice of Arrival rule will have to provide information about
its International Ship Security Certificate and its implementation of
an approved security plan.
    As required by SOLAS Chapter XI-2 Regulation 3 and the ISPS Code,
part A, section 5, the Coast Guard has published additional
requirements for vessels calling in the U.S. in Sec. Sec.  104.240 and
104.255 of 33 CFR 104. These sections provide the U.S. requirements for
setting and communicating changes in Maritime Security Level,
completing Declarations of Security, and additional instructions for
all vessels when Maritime Security Level 3 is set.

Waivers

    The waiver section details procedures for requesting a waiver for
the benefit of vessel owners or operators who find specific
requirements of the rulemaking to be unnecessary.

Equivalents

    The equivalents section details procedures for requesting an
equivalency for specific requirements of the rulemaking. Equivalents
are intended to allow vessel owners or operators to provide an
alternative provision or arrangement that provides the same level of
security as a specific requirement contained within this part.

Alternative Security Program

    This part makes provision to allow owners or operators of vessels
on domestic voyages only to implement an Alternative Security Program
that has been reviewed and accepted by the Commandant (G-MP), to meet
the requirements of this part. Alternative Security Programs must be
comprehensive and based on a security assessment to demonstrate it
meets the intent of each section of this part. Owners or operators are
required to implement an appropriate Alternative Security Program in
its entirety to be deemed in compliance with this part.

[[Page 39295]]

    We also strongly encourage industry groups to develop and submit
``model programs,'' which would include a model Vessel Security Plan
and assessment of their own. A model program is one that, once
submitted and reviewed and approved by Commandant (G-MP), may be used
as a template for other vessels in the fleet. However, a Vessel
Security Plan constructed using a model plan would still require
submission for approval by the Coast Guard.
    The process of the review and acceptance of model programs will be
the same as the process used for the Alternative Security Program. The
submission of a model program will need to include a general assessment
for the applicable segment of the industry for which the model program
is intended. The submission must also include how owners or operators
will implement the model program including performing an operational
and vessel-specific assessment and verification of implementation. Once
these model programs are accepted, the programs could be used by
industry to develop vessel-specific plans and assessments for Coast
Guard approval.

Evaluating Submissions of Waivers, Equivalents, and Alternative
Security Programs

    In our evaluation of waivers, equivalencies, and Alternative
Security Programs, the Coast Guard will accept a self-assessment or
demonstration using any risk management tools acceptable to the Coast
Guard. This demonstration may be requested to show that the proposed
waiver, equivalency or Alternative Security Program is at least as
effective as that intended by this interim rule.

Owner or Operator Responsibilities

    The owner or operator of a vessel is generally responsible for all
requirements imposed by this part. These requirements include ensuring
the following: The performance of all vessel security duties; defining
the security organizational structure for each vessel; providing each
person(s) exercising security duties or responsibilities within that
structure with the support needed to fulfill those obligations; that
personnel receive training, drills, and exercises enabling them to
perform their assigned security duties; and that adequate coordination
of security issues between vessels and facilities take place.

Company Security Officer (CSO)

    This interim rule requires that each vessel owner or operator
appoint a Company Security Officer, designated in writing, for their
fleet of vessels or for each individual vessel that is owned or
operated by the company. The Company Security Officer may be a full
time or collateral position. A Company Security Officer may perform
other duties within the owner's or operator's organization provided he
or she is able to perform the duties and responsibilities required of
the Company Security Officer. The Company Security Officer may also be
the Vessel Security Officer, provided he or she is also able to perform
the duties and responsibilities required of the Company Security
Officer. Generally, this provision is for vessels operating on
restricted routes in a single COTP zone and for unmanned vessels.
    The Company Security Officer must have a general knowledge in a
range of issues, such as company security organization, relevant
international laws, domestic regulations, current security threats and
patterns, risk assessment methodology, and in conducting audits,
inspections, and control procedures.
    The CSO may delegate the duties imposed on the Company Security
Officer by this part, but remains responsible for the performance of
those duties. The most important duties of the Company Security Officer
include ensuring that: A Vessel Security Assessment is conducted; a
Vessel Security Plan is developed, approved, maintained, and
implemented; the Vessel Security Plan is modified when necessary;
vessel security activities are audited as appropriate; problems
identified by audits or inspections are addressed in a timely fashion;
adequate security training; and communication and cooperation between
the vessel and facilities.

Vessel Security Officer (VSO)

    This interim rule requires that a Vessel Security Officer is
designated in writing for each vessel. The Vessel Security Officer must
have a general knowledge in a range of issues, such as security
administration, relevant international laws, domestic regulations,
current security threats and patterns, risk assessment methodology, and
in conducting audits, inspections, and control procedures. The most
important duties that must be performed by the Vessel Security Officer
includes implementing a Vessel Security Plan; ensuring that adequate
training is provided to vessel personnel; ensuring the vessel is
operating in accordance with the plan and in continuous compliance with
part 104; and periodically auditing and updating the Vessel Security
Assessment and Vessel Security Plan. The Vessel Security Officer may
assign security duties to other vessel personnel; however, the Vessel
Security Officer remains responsible for security duties.

Training

    Required training for vessel personnel must be specified in the
Vessel Security Plan. Specific security training courses for the Vessel
Security Officer and vessel personnel will not be required by the Coast
Guard. While formal training may be necessary, we will not mandate
specifics. Vessel owners or operators must certify that security
personnel are, in fact, properly trained to perform their duties. The
types of training required must also be consistent with the training
requirements described in this subpart. The Vessel Security Officer is
also required to ensure that vessel security persons possess necessary
training to maintain the overall security of the facility.

Drills and Exercises Requirements

    Exercises are required to ensure the adequacy of the Facility
Security Plans and are required to be conducted at least once each
calendar year, with not more than 18 months between exercises. Drills,
which are smaller in scope than exercises, must be conducted at least
every 3 months.
    Exercises may be vessel specific, or as part of a cooperative
exercise program with applicable Facility and Vessel Security Plans or
Port exercises. Exercises for security may be combined with other
required exercises, as appropriate.

Security Systems and Equipment Maintenance

    Procedures and/or policies must be developed and implemented to
ensure security systems and equipment are tested and operated in
accordance with the instructions of the manufacturer and ready for use.

Security Measures

    Security measures for specific activities must be scalable in order
to provide increasing levels of security at increasing Maritime
Security (MARSEC) Levels. An effective security program relies on
detailed procedures that clearly indicate the preparation and
prevention activities that will occur at each threat level and the
organizations, or personnel, who are responsible for carrying out those
activities. Security Measures must be developed for the following
activities:
    [sbull] Security measures for access control;

[[Page 39296]]

    [sbull] Security measures for restricted areas;
    [sbull] Security measures for handling cargo;
    [sbull] Security measures for delivery of vessel stores and
bunkers; and
    [sbull] Security measures for monitoring.

Security Incident Procedures

    Each vessel owner or operator must develop security incident
procedures for responding to transportation security incidents. The
security incident procedures must explain the vessel's reaction to an
emergency, including the notification and coordination with local,
State, and federal authorities and Under Secretary of Emergency
Preparedness and Response. The security incident procedures must also
explain actions for securing the vessel and evacuating passengers and
crew.

Declaration of Security (DoS)

    A Declaration of Security provides a means for ensuring that
critical security concerns are properly addressed prior to and during a
vessel-to-facility interface. The Declaration of Security addresses
security by delineating responsibilities for security arrangements and
procedures between a vessel and a facility. This requirement is similar
to the existing U.S. practice for vessel-to-facility oil transfer
proceedings.
    Only certain passenger vessels and vessels carrying Certain
Dangerous Cargoes will complete a Declaration of Security for every
evolution regardless of the Maritime Security Level. At Maritime
Security Levels 2 and 3, all vessels and facilities would need to
complete the Declaration of Security.
    Vessels that frequently call on the same facility may execute a
continuing Declaration of Security--a single Declaration of Security
for multiple visits.
    All Declarations of Security must state the security activities for
which the facility and vessel are responsible during vessel-to-vessel
or vessel-to-facility interfaces. Declarations of Security must be kept
as part of the vessel's recordkeeping.
    Vessels that are operating at a higher Security Level than the port
that the vessel is calling at may request a Declaration of Security
with the facility, and the facility must complete a Declaration of
Security with the vessel. Additionally, a facility may request that a
vessel complete a Declaration of Security with the facility as
appropriate for that facility's Security Plan or direction of the COTP.
If the facility owner or operator requires a Declaration of Security,
the vessel must comply. The conditions under which a vessel may request
a Declaration of Security from the facility must be included in the
Vessel Security Plan.

Vessel Security Assessment (VSA)

    This interim rule requires all vessels covered by part 104 to
conduct a Vessel Security Assessment, which is an essential and
integral part of the process for developing and updating the required
Vessel Security Plan. The Vessel Security Assessment is based in part
on an on-scene security survey, which details the overall assessment of
the vessel including any existing security measures, and includes a
written report documenting the vulnerabilities and mitigation
strategies of the vessel. As discussed in the interim rule
``Implementation of National Maritime Security Initiatives'' (USCG-
2003-14792), 33 CFR 101.510 lists the various assessment tools that may
be used to meet the risk assessment requirements in parts 104 through
106 of this subchapter. The assessment tools listed are sufficient to
enable the development of the Vessel Security Program. This list is
also provided to ensure that the Vessel Security Assessment is
consistent with other modal assessments. We are working with other
agencies to develop assessment tools that are sensitive to the
diversity of the National Marine Transportation System to ensure
consistent levels of security throughout the entire System. The
designated Company Security Officer must conduct the on-scene survey by
examining and evaluating existing vessel protective measures,
procedures, and operations. Using the information obtained in the on-
scene survey, the Company Security Officer must ensure the completion
ot the Vessel Security Assessment. The Vessel Security Assessment
identifies and evaluates, in writing, existing security measures; key
vessel operations; the likelihood of possible threats to key vessel
operations; and weaknesses, including human factors in the
infrastructure, policies, and procedures of the vessel.
    It also includes a written summary of how the assessment was
conducted; each vulnerability found during the assessment; and
countermeasures that could be used to address each vulnerability. The
Vessel Security Assessment must be reviewed and updated each time the
Vessel Security Plan is revised and when the Vessel Security Plan is
submitted for re-approval every 5 years.

Vessel Security Plan (VSP)

    This interim rule requires each vessel owner or operator to develop
an effective Vessel Security Plan that incorporates detailed
preparedness, prevention, and response activities for each Maritime
Security Level, along with the organizations or personnel responsible
for carrying out those activities. The requirements discussed in this
part are consistent with requirements in the ISPS Code.
    The Vessel Security Plan is a document, written in English, that is
prepared in response to the Vessel Security Assessment and approved by
the Coast Guard. A single Vessel Security Plan can apply to more than
one vessel to the extent that they share physical characteristics and
operations.
    In addition to other things, the Vessel Security Plan must: respond
specifically to any recommendations made by the Vessel Security
Assessment; describe how, at each Maritime Security Level, the vessel
will apply the security measures required in these regulations; state
the Master's authority; must detail the organizational structure of
security for the vessel; detail the duties and responsibilities of all
vessel and company personnel with a security role; detail the vessel's
relationship with the Company, facilities, other vessels, and relevant
authorities with security responsibility; provide regular audit of the
Vessel Security Plan and its amendment in response to experience or
changing circumstances; and establish the procedures needed to assess
the continuing effectiveness of security procedures and all security
related equipment and systems, including procedures for identifying and
responding to equipment or systems failure or malfunction.
    The responsibility for barge security lies not only with the barge
owner or operator but also with the towing vessel, fleeting facility,
and facility where the barge is moored. Hence, security plans for
vessels and facilities that interface with unmanned vessels (e.g.
unmanned barges) must include additional provisions to address the risk
of the unmanned vessels that they will receive or handle. Given the
simple design of a typical barge and the wide range of products that
may be transported within a single tow or moored within a single
fleeting area, the security assessments of facilities and towing
vessels should include the barge sizes and cargos that would result in
a worst-case scenario (i.e. greatest potential consequence due to cargo
volatility, toxicity, or environmental damage), and the most probable
vulnerability scenarios.
    Vessel and facility security plans must address how the vessel or
facility will apply the necessary security measures when engaged with a
barge.

[[Page 39297]]

Therefore, the security plans need to include procedures and security
measures to protect the towing vessel or the facility that controls the
barge(s). In addition, the security plans need to include procedures
for interfacing with other vessels and facilities, including how it
will transfer custody of the barge to the next facility or towing
vessel.
    Facilities and towing vessels are not required to have a copy of
the security plan for each barge it handles if the facility or towing
vessel security plan includes appropriate procedures and security
measures to ensure the security of all barges in its care. It is the
responsibility of all Security Officers (barge's Vessel Security
Officer, the towing vessel's Vessel Security Officer, the Company
Security Officer, and the Facility Security Officer) to coordinate
plans and ensure, possibly through a written contract or other
agreement, that each party that receives the barge understands and is
capable of implementing specific security measures for it. This may
entail providing a copy of the applicable sections of a barge's Vessel
Security Plan to the parties involved.
    As a result, a barge's Vessel Security Plan may be minimal in
content, containing personnel contact information and an assessment of
the worst-case damage it might produce. The security plan must explain
how security will be coordinated with each towing vessel, fleeting
facility, and facility that handles the barge. Existing plans and
procedures, such as vessel response plans, may be used or referenced as
part of the Vessel Security Plan.
    Like other Vessel Security Plans, the barge's Vessel Security Plan
must also include specific security incident procedures to mitigate the
consequences of damage and/or a release of the barge's cargo.
    Foreign vessels required to comply with SOLAS are not required to
submit their Vessel Security Plans to the Coast Guard for approval.
Pursuant to SOLAS and the ISPS Code, these plans are required to be
approved by the flag administration or Recognized Security Organization
(RSO). Approval can only be granted by the flag administration or the
RSO after verification that the Vessel Security Plan meets the
requirements of SOLAS and the ISPS Code, part A, taking into account
the ISPS Code, part B. Even so, the Coast Guard will verify that
foreign SOLAS vessels have an approved Vessel Security Plan that fully
complies with SOLAS and the ISPS Code, and thereby meets the
requirements of this part, through an aggressive Port State Control
program. Noncompliance will subject the vessel to a range of control
and compliance measures, which could include denial of entry into port.
If, during an expanded examination, those sections of the Vessel
Security Plan the port state is allowed to review are not written in
English, a vessel may be delayed while translator services are
acquired. To properly reflect the full range of legal authorities to
control vessel movement in such cases, and without affecting other
legal authorities, this rule amends the authority provision in 33 CFR
part 165 to cite the anti-terrorism authorities in 33 U.S.C. 1226 as an
additional basis for taking action under 33 CFR part 165.
    However, in certain cases foreign vessel owners or operators will
be required to submit the Vessel Security Plan to the U.S. for
approval. Generally, these vessels fall into three categories: (1) A
commercial vessel meeting the applicability standards of these
regulations from a nation not signatory to SOLAS; (2) Canadian
commercial vessels operating solely on the Great Lakes that (a) are
greater than 100 gross register tons or (b) carry more than 12
passengers; and (3) other foreign commercial vessels meeting the
applicability standards of this part, but below 500 gross tonnage, ITC
and above 100 gross register tons.

Submission and Approval of Security Plan

    The Vessel Security Plan, including the Vessel Security Assessment
report, must be submitted to and reviewed by the Commanding Officer,
Marine Safety Center (MSC). Once the MSC finds that the plan meets the
security requirements in part 104, the submitter will receive an
approval letter that may contain conditions of the approval.
    If the MSC requires more time than is indicated in the requirements
of the interim rule to review a submitted Vessel Security Plan, the MSC
may return to the submitter a written acknowledgement stating that the
Coast Guard is currently reviewing the Vessel Security Plan submitted
for approval, and that the vessel may continue to operate so long as
the vessel remains in compliance with the submitted Vessel Security
Plan.
    If the MSC finds that the Vessel Security Plan does not meet the
security requirements, the plans would be returned to the vessel with a
disapproval letter with an explanation of why the plan does not meet
the part 104 requirements.
    The Coast Guard must review Vessel Security Plans every time:
    [sbull] The Vessel Security Assessment is altered;
    [sbull] Failures are identified during an exercise of the Vessel
Security Plan; and
    [sbull] There is a change in ownership or operational control of
the vessel or there are amendments to the Vessel Security Plan.

Existing Regulations

    33 CFR part 120, Security of Vessels, currently exists but applies
only to cruise ships. Until July 2004, 33 CFR part 120 will remain in
effect. Vessels that were required to comply with part 120 will now
also be required to meet the requirements of this part including Sec.
104.295, titled Additional requirements--Cruise Ships. The requirements
in Sec.  104.295 generally capture the existing requirements in part
120 that are specific for cruise ships and captures additional detail
to the requirements of SOLAS Chapter XI-2 and the ISPS Code.
    The Coast Guard Notice of Arrival regulation, 33 CFR part 160, is
being amended by this interim rule to require the advance submission of
additional security related information. This information is essential
to assist Coast Guard officials in exercising Port State Control
functions, including what control and compliance measures, if any,
should be imposed on vessels bound for a port or place in the U.S.,
consistent with 46 U.S.C. 70103 and 70110 or SOLAS regulation XI-2/9.
    The Notice of Arrival amendments also provide an initial indication
to the U.S. that owners and operators are taking responsibility for
fully complying with the requirements in this part. For example,
vessels will be required to provide a statement that the vessel is in
compliance with the ISPS Code prior to entry into ports in the U.S. by
informing the National Vessel Movement Center of the type and status of
its International Ship Security Certificate. Those vessels required to
have on board an approved Vessel Security Plan will also have to
declare in the Notice of Arrival submission that they are implementing
their Vessel Security Plan. Furthermore, because it is not the intent
of the ISPS Code to allow consecutive Interim International Ship
Security Certificates, the owner or operator of a vessel holding a
consecutive Interim International Ship Security Certificate will also
be required to provide an explanation as to why the vessel holds a
consecutive Interim International Ship Security Certificate prior to
entry.
    The information we are requiring in this Notice of Arrival
amendment contains elements similar to those we mandate to verify
compliance with the International Management Code for the Safe
Operation of Ships and for

[[Page 39298]]

Pollution Prevention. Most of this information will be required only
after the new SOLAS amendments and ISPS Code go into effect, in July
2004. However, after January 1, 2004, if a foreign vessel already
possesses an International Ship Security Certificate and an approved
Vessel Security Plan, we will require it to provide some basic
information about the International Ship Security Certificate and
declare if it is implementing the Vessel Security Plan. The purpose of
collecting this data in the first half of 2004 is to help us gauge
international progress toward meeting the July 1, 2004, entry into
force date.

Regulatory Assessment

    This interim rule is a ``significant regulatory action'' under
section 3(f) of Executive Order 12866, Regulatory Planning and Review,
and has been reviewed by the Office of Management and Budget under that
Order. It requires an assessment of potential costs and benefits under
section 6(a)(3) of that Order. It is significant under the regulatory
policies and procedures of the Department of Homeland Security. A Cost
Assessment is available in the docket as indicated under ADDRESSES.

Cost Assessment

    For the purposes of good business practice or regulations
promulgated by other Federal and State agencies, many companies already
have spent a substantial amount of money and resources to upgrade and
improve security. The costs shown in this assessment do not include the
security measures these companies have already taken to enhance
security.
    We realize that every company engaged in maritime commerce would
not implement the interim rule exactly as presented in this assessment.
Depending on each company's choices, some companies could spend much
less than what is estimated herein while others could spend
significantly more. In general, we assume that each company would
implement the interim rule based on the type of vessels or facilities
it owns or operates and whether it engages in international or domestic
trade.
    This assessment presents the estimated cost if vessels are
operating at Maritime Security Level 1, the current level of operations
since the events of September 11, 2001. We also estimated the costs for
operating for a brief period at Maritime Security Level 2, an elevated
level of security.
    We do not anticipate that implementing the interim rule will
require additional manning aboard vessels; existing personnel can
assume the duties envisioned.
    The interim rule will affect about 10,300 U.S. flag SOLAS, domestic
(non-SOLAS), and about 70 foreign non-SOLAS vessels.
    The estimated cost of complying with the interim rule is Present
Value (PV) $1.368 billion (2003-2012, 7 percent discount rate).
Approximately PV $248 million of this total is attributable to U.S.
flag SOLAS vessels. Approximately PV $1.110 billion is attributable to
domestic vessels (non-SOLAS), and PV $10 million is attributable to
foreign non-SOLAS vessels. In the first year of compliance, the cost of
purchasing equipment, hiring security officers, and preparing paperwork
is an estimated $218 million (non-discounted, $42 million for the U.S.
flag SOLAS fleet, $175 million for the domestic fleet, $1 million for
the foreign non-SOLAS fleet). Following initial implementation, the
annual cost of compliance is an estimated $176 million (non-discounted,
$32 million for the U.S. flag SOLAS fleet, $143 million for the
domestic fleet, $1 million for the foreign non-SOLAS fleet).
    For the U.S. flag SOLAS fleet, approximately 52 percent of the
initial cost is for hiring Company Security Officers and training
personnel, 29 percent is for vessel equipment, 12 percent is for
assigning Vessel Security Officers to vessels, and 7 percent is
associated with paperwork (Vessel Security Assessment and Vessel
Security Plan). Following the first year, approximately 72 percent of
the cost is for Company Security Officers and personnel training, 3
percent is for vessel equipment, 10 percent is for drilling, 15 percent
is for Vessel Security Officers, and less than 1 percent is associated
with paperwork. Company Security Officers and training are the primary
cost drivers for U.S. flag SOLAS vessels.
    For the domestic fleet, approximately 51 percent of the initial
cost is for hiring Company Security Officers and training personnel, 29
percent is for vessel equipment, 14 percent is for assigning Vessel
Security Officers to vessels, and 6 percent is associated with
paperwork (Vessel Security Assessments and Vessel Security Plans).
Following the first year, approximately 61 percent of the cost is for
Company Security Officers and training, 6 percent is for vessel
equipment, 11 percent is for drilling, 22 percent is for VSOs, and less
than 1 percent is associated with paperwork. As with SOLAS vessels,
Company Security Officers are the primary cost driver for the domestic
fleet.
    We estimated approximately 135,000 burden hours for paperwork
during the first year of compliance (33,000 hours for U.S.-flag SOLAS,
101,000 hours for the domestic fleet, 1,000 hours for the foreign non-
SOLAS fleet). We estimated approximately 12,000 burden hours annually
following full implementation of the interim rule (2,000 hours for
U.S.-flag SOLAS, 10,000 hours for the domestic fleet, less than 1,000
hours for the foreign non-SOLAS fleet).
    We also estimated the annual cost for going to an elevated security
level, Maritime Security Level 2, in response to increased threats. The
duration of the increased security level will be entirely dependent on
intelligence received. For this assessment, we estimated costs for
Maritime Security Level 2 using the following assumptions: all ports
will go to Maritime Security Level 2 at once, each elevation will last
21 days, and the elevation will occur twice a year. The estimated cost
associated with these conditions is $235 million annually.

Benefit Assessment

    This interim rule is one of six interim rules that implement
national maritime security initiatives concerning general provisions,
Area Maritime Security (ports), vessels, facilities, Outer Continental
Shelf (OCS) facilities, and AIS. The Coast Guard used the National Risk
Assessment Tool (N-RAT) to assess benefits that would result from
increased security for vessels, facilities, OCS facilities, and ports.
The N-RAT considers threat, vulnerability, and consequences for several
maritime entities in various security-related scenarios. For a more
detailed discussion on the N-RAT and how we employed this tool, refer
to Applicability of National Maritime Security Initiatives in the
interim rule titled ``Implementation of National Maritime Security
Initiatives'' (USCG-2003-14792), published elsewhere in today's Federal
Register. For this benefit assessment, the Coast Guard used a team to
calculate a risk score for each entity and scenario before and after
the implementation of required security measures. The difference in
before and after scores indicated the benefit of the proposed action.
    We recognized that the interim rules are a ``family'' of rules that
will reinforce and support one another in their implementation. We have
ensured, however, that risk reduction that is credited in one
rulemaking is not also credited in another. For a more detailed
discussion on the benefit assessment and how we addressed the potential
to double-count the risk reduced, refer to Benefit Assessment in the
interim rule

[[Page 39299]]

titled ``Implementation of National Maritime Security Initiatives''
(USCG-2003-14792) published elsewhere in today's Federal Register.
    We determined annual risk points reduced for each of the six
interim rules using the N-RAT. The benefits are apportioned among the
Vessel, Facility, OCS Facility, AMS, and AIS requirements. As shown in
Table 1, the implementation of Vessel Security Plans for the affected
population reduces 781,285 risk points annually through 2012. The
benefits attributable for part 101--General Provisions--were not
considered separately since it is an overarching section for all the
parts.

                            Table 1.--Annual Risk Points Reduced by the Interim Rules
----------------------------------------------------------------------------------------------------------------
                                                             Annual risk points reduced by rulemaking
                                                ----------------------------------------------------------------
                                                                               OCS
                Maritime entity                     Vessel      Facility     facility
                                                   security     security     security    AMS plans       AIS
                                                    plans        plans        plans
----------------------------------------------------------------------------------------------------------------
Vessels........................................      778,633        3,385        3,385        3,385        1,448
Facilities.....................................        2,025      469,686  ...........        2,025  ...........
OCS Facilities.................................           41  ...........        9,903  ...........  ...........
Port Areas.....................................          587          587  ...........      129,792          105
                                                --------------
    Total......................................      781,285      473,659       13,288      135,202        1,553
----------------------------------------------------------------------------------------------------------------

    Once we determined the annual risk points reduced, we discounted
these estimates to their present value (7 percent discount rate, 2003-
2012) so that they could be compared to the costs. We presented the
cost effectiveness, or dollars per risk point reduced, in two ways:
first, we compared the first-year cost and first-year benefit because
first-year cost is the highest in our assessment as companies develop
security plans and purchase equipment. Second, we compared the 10-year
PV cost and the 10-year PV benefit. The results of our assessment are
presented in Table 2.

                    Table 2.--First-Year and 10-Year PV Cost and Benefit of the Interim Rules
----------------------------------------------------------------------------------------------------------------
                                                                   Interim rule
                                 -------------------------------------------------------------------------------
              Item                    Vessel         Facility      OCS facility
                                  security plans  security plans  security plans     AMS Plans         AIS *
----------------------------------------------------------------------------------------------------------------
First-Year Cost (millions)......            $218          $1,125              $3            $120             $41
First-Year Benefit..............         781,285         473,659          13,288         135,202           1,553
First-Year Cost Effectiveness ($/           $279          $2,375            $205            $890         $26,391
 Risk Point Reduced)............
10-Year PV Cost (millions)......          $1,368          $5,399             $37            $477             $42
10-Year PV Benefit..............       5,871,540       3,559,655          99,863       1,016,074          11,671
10-Year PV Cost Effectiveness ($/           $233          $1,517            $368            $469         $3,624
 Risk Point Reduced)............
----------------------------------------------------------------------------------------------------------------
* Cost less monetized safety benefit.

Small Entities

    Under the Regulatory Flexibility Act (5 U.S.C. 601-612), we
considered whether this interim rule would have a significant economic
impact on a substantial number of small entities. The term ``small
entities'' comprises small businesses, not-for-profit organizations
that are independently owned and operated and are not dominant in their
fields, and governmental jurisdictions with populations of less than
50,000. This interim rule does not require a general notice of proposed
rulemaking and, therefore, is exempt from the requirements of the
Regulatory Flexibility Act. Although this interim rule is exempt, we
have reviewed it for potential economic impacts on small entities. An
Initial Regulatory Flexibility Analysis discussing the impact of this
interim rule on small entities is available in the docket where
indicated under ADDRESSES.

U.S. Flag SOLAS Vessels

    We estimated that 88 companies that own U.S. flag SOLAS vessels
will be affected by the interim rule. We researched these companies and
found revenue data for 32 of them (36 percent). The revenue impacts for
these vessels are presented in Table 3. In this analysis, we considered
the impacts to small businesses during the first year of
implementation, when companies will be conducting assessments,
developing security plans, and purchasing equipment. We also considered
annual revenue impacts following the first year, when companies will
have the assessments and plans complete, but will need to conduct
quarterly drilling.

            Table 3.--Estimated Revenue Impacts for Small Businesses That Own U.S. Flag SOLAS Vessels
----------------------------------------------------------------------------------------------------------------
                                                        Initial                             Annual
                                         -----------------------------------------------------------------------
                                           Number of small  Percent of small   Number of small  Percent of small
    Percent impact on annual revenue        entities with     entities with     entities with     entities with
                                            known revenue     known revenue     known revenue     known revenue
                                                data              data              data              data
----------------------------------------------------------------------------------------------------------------
0-3.....................................                 8                25                 8                25
3-5.....................................                 3                 9                 3                 9

[[Page 39300]]

5-10....................................                 1                 3                 4                13
10-20...................................                 6                19                 4                13
20-30...................................                 4                13                 3                 9
30-40...................................                 1                 3                 2                 6
40-50...................................                 3                 9                 2                 6
50...........................                 6                19                 6                19
                                         -------------------
  Total.................................                32               100                32               100
----------------------------------------------------------------------------------------------------------------

    We assume that the remaining 56 entities that did not have revenue
data are very small businesses. We assume that the interim rule may
have a significant economic impact on these businesses.

Domestic Vessels

    We estimated that 1,683 companies that own domestic vessels will be
affected by the interim rule. We researched these companies and found
revenue data for 822 of them (49 percent). The revenue impacts for
these vessels are presented in Table 4. As with U.S. flag SOLAS
vessels, we considered the impacts to small businesses during the first
year of implementation, when companies will be conducting assessments,
developing security plans, and purchasing equipment. We also considered
annual revenue impacts following the first year, when companies will
have the assessments and plans complete, but will need to conduct
quarterly drilling.

               Table 4.--Estimated Revenue Impacts for Small Businesses That Own Domestic Vessels
----------------------------------------------------------------------------------------------------------------
                                                        Initial                             Annual
                                         -----------------------------------------------------------------------
                                           Number of small  Percent of small   Number of small  Percent of small
    Percent impact on annual revenue        entities with     entities with     entities with     entities with
                                            known revenue     known revenue     known revenue     known revenue
                                                data              data              data              data
----------------------------------------------------------------------------------------------------------------
0-3.....................................               366                45               393                48
3-5.....................................                86                10                87                11
5-10....................................               171                21               170                21
10-20...................................                85                10                64                 8
20-30...................................                34                 4                37                 5
30-40...................................                19                 2                16                 2
40-50...................................                 9                 1                16                 2
50...........................                52                 6                39                 5
                                         -------------------
  Total.................................               822               100               822               100
----------------------------------------------------------------------------------------------------------------

    We assumed that the remaining 861 entities that did not have
revenue data are very small businesses. We assumed that the interim
rule may have a significant economic impact on these businesses.

Assistance for Small Entities

    Under section 213(a) of the Small Business Regulatory Enforcement
Fairness Act of 1996 (Pub. L. 104-121), we want to assist small
entities in understanding this interim rule so that they can better
evaluate its effects on them and participate in the rulemaking. If the
interim rule would affect your small business, organization, or
governmental jurisdiction and you have questions concerning its
provisions or options for compliance, please consult Lieutenant Kevin
Oditt (G-MP), U.S. Coast Guard by telephone 202-267-1103, toll-free
telephone 1-800-842-8740 ext. 7-1103, or electronic mail
msregs@comdt.uscg.mil.    Small businesses may send comments on the actions of Federal
employees who enforce, or otherwise determine compliance with, Federal
regulations to the Small Business and Agriculture Regulatory
Enforcement Ombudsman and the Regional Small Business Regulatory
Fairness Boards. The Ombudsman evaluates these actions annually and
rates each agency's responsiveness to small business. If you wish to
comment on actions by employees of the Coast Guard, call 1-888-REG-FAIR
(1-888-734-3247).

Collection of Information

    This interim rule calls for a collection of information under the
Paperwork Reduction Act of 1995 (44 U.S.C. 3501-3520). As defined in 5
CFR 1320.3(c), ``collection of information'' comprises reporting,
recordkeeping, monitoring, posting, labeling, and other, similar
actions. The title and description of the information collections, a
description of those who must collect the information, and an estimate
of the total annual burden follow. The estimate covers the time for
reviewing instructions, searching existing sources of data, gathering
and maintaining the data needed, and completing and reviewing the
collection.
    This interim rule modifies two existing OMB-approved collections--
1625-0077 [formerly 2115-0622] and

[[Page 39301]]

1625-0100 [formerly 2115-0557]. Summaries of the revised collections
follow.
    Title: Security Plans for Ports, Vessels, Facilities, and Outer
Continental Shelf Facilities and Other Security-Related Requirements.
    OMB Control Number: 1625-0077
    Summary of the Collection of Information: The Coast Guard requires
security assessments and plans for vessels. This interim rule provides
a framework to ensure adequate security planning, drilling, and
communication procedures by requiring vessels to develop and submit for
approval Vessel Security Assessments and Vessel Security Plans.
    Need for Information: The primary need for information is to
identify the adequate security mitigating measures that will be
implemented when needed.
    Proposed Use of Information: The information will be used to
identify and communicate the security mitigating measures to the Coast
Guard and necessary personnel.
    Description of the Respondents: The Company Security Officer for
owners and operators of the affected vessels or another designated
person is responsible for developing the Vessel Security Assessment and
the Vessel Security Plan.
    Number of Respondents: 2,202 Company Security Officers at the
affected companies.
    Frequency of Response: Vessel Security Assessments and Vessel
Security Plans are to be submitted for approval initially, and will be
reviewed annually.
    Burden of Response: Development burden for the Vessel Security
Assessments and Vessel Security Plans is estimated to be approximately
eight to 80 hours depending on the size of the company and the number
and types of vessels the company owns. Updating the assessments and
plans is estimated to be approximately one to four hours depending on
the size of the company and the number and types of vessels the company
owns.
    Estimate of Total Annual Burden: Vessel Security Assessments and
Vessel Security Plans will have a total burden in the initial year of
135,269 hours. Annually, the total burden of the assessments and the
plans is 11,700 hours. For a summary of all revisions to this existing
OMB-approved collection, refer to Collection of Information in the
interim rule titled ``Implementation of National Maritime Security
Initiatives'' (USCG-2003-14792) published elsewhere in today's Federal
Register.
    Title: Advance Notice of Arrival.
    OMB Control Number: 1625-0100.
    Summary of the Collection of Information: The Coast Guard requires
pre-arrival messages from any vessel entering a port or place in the
United States. This interim rule adds the requirement to communicate
security-related information about the vessel to the Coast Guard.
    Need for Information: The primary need for information is to
identify the adequate security mitigating measures that will be
implemented when needed.
    Proposed Use of Information: The information will be used to
identify and communicate the security mitigating measures to the Coast
Guard and necessary personnel.
    Description of the Respondents: Respondents are owners and
operators of vessels that arrive at or depart from a port or place in
the United States after departing from foreign ports.
    Number of Respondents: The existing OMB-approved collection number
of respondents is 10,367. This rule will not increase the number of
respondents.
    Frequency of Response: The existing OMB-approved collection number
of responses is 68,289. This rule will not increase the number of
responses.
    Burden of Response: The existing OMB-approved collection burden of
response is approximately 2.5 hours. Because the already approved Cargo
Declaration requirement (Table 160.206(a)(8), per Final Rule of May 22,
2003; USCG-2002-11865; 68 FR 27908) has been suspended, this rule will
not have a net increase in the burden.
    Estimate of Total Annual Burden: The existing OMB-approved total
annual burden is 174,179 hours. This rule will not increase the burden.
However, due to an adjustment in the way the Coast Guard calculates the
burden, we estimate the total annual burden to be 173,904.
    As required by the Paperwork Reduction Act of 1995 (44 U.S.C.
3507(d)), we have submitted a copy of this interim rule to the Office
of Management and Budget (OMB) for its review of the collection of
information. Due to the circumstances surrounding this temporary rule,
we asked for ``emergency processing'' of our request. We received OMB
approval for these collections of information on June 16, 2003. They
are valid until December 31, 2003.
    We ask for public comment on the collection of information to help
us determine how useful the information is; whether it can help us
perform our functions better; whether it is readily available
elsewhere; how accurate our estimate of the burden of collection is;
how valid our methods for determining burden are; how we can improve
the quality, usefulness, and clarity of the information; and how we can
minimize the burden of collection.
    If you submit comments on the collection of information, submit
them both to OMB and to the Docket Management Facility where indicated
under ADDRESSES, by the date under DATES.
    You need not respond to a collection of information unless it
displays a currently valid control number from OMB. We received OMB
approval for these collections of information on June 16, 2003. They
are valid until December 31, 2003.

Federalism

    An interim rule has implications for federalism under Executive
Order 13132, Federalism, if it has a substantial direct effect on State
or local governments and would either preempt State law or impose a
substantial direct cost of compliance on them. See the Federalism
section in the interim rule preamble titled ``Implementation of
National Maritime Security Initiatives'' (USCG-2003-14792) published
elsewhere in today's Federal Register for a discussion of our analysis
under this Executive Order.

Unfunded Mandates Reform Act

    The Unfunded Mandates Reform Act of 1995 (2 U.S.C. 1531-1538)
requires Federal agencies to assess the effects of their discretionary
regulatory actions. In particular, the Act addresses actions that may
result in the expenditure by a State, local, or tribal government, in
the aggregate, or by the private sector of $100,000,000 or more in any
one year. This interim rule is exempted from assessing the effects of
the regulatory action as required by the Act because it is necessary
for the national security of the U.S. (2 U.S.C. 1503(5)).

Taking of Private Property

    This interim rule will not effect a taking of private property or
otherwise have taking implications under Executive Order 12630,
Governmental Actions and Interference with Constitutionally Protected
Property Rights.

Civil Justice Reform

    This interim rule meets applicable standards in sections 3(a) and
3(b)(2) of Executive Order 12988, Civil Justice Reform, to minimize
litigation, eliminate ambiguity, and reduce burden.

Protection of Children

    We have analyzed this interim rule under Executive Order 13045,

[[Page 39302]]

Protection of Children from Environmental Health Risks and Safety
Risks. While this interim rule is an economically significant rule, it
does not create an environmental risk to health or risk to safety that
may disproportionately affect children.

Indian Tribal Governments

    This interim rule does not have tribal implications under Executive
Order 13175, Consultation and Coordination with Indian Tribal
Governments, because it does not have a substantial direct effect on
one or more Indian tribes, on the relationship between the Federal
Government and Indian tribes, or on the distribution of power and
responsibilities between the Federal Government and Indian tribes.

Energy Effects

    We have analyzed this interim rule under Executive Order 13211,
Actions Concerning Regulations That Significantly Affect Energy Supply,
Distribution, or Use. We have determined that it is not a ``significant
energy action'' under that order. Although it is a ``significant
regulatory action'' under Executive Order 12866, it is not likely to
have a significant adverse effect on the supply, distribution, or use
of energy. The Administrator of the Office of Information and
Regulatory Affairs has not designated it as a significant energy
action. Therefore, it does not require a Statement of Energy Effects
under Executive Order 13211.
    This interim rule has a positive effect on the supply,
distribution, and use of energy. The interim rule provides for security
assessments, plans, procedures, and standards, which will prove
beneficial for the supply, distribution, and use of energy at increased
levels of maritime security.

Trade Impact Assessment

    The Trade Agreement Act of 1979 (19 U.S.C. 2501-2582) prohibits
Federal agencies from engaging in any standards or related activities
that create unnecessary obstacles to the foreign commerce of the U.S.
Legitimate domestic objectives, such as safety and security, are not
considered unnecessary obstacles. The Act also requires consideration
of international standards and, where appropriate, that they be the
basis for U.S. standards. We have assessed the potential effect of this
interim rule and have determined that it would likely create obstacles
to the foreign commerce of the U.S. However, because these regulations
are being put in place in order to further a legitimate domestic
objective, namely to increase the security of the U.S., any obstacles
created by the regulation are not considered unnecessary obstacles.

Environment

    We have considered the environmental impact of this interim rule
and concluded that under figure 2-1, paragraph (34)(a), (34)(c) and
(34)(d), of Commandant Instruction M16475.lD, this interim rule is
categorically excluded from further environmental documentation. This
interim rule concerns security assessments, plans, training, and the
establishment of security positions that will contribute to a higher
level of marine safety and security for vessels and U.S. ports. A
``Categorical Exclusion Determination'' is available in the docket
where indicated under ADDRESSES or SUPPLEMENTARY INFORMATION.
    This rulemaking will not significantly impact the coastal zone.
Further, the rulemaking and the execution of this interim rule will be
done in conjunction with appropriate state coastal authorities. The
Coast Guard will, therefore, comply with the requirements of the
Coastal Zone Management Act while furthering its intent to protect the
coastal zone.

List of Subjects

33 CFR Part 104

    Incorporation by reference, Maritime security, Reporting and
recordkeeping requirements, Security measures, Vessels.

33 CFR Part 160

    Administrative practice and procedure, Harbors, Hazardous material
transportation, Marine safety, Navigation (water), Reporting and
recordkeeping requirement, Vessels, Waterways.

46 CFR Part 2

    Marine safety, Maritime security, Reporting and recordkeeping
requirements, Vessels.

46 CFR Part 31

    Cargo vessels, Inspection and certification, Maritime security.

46 CFR Part 71

    Inspection and certification, Maritime security, Passenger vessels.

46 CFR Part 91

    Cargo vessels, Inspection and Certification, Maritime security.

46 CFR Part 115

    Fire prevention, Inspection and certification, Marine safety,
Maritime security, Reporting and recordkeeping requirements, Vessels.

46 CFR Part 126

    Cargo vessels, Inspection and certification, Marine safety,
Maritime security, Reporting and recordkeeping requirements.

46 CFR Part 176

    Fire prevention, Inspection, Marine safety, Maritime security,
Reporting and recordkeeping requirements, Vessels.

0
For the reasons discussed in the preamble, the Coast Guard adds 33 CFR
part 104 and amends 33 CFR part 160 and part 165, and 46 CFR parts 2,
31, 71, 91, 115, 126, and 176 as follows:
0
1. Add part 104 to subchapter H of chapter I title 33 of the CFR to
read as follows:

PART 104--VESSEL SECURITY

Subpart A--General
Sec.
104.100 Definitions.
104.105 Applicability.
104.110 Exemptions.
104.115 Compliance dates.
104.120 Compliance documentation.
104.125 Noncompliance.
104.130 Waivers.
104.135 Equivalents.
104.140 Alternative Security Programs.
104.145 Maritime Security (MARSEC) Directive.
104.150 Right to appeal.
Subpart B--Vessel Security Requirements
104.200 Owner or operator.
104.205 Master.
104.210 Company Security Officer (CSO).
104.215 Vessel Security Officer (VSO).
104.220 Company or vessel personnel with security duties.
104.225 Security training for all other vessel personnel.
104.230 Drill and exercise requirements.
104.235 Vessel recordkeeping requirements.
104.240 Maritime Security (MARSEC) Level coordination and
implementation.
104.245 Communications.
104.250 Procedures for interfacing with facilities and other
vessels.
104.255 Declaration of Security (DoS).
104.260 Security systems and equipment maintenance.
104.265 Security measures for access control.
104.270 Security measures for restricted areas.
104.275 Security measures for handling cargo.
104.280 Security measures for delivery of vessel stores and bunkers.
104.285 Security measures for monitoring.
104.290 Security incident procedures.
104.292 Additional requirements--passenger vessels and ferries.
104.295 Additional requirements--cruise ships.
104.297 Additional requirements--vessels on international voyages.

[[Page 39303]]

Subpart C--Vessel Security Assessment (VSA)
104.300 General.
104.305 Vessel Security Assessment (VSA) requirements.
104.310 Submission requirements.
Subpart D--Vessel Security Plan (VSP)
104.400 General.
104.405 Format of the Vessel Security Plan (VSP).
104.410 Submission and approval.
104.415 Amendment and audit.

    Authority: 33 U.S.C. 1226, 1231; 46 U.S.C. Chapter 701; 50
U.S.C. 191; 33 CFR 1.05-1, 6.04-11, 6.14, 6.16, and 6.19; Department
of Homeland Security Delegation No. 0170.

Subpart A--General

Sec.  104.100  Definitions.

    Except as specifically stated in this subpart, the definitions in
part 101 of this subchapter apply to this part.

Sec.  104.105  Applicability.

    (a) This part applies to the owner or operator of any:
    (1) Mobile Offshore Drilling Unit (MODU), cargo, or passenger
vessel subject to the International Convention for Safety of Life at
Sea, 1974, (SOLAS);
    (2) Foreign commercial vessel greater than 100 gross register tons
not subject to SOLAS;
    (3) Commercial vessel greater than 100 gross register tons subject
to 46 CFR subchapter I, except commercial fishing vessels inspected
under 46 CFR part 105;
    (4) Vessel subject to 46 CFR subchapter L;
    (5) Passenger vessel subject to 46 CFR subchapters H or K;
    (6) Other passenger vessel carrying more than 12 passengers that is
engaged on an international voyage;
    (7) Barge subject to 46 CFR subchapters D or O;
    (8) Barge subject to 46 CFR subchapter I that carries Certain
Dangerous Cargoes in bulk, or that is engaged on an international
voyage;
    (9) Tankship subject to 46 CFR subchapters D or O; and
    (10) Towing vessel greater than 8 meters in registered length that
is engaged in towing a barge or barges subject to this part.
    (b) An owner or operator of any vessel not covered in paragraph (a)
of this section is subject to parts 101 through 103 of this subchapter.
    (c) Foreign vessels that have on board a valid International Ship
Security Certificate (ISSC) that attests to the vessel's compliance
with SOLAS Chapter XI-2 and the ISPS Code, part A (Incorporated by
reference, see Sec.  101.115 of this chapter), and having taken into
account the relevant provisions in the ISPS Code, part B, will be
deemed to be in compliance with this part, except for Sec. Sec.
104.240, 104.255, 104.292, and 104.295 as appropriate.
    (d) Except pursuant to international treaty, convention, or
agreement to which the U.S. is a party, this part does not apply to any
foreign vessel that is not destined for, or departing from, a port or
place subject to the jurisdiction of the U.S. and that is in:
    (1) Innocent passage through the territorial sea of the U.S.; or
    (2) Transit through the navigable waters of the U.S. that form a
part of an international strait.

Sec.  104.110  Exemptions.

    This part does not apply to warships, naval auxiliaries or other
vessels owned or operated by a government and used only on government
non-commercial service.

Sec.  104.115  Compliance dates.

    (a) On or before December 29, 2003, each vessel owner or operator
must submit to the Commanding Officer, Marine Safety Center for each
vessel the Vessel Security Plan described in subpart D of this part for
review and approval.
    (b) On or before June 30, 2004, each vessel must be operating in
compliance with this part.
    (c) On or before July 1, 2004, foreign vessels must carry on board
a valid International Ship Security Certificate that certifies that the
verifications required by Section 19.1 of part A of the ISPS Code
(Incorporated by reference, see Sec.  101.115 of this chapter) have
been completed, that the vessel meets the applicable requirements of
SOLAS Chapter XI-2 (Incorporated by reference, see Sec.  101.115 of
this chapter) and the ISPS Code, part A, and that the vessel is
provided with an approved security plan.

Sec.  104.120  Compliance documentation.

    (a) Each vessel owner or operator subject to this part must ensure,
no later than 1 July 2004, that copies of the following documents are
carried on board the vessel and are made available to the Coast Guard
upon request:
    (1) The approved Vessel Security Plan (VSP) and any approved
revisions or amendments thereto, and a letter of approval from the
Commanding Officer, Marine Safety Center (MSC);
    (2) The VSP submitted for approval and a current acknowledgement
letter from the Commanding Officer, MSC, stating that the Coast Guard
is currently reviewing the VSP submitted for approval, and that the
vessel may continue to operate so long as the vessel remains in
compliance with the submitted plan;
    (3) For vessels operating under a Coast Guard-approved Alternative
Security Program as provided in Sec.  104.140, a copy of the
Alternative Security Program the vessel is using and a letter signed by
the vessel owner or operator, stating which Alternative Security
Program the vessel is using and certifying that the vessel is in full
compliance with that program; or
    (4) For foreign vessels, a valid International Ship Security
Certificate that attests to the vessel's compliance with SOLAS Chapter
XI-2 and the ISPS Code, part A (Incorporated by reference, see Sec.
101.115 of this subchapter), and having taken into account the relevant
provisions in the ISPS Code, part B.
    (b) Each owner or operator of an unmanned vessel subject to this
part must maintain the documentation described in paragraphs (a)(1),
(2), or (3) of this section. The letter required by each of those
paragraphs must be carried on board the vessel. The plan or program
required by each of those paragraphs must not be carried on board the
vessel, but must be maintained in a secure location. During scheduled
inspections, the plan or program must be made available to the Coast
Guard upon request.

Sec.  104.125  Noncompliance.

    When a vessel is not in compliance with the requirements of this
part, the vessel owner or operator must notify the cognizant COTP and
request a waiver to continue operations.

Sec.  104.130  Waivers.

    Any vessel owner or operator may apply for a waiver of any
requirement of this part that the owner or operator considers
unnecessary in light of the nature or operating conditions of the
vessel. A request for a waiver must be submitted in writing with
justification to the Commandant (G-MP) at 2100 Second St., SW.,
Washington, DC 20593. The Commandant (G-MP) may require the vessel
owner or operator to provide additional data for determining the
validity of the requested waiver. The Commandant (G-MP) may grant, in
writing, a waiver with or without conditions only if the waiver will
not reduce the overall security of the vessel, its passengers, its
crew, or its cargo, or facilities or ports that the vessel may visit.

Sec.  104.135  Equivalents.

    For any measure required by this part, the vessel owner or operator
may

[[Page 39304]]

propose an equivalent as provided in Sec.  101.130 of this subchapter.

Sec.  104.140  Alternative Security Programs.

    A vessel owner or operator may use an Alternative Security Program
as approved under Sec.  101.120 of this subchapter if:
    (a) The Alternative Security Program is appropriate to that class
of vessel;
    (b) The vessel does not engage on international voyages; and
    (c) The Alternative Security Program is implemented in its
entirety.

Sec.  104.145  Maritime Security (MARSEC) Directive.

    Each vessel owner or operator subject to this part must comply with
any instructions contained in a MARSEC Directive issued under Sec.
101.405 of this subchapter.

Sec.  104.150  Right to appeal.

    Any person directly affected by a decision or action taken under
this part, by or on behalf of the Coast Guard, may appeal as described
in Sec.  101.420 of this subchapter.

Subpart B--Vessel Security Requirements

Sec.  104.200  Owner or operator.

    (a) Each vessel owner or operator must ensure that the vessel
operates in compliance with the requirements of this part.
    (b) For each vessel, the vessel owner or operator must:
    (1) Define the security organizational structure for each vessel
and provide all personnel exercising security duties or
responsibilities within that structure with the support needed to
fulfill security obligations;
    (2) Designate, in writing, by name or title, a Company Security
Officer (CSO), a Vessel Security Officer (VSO) for each vessel, and
identify how those officers can be contacted at any time;
    (3) Ensure personnel receive training, drills, and exercises
enabling them to perform their assigned security duties;
    (4) Ensure vessel security records are kept;
    (5) Ensure that adequate coordination of security issues takes
place between vessels and facilities; this includes the execution of a
Declaration of Security (DoS);
    (6) Ensure coordination of shore leave for vessel personnel or crew
change-out, as well as access through the facility of visitors to the
vessel (including representatives of seafarers' welfare and labor
organizations), with facility operators in advance of a vessel's
arrival;
    (7) Ensure security communication is readily available;
    (8) Ensure coordination with and implementation of changes in
Maritime Security (MARSEC) Level;
    (9) Ensure that security systems and equipment are installed and
maintained;
    (10) Ensure that vessel access, including the embarkation of
persons and their effects, are controlled;
    (11) Ensure that restricted areas are controlled;
    (12) Ensure that cargo and vessel stores and bunkers are handled in
compliance with this part;
    (13) Ensure restricted areas, deck areas, and areas surrounding the
vessel are monitored;
    (14) Provide the Master, or for vessels on domestic routes only,
the CSO, with the following information:
    (i) Parties responsible for appointing vessel personnel, such as
vessel management companies, manning agents, contractor,
concessionaires (for example, retail sales outlets, casinos, etc.);
    (ii) Parties responsible for deciding the employment of the vessel,
including time or bareboat charters or any other entity acting in such
capacity; and
    (iii) In cases when the vessel is employed under the terms of a
charter party, the contract details of those documents, including time
or voyage charters; and
    (15) Give particular consideration to the convenience, comfort, and
personal privacy of vessel personnel and their ability to maintain
their effectiveness over long periods.

Sec.  104.205  Master.

    (a) Nothing in this part is intended to permit the Master to be
constrained by the Company, the vessel owner or operator, or any other
person, from taking or executing any decision which, in the
professional judgment of the Master, is necessary to maintain the
safety and security of the vessel. This includes denial of access to
persons--except those identified as duly authorized by the cognizant
government authority--or their effects, and refusal to load cargo,
including containers or other closed cargo transport units.
    (b) If, in the professional judgment of the Master, a conflict
between any safety and security requirements applicable to the vessel
arises during its operations, the Master may give precedence to
measures intended to maintain the safety of the vessel, and take such
temporary security measures as seem best under all circumstances. In
such cases:
    (1) The Master must, as soon as practicable, inform the nearest
COTP. If the vessel is on a foreign voyage, the Master must promptly
inform the Coast Guard at 1-800-424-8802, direct telephone at 202-267-
2675, fax at 202-267-2165, TDD at 202-267-4477, or E-mail at 1st-
nrcinfo@comdt.uscg.mil and if subject to the jurisdiction of a foreign
government, the relevant maritime authority of that foreign government;
    (2) The temporary security measures must, to the highest possible
degree, be commensurate with the prevailing Maritime Security (MARSEC)
Level; and
    (3) The owner or operator must ensure that such conflicts are
resolved to the satisfaction of the cognizant COTP, or for vessels on
international voyages, the Commandant (G-MP), and that the possibility
of recurrence is minimized.

Sec.  104.210  Company Security Officer (CSO).

    (a) General. (1) Each vessel owner or operator must designate in
writing a CSO.
    (2) A vessel owner or operator may designate a single CSO for all
its vessels to which this part applies, or may designate more than one
CSO, in which case the owner or operator must clearly identify the
vessels for which each CSO is responsible.
    (3) A CSO may perform other duties within the owner or operator's
organization, provided he or she is able to perform the duties and
responsibilities required of a CSO.
    (4) The CSO may delegate duties required by this part, but remains
responsible for the performance of those duties.
    (b) Qualifications. (1) The CSO must have general knowledge,
through training or equivalent job experience, in the following:
    (i) Security administration and organization of the company's
vessel(s);
    (ii) Vessel, facility, and port operations relevant to that
industry;
    (iii) Vessel and facility security measures, including the meaning
and the consequential requirements of the different Maritime Security
(MARSEC) Levels;
    (iv) Emergency preparedness and response and contingency planning;
    (v) Security equipment and systems and their operational
limitations;
    (vi) Methods of conducting audits, inspection and control and
monitoring techniques; and
    (vii) Techniques for security training and education, including
security measures and procedures.
    (2) In addition to knowledge and training in paragraph (b)(1) of
this section, the CSO must have general knowledge through training or
equivalent job experience in the following, as appropriate:
    (i) Relevant international conventions, codes, and recommendations;

[[Page 39305]]

    (ii) Relevant government legislation and regulations;
    (iii) Responsibilities and functions of other security
organizations;
    (iv) Methodology of Vessel Security Assessment;
    (v) Methods of vessel security surveys and inspections;
    (vi) Instruction techniques for security training and education,
including security measures and procedures;
    (vii) Handling sensitive security information and security related
communications;
    (viii) Knowledge of current security threats and patterns;
    (ix) Recognition and detection of dangerous substances and devices;
    (x) Recognition of characteristics and behavioral patterns of
persons who are likely to threaten security;
    (xi) Techniques used to circumvent security measures;
    (xii) Methods of physical screening and non-intrusive inspections;
    (xiii) Security drills and exercises, including drills and
exercises with facilities; and
    (xiv) Assessment of security drills and exercises.
    (c) Responsibilities. In addition to those responsibilities and
duties specified elsewhere in this part, the CSO must, for each vessel
for which he or she has been designated:
    (1) Keep the vessel apprised of potential threats or other
information relevant to its security;
    (2) Ensure a Vessel Security Assessment (VSA) is carried out;
    (3) Ensure a Vessel Security Plan (VSP) is developed, approved, and
maintained;
    (4) Ensure the VSP is modified when necessary;
    (5) Ensure vessel security activities are audited;
    (6) Arrange for Coast Guard inspections under 46 CFR part 2;
    (7) Ensure the timely or prompt correction of problems identified
by audits or inspections;
    (8) Enhance security awareness and vigilance within the owner's or
operator's organization;
    (9) Ensure relevant personnel receive adequate security training;
    (10) Ensure communication and cooperation between the vessel and
the port and facilities with which the vessel interfaces;
    (11) Ensure consistency between security requirements and safety
requirements;
    (12) Ensure that when sister-vessel or fleet security plans are
used, the plan for each vessel reflects the vessel-specific information
accurately;
    (13) Ensure compliance with an Alternative Security Program or
equivalents approved under this subchapter, if appropriate; and
    (14) Ensure security measures give particular consideration to the
convenience, comfort, and personal privacy of vessel personnel and
their ability to maintain their effectiveness over long periods.

Sec.  104.215  Vessel Security Officer (VSO).

    (a) General. (1) A VSO may perform other duties within the owner's
or operator's organization, provided he or she is able to perform the
duties and responsibilities required of the VSO for each such vessel.
    (2) For manned vessels, the VSO must be a member of the crew.
    (3) For unmanned vessels, the same person may serve as the VSO for
more one than one unmanned vessel. If a person serves as the VSO for
more than one unmanned vessel, the name of each unmanned vessel for
which he or she is the VSO must be listed in the Vessel Security Plan
(VSP).
    (4) The VSO of any unmanned barge and the VSO of any towing vessel
interfacing with the barge must coordinate and ensure the
implementation of security measures applicable to both vessels during
the period of their interface.
    (5) The VSO may assign security duties to other vessel personnel;
however, the VSO remains responsible for these duties.
    (b) Qualifications. The VSO must have general knowledge, through
training or equivalent job experience, in the following:
    (1) Those items listed in Sec.  104.210 (b)(1) and (b)(2) of this
part;
    (2) Vessel layout;
    (3) The VSP and related procedures, including scenario-based
response training;
    (4) Crowd management and control techniques;
    (5) Operations of security equipment and systems; and
    (6) Testing and calibration of security equipment and systems, and
their maintenance while at sea.
    (c) Responsibilities. In addition to those responsibilities and
duties specified elsewhere in this part, the VSO must, for each vessel
for which he or she has been designated:
    (1) Regularly inspect the vessel to ensure that security measures
are maintained;
    (2) Ensure maintenance and supervision of the implementation of the
VSP, and any amendments to the VSP;
    (3) Ensure the coordination and handling of cargo and vessel stores
and bunkers in compliance with this part;
    (4) Propose modifications to the VSP to the Company Security
Officer (CSO);
    (5) Ensure that any problems identified during audits or
inspections are reported to the CSO, and promptly implement any
corrective actions;
    (6) Ensure security awareness and vigilance on board the vessel;
    (7) Ensure adequate security training for vessel personnel;
    (8) Ensure the reporting and recording of all security incidents;
    (9) Ensure the coordinated implementation of the VSP with the CSO
and the relevant Facility Security Officer, when applicable;
    (10) Ensure security equipment is properly operated, tested,
calibrated and maintained; and
    (11) Ensure consistency between security requirements and the
proper treatment of vessel personnel affected by those requirements.

Sec.  104.220  Company or vessel personnel with security duties.

    Company and vessel personnel responsible for security duties must
have knowledge, through training or equivalent job experience, in the
following, as appropriate:
    (a) Knowledge of current security threats and patterns;
    (b) Recognition and detection of dangerous substances and devices;
    (c) Recognition of characteristics and behavioral patterns of
persons who are likely to threaten security;
    (d) Techniques used to circumvent security measures;
    (e) Crowd management and control techniques;
    (f) Security related communications;
    (g) Knowledge of emergency procedures and contingency plans;
    (h) Operation of security equipment and systems;
    (i) Testing and calibration of security equipment and systems, and
their maintenance while at sea;
    (j) Inspection, control, and monitoring techniques;
    (k) Relevant provisions of the Vessel Security Plan (VSP);
    (l) Methods of physical screening of persons, personal effects,
baggage, cargo, and vessel stores; and
    (m) The meaning and the consequential requirements of the different
Maritime Security (MARSEC) Levels.

Sec.  104.225  Security training for all other vessel personnel.

    All other vessel personnel, including contractors, whether part-
time, full-time, temporary, or permanent, must have knowledge of,
through training or equivalent job experience in the following:

[[Page 39306]]

    (a) Relevant provisions of the Vessel Security Plan (VSP);
    (b) The meaning and the consequential requirements of the different
Maritime Security (MARSEC) Levels, including emergency procedures and
contingency plans;
    (c) Recognition and detection of dangerous substances and devices;
    (d) Recognition of characteristics and behavioral patterns of
persons who are likely to threaten security; and
    (e) Techniques used to circumvent security measures.

Sec.  104.230  Drill and exercise requirements.

    (a) General. Drills and exercises must test the proficiency of
vessel personnel in assigned security duties at all Maritime Security
(MARSEC) Levels and the effective implementation of the Vessel Security
Plan (VSP). They must enable the Vessel Security Officer (VSO) to
identify any related security deficiencies that need to be addressed.
    (b) Drills. (1) The VSO must ensure that at least one security
drill is conducted at least every 3 months, except when a vessel is out
of service due to repairs or seasonal suspension of operation provided
that in such cases a drill must be conducted within one week of the
vessel's reactivation. Security drills may be held in conjunction with
non-security drills where appropriate.
    (2) Drills must test individual elements of the VSP, including
response to security threats and incidents. Drills should take into
account the types of operations of the vessel, vessel personnel
changes, and other relevant circumstances. Examples of drills include
unauthorized entry to a restricted area, response to alarms, and
notification of law enforcement authorities.
    (3) If the vessel is moored at a facility on the date the facility
has planned to conduct any drills, the vessel may, but is not required
to, participate in the facility's scheduled drill.
    (4) Drills must be conducted within one week whenever the
percentage of vessel personnel with no prior participation in a vessel
security drill on that vessel exceeds 25 percent.
    (c) Exercises. (1) Exercises must be conducted at least once each
calendar year, with no more than 18 months between exercises.
    (2) Exercises may be:
    (i) Full scale or live;
    (ii) Tabletop simulation or seminar;
    (iii) Combined with other appropriate exercises; or
    (iv) A combination of the elements in paragraphs (c)(2)(i) through
(iii) of this section.
    (3) Exercises may be vessel-specific or part of a cooperative
exercise program to exercise applicable facility and vessel security
plans or comprehensive port exercises.
    (4) Each exercise must test communication and notification
procedures, and elements of coordination, resource availability, and
response.
    (5) Exercises are a full test of the security program and must
include the substantial and active participation of relevant company
and vessel security personnel, and may include facility security
personnel and government authorities depending on the scope and the
nature of the exercises.

Sec.  104.235  Vessel recordkeeping requirements.

    (a) Unless otherwise specified in this section, the Vessel Security
Officer must keep records of the activities as set out in paragraph (b)
of this section for at least 2 years and make them available to the
Coast Guard upon request.
    (b) Records required by this section may be kept in electronic
format. If kept in an electronic format, they must be protected against
unauthorized deletion, destruction, or amendment. The following records
must be kept:
    (1) Training. For each security training session, the date of each
session, duration of session, a description of the training, and a list
of attendees;
    (2) Drills and exercises. For each drill or exercise, the date
held, description of drill or exercise, list of participants; and any
best practices or lessons learned which may improve the Vessel Security
Plan (VSP);
    (3) Incidents and breaches of security. Date and time of
occurrence, location within the port, location within the vessel,
description of incident or breaches, to whom it was reported, and
description of the response;
    (4) Changes in Maritime Security (MARSEC) Levels. Date and time of
notification received, and time of compliance with additional
requirements;
    (5) Maintenance, calibration, and testing of security equipment.
For each occurrence of maintenance, calibration, and testing, the date
and time, and the specific security equipment involved;
    (6) Security threats. Date and time of occurrence, how the threat
was communicated, who received or identified the threat, description of
threat, to whom it was reported, and description of the response;
    (7) Declaration of Security (DoS). Manned vessels must keep on
board a copy of the last 10 DoSs and a copy of each continuing DoS for
at least 90 days after the end of its effective period; and
    (8) Annual audit of the VSP. For each annual audit, a letter
certified by the VSO stating the date the audit was completed.
    (c) Any records required by this part must be protected from
unauthorized access or disclosure.

Sec.  104.240  Maritime Security (MARSEC) Level coordination and
implementation.

    (a) The vessel owner or operator must ensure that, prior to
entering a port, all measures are taken that are specified in the
Vessel Security Plan (VSP) for compliance with the MARSEC Level in
effect for the port.
    (b) When notified of an increase in the MARSEC Level, the vessel
owner or operator must ensure:
    (1) If a higher MARSEC Level is set for the port in which the
vessel is located or is about to enter, the vessel complies, without
undue delay, with all measures specified in the VSP for compliance with
that higher MARSEC Level;
    (2) The COTP is notified as required by Sec.  101.300(c) when
compliance with the higher MARSEC Level has been implemented; and
    (3) For vessels in port, that compliance with the higher MARSEC
Level has taken place within 12 hours of the notification.
    (c) For MARSEC Levels 2 and 3, the Vessel Security Officer must
brief all vessel personnel of identified threats, emphasize reporting
procedures, and stress the need for increased vigilance.
    (d) An owner or operator whose vessel is not in compliance with the
requirements of this section must inform the COTP and obtain approval
prior to entering any port, prior to interfacing with another vessel or
with a facility or to continuing operations.
    (e) For MARSEC Level 3, in addition to the requirements in this
part, a vessel owner or operator may be required to implement
additional measures, pursuant to 33 CFR part 6, 160 or 165, as
appropriate, which may include but are not limited to:
    (1) Arrangements to ensure that the vessel can be towed or moved if
deemed necessary by the Coast Guard;
    (2) Use of waterborne security patrol;
    (3) Use of armed security personnel to control access to the vessel
and to deter, to the maximum extent practical, a TSI; or
    (4) Screening the vessel for the presence of dangerous substances
and devices underwater or other threats.

Sec.  104.245  Communications.

    (a) The Vessel Security Officer must have a means to effectively
notify vessel

[[Page 39307]]

personnel of changes in security conditions on board the vessel.
    (b) Communications systems and procedures must allow effective and
continuous communication between the vessel security personnel,
facilities interfacing with the vessel, vessels interfacing with the
vessel, and national or local authorities with security
responsibilities.
    (c) Communication systems and procedures must enable vessel
personnel to notify, in a timely manner, shore side authorities or
other vessels of a security threat or incident on board.

Sec.  104.250  Procedures for interfacing with facilities and other
vessels.

    (a) The vessel owner or operator must ensure that there are
measures for interfacing with facilities and other vessels at all
MARSEC Levels.
    (b) For each U.S. flag vessel that calls on foreign ports or
facilities, the vessel owner or operator must ensure procedures for
interfacing with those ports and facilities are established.

Sec.  104.255  Declaration of Security (DoS).

    (a) Each vessel owner or operator must ensure procedures are
established for requesting a DoS and for handling DoS requests from a
facility or other vessel.
    (b) At MARSEC Level 1, the Master or Vessel Security Officer (VSO),
or their designated representative, of any cruise ship or manned vessel
carrying Certain Dangerous Cargoes, in bulk, must complete and sign a
DoS with the VSO or Facility Security Officer (FSO), or their
designated representative, of any vessel or facility with which it
interfaces.
    (1) For a vessel-to-facility interface, prior to arrival of a
vessel to a facility, the FSO and Master, VSO, or their designated
representatives must coordinate security needs and procedures, and
agree upon the contents of the DoS for the period of time the vessel is
at the facility. Upon a vessel's arrival to a facility and prior to any
passenger embarkation or disembarkation or cargo transfer operation,
the FSO or Master, VSO, or designated representatives must sign the
written DoS.
    (2) For a vessel engaging in a vessel-to-vessel interface, prior to
the interface, the respective Masters, VSOs, or their designated
representatives must coordinate security needs and procedures, and
agree upon the contents of the DoS for the period of time the vessel is
at the facility. Upon the vessel-to-vessel interface and prior to any
passenger embarkation or disembarkation or cargo transfer operation,
the respective Masters, VSOs, or designated representatives must sign
the written DoS.
    (c) At MARSEC Levels 2 and 3, the Master, VSO, or designated
representative of any vessel required to comply with this part must
sign and implement a DoS prior to any vessel-to-vessel interface.
    (d) At MARSEC Levels 2 and 3, the Master, VSO, or designated
representative of any vessel required to comply with this part must
sign and implement a DoS with the FSO of any facility on which it calls
prior to any cargo transfer operation or passenger embarkation or
disembarkation.
    (e) At MARSEC Levels 1 and 2, VSOs of vessels that frequently
interface with the same facility may implement a continuing DoS for
multiple visits, provided that:
    (1) The DoS is valid for the specific MARSEC Level;
    (2) The effective period at MARSEC Level 1 does not exceed 90 days;
and
    (3) The effective period at MARSEC Level 2 does not exceed 30 days.
    (f) When the MARSEC Level increases beyond the level contained in
the DoS, the continuing DoS becomes void and a new DoS must be signed
and implemented in accordance with this section.
    (g) The COTP may require at any time, at any MARSEC Level, any
manned vessel subject to this part to implement a DoS with the VSO or
FSO prior to any vessel-to-vessel or vessel-to-facility interface when
he or she deems it necessary.

Sec.  104.260  Security systems and equipment maintenance.

    (a) Security systems and equipment must be in good working order
and inspected, tested, calibrated and maintained according to the
manufacturer's recommendation.
    (b) The results of testing completed under paragraph (a) of this
section shall be recorded in accordance with Sec.  104.235. Any
deficiencies shall be promptly corrected.
    (c) The Vessel Security Plan (VSP) must include procedures for
identifying and responding to security system and equipment failures or
malfunctions.

Sec.  104.265  Security measures for access control.

    (a) General. The vessel owner or operator must ensure the
implementation of security measures to:
    (1) Deter the unauthorized introduction of dangerous substances and
devices, including any device intended to damage or destroy persons,
vessels, facilities, or ports;
    (2) Secure dangerous substances and devices that are authorized by
the owner or operator to be on board; and
    (3) Control access to the vessel.
    (b) The vessel owner or operator must ensure that:
    (1) The locations providing means of access to the vessel where
access restrictions or prohibitions are applied for each Maritime
Security (MARSEC) Level to prevent unauthorized access. ``Means of
access'' include, but are not limited, to all:
    (i) Access ladders;
    (ii) Access gangways;
    (iii) Access ramps;
    (iv) Access doors, side scuttles, windows, and ports;
    (v) Mooring lines and anchor chains; and
    (vi) Cranes and hoisting gear;
    (2) The identification of the types of restriction or prohibition
to be applied and the means of enforcing them; and
    (3) The means of identification required to allow individuals to
access the vessel and remain on the vessel without challenge are
established.
    (c) The vessel owner or operator must ensure that an identification
system is established for checking the identification of vessel
personnel or other persons seeking access to the vessel that:
    (1) Allows identification of authorized and unauthorized persons at
any MARSEC Level;
    (2) Is coordinated, when practicable, with identification systems
at facilities used by the vessel;
    (3) Is updated regularly;
    (4) Uses disciplinary measures to discourage abuse;
    (5) Allows temporary or continuing access for vessel personnel and
visitors, including seafarer's chaplains and union representatives,
through the use of a badge or other system to verify their identity;
and
    (6) Allow certain long-term, frequent vendor representatives to be
treated more as employees than as visitors.
    (d) The vessel owner or operator must establish in the approved
Vessel Security Plan (VSP) the frequency of application of any security
measures for access control, particularly if these security measures
are applied on a random or occasional basis.
    (e) MARSEC Level 1. The vessel owner or operator must ensure
security measures in this paragraph are implemented to:
    (1) Screen persons, baggage (including carry-on items), personal
effects, and vehicles for dangerous substances and devices at the rate
specified in the approved Vessels Security Plan (VSP);

[[Page 39308]]

    (2) Conspicuously post signs that describe security measures
currently in effect and clearly state that:
    (i) Boarding the vessel is deemed valid consent to screening or
inspection; and
    (ii) Failure to consent or submit to screening or inspection will
result in denial or revocation of authorization to board;
    (3) Check the identification of any person seeking to board the
vessel, including vessel passengers and crew, facility employees,
vendors, personnel duly authorized by the cognizant government
authorities, and visitors. This check includes confirming the reason
for boarding by examining at least one of the following:
    (i) Joining instructions;
    (ii) Passenger tickets;
    (iii) Boarding passes;
    (iv) Work orders, pilot orders, or surveyor orders;
    (v) Government identification; or
    (vi) Visitor badges issued in accordance with an identification
system required in paragraph (c) of this section;
    (4) Deny or revoke a person's authorization to be on board if the
person is unable or unwilling, upon the request of vessel personnel, to
establish his or her identity or to account for his or her presence on
board. Any such incident must be reported in compliance with this part;
    (5) Deter unauthorized access to the vessel;
    (6) Identify access points that must be secured or attended to
deter unauthorized access;
    (7) Lock or otherwise prevent access to unattended spaces that
adjoin areas to which passengers and visitors have access;
    (8) Provide a designated secure area on board or in liaison with a
facility, for conducting inspections and screening of people, baggage
(including carry-on items), personal effects, vehicles and the
vehicle's contents;
    (9) Ensure vessel personnel are not required to engage in or be
subjected to screening, of the person or of personal effects, by other
vessel personnel, unless security clearly requires it. Any such
screening must be conducted in a way that takes into full account
individual human rights and preserves the individual's basic human
dignity;
    (10) Ensure the screening of all unaccompanied baggage;
    (11) Ensure checked persons and their personal effects are
segregated from unchecked persons and their personal effects;
    (12) Ensure embarking passengers are segregated from disembarking
passengers;
    (13) Ensure, in liaison with the facility, a defined percentage of
vehicles to be loaded aboard passenger vessels are screened prior to
loading at the rate specified in the approved VSP;
    (14) Ensure, in liaison with the facility, all unaccompanied
vehicles to be loaded on passenger vessels are screened prior to
loading; and
    (15) Respond to the presence of unauthorized persons on board,
including repelling unauthorized boarders.
    (f) MARSEC Level 2. In addition to the security measures required
for MARSEC Level 1 in this section, at MARSEC Level 2, the vessel owner
or operator must also ensure the implementation of additional security
measures, as specified for MARSEC Level 2 in the approved VSP. These
additional security measures may include:
    (1) Increasing the frequency and detail of screening of people,
personal effects, and vehicles being embarked or loaded onto the vessel
as specified for MARSEC Level 2 in the approved VSP;
    (2) X-ray screening of all unaccompanied baggage;
    (3) Assigning additional personnel to patrol deck areas during
periods of reduced vessel operations to deter unauthorized access;
    (4) Limiting the number of access points to the vessel by closing
and securing some access points;
    (5) Denying access to visitors who do not have a verified
destination;
    (6) Deterring waterside access to the vessel, which may include, in
liaison with the facility, providing boat patrols; and
    (7) Establishing a restricted area on the shoreside of the vessel,
in close cooperation with the facility.
    (g) MARSEC Level 3. In addition to the security measures required
for MARSEC Level 1 and MARSEC Level 2, the vessel owner or operator
must ensure the implementation of additional security measures, as
specified for MARSEC Level 3 in the approved VSP. The additional
security measures may include:
    (1) Screening all persons, baggage, and personal effects for
dangerous substances and devices;
    (2) Performing one or more of the following on unaccompanied
baggage:
    (i) Screen unaccompanied baggage more extensively, for example, x-
raying from two or more angles;
    (ii) Prepare to restrict or suspend handling unaccompanied baggage;
or
    (iii) Refuse to accept unaccompanied baggage on board;
    (3) Being prepared to cooperate with responders and facilities;
    (4) Limiting access to the vessel to a single, controlled access
point;
    (5) Granting access to only those responding to the security
incident or threat thereof;
    (6) Suspending embarkation and/or disembarkation of personnel;
    (7) Suspending cargo operations;
    (8) Evacuating the vessel;
    (9) Moving the vessel; and
    (10) Preparing for a full or partial search of the vessel.

Sec.  104.270  Security measures for restricted areas.

    (a) General. The vessel owner or operator must ensure the
designation of restricted areas in order to:
    (1) Prevent or deter unauthorized access;
    (2) Protect persons authorized to be on board;
    (3) Protect the vessel;
    (4) Protect sensitive security areas within the vessel;
    (5) Protect security and surveillance equipment and systems; and
    (6) Protect cargo and vessel stores from tampering.
    (b) Designation of Restricted Areas. The vessel owner or operator
must ensure restricted areas are designated on board the vessel, as
specified in the approved plan. Restricted areas must include, as
appropriate:
    (1) Navigation bridge, machinery spaces and other control stations;
    (2) Spaces containing security and surveillance equipment and
systems and their controls and lighting system controls;
    (3) Ventilation and air-conditioning systems and other similar
spaces;
    (4) Spaces with access to potable water tanks, pumps, or manifolds;
    (5) Spaces containing dangerous goods or hazardous substances;
    (6) Spaces containing cargo pumps and their controls;
    (7) Cargo spaces and spaces containing vessel stores;
    (8) Crew accommodations; and
    (9) Any other spaces or areas vital to the security of the vessel.
    (c) The vessel owner or operator must ensure that security measures
and policies are established to:
    (1) Identify which vessel personnel are authorized to have access;
    (2) Determine which persons other than vessel personnel are
authorized to have access;
    (3) Determine the conditions under which that access may take
place;
    (4) Define the extent of any restricted area;
    (5) Define the times when access restrictions apply; and
    (6) Clearly mark all restricted areas and indicate that access to
the area is restricted and that unauthorized

[[Page 39309]]

presence within the area constitutes a breach of security.
    (d) Maritime Security (MARSEC) Level 1. The vessel owner or
operator must ensure the implementation of security measures to prevent
unauthorized access or activities within the area. These security
measures may include:
    (1) Locking or securing access points;
    (2) Monitoring and using surveillance equipment;
    (3) Using guards or patrols; and
    (4) Using automatic intrusion detection devices, which if used must
activate an audible and/or visual alarm at a location that is
continuously attended or monitored, to alert vessel personnel to
unauthorized access.
    (e) MARSEC Level 2. In addition to the security measures required
for MARSEC Level 1 in this section, at MARSEC Level 2, the vessel owner
or operator must also ensure the implementation of additional security
measures, as specified for MARSEC Level 2 in the approved VSP. These
additional security measures may include:
    (1) Increasing the frequency and intensity of monitoring and access
controls on existing restricted access areas;
    (2) Restricting access to areas adjacent to access points;
    (3) Providing continuous monitoring of each area, using
surveillance equipment; and
    (4) Dedicating additional personnel to guard or patrol each area.
    (f) MARSEC Level 3. In addition to the security measures required
for MARSEC Level 1 and MARSEC Level 2, at MARSEC Level 3, the vessel
owner or operator must ensure the implementation of additional security
measures, as specified for MARSEC Level 3 in the approved VSP. These
additional security measures may include:
    (1) Restricting access to additional areas; and
    (2) Searching restricted areas as part of a security sweep of the
vessel.

Sec.  104.275  Security measures for handling cargo.

    (a) General. The vessel owner or operator must ensure that security
measures relating to cargo handling, some of which may have to be
applied in liaison with the facility, are specified in order to:
    (1) Deter tampering;
    (2) Prevent cargo that is not meant for carriage from being
accepted and stored on board the vessel;
    (3) Identify cargo that is approved for loading onto the vessel;
    (4) Include inventory control procedures at access points to the
vessel;
    (5) Coordinate security measures with the shipper or other
responsible party in accordance with an established agreement and
procedures; and
    (6) Be able to check cargo for dangerous substances and devices at
the rate specified in the approved Vessel Security Plan. Means to check
cargo include:
    (i) Visual examination;
    (ii) Physical examination;
    (iii) Detection devices such as scanners; or
    (iv) Canines.
    (b) Maritime Security (MARSEC) Level 1. At MARSEC Level 1, the
vessel owner or operator must ensure the implementation of measures to:
    (1) Routinely check cargo and cargo spaces prior to and during
cargo handling;
    (2) Check that cargo to be loaded matches the cargo documentation,
or that cargo markings or container numbers match the information
provided with shipping documents;
    (3) Ensure, in liaison with the facility, that vehicles to be
loaded on board car carriers, RO-RO, and passenger ships are subjected
to screening prior to loading, in accordance with the frequency
required in the VSP; and
    (4) Check, in liaison with the facility, seals or other methods
used to prevent tampering.
    (c) MARSEC Level 2. In addition to the security measures required
for MARSEC Level 1 in this section, at MARSEC Level 2, the vessel owner
or operator must also ensure the implementation of additional security
measures, as specified for MARSEC Level 2 in the approved Vessel
Security Plan (VSP). These additional security measures may include:
    (1) Increasing the frequency and detail of checking cargo and cargo
spaces;
    (2) Intensifying checks to ensure that only the intended cargo,
container, or other cargo transport units are loaded;
    (3) Intensifying screening of vehicles to be loaded on car-
carriers, RO-RO, and passenger vessels;
    (4) In liaison with the facility, increasing frequency and detail
in checking seals or other methods used to prevent tampering;
    (5) Increasing the frequency of the use of scanning/detection
equipment, mechanical devices, or canines; or
    (6) Coordinating enhanced security measures with the shipper or
other responsible party in accordance with an established agreement and
procedures.
    (d) MARSEC Level 3. In addition to the security measures for MARSEC
Level 1 and MARSEC Level 2, at MARSEC Level 3, the vessel owner or
operator must ensure the implementation of additional security
measures, as specified for MARSEC Level 3 in the approved VSP. These
additional security measures may include:
    (1) Suspending loading or unloading of cargo;
    (2) Being prepared to cooperate with responders and facilities; or
    (3) Verifying the inventory and location of any hazardous materials
carried on board.

Sec.  104.280  Security measures for delivery of vessel stores and
bunkers.

    (a) General. The vessel owner or operator must ensure that security
measures relating to the delivery of vessel stores and bunkers are
implemented to:
    (1) Check vessel stores for package integrity;
    (2) Prevent vessel stores from being accepted without inspection;
    (3) Deter tampering; and
    (4) Prevent vessel stores and bunkers from being accepted unless
ordered. For vessels that routinely use a facility, a vessel owner or
operator may establish and implement standing arrangements between the
vessel, its suppliers, and a facility regarding notification and the
timing of deliveries and their documentation.
    (b) Maritime Security (MARSEC) Level 1. At MARSEC Level 1, the
vessel owner or operator must ensure the implementation of measures to:
    (1) Check vessel stores before being accepted;
    (2) Check that vessel stores and bunkers match the order prior to
being brought on board or being bunkered; and
    (3) Ensure that vessel stores are controlled or immediately and
securely stowed following delivery.
    (c) MARSEC Level 2. In addition to the security measures required
for MARSEC Level 1 in this section, at MARSEC Level 2, the vessel owner
or operator must also ensure the implementation of additional security
measures, as specified for MARSEC Level 2 in the approved Vessel
Security Plan (VSP). These additional security measures may include:
    (1) Intensifying inspection of the vessel stores during delivery;
or
    (2) Checking vessel stores prior to receiving them on board.
    (d) MARSEC Level 3. In addition to the security measures for MARSEC
Level 1 and MARSEC Level 2, at MARSEC Level 3, the vessel owner or
operator must ensure the implementation of additional security
measures, as specified for MARSEC Level 3 in the approved VSP. These

[[Page 39310]]

additional security measures may include:
    (1) Checking all vessel stores more extensively;
    (2) Restricting or suspending delivery of vessel stores and
bunkers; or
    (3) Refusing to accept vessel stores on board.

Sec.  104.285  Security measures for monitoring.

    (a) General. (1) The vessel owner or operator must ensure the
implementation of security measures and have the capability to
continuously monitor, through a combination of lighting, watchkeepers,
security guards, deck watches, waterborne patrols and automatic
intrusion-detection devices, or surveillance equipment, as specified in
their approved Vessel Security Plan (VSP), the--
    (i) Vessel;
    (ii) Restricted areas on board the vessel; and
    (iii) Area surrounding the vessel.
    (2) The following must be considered when establishing the
appropriate level and location of lighting:
    (i) Vessel personnel should be able to detect activities on and
around the vessel, on both the shore side and the waterside;
    (ii) Coverage should facilitate personnel identification at access
points;
    (iii) Coverage may be provided through coordination with the port
or facility; and
    (iv) Lighting effects, such as glare, and its impact on safety,
navigation, and other security activities.
    (b) Maritime Security (MARSEC) Level 1. At MARSEC Level 1, the
vessel owner or operator must ensure the implementation of security
measures, which may be done in coordination with a facility, to:
    (1) Monitor the vessel, particularly vessel access points and
restricted areas;
    (2) Be able to conduct emergency searches of the vessel;
    (3) Ensure that equipment or system failures or malfunctions are
identified and corrected;
    (4) Ensure that any automatic intrusion detection device sets off
an audible or visual alarm, or both, at a location that is continually
attended or monitored;
    (5) Light deck and vessel access points during the period between
sunset and sunrise and periods of limited visibility sufficiently to
allow visual identification of persons seeking access to the vessel;
and
    (6) Use maximum available lighting while underway, during the
period between sunset and sunrise, consistent with safety and
international regulations.
    (c) MARSEC Level 2. In addition to the security measures required
for MARSEC Level 1 in this section, at MARSEC Level 2, the vessel owner
or operator must also ensure the implementation of additional security
measures, as specified for MARSEC Level 2 in the approved VSP. These
additional security measures may include:
    (1) Increasing the frequency and detail of security patrols;
    (2) Increasing the coverage and intensity of lighting, alone or in
coordination with the facility;
    (3) Using or increasing the use of security and surveillance
equipment;
    (4) Assigning additional personnel as security lookouts;
    (5) Coordinating with boat patrols, when provided; or
    (6) Coordinating with shoreside foot or vehicle patrols, when
provided.
    (d) MARSEC Level 3. In addition to the security measures for MARSEC
Level 1 and MARSEC Level 2, at MARSEC Level 3, the vessel owner or
operator must ensure the implementation of additional security
measures, as specified for MARSEC Level 3 in the approved VSP. These
additional security measures may include:
    (1) Cooperating with responders and facilities;
    (2) Switching on all lights;
    (3) Illuminating the vicinity of the vessel;
    (4) Switching on all surveillance equipment capable of recording
activities on, or in the vicinity of, the vessel;
    (5) Maximizing the length of time such surveillance equipment can
continue to record;
    (6) Preparing for underwater inspection of the hull; and
    (7) Initiating measures, including the slow revolution of the
vessel's propellers, if practicable, to deter underwater access to the
hull of the vessel.

Sec.  104.290  Security incident procedures.

    For each Maritime Security (MARSEC) Level, the vessel owner or
operator must ensure the Vessel Security Officer (VSO) and vessel
security personnel are able to:
    (a) Respond to security threats or breaches of security and
maintain critical vessel and vessel-to-facility interface operations,
to include:
    (1) Prohibiting entry into affected area;
    (2) Denying access to the vessel, except to those responding to the
emergency;
    (3) Implementing MARSEC Level 3 security measures throughout the
vessel;
    (4) Stopping cargo-handling operations; and
    (5) Notifying shoreside authorities or other vessels of the
emergency;
    (b) Evacuating the vessel in case of security threats or breaches
of security;
    (c) Reporting security incidents as required in Sec.  101.305;
    (d) Briefing all vessel personnel on possible threats and the need
for vigilance, soliciting their assistance in reporting suspicious
persons, objects, or activities; and
    (e) Securing non-critical operations in order to focus response on
critical operations.

Sec.  104.292  Additional requirements--passenger vessels and ferries.

    (a) At all Maritime Security (MARSEC) Levels, the vessel owner or
operator must ensure security sweeps are performed, prior to getting
underway, after any period the vessel was unattended.
    (b) As an alternative to the identification checks and passenger
screening requirements in Sec.  104.265 (e)(1), (e)(3), and (e)(8), the
owner or operator of a passenger vessel or ferry may ensure security
measures are implemented that include:
    (1) Searching selected areas prior to embarking passengers and
prior to sailing; and
    (2) Implementing one or more of the following:
    (i) Performing routine security patrols;
    (ii) Providing additional closed-circuit television to monitor
passenger areas; or
    (iii) Securing all non-passenger areas.
    (c) Passenger vessels certificated to carry more than 2000
passengers, working in coordination with the terminal, may be subject
to additional vehicle screening requirements in accordance with a
MARSEC Directive or other orders issued by the Coast Guard.
    (d) At MARSEC Level 2, a vessel owner or operator must ensure, in
addition to MARSEC Level 1 measures, the implementation of the
following:
    (1) Search selected areas prior to embarking passengers and prior
to sailing;
    (2) Passenger vessels certificated to carry less than 2000
passengers, working in coordination with the terminal, may be subject
to additional vehicle screening requirements in accordance with a
MARSEC Directive or other orders issued by the Coast Guard; and
    (3) As an alternative to the identification and screening
requirements in Sec.  104.265(e)(3), intensify patrols, security sweeps
and

[[Page 39311]]

monitoring identified in paragraph (b) of this section.
    (e) At MARSEC Level 3, a vessel owner or operator may, in addition
to MARSEC Levels 1 and 2 measures, as an alternative to the
identification checks and passenger screening requirements in Sec.
104.265(e)(3), ensure that random armed security patrols are conducted,
which need not consist of vessel personnel.

Sec.  104.295  Additional requirements--cruise ships.

    (a) At all MARSEC Levels, the owner or operator of a cruise ship
must ensure the following:
    (1) Screen all persons, baggage, and personal effects for dangerous
substances and devices;
    (2) Check the identification of all persons seeking to board the
vessel; this check includes confirming the reason for boarding by
examining joining instructions, passenger tickets, boarding passes,
government identification or visitor badges, or work orders;
    (3) Perform security patrols; and
    (4) Search selected areas prior to embarking passengers and prior
to sailing.
    (b) At MARSEC Level 3, the owner or operator of a cruise ship must
ensure that security briefs to passengers about the specific threat are
provided.

Sec.  104.297  Additional requirements--vessels on international
voyages.

    (a) An owner or operator of a U.S. flag vessel, which is subject to
the International Convention for Safety of Life at Sea, 1974, (SOLAS),
must be in compliance with the applicable requirements of SOLAS Chapter
XI-1, SOLAS Chapter XI-2 and the ISPS Code, part A (Incorporated by
reference, see Sec.  101.115 of this subchapter).
    (b) Owners or operators of U.S. flag vessels that are required to
comply with SOLAS, must ensure an International Ship Security
Certificate (ISSC) as provided in 46 CFR Sec.  2.01-25 is obtained for
the vessel. This certificate must be issued by the Coast Guard.
    (c) Owners or operators of vessels that require an ISSC in
paragraph (b) of this section must request an inspection in writing, at
least 30 days prior to the desired inspection date to the Officer in
Charge, Marine Inspection for the Marine Inspection Office or Marine
Safety Office of the port where the vessel will be inspected to verify
compliance with this part and applicable SOLAS requirements. The
inspection must be completed and the initial ISSC must be issued prior
to July 1, 2004.

Subpart C--Vessel Security Assessment (VSA)

Sec.  104.300  General.

    (a) The Vessel Security Assessment (VSA) is a written document that
is based on the collection of background information and the completion
and analysis of an on-scene survey.
    (b) A single VSA may be performed and applied to more than one
vessel to the extent that they share physical characteristics and
operations.
    (c) Third parties may be used in any aspect of the VSA if they have
the appropriate skills and if the Company Security Officer (CSO)
reviews and accepts their work.
    (d) Those involved in a VSA should be able to draw upon expert
assistance in the following areas:
    (1) Knowledge of current security threats and patterns;
    (2) Recognition and detection of dangerous substances and devices;
    (3) Recognition of characteristics and behavioral patterns of
persons who are likely to threaten security;
    (4) Techniques used to circumvent security measures;
    (5) Methods used to cause a security incident;
    (6) Effects of dangerous substances and devices on vessel
structures and equipment;
    (7) Vessel security requirements;
    (8) Vessel-to-vessel and vessel-to-facility interface business
practices;
    (9) Contingency planning, emergency preparedness and response;
    (10) Physical security requirements;
    (11) Radio and telecommunications systems, including computer
systems and networks;
    (12) Marine engineering; and
    (13) Vessel and port operations.

Sec.  104.305  Vessel Security Assessment (VSA) requirements.

    (a) Background. The vessel owner or operator must ensure that the
following background information is provided to the person or persons
who will conduct the on-scene survey and assessment:
    (1) General layout of the vessel, including the location of:
    (i) Each actual or potential point of access to the vessel and its
function;
    (ii) Spaces that should have restricted access;
    (iii) Essential maintenance equipment;
    (iv) Cargo spaces and storage;
    (v) Storage of unaccompanied baggage; and
    (vi) Vessel stores;
    (2) Threat assessments, including the purpose and methodology of
the assessment, for the area or areas in which the vessel operates or
at which passengers embark or disembark;
    (3) The previous VSA, if any;
    (4) Emergency and stand-by equipment available to maintain
essential services;
    (5) Number of vessel personnel and any existing security duties to
which they are assigned;
    (6) Existing personnel training requirement practices of the
vessel;
    (7) Existing security and safety equipment for the protection of
personnel, visitors, passengers, and vessels personnel;
    (8) Escape and evacuation routes and assembly stations that have to
be maintained to ensure the orderly and safe emergency evacuation of
the vessel;
    (9) Existing agreements with private security companies providing
waterside or vessel security services; and
    (10) Existing security measures and procedures, including:
    (i) Inspection and control procedures;
    (ii) Identification systems;
    (iii) Surveillance and monitoring equipment;
    (iv) Personnel identification documents;
    (v) Communication systems;
    (vi) Alarms;
    (vii) Lighting;
    (viii) Access control systems; and
    (ix) Other security systems.
    (b) On-scene survey. The vessel owner or operator must ensure that
an on-scene survey of each vessel is conducted. The on-scene survey is
to verify or collect information required in paragraph (a) of this
section. It consists of an actual survey that examines and evaluates
existing vessel protective measures, procedures, and operations for:
    (1) Ensuring performance of all security duties;
    (2) Controlling access to the vessel, through the use of
identification systems or otherwise;
    (3) Controlling the embarkation of vessel personnel and other
persons and their effects, including personal effects and baggage
whether accompanied or unaccompanied;
    (4) Supervising the handling of cargo and the delivery of vessel
stores;
    (5) Monitoring restricted areas to ensure that only authorized
persons have access;
    (6) Monitoring deck areas and areas surrounding the vessel; and
    (7) The ready availability of security communications, information,
and equipment.
    (c) Analysis and recommendations. In conducting the VSA, the
Company Security Officer (CSO) must analyze the vessel background
information and the

[[Page 39312]]

on-scene survey, and while considering the requirements of this part,
provide recommendations for the security measures the vessel should
include in the Vessel Security Plan (VSP). This includes but is not
limited to the following:
    (1) Restricted areas;
    (2) Response procedures for fire or other emergency conditions;
    (3) Security supervision of vessel personnel, passengers, visitors,
vendors, repair technicians, dock workers, etc.;
    (4) Frequency and effectiveness of security patrols;
    (5) Access control systems, including identification systems;
    (6) Security communication systems and procedures;
    (7) Security doors, barriers, and lighting;
    (8) Any security and surveillance equipment and systems;
    (9) Possible security threats, including but not limited to:
    (i) Damage to or destruction of the vessel or an interfacing
facility or vessel by dangerous substances and devices, arson,
sabotage, or vandalism;
    (ii) Hijacking or seizure of the vessel or of persons on board;
    (iii) Tampering with cargo, essential vessel equipment or systems,
or vessel stores;
    (iv) Unauthorized access or use, including presence of stowaways;
    (v) Smuggling dangerous substances and devices;
    (vi) Use of the vessel to carry those intending to cause a security
incident and/or their equipment;
    (vii) Use of the vessel itself as a weapon or as a means to cause
damage or destruction;
    (viii) Attacks from seaward while at berth or at anchor; and
    (ix) Attacks while at sea; and
    (10) Evaluating the potential of each identified point of access,
including open weather decks, for use by individuals who might seek to
breach security, whether or not those individuals legitimately have
access to the vessel.
    (d) VSA report. (1) The vessel owner or operator must ensure that a
written VSA report is prepared and included as part of the VSP. The VSA
report must contain:
    (i) A summary of how the on-scene survey was conducted;
    (ii) Existing security measures, procedures, and operations;
    (iii) A description of each vulnerability found during the
assessment;
    (iv) A description of security countermeasures that could be used
to address each vulnerability;
    (v) A list of the key vessel operations that are important to
protect;
    (vi) The likelihood of possible threats to key vessel operations;
and
    (vii) A list of identified weaknesses, including human factors, in
the infrastructure, policies, and procedures of the vessel.
    (2) The VSA report must address the following elements on board or
within the vessel:
    (i) Physical security;
    (ii) Structural integrity;
    (iii) Personnel protection systems;
    (iv) Procedural policies;
    (v) Radio and telecommunication systems, including computer systems
and networks; and
    (vi) Other areas that may, if damaged or used illicitly, pose a
risk to people, property, or operations on board the vessel or within a
facility.
    (3) The VSA must list the persons, activities, services, and
operations that are important to protect, in each of the following
categories:
    (i) Vessel personnel;
    (ii) Passengers, visitors, vendors, repair technicians, facility
personnel, etc.;
    (iii) Capacity to maintain safe navigation and emergency response;
    (iv) Cargo, particularly dangerous goods or hazardous substances;
    (v) Vessel stores;
    (vi) Any vessel security communication and surveillance systems;
and
    (vii) Any other vessel security systems, if any.
    (4) The VSA must account for any vulnerabilities in the following
areas:
    (i) Conflicts between safety and security measures;
    (ii) Conflicts between vessel duties and security assignments;
    (iii) The impact of watch-keeping duties and risk of fatigue on
vessel personnel alertness and performance;
    (iv) Security training deficiencies; and
    (v) Security equipment and systems, including communication
systems.
    (5) The VSA must discuss and evaluate key vessel measures and
operations, including:
    (i) Ensuring performance of all security duties;
    (ii) Controlling access to the vessel, through the use of
identification systems or otherwise;
    (iii) Controlling the embarkation of vessel personnel and other
persons and their effects (including personal effects and baggage
whether accompanied or unaccompanied);
    (iv) Supervising the handling of cargo and the delivery of vessel
stores;
    (v) Monitoring restricted areas to ensure that only authorized
persons have access;
    (vi) Monitoring deck areas and areas surrounding the vessel; and
    (vii) The ready availability of security communications,
information, and equipment.
    (6) The VSA must be documented and the VSA report retained by the
vessel owner or operator with the VSP. The VSA and VSP must be
protected from unauthorized access or disclosure.

Sec. Sec.  104.310  Submission requirements.

    (a) A completed Vessel Security Assessment (VSA) report must be
submitted with the Vessel Security Plan (VSP) required in Sec.  104.410
of this part.
    (b) A vessel owner or operator may generate and submit a report
that contains the VSA for more than one vessel subject to this part, to
the extent that they share similarities in physical characteristics and
operations.

Subpart D--Vessel Security Plan (VSP)

Sec.  104.400  General.

    (a) The Company Security Officer (CSO) must ensure a Vessel
Security Plan (VSP) is developed and implemented for each vessel. The
VSP:
    (1) Must identify the CSO and VSO by name or position and provide
24-hour contact information;
    (2) Must be written in English;
    (3) Must address each vulnerability identified in the Vessel
Security Assessment (VSA);
    (4) Must describe security measures for each MARSEC Level;
    (5) Must state the Master's authority as described in Sec.
104.205; and
    (6) May cover more than one vessel to the extent that they share
similarities in physical characteristics and operations, if authorized
and approved by the Commanding Officer, Marine Safety Center.
    (b) Except for foreign vessels that have on board a valid
International Ship Security Certificate (ISSC) that attests to the
vessel's compliance with SOLAS Chapter XI-2 and the ISPS Code, part A
(Incorporated by reference, see Sec.  101.115 of this subchapter), and
having taken into account the relevant provisions in the ISPS Code,
part B, the VSP must be submitted for approval to the Commanding
Officer, Marine Safety Center (MSC), 400 Seventh Street, SW., Room
6302, Nassif Building, Washington, DC 20590-0001, in a written or
electronic format. Format for submitting the VSP electronically can be
found at http://www.uscg.mil/HQ/MSC.
    (c) The VSP is sensitive security information and must be protected
in accordance with 49 CFR part 1520.
    (d) If the VSP is kept in an electronic format, procedures must be
in place to

[[Page 39313]]

prevent its unauthorized deletion, destruction, or amendment.

Sec.  104.405  Format of the Vessel Security Plan (VSP).

    (a) A vessel owner or operator must ensure that the VSP consists of
the individual sections listed in this paragraph (a). If the VSP does
not follow the order as it appears in the list, the vessel owner or
operator must ensure that the VSP contains an index identifying the
location of each of the following sections:
    (1) Security organization of the vessel;
    (2) Personnel training;
    (3) Drills and exercises;
    (4) Records and documentation;
    (5) Response to change in MARSEC Level;
    (6) Procedures for interfacing with facilities and other vessels;
    (7) Declarations of Security (DoS);
    (8) Communications;
    (9) Security systems and equipment maintenance;
    (10) Security measures for access control;
    (11) Security measures for restricted areas;
    (12) Security measures for handling cargo;
    (13) Security measures for delivery of vessel stores and bunkers;
    (14) Security measures for monitoring;
    (15) Security incident procedures;
    (16) Audits and Vessel Security Plan (VSP) amendments; and
    (17) Vessel Security Assessment (VSA) Report.
    (b) The VSP must describe in detail how the requirements of subpart
B of this part will be met.

Sec.  104.410  Submission and approval.

    (a) On or before December 29, 2003, each vessel owner or operator
must either:
    (1) Submit one copy of their Vessel Security Plan (VSP) for review
and approval to the Commanding Officer, Marine Safety Center (MSC) and
a letter certifying that the VSP meets applicable requirements of this
part; or
    (2) If implementing a Coast Guard approved Alternative Security
Program, meet the requirements in Sec.  101.120(b) of this subchapter.
    (b) Vessels built on or after July 1, 2004, must comply with the
requirements in paragraph (a) of this section 60 days prior to
beginning operations.
    (c) The Commanding Officer, Marine Safety Center (MSC), will
examine each submission for compliance with this part, and either:
    (1) Approve it and specify any conditions of approval, returning to
the submitter a letter stating its acceptance and any conditions, or
    (2) Disapprove it, returning a copy to the submitter with a brief
statement of the reasons for disapproval.
    (d) A VSP may be submitted and approved to cover more than one
vessel where the vessel design and operations are similar.
    (e) Each company or vessel, owner or operator, that submits one VSP
to cover two or more vessels of similar design and operation must
address vessel-specific information that includes the physical and
operational characteristics of each vessel.
    (f) A plan that is approved by the MSC is valid for 5 years from
the date of its approval.

Sec.  104.415  Amendment and audit.

    (a) Amendments. (1) Amendments to a Vessel Security Plan that are
approved by the MSC may be initiated by:
    (i) The vessel owner or operator; or
    (ii) The Coast Guard upon a determination that an amendment is
needed to maintain the vessel's security. The Coast Guard will give the
vessel owner or operator written notice and request that the vessel
owner or operator propose amendments addressing any matters specified
in the notice. The company owner or operator will have at least 60 days
to submit its proposed amendments. Until amendments are approved, the
company owner or operator shall ensure temporary security measures are
implemented to the satisfaction of the Coast Guard.
    (2) Proposed amendments must be sent to the marine safety center at
the address shown in Sec.  104.400(b) of this part. If initiated by the
company or vessel, owner or operator, the proposed amendment must be
submitted at least 30 days before the amendment is to take effect
unless the Marine Safety Center (MSC) allows a shorter period. The MSC
will approve or disapprove the proposed amendment in accordance with
Sec.  104.410 of this part.
    (3) If the owner or operator has changed, the Vessel Security
Officer (VSO) must amend the Vessel Security Plan (VSP) to include the
name and contact information of the new vessel owner or operator and
submit the affected portion of the VSP for review and approval in
accordance with Sec.  104.410 of this part.
    (b) Audits. (1) The CSO or VSO must ensure an audit of the VSP is
performed annually, beginning no later than one year from the initial
date of approval and attach a letter to the VSP certifying that the VSP
meets the applicable requirements of this part.
    (2) The VSP must be audited if there is a change in the company's
or vessel's ownership or operator, or if there have been modifications
to the vessel, including but not limited to physical structure,
emergency response procedures, security measures, or operations.
    (3) Auditing the VSP as a result of modifications to the vessel may
be limited to those sections of the VSP affected by the vessel
modifications.
    (4) Unless impracticable due to the size and nature of the company
or the vessel, personnel conducting internal audits of the security
measures specified in the VSP or evaluating its implementation must:
    (i) Have knowledge of methods of conducting audits and inspections,
and control and monitoring techniques;
    (ii) Not have regularly assigned security duties; and
    (iii) Be independent of any security measures being audited.
    (5) If the results of an audit require amendment of either the VSA
or VSP, the VSO or CSO must submit, in accordance with Sec.  104.410 of
this part, the amendments to the MSC for review and approval no later
than 30 days after completion of the audit and a letter certifying that
the amended VSP meets the applicable requirements of this part.

PART 160--PORTS AND WATERWAY SAFETY--GENERAL

0
2. Revise the authority citation for part 160 to read as follows:

    Authority: 33 U.S.C. 1223, 1231; 46 U.S.C. Chapter 701;
Department of Homeland Security Delegation 0170. Subpart D is also
issued under the authority of 33 U.S.C. 125 and 46 U.S.C. 3715.

0
3. In Sec.  160.203, add paragraph (f) to read as follows:

Sec.  160.203  Exemptions.

* * * * *
    (f) U.S. vessels need not submit the International Ship and Port
Facility Code (ISPS) Notice information (Entry (9) to Table 160.206).

0
4. In Sec.  160.206, in the table in paragraph (a), add paragraph (9)
to read as follows:

Sec.  160.206  Information required in an NOA.

* * * * *

[[Page 39314]]

                                      Table 160.206.--NOA Information Items
----------------------------------------------------------------------------------------------------------------
                                                                                     Vessels carrying CDC
                                                                             -----------------------------------
                                                               Vessels not                       Towing vessels
                   Required information                       carrying CDC                         controlling
                                                                                   Vessels      vessels carrying
                                                                                                       CDC
----------------------------------------------------------------------------------------------------------------

                                                  * * * * * * *
(9) International Ship and Port Facility Code (ISPS)
 Notice *:
    (i) The date of issuance for the vessel's                             X                 X                 X
     International Ship Security Certificate (ISSC), if
     any;.................................................
    (ii) Whether the ISSC, if any, is an initial Interim                  X                 X                 X
     ISSC, subsequent and consecutive Interim ISSC, or
     final ISSC;..........................................
    (iii) Declaration that the approved ship security                     X                 X                 X
     plan, if any, is being implemented;..................
    (iv) If a subsequent and consecutive Interim ISSC, the                X                 X                 X
     reasons therefor;....................................
    (v) The name and 24-hour contact information for the                  X                 X                 X
     Company Security Officer; and........................
    (vi) The name of the Flag Administration, or the                      X                 X                X
     recognized security organization(s) representing the
     vessel flag Administration that issued the ISSC......
----------------------------------------------------------------------------------------------------------------
* The information required by items 9(i)-(iii) need not be submitted before January 1, 2004. All other
  information required by item 9 need not be submitted before July 1, 2004.

* * * * *

PART 165--REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS

0
5. Revise the authority citation for part 165 to read as follows:

    Authority: 33 U.S.C. 1226, 1231; 46 U.S.C. Chapter 701; 50
U.S.C. 191, 195; 33 CFR 1.05-1(g), 6.04-1, 6.04-6 and 160.5; Pub. L.
107-295, 116 Stat. 2064; Department of Homeland Security Delegation
No. 0170.
* * * * *

PART 2--VESSEL INSPECTIONS

0
6. Revise the authority citation for part 2 to read as follows:

    Authority: 33 U.S.C. 1903; 43 U.S.C. 1333; 46 U.S.C. 3103, 3205,
3306, 3307, 3703; 46 U.S.C. Chapter 701; Executive Order 12234, 45
FR 58801, 3 CFR, 1980 Comp., p. 277; Department of Homeland Security
Delegation 0170; subpart 2.45 also issued under the authority of Act
Dec. 27, 1950, Ch. 1155, secs. 1, 2, 64 Stat. 1120 (see 46 U.S.C.
App. Note prec. 1).

0
7. In Sec.  2.01-25, add new paragraph (a)(1)(viii) to read as follows:

Sec.  2.01-25  International Convention for Safety of Life at Sea
(SOLAS), 1974.

    (a) * * *
    (1) * * *
    (viii) International Ship Security Certificate.
* * * * *

PART 31--INSPECTION AND CERTIFICATION

0
8. Revise the authority citation for part 31 to read as follows:

    Authority: 33 U.S.C. 1321(j); 43 U.S.C. 2103, 3205, 3306, 3307,
3703; 46 U.S.C. Chapter 701; 49 U.S.C. 5103, 5106; Executive Order
12234, 45 FR 58801, 3 CFR, 1980 Comp., p. 277; Executive Order
12777, 56 FR 54757, 3 CFR, 1991 Comp., p. 351; Department of
Homeland Security Delegation 0170; Section 31.10-021 also issued
under the authority Sec.  4109, Public Law 101-380, 104 Stat. 515.

0
9. Revise Sec.  31.05-1(a) to read as follows:

Sec.  31.05-1  Issuance of certificate of inspection--TB/ALL.

    (a) When a tank vessel is found to comply with all applicable
regulations, including the applicable provisions of subchapters E, F,
J, O, Q, S, and W of this chapter and of 33 CFR parts 104, 155, and
157, the Officer in Charge, Marine Inspection will issue a certificate
of inspection to the vessel or to its owners.
* * * * *

PART 71--INSPECTION AND CERTIFICATION

0
10. Revise the authority citation for part 71 to read as follows:

    Authority: 33 U.S.C. 1321(j); 46 U.S.C. 2113, 3205, 3306, 3307;
46 U.S.C. Chapter 701; Executive Order 12234, 45 FR 58801, 3 CFR,
1980 Comp., p. 277; Executive Order 12777, 56 FR 54757, 3 CFR, 1991
Comp., p. 351; Department of Homeland Security Delegation 0170.

0
11. Add new Sec.  71.25-47 to read as follows:

Sec.  71.25-47  Vessel security.

    At each inspection for certification and periodic inspection, the
inspector shall examine the vessel to determine that it meets vessel
security requirements in 33 CFR part 104.

PART 91--INSPECTION AND CERTIFICATION

0
12. Revise the authority citation for part 91 to read as follows:

    Authority: 33 U.S.C. 1321(j); 46 U.S.C. 3205, 3306, 3307; 46
U.S.C. Chapter 701; Executive Order 12234; 45 FR 58801; 3 CFR, 1980
Comp., p. 277; Executive Order 12777, 56 FR 54757, 3 CFR, 1991
Comp., p. 351; Department of Homeland Security Delegation 0170.

0
13. Add new Sec.  91.25-47 to read as follows:

Sec.  91.25-47  Vessel security.

    At each inspection for certification and periodic inspection, the
inspector shall examine the vessel to determine that it meets vessel
security requirements in 33 CFR part 104.

PART 115--INSPECTION AND CERTIFICATION

0
14. Revise the authority citation for part 115 to read as follows:

    Authority: 33 U.S.C. 1321(j); 46 U.S.C. 2103, 3205, 3306, 3307;
46 U.S.C. Chapter 701; 49 U.S.C. App. 1804; Executive Order 11735,
38 FR 21243, 3 CFR, 1971-1975 Comp., p. 743; Executive Order 12234,
45 FR 58801, 3 CFR, 1980 Comp., p. 277; Department of Homeland
Security Delegation 0170.

0
15. Revise Sec.  115.404(a) to read as follows:

Sec.  115.404  Subsequent inspections for certification.

    (a) An inspection for renewal of a Certificate of Inspection is
conducted to determine if the vessel is in satisfactory condition, fit
for the service intended, and complies with all applicable regulations.
It normally includes inspection and testing of the structure,

[[Page 39315]]

machinery, equipment, and on a sailing vessel, rigging and sails. The
owner or operator must conduct all tests as required by the OCMI, and
make the vessel available for all specific inspections and drills
required by subpart H of this part. In addition, the OCMI may require
the vessel to get underway.
* * * * *

PART 126--INSPECTION AND CERTIFICATION

0
16. Revise the authority citation for part 126 to read as follows:

    Authority: 33 U.S.C. 1321(j); 46 U.S.C. 3205, 3306, 3307; 46
U.S.C. Chapter 701; Executive Order 111735, 38 FR 21243, 3 CFR 1971-
1975 Comp., p. 793; Department of Homeland Security Delegation 0170.

0
17. Add new Sec.  126.490 to read as follows:

Sec.  126.490  Vessel security.

    At each inspection for certification and periodic inspection, the
inspector shall examine the vessel to determine that it meets vessel
security requirements in 33 CFR part 104.

PART 176--INSPECTION AND CERTIFICATION

0
18. Revise the authority citation for part 176 to read as follows:

    Authority: 33 U.S.C. 1321(j); 46 U.S.C. 2103, 3205, 3306, 3307;
46 U.S.C. Chapter 701; 49 U.S.C. App. 1804; Executive Order 11735,
38 FR 21243, 3 CFR, 1971-1975 Comp., p. 277; Department of Homeland
Security Delegation 0170.

0
19. Revise Sec.  176.404(a) to read as follows:

Sec.  176.404  Subsequent inspections for certification.

    (a) An inspection for renewal of a Certificate of Inspection is
conducted to determine if the vessel is in satisfactory condition, fit
for the service intended, and complies with all applicable regulations.
It normally includes inspection and testing of the structure,
machinery, equipment, and on a sailing vessel, rigging and sails. The
owner or operator must conduct all tests as required by the OCMI, and
make the vessel available for all specific inspections and drills
required by subpart H of this part. In addition, the OCMI may require
the vessel to get underway.
* * * * *

    Dated: June 23, 2003.
Thomas H. Collins,
Admiral, Coast Guard Commandant.
[FR Doc. 03-16188 Filed 6-27-03; 8:45 am]

BILLING CODE 4910-15-P

[Federal Register: July 1, 2003 (Volume 68, Number 126)]
[Rules and Regulations]
[Page 39315-39338]
From the Federal Register Online via GPO Access [wais.access.gpo.gov]
[DOCID:fr01jy03-17]

-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

Coast Guard

33 CFR Part 105

[USCG-2003-14732]
RIN 1625-AA43


Facility Security

AGENCY: Coast Guard, DHS.

ACTION: Temporary interim rule with request for comments and notice of
meeting.

-----------------------------------------------------------------------

SUMMARY: This interim rule provides security measures for certain
facilities in U.S. ports. It requires owners or operators of facilities
to designate security officers for facilities, develop security plans
based on security assessments and surveys, implement security measures
specific to the facilities' operations, and comply with Maritime
Security Levels. This interim rule is one of six interim rules in
today's Federal Register that comprise a new subchapter on the
requirements for maritime security mandated by the Maritime
Transportation Security Act of 2002. These six interim rules implement
national maritime security initiatives concerning general provisions,
Area Maritime Security (ports), vessels, facilities, Outer Continental
Shelf facilities, and the Automatic Identification System. Where
appropriate, they align these domestic maritime security requirements
with those of the International Ship and Port Facility Security Code
and recent amendments to the International Convention for Safety of
Life at Sea, 1974. To best understand these interim rules, first read
the one titled ``Implementation of National Maritime Security
Initiatives'' (USCG-2003-14792), published elsewhere in today's Federal
Register.

DATES: Effective date. This interim rule is effective from July 1, 2003
until November 25, 2003.
    Comments. Comments and related material must reach the Docket
Management Facility on or before July 31, 2003. Comments on collection
of information sent to the Office of Management and Budget (OMB) must
reach OMB on or before July 31, 2003.
    Meeting. A public meeting will be held on July 23, 2003, from 9
a.m. to 5 p.m., in Washington, DC.

ADDRESSES: Comments. To ensure that your comments and related material
are not entered more than once in the docket, please submit them by
only one of the following means:
    (1) Electronically to the Docket Management System Web site at
http://dms.dot.gov.
    (2) By mail to the Docket Management Facility (USCG-2003-14732),
U.S. Department of Transportation, room PL-401, 400 Seventh Street SW.,
Washington, DC 20590-0001.
    (3) By fax to the Docket Management Facility at 202-493-2251.
    (4) By delivery to room PL-401 on the Plaza level of the Nassif
Building, 400 Seventh Street SW., Washington, DC, between 9 a.m. and 5
p.m., Monday through Friday, except Federal holidays. The telephone
number is 202-366-9329.
    You must mail comments on collection of information to the Office
of Information and Regulatory Affairs, Office of Management and Budget,
725 17th Street NW., Washington, DC 20503, ATTN: Desk Officer, U.S.
Coast Guard. Meeting. A public meeting will be held on July 23, 2003 in
Washington, DC at the Grand Hyatt Washington, DC, 1000 H Street, NW.,
Washington, DC 20001.

FOR FURTHER INFORMATION CONTACT: If you have questions on this interim
rule, call Lieutenant Gregory Purvis, U.S. Coast Guard by telephone,
202-267-1103, toll-free telephone, 1-800-842-8740 ext. 7-1103, or
electronic mail msregs@comdt.uscg.mil. If you have questions on viewing
or submitting material to the docket, call Ms. Dorothy Beard, Chief,
Dockets, Department of Transportation, at 202-366-5149.

SUPPLEMENTARY INFORMATION: Due to the short timeframe given to
implement these National Maritime Transportation Security initiatives,
as directed by the Maritime Transportation Security Act of 2002 (MTSA,
Public Law 107-295, 116 STAT. 2064), and to ensure all comments are in
the public venue for these important rulemakings, we are not accepting
comments containing protected information for these interim rules. We
request you submit comments, as explained in the Request for Comments
section below, and discuss your concerns or support in a manner that is
not security sensitive. We also request that you not submit proprietary
information as part of your comment.
    The Docket Management Facility maintains the public docket for this
rulemaking. Comments and material received from the public, as well as

[[Page 39316]]

documents mentioned in this preamble as being available in the docket,
will become part of this docket and will be available for inspection or
copying at room PL-401 on the Plaza level of the Nassif Building, 400
Seventh Street SW., Washington, DC, between 9 a.m. and 5 p.m., Monday
through Friday, except Federal holidays. You may also find this docket
on the Internet at http://dms.dot.gov.
    Electronic forms of all comments received into any of our dockets
can be searched by the name of the individual submitting the comment
(or signing the comment, if submitted on behalf of an association,
business, labor unit, etc.) and is open to the public without
restriction. You may also review the Department of Transportation's
complete Privacy Act Statement in the Federal Register published on
April 11, 2000 (65 FR 19477-78), or you may visit http://dms.dot.gov/.

Request for Comments

    We encourage you to participate in this rulemaking by submitting
comments and related material. Your comments will be considered for the
final rule we plan to issue before November 25, 2003, to replace this
interim rule. If you choose to comment on this rule, please include
your name and address, identify the specific docket number for this
interim rule (USCG-2003-14732), indicate the specific heading of this
document to which each comment applies, and give the reason for each
comment. If you have comments on another rule, please indicate in a
separate letter to the docket for that rulemaking. You may submit your
comments and material by mail, hand delivery, fax, or electronic means
to the Docket Management Facility at the address under ADDRESSES.
Please submit your comments and material by only one means. If you
submit them by mail or hand delivery, submit them in an unbound format,
no larger than 8\1/2\ by 11 inches, suitable for copying and electronic
filing. If you submit them by mail and would like to know that they
reached the Facility, please enclose a stamped, self-addressed postcard
or envelope. We will consider all comments and material received during
the comment period. We may change this interim rule in view of them.

Public Meeting

    We will hold a public meeting on July 23, 2003, in Washington, DC
at the Grand Hyatt Hotel, at the address listed under ADDRESSES. The
meeting will be from 9 a.m. to 5 p.m. to discuss all of the maritime
security interim rules, and the Automatic Identification System (AIS)
interim rule, found in today's Federal Register. In addition, you may
submit a request for other public meetings to the Docket Management
Facility at the address under ADDRESSES explaining why another one
would be beneficial. If we determine that other meetings would aid this
rulemaking, we will hold them at a time and place announced by a later
notice in the Federal Register.

Regulatory Information

    We did not publish a notice of proposed rulemaking for this
rulemaking and are making this interim rule effective upon publication.
Section 102(d)(1) of the MTSA requires the publication of an interim
rule as soon as practicable without regard to the provisions of chapter
5 of title 5, U.S. Code (Administrative Procedure Act). The Coast Guard
finds that harmonization of U.S. regulations with maritime security
measures adopted by the International Maritime Organization (IMO) in
December 2002, and the need to institute measures for the protection of
U.S. maritime security as soon as practicable, furnish good cause for
this interim rule to take effect immediately under both the
Administrative Procedure Act and section 808 of the Congressional
Review Act.

Background and Purpose

    A summary of the Coast Guard's regulatory initiatives for maritime
security can be found under the ``Background and Purpose'' section in
the preamble to the interim rule titled ``Implementation of National
Maritime Security Initiatives'' (USCG-2003-14792) published elsewhere
in today's Federal Register.

Discussion of Comments Addressing Facility Issues in the Notice of
Meeting

    For a discussion of comments on facilities at the public meetings
and in the docket, see the interim rule titled ``Implementation of
National Maritime Security Initiatives'' (USCG-2003-14792) published
elsewhere in today's Federal Register.

Discussion of Interim Rule

    The purpose of this rulemaking is to require security measures for
facilities in order to reduce the risk of and to mitigate the results
of an act that threatens the security of personnel, the facility, and
the public. This rulemaking combines international requirements and
existing domestic policy, and adds part 105, Facility Security, to the
new subchapter H, Maritime Security, of Title 33 of the Code of Federal
Regulation. A general description of the process used in developing
subchapter H and its component parts appears in the interim rule titled
``Implementation of National Maritime Security Initiatives'' (USCG-
2003-14792) published elsewhere in today's Federal Register.
    This rulemaking applies to facilities subject to 33 CFR parts 126,
127, and 154; facilities that receive vessels certified to carry more
than 150 passengers; and facilities that receive vessels on
international voyages, including vessels solely navigating the Great
Lakes.
    The MTSA and the International Ship and Port Facility Security
(ISPS) Code use different terms to define similar, if not identical,
persons or things. These differing terms sometimes match up with the
terms used in subchapter H, but sometimes they do not. For a table of
the terms used in subchapter H and their related terms in the MTSA and
the ISPS Code, see the Discussion of Interim Rule section in the
preamble for the interim rule titled ``Implementation of National
Maritime Security Initiatives'' (USCG-2003-14792), published elsewhere
in today's Federal Register.
    This rulemaking does not apply to Outer Continental Shelf (OCS)
platforms and deepwater ports. Those structures are covered by the
rulemaking ``Outer Continental Shelf Facility Security'' (USCG-2003-
14759), published elsewhere in today's Federal Register.
    This preamble describes the facilities regulated by part 105 and
the requirements for conducting Facility Security Assessments,
developing Facility Security Plans, and implementing security measures
and procedures. The requirements in part 105 are consistent with
requirements in the ISPS Code. Facility security includes the
requirements discussed below:

Compliance

    The Coast Guard, as provided in 33 CFR part 126, 127, and 154, will
verify facility compliance with this part during inspections.
    As required by Regulation 3 of Chapter XI-2 of the International
Convention for Safety of Life at Sea, 1974 (SOLAS) and the ISPS Code,
part A, section 5, the Coast Guard has published additional
requirements that provide the U.S. (as a contracting government) with
requirements for setting and communicating changes in Maritime Security
(MARSEC) Level, completing Declarations of Security, and additional
instructions for all facilities when MARSEC Level 3 is set.

[[Page 39317]]

Waivers

    The waiver section details procedures for requesting a waiver for
the benefit of facility owners or operators who find specific
requirements of the rulemaking to be unnecessary.

Equivalents

    The equivalents section details procedures for requesting an
equivalency for specific requirements of the rulemaking. Equivalents
are intended to allow facility owners or operators to provide an
alternative provision or arrangement that provides the same level of
security as a specific requirement contained within this part.

Alternative Security Program

    This part makes provision to allow owners or operators of
facilities to implement an Alternative Security Program that has been
reviewed and accepted by the Commandant (G-MP), to meet the
requirements of this part. Alternative Security Programs must be
comprehensive and based on a security assessment to demonstrate it
meets the intent of each section of this part. Owners or operators who
choose to implement an appropriate Alternative Security Program will be
required to implement it in its entirety to be deemed in compliance
with this part.

Evaluating Submissions of Waivers, Equivalents, and Alternative
Security Programs

    In our evaluation of waivers, equivalencies, and Alternative
Security Programs, the Coast Guard will accept a self-assessment or
demonstration using any risk management tools acceptable to the Coast
Guard. This demonstration may be requested to show that the proposed
waiver, equivalency or Alternative Security Program is at least as
effective as that intended by this interim rule.

Facility Owner or Operator Responsibilities

    This rule requires each facility owner or operator to develop an
effective security plan that incorporates detailed preparation,
prevention, and response activities for each MARSEC Level, and detail
the organizations, or personnel responsible for carrying out those
activities. The requirements discussed in this subpart are also
consistent with requirements in the ISPS Code. Facility owner or
operator responsibilities include:
    [sbull] Designating a Facility Security Officer.
    [sbull] Ensuring a Facility Security Assessment is conducted.
    [sbull] Developing and submitting for approval a Facility Security
Plan.
    [sbull] Operating the facility in accordance with the approved
Facility Security Plan.
    [sbull] Implementing additional security measures required by
changes in MARSEC Level.
    [sbull] Reporting all breaches of security and security incidents.
    [sbull] Coordinating shore leave for vessel personnel or crew
change-out, as well as access through the facility of visitors to the
vessel, including representatives of seafarers' welfare and labor
organizations, in advance of a vessel's arrival. (In the past, some
facilities may have denied access to seafarers and seafarer welfare
organizations where there was not an articulable security basis for
doing so. The Coast Guard is including their provision in this interim
rule to encourage facilities to allow such access when appropriate.)

Facility Security Officer (FSO)

    This rule requires that a facility owner or operator designate in
writing a Facility Security Officer for each facility. The Facility
Security Officer may be a full-time or collateral-duty position. The
Facility Security Officer must have general knowledge on a range of
issues such as security administration, relevant international laws,
domestic regulations, current security threats and patterns, risk
assessment methodology, inspections, control procedures and conducting
audits. The most important duties that must be performed by the
Facility Security Officer would include implementing a Facility
Security Plan; periodically auditing and updating the Facility Security
Assessment and Facility Security Plan; ensuring that adequate training
is provided to facility personnel; and ensuring the facility is
operating in accordance with the plan and in continuous compliance with
part 105. The Facility Security Officer may assign security duties to
other facility personnel; however, the Facility Security Officer
remains responsible for these duties.

Training

    Required training for facility personnel must be specified in the
Facility Security Plan. Specific security training courses for the
Facility Security Officer and facility personnel will not be required
by the Coast Guard. While formal training may be appropriate, we are
not mandating specifics. Facility owners or operators must certify that
security personnel are, in fact, properly trained to perform their
duties. The types of training required must also be consistent with the
training requirements described in this subpart. The Facility Security
Officer is also required to ensure that facility security persons
possess necessary training to maintain the overall security of the
facility.

Drill and Exercise Requirements

    Exercises are required to ensure the adequacy of the Facility
Security Plans and are required to be conducted at least once each
calendar year, with no more than 18 months between exercises. Drills,
which are smaller in scope than exercises, must be conducted at least
every 3 months. Exercises may be facility specific, or as part of a
cooperative exercise program with applicable Facility and Vessel
Security Plans or Port exercises. Exercises for security may be
combined with other required exercises, as appropriate.

Security Systems and Equipment Maintenance

    Procedures and/or policies must be developed and implemented to
ensure security systems and equipment are tested and operated in
accordance with the instructions of the manufacturer and ready for use.

Security Measures

    Security measures for specific activities must be scalable in order
to provide increasing levels of security at increasing MARSEC Levels.
An effective security program relies on detailed procedures that
clearly indicate the preparation and prevention activities that will
occur at each threat level and the organizations, or personnel, who are
responsible for carrying out those activities. Security Measures must
be developed for the following activities:
    [sbull] Security measures for access control;
    [sbull] Security measures for restricted areas;
    [sbull] Security measures for handling cargo;
    [sbull] Security measures for delivery of vessel stores and
bunkers; and
    [sbull] Security measures for monitoring.

Security Incident Procedures

    Each facility owner or operator must develop security incident
procedures for responding to transportation security incidents. The
security incident procedures must explain the facility's reaction to an
emergency, including the notification and coordination with local,
State, and federal authorities and Under Secretary of Emergency
Preparedness and Response. The security incident procedures must also
explain actions for securing the facility and evacuating

[[Page 39318]]

personnel, as well as actions for securing vessels moored to the
facility and evacuating passengers and crew.

Declaration of Security (DoS)

    A Declaration of Security is a written agreement between the
facility and a vessel that provides a means for ensuring that critical
security concerns are properly addressed prior to and during a vessel-
to-facility interface. The Declaration of Security addresses security
by delineating responsibilities for security arrangements and
procedures between a vessel and facility. This requirement is similar
to the existing U.S. practice for vessel-to-facility oil transfer
proceedings.
    Only certain passenger vessels and vessels carrying Certain
Dangerous Cargoes, in bulk, will complete a Declaration of Security for
every evolution regardless of the MARSEC Level. At MARSEC Levels 2 and
3, all vessels and facilities would need to complete the Declaration of
Security.
    Facilities that frequently receive the same vessel may execute a
continuing Declaration of Security--a single Declaration of Security
for multiple visits.
    All Declarations of Security must state the security activities for
which the facility and vessel are responsible during vessel-to-facility
interfaces. Declarations of Security must be kept as part of the
facility's recordkeeping.

Facility Security Assessment (FSA)

    This rule requires all regulated facilities to complete a Facility
Security Assessment, which is an essential and integral part of the
process of developing and updating the required Facility Security Plan.
The Facility Security Plan is based on the results of the Facility
Security Assessment. The Facility Security Officer must examine and
evaluate existing facility protective measures, procedures, and
operations.
    The Facility Security Officer must also examine each identified
point of access, including rail access, roads, waterside, and gates,
and evaluate its potential for use by individuals who might engage in
unlawful acts, including individuals with legitimate access, as well as
those seeking unauthorized entry.
    Each facility owner or operator is required to document and retain
its Facility Security Assessment for a period of five years. Prior to
conducting a Facility Security Assessment, the Facility Security
Officer is responsible for researching and using available information
on the assessment of threat for the port at which the facility is
located, as well as vessels that would call on the facility. The first
step in the facility security process is to conduct an on-scene survey.
The on-scene survey is used to examine and evaluate existing facility
protective measures, procedures and operations. In conducting the
Facility Security Assessment, the facility owner or operator must
ensure that the Facility Security Officer analyzes the facility
background information and the results of the on scene survey, and
considering the requirements of this interim rule, provide
recommendation to establish and prioritize the security measures that
should be included in the Facility Security Plan. The facility owner or
operator them must ensure that a written Facility Security Assessment
report is prepared and included in the Facility Security Plan. The
Facility Security Assessment must be reviewed and updated each time the
Facility Security Plan is revised and when the Facility Security Plan
is submitted for re-approval every five years. The facility owner or
operator then must ensure that a written Facility Security Assessment
report is prepared and included as an appendix to the Facility Security
Plan.
    The Facility Security Officer is also responsible for ensuring that
the Facility Security Assessment is periodically reviewed and updated,
taking into account changes in the facility and its operations. Before
a plan could be renewed or revised, a new Facility Security Assessment
would need to be conducted.
    The Facility Security Officer is responsible for obtaining and
recording any specific information required to conduct the Facility
Security Assessment.

Facility Security Plan (FSP)

    This subpart contains requirements for Facility Security Plans. The
requirements discussed in this subpart are consistent with requirements
in the ISPS Code.
    Facility Security Plans must incorporate the results of the
required Facility Security Assessment and consider the recommended
measures appropriate to each facility.
    Facility Security Plans can be combined with or complement existing
safety management systems. The plans may be kept in an electronic
format, protected by means to prevent it from being deleted, destroyed
or overwritten. The plans must also be protected from unauthorized
access or disclosure.
    Facility Security Plans required under this rulemaking must
contain:
    [sbull] A list of measures and equipment needed to prevent or deter
dangerous substances and devices which could be used against people,
vessels or ports and the carriage of which is not authorized from being
introduced by any means on to the facility;
    [sbull] Requirements for the prevention of unauthorized access to
the facility and to restricted areas of the facility;
    [sbull] Documented procedures for responding to security threats or
breaches of security, including provisions for maintaining critical
operations of the facility or the vessel-to-port interface;
    [sbull] Documented procedures for evacuation in case of security
threats or breaches of security;
    [sbull] Procedures for training, exercises, and drills associated
with the plan;
    [sbull] Documented procedures for interfacing with port and vessel
security activities;
    [sbull] Documented procedures for the periodic review of the
Facility Security Plan and for updating it;
    [sbull] Documented procedures for reporting security incidents;
    [sbull] Written designation of the Facility Security Officer;
    [sbull] A list of the duties and responsibilities of all facility
personnel with a security role;
    [sbull] A list of measures to ensure the security of information
contained in the plan;
    [sbull] A maintenance system to maintain operational readiness of
all required equipment using manufacturers' recommended maintenance
instructions and periodic inspection;
    [sbull] A list of measures needed to ensure effective security of
cargo, cargo processing, and the cargo-handling equipment at the
facility; and
    [sbull] A completed Facility Vulnerability and Security Measures
Summary (Form CG-6025) for each facility covered by the Plan.

Submission and Approval of Security Plan

    The Facility Security Plan, including the Facility Security
Assessment report and the Facility Vulnerability and Security Measures
Summary (Form CG-6025), must be submitted to and reviewed by the
cognizant COTP. Once the COTP finds that the plan meets the security
requirements in part 105, the submitter will receive an approval letter
that may contain conditions of the approval.
    If the cognizant COTP requires more time than is indicated in the
requirements of the interim rule to review a submitted Facility
Security Plan, the cognizant COTP may return to the submitter a written
acknowledgement stating that the Coast Guard is currently reviewing the

[[Page 39319]]

Facility Security Plan submitted for approval, and that the facility
may continue to operate so long as the facility remains in compliance
with the submitted Facility Security Plan.
    If the COTP finds that the Facility Security Plan does not meet the
security requirements, the plans would be returned to the facility with
a disapproval letter with an explanation of why the plan does not meet
the part 105 requirements.
    Security plans must be reviewed by the Coast Guard every time:
    [sbull] The Facility Security Assessment is altered;
    [sbull] Failures are identified during an exercise of the Facility
Security Plan; and
    [sbull] There is a change in ownership or operational control of
the facility or there are amendments to the Facility Security Plan.

Regulatory Assessment

    This interim rule is a ``significant regulatory action'' under
section 3(f) of Executive Order 12866, Regulatory Planning and Review,
and has been reviewed by the Office of Management and Budget under that
Order. It requires an assessment of potential costs and benefits under
section 6(a)(3) of that Order. It is significant under the regulatory
policies and procedures of the Department of Homeland Security. A Cost
Assessment is available in the docket as indicated under ADDRESSES. A
summary of the Assessment follows:

Cost Assessment

    For the purposes of good business practice or regulations
promulgated by other Federal and State agencies, many companies already
have spent a substantial amount of money and resources to upgrade and
improve security. The costs shown in this assessment do not include the
security measures these companies have already taken to enhance
security.
    We realize that every company engaged in maritime commerce will not
implement this interim rule exactly as presented in the assessment.
Depending on each company's choices, some companies could spend much
less than what is estimated herein while others could spend
significantly more. In general, we assume that each company will
implement this interim rule differently based on the type of facilities
it owns or operates and whether it engages in international or domestic
trade.
    The population affected by this interim rule is approximately 5,000
facilities, and the estimated Present Value (PV) cost to these
facilities is approximately PV $5.399 billion (2003 to 2012, 7 percent
discount rate). Approximately PV $2.718 billion of this total is
attributed to facilities engaged in the transfer of hazardous bulk
liquids (petroleum, edible oils, and liquefied gases). The remaining PV
$2.681 billion is attributable to facilities that receive vessels on
international voyages or carry more than 150 passengers, or fleet
barges carrying certain dangerous cargoes. During the initial year of
compliance, the cost is attributable to purchasing and installing
equipment, hiring security officers, and preparing paperwork. The
initial cost is an estimated $1.125 billion (non-discounted, $498
million for the facilities with hazardous bulk liquids, $627 million
for the other facilities). Following initial implementation, the annual
cost is an estimated $656 million (non-discounted, $341 million for the
facilities with hazardous bulk liquids, $315 million for the other
facilities).
    Approximately 51 percent of the initial cost is for installing or
upgrading equipment, 30 percent for hiring and training Facility
Security Officers, 14 percent for hiring additional security guards,
and 5 percent for paperwork (Facility Security Assessments and Facility
Security Plans). Following the first year, approximately 52 percent of
the annual cost is for Facility Security Officers (cost and training),
24 percent for security guards, 9 percent for paperwork (updating
Facility Security Assessments and Facility Security Plans), 9 percent
for operations and maintenance for equipment, and approximately 6
percent for drills. The cost of facility security consists primarily of
installing or upgrading equipment and designating Facility Security
Officers.

Benefit Assessment

    This rule is one of six interim rules that implement national
maritime security initiatives concerning general provisions, Area
Maritime Security (ports), vessels, facilities, Outer Continental Shelf
facilities, and AIS. The Coast Guard used the National Risk Assessment
Tool (N-RAT) to assess benefits that would result from increased
security for vessels, facilities, Outer Continental Shelf facilities,
and ports. The N-RAT considers threat, vulnerability, and consequences
for several maritime entities in various security-related scenarios.
For a more detailed discussion on the N-RAT and how we employed this
tool, refer to ``Applicability of National Maritime Security
Initiatives'' in the interim rule titled ``Implementation of National
Maritime Security Initiatives'' (USGC-2003-14792) published elsewhere
in today's Federal Register. For this benefit assessment, the Coast
Guard used a team of experts to calculate a risk score for each entity
and scenario before and after the implementation of required security
measures. The difference in before and after scores indicates the
benefit of the proposed action.
    We recognized that the interim rules are a ``family'' of rules that
will reinforce and support one another in their implementation. We must
ensure, however, that risk reduction that is credited in one rulemaking
is not also credited in another. For a more detailed discussion on the
benefit assessment and how we addressed the potential to double-count
the risk reduced, refer to ``Benefit Assessment'' in the interim rule
titled ``Implementation of National Maritime Security Initiatives''
(USCG-2003-14792) published elsewhere in today's Federal Register.
    We determined annual risk points reduced for each of the six
interim rules using the N-RAT. The benefits are apportioned among the
Vessel, Facility, OCS Facility, AMS, and AIS requirements. As shown in
Table 1, the implementation of Facility Security Plans for the affected
population reduces 473,659 risk points annually through 2012. The
benefits attributable for part 101--General Provisions--were not
considered separately since it is an overarching section for all the
parts.

                            Table 1.--Annual Risk Points Reduced by the Interim Rules
----------------------------------------------------------------------------------------------------------------
                                                     Annual risk points reduced by rulemaking
                                 -------------------------------------------------------------------------------
         Maritime entity              Vessel         Facility      OCS facility
                                  security plans  security plans  security plans     AMS plans          AIS
----------------------------------------------------------------------------------------------------------------
Vessels.........................         778,633           3,385           3,385           3,385           1,448
Facilities......................           2,025         469,686  ..............           2,025  ..............

[[Page 39320]]

OCS Facilities..................              41  ..............           9,903  ..............  ..............
Port Areas......................             587             587  ..............         129,792             105
    Total.......................         781,285         473,659          13,288         135,202           1,553
                                 -----------------
----------------------------------------------------------------------------------------------------------------

    Once we determined the annual risk points reduced, we discounted
these estimates to their present value (seven percent discount rate,
2003-2012) so that they could be compared to the costs. We presented
the cost effectiveness, or dollars per risk point reduced, in two ways:
First, we compared the first-year cost and first-year benefit because
first-year cost is the highest in our assessment as companies develop
security plans and purchase equipment. Second, we compared the 10-year
PV cost and the 10-year PV benefit. The results of our assessment are
presented in Table 2.

                    Table 2.--First-Year and 10-Year PV Cost and Benefit of the Interim Rules
----------------------------------------------------------------------------------------------------------------
                                                                   Interim rule
                                 -------------------------------------------------------------------------------
              Item                    Vessel         Facility      OCS facility
                                  security plans  security plans  security plans     AMS plans        AIS \1\
----------------------------------------------------------------------------------------------------------------
First-Year Cost (millions)......            $218          $1,125              $3            $120             $41
First-Year Benefit..............         781,285         473,659          13,288         135,202           1,553
First-Year Cost Effectiveness ($/           $279          $2,375            $205            $890         $26,391
 Risk Point Reduced)............
10-Year PV Cost (millions)......          $1,368          $5,399             $37            $477             $42
10-Year PV Benefit..............       5,871,540       3,559,655          99,863       1,016,074          11,671
10-Year PV Cost Effectiveness ($/           $233          $1,517            $368            $469         $3,624
 Risk Point Reduced)............
----------------------------------------------------------------------------------------------------------------
\1\ Cost less monetized safety benefit.

Small Entities

    Under the Regulatory Flexibility Act (5 U.S.C. 601-612), we have
considered whether this interim rule would have a significant economic
impact on a substantial number of small entities. The term ``small
entities'' comprises small businesses, not-for-profit organizations
that are independently owned and operated and are not dominant in their
fields, and governmental jurisdictions with populations of less than
50,000. This interim rule does not require a general notice of proposed
rulemaking and, therefore, is exempt from the requirements of the
Regulatory Flexibility Act. Although this interim rule is exempt, we
have reviewed it for potential economic impacts on small entities. An
Initial Regulatory Flexibility Analysis discussing the impact of this
interim rule on small entities is available in the docket where
indicated under ADDRESSES.
    Our assessment (copy available in the docket) concludes that
implementing this interim rule may have a significant economic impact
on a substantial number of small entities.
    There are approximately 1,200 companies that own facilities that
will be affected by the interim rule. We researched these companies,
and found revenue and business size data for 581 of them (48 percent).
Of the 581, we determined that 296 are small entities according to
Small Business Administration standards.
    The cost of the interim rule to each facility is dependent on the
security measures already in place at each facility and on the relevant
risk to a maritime transportation security incident. The interim rule
calls for specific security measures to be in place at each affected
facility. We realize, however, that most facilities already have
implemented security measures that may satisfy the requirements of this
rule. For example, we note that every facility will develop a Facility
Security Assessment and a Facility Security Plan, but not all of them
may need to install or upgrade fences or lighting equipment.
    For this reason, we analyzed the small entities under two
scenarios, a higher cost and lower cost scenarios. The higher cost
scenario uses an estimated initial cost of $1,942,500 and its
corresponding annual cost of $742,700. The higher cost scenario assumes
extensive capital improvements will be undertaken by the facilities in
addition to the cost of complying with the minimum requirements
(assigning Facility Security Officers, drafting Facility Security
Assessments, drafting Facility Security Plans, conducting Training,
performing Drills, and completing Declarations of Security). The lower
cost scenario used an initial cost of $133,500 and annual cost of
$156,800 for complying with the minimum requirements in the interim
rule.
    In the higher cost scenario, we estimate that the annual revenues
of 94 percent of the small entities may be impacted initially by more
than 5 percent, while the annual revenues of 80 percent of the small
entities may be impacted annually by more than 5 percent. In the lower
cost scenario, we found that the annual revenues of 57 percent of the
small entities may be impacted initially and annually by more than 5
percent.

Assistance for Small Entities

    Under section 213(a) of the Small Business Regulatory Enforcement
Fairness Act of 1996 (Pub. L. 104-121), we want to assist small
entities in understanding this interim rule so that they can better
evaluate its effects on them and participate in the rulemaking. If the
rule would affect your small business, organization, or governmental
jurisdiction and you have questions concerning its provisions or
options for compliance, please consult LT Gregory Purvis by telephone
202-267-1103, toll-free telephone 1-800-842-8740 ext. 7-

[[Page 39321]]

1103, or electronic mail msregs@comdt.uscg.mil.    Small businesses may send comments on the actions of Federal
employees who enforce, or otherwise determine compliance with, Federal
regulations to the Small Business and Agriculture Regulatory
Enforcement Ombudsman and the Regional Small Business Regulatory
Fairness Boards. The Ombudsman evaluates these actions annually and
rates each agency's responsiveness to small business. If you wish to
comment on actions by employees of the Coast Guard, call 1-888-REG-FAIR
(1-888-734-3247).

Collection of Information

    This interim rule calls for a collection of information under the
Paperwork Reduction Act of 1995 (44 U.S.C. 3501-3520). As defined in 5
CFR 1320.3(c), ``collection of information'' comprises reporting,
recordkeeping, monitoring, posting, labeling, and other similar
actions. The title and description of the information collections, a
description of those who must collect the information, and an estimate
of the total annual burden follow. The estimate covers the time for
reviewing instructions, searching existing sources of data, gathering
and maintaining the data needed, and completing and reviewing the
collection.
    This interim rule modifies an existing OMB-approved collection--
1625-0077 [formerly 2115-0557]. A summary of the revised collection
follows.
    Title: Security Plans for Ports, Vessels, Facilities, and Outer
Continental Shelf Facilities and Other Security-Related Requirements.
    OMB Control Number: 1625-0077.
    Summary of the Collection of Information: The Coast Guard requires
facilities to draft and maintain Facility Security Assessments and
Facility Security Plans. It also requires that, under certain
circumstances, documentation and letters be provided to the Coast Guard
to ensure compliance with the security requirements. Finally, the Coast
Guard requires that a Declaration of Security be completed between
facilities and vessels handling certain types of cargo.
    Need for Information: The primary need for information is to
identify the adequate security mitigating measures that will be
implemented when needed. Additionally, the Coast Guard intends to
collect a summary of the vulnerabilities and selected security measures
from the facilities regulated under this rule. The data will be
submitted on form CG-6025, Facility Vulnerability and Security Measures
Summary. Electronic submission when available will be accepted and
encouraged. The form must be included in the Facility Security Plan as
an annex to assist COTPs in the development of the Area Maritime
Security Plan.
    Proposed Use of Information: The information will be used to
identify and communicate the security mitigating measures to the Coast
Guard and necessary personnel. Declarations of Security will be used by
some facilities and vessels to identify and delineate the security
responsibilities between a vessel and a facility.
    Description of the Respondents: The Facility Security Officer or
another designated person is responsible for developing the Facility
Security Assessment and the Facility Security Plan. For some
facilities, the Facility Security Officer will also complete a
Declaration of Security.
    Number of Respondents: 4,965 Facility Security Officers.
    Frequency of Response: Facility Security Assessments and Facility
Security Plans are to be submitted for approval initially, and will be
reviewed annually. Declarations of Security are to be completed
whenever certain vessels are being serviced by a facility.
    Burden of Response: The burden of developing each Facility Security
Assessment and each Facility Security Plan is estimated to take 80
hours for some facilities and 40 hours for others. Updating each
assessment or plan is estimated to take 4 hours for some facilities and
2 hours for others. Each Declaration of Security is expected to be 15
minutes.
    Estimate of Total Annual Burden: Facility Security Assessments and
Facility Security Plans will have a total burden in the initial year of
528,240 hours (264,120 for the assessments and 264,120 for the plans).
Annually, the total burden of the assessments and the plans is 26,412
hours (13,206 for the assessments and 13,206 for the plans).
Declarations of Security will have an annual burden of 581,775 hours.
The total burden hours for this interim rule are 528,240 hours in the
initial year, and 608,187 hours in subsequent years. For a summary of
all revisions to this existing OMB-approved collection, refer to
Collection of Information in the interim rule titled ``Implementation
of National Maritime Security Initiatives'' (USCG-2003-14792) published
elsewhere in today's Federal Register.
    As required by the Paperwork Reduction Act of 1995 (44 U.S.C.
3507(d)), we have submitted a copy of this interim rule to the Office
of Management and Budget (OMB) for its review of the collection of
information. Due to the circumstances surrounding this temporary rule,
we asked for ``emergency processing'' of our request. We received OMB
approval for the collection of information on June 16, 2003. It is
valid until December 31, 2003.
    We ask for public comment on the collection of information to help
us determine how useful the information is; whether it can help us
perform our functions better; whether it is readily available
elsewhere; how accurate our estimate of the burden of collection is;
how valid our methods for determining burden are; how we can improve
the quality, usefulness, and clarity of the information; and how we can
minimize the burden of collection.
    If you submit comments on the collection of information, submit
them both to OMB and to the Docket Management Facility where indicated
under ADDRESSES, by the date under DATES.
    You need not respond to a collection of information unless it
displays a currently valid control number from OMB. We received OMB
approval for the collection of information on June 16, 2003. It is
valid until December 31, 2003.

Federalism

    A rule has implications for federalism under Executive Order 13132,
Federalism, if it has a substantial direct effect on State or local
governments and would either preempt State law or impose a substantial
direct cost of compliance on them. See the ``Federalism'' section in
the interim rule preamble titled ``Implementation of National Maritime
Security Initiatives'' (USCG-2003-14792), published elsewhere in
today's Federal Register, for a detailed of the analysis under this
Executive Order.

Unfunded Mandates Reform Act

    The Unfunded Mandates Reform Act of 1995 (2 U.S.C. 1531-1538)
requires Federal agencies to assess the effects of their discretionary
regulatory actions. In particular, the Act addresses actions that may
result in the expenditure by a State, local, or tribal government, in
the aggregate, or by the private sector of $100,000,000 or more in any
one year. This rule is exempted from assessing the effects of the
regulatory action as required by the Act because it is necessary for
the national security of the U.S.

Taking of Private Property

    This interim rule will not effect a taking of private property or
otherwise have taking implications under Executive Order 12630,
Governmental

[[Page 39322]]

Actions and Interference with Constitutionally Protected Property
Rights.

Civil Justice Reform

    This interim rule meets applicable standards in sections 3(a) and
3(b)(2) of Executive Order 12988, Civil Justice Reform, to minimize
litigation, eliminate ambiguity, and reduce burden.

Protection of Children

    We have analyzed this interim rule under Executive Order 13045,
Protection of Children from Environmental Health Risks and Safety
Risks. While this interim rule is an economically significant rule, it
does not create an environmental risk to health or risk to safety that
may disproportionately affect children.

Indian Tribal Governments

    This interim rule does not have tribal implications under Executive
Order 13175, Consultation and Coordination with Indian Tribal
Governments, because it does not have a substantial direct effect on
one or more Indian tribes, on the relationship between the Federal
Government and Indian tribes, or on the distribution of power and
responsibilities between the Federal Government and Indian tribes.

Energy Effects

    We have analyzed this interim rule under Executive Order 13211,
Actions Concerning Regulations That Significantly Affect Energy Supply,
Distribution, or Use. We have determined that it is not a ``significant
energy action'' under that order. Although it is a ``significant
regulatory action'' under Executive Order 12866, it is not likely to
have a significant adverse effect on the supply, distribution, or use
of energy. The Administrator of the Office of Information and
Regulatory Affairs has not designated it as a significant energy
action. Therefore, it does not require a Statement of Energy Effects
under Executive Order 13211.
    This interim rule has a positive effect on the supply,
distribution, and use of energy. The interim rule provides for security
assessments, plans, procedures, and standards, which will prove
beneficial for the supply, distribution, and use of energy at increased
levels of maritime security.

Trade Impact Assessment

    The Trade Agreement Act of 1979 (19 U.S.C. 2501-2582) prohibits
Federal agencies from engaging in any standards or related activities
that create unnecessary obstacles to the foreign commerce of the U.S.
Legitimate domestic objectives, such as safety and security, are not
considered unnecessary obstacles. The Act also requires consideration
of international standards and, where appropriate, that they be the
basis for U.S. standards. We have assessed the potential effect of this
interim rule and have determined that it would likely create obstacles
to the foreign commerce of the U.S. However, because these regulations
are being put in place in order to further a legitimate domestic
objective, namely to increase the security of the U.S., any obstacles
created by the regulation are not considered unnecessary obstacles.

Environment

    We have considered the environmental impact of this rule and
concluded that under figure 2-1, paragraph (34)(a) and (34)(c), of
Commandant Instruction M16475.lD, this rule is categorically excluded
from further environmental documentation. This interim rule concerns
security assessments, plans, training, and the establishment of
security positions that will contribute to a higher level of marine
safety and security for U.S. ports. A ``Categorical Exclusion
Determination'' is available in the docket where indicated under
ADDRESSES or SUPPLEMENTARY INFORMATION.
    This rulemaking will not significantly impact the coastal zone.
Further, the rulemaking and the execution of this rule will be done in
conjunction with appropriate State coastal authorities. The Coast Guard
will, therefore, comply with the requirements of the Coastal Zone
Management Act while furthering its intent to protect the coastal zone.

List of Subjects in 33 CFR Part 105

    Facilities, Maritime security, Reporting and recordkeeping
requirements, Security measures.

    Dated: June 23, 2003.
Thomas H. Collins,
Admiral, U.S. Coast Guard, Commandant.

0
For the reasons discussed in the preamble, the Coast Guard adds part
105 to subchapter H of chapter I of title 33 in the CFR to read as
follows:

PART 105-FACILITY SECURITY

Subpart A-General
Sec.
105.100 Definitions.
105.105 Applicability.
105.106 Public access areas.
105.110 Exemptions.
105.115 Compliance dates.
105.120 Compliance documentation.
105.125 Noncompliance.
105.130 Waivers.
105.135 Equivalents.
105.140 Alternative Security Program.
105.145 Maritime Security (MARSEC) Directive.
105.150 Right to appeal.
Subpart B--Facility Security Requirements
105.200 Owner or operator.
105.205 Facility Security Officer (FSO).
105.210 Facility personnel with security duties.
105.215 Security training for all other facility personnel.
105.220 Drill and exercise requirements.
105.225 Facility recordkeeping requirements.
105.230 Maritime Security (MARSEC) Level coordination and
implementation.
105.235 Communications.
105.240 Procedures for interfacing with vessels.
105.245 Declaration of Security (DoS).
105.250 Security systems and equipment maintenance.
105.255 Security measures for access control.
105.260 Security measures for restricted areas.
105.265 Security measures for handling cargo.
105.270 Security measures for delivery of vessel stores and bunkers.
105.275 Security measures for monitoring.
105.280 Security incident procedures.
105.285 Additional requirements--passenger and ferry facilities.
105.290 Additional requirements--cruise ship terminals.
105.295 Additional requirements--Certain Dangerous Cargo (CDC)
facilities.
105.296 Additional requirements--barge fleeting facilities.
Subpart C--Facility Security Assessment (FSA)
105.300 General.
105.305 Facility Security Assessment (FSA) requirements.
105.310 Submission requirements.
Subpart D--Facility Security Plan (FSP)
105.400 General.
105.405 Format and content of the Facility Security Plan (FSP).
105.410 Submission and approval.
105.415 Amendment and audit.
Appendix A to part 105--Facility Vulnerability and Security Measure
Summary (CG-6025).

    Authority: 33 U.S.C. 1226, 1231; 46 U.S.C. 70103; 50 U.S.C. 191;
33 CFR 1.05-1,6.04-11, 6.14, 6.16, and 6.19; Department of Homeland
Security Delegation No. 0170.

Subpart A--General

Sec.  105.100  Definitions.

    Except as specifically stated in this subpart, the definitions in
part 101 of this subchapter apply to this part.

[[Page 39323]]

Sec.  105.105  Applicability.

    (a) The requirements in this part apply to the owner or operator of
any U.S.:
    (1) Facility subject to 33 CFR parts 126, 127, or 154;
    (2) Facility that receives vessels certificated to carry more than
150 passengers;
    (3) Facility that receives vessels subject to the International
Convention for Safety of Life at Sea, 1974, or that are commercial
vessels subject to subchapter I of title 46, Code of Federal
Regulations, greater than 100 gross register tons on international
voyages, including vessels solely navigating the Great Lakes; or
    (4) Fleeting facility that receives barges carrying, in bulk,
cargoes regulated by subchapters D and O of chapter I, title 46, Code
of Federal Regulations or Certain Dangerous Cargoes.
    (b) An owner or operator of any facility not covered in paragraph
(a) of this section is subject to parts 101 through 103 of this
subchapter.
    (c) This part does not apply to the owner or operator of the
following U.S. facilities:
    (1) A facility owned and operated by the U.S. that is used
primarily for military purposes.
    (2) An oil and natural gas production, exploration, or development
facility regulated by 33 CFR parts 126 or 154 if:
    (i) The facility is engaged solely in the exploration, development,
or production of oil and natural gas; and
    (ii) The facility does not meet or exceed the operating conditions
in Sec.  106.105 of this subchapter;
    (3) A facility that supports the production, exploration, or
development of oil and natural gas regulated by 33 CFR parts 126 or 154
if:
    (i) The facility is engaged solely in the support of exploration,
development, or production of oil and natural gas; and
    (ii) The facility transports or stores quantities of hazardous
materials that do not meet and exceed those specified in 49 CFR
172.800(b)(1) through (6); or
    (iii) The facility stores less than 42,000 gallons of cargo
regulated by 33 CFR part 154;
    (4) A mobile facility regulated by 33 CFR part 154; or
    (5) An isolated facility that receives materials regulated by 33
CFR parts 126 or 154 by vessel due to the lack of road access to the
facility and does not distribute the material through secondary marine
transfers.

Sec.  105.106  Public access areas.

    (a) A facility serving ferries and passenger vessels certificated
to carry more than 150 passengers, other than cruise vessels, may
designate an area within the facility as a public access area.
    (b) A public access area is a defined space within a facility that
is open to all persons and provides access through the facility from
public thoroughfares to the vessel.

Sec.  105.110  Exemptions.

    (a) An owner or operator of any barge fleeting facility subject to
this part is exempt from complying with Sec.  105.265, Security
measures for handling cargo; and Sec.  105.270, Security measures for
delivery of vessel stores and bunkers.
    (b) A public access area designated under Sec.  105.106 is exempt
from the requirements for screening and identification of persons in
Sec.  105.255(c), (e)(1), and (e)(3).

Sec.  105.115  Compliance dates.

    (a) On or before December 29, 2003, each facility owner or operator
must submit to the cognizant COTP for each facility a Facility Security
Plan (FSP) described in subpart D of this part for review and approval.
    (b) On or before June 30, 2004, each facility owner or operator
must be operating in compliance with this part.

Sec.  105.120  Compliance documentation.

    Each facility owner or operator subject to this part must ensure,
no later than July 1, 2004, that copies of the following documentation
are available at the facility and are made available to the Coast Guard
upon request:
    (a) The approved Facility Security Plan (FSP), as well as any
approved revisions or amendments thereto, and a letter of approval from
the COTP dated within the last 5 years;
    (b) The FSP submitted for approval and an acknowledgement letter
from the COTP stating that the Coast Guard is currently reviewing the
FSP submitted for approval, and that the facility may continue to
operate so long as the facility remains in compliance with the
submitted FSP; or
    (c) For facilities operating under a Coast Guard-approved
Alternative Security Program as provided in Sec.  105.140, a copy of
the Alternative Security Program the facility is using and a letter
signed by the facility owner or operator, stating which Alternative
Security Program the facility is using and certifying that the facility
is in full compliance with that program.

Sec.  105.125  Noncompliance.

    When a facility is not in compliance with the requirements of this
part, the facility owner or operator must notify the cognizant COTP and
request a waiver to continue operations.

Sec.  105.130  Waivers.

    Any facility owner or operator may apply for a waiver of any
requirement of this part that the facility owner or operator considers
unnecessary in light of the nature or operating conditions of the
facility, prior to operating. A request for a waiver must be submitted
in writing with justification to the Commandant (G-MP) at 2100 Second
St., SW., Washington, DC 20593. The Commandant (G-MP) may require the
facility owner or operator to provide data for use in determining the
validity of the requested waiver. The Commandant (G-MP) may grant, in
writing, a waiver with or without conditions only if the waiver will
not reduce the overall security of the facility, its employees,
visiting vessels, or ports. The Commandant (G-MP) may grant a waiver
with or without written conditions only if the waiver will not reduce
the overall security of the facility, its employees, visiting vessels,
or port.

Sec.  105.135  Equivalents.

    For any measure required by this part, the facility owner or
operator may propose an equivalent as provided in Sec.  101.130 of this
subchapter.

Sec.  105.140  Alternative Security Program.

    (a) A facility owner or operator may use an Alternative Security
Program approved under Sec.  101.120 of this subchapter if:
    (1) The Alternative Security Program is appropriate to that
facility;
    (2) The Alternative Security Program is implemented in its
entirety.
    (b) A facility owner or operator using an Alternative Security
Program approved under Sec.  101.120 of this subchapter must complete
and submit to the cognizant COTP a Facility Vulnerability and Security
Measures Summary (Form CG-6025) in appendix A to part 105--Facility
Vulnerability and Security (CG-6025).

Sec.  105.145  Maritime Security (MARSEC) Directive.

    Each facility owner or operator subject to this part must comply
with any instructions contained in a MARSEC Directive issued under
Sec.  101.405 of this subchapter.

Sec.  105.150  Right to appeal.

    Any person directly affected by a decision or action taken under
this part, by or on behalf of the Coast Guard, may appeal as described
in Sec.  101.420 of this subchapter.

[[Page 39324]]

Subpart B--Facility Security Requirements

Sec.  105.200  Owner or operator.

    (a) Each facility owner or operator must ensure that the facility
operates in compliance with the requirements of this part.
    (b) For each facility, the facility owner or operator must:
    (1) Define the security organizational structure and provide each
person exercising security duties and responsibilities within that
structure the support needed to fulfill those obligations;
    (2) Designate, in writing, by name or by title, a Facility Security
Officer (FSO) and identify how the officer can be contacted at any
time;
    (3) Ensure that a Facility Security Assessment (FSA) is conducted;
    (4) Ensure the development and submission for approval of a
Facility Security Plan (FSP);
    (5) Ensure that the facility operates in compliance with the
approved FSP;
    (6) Ensure that adequate coordination of security issues takes
place between the facility and vessels that call on it, including the
execution of a Declaration of Security (DoS) as required by this part;
    (7) Ensure coordination of shore leave for vessel personnel or crew
change-out, as well as access through the facility for visitors to the
vessel (including representatives of seafarers' welfare and labor
organizations), with vessel operators in advance of a vessel's arrival;
    (8) Ensure, within 12 hours of notification of an increase in
MARSEC Level, implementation of the additional security measures
required for the new MARSEC Level; and
    (9) Ensure the report of all breaches of security and security
incidents to the National Response Center in accordance with part 101
of this subchapter.

Sec.  105.205  Facility Security Officer (FSO).

    (a) General. (1) The FSO may perform other duties within the
owner's or operator's organization, provided he or she is able to
perform the duties and responsibilities required of the FSO.
    (2) The same person may serve as the FSO for more than one
facility, provided the facilities are in the same COTP zone and are not
more than 50 miles apart. If a person serves as the FSO for more than
one facility, the name of each facility for which he or she is the FSO
must be listed in the Facility Security Plan (FSP) of each facility for
which or she is the FSO.
    (3) The FSO may assign security duties to other facility personnel;
however, the FSO retains the responsibility for these duties.
    (b) Qualifications. (1) The FSO must have general knowledge,
through training or equivalent job experience, in the following:
    (i) Security organization of the facility;
    (ii) General vessel and facility operations and conditions;
    (iii) Vessel and facility security measures, including the meaning
and the requirements of the different MARSEC Levels;
    (iv) Emergency preparedness, response, and contingency planning;
    (v) Security equipment and systems, and their operational
limitations; and
    (vi) Methods of conducting audits, inspections, control, and
monitoring techniques.
    (2) In addition to knowledge and training required in paragraph
(b)(1) of this section, the FSO must have knowledge of and receive
training in the following, as appropriate:
    (i) Relevant international laws and codes, and recommendations;
    (ii) Relevant government legislation and regulations;
    (iii) Responsibilities and functions of local, State, and Federal
law enforcement agencies;
    (iv) Risk assessment methodology;
    (v) Methods of facility security surveys and inspections;
    (vi) Instruction techniques for security training and education,
including security measures and procedures;
    (vii) Handling sensitive security information and security related
communications;
    (viii) Current security threats and patterns;
    (ix) Recognizing and detecting dangerous substances and devices;
    (x) Recognizing characteristics and behavioral patterns of persons
who are likely to threaten security;
    (xi) Techniques used to circumvent security measures;
    (xii) Conducting physical searches and non-intrusive inspections;
    (xiii) Conducting security drills and exercises, including
exercises with vessels; and
    (xiv) Assessing security drills and exercises.
    (c) Responsibilities. In addition to those responsibilities and
duties specified elsewhere in this part, the FSO must, for each
facility for which he or she has been designated:
    (1) Ensure that the Facility Security Assessment (FSA) is
conducted;
    (2) Ensure the development and implementation of a FSP;
    (3) Ensure that an annual audit is conducted, and if necessary if
the FSA and FSP are updated;
    (4) Ensure the FSP is exercised per Sec.  105.220 of this part;
    (5) Ensure that regular security inspections of the facility are
conducted;
    (6) Ensure the security awareness and vigilance of the facility
personnel;
    (7) Ensure adequate training to personnel performing facility
security duties;
    (8) Ensure that occurrences that threaten the security of the
facility are recorded and reported to the owner or operator;
    (9) Ensure the maintenance of records required by this part;
    (10) Ensure the preparation and the submission of any reports as
required by this part;
    (11) Ensure the execution of any required Declarations of Security
with Vessel Security Officers;
    (12) Ensure the coordination of security services in accordance
with the approved FSP;
    (13) Ensure that security equipment is properly operated, tested,
calibrated, and maintained;
    (14) Ensure the recording and reporting of attainment changes in
MARSEC Levels to the owner or operator and the cognizant COTP;
    (15) When requested, ensure that the Vessel Security Officers
receive assistance in confirming the identity of visitors and service
providers seeking to board the vessel through the facility;
    (16) Ensure notification, as soon as possible, to law enforcement
personnel and other emergency responders to permit a timely response to
any transportation security incident;
    (17) Ensure that the FSP is submitted to the cognizant COTP for
approval, as well as any plans to change the facility or facility
infrastructure prior to amending the FSP; and
    (18) Ensure that all facility personnel are briefed of changes in
security conditions at the facility.

Sec.  105.210  Facility personnel with security duties.

    Facility personnel responsible for security duties must have
knowledge, through training or equivalent job experience, in the
following, as appropriate:
    (a) Knowledge of current security threats and patterns;
    (b) Recognition and detection of dangerous substances and devices;
    (c) Recognition of characteristics and behavioral patterns of
persons who are likely to threaten security;
    (d) Techniques used to circumvent security measures;
    (e) Crowd management and control techniques;

[[Page 39325]]

    (f) Security related communications;
    (g) Knowledge of emergency procedures and contingency plans;
    (h) Operation of security equipment and systems;
    (i) Testing, calibration, and maintenance of security equipment and
systems;
    (j) Inspection, control, and monitoring techniques;
    (k) Relevant provisions of the Facility Security Plan (FSP);
    (l) Methods of physical screening of persons, personal effects,
baggage, cargo, and vessel stores; and
    (m) The meaning and the consequential requirements of the different
MARSEC Levels.

Sec.  105.215  Security training for all other facility personnel.

    All other facility personnel, including contractors, whether part-
time, full-time, temporary, or permanent, must have knowledge of,
through training or equivalent job experience, in the following:
    (a) Relevant provisions of the Facility Security Plan (FSP);
    (b) The meaning and the consequential requirements of the different
MARSEC Levels as they apply to them, including emergency procedures and
contingency plans;
    (c) Recognition and detection of dangerous substances and devices;
    (d) Recognition of characteristics and behavioral patterns of
persons who are likely to threaten security; and
    (e) Techniques used to circumvent security measures.

Sec.  105.220  Drill and exercise requirements.

    (a) General. Drills and exercises must test the proficiency of
facility personnel in assigned security duties at all MARSEC Levels and
the effective implementation of the Facility Security Plan (FSP). They
must enable the Facility Security Officer (FSO) to identify any related
security deficiencies that need to be addressed.
    (b) Drills.--(1) The FSO must ensure that at least one security
drill is conducted every 3 months. Security drills may be held in
conjunction with non-security drills, where appropriate.
    (2) Drills must test individual elements of the FSP, including
response to security threats and incidents. Drills should take into
account the types of operations of the facility, facility personnel
changes, the type of vessel the facility is serving, and other relevant
circumstances. Examples of drills include unauthorized entry to a
restricted area, response to alarms, and notification of law
enforcement authorities.
    (3) If a vessel is moored at the facility on the date the facility
has planned to conduct any drills, the facility cannot require the
vessel or vessel personnel to be a part of or participate in the
facility's scheduled drill.
    (c) Exercises.--(1) Exercises must be conducted at least once each
calendar year, with no more than 18 months between exercises.
    (2) Exercises may be:
    (i) Full scale or live;
    (ii) Tabletop simulation or seminar;
    (iii) Combined with other appropriate exercises; or
    (iv) A combination of the elements in paragraphs (c)(2)(i) through
(iii) of this section.
    (3) Exercises may be facility-specific or part of a cooperative
exercise program with applicable facility and vessel security plans or
comprehensive port exercises.
    (4) Each exercise must test communication and notification
procedures, and elements of coordination, resource availability, and
response.
    (5) Exercises are a full test of the security program and must
include substantial and active participation of FSOs, and may include
government authorities and vessels visiting the facility. Requests for
participation of Company and Vessel Security Officers in joint
exercises should consider the security and work implications for the
vessel.

Sec.  105.225  Facility recordkeeping requirements.

    (a) Unless otherwise specified in this section, the Facility
Security Officer (FSO) must keep records of the activities as set out
in paragraph (b) of this section for at least 2 years and make them
available to the Coast Guard upon request.
    (b) Records required by this section may be kept in electronic
format. If kept in an electronic format, they must be protected against
unauthorized deletion, destruction, or amendment. The following records
must be kept:
    (1) Training. For each security training session, the date of each
session, duration of session, a description of the training, and a list
of attendees;
    (2) Drills and exercises. For each drill or exercise, the date
held, description of drill or exercise, list of participants, and any
best practices or lessons learned which may improve the Facility
Security Plan (FSP);
    (3) Incidents and breaches of security. For each incident or breach
of security, the date and time of occurrence, location within the
facility, description of incident or breaches, to whom it was reported,
and description of the response;
    (4) Changes in MARSEC Levels. For each change in MARSEC Level, the
date and time of notification received, and time of compliance with
additional requirements;
    (5) Maintenance, calibration, and testing of security equipment.
For each occurrence of maintenance, calibration, and testing, record
the date and time, and the specific security equipment involved;
    (6) Security threats. For each security threat, the date and time
of occurrence, how the threat was communicated, who received or
identified the threat, description of threat, to whom it was reported,
and description of the response;
    (7) Declaration of Security (DoS) A copy of each single-visit DoS
and a copy of each continuing DoS for at least 90 days after the end of
its effective period; and
    (8) Annual audit of the FSP. For each annual audit, a letter
certified by the FSO stating the date the audit was completed.
    (c) Any record required by this part must be protected from
unauthorized access or disclosure.

Sec.  105.230  Maritime Security (MARSEC) Level coordination and
implementation.

    (a) The facility owner or operator must ensure the facility
operates in compliance with the security requirements in this part for
the MARSEC Level in effect for the port.
    (b) When notified of an increase in the MARSEC Level, the facility
owner and operator must ensure:
    (1) Vessels moored to the facility and vessels scheduled to arrive
at the facility within 96 hours of the MARSEC Level change are notified
of the new MARSEC Level and the Declaration of Security is revised as
necessary;
    (2) The facility complies with the required additional security
measures within 12 hours; and
    (3) The facility reports compliance or noncompliance to the COTP.
    (c) For MARSEC Levels 2 and 3, the Facility Security Officer must
inform all facility personnel about identified threats, and emphasize
reporting procedures and stress the need for increased vigilance.
    (d) An owner or operator whose facility is not in compliance with
the requirements of this section, must inform the COTP and obtain
approval prior to interfacing with a vessel or continuing operations.
    (e) At MARSEC Level 3, in addition to the requirements in this
part, a

[[Page 39326]]

facility owner or operator may be required to implement additional
measures, pursuant to 33 CFR part 6, 160, or 165, as appropriate, which
may include but are not limited to:
    (1) Use of waterborne security patrol;
    (2) Use of armed security personnel to control access to the
facility and to deter, to the maximum extent practical, a
transportation security incident; and
    (3) Examination of piers, wharves, and similar structures at the
facility for the presence of dangerous substances or devices underwater
or other threats.

Sec.  105.235  Communications.

    (a) The Facility Security Officer must have a means to effectively
notify facility personnel of changes in security conditions at the
facility.
    (b) Communication systems and procedures must allow effective and
continuous communications between the facility security personnel,
vessels interfacing with the facility, the cognizant COTP, and national
and local authorities with security responsibilities.
    (c) At each active facility access point, provide a means of
contacting police, security control, or an emergency operations center,
by telephones, cellular phones, and/or portable radios, or other
equivalent means.
    (d) Facility communications systems must have a backup means for
both internal and external communications.

Sec.  105.240  Procedures for interfacing with vessels.

    The facility owner or operator must ensure that there are measures
for interfacing with vessels at all MARSEC Levels.

Sec.  105.245  Declaration of Security (DoS).

    (a) Each facility owner or operator must ensure procedures are
established for requesting a DoS and for handling DoS requests from a
vessel.
    (b) At MARSEC Level 1, a facility receiving a cruise ship or a
manned vessel carrying Certain Dangerous Cargo, in bulk, must comply
with the following:
    (1) Prior to the arrival of a vessel to the facility, the Facility
Security Officer (FSO) and Master, Vessel Security Officer (VSO), or
their designated representatives must coordinate security needs and
procedures, and agree upon the contents of the DoS for the period of
time the vessel is at the facility; and
    (2) Upon the arrival of the vessel at the facility, the FSO and
Master, VSO, or their designated representative, must sign the written
DoS.
    (c) Neither the facility nor the vessel may embark or disembark
passengers, nor transfer cargo or vessel stores until the DoS has been
signed and implemented.
    (d) At MARSEC Levels 2 and 3, the FSOs of facilities interfacing
with manned vessels subject to part 104 of this subchapter must sign
and implement DoSs.
    (e) At MARSEC Levels 1 and 2, FSOs of facilities that frequently
interface with the same vessel may implement a continuing DoS for
multiple visits, provided that:
    (1) The DoS is valid for a specific MARSEC Level;
    (2) The effective period at MARSEC Level 1 does not exceed 90 days;
and
    (3) The effective period at MARSEC Level 2 does not exceed 30 days.
    (f) When the MARSEC Level increases beyond that contained in the
DoS, the continuing DoS is void and a new DoS must be executed in
accordance with this section.
    (g) A copy of all currently valid continuing DoSs must be kept with
the Facility Security Plan.
    (h) The COTP may require, at any time, at any MARSEC Level, any
facility subject to this part to implement a DoS with the VSO prior to
any vessel-to-facility interface when he or she deems it necessary.

Sec.  105.250  Security systems and equipment maintenance.

    (a) Security systems and equipment must be in good working order
and inspected, tested, calibrated, and maintained according to
manufacturers' recommendations.
    (b) Security systems must be regularly tested in accordance with
the manufacturers' recommendations; noted deficiencies corrected
promptly; and the results recorded as required in Sec.  105.225 of this
subpart.
    (c) The FSP must include procedures for identifying and responding
to security system and equipment failures or malfunctions.

Sec.  105.255  Security measures for access control.

    (a) General. The facility owner or operator must ensure the
implementation of security measures to:
    (1) Deter the unauthorized introduction of dangerous substances and
devices, including any device intended to damage or destroy persons,
vessels, facilities, or ports;
    (2) Secure dangerous substances and devices that are authorized by
the owner or operator to be on the facility; and
    (3) Control access to the facility.
    (b) The facility owner or operator must ensure that:
    (1) The locations where restrictions or prohibitions that prevent
unauthorized access are applied for each MARSEC Level. Each location
allowing means of access to the facility must be addressed;
    (2) The identification of the type of restriction or prohibition to
be applied and the means of enforcing them;
    (3) The means of identification required to allow access to the
facility and for individuals and vehicles to remain on the facility
without challenge are established; and
    (4) The identification of the locations where persons, personal
effects and vehicle screenings are to be conducted. The designated
screening areas should be covered to provide for continuous operations
regardless of the weather conditions.
    (c) The facility owner or operator must ensure that an
identification system is established for checking the identification of
facility personnel or other persons seeking access to the facility
that:
    (1) Allows identification of authorized and unauthorized persons at
any MARSEC Level;
    (2) Is coordinated, when practicable, with identification systems
of vessels that use the facility;
    (3) Is updated regularly;
    (4) Uses disciplinary measures to discourage abuse;
    (5) Allows temporary or continuing access for facility personnel
and visitors, including seafarers' chaplains and union representatives,
through the use of a badge or other system to verify their identity;
and
    (6) Allows certain long-term, frequent vendor representatives to be
treated more as employees than as visitors.
    (d) The facility owner or operator must establish in the approved
Facility Security Plan (FSP) the frequency of application of any access
controls, particularly if they are to be applied on a random or
occasional basis.
    (e) MARSEC Level 1. The facility owner or operator must ensure the
following security measures are implemented at the facility:
    (1) Screen persons, baggage (including carry-on items), personal
effects, and vehicles, including delivery vehicles for dangerous
substances and devices at the rate specified in the approved FSP;
    (2) Conspicuously post signs that describe security measures
currently in effect and clearly state that:
    (i) Entering the facility is deemed valid consent to screening or
inspection; and
    (ii) Failure to consent or submit to screening or inspection will
result in denial or revocation of authorization to enter;
    (3) Check the identification of any person seeking to enter the
facility,

[[Page 39327]]

including vessel passengers and crew, facility employees, vendors,
personnel duly authorized by the cognizant authority, and visitors.
This check includes confirming the reason for entry by examining at
least one of the following:
    (i) Joining instructions;
    (ii) Passenger tickets;
    (iii) Boarding passes;
    (iv) Work orders, pilot orders, or surveyor orders;
    (v) Government identification; or
    (vi) Visitor badges issued in accordance with an identification
system required in paragraph (c) of this section;
    (4) Deny or revoke a person's authorization to be on the facility
if the person is unable or unwilling, upon the request of facility
personnel, to establish his or her identity or to account for his or
her presence. Any such incident must be reported in compliance with
this part;
    (5) Designate restricted areas and provide appropriate access
controls for these areas;
    (6) Identify access points that must be secured or attended to
deter unauthorized access;
    (7) Deter unauthorized access to the facility and to designated
restricted areas within the facility;
    (8) Screen by hand or device, such as x-ray, all unaccompanied
baggage prior to loading onto a vessel; and
    (9) Secure unaccompanied baggage after screening in a designated
restricted area and maintain security control during transfers between
the facility and a vessel.
    (f) MARSEC Level 2. In addition to the security measures required
for MARSEC Level 1 in this section, at MARSEC Level 2, the facility
owner or operator must also ensure the implementation of additional
security measures, as specified for MARSEC Level 2 in their approved
FSP. These additional security measures may include:
    (1) Increasing the frequency and detail of the screening of
persons, baggage, and personal effects for dangerous substances and
devices entering the facility;
    (2) X-ray screening of all unaccompanied baggage;
    (3) Assigning additional personnel to guard access points and
patrol the perimeter of the facility to deter unauthorized access;
    (4) Limiting the number of access points to the facility by closing
and securing some access points and providing physical barriers to
impede movement through the remaining access points;
    (5) Denying access to visitors who do not have a verified
destination;
    (6) Deterring waterside access to the facility, which may include,
using waterborne patrols to enhance security around the facility; or
    (7) Screening vehicles and their contents for dangerous substances
and devices at the rate specified for MARSEC Level 2 in the approved
FSP.
    (g) MARSEC Level 3. In addition to the security measures required
for MARSEC Level 1 and MARSEC Level 2, the facility owner or operator
must ensure the implementation of additional security measures, as
specified for MARSEC Level 3 in their approved FSP. These additional
security measures may include:
    (1) Screening all persons, baggage, and personal effects for
dangerous substances and devices;
    (2) Performing one or more of the following on unaccompanied
baggage:
    (i) Screen unaccompanied baggage more extensively; for example, x-
raying from two or more angles;
    (ii) Prepare to restrict or suspend handling unaccompanied baggage;
or
    (iii) Refuse to accept unaccompanied baggage;
    (3) Being prepared to cooperate with responders and facilities;
    (4) Granting access to only those responding to the security
incident or threat thereof;
    (5) Suspending access to the facility;
    (6) Suspending cargo operations;
    (7) Evacuating the facility;
    (8) Restricting pedestrian or vehicular movement on the grounds of
the facility; or
    (9) Increasing security patrols within the facility.

Sec.  105.260  Security measures for restricted areas.

    (a) General. The facility owner or operator must ensure the
designation of restricted areas in order to:
    (1) Prevent or deter unauthorized access;
    (2) Protect persons authorized to be in the facility;
    (3) Protect the facility;
    (4) Protect vessels using and serving the facility;
    (5) Protect sensitive security areas within the facility;
    (6) Protect security and surveillance equipment and systems; and
    (7) Protect cargo and vessel stores from tampering.
    (b) Designation of Restricted Areas. The facility owner or operator
must ensure restricted areas are designated within the facility. They
must also ensure that all restricted areas are clearly marked and
indicate that access to the area is restricted and that unauthorized
presence within the area constitutes a breach of security. The facility
owner or operator may also designate the entire facility as a
restricted area. Restricted areas must include, as appropriate:
    (1) Shore areas immediately adjacent to each vessel moored at the
facility;
    (2) Areas containing sensitive security information, including
cargo documentation;
    (3) Areas containing security and surveillance equipment and
systems and their controls, and lighting system controls; and
    (4) Areas containing critical facility infrastructure, including:
    (i) Water supplies;
    (ii) Telecommunications;
    (iii) Electrical system; and
    (iv) Access points for ventilation and air-conditioning systems;
    (5) Manufacturing or processing areas and control rooms;
    (6) Locations in the facility where access by vehicles and
personnel should be restricted;
    (7) Areas designated for loading, unloading or storage of cargo and
stores; and
    (8) Areas containing cargo consisting of dangerous goods or
hazardous substances, including certain dangerous cargoes.
    (c) The owner or operator must ensure that all restricted areas
have clearly established security measures to:
    (1) Identify which facility personnel are authorized to have
access;
    (2) Determine which persons other than facility personnel are
authorized to have access;
    (3) Determine the conditions under which that access may take
place;
    (4) Define the extent of any restricted area;
    (5) Define the times when access restrictions apply;
    (6) Clearly mark all restricted areas and indicate that access to
the area is restricted and that unauthorized presence within the area
constitutes a breach of security;
    (7) Control the entry, parking, loading and unloading of vehicles;
    (8) Control the movement and storage of cargo and vessel stores;
and
    (9) Control unaccompanied baggage or personal effects.
    (d) MARSEC Level 1. At MARSEC Level 1, the facility owner or
operator must ensure the implementation of security measures to prevent
unauthorized access or activities within the area. These security
measures may include:
    (1) Restricting access to only authorized personnel;
    (2) Securing all access points not actively used and providing
physical

[[Page 39328]]

barriers to impede movement through the remaining access points;
    (3) Assigning personnel to control access to restricted areas;
    (4) Verifying the identification and authorization of all persons
and all vehicles seeking entry;
    (5) Patrolling or monitoring the perimeter of restricted areas;
    (6) Using security personnel, automatic intrusion detection
devices, surveillance equipment, or surveillance systems to detect
unauthorized entry or movement within restricted areas;
    (7) Directing the parking, loading, and unloading of vehicles
within a restricted area;
    (8) Controlling unaccompanied baggage and or personal effects after
screening;
    (9) Designating restricted areas for performing inspections of
cargo and vessel stores while awaiting loading; and
    (10) Designating temporary restricted areas to accommodate facility
operations. If temporary restricted areas are designated, the FSP must
include a requirement to conduct a security sweep of the designated
temporary restricted area both before and after the area has been
established.
    (e) MARSEC Level 2. In addition to the security measures required
for MARSEC Level 1 in this section, at MARSEC Level 2, the facility
owner or operator must also ensure the implementation of additional
security measures, as specified for MARSEC Level 2 in their approved
FSP. These additional security measures may include:
    (1) Increasing the intensity and frequency of monitoring and access
controls on existing restricted access areas;
    (2) Enhancing the effectiveness of the barriers or fencing
surrounding restricted areas, by the use of patrols or automatic
intrusion detection devices;
    (3) Reducing the number of access points to restricted areas, and
enhancing the controls applied at the remaining accesses;
    (4) Restricting parking adjacent to vessels;
    (5) Further restricting access to the restricted areas and
movements and storage within them;
    (6) Using continuously monitored and recorded surveillance
equipment;
    (7) Enhancing the number and frequency of patrols, including
waterborne patrols undertaken on the boundaries of the restricted areas
and within the areas; or
    (8) Establishing and restricting access to areas adjacent to the
restricted areas.
    (f) MARSEC Level 3. In addition to the security measures required
for MARSEC Level 1 and MARSEC Level 2, at MARSEC Level 3, the facility
owner or operator must ensure the implementation of additional security
measures, as specified for MARSEC Level 3 in their approved FSP. These
additional security measures may include:
    (1) Restricting access to additional areas;
    (2) Prohibiting access to restricted areas, or
    (3) Searching restricted areas as part of a security sweep of all
or part of the facility.

Sec.  105.265  Security measures for handling cargo.

    (a) General. The facility owner or operator must ensure that
security measures relating to cargo handling, some of which may have to
be applied in liaison with the vessel, are implemented in order to:
    (1) Deter tampering;
    (2) Prevent cargo that is not meant for carriage from being
accepted and stored at the facility;
    (3) Identify cargo that is approved for loading onto vessels
interfacing with the facility;
    (4) Include cargo control procedures at access points to the
facility;
    (5) Identify cargo that is accepted for temporary storage in a
restricted area while awaiting loading or pick up;
    (6) Restrict the entry of cargo to the facility that does not have
a confirmed date for loading, as appropriate;
    (7) Ensure the release of cargo only to the carrier specified in
the cargo documentation;
    (8) Coordinate security measures with the shipper or other
responsible party in accordance with an established agreement and
procedures;
    (9) Create, update, and maintain a continuous inventory, including
location, of all dangerous goods or hazardous substances from receipt
to delivery within the facility, giving the location of those dangerous
goods or hazardous substances; and
    (10) Be able to check cargo entering the facility for dangerous
substances and devices at the rate specified in the approved Facility
Security Plan (FSP). Means to check cargo include:
    (i) Visual examination;
    (ii) Physical examination;
    (iii) Detection devices, such as scanners; or
    (iv) Canines.
    (b) MARSEC Level 1. At MARSEC Level 1, the facility owner or
operator must ensure the implementation of measures to:
    (1) Routinely check cargo, cargo transport units, and cargo storage
areas within the facility prior to, and during, cargo handling
operations to deter tampering;
    (2) Check that cargo, containers, or other cargo transport units
entering the facility match the delivery note or equivalent cargo
documentation;
    (3) Screen vehicles; and
    (4) Check seals and other methods used to prevent tampering upon
entering the facility and upon storage within the facility.
    (c) MARSEC Level 2. In addition to the security measures required
for MARSEC Level 1 in this section, at MARSEC Level 2, the facility
owner or operator must also ensure the implementation of additional
security measures, as specified for MARSEC Level 2 in the approved FSP.
These additional security measures may include:
    (1) Conducting check of cargo, containers or other cargo transport
units, and cargo storage areas within the port facility for dangerous
substances and devices to the facility and vessel;
    (2) Intensifying checks, as appropriate, to ensure that only the
documented cargo enters the facility, is temporarily stored there, and
then loaded onto the vessel;
    (3) Intensifying the screening of vehicles;
    (4) Increasing frequency and detail in checking of seals and other
methods used to prevent tampering;
    (5) Segregating inbound cargo, outbound cargo, and vessel stores;
    (6) Increasing the frequency and intensity of visual and physical
inspections; or
    (7) Limiting the number of locations where dangerous goods and
hazardous substances, including certain dangerous cargoes, can be
stored.
    (d) MARSEC Level 3. In addition to the security measures required
for MARSEC Level 1 and MARSEC Level 2, at MARSEC Level 3, the facility
owner or operator must ensure the implementation of additional security
measures, as specified for MARSEC Level 3 in the approved FSP. These
additional security measures may include:
    (1) Restricting or suspending cargo movements or operations within
all or part of the facility or specific vessels;
    (2) Being prepared to cooperate with responders and vessels; or
    (3) Verifying the inventory and location of any dangerous goods and
hazardous substances, including certain dangerous cargoes, held within
the facility and their location.

Sec.  105.270  Security measures for delivery of vessel stores and
bunkers.

    (a) General. The facility owner or operator must ensure that
security

[[Page 39329]]

measures relating to the delivery of vessel stores and bunkers are
implemented to:
    (1) Check vessel stores for package integrity;
    (2) Prevent vessel stores from being accepted without inspection;
    (3) Deter tampering;
    (4) For vessels that routinely use a facility, establish and
execute standing arrangements between the vessel, its suppliers, and a
facility regarding notification and the timing of deliveries and their
documentation; and
    (5) Check vessel stores by the following means:
    (i) Visual examination;
    (ii) Physical examination;
    (iii) Detection devices, such as scanners; or
    (iv) Canines.
    (b) MARSEC Level 1. At MARSEC Level 1, the facility owner or
operator must ensure the implementation of measures to:
    (1) Screen vessel stores at the rate specified in the approved
Facility Security Plan (FSP);
    (2) Require advance notification of vessel stores or bunkers
delivery, including a list of stores, delivery vehicle driver
information, and vehicle registration information;
    (3) Screen delivery vehicles at the frequencies specified in the
approved FSP; and
    (4) Escort delivery vehicles within the facility at the rate
specified by the approved FSP.
    (c) MARSEC Level 2. In addition to the security measures required
for MARSEC Level 1 in this section, at MARSEC Level 2, the facility
owner or operator must also ensure the implementation of additional
security measures, as specified for MARSEC Level 2 in the approved FSP.
These additional security measures may include:
    (1) Detailed screening of vessel stores;
    (2) Detailed screening of all delivery vehicles;
    (3) Coordinating with vessel personnel to check the order against
the delivery note prior to entry to the facility;
    (4) Ensuring delivery vehicles are escorted within the facility; or
    (5) Restricting or prohibiting the entry of vessel stores that will
not leave the facility within a specified period.
    (d) MARSEC Level 3. In addition to the security measures for MARSEC
Level 1 and MARSEC Level 2, at MARSEC Level 3, the facility owner and
operator must ensure implementation of additional security measures, as
specified for MARSEC Level 3 in the approved FSP. Examples of these
additional security measures may include:
    (1) Checking all vessel stores more extensively;
    (2) Restricting or suspending delivery of vessel stores; or
    (3) Refusing to accept vessel stores on the facility.

Sec.  105.275  Security measures for monitoring.

    (a) General. The facility owner or operator must ensure the
implementation of security measures in this section and have the
capability to continuously monitor, through a combination of lighting,
security guards, waterborne patrols, and automatic intrusion-detection
devices, or surveillance equipment, as specified in the approved
Facility Security Plan (FSP), the:
    (1) Facility and its approaches, on land and water;
    (2) Restricted areas within the facility; and
    (3) Vessels at the facility and areas surrounding the vessels.
    (b) MARSEC Level 1. At MARSEC Level 1, the facility owner or
operator must ensure the security measures in this section are
implemented at all times, including the period from sunset to sunrise
and periods of limited visibility. For each facility, ensure monitoring
capability that:
    (1) When automatic intrusion-detection devices are used, activates
an audible or visual alarm, or both, at a location that is continuously
attended or monitored;
    (2) Is able to function continually, including consideration of the
possible effects of weather or of a power disruption;
    (3) Monitors the facility area, including shore and waterside
access to it;
    (4) Monitors access points, barriers and restricted areas;
    (5) Monitors access and movements adjacent to vessels using the
facility, including augmentation of lighting provided by the vessel
itself; and
    (6) Limits lighting effects, such as glare, and their impact on
safety, navigation, and other security activities.
    (c) MARSEC Level 2. In addition to the security measures for MARSEC
Level 1 in this section, at MARSEC Level 2, the facility owner or
operator must also ensure the implementation of additional security
measures, as specified for MARSEC Level 2 in the approved FSP. These
additional measures may include:
    (1) Increasing the coverage and intensity of surveillance
equipment, including the provision of additional surveillance coverage;
    (2) Increasing the frequency of foot, vehicle or waterborne
patrols;
    (3) Assigning additional security personnel to monitor and patrol;
or
    (4) Increasing the coverage and intensity of lighting, including
the provision of additional lighting and coverage.
    (d) MARSEC Level 3. In addition to the security measures for MARSEC
Level 1 and MARSEC Level 2, at MARSEC Level 3, the facility owner or
operator must also ensure implementation of additional security
measures, as specified for MARSEC Level 3 in the approved FSP. These
additional security measures may include:
    (1) Switching on all lighting within, or illuminating the vicinity
of, the facility;
    (2) Switching on all surveillance equipment capable of recording
activities within or adjacent to the facility;
    (3) Maximizing the length of time such surveillance equipment can
continue to record; or
    (4) Complying with the instructions issued by those responding to
the security incident.

Sec.  105.280  Security incident procedures.

    For each MARSEC Level, the facility owner or operator must ensure
the Facility Security Officer and facility security personnel are able
to:
    (a) Respond to security threats or breaches of security and
maintain critical facility and vessel-to-facility interface operations;
    (b) Evacuate the facility in case of security threats or breaches
of security;
    (c) Report security incidents as required in Sec.  101.305 of this
subchapter;
    (d) Brief all facility personnel on possible threats and the need
for vigilance, soliciting their assistance in reporting suspicious
persons, objects, or activities; and
    (e) Secure non-critical operations in order to focus response on
critical operations.

Sec.  105.285  Additional requirements-passenger and ferry facilities.

    (a) At MARSEC Level 1, the owner or operator of a passenger or
ferry facility must ensure, in coordination with a vessel moored at the
facility, that the following security measures are implemented in
addition to the requirements of this part:
    (1) In a facility with no public access area designated under Sec.
105.106, establish separate areas to segregate unchecked persons and
personal effects from checked persons and personal effects;
    (2) Ensure that a defined percentage of vehicles to be loaded
aboard are

[[Page 39330]]

screened prior to loading, in accordance with a MARSEC Directive or
other orders issued by the Coast Guard;
    (3) Ensure that all unaccompanied vehicles to be loaded on
passenger vessels are screened prior to loading;
    (4) Deny passenger access to restricted areas unless supervised by
facility security personnel; and
    (5) In a facility with a public access area designated under Sec.
105.106, provide sufficient security personnel to monitor all persons
within the area and conduct screening of persons and personal effects,
as needed.
    (b) At MARSEC Level 2, in addition to the requirements for MARSEC
Level 1, the owner or operator of a passenger or ferry facility with no
public access area designated under Sec.  105.106 must ensure screening
of additional passengers, baggage, and vehicles prior to boarding the
vessel as specified in the approved FSP and Declaration of Security.
    (c) At MARSEC Level 3, in addition to the requirements for MARSEC
Level 1 and MARSEC Level 2 and in coordination with the vessel moored
at the facility, the owner or operator of a passenger or ferry facility
with no public access area designated under Sec.  105.106 must ensure
the following security measures:
    (1) Screen and identify all persons;
    (2) Screen all baggage; and
    (3) Assign additional security personnel and patrols.

Sec.  105.290  Additional requirements-cruise ship terminals.

    At all MARSEC Levels, in coordination with a vessel moored at the
facility, the facility owner or operator must ensure the following
security measures:
    (a) Screen all persons, baggage, and personal effects for dangerous
substances and devices;
    (b) Check the identification of all persons seeking to board the
vessel. This includes confirming the reason for boarding by examining
joining instructions, passenger tickets, boarding passes, government
identification or visitor badges, or work orders;
    (c) Designate holding, waiting, or embarkation areas to segregate
screened persons and their personal effects awaiting embarkation from
unscreened persons and their personal effects;
    (d) Provide additional security personnel to designated holding,
waiting, or embarkation areas; and
    (e) Deny passenger access to restricted areas unless supervised by
facility security personnel.

Sec.  105.295  Additional requirements-Certain Dangerous Cargo (CDC)
facilities.

    (a) At all MARSEC Levels, owners or operators of CDC facilities
must ensure the implementation of the following security measures in
addition to the requirements of this part:
    (1) Escort all visitors, contractors, vendors, and other non-
facility employees at all times while on the facility, if access
identification is not provided. Escort provisions do not apply to
prearranged cargo deliveries;
    (2) Control the parking, loading, and unloading of vehicles within
a facility;
    (3) Require security personnel to record or report their presence
at key points during their patrols;
    (4) Search unmanned or unmonitored waterfront areas for dangerous
substances and devices prior to a vessel's arrival at the facility; and
    (5) Provide an alternate or independent power source for security
and communications systems.
    (b) At MARSEC Level 2, in addition to the requirements for MARSEC
Level 1, owners or operators of CDC facilities must ensure the
implementation of the following security measures:
    (1) Release cargo only in the presence of the Facility Security
Officer (FSO) or a designated representative of the FSO; and
    (2) Continuously guard or patrol restricted areas.
    (c) At MARSEC Level 3, in addition to the requirements for MARSEC
Level 1 and MARSEC Level 2, owners or operators of CDC facilities must
ensure the facilities are continuously guarded and restricted areas are
patrolled.

Sec.  105.296  Additional requirements-barge fleeting facilities.

    (a) At MARSEC Level 1, in addition to the requirements of this
part, an owner or operator of a barge fleeting facility must ensure the
implementation of the following security measures:
    (1) Designate an area within the fleeting facility to segregate
those barges carrying Certain Dangerous Cargoes and cargoes listed in
46 CFR, subchapters D and O of chapter I, title 46, Code of Federal
Regulations or Certain Dangerous Cargoes from all other barges in the
fleeting facility;
    (2) Maintain a current list of vessels and cargoes in the
designated restricted area; and
    (3) Ensure that at least one towing vessel is available to service
the fleeting facility for every 100 barges within the facility.
    (b) At MARSEC Level 2, in addition to the requirements of this part
and MARSEC Level 1 requirements, an owner or operator of a barge
fleeting facility must ensure security personnel are assigned to
monitor or patrol the designated restricted area within the barge
fleeting facility.
    (c) At MARSEC Level 3, in addition to the requirements of this part
and MARSEC Level 2 requirements, an owner or operator of a barge
fleeting facility must ensure that both land and waterside perimeters
of the designated restricted area within the barge fleeting facility
are continuously monitored or patrolled.

Subpart C--Facility Security Assessment (FSA)

Sec.  105.300  General.

    (a) The Facility Security Assessment (FSA) is a written document
that is based on the collection of background information, the
completion of an on-scene survey and an analysis of that information.
    (b) A common FSA may be conducted for more than one similar
facility provided the FSA reflects any facility-specific
characteristics that are unique.
    (c) Third parties may be used in any aspect of the FSA if they have
the appropriate skills and if the Facility Security Officer (FSO)
reviews and accepts their work.
    (d) Those involved in a FSA must be able to draw upon expert
assistance in the following areas, as appropriate:
    (1) Knowledge of current security threats and patterns;
    (2) Recognition and detection of dangerous substances and devices;
    (3) Recognition of characteristics and behavioral patterns of
persons who are likely to threaten security;
    (4) Techniques used to circumvent security measures;
    (5) Methods used to cause a security incident;
    (6) Effects of dangerous substances and devices on structures and
facility services;
    (7) Facility security requirements;
    (8) Facility and vessel interface business practices;
    (9) Contingency planning, emergency preparedness, and response;
    (10) Physical security requirements;
    (11) Radio and telecommunications systems, including computer
systems and networks;
    (12) Marine or civil engineering; and
    (13) Facility and vessel operations.

Sec.  105.305  Facility Security Assessment (FSA) requirements.

    (a) Background. The facility owner or operator must ensure that the
following background information, if applicable, is provided to the
person or persons who will conduct the assessment:

[[Page 39331]]

    (1) The general layout of the facility, including:
    (i) The location of each active and inactive access point to the
facility;
    (ii) The number, reliability, and security duties of facility
personnel;
    (iii) Security doors, barriers, and lighting;
    (iv) The location of restricted areas;
    (v) The emergency and stand-by equipment available to maintain
essential services;
    (vi) The maintenance equipment, cargo spaces, storage areas, and
unaccompanied baggage storage;
    (vii) Location of escape and evacuation routes and assembly
stations; and
    (viii) Existing security and safety equipment for protection of
personnel and visitors;
    (2) Response procedures for fire or other emergency conditions;
    (3) Procedures for monitoring facility and vessel personnel,
vendors, repair technicians, and dock workers;
    (4) Existing contracts with private security companies and existing
agreements with local or municipal agencies;
    (5) Procedures for controlling keys and other access prevention
systems;
    (6) Procedures for cargo and vessel stores operations;
    (7) Response capability to security incidents;
    (8) Threat assessments, including the purpose and methodology of
the assessment, for the port in which the facility is located or at
which passengers embark or disembark;
    (9) Previous reports on security needs; and
    (10) Any other existing security procedures and systems, equipment,
communications, and facility personnel.
    (b) On-scene survey. The facility owner or operator must ensure
that an on-scene survey of each facility is conducted. The on-scene
survey examines and evaluates existing facility protective measures,
procedures, and operations to verify or collect the information
required in paragraph (a) of this section.
    (c) Analysis and recommendations. In conducting the FSA, the
facility owner or operator must ensure that the FSO analyzes the
facility background information and the on-scene survey, and
considering the requirements of this part, provides recommendations to
establish and prioritize the security measures that should be included
in the FSP. The analysis must consider:
    (1) Each vulnerability found during the on-scene survey including
but not limited to:
    (i) Waterside and shore-side access to the facility and vessel
berthing at the facility;
    (ii) Structural integrity of the piers, facilities, and associated
structures;
    (iii) Existing security measures and procedures, including
identification systems;
    (iv) Existing security measures and procedures relating to services
and utilities;
    (v) Measures to protect radio and telecommunication equipment,
including computer systems and networks;
    (vi) Adjacent areas that may be exploited during or for an attack;
    (vii) Areas that may, if damaged or used for illicit observation,
pose a risk to people, property, or operations within the facility;
    (viii) Existing agreements with private security companies
providing waterside and shore-side security services;
    (ix) Any conflicting policies between safety and security measures
and procedures;
    (x) Any conflicting facility operations and security duty
assignments;
    (xi) Any enforcement and personnel constraints;
    (xii) Any deficiencies identified during daily operations or
training and drills; and
    (xiii) Any deficiencies identified following security incidents or
alerts, the report of security concerns, the exercise of control
measures, or audits;
    (2) Possible security threats, including but not limited to:
    (i) Damage to or destruction of the facility or of a vessel moored
at the facility;
    (ii) Hijacking or seizure of a vessel moored at the facility or of
persons on board;
    (iii) Tampering with cargo, essential equipment or systems, or
stores of a vessel moored at the facility;
    (iv) Unauthorized access or use including the presence of
stowaways;
    (v) Smuggling dangerous substances and devices to the facility;
    (vi) Use of a vessel moored at the facility to carry those
intending to cause a security incident and their equipment;
    (vii) Use of a vessel moored at the facility as a weapon or as a
means to cause damage or destruction;
    (viii) Blockage of entrances, locks, and approaches; and
    (ix) Nuclear, biological, radiological, explosive, and chemical
attack;
    (3) Threat assessments by Government agencies;
    (4) Vulnerabilities, including human factors, in the facility's
infrastructure, policies and procedures;
    (5) Any particular aspects of the facility, including the vessels
using the facility, which make it likely to be the target of an attack;
    (6) Likely consequences in terms of loss of life, damage to
property, and economic disruption, including disruption to
transportation systems, of an attack on or at the facility; and
    (7) Locations where access restrictions or prohibitions will be
applied for each MARSEC Level.
    (d) FSA report. (1) The facility owner or operator must ensure that
a written FSA report is prepared and included as part of the FSP. The
report must contain:
    (i) A summary of how the on-scene survey was conducted;
    (ii) A description of existing security measures, including
inspection, control and monitoring equipment, personnel identification
documents and communication, alarm, lighting, access control, and
similar systems;
    (iii) A description of each vulnerability found during the on-scene
survey;
    (iv) A description of security measures that could be used to
address each vulnerability;
    (v) A list of the key facility operations that are important to
protect; and
    (vi) A list of identified weaknesses, including human factors, in
the infrastructure, policies, and procedures of the facility.
    (2) A FSA report must describe the following elements within the
facility:
    (i) Physical security;
    (ii) Structural integrity;
    (iii) Personnel protection systems;
    (iv) Procedural policies;
    (v) Radio and telecommunication systems, including computer systems
and networks;
    (vi) Relevant transportation infrastructure; and
    (vii) Utilities.

Sec.  105.310  Submission requirements.

    (a) A completed FSA report must be submitted with the Facility
Security Plan required in Sec.  105.415 of this part.
    (b) A facility owner or operator may generate and submit a report
that contains the Facility Security Assessment for more than one
facility subject to this part, to the extent that they share
similarities in design and operations, if authorized and approved by
the cognizant COTP.

Subpart D--Facility Security Plan (FSP)

Sec.  5.400  General.

    (a) The Facility Security Officer (FSO) must ensure a Facility
Security Plan (FSP) is developed and implemented for each facility for
which he or she is designated as FSO. The FSP:

[[Page 39332]]

    (1) Must identify the FSO by name and position, and provide 24-hour
contact information;
    (2) Must be written in English;
    (3) Must address each vulnerability identified in the Facility
Security Assessment (FSA);
    (4) Must describe security measures for each MARSEC Level; and
    (5) May cover more than one facility to the extent that they share
similarities in design and operations, if authorized and approved by
the cognizant COTP.
    (b) The FSP must be submitted for approval to the cognizant COTP in
a written or electronic format. Format for submitting the FSP
electronically can be found at http://www.uscg.mil/HQ/MSC.
    (c) The FSP is sensitive security information and must be protected
in accordance with 49 CFR part 1520.
    (d) If the FSP is kept in an electronic format, procedures must be
in place to prevent its unauthorized deletion, destruction, or
amendment.

Sec.  105.405  Format and content of the Facility Security Plan (FSP).

    (a) A facility owner or operator must ensure that the FSP consists
of the individual sections listed in this paragraph (a). If the FSP
does not follow the order as it appears in the list, the facility owner
or operator must ensure that the FSP contains an index identifying the
location of each of the following sections:
    (1) Security administration and organization of the facility;
    (2) Personnel training;
    (3) Drills and exercises;
    (4) Records and documentation;
    (5) Response to change in MARSEC Level;
    (6) Procedures for interfacing with vessels;
    (7) Declaration of Security (DoS);
    (8) Communications;
    (9) Security systems and equipment maintenance;
    (10) Security measures for access control, including designated
public access areas;
    (11) Security measures for restricted areas;
    (12) Security measures for handling cargo;
    (13) Security measures for delivery of vessel stores and bunkers;
    (14) Security measures for monitoring;
    (15) Security incident procedures;
    (16) Audits and security plan amendments;
    (17) Facility Security Assessment (FSA) report; and
    (18) Facility Vulnerability and Security Measures Summary (Form CG-
6025) in appendix A to part 105-Facility Vulnerability and Security
Measures Summary (CG-6025).
    (b) The facility owner or operator must ensure that the FSP
describes in detail how each of the individual requirements of subpart
B of this part will be met.
    (c) The Facility Vulnerability and Security Measures Summary (Form
CG-6025) must be completed using information in the FSA concerning
identified vulnerabilities and information in the FSP concerning
security measures in mitigation of these vulnerabilities.

Sec.  105.410  Submission and approval.

    (a) On or before December 29, 2003, each facility owner or operator
must either:
    (1) Submit one copy of their Facility Security Plan (FSP) for
review and approval to the cognizant COTP; or
    (2) If implementing a Coast Guard approved Alternative Security
Program, meet the requirements in Sec.  101.120(b) of this subchapter.
    (b) Facilities constructed on or after July 1, 2004, must comply
with the requirements in paragraph (a) of this section 60 days prior to
beginning operations.
    (c) The cognizant COTP will examine each submission for compliance
with this part and either:
    (1) Approve it and specify any conditions of approval, returning to
the submitter a letter stating its acceptance and any conditions, or
    (2) Disapprove it, returning a copy to the submitter with a brief
statement of the reasons for disapproval.
    (d) An FSP may be submitted and approved to cover more than one
facility where they share similarities in design and operations, if
authorized and approved by the cognizant COTP.
    (e) Each facility owner or operator that submits one FSP to cover
two or more facilities of similar design and operation must address
facility-specific information that includes the design and operational
characteristics of each facility and must complete a separate Facility
Vulnerability and Security Measures Summary (Form CG-6025), in appendix
A to part 105--Facility Vulnerability and Security Measures Summary
(CG-6025), for each facility covered by the plan.
    (f) A FSP that is approved by the cognizant COTP is valid for five
years from the date of its approval.

Sec.  105.415  Amendment and audit.

    (a) Amendments. (1) Amendments to a FSP that is approved by the
cognizant COTP may be initiated by:
    (i) The facility owner or operator; or
    (ii) The cognizant COTP upon a determination that an amendment is
needed to maintain the facility's security. The cognizant COTP, who
will give the facility owner or operator written notice and request
that the facility owner or operator propose amendments addressing any
matters specified in the notice. The facility owner or operator will
have at least 60 days to submit its proposed amendments. Until
amendments are approved, the facility owner or operator shall ensure
temporary security measures are implemented to the satisfaction of the
COTP.
    (2) Proposed amendments must be submitted to the cognizant COTP. If
initiated by the facility owner or operator, the proposed amendment
must be submitted at least 30 days before the amendment is to take
effect unless the cognizant COTP allows a shorter period. The cognizant
COTP will approve or disapprove the proposed amendment in accordance
with Sec.  105.415 of this subpart.
    (3) If there is a change in the owner or operator, the Facility
Security Officer (FSO) must amend the Facility Security Plan (FSP) to
include the name and contact information of the new facility owner or
operator and submit the affected portion of the FSP for review and
approval in accordance with Sec.  105.415 if this subpart.
    (b) Audits. (1) The FSO must ensure an audit of the FSP is
performed annually, beginning no later than one year from the initial
date of approval, and attach a letter to the FSP certifying that the
FSP meets the applicable requirements of this part.
    (2) The FSP must be audited if there is a change in the facility's
ownership or operator, or if there have been modifications to the
facility, including but not limited to physical structure, emergency
response procedures, security measures, or operations.
    (3) Auditing the FSP as a result of modifications to the facility
may be limited to those sections of the FSP affected by the facility
modifications.
    (4) Unless impracticable due to the size and nature of the company
or the facility, personnel conducting internal audits of the security
measures specified in the FSP or evaluating its implementation must:
    (i) Have knowledge of methods for conducting audits and
inspections, and security, control, and monitoring techniques;
    (ii) Not have regularly assigned security duties; and
    (iii) Be independent of any security measures being audited.
    (5) If the results of an audit require amendment of either the FSA
or FSP, the FSO must submit, in accordance

[[Page 39333]]

with Sec.  105.415 of this subpart, the amendments to the cognizant
COTP for review and approval no later than 30 days after completion of
the audit and a letter certifying that the amended FSP meets the
applicable requirements of this part.

Appendix A to Part 105--Facility Vulnerability and Security Measures
Summary (Form CG-6025)

BILLING CODE 4910-15-P

[[Page 39334]]

[Image]

[[Page 39335]]

[Image]

[[Page 39336]]

[Image]

[[Page 39337]]

[Image]

[[Page 39338]]

[FR Doc. 03-16189 Filed 6-27-03; 8:45 am]

BILLING CODE 4910-15-C

[Federal Register: July 1, 2003 (Volume 68, Number 126)] [Rules and Regulations]
[Page 39338-39353]
From the Federal Register Online via GPO Access [wais.access.gpo.gov]
[DOCID:fr01jy03-18]

-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

Coast Guard

33 CFR Part 106

[USCG-2003-14759]
RIN 1625-AA68


Outer Continental Shelf Facility Security

AGENCY: Coast Guard, DHS.

ACTION: Temporary interim rule with request for comments and notice of
meeting.

-----------------------------------------------------------------------

SUMMARY: This interim rule provides security measures for mobile
offshore drilling units (MODUs) not subject to the International
Convention for the Safety of Life at Sea, 1974, (SOLAS) and certain
fixed and floating facilities on the Outer Continental Shelf (OCS)
other than deepwater ports. For the purpose of this part, non-SOLAS
MODUs and certain fixed and floating facilities on the OCS are
collectively referred to as OCS facilities. This rule requires the
owners or operators of OCS facilities to designate security officers,
develop security plans based on security assessments, implement
security measures specific to the OCS facility's operation and comply
with Maritime Security Levels. This interim rule is one of six interim
rules in today's Federal Register that comprise a new subchapter on the
requirements for maritime security mandated by the Maritime
Transportation Security Act of 2002. These six interim rules implement
national maritime security initiatives concerning General Provisions,
Area Maritime Security (ports), Vessels, Facilities, OCS Facilities,
and the Automatic Identification System. Where appropriate, they align
these domestic maritime security requirements with those of the
International Ship and Port Facility Security (ISPS) Code and recent
amendments to SOLAS. This interim rule will benefit persons and
property by requiring security plans and procedures to prevent, deter,
detect, and respond to incidents that threaten the security of OCS
facilities. To best understand these rules, first read the one titled
``Implementation of National Maritime Security Initiatives'' (USCG-
2003-14792).

DATES: Effective date. This interim rule is effective from July 1, 2003
until November 25, 2003.
    Comments. Comments and related material must reach the Docket
Management Facility on or before July 31, 2003. Comments on collection
of information sent to the Office of Management and Budget (OMB) must
reach OMB on or before July 31, 2003.
    Meeting. A public meeting will be held on July 23, 2003, from 9
a.m. to 5 p.m., in Washington, DC.

ADDRESSES: Comments. To make sure that your comments and related
material are not entered more than once in the docket, please submit
them by only one of the following means:
    (1) Electronically to the Docket Management System Web site at
http://dms.dot.gov;
    (2) By mail to the Docket Management Facility (USCG-2003-14759),
U.S. Department of Transportation, room PL-401, 400 Seventh Street SW.,
Washington, DC 20590-0001;
    (3) By fax to the Docket Management Facility at 202-493-2251; or
    (4) By delivery to room PL-401 on the Plaza level of the Nassif
Building, 400 Seventh Street SW., Washington, DC, between 9 a.m. and 5
p.m., Monday through Friday, except Federal holidays. The telephone
number is 202-366-9329.
    You must also mail comments on collection of information to the
Office of Information and Regulatory Affairs, Office of Management and
Budget, 725 17th Street NW., Washington, DC 20503, ATTN: Desk Officer,
U.S. Coast Guard.
    Meeting. A public meeting will be held on July 23, 2003, in
Washington, DC, at the Grand Hyatt Washington, DC 1000 H Street, NW.,
Washington, DC 20001.
    Availability. Electronic forms of all comments received into any of
our dockets can be searched by the name of the individual submitting
the comment (or signing the comment, if submitted on behalf of an
association, business, labor unit, etc.) and is open to the public
without restriction. You may also review the Department of
Transportation's complete Privacy Act Statement published in the
Federal Register on April 11, 2000 (65 FR 19477-78), or you may visit
http://dms.dot.gov/.

FOR FURTHER INFORMATION CONTACT: If you have questions on this rule,
call Lieutenant Greg Versaw by telephone 202-267-1103, toll-free
telephone 1-800-842-8740 ext. 7-1103, or electronic mail
msregs@comdt.uscg.mil. If you have questions on viewing or submitting
material to the docket, call Ms. Dorothy Beard, Chief, Dockets,
Department of Transportation, telephone 202-366-5149.

SUPPLEMENTARY INFORMATION: Due to the short timeframe given to
implement these National Maritime Transportation Security initiatives,
as directed by the Maritime Transportation Security Act (MTSA) of 2002
(MTSA, Pub. L. 107-295, 116 STAT. 2064), and to ensure all comments are
in the public venue for these important rulemakings, we are not
accepting comments containing protected information for these interim
rules. We request you submit comments, as explained in the Request for
Comments section below, and discuss your concerns or support in a
manner that is not security sensitive. We also request that you not
submit proprietary information as part of your comment.
    The Docket Management Facility maintains the public docket for this
rulemaking. Comments and material received from the public, as well as
documents mentioned in this preamble as being available in the docket,
will be available for inspection or copying at room PL-401 on the Plaza
level of the Nassif Building, 400 Seventh Street SW., Washington, DC,
between 9 a.m. and 5 p.m., Monday through Friday, except Federal
holidays. You may also find this docket on the Internet at http://dms.dot.gov
.

Request for Comments

    We encourage you to participate in this rulemaking by submitting
comments and related material. Your comments will be considered for the
final rule we plan to issue before November 25, 2003, to replace this
interim rule. If you choose to comment on this rule, please include
your name and address, identify the specific docket number for this
interim rule (USCG-2003-14759), indicate the specific heading of this
document to which each comment applies, and give the reason for each
comment. You may submit your comments and material by mail, hand
delivery, fax, or electronic means to the Docket Management Facility at
the address under ADDRESSES. Please submit your comments and material
by only one means. If you submit them by mail or hand delivery, submit
them in an unbound format, no larger than 8\1/2\ by 11 inches, suitable
for copying and electronic filing. If you submit them by mail and would
like to know that they reached the Facility, please enclose a stamped,
self-addressed postcard or envelope. We will consider all comments and
material received during the comment period. We may change this interim
rule in view of them.

Public Meeting

    We will hold a public meeting on July 23, 2003, in Washington, DC
at the

[[Page 39339]]

Grand Hyatt Hotel, at the address listed under ADDRESSES. The meeting
will be from 9 a.m. to 5 p.m. to discuss all of the maritime security
interim rules, and the Automatic Identification System (AIS) interim
rule found in today's Federal Register. In addition, you may submit a
request for other public meetings to the Docket Management Facility at
the address under ADDRESSES explaining why another one would be
beneficial. If we determine that other meetings would aid this
rulemaking, we will hold them at a time and place announced by a later
notice in the Federal Register.

Regulatory Information

    We did not publish a notice of proposed rulemaking (NPRM) for this
rulemaking and are making this interim rule effective upon publication.
Section 102(d)(1) of the MTSA requires the publication of an interim
rule as soon as practicable without regard to the provisions of chapter
5 of title 5, U.S. Code (Administrative Procedure Act). The Coast Guard
finds that harmonization of U.S. regulations with maritime security
measures adopted by the International Maritime Organization (IMO) in
December 2002, and the need to institute measures for the protection of
U.S. maritime security as soon as practicable, furnish good cause for
this interim rule to take effect immediately under both the
Administrative Procedure Act and section 808 of the Congressional
Review Act.

Background and Purpose

    A summary of the Coast Guard's regulatory initiatives for maritime
security can be found under the Background and Purpose section in the
preamble to the interim rule titled ``Implementation of National
Maritime Security Initiatives'' (USCG-2003-14792) published elsewhere
in today's Federal Register.

Discussion of Comments Addressing OCS Facility Issues in the Notice of
Meeting

    For a discussion of comments on OCS facilities at the public
meetings and in the docket, see the interim rule titled
``Implementation of National Maritime Security Initiatives'' (USCG-
2003-14792) published elsewhere in today's Federal Register.

Discussion of Interim Rule

    This interim rule regulates the owners and operators of OCS
facilities to provide security to these OCS facilities and to other
vessels with which an OCS facility interfaces. The interim rule adds
new 33 CFR part 106, OCS Facility Security, as part of 33 CFR, Chapter
I, subchapter H, Maritime Security. A general description of the
process used in developing subchapter H and its component parts appears
in the interim rule titled ``Implementation of National Maritime
Security Initiatives'' (USCG-2003-14792).
    This interim rule applies to Certificated Mobile Offshore Drilling
Units (MODUs) that are not subject to International Convention for
Safety of Life at Sea, 1974, (SOLAS) and fixed or floating platforms
operating on the Outer Continental Shelf that host more than 150
persons for 12 hours or more during each 24-hour period continuously
for 30 days or more, or produce more than 100,000 barrels of oil per
day, and/or produce more than 200 million cubic feet of natural gas per
day. OCS facilities that do not meet these characteristics may still be
required to conduct a Facility Security Assessment, develop a Facility
Security Plan, and implement certain security measures if the cognizant
Coast Guard District Commander makes that determination. That
determination is made on a case-by-case basis, based upon unique local
conditions, specific intelligence information, or other identifiable
and articulable risk factors that confirm such actions are necessary
and appropriate to ensure an adequate level of security. This
requirement would be issued in a Maritime Security Directive. This
interim rule does not apply to deepwater ports.
    The MTSA and the International Ship and Port Facility Security
(ISPS) Code use different terms to define similar, if not identical,
persons or things. These differing terms sometimes match up with the
terms used in subchapter H, but sometimes they do not. For a table of
the terms used in subchapter H and their related terms in the MTSA and
the ISPS Code, see the Discussion of Interim Rule section in the
preamble for the interim rule titled ``Implementation of National
Maritime Security Initiatives'' (USCG-2003-14792), published elsewhere
in today's Federal Register.
    The purpose of this rulemaking is to require certain OCS facilities
to perform security assessments, develop security plans, and implement
security measures and procedures to reduce the risk of and to mitigate
the results of an act that threatens the security of the OCS facility,
the crew, or the public. This rulemaking combines international
requirements and existing domestic policy, and is published as a part
of a new subchapter on maritime security. The MTSA mandates that OCS
facilities conduct security assessments and develop security plans,
submit these plans within 6 months of publication of this interim rule.
It also mandates that each OCS facility shall be in compliance with its
approved security plans within 12 months of the publication of this
interim rule.
    Part 106 consists of four subparts: subpart A (General), subpart B
(Security Requirements), subpart C (OCS Facility Security Assessment),
and subpart D (OCS Facility Security Plan). The requirements discussed
in part 106 are consistent with similar requirements in parts 104 and
105 of this subchapter. These interim rules include requirements
discussed below.

Waivers

    The waiver section of this interim rule establishes procedures for
OCS facility owners or operators who wish to be relieved of complying
with specific requirements of the interim rule on the grounds that
those requirements are unreasonable or unnecessary.

Equivalents

    The equivalents section of this interim rule establishes procedures
for requesting an equivalency to the requirements of this interim rule.
Equivalencies are intended to allow an OCS facility owner or operator
to provide an alternative provision or arrangement that provides the
same level of security as a specific requirement contained within this
part.

Alternatives

    The alternatives section of this interim rule allows OCS facility
owners or operators to implement an Alternative Security Program that
has been reviewed and accepted by the Commandant (G-MP) to meet the
requirements of this part. An Alternative Security Program must be
comprehensive and must be demonstrated to meet the intent of each
section of this part. Owners or operators are required to implement an
Alternative Security Program in its entirety to be deemed in compliance
with this part.

Appeals

    The appeals section of this interim rule establishes the procedures
for OCS facility owners or operators who are aggrieved by, and wish to
contest, a Coast Guard decision regarding a matter covered by this
interim rule.

Owner or Operator Responsibilities

    The owner or operator of a facility is generally responsible for
all requirements imposed by this part. The owner or operator must:

[[Page 39340]]

    [sbull] Ensure the performance of all OCS facility security duties;
    [sbull] Define the security organizational structure for each OCS
facility and provide each person exercising security duties or
responsibilities within that structure with the support needed to
fulfill those obligations;
    [sbull] Designate, by name or title, a Company Security Officer and
a Facility Security Officer for each OCS facility;
    [sbull] Ensure that a Facility Security Assessment is conducted;
    [sbull] Ensure the development and submission for approval of a
Facility Security Plan.
    [sbull] Ensure that the OCS facility operates in compliance with
the approved Facility Security Plan;
    [sbull] Ensure that adequate coordination of security issues takes
place between the OCS facility and vessels, including the execution of
a Declaration of Security;
    [sbull] Ensure that security communication is readily available;
    [sbull] Ensure coordination with and implementation of changes in
MARSEC Level; and
    [sbull] Ensure all breaches of security and security incidents are
reported.

Company Security Officer (CSO)

    This interim rule requires that each OCS facility owner or operator
appoint a Company Security Officer, designated in writing, for each OCS
facility. The Company Security Officer may be a full-time or collateral
position. A Company Security Officer may perform other duties within
the owner or operator's organization provided he or she is able to
perform the duties and responsibilities required of the Company
Security Officer.
    The Company Security Officer must have a general knowledge in
matters of a range of issues, such as company security administration
and organization, relevant laws and regulations, current security
threats and patterns, risk assessment methodology, and conducting
audits, inspections, and control procedures. The Company Security
Officer may delegate his or her duties, but remains responsible for the
performance of those duties. The duties of the Company Security Officer
include:
    [sbull] Ensuring that a Facility Security Assessment is carried
out;
    [sbull] Ensuring that a Facility Security Plan is developed,
approved, maintained, and implemented;
    [sbull] Ensuring that the Facility Security Plan is modified when
necessary;
    [sbull] Ensuring that OCS facility security activities are audited
and reviewed;
    [sbull] Ensuring the timely correction of problems identified by
audits, reviews, or inspections;
    [sbull] Ensuring adequate security training; and
    [sbull] Ensuring communication and cooperation between the OCS
facility and vessels.

Facility Security Officer (FSO)

    This interim rule requires that the owner or operator of OCS
facilities appoint, and designate in writing, a Facility Security
Officer. The Facility Security Officer may be a full-time or collateral
position. The Facility Security Officer must have a general knowledge
in a range of issues such as security administration and organization,
relevant laws and regulations, current security threats and patterns,
risk assessment methodology, and conducting audits, inspections, and
control procedures. The most important duties a Facility Security
Officer must perform include implementing a Facility Security Plan,
ensuring that adequate training is provided to OCS facility personnel;
ensuring that the OCS facility operates in accordance with the plan and
in continuous compliance with part 106; and periodically auditing and
updating the Facility Security Assessment and Facility Security Plan.
The Facility Security Officer may assign security duties to other OCS
facility personnel; however, the Facility Security Officer remains
responsible for these duties.

Training

    Required training for OCS facility personnel must be specified in
the Facility Security Plan. The Coast Guard will not require specific
security training courses for the Facility Security Officer and OCS
facility personnel. While formal training may be appropriate, we are
not mandating specifics. OCS facility owners or operators must certify
that security personnel are, in fact, properly trained to perform their
duties. The types of training required must also be consistent with the
training requirements described in this part. The Facility Security
Officer is also required to ensure that OCS facility security persons
possess necessary training to maintain the overall security of the OCS
facility.

Drill and Exercise Requirements

    Exercises are required to ensure the adequacy of the Facility
Security Plan and are required to be conducted at least once each
calendar year, with no more than 18 months between exercises. Drills,
which are smaller in scope than exercises, must be conducted at least
every 3 months. Exercises may be OCS facility specific, or as part of a
cooperative exercise program. Exercises for security may be combined
with other required exercises, as appropriate.

Security Systems and Equipment Maintenance

    Procedures and/or policies must be developed and implemented to
ensure security systems and equipment are tested and operated in
accordance with the instructions of the manufacturer and ready for use.

Security Measures

    Security measures for specific activities must be scalable in order
to provide increasing levels of security at increasing MARSEC levels.
An effective security program relies on detailed procedures that
clearly indicate the preparation and prevention activities that will
occur at each threat level and the organizations, or personnel, who are
responsible for carrying out those activities. Security Measures must
be developed for the following activities:
    [sbull] Security measures for access control;
    [sbull] Security measures for restricted areas;
    [sbull] Security measures for delivery of stores and industrial
supplies; and
    [sbull] Security measures for monitoring.

Declaration of Security (DoS)

    This interim rule requires the execution of a Declaration of
Security under certain security conditions. A Declaration of Security
provides a means for ensuring that critical security concerns are
properly addressed prior to a vessel-to-facility interface. Security
must be properly addressed by delineating responsibilities for security
arrangements and procedures between a vessel and the OCS facility. This
obligation is similar to the existing U.S. practice for vessel-to-
facility oil transfer procedures.
    Only certain vessels carrying Certain Dangerous Cargoes, in bulk,
will complete a Declaration of Security for every evolution regardless
of the MARSEC Level. At MARSEC Levels 2 and 3, all vessels and OCS
facilities would need to complete the Declaration of Security.
    OCS facilities that frequently receive the same vessel may execute
a continuing Declaration of Security--a single Declaration of Security
for multiple visits.
    Each Declaration of Security must state the security activities for
which the OCS facility and vessel are responsible during the vessel-to-
facility interface.

[[Page 39341]]

Declarations of Security must be kept as part of the OCS facility's
recordkeeping.

Security Incident Procedures

    Each OCS facility must develop security incident procedures for
responding to security incidents. The security incident procedures must
explain the OCS facility's reaction to an emergency, including the
notification and coordination with local, State, and federal
authorities. The security incident procedures must also explain actions
for securing the OCS facility as well as actions for evacuating
passengers and crew.

Facility Security Assessment (FSA)

    This interim rule requires all appropriate OCS facilities to
complete a Facility Security Assessment, which is an essential part of
the process of developing and updating the required Facility Security
Plan. The Facility Security Assessment is based in part on an on-scene
security survey, which details the overall assessment of the OCS
facility including any existing security measures, and includes a
written report documenting the vulnerabilities and mitigation
strategies of the OCS facility. As discussed in the interim rule
``Implementation of National Maritime Security Initiatives'' (USCG-
2003-14792), 33 CFR 101.510, lists the various assessment tools that
may be used to meet the risk assessment requirements in the parts 104
through 106 of this subchapter. The assessment tools listed are
sufficient to enable the development of the Facility Security Plan.
This list is also provided to ensure that the Facility Security
Assessment is consistent with other modal assessments. We are working
with other agencies to develop assessment tools that are sensitive to
the diversity of the national Marine Transportation System to ensure
consistent levels of security throughout the entire system. The
designated Company Security Officer must conduct the on-scene survey by
examining and evaluating existing OCS facility protective measures,
procedures, and operations. Using the information obtained in the on-
scene survey, the Company Security Officer must ensure the completion
of the Facility Security Assessment. The Facility Security Assessment
identifies and evaluates, in writing, existing security measures; key
OCS facility operations; the likelihood of possible threats to key OCS
facility operations; and weaknesses, including human factors in the
infrastructure, policies, and procedures of the OCS facility.
    The Facility Security Assessment includes, among other things, a
written summary of how the assessment was conducted, each vulnerability
found during the assessment, and countermeasures that could be used to
address each vulnerability. The Facility Security Assessment must be
reviewed and updated each time the Facility Security Plan is revised
and when the Facility Security Plan is submitted for re-approval every
five years

Facility Security Plan

    This interim rule requires each OCS facility owner or operator to
develop an effective security plan that incorporates detailed
preparedness, prevention, and response activities for each MARSEC
Level, along with the organizations or personnel responsible for
carrying out those activities. The requirements discussed in this part
are consistent with the requirements covered in parts 104 and 105 of
this subchapter.
    The Facility Security Plan is a document, written in English that
is prepared in response to the Facility Security Assessment and
approved by the Coast Guard. A single Facility Security Plan may cover
more than one OCS facility to the extent that they share physical
characteristics and operations, if authorized and approved by the
cognizant District Commander.
    In addition to other things, the Facility Security Plan must
respond specifically to any recommendations made by the Facility
Security Assessment; must describe, for each MARSEC Level, how the OCS
facility will apply the security measures required in these
regulations; must detail the organizational structure of security for
the OCS facility; must detail the responsibilities of all OCS facility
personnel with a security duty; must detail the OCS facility's
relationships with the Company, vessels that conduct operations with
the OCS facility, and relevant authorities with a security
responsibility; must provide for regular audit of the FSP and for its
amendment in response to experience or changing circumstances; and must
establish the procedures needed to assess the continuing effectiveness
of security procedures and all security-related equipment and systems,
including procedures for identifying and responding to equipment or
systems failure or malfunction.

Submission and Approval of Security Plan

    The Facility Security Plan, including the Facility Security
Assessment report must, be submitted to and reviewed by the cognizant
District Commander. Once the cognizant District Commander finds that
the plan meets the security requirements in part 106, the submitter
will receive confirmation via an approval letter.
    If the cognizant District Commander requires more time than is
indicated in the requirements of the interim rule to review a submitted
Facility Security Plan, the cognizant District Commander may return to
the submitter a written acknowledgement stating that the Coast Guard is
currently reviewing the Facility Security Plan submitted for approval,
and that the OCS facility may continue to operate so long as the OCS
facility remains in compliance with the submitted Facility Security
Plan.
    If the cognizant District Commander finds that the FSP does not
meet the security requirements, the plan would be returned to the OCS
facility with either an approval letter stating conditions of the
approval, or a disapproval letter along with an explanation of why the
plan does not meet the part 106 requirements.
    Security plans must be reviewed by the Coast Guard every time:
    [sbull] The Facility Security Assessment is altered;
    [sbull] Failures are identified during an exercise of the Facility
Security Plan; and
    [sbull] There is a change in ownership or operational control of
the OCS facility or there are amendments to the Facility Security Plan.

Regulatory Assessment

    This interim rule is a ``significant regulatory action'' under
section 3(f) of Executive Order 12866, Regulatory Planning and Review,
and has been reviewed by the Office of Management and Budget under that
Order. It requires an assessment of potential costs and benefits under
section 6(a)(3) of that Order. It is significant under the regulatory
policies and procedures of the Department of Homeland Security. A
Regulatory Assessment is available in the docket as indicated under
ADDRESSES. A summary of the Assessment follows:

Cost Assessment

    For the purposes of good business practice or regulations
promulgated by other Federal and State agencies, many companies already
have spent a substantial amount of money and resources to upgrade and
improve security. The costs shown in this assessment do not include
security measures these companies have already taken to enhance
security.
    The Coast Guard realizes that every company engaged in maritime
commerce will not implement this interim rule exactly as presented in
the

[[Page 39342]]

assessment. Depending on each company's choices, some companies could
spend much less than what is estimated herein while others could spend
significantly more. In general, the Coast Guard assume that each
company will implement this interim rule differently based on the types
of OCS facilities it owns or operates and whether it engages in
international or domestic trade.
    This interim rule will affect about 40 OCS facilities under U.S.
jurisdiction, (current and future facilities). These OCS facilities
engage in exploring for, developing, or producing oil, natural gas, or
mineral resources. To determine the number of OCS facilities, we used
data that the Mineral Management Service (MMS) has identified as
nationally critical OCS oil and gas infrastructure. These OCS
facilities meet or exceed any of the following operational threshold
characteristics:
    (1) OCS facility hosts more than 150 persons for 12 hours or more
in each 24-hour period continuously for 30 days or more;
    (2) Production greater than 100,000 (one hundred thousand) barrels
of oil per day; or
    (3) Production greater than 200,000,000 (two hundred million) cubic
feet of natural gas per day.
    The estimated cost of complying with the interim rule is Present
Value (PV) $37 million (2003-2012, 7 percent discount rate). In the
first year of compliance, the cost of security assessments and plans,
training, personnel, and paperwork is an estimated $3 million (non-
discounted). Following initial implementation, the annual cost of
compliance is an estimated $5 million (non-discounted).
    Approximately 80 percent of the initial cost of the interim rule is
for assigning and establishing Company Security Officers and Facility
Security Officers, 12 percent is associated with paperwork creating
Facility Security Assessments and Facility Security Plans, and 8
percent of the cost is associated with initial training (not including
quarterly drills). Following the first year, approximately 58 percent
of the cost is training (including quarterly drills), 42 percent is for
Company Security Officers and Facility Security Officers, and less than
1 percent is associated with paperwork. Annual training (including
quarterly drills) is the primary cost driver of OCS facility security.
    We estimated approximately 3,200 burden hours for paperwork during
the first year of compliance (40 hours for each Facility Security
Assessment and each Facility Security Plan). We estimated approximately
160 burden hours annually following full implementation of the interim
rule to update Facility Security Assessments and Facility Security
Plans.
    We estimated the cost of this interim rule to be minimal in
comparison to vessel and non-OCS facility security implementation. This
interim rule includes only personnel, training, and paperwork costs for
the affected OCS facility population. We assume the industry is
adequately prepared with equipment suited to be used for security
purposes (lights, radios, communications), therefore no security
equipment installation, upgrades, or maintenance will be required for
this interim rule.

Benefit Assessment

    This interim rule is one of six interim rules that implement
national maritime security initiatives concerning General Provisions,
Area Maritime Security (ports), Vessels, Facilities, OCS Facilities,
and AIS. The Coast Guard used the National Risk Assessment Tool (N-RAT)
to assess benefits that would result from increased security for
vessels, facilities, OCS facilities, and ports. The N-RAT considers
threat, vulnerability, and consequences for several maritime entities
in various security-related scenarios. For a more detailed discussion
on the N-RAT and how we employed this tool, refer to Applicability of
National Maritime Security Initiatives in the interim rule titled
``Implementation of National Maritime Security Initiatives'' (USCG-
2003-14792) published elsewhere in today's Federal Register. For this
benefit assessment, the Coast Guard used a team of experts to calculate
a risk score for each entity and scenario before and after the
implementation of required security measures. The difference in before
and after scores indicates the benefit of the proposed action.
    The Coast Guard recognized that the interim rules are a ``family''
of rules that will reinforce and support one another in their
implementation. The Coast Guard has ensured, however, that risk
reduction that is credited in one rulemaking is not also credited in
another. For a more detailed discussion on the benefit assessment and
how the Coast Guard addressed the potential to double-count the risk
reduced, refer to Benefit Assessment in the interim rule titled
``Implementation of National Maritime Security Initiatives'' (USCG-
2003-14792) published elsewhere in today's Federal Register.
    The Coast Guard determined annual risk points reduced for each of
the six interim rules using the N-RAT. The benefits are apportioned
among the Vessel, Facility, OCS Facility, AMS, and AIS requirements. As
shown in Table 1, the implementation of OCS Facility Security Plans for
the affected population reduces 13,288 risk points annually through
2012. The benefits attributable for part 101, General Provisions, were
not considered separately since it is an overarching section for all
the parts.

                            Table 1.--Annual Risk Points Reduced by the Interim Rules
----------------------------------------------------------------------------------------------------------------
                                                     Annual risk points reduced by rulemaking
                                 -------------------------------------------------------------------------------
         Maritime entity              Vessel         Facility      OCS facility
                                  security plans  security plans  security plans     AMS plans          AIS
----------------------------------------------------------------------------------------------------------------
Vessels.........................         778,633           3,385           3,385           3,385           1,448
Facilities......................           2,025         469,686  ..............           2,025  ..............
OCS Facilities..................              41  ..............           9,903  ..............  ..............
Port Areas......................             587             587  ..............         129,792             105
                                 -----------------
    Total.......................         781,285         473,659          13,288         135,202           1,553
----------------------------------------------------------------------------------------------------------------

    Once we determined the annual risk points reduced, we discounted
these estimates to their present value (7 percent discount rate, 2003-
2012) so that they could be compared to the costs. We presented the
cost effectiveness, or dollars per risk point reduced, in two ways:
First, we compared the first-year cost and first-

[[Page 39343]]

year benefit because first-year cost is the highest in our assessment
as companies develop security plans and purchase equipment. Second, we
compared the 10-year PV cost and the 10-year PV benefit. The results of
our assessment are presented in Table 2.

                    Table 2.--First-Year and 10-Year PV Cost and Benefit of the Interim Rules
----------------------------------------------------------------------------------------------------------------
                                                                   Interim rule
                                 -------------------------------------------------------------------------------
              Item                    Vessel         Facility      OCS facility
                                  security plans  security plans  security plans     AMS plans        AIS \1\
----------------------------------------------------------------------------------------------------------------
First-Year Cost (millions)......            $218          $1,125              $3            $120             $41
First-Year Benefit..............         781,285         473,659          13,288         135,202           1,553
First-Year Cost Effectiveness ($/           $279          $2,375            $205            $890         $26,391
 Risk Point Reduced)............
10-Year PV Cost (millions)......          $1,368          $5,399             $37            $477             $42
10-Year PV Benefit..............       5,871,540       3,559,655          99,863       1,016,074          11,671
10-Year PV Cost Effectiveness ($/           $233          $1,517            $368            $469         $3,624
 Risk Point Reduced)............
----------------------------------------------------------------------------------------------------------------
\1\ Cost less monetized safety benefit.

Small Entities

    Under the Regulatory Flexibility Act (5 U.S.C. 601-612), the Coast
Guard has considered whether this interim rule would have a significant
economic impact on a substantial number of small entities. The term
``small entities'' comprises small businesses, not-for-profit
organizations that are independently owned and operated and are not
dominant in their fields, and governmental jurisdictions with
populations of less than 50,000. This interim rule does not require a
general notice of proposed rulemaking and, therefore, is exempt from
the requirements of the Regulatory Flexibility Act. Although this
interim rule is exempt, the Coast Guard has reviewed it for potential
economic impacts on small entities. An Initial Regulatory Flexibility
Analysis discussing the impact of this interim rule on small entities
is available in the docket where indicated under ADDRESSES.
    There are approximately 40 total current and future OCS facilities
owned by 5 large companies that will be affected by this interim rule.
Depending on how the corporate headquarters' operation is classified
and whether it is oil or gas specific, these companies are generally
classified under the North American Industry Classification System
(NAICS) code 211111 or 221210. According to the Small Business
Administration guidelines for these industries, a company with less
than 500 total corporate employees is considered a small entity. The
entities affected by this interim rule do not qualify as small entities
because all of them have more than 500 employees.
    Therefore, the Coast Guard certifies under 5 U.S.C. 605(b) that
this interim rule will not have a significant economic impact on a
substantial number of small entities. If you think that your business,
organization, or governmental jurisdiction qualifies as a small entity
and that this interim rule will have a significant economic impact on
it, please submit a comment to the Docket Management Facility at the
address under ADDRESSES. In your comment, explain why you think it
qualifies and how and to what degree this interim rule would
economically affect it.

Assistance for Small Entities

    Under section 213(a) of the Small Business Regulatory Enforcement
Fairness Act of 1996 (Pub. L. 104-121), we want to assist small
entities in understanding this interim rule so that they can better
evaluate its effects on them and participate in the rulemaking. If the
interim rule would affect your small business, organization, or
governmental jurisdiction and you have questions concerning its
provisions or options for compliance, please consult Lieutenant Greg
Versaw, Coast Guard by telephone 202-267-1103, toll-free telephone 1-
800-842-8740 ext. 7-1103, or electronic mail msregs@comdt.uscg.mil.
Small businesses may send comments on the actions of Federal employees
who enforce, or otherwise determine compliance with, Federal
regulations to the Small Business and Agriculture Regulatory
Enforcement Ombudsman and the Regional Small Business Regulatory
Fairness Boards. The Ombudsman evaluates these actions annually and
rates each agency's responsiveness to small business. If you wish to
comment on actions by employees of the Coast Guard, call 1-888-REG-FAIR
(1-888-734-3247).

Collection of Information

    This interim rule calls for a collection of information under the
Paperwork Reduction Act of 1995 (44 U.S.C. 3501-3520). As defined in 5
CFR 1320.3(c), ``collection of information'' comprises reporting,
recordkeeping, monitoring, posting, labeling, and other, similar
actions. The title and description of the information collections, a
description of those who must collect the information, and an estimate
of the total annual burden follow. The estimate covers the time for
reviewing instructions, searching existing sources of data, gathering
and maintaining the data needed, and completing and reviewing the
collection. This interim rule modifies an existing OMB-approved
collection--1625-0077 (formerly 2115-0551). A summary of the revised
collection follows.
    Title: Security Plans for Ports, Vessels, Facilities, and Outer
Continental Shelf Facilities and Other Security-Related Requirements.
    OMB Control Number: 1625-0077.
    Summary of the Collection of Information: The Coast Guard requires
security standards for certain non-SOLAS Certificated MODUs and fixed
and floating OCS platforms engaged in the exploration, production and
development of oil and mineral resources on the OCS. This interim rule
provides a framework to ensure adequate security planning, drilling,
and communication procedures by requiring OCS facilities to develop and
submit for approval Facility Security Assessments and Facility Security
Plans. It also requires the use of a Declaration of Security between
OCS facilities and certain vessels.
    Need for Information: The primary need for information is to
identify the adequate security mitigating measures that will be
implemented when needed.
    Proposed Use of Information: The information will be used to
identify and communicate the security mitigating measures to the Coast
Guard and necessary personnel. Declarations of Security will be used to
identify and

[[Page 39344]]

delineate the security responsibilities between an OCS facility and a
vessel.
    Description of the Respondents: OCS facilities that produce 100,000
(one hundred thousand) barrels of oil per day or 200,000,000 (two
hundred million) cubic feet of natural gas per day or host more than
150 persons for 12 hours or more during a 24-hour period continuously
for 30 days or more.
    Number of Respondents: 40.
    Frequency of Response: Varies.
    Initial OCS Facility Security Assessments and OCS Facility Security
Plans occur the first year the OCS facility is online with updates
during each following year.
    Depending on the OCS facility there may be additional requirements
and reporting frequencies.
    Burden of Response: Development burden for the Facility Security
Assessments and Facility Security Plans are estimated to be 80 hours
for each OCS facility. Updating the assessments and plans is estimated
to be 4 hours for some facilities and 2 hours for others. The
Declaration of Security is expected to be 15 minutes each.
    Estimate of Total Annual Burden: During the initial year the burden
will be 3,200 hours. The average annual reporting burden to industry is
160 hours. For a summary of all revisions to this existing OMB-approved
collection, refer to Collection of Information in the interim rule
titled ``Implementation of National Maritime Security Initiatives''
(USCG-2003-14792) published elsewhere in today's Federal Register.
    As required by the Paperwork Reduction Act of 1995 (44 U.S.C.
3507(d)), we have submitted a copy of this interim rule to the Office
of Management and Budget (OMB) for its review of the collection of
information. Due to the circumstances surrounding this temporary rule,
we asked for ``emergency processing'' of our request. We received OMB
approval for the collection of information on June 16, 2003. It is
valid until December 31, 2003.
    We ask for public comment on the collection of information to help
us determine how useful the information is; whether it can help us
perform our functions better; whether it is readily available
elsewhere; how accurate our estimate of the burden of collection is;
how valid our methods for determining burden are; how we can improve
the quality, usefulness, and clarity of the information; and how we can
minimize the burden of collection.
    If you submit comments on the collection of information, submit
them both to OMB and to the Docket Management Facility where indicated
under ADDRESSES, by the date under DATES.
    You need not respond to a collection of information unless it
displays a currently valid control number from OMB. We received OMB
approval for the collection of information on June 16, 2003. It is
valid until December 31, 2003.

Federalism

    An interim rule has implications for federalism under Executive
Order 13132, Federalism, if it has a substantial direct effect on State
or local governments and would either preempt State law or impose a
substantial direct cost of compliance on them. This part applies to
facilities that are on the OCS, outside the jurisdiction of State
waters or submerged lands. Nothing in this part will have a substantial
direct effect on State or local governments, nor will a substantial
direct cost of compliance be imposed on them. We have analyzed this
interim rule under Executive Order 13132 and have determined that it
therefore does not have implications for federalism.

Unfunded Mandates Reform Act

    The Unfunded Mandates Reform Act of 1995 (2 U.S.C. 1531-1538)
requires Federal agencies to assess the effects of their discretionary
regulatory actions. In particular, the Act addresses actions that may
result in the expenditure by a State, local, or tribal government, in
the aggregate, or by the private sector of $100,000,000 or more in any
one year. This interim rule is exempted from assessing the effects of
the regulatory action as required by the Act because it is necessary
for the national security of the United States (2 U.S.C. 1503(5)).

Taking of Private Property

    This interim rule will not effect a taking of private property or
otherwise have taking implications under Executive Order 12630,
Governmental Actions and Interference with Constitutionally Protected
Property Rights.

Civil Justice Reform

    This interim rule meets applicable standards in sections 3(a) and
3(b)(2) of Executive Order 12988, Civil Justice Reform, to minimize
litigation, eliminate ambiguity, and reduce burden.

Protection of Children

    We have analyzed this interim rule under Executive Order 13045,
Protection of Children from Environmental Health Risks and Safety
Risks. While this interim rule is an economically significant rule, it
does not create an environmental risk to health or risk to safety that
may disproportionately affect children.

Indian Tribal Governments

    This interim rule does not have tribal implications under Executive
Order 13175, Consultation and Coordination with Indian Tribal
Governments, because it does not have a substantial direct effect on
one or more Indian tribes, on the relationship between the Federal
Government and Indian tribes, or on the distribution of power and
responsibilities between the Federal Government and Indian tribes.

Energy Effects

    We have analyzed this interim rule under Executive Order 13211,
Actions Concerning Regulations That Significantly Affect Energy Supply,
Distribution, or Use. We have determined that it is not a ``significant
energy action'' under that order. Although it is a ``significant
regulatory action'' under Executive Order 12866, it is not likely to
have a significant adverse effect on the supply, distribution, or use
of energy. The Administrator of the Office of Information and
Regulatory Affairs has not designated it as a significant energy
action. Therefore, it does not require a Statement of Energy Effects
under Executive Order 13211.
    This interim rule has a positive effect on the supply,
distribution, and use of energy. The interim rule provides for security
assessments, plans, procedures, and standards, which will prove
beneficial for the supply, distribution, and use of energy at increased
levels of maritime security.

Trade Impact Assessment

    The Trade Agreement Act of 1979 (19 U.S.C. 2501-2582) prohibits
Federal agencies from engaging in any standards or related activities
that create unnecessary obstacles to the foreign commerce of the United
States. Legitimate domestic objectives, such as safety and security,
are not considered unnecessary obstacles. The Act also requires
consideration of international standards and, where appropriate, that
they be the basis for U.S. standards. We have assessed the potential
effect of this interim rule and have determined that it would likely
create obstacles to the foreign commerce of the United States. However,
because these regulations are being put in place in order to further a
legitimate domestic objective, to increase the security of the United
States, any obstacles created by the

[[Page 39345]]

regulation are not considered unnecessary obstacles.

Environment

    We have considered the environmental impact of this interim rule
and concluded that under figure 2-1, paragraph (34)(a) and (34)(c), of
Commandant Instruction M16475.lD, this interim rule is categorically
excluded from further environmental documentation. This interim rule
concerns security assessments, plans, training for personnel, and the
establishment of security positions that will contribute to a higher
level of marine safety and security for OCS facilities extracting oil
or gas. A ``Categorical Exclusion Determination'' is available in the
docket where indicated under ADDRESSES or SUPPLEMENTARY INFORMATION.
    This rulemaking will not significantly impact the coastal zone.
Further, the rulemaking and the execution of this interim rule will be
done in conjunction with appropriate State coastal authorities. The
Coast Guard will therefore, comply with the requirements of the Coastal
Zone Management Act while furthering its intent to protect the coastal
zone.

List of Subjects in 33 CFR Part 106

    Facilities, Maritime security, Outer Continental Shelf, Reporting
and recordkeeping requirements, Security measures.

0
For the reasons discussed in the preamble, the Coast Guard is adding
part 106 to subchapter H of chapter I of title 33 of the CFR.

PART 106--OUTER CONTINENTAL SHELF (OCS) FACILITY SECURITY

Subpart A--General
Sec.
106.100 Definitions.
106.105 Applicability.
106.110 Compliance dates.
106.115 Compliance documentation.
106.120 Noncompliance.
106.125 Waivers.
106.130 Equivalents.
106.135 Alternative Security Program.
106.140 Maritime Security (MARSEC) Directive.
106.145 Right to appeal.
Subpart B--Outer Continental Shelf (OCS) Facility Security Requirements
106.200 Owner or operator.
106.205 Company Security Officer (CSO).
106.210 Facility Security Officer (FSO).
106.215 Company or OCS facility personnel with security duties.
106.220 Security training for all other OCS facility personnel.
106.225 Drill and exercise requirements.
106.230 OCS facility recordkeeping requirements.
106.235 Maritime Security (MARSEC) Level coordination and
implementation.
106.240 Communications.
106.245 Procedures for interfacing with vessels.
106.250 Declaration of Security (DoS).
106.255 Security systems and equipment maintenance.
106.260 Security measures for access control.
106.265 Security measures for restricted areas.
106.270 Security measures for delivery of stores and industrial
supplies.
106.275 Security measures for monitoring.
106.280 Security incident procedures.
Subpart C--Outer Continental Shelf (OCS) Facility Security Assessment
(FSA)
106.300 General.
106.305 Facility Security Assessment (FSA) requirements.
106.310 Submission requirements.
Subpart D--Outer Continental Shelf (OCS) Facility Security Plan (FSP)
106.400 General.
106.405 Format and Content of the Facility Security Plan (FSP).
106.410 Submission and approval.
106.415 Amendment and audit.

    Authority: 33 U.S.C. 1226, 1231; 46 U.S.C. Chapter 701; 50
U.S.C. 191; 33 CFR 1.05-1, 6.04-11, 6.14, 6.16, and 6.19; Department
of Homeland Security Delegation No. 0170.

Subpart A--General

Sec.  106.100  Definitions.

    Except as specifically stated in this subpart, the definitions in
part 101 of this subchapter apply to this part.

Sec.  106.105  Applicability.

    The requirements in this part apply to owners and operators of any
fixed or floating facility, including MODUs not subject to part 104 of
this subchapter, operating on the Outer Continental Shelf (OCS) of the
United States for the purposes of engaging in the exploration,
development, or production of oil, natural gas, or mineral resources
that are regulated by 33 CFR subchapter N, that meet the following
operating conditions:
    (a) Hosts more than 150 persons for 12 hours or more in each 24-
hour period continuously for 30 days or more;
    (b) Produces greater than 100,000 barrels of oil per day; or
    (c) Produces greater than 200 million cubic feet of natural gas per
day.

Sec.  106.110  Compliance dates.

    (a) On or before December 29, 2003, each Outer Continental Shelf
(OCS) facility owner or operator must submit for each OCS facility a
Facility Security Plan (FSP) described in subpart D of this part for
review and approval to the cognizant District Commander.
    (b) On or before June 25, 2004, each OCS facility owner or operator
must be operating in compliance with this part.
    (c) OCS facilities built on or after July 1, 2004, must submit for
approval an FSP 60 days prior to beginning operations.

Sec.  106.115  Compliance documentation.

    Each OCS facility owner or operator subject to this part must
ensure that no later than July 1, 2004, that copies of the following
documentation are available at the OCS facility and are made available
to the Coast Guard upon request:
    (a) The approved Facility Security Plan (FSP) and any approved
revisions or amendments thereto, and a letter of approval from the
cognizant District Commander dated within the last 5 years;
    (b) The FSP submitted for approval and current written
acknowledgment from the cognizant District Commander, stating that the
Coast Guard is currently reviewing the FSP submitted for approval and
that the OCS facility may continue to operate so long as the OCS
facility remains in compliance with the submitted FSP; or
    (c) For OCS facilities operating under a Coast Guard-approved
Alternative Security Program as provided in Sec.  106.135, a copy of
the Alternative Security Program the OCS facility is using and a letter
signed by the OCS facility owner or operator, stating which Alternative
Security Program the OCS facility is using and certifying that the OCS
facility is in full compliance with that program.

Sec.  106.120  Noncompliance.

    When an OCS facility is not in compliance with the requirements of
this part, the OCS facility owner or operator must notify the cognizant
District Commander and request a waiver to continue operations.

Sec.  106.125  Waivers.

    Any OCS facility owner or operator may apply for a waiver of any
requirement of this part that the OCS facility owner or operator
considers unnecessary in light of the nature or operating conditions of
the OCS facility. A request for a waiver must be submitted in writing
with justification to the cognizant District Commander. The cognizant
District Commander may require the OCS facility owner or operator to
provide additional data for use in determining the validity of the
requested waiver. The cognizant District Commander may grant a waiver,
in writing, with or without conditions only if the waiver will not
reduce the overall

[[Page 39346]]

security of the OCS facility, its personnel, or visiting vessels.

Sec.  106.130  Equivalents.

    For any measure required by this part, the OCS facility owner or
operator may propose an equivalent, as provided in Sec.  101.130 of
this subchapter.

Sec.  106.135  Alternative Security Program.

    An OCS facility owner or operator may use an Alternative Security
Program approved under Sec.  101.120 of this subchapter if:
    (a) The Alternative Security Program is appropriate to that OCS
facility;
    (b) The OCS facility does not serve vessels on international
voyages; and
    (c) The Alternative Security Program is implemented in its
entirety.

Sec.  106.140  Maritime Security (MARSEC) Directive.

    All OCS facility owners or operators subject to this part must
comply with any instructions contained in a MARSEC Directive issued
under Sec.  101.405 of this subchapter.

Sec.  106.145  Right to appeal.

    Any person directly affected by a decision or action taken under
this part, by or on behalf of the Coast Guard, may appeal as described
in Sec.  101.420 of this subchapter.

Subpart B--Outer Continental Shelf (OCS) Facility Security
Requirements

Sec.  106.200  Owner or operator.

    (a) Each OCS facility owner or operator must ensure that the OCS
facility operates in compliance with the requirements of this part.
    (b) For each OCS facility, the OCS facility owner or operator must:
    (1) Define the security organizational structure for each OCS
Facility and provide each person exercising security duties or
responsibilities within that structure the support needed to fulfill
those obligations;
    (2) Designate in writing, by name or title, a Company Security
Officer (CSO) and a Facility Security Officer (FSO) for each OCS
Facility and identify how those officers can be contacted at any time;
    (3) Ensure that a Facility Security Assessment (FSA) is conducted;
    (4) Ensure the development and submission for approval of a
Facility Security Plan (FSP);
    (5) Ensure that the OCS facility operates in compliance with the
approved FSP;
    (6) Ensure that adequate coordination of security issues takes
place between OCS facilities and vessels, including the execution of a
Declaration of Security (DoS) as required by this part;
    (7) Ensure, within 12 hours of notification of an increase in
MARSEC Level, implementation of the additional security measures
required by the FSP for the new MARSEC Level; and
    (8) Ensure all breaches of security and security incidents are
reported in accordance with part 101 of this subchapter.

Sec.  106.205  Company Security Officer (CSO).

    (a) General. (1) An OCS facility owner or operator may designate a
single CSO for all its OCS facilities to which this part applies, or
may designate more than one CSO, in which case the owner or operator
must clearly identify the OCS facilities for which each CSO is
responsible.
    (2) A CSO may perform other duties within the owner's or operator's
organization, provided he or she is able to perform the duties and
responsibilities required of the CSO.
    (3) The CSO may delegate duties required by this part, but remains
responsible for the performance of those duties.
    (b) Qualifications. The CSO must have general knowledge, through
training or equivalent job experience, in the following:
    (1) Security administration and organization of the OCS facility;
    (2) OCS facility and vessel operations and conditions;
    (3) OCS facility and vessel security measures including the meaning
and consequential requirements of the different MARSEC Levels;
    (4) Emergency preparedness and response and contingency planning;
    (5) Security equipment and systems and their operational
limitations;
    (6) Methods of conducting audits, inspection, control, and
monitoring; and
    (7) Techniques for security training and education, including
security measures and procedures.
    (c) In addition to the knowledge and training in paragraph (b) of
this section, the CSO must have general knowledge, through training or
equivalent job experience, in the following, as appropriate:
    (1) Relevant international conventions, codes, and recommendations;
    (2) Relevant government legislation and regulations;
    (3) Responsibilities and functions of other security organizations;
    (4) Methodology of Facility Assessment;
    (5) Methods of OCS facility security surveys and inspections.
    (6) Handling sensitive security information (SSI) and security
related communications;
    (7) Knowledge of current security threats and patterns;
    (8) Recognition and detection of dangerous substances and devices;
    (9) Recognition of characteristics and behavioral patterns of
persons who are likely to threaten security;
    (10) Techniques used to circumvent security measures;
    (11) Methods of physical screening and non-intrusive inspections;
and
    (12) Conducting and assessing security drills and exercises.
    (d) Responsibilities. In addition to any other duties required by
this part, for each OCS facility for which the CSO is responsible, the
CSO must:
    (1) Keep the OCS facility apprised of potential threats or other
information relevant to its security;
    (2) Ensure that a Facility Security Assessment (FSA) is carried out
in compliance with this part;
    (3) Ensure that a Facility Security Plan (FSP) is developed,
approved, maintained, and implemented in compliance with this part;
    (4) Ensure that the FSP is modified when necessary to comply with
this part;
    (5) Ensure that OCS facility security activities are audited in
compliance with this part;
    (6) Ensure the timely correction of problems identified by audits
or inspections;
    (7) Enhance security awareness and vigilance within the owner's or
operator's organization;
    (8) Ensure relevant personnel receive adequate security training in
compliance with this part;
    (9) Ensure communication and cooperation between the OCS facility
and vessels that interface with it, in compliance with this part;
    (10) Ensure consistency between security requirements and safety
requirements in compliance with this part;
    (11) Ensure that if a common FSP is prepared for more than one
similar OCS facility, the FSP reflects any OCS facility specific
characteristics; and
    (12) Ensure compliance with an Alternative Security Program or
equivalents approved under this subchapter, if appropriate.

Sec.  106.210  OCS Facility Security Officer (FSO).

    (a) General. (1) The FSO may perform other duties within the
owner's or operator's organization, provided he or she is able to
perform the duties and responsibilities required of the FSO of each
such OCS facility.
    (2) The same person may serve as the FSO for more than one OCS
facility,

[[Page 39347]]

provided the facilities are within a reasonable proximity to each
other. If a person serves as the FSO for more than one OCS facility,
the name of each OCS facility for which he or she is the FSO must be
listed in the Facility Security Plan (FSP) of each OCS facility for
which he or she is the FSO.
    (3) The FSO may assign security duties to other OCS facility
personnel; however, the FSO remains responsible for these duties.
    (b) Qualifications. The FSO must have general knowledge, through
training or equivalent job experience, in the following:
    (1) Those items listed in Sec.  106.205(b), and as appropriate
Sec.  106.205(c), of this part;
    (2) OCS facility layout;
    (3) The FSP and related procedures; and
    (4) Operation, testing and maintenance of security equipment and
systems.
    (c) Responsibilities. In addition to any other responsibilities
specified elsewhere in this part, the FSO must, for each OCS facility
for which he or she has been designated:
    (1) Regularly inspect the OCS facility to ensure that security
measures are maintained in compliance with this part;
    (2) Ensure the maintenance of and supervision of the implementation
of the FSP, and any amendments to the FSP, in compliance with this
part;
    (3) Ensure the coordination and handling of stores and industrial
supplies in compliance with this part;
    (4) Where applicable, propose modifications to the FSP to the
Company Security Officer (CSO);
    (5) Ensure that any problems identified during audits or
inspections are reported to the CSO, and promptly implement any
corrective actions;
    (6) Ensure security awareness and vigilance on board the OCS
facility;
    (7) Ensure adequate security training for OCS facility personnel in
compliance with this part;
    (8) Ensure the reporting and recording of all security incidents in
compliance with this part;
    (9) Ensure the coordinated implementation of the FSP with the CSO;
    (10) Ensure that security equipment is properly operated, tested,
calibrated and maintained in compliance with this part;
    (11) Ensure consistency between security requirements and the
proper treatment of OCS facility personnel affected by those
requirements;
    (12) Ensure that occurrences that threaten the security of the OCS
facility are recorded and reported to the CSO;
    (13) Ensure that when changes in the MARSEC Level are attained they
are recorded and reported to the CSO, OCS facility owner or operator,
and the cognizant District Commander; and
    (14) Have prompt access to a copy of the FSA, along with an
approved copy of the FSP.

Sec.  106.215  Company or OCS facility personnel with security duties.

    Company or OCS facility personnel responsible for security duties
must have knowledge, through training or equivalent job experience, in
the following, as appropriate:
    (a) Knowledge of current security threats and patterns;
    (b) Recognition and detection of dangerous substances and devices;
    (c) Recognition of characteristics and behavioral patterns of
persons who are likely to threaten security;
    (d) Recognition of techniques used to circumvent security measures;
    (e) Security related communications;
    (f) Knowledge of emergency procedures and contingency plans;
    (g) Operation of security equipment and systems;
    (h) Testing, calibration, and maintenance of security equipment and
systems;
    (i) Inspection, control, and monitoring techniques;
    (j) Methods of physical screenings of persons, personal effects,
stores and industrial supplies;
    (k) Relevant provisions of the Facility Security Plan (FSP); and
    (l) The meaning and the consequential requirements of the different
MARSEC Levels.

Sec.  106.220  Security training for all other OCS facility personnel.

    All other OCS facility personnel, including contractors, whether
part-time, full-time, temporary, or permanent, must have knowledge,
through training or equivalent job experience, of the following:
    (a) Relevant provisions of the Facility Security Plan (FSP);
    (b) The meaning and the consequential requirements of the different
MARSEC Levels including emergency procedures and contingency plans;
    (c) Recognition and detection of dangerous substances and devices;
    (d) Recognition of characteristics and behavioral patterns of
persons who are likely to threaten security; and
    (e) Recognition of techniques used to circumvent security measures.

Sec.  106.225  Drill and exercise requirements.

    (a) General. Drills and exercises must test the proficiency of OCS
facility personnel in assigned security duties at all MARSEC Levels and
the effective implementation of the Facility Security Plan (FSP). They
must enable the Facility Security Officer (FSO) to identify any related
security deficiencies that need to be addressed.
    (b) Drills. (1) From the date of the FSP approval, the FSO must
ensure that at least one security drill is conducted every 3 months.
Security drills may be held in conjunction with non-security drills,
where appropriate.
    (2) Drills must test individual elements of the FSP, including
response to security threats and incidents. Drills should take into
account the types of operations of the OCS facility, OCS facility
personnel changes, the types of vessels calling at the OCS facility,
and other relevant circumstances. Examples of drills include
unauthorized entry to a restricted area, response to alarms, and
notification of appropriate authorities.
    (3) If a vessel is conducting operations with the OCS facility on
the date the OCS facility has planned to conduct any drills, the OCS
facility may include, but cannot require, the vessel or vessel
personnel to participate in the OCS facility's scheduled drill.
    (c) Exercises. (1) From the date of the FSP approval, exercises
must be conducted at least once each calendar year, with no more than
18 months between exercises.
    (2) Exercises may be:
    (i) Full scale or live;
    (ii) Tabletop simulation;
    (iii) Combined with other appropriate exercises held; or
    (iv) A combination of the elements in paragraphs (c)(2)(i) through
(iii) of this section.
    (3) Exercises may be facility-specific or part of a cooperative
exercise program.
    (4) Each exercise must test communication and notification
procedures, and elements of coordination, resource availability, and
response.
    (5) Exercises are a full test of the Facility Security Plan and
must include substantial and active participation of relevant company
and OCS facility personnel, and may include governmental authorities
and vessels depending on the scope and the nature of the exercise.

Sec.  106.230  OCS facility recordkeeping requirements.

    (a) Unless otherwise specified in this section, the Facility
Security Officer (FSO) must keep records of the activities as set out
in paragraph (b) of this section for at least 2 years and make them
available to the Coast Guard upon request.

[[Page 39348]]

    (b) Records required by this section may be kept in electronic
format. If kept in an electronic format, they must be protected against
unauthorized access, deletion, destruction, amendment, and disclosure.
The following records must be kept:
    (1) Training. For each security training session, the date of each
session, duration of session, a description of the training, and a list
of attendees;
    (2) Drills and exercises. For each drill or exercise, the date
held, a description of the drill or exercise, a list of participants,
and any best practices or lessons learned which may improve the FSP;
    (3) Incidents and breaches of security. Date and time of
occurrence, location within the OCS facility, a description of the
incident or breach, the identity of the individual to whom it was
reported, and a description of the response;
    (4) Changes in MARSEC Levels. Date and time of the notification
received, and the time of compliance with additional requirements;
    (5) Maintenance, calibration, and testing of security equipment.
For each occurrence of maintenance, calibration, and testing, record
the date and time, and the specific security equipment involved;
    (6) Security threats. Date and time of occurrence, how the threat
was communicated, who received or identified the threat, a description
of the threat, to whom it was reported, and a description of the
response;
    (7) Declaration of Security (DoS). A copy of each DoS for at least
90 days after the end of its effective period; and
    (8) Annual audit of the Facility Security Plan (FSP). For each
annual audit, a letter certified by the FSO stating the date the audit
was conducted.

Sec.  106.235  Maritime Security (MARSEC) Level coordination and
implementation.

    (a) The OCS facility owner or operator must ensure the OCS facility
operates in compliance with the security requirements in this part for
the MARSEC Level in effect for the OCS facility.
    (b) When notified of an increase in the MARSEC Level, the OCS
facility owner and operator must ensure:
    (1) Vessels conducting operations with the OCS facility and vessels
scheduled to arrive at the OCS facility within 96 hours of the MARSEC
Level change are notified of the new MARSEC Level and the Declaration
of Security (DoS), if applicable, is revised as necessary;
    (2) The OCS facility complies with the required additional security
measures within 12 hours; and
    (3) The OCS facility reports compliance or noncompliance to the
cognizant District Commander.
    (c) For MARSEC Levels 2 and 3, the Facility Security Officer (FSO)
must inform all OCS facility personnel about identified threats,
emphasize reporting procedures, and stress the need for increased
vigilance.
    (d) An OCS facility owner or operator whose facility is not in
compliance with the requirements of this section must so inform the
cognizant District Commander and obtain approval prior to interfacing
with another vessel or prior to continuing operations.

Sec.  106.240  Communications.

    (a) The Facility Security Officer (FSO) must have a means to
effectively notify OCS facility personnel of changes in security
conditions at the OCS facility.
    (b) Communication systems and procedures must allow effective and
continuous communications between the OCS facility security personnel,
vessels interfacing with the OCS facility, with the cognizant District
Commander, and national and local authorities with security
responsibilities.
    (c) Facility communications systems must have a backup means for
both internal and external communications.

Sec.  106.245  Procedures for interfacing with vessels.

    The OCS facility owner or operator must ensure that there are
measures for interfacing with vessels at all MARSEC Levels.

Sec.  106.250  Declaration of Security (DoS).

    (a) Each OCS facility owner or operator must ensure procedures are
established for requesting a DoS and for handling DoS requests from
vessels.
    (b) At MARSEC Level 1, owners or operators of OCS facilities
interfacing with a manned vessel carrying Certain Dangerous Cargoes, in
bulk, must:
    (1) Prior to the arrival of a vessel to the OCS facility, ensure
the Facility Security Officer (FSO) and Master, Vessel Security Officer
(VSO), or their designated representatives coordinate security needs
and procedures, and agree upon the contents of a DoS for the period of
time the vessel is at the OCS facility; and
    (2) Upon the arrival of the vessel at the OCS facility, the FSO and
Master, VSO, or their designated representatives, must sign the written
DoS.
    (c) Neither the OCS facility nor the vessel may embark or disembark
personnel, or transfer stores or industrial supplies until the DoS has
been signed.
    (d) At MARSEC Levels 2 and 3, the FSOs of OCS facilities
interfacing with manned vessels subject to part 104 must sign and
implement DOSs.
    (e) At MARSEC Levels 1 and 2, FSOs of OCS facilities that
frequently interface with the same vessel may implement a continuing
DoS for multiple visits, provided that:
    (1) The DoS is valid for a specific MARSEC Level;
    (2) The effective period at MARSEC Level 1 does not exceed 90 days;
and
    (3) The effective period at MARSEC Level 2 does not exceed 30 days.
    (f) When the MARSEC Level increases beyond that contained in the
DoS, the continuing DoS is void and a new DoS must be executed in
accordance with this section.

Sec.  106.255  Security systems and equipment maintenance.

    (a) Security systems and equipment must be in good working order
and inspected, tested, calibrated, and maintained according to
manufacturers' recommendations.
    (b) Security systems must be regularly tested in accordance with
the manufacturers' recommendations; noted deficiencies corrected
promptly; and the results recorded as required in Sec.  106.230(b)(5)
of this part.
    (c) The Facility Security Plan (FSP) must include procedures for
identifying and responding to security system and equipment failures or
malfunctions.

Sec.  106.260  Security measures for access control.

    (a) General. The OCS facility owner or operator must ensure the
implementation of security measures to:
    (1) Deter the unauthorized introduction or dangerous substances and
devices, including any device intended to damage or destroy persons,
vessels, or the OCS facility;
    (2) Secure dangerous substances and devices that are authorized by
the OCS facility owner or operator to be on board; and
    (3) Control access to the OCS facility.
    (b) The OCS facility owner or operator must ensure that:
    (1) All locations providing means of access to the OCS facility
where access restrictions or prohibitions are applied for each security
level to prevent unauthorized access;
    (2) The identification of the types of restriction or prohibition
to be applied and the means of enforcing them; and
    (3) The means of identification required to allow individuals to
access

[[Page 39349]]

the OCS facility and remain on the OCS facility without challenge are
established.
    (c) The OCS facility owner or operator must ensure that an
identification system is established for checking the identification of
OCS facility personnel or other persons seeking access to the OCS
facility that:
    (1) Provides for identification of authorized and unauthorized
persons at any MARSEC Level;
    (2) Is coordinated, when practicable, with identification systems
used by vessels conducting operations with the OCS facility;
    (3) Is updated regularly; and
    (4) Allows temporary or continuing access for OCS facility
personnel and visitors through the use of a badge or other system to
verify their identity.
    (d) The OCS facility owner or operator must establish in the
approved Facility Security Plan (FSP) the frequency of application of
any access controls, particularly if they are to be applied on a random
or occasional basis.
    (e) MARSEC Level 1. The OCS facility owner or operator must ensure
the following security measures are implemented at the facility:
    (1) Screen persons and personal effects going aboard the OCS
facility for dangerous substances and devices at the rate specified in
the approved FSP;
    (2) Conspicuously post signs that describe security measures
currently in effect and clearly stating that:
    (i) Boarding an OCS facility is deemed valid consent to screening
or inspection; and
    (ii) Failure to consent or submit to screening or inspection will
result in denial or revocation of authorization to be on board;
    (3) Check the identification of any person seeking to board the OCS
facility, including OCS facility employees, passengers and crews of
vessels interfacing with the OCS facility, vendors, and visitors;
    (4) Deny or revoke a person's authorization to be on board if the
person is unable or unwilling, upon the request of OCS facility
personnel, to establish his or her identity or to account for his or
her presence on board. Any such incident must be reported in compliance
with this part;
    (5) Deter unauthorized access to the OCS facility;
    (6) Identify access points that must be secured or attended to
deter unauthorized access;
    (7) Lock or otherwise prevent access to unattended spaces that
adjoin areas to which passengers and visitors have access;
    (8) Ensure OCS facility personnel are not required to engage in or
be subjected to screening, of the person or of personal effects, by
other OCS facility personnel, unless security clearly requires it;
    (9) Provide a designated secure area on board, or in liaison with a
vessel interfacing with the OCS facility, for conducting inspections
and screening of people and their personal effects; and
    (10) Respond to the presence of unauthorized persons on board.
    (f) MARSEC Level 2. In addition to the security measures required
for MARSEC Level 1 in this section, at MARSEC Level 2, the OCS facility
owner or operator must also ensure the implementation of additional
security measures, as specified for MARSEC Level 2 in the approved FSP.
These additional security measures may include:
    (1) Increasing the frequency and detail of screening of people and
personal effects embarking onto the OCS facility as specified for
MARSEC Level 2 in the approved FSP;
    (2) Assigning additional personnel to patrol deck areas during
periods of reduced OCS facility operations to deter unauthorized
access;
    (3) Limiting the number of access points to the OCS facility by
closing and securing some access points; or
    (4) Deterring waterside access to the OCS facility, which may
include, providing boat patrols.
    (g) MARSEC Level 3. In addition to the security measures required
for MARSEC Level 1 and MARSEC Level 2, the OCS facility owner or
operator must ensure the implementation of additional security
measures, as specified for MARSEC Level 3 in the approved FSP. The
additional security measures may include:
    (1) Screening all persons and personal effects for dangerous
substances and devices;
    (2) Being prepared to cooperate with responders;
    (3) Limiting access to the OCS facility to a single, controlled
access point;
    (4) Granting access to only those responding to the security
incident or threat thereof;
    (5) Suspending embarkation and/or disembarkation of personnel;
    (6) Suspending the onloading of stores or industrial supplies;
    (7) Evacuating the OCS facility; or
    (8) Preparing for a full or partial search of the OCS facility.

Sec.  106.265  Security measures for restricted areas.

    (a) General. The OCS facility owner or operator must ensure the
designation of restricted areas in order to:
    (1) Prevent or deter unauthorized access;
    (2) Protect persons authorized to be in the OCS facility;
    (3) Protect the OCS facility;
    (4) Protect vessels using and serving the OCS facility;
    (5) Protect sensitive security areas within the OCS facility;
    (6) Protect security and surveillance equipment and systems; and
    (7) Protect stores and industrial supplies from tampering.
    (b) Designation of restricted areas. The OCS facility owner or
operator must ensure restricted areas are designated within the OCS
facility. They must also ensure that all restricted areas are clearly
marked and indicate that access to the area is restricted and that
unauthorized presence within the area constitutes a breach of security.
The OCS facility owner or operator may designate the entire OCS
facility as a restricted area. Restricted areas must include, as
appropriate:
    (1) Areas containing sensitive security information;
    (2) Areas containing security and surveillance equipment and
systems and their controls, and lighting system controls; and
    (3) Areas containing critical OCS facility infrastructure
equipment, including:
    (i) Water supplies;
    (ii) Telecommunications;
    (iii) Power distribution system;
    (iv) Access points for ventilation and air-conditioning systems;
    (v) Manufacturing areas and control rooms;
    (vi) Areas designated for loading, unloading or storage of stores
and industrial supplies; and
    (vii) Areas containing hazardous materials.
    (c) The OCS facility owner or operator must ensure that the
Facility Security Plan (FSP) should include measures for restricted
areas to:
    (1) Identify which OCS facility personnel are authorized to have
access;
    (2) Determine which persons other than OCS facility personnel are
authorized to have access;
    (3) Determine the conditions under which that access may take
place;
    (4) Define the extent of any restricted area; and
    (5) Define the times when access restrictions apply.
    (d) MARSEC Level 1. At MARSEC Level 1, the OCS facility owner or
operator must ensure the implementation of security measures to prevent
unauthorized access or activities within the area. These security
measures may include:
    (1) Restricting access to only authorized personnel;

[[Page 39350]]

    (2) Securing all access points not actively used and providing
physical barriers to impede movement through the remaining access
points;
    (3) Verifying the identification and authorization of all persons
seeking entry;
    (4) Using security personnel, automatic intrusion detection
devices, surveillance equipment, or surveillance systems to detect
unauthorized entry to or movement within restricted areas; or
    (5) Designating temporary restricted areas to accommodate OCS
facility operations. If temporary restricted areas are designated, the
FSP must include security requirements to conduct a security sweep of
the designated temporary restricted areas both before and after the
area has been established.
    (e) MARSEC Level 2. In addition to the security measures required
for MARSEC Level 1 in this section, at MARSEC Level 2, the OCS facility
owner or operator must also ensure the implementation of additional
security measures, as specified for MARSEC Level 2 in their approved
FSP. These additional security measures may include:
    (1) Enhancing the effectiveness of the barriers surrounding
restricted areas, for example, by the use of patrols or automatic
intrusion detection devices;
    (2) Reducing the number of access points to restricted areas, and
enhancing the controls applied at the remaining accesses;
    (3) Further restricting access to the restricted areas and
movements and storage within them;
    (4) Using continuously monitored and recorded surveillance
equipment;
    (5) Increasing the number and frequency of patrols, including the
use of waterborne patrols; or
    (6) Restricting access to areas adjacent to the restricted areas.
    (f) MARSEC Level 3. In addition to the security measures required
for MARSEC Level 1 and MARSEC Level 2, at MARSEC Level 3, the OCS
facility owner or operator must ensure the implementation of additional
security measures, as specified for MARSEC Level 3 in their approved
FSP. These additional security measures may include:
    (1) Restricting access to additional areas;
    (2) Prohibiting access to restricted areas; or
    (3) Searching restricted areas as part of a security sweep of all
or part of the OCS facility.

Sec.  106.270  Security measures for delivery of stores and industrial
supplies.

    (a) General. The OCS facility owner or operator must ensure that
security measures relating to the delivery of stores or industrial
supplies to the OCS facility are implemented to:
    (1) Check stores or industrial supplies for package integrity;
    (2) Prevent stores or industrial supplies from being accepted
without inspection;
    (3) Deter tampering; and
    (4) Prevent stores and industrial supplies from being accepted
unless ordered. For any vessels that routinely use an OCS facility, an
OCS facility owner or operator may establish and implement standing
arrangements between the OCS facility, its suppliers, and any vessel
delivering stores or industrial supplies regarding notification and the
timing of deliveries and their documentation.
    (b) MARSEC Level 1. At MARSEC Level 1, the OCS facility owner or
operator must ensure the implementation of measures to:
    (1) Inspect stores or industrial supplies before being accepted;
and
    (2) Check that stores or industrial supplies match the order prior
to being brought on board.
    (c) MARSEC Level 2. In addition to the security measures required
for MARSEC Level 1 in this section, at MARSEC Level 2, the OCS facility
owner or operator must also ensure the implementation of additional
security measures, as specified for MARSEC Level 2 in the approved
Facility Security Plan (FSP). These additional security measures may
include:
    (1) Intensifying inspection of the stores or industrial supplies
during delivery; or
    (2) Checking stores or industrial supplies prior to receiving them
on board.
    (d) MARSEC Level 3. In addition to the security measures for MARSEC
Level 1 and MARSEC Level 2, at MARSEC Level 3, the OCS facility owner
or operator must ensure the implementation of additional security
measures, as specified for MARSEC Level 3 in the approved FSP. These
additional security measures may include:
    (1) Checking all OCS facility stores or industrial supplies more
extensively;
    (2) Restricting or suspending delivery of stores or industrial
supplies; or
    (3) Refusing to accept stores or industrial supplies on board.

Sec.  106.275  Security measures for monitoring.

    (a) General. (1) The OCS facility owner or operator must ensure the
implementation of security measures in this section and have the
capability to continuously monitor, through a combination of lighting,
watchkeepers, security guards, deck watches, waterborne patrols and
automatic intrusion-detection devices, or surveillance equipment as
specified in their approved Facility Security Plan (FSP), the:
    (i) OCS facility;
    (ii) Restricted areas on board the OCS facility; and
    (iii) The area surrounding the OCS facility.
    (2) The following must be considered when establishing the
appropriate level and location of lighting:
    (i) OCS facility personnel should be able to detect activities on
and around OCS facility;
    (ii) Coverage should facilitate personnel identification at access
points; and
    (iii) Lighting effects, such as glare, and their impact on safety,
navigation, and other security activities.
    (b) MARSEC Level 1. At MARSEC Level 1, the OCS facility owner or
operator must ensure the implementation of security measures, which may
be implemented in coordination with a vessel interfacing with the OCS
facility, to:
    (1) Monitor the OCS facility, particularly OCS facility access
points and restricted areas;
    (2) Be able to conduct emergency searches of the OCS facility;
    (3) Ensure that equipment or system failures or malfunctions are
identified and corrected;
    (4) Ensure that any automatic intrusion detection device, sets off
an audible or visual alarm, or both, at a location that is continually
attended or monitored; and
    (5) Light deck and OCS facility access points during the period
between sunset and sunrise and periods of limited visibility
sufficiently to allow visual identification of persons seeking access
to the OCS facility.
    (c) MARSEC Level 2. In addition to the security measures required
for MARSEC Level 1 in this section, at MARSEC Level 2, the OCS facility
owner or operator must also ensure the implementation of additional
security measures, as specified for MARSEC Level 2 in the approved FSP.
These additional security measures may include:
    (1) Increasing the frequency and detail of security patrols;
    (2) Using (if not already in use) or increasing the use of security
and surveillance equipment;
    (3) Assigning additional personnel as security lookouts; or
    (4) Coordinating with boat patrols, when provided.

[[Page 39351]]

    (d) MARSEC Level 3. In addition to the security measures for MARSEC
Level 1 and MARSEC Level 2, at MARSEC Level 3, the OCS facility owner
or operator must ensure the implementation of additional security
measures, as specified for MARSEC Level 3 in the approved FSP. These
additional security measures may include:
    (1) Cooperating with responders;
    (2) Switching on all lights;
    (3) Switching on all surveillance equipment capable of recording
activities on, or in the vicinity of, the OCS facility;
    (4) Maximizing the length of time such surveillance equipment (if
not already in use) can continue to record; or
    (5) Preparing for underwater inspection of the OCS facility.

Sec.  106.280  Security incident procedures.

    For each MARSEC Level, the OCS facility owner or operator must
ensure the Facility Security Officer (FSO) and OCS facility security
personnel are able to:
    (a) Respond to security threats or breaches of security and
maintain critical OCS facility and OCS facility-to-vessel interface
operations;
    (b) Deny access to the OCS facility, except to those responding to
an emergency;
    (c) Evacuate the OCS facility in case of security threats or
breaches of security; and
    (d) Report security incidents as required in Sec.  101.305 of this
subchapter;
    (e) Brief all OSC facility personnel on possible threats and the
need for vigilance, soliciting their assistance in reporting suspicious
persons, objects, or activities; and
    (f) Secure non-critical operations in order to focus response on
critical operations.

Subpart C--Outer Continental Shelf (OCS) Facility Security
Assessment (FSA)

Sec.  106.300  General.

    (a) The Facility Security Assessment (FSA) is a written document
that is based on the collection of background information, the
completion of an on-scene survey and an analysis of that information.
    (b) A single FSA may be performed and applied to more than one OCS
facility to the extent they share physical characteristics, location,
and operations.
    (c) Third parties may be used in any aspect of the FSA if they have
the appropriate skills and if the Company Security Officer (CSO)
reviews and accepts their work.
    (d) Those involved in a FSA must be able to draw upon expert
assistance in the following areas, as appropriate:
    (1) Knowledge of current and anticipated security threats and
patterns;
    (2) Recognition and detection of dangerous substances and devices;
    (3) Recognition of characteristics and behavioral patterns of
persons who are likely to threaten security;
    (4) Recognition of techniques used to circumvent security measures;
    (5) Methods used to cause a security incident;
    (6) Effects of dangerous substances and devices on structures and
essential services;
    (7) OCS facility security requirements;
    (8) OCS facility and vessel interface business practices;
    (9) Contingency planning, emergency preparedness and response;
    (10) Physical security requirements;
    (11) Radio and telecommunications systems, including computer
systems and networks;
    (12) Marine or civil engineering; and
    (13) OCS facility and vessel operations.

Sec.  106.305  Facility Security Assessment (FSA) requirements.

    (a) Background. The OCS facility owner or operator must ensure that
the following background information, if applicable, is provided to the
person or persons who will conduct the assessment:
    (1) The general layout of the OCS facility, including:
    (i) The location of each access point to the OCS facility;
    (ii) The number, reliability, and security duties of OCS facility
personnel;
    (iii) Security doors, barriers, and lighting;
    (iv) The location of restricted areas;
    (v) The emergency and stand-by equipment available to maintain
essential services;
    (vi) The essential maintenance equipment and storage areas;
    (vii) Location of escape and evacuation routes and assembly
stations; and
    (viii) Existing security and safety equipment for protection of
personnel;
    (2) Response procedures for fire or other emergency conditions;
    (3) Procedures for monitoring OCS facility and vessel personnel;
    (4) Procedures for controlling keys and other access prevention
systems;
    (5) Response capability for security incidents;
    (6) Threat assessments, including the purpose and methodology of
the assessment, for the OCS facility's location;
    (7) Previous reports on security needs; and
    (8) Any other existing security procedures and systems, equipment,
communications, and OCS facility personnel.
    (b) On-scene survey. The OCS facility owner or operator must ensure
that an on-scene survey of each OCS facility is conducted. The on-scene
survey examines and evaluates existing OCS facility protective
measures, procedures, and operations to verify or collect the
information required in paragraph (a) of this section.
    (c) Analysis and recommendations. In conducting the FSA, the OCS
owner or operator must ensure that the Company Security Officer (CSO)
analyzes the OCS facility background information and the on-scene
survey, and considering the requirements of this part, provides
recommendations to establish and prioritize the security measures that
should be included in the FSP. The analysis must consider:
    (1) Each vulnerability found during the on-scene survey, including
but not limited to:
    (i) Access to the OCS facility;
    (ii) Structural integrity of the OCS facility;
    (iii) Existing security measures and procedures, including
identification systems;
    (iv) Existing security measures and procedures relating to
essential services;
    (v) Measures to protect radio and telecommunication equipment,
including computer systems and networks;
    (vi) Existing agreements with private security companies;
    (vii) Any conflicting policies between safety and security measures
and procedures;
    (viii) Any conflicting OCS facility operations and security duty
assignments;
    (ix) Any deficiencies identified during daily operations or
training and drills; and
    (x) Any deficiencies identified following security incidents or
alerts, the report of security concerns, the exercise of control
measures, or audits.
    (2) Possible security threats, including but not limited to:
    (i) Damage to or destruction of the OCS facility or of a vessel
adjacent to the OCS facility;
    (ii) Smuggling dangerous substances and devices;
    (iii) Use of a vessel interfacing with the OCS facility to carry
those intending to cause a security incident and their equipment;

[[Page 39352]]

    (iv) Use of a vessel interfacing with the OCS facility as a weapon
or as a means to cause damage or destruction; and
    (v) Nuclear, radiological, explosive, biological, and chemical
attack;
    (3) Threat assessments by Government agencies;
    (4) Vulnerabilities, including human factors, in the OCS facility's
infrastructure, policies and procedures;
    (5) Any particular aspects of the OCS facility, including the
vessels that interface with the OCS facility, which make it likely to
be the target of an attack;
    (6) Likely consequences, in terms of loss of life, damage to
property, or economic disruption, of an attack on or at the OCS
facility; and
    (7) Locations where access restrictions or prohibitions will be
applied for each MARSEC Level.
    (d) FSA Report. (1) The OCS facility owner or operator must ensure
that a written FSA report is prepared and included as a part of the
FSP. The report must contain:
    (i) A summary of how the on-scene survey was conducted;
    (ii) A description of existing security measures, including
inspection, control and monitoring equipment, personnel identification
documents and communication, alarm, lighting, access control, and
similar systems;
    (iii) A description of each vulnerability found during the on-scene
survey;
    (iv) A description of security measures that could be used to
address each vulnerability.
    (v) A list of the key OCS facility operations that are important to
protect; and
    (vi) A list of identified weaknesses, including human factors, in
the infrastructure, policies, and procedures of the OCS facility.
    (2) A FSA report must describe the following elements within the
OCS facility:
    (i) Physical security;
    (ii) Structural integrity;
    (iii) Personnel protection systems;
    (iv) Procedural policies;
    (v) Radio and telecommunication systems, including computer systems
and networks; and
    (vi) Essential services.

Sec.  106.310  Submission requirements.

    (a) A completed FSA report must be submitted with the Facility
Security Plan (FSP) required in Sec.  106.405 of this part.
    (b) An OCS facility owner or operator may generate and submit a
report that contains the FSA for more than one OCS facility subject to
this part, to the extent that they share similarities in physical
characteristics, location and operations.

Subpart D--Outer Continental Shelf (OCS) Facility Security Plan
(FSP)

Sec.  106.400  General.

    (a) The OCS facility owner or operator must ensure the FSO develops
and implements a Facility Security Plan (FSP) for each OCS facility for
which he or she is designated as FSO. The FSP:
    (1) Must identify the FSO by name or position and provide 24-hour
contact information;
    (2) Must be written in English;
    (3) Must address each vulnerability identified in the Facility
Security Assessment (FSA);
    (4) Must describe security measures for each MARSEC Level; and
    (5) May cover more than one OCS facility to the extent that they
share similarities in physical characteristics and operations, if
authorized and approved by the cognizant District Commander.
    (b) The FSP must be submitted for approval to the cognizant
District Commander in a written or electronic format in a manner
prescribed by the cognizant District Commander.
    (c) The FSP is sensitive security information and must be protected
in accordance with 49 CFR part 1520.
    (d) If the FSP is kept in an electronic format, procedures must be
in place to prevent its unauthorized deletion, destruction, or
amendment.

Sec.  106.405  Format and content of the Facility Security Plan (FSP).

    (a) An OCS facility owner or operator must ensure that the FSP
consists of the individual sections listed in this paragraph (a). If
the FSP does not follow the order as it appears in the list, the OCS
facility owner or operator must ensure that the FSP contains an index
identifying the location of each of the following sections:

    (1) Security organization of the OC facility;
    (2) Personnel training;
    (3) Drills and exercises;
    (4) Records and documentation;
    (5) Response to change in MARSEC Level;
    (6) Procedures for interfacing with vessels;
    (7) Declaration of Security (DoS);
    (8) Communications;
    (9) Security systems and equipment maintenance;
    (10) Security measures for access control;
    (11) Security measures for restricted areas;
    (12) Security measures for delivery of stores and industrial
supplies;
    (13) Security measures for monitoring;
    (14) Security incident procedures;
    (15) Audits and FSP amendments; and
    (16) Facility Security Assessment (FSA) report.
    (b) The OCS facility owner or operator must ensure that the FSP
describes in detail how each of the requirements of subpart B of this
part will be met.

Sec.  106.410  Submission and approval.

    (a) On or before December 29, 2003, each OCS facility owner or
operator must either:
    (1) Submit one copy of the Facility Security Plan (FSP) for review
and approval to the cognizant District Commander and a letter
certifying that the FSP meets the applicable requirements of this part;
or
    (2) If implementing a Coast Guard approved Alternative Security
Program, meet the requirements in Sec.  101.120(b) of this subchapter.
    (b) OCS facilities built on or after July 1, 2004, must comply with
the requirements in paragraph (a) of this section 60 days prior to
beginning operations.
    (c) The cognizant District Commander will examine each submission
for compliance with this part, and return to the submitter either:
    (1) A letter of approval, stating acceptance of the FSP and
specifying any conditions of approval;
    (2) An acknowledgement letter stating that the Coast Guard is
currently reviewing the FSP submitted for approval, and that the OCS
facility may continue to operate so long as the OCS facility remains in
compliance with the submitted FSP; or
    (3) A disapproval letter specifying the reasons for disapproval and
the submitted FSP.
    (d) An FSP may be submitted and approved to cover more than one OCS
facility where they share similarities in physical characteristics,
location, and operations.
    (e) Each OCS facility owner or operator that submits one FSP to
cover two or more OCS facilities of similar design, location, and
operation must address OCS facility-specific information that includes
the physical and operational characteristics of each OCS facility.
    (f) An FSP that is approved by the cognizant District Commander is
valid for 5 years from the date of its approval. The cognizant District
Commander will issue an approval letter, as indicated in Sec.  106.115
of this part.

[[Page 39353]]

Sec.  106.415  Amendment and audit.

    (a) Amendments. (1) Amendments to a Facility Security Plan (FSP)
that are approved by the cognizant District Commander may be initiated
by:
    (i) The OCS facility owner or operator; or
    (ii) The cognizant District Commander, upon a determination that an
amendment is needed to maintain the OCS facility's security. The
cognizant District Commander will give the OCS facility owner or
operator written notice and request that the OCS facility owner or
operator propose amendments addressing any matters specified in the
notice. The OCS facility owner or operator will have at least 60 days
to submit its proposed amendments. Until amendments are approved, the
OCS facility owner or operator shall ensure temporary security measures
are implemented to the satisfaction of the cognizant District
Commander.
    (2) Proposed amendments must be sent to the cognizant District
Commander. If initiated by the OCS facility owner or operator, the
proposed amendment must be submitted at least 30 days before the
amendment is to take effect unless the cognizant District Commander
allows a shorter period. The cognizant District Commander will approve
or disapprove the proposed amendment in accordance with Sec.  106.410
of this subpart.
    (3) If the owner or operator has changed, the Facility Security
Officer (FSO) must amend the Facility Security Plan (FSP) to include
the name and contact information of the new OCS facility owner(s) or
operator(s) and submit the affected portion of the FSP for review and
approval in accordance with Sec.  106.410 of this subpart.
    (b) Audits. (1) The FSO must ensure an audit of the FSP is
performed annually, beginning no later than one year from the initial
date of approval and attach a letter to the FSP certifying that the FSP
meets the applicable requirements of this part.
    (2) If there is a change in ownership or operations of the OCS
facility, or if there have been modifications to the OCS facility, the
FSP must be audited including but not limited to physical structure,
emergency response procedures, security measures, or operations.
    (3) Auditing the FSP as a result of modifications to the OCS
facility may be limited to those sections of the FSP affected by the
OCS facility modifications.
    (4) Unless impracticable due to the size and nature of the company
or the OCS facility, personnel conducting internal audits of the
security measures specified in the FSP or evaluating its implementation
must:
    (i) Have knowledge of methods of conducting audits and inspections,
and control and monitoring techniques;
    (ii) Not have regularly assigned security duties; and
    (iii) Be independent of any security measures being audited.
    (5) If the results of an audit require an amendment of either the
Facility Security Assessment (FSA) or FSP, the FSO must submit, in
accordance with Sec.  106.410 of this subpart, the amendments to the
cognizant District Commander for review and approval no later than 30
days after completion of the audit and a letter certifying that the
amended FSP meets the applicable requirements of this part.

    Dated: June 23, 2003.
Thomas H. Collins,
Admiral, Coast Guard Commandant.
[FR Doc. 03-16190 Filed 6-27-03; 8:45 am]

BILLING CODE 4910-15-P

[Federal Register: July 1, 2003 (Volume 68, Number 126)]
[Rules and Regulations]
[Page 39353-39368]
From the Federal Register Online via GPO Access [wais.access.gpo.gov]
[DOCID:fr01jy03-19]

-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

Coast Guard

33 CFR Parts 26, 161, 164, and 165

[USCG-2003-14757]
RIN 1625-AA67


Automatic Identification System; Vessel Carriage Requirement

AGENCY: Coast Guard, DHS.

ACTION: Temporary interim rule with request for comments and notice of
meeting.

-----------------------------------------------------------------------

SUMMARY: The Coast Guard is amending port and waterway regulations to
reflect vessel carriage requirements and establish technical and
performance standards for an Automatic Identification System (AIS).
This interim rule will implement the AIS carriage requirements of the
Maritime Transportation Security Act of 2002 (MTSA) and the
International Maritime Organization requirements adopted under
International Convention for the Safety of Life at Sea, 1974, (SOLAS)
as amended. The changes will require AIS on all vessels subject to
SOLAS, Vessel Traffic Service Users and certain other commercial
vessels. The rule will facilitate vessel-to-vessel and vessel-to-shore
communications; it will enhance good order and predictability on the
waterways, promote safe navigation; and contribute to maritime domain
awareness to protect the security of our nation's ports and waterways.
    This rule is one of six interim rules in today's Federal Register
addressing the requirements for maritime security mandated by the MTSA.
These six interim rules implement national maritime security
initiatives concerning general provisions, Area Maritime Security
(ports), vessels, facilities, Outer Continental Shelf facilities, and
the Automatic Identification System. They align domestic maritime
security requirements with those of the International Ship and Port
Facility Security Code and recent amendments to SOLAS. This rule will
benefit persons and property by requiring that certain vessels carry
AIS to increase maritime domain awareness and help detect, and respond
to unlawful acts that threaten vessels. To best understand these
interim rules, first read the one titled ``Implementation of National
Maritime Security Initiatives.'' (See USCG-2003-14792).
    In view of the benefit-cost ratio presented herein, the Coast Guard
will share with Congress any significant information provided by the
public that addresses the reasonableness of implementing the statute.

DATES: Effective date. This interim rule is effective July 1, 2003. The
Coast Guard intends to finalize this rule by November 25, 2003.
Material incorporated by reference was approved by the Director of the
Federal Register as of July 1, 2003.
    Comments. Comments and related material must reach the Docket
Management Facility on or before July 31, 2003.
    Meeting. A public meeting will be held on July 23, 2003 from 9 a.m.
to 5 p.m., in Washington, DC.

ADDRESSES: Comments. To ensure your comments and related material are
not entered more than once in the docket, please submit them by only
one of the following means:
    (1) Electronically to the Docket Management System at http://dms.dot.gov
.
    (2) By mail to the Docket Management Facility (USCG-2003-14757) at
the U.S. Department of Transportation, room PL-401, 400 Seventh Street
SW., Washington, DC 20590-0001.
    (3) By fax to the Docket Management Facility at 202-493-2251.
    (4) By delivery to room PL-401 on the Plaza level of the Nassif
Building, 400 Seventh Street SW., Washington, DC between 9 a.m. and 5
p.m., Monday through Friday, except Federal holidays. The telephone
number is 202-366-9329.

[[Page 39354]]

    Meeting. A public meeting will be held on July 23, 2003 in
Washington, DC at the Grand Hyatt Washington, DC, 1000 H Street, NW.,
Washington, DC 20001.
    Availability. You may inspect the material incorporated by
reference at room 1409, U.S. Coast Guard Headquarters, 2100 Second
Street SW., Washington, DC 20593-0001 between 8:30 a.m. and 3:30 p.m.,
Monday through Friday, except Federal holidays. The telephone number is
202-267-6277. Copies of the material are available as indicated in the
``Incorporation by Reference'' section of this preamble.

FOR FURTHER INFORMATION CONTACT: If you have questions on this interim
rule, contact Mr. Jorge Arroyo, Office of Vessel Traffic Management (G-
MWV), Coast Guard by telephone 202-267-1103, toll-free telephone 1-800-
842-8740 ext. 7-1103, or electronic mail msregs@comdt.uscg.mil. For
questions on viewing or submitting material to the docket, call Ms.
Dorothy Beard, Chief, Dockets, Department of Transportation, at 202-
366-5149.

SUPPLEMENTARY INFORMATION: Due to the short timeframe given to
implement these National Maritime Transportation Security initiatives,
as directed by the Maritime Transportation Security Act (MTSA) of 2002
(MTSA, Pub. L. 107-295, 116 STAT. 2064), and to ensure all comments are
in the public venue for these important rulemakings, we are not
accepting comments containing protected information for these interim
rules. We request you submit comments, as explained in the Request for
Comments section below, and discuss your concerns or support in a
manner that is not security sensitive. We also request that you not
submit proprietary information as part of your comment.
    The Docket Management Facility maintains the public docket for this
rulemaking. Comments and material received from the public, as well as
documents mentioned in this preamble as being available in the docket,
will be available for inspection or copying at room PL-401 on the Plaza
level of the Nassif Building, 400 Seventh Street SW., Washington, DC,
between 9 a.m. and 5 p.m., Monday through Friday, except Federal
holidays. You may also find this docket on the Internet at http://dms.dot.gov
.
    Electronic forms of all comments received into any of our dockets
can be searched by the name of the individual submitting the comment
(or signing the comment, if submitted on behalf of an association,
business, labor unit, etc.) and is open to the public without
restriction. You may also review the Department of Transportation's
complete Privacy Act Statement published in the Federal Register on
April 11, 2000 (65 FR 19477-78), or you may visit http://dms.dot.gov/.

Request for Comments

    We encourage you to participate in this rulemaking by submitting
comments and related material. Your comments will be considered for the
final rule we plan to issue before November 25, 2003, to replace this
interim rule. If you choose to comment on this rulemaking, please
include your name and address, identify the specific docket number for
this interim rule (USCG-2003-14757), indicate the specific heading of
this document to which each comment applies, and give the reason for
each comment. If you have comments on another rule please submit those
comments in a separate letter to the docket for that rulemaking. You
may submit your comments and material by mail, hand delivery, fax, or
electronic means to the Docket Management Facility at the address under
ADDRESSES; but please submit your comments and material by only one
means. If you submit them by mail or hand delivery, submit them in an
unbound format, no larger than 8\1/2\ by 11 inches, suitable for
copying and electronic filing. If you submit them by mail and would
like to know that they reached the Facility, please enclose a stamped,
self-addressed postcard or envelope. We will consider all comments and
material received during the comment period, and we may amend this rule
and the final rule that replaces it in view of them.
    Note, matters pertaining to AIS licensing, equipment certification,
and frequencies are subject to Federal Communications Commission
regulations and are not addressed in this rule, see FCC Public Notice
DA 02-1362 in the docket for further information.

Public Meeting

    We will hold a public meeting on July 23, 2003, in Washington, DC
at the Grand Hyatt Hotel, at the address listed under ADDRESSES. The
meeting will be from 9 a.m. to 5 p.m. to discuss this Automatic
Identification System (AIS) rulemaking in addition to the other five
maritime security rulemakings, found elsewhere in today's Federal
Register. In addition, you may submit a request for other public
meetings to the Docket Management Facility at the address under
ADDRESSES explaining why another one would be beneficial. If we
determine that other meetings would aid this rulemaking, we will hold
them at a time and place announced by a later notice in the Federal
Register.

Regulatory Information

    We did not publish a notice of proposed rulemaking for this
rulemaking and are making this interim rule effective upon publication.
Section 102(d)(1) of the Maritime Transportation Security Act of 2002
(MTSA, Public Law 107-295, 116 Stat. 2064) requires the publication of
an interim rule as soon as practicable without regard to the provisions
of chapter 5 of title 5, U.S. Code (Administrative Procedure Act). The
Coast Guard finds that harmonization of U.S. regulations with maritime
security measures adopted by the International Maritime Organization
(IMO) in December 2002, and the need to institute measures for the
protection of U.S. maritime security as soon as practicable, furnish
good cause for this interim rule to take effect immediately under both
the Administrative Procedure Act and section 808 of the Congressional
Review Act.

Recently Enacted Legislation

    The provisions set forth in this rulemaking and the associated
regulatory assessment take into account: (1) The recently enacted MTSA,
which requires an AIS on most commercial vessels on all navigable
waters, and (2) the International Convention for the Safety of Life at
Sea, 1974, (SOLAS) amendments from the December 2002 International
Maritime Organization (IMO) Diplomatic Conference. This rule will amend
AIS standards to those adopted by the IMO and SOLAS and defined in the
International Telecommunication Union Radiocommunication Bureau (ITU-R)
Recommendation ITU-R M.1371-1 and International Electrotechnical
Commission (IEC) IEC 61993-2.
    The recent SOLAS AIS amendments accelerate the implementation
schedule, as discussed below under ``Background and Purpose-
Acceleration of SOLAS AIS Implementation.'' Copies of the MTSA and the
SOLAS AIS amendments are available in the docket as indicated under
ADDRESSES.

Public Meetings for Rulemakings Related to Vessel Traffic Service

    The Coast Guard held a public meeting on October 28, 1998, in New
Orleans, Louisiana. The meeting was announced in a notice published in
the Federal Register on September 18, 1998 (63 FR 49939). This meeting
gave the Coast Guard the opportunity to discuss the Vessel Traffic
Service (VTS) concept on the Lower Mississippi River and the envisioned
use of automatic

[[Page 39355]]

identification system technology in the VTS. At this 1998 meeting, we
reported the preliminary results of tests conducted on the Lower
Mississippi River using precursor AIS. The proposed VTS on the Lower
Mississippi River is not discussed in this rulemaking because it is the
subject of a separate rulemaking titled ``Vessel Traffic Service Lower
Mississippi River'' (65 FR 24616, April 26, 2000; docket [USCG-1998-
4399]). We copied those comments regarding the AIS that were submitted
to the VTS Lower Mississippi River docket and have placed those copies
in the docket for this interim rule. However, most of those comments
are not addressed herein either because they are no longer applicable
or because they address a previous version of AIS and not the version
required by this interim rule. We encourage all those who commented
previously on this rulemaking to comment on the new provisions set
forth in this rule. We will address those comments along with all other
comments submitted in direct response to this interim rule in the final
rule.
    Over the past few years, the Coast Guard has made AIS presentations
at various public forums including Federal advisory committee meetings
(Towing Safety Advisory Committee, National Offshore Safety Advisory
Committee, Houston-Galveston Navigation Safety Advisory Committee and
Navigation Safety Advisory Council). Moreover, the AIS-based Ports and
Waterways Safety System project being installed at the VTS Lower
Mississippi River is regularly discussed at the Lower Mississippi River
Waterway Safety Advisory Committee meetings.
    The Houston-Galveston Navigation Safety Advisory Committee and
Lower Mississippi River Waterway Safety Advisory Committee are
Federally chartered advisory committees charged with making
recommendations to the Coast Guard on matters relating to the safe and
efficient transit of vessels on their respective waterways. These open
forums have afforded the public, particularly those in the Gulf of
Mexico and Mississippi River areas, the opportunity to comment on both
VTS Lower Mississippi River and AIS issues. The public's input will be
taken into account throughout this rulemaking. Elsewhere in today's
Federal Register, we have published a notice requesting comments on AIS
carriage for vessels outside VTS and Vessel Movement Reporting System
(VMRS) areas that are not on an international voyage (See USCG-2003-
14878).

Background and Purpose

    Section 5004 of the Oil Pollution Act of 1990, as codified in 33
U.S.C. 2734, directed the Coast Guard to operate additional equipment,
as necessary, to provide surveillance of tank vessels transiting Prince
William Sound, Alaska. We have done so since 1994 through a system then
known as ``Automated Dependent Surveillance.'' Advances have taken
place with this technology, now referred to as the AIS. Section 102 of
the MTSA mandates that AIS be installed and operating on most
commercial and passenger vessels on all navigable waters of the United
States.
    The version of AIS required by this interim rule automatically
broadcasts vessel and voyage-related information that is received by
other AIS-equipped ships and shore stations. In the ship-to-shore mode,
AIS enhances maritime domain awareness and allows for the efficient
exchange of vessel traffic information that previously was only
available via voice communications with a VTS. In ship-to-ship mode, an
AIS provides essential information to other vessels, such as name,
position, course, and speed that is not otherwise readily available
onboard vessels. In either mode, an AIS enhances the mariner's
situational awareness, makes possible the accurate exchange of
navigational information, mitigates collision through reliable passing
arrangements, and facilitates vessel traffic management, while
simultaneously reducing very high frequency voice transmissions.
    AISs have achieved acceptance through worldwide adoption of
performance and technical standards developed to ensure commonality,
universality, and inter-operability. These recommendations have now
been established and adopted as standards by the following diverse
international bodies: the IMO, the International Telecommunications
Union (ITU), and the International Electrotechnical Commission (IEC).
Further, installation of such equipment is required on vessels subject
to SOLAS, as amended.

Applicability and Compliance Dates

    This interim rule requires the following vessels to install and
operate AIS:
    [sbull] Vessels on international voyages subject to SOLAS under the
schedule set forth in SOLAS chapter V, regulation 19.2.4;
    [sbull] Vessels of 65 feet or more in length, not subject to SOLAS
or transiting a VTS area, in commercial service on international
voyages by December 31, 2004; and
    [sbull] The following VTS or VMRS users:
    [sbull] Self-propelled vessels of 65 feet or more in length, in
commercial service;
    [sbull] Towing vessel 26 feet or more in length and more than 600
horsepower;
    [sbull] Vessels of 100 gross tons or more carrying one or more
passengers for hire; and
    [sbull] Passenger vessels certificated to carry 50 or more
passengers for hire.
    The VTS and VMRS users must comply by: December 31, 2003, within
VTS St. Marys River; by July 1, 2004, within VTS Berwick Bay, VMRS Los
Angeles/Long Beach, VTS Lower Mississippi River, VTS Port Arthur and
VTS Prince William Sound; by December 31, 2004, within VTS Houston-
Galveston, VTS New York, VTS Puget Sound, and VTS San Francisco.
    Note that the compliance dates set forth in SOLAS differ from those
enacted in the MTSA. In this rule, where the dates differ, we have
sided with the internationally agreed upon dates of SOLAS, particularly
regarding tankers built before July 1, 2002, where the compliance date
is the first survey of these vessels for safety equipment on or after
July 1, 2003, which could extend compliance to July 1, 2004 (one year
later than the MTSA).
    However, we accelerated AIS implementation from the revised SOLAS
schedule to meet other international obligations. As of March 25, 2003,
the Saint Lawrence Seaway Development Corporation, under an
international agreement with the St. Lawrence Seaway Management
Corporation of Canada, has required AIS on vessels transiting St.
Lawrence Seaway waters from St. Lambert, Quebec to Long Point, in mid-
Lake Erie. (68 FR 9549, February 28, 2003). We anticipate VTS St. Marys
River will be AIS-capable by December 31, 2003, and at that time we
will require all VTS users, including SOLAS vessels, transiting the
Seaway and the VTS to continue AIS operation through their entire
transit.
    This acceleration also follows our plan to require AIS use in areas
where we will have an infrastructure to fully monitor and manage the
AIS data link and ensure accurate maritime domain awareness. That is
why we have, initially, decided to implement AIS predominately in VTS
and VMRS areas as they become equipped with AIS capability.
    The MTSA calls for AIS use in all navigable waters, but allows this
requirement to be waived if the Secretary finds that an AIS is not
needed for safe navigation on specified navigable waters. The Coast
Guard

[[Page 39356]]

intends to carry out this mandate completely; however, at this early
stage of AIS deployment, the Coast Guard deems it important to fully
require an AIS, particularly in congested waters, where it has the
capability to manage the AIS VHF data link. An AIS permits shore-side
base stations to perform various functions to manage the AIS data link,
such as changing operating frequencies, power outputs, and reporting
rates, should the network require it. This action may be necessary to
ensure safe navigation. The Coast Guard anticipates having these
facilities in most of our major waterways; however, until then it
intends to proceed on a rollout plan by waterway. In a notice and
request for comments published elsewhere in today's Federal Register,
the Coast Guard is seeking comments on expansion of AIS implementation
to vessels not on international voyages outside VTS and VMRS areas.

Acceleration of SOLAS AIS Implementation

    The December 2000 Amendments to SOLAS provided for a phased-in AIS
carriage schedule under chapter V, regulation 19.2.4 that started July
1, 2002, and extended to July 1, 2008, depending on ship type and
tonnage. After September 11, 2001, and in an effort to improve safety,
security and maritime domain awareness worldwide, the United States
initiated action through IMO to accelerate this implementation
schedule.
    In November 2001, the IMO Assembly, on the recommendation of the
United States and numerous other nations, adopted resolution A.924(22)
with the goals of enhancing maritime security. This resolution
instructed the Organization to develop appropriate measures to improve
maritime security. Based upon a recommendation by the United States,
the Assembly also agreed to convene an international conference in
December 2002 to formally adopt whatever measures were developed.
    In February 2002, an Intersessional Working Group of the IMO
Maritime Safety Committee (MSC) met and recommended that the AIS
carriage timeline be accelerated, in addition to several other
security-related initiatives, which are discussed in separate interim
rules published elsewhere in today's Federal Register.
    In May 2002, the Maritime Safety Committee met and accepted
amendments to SOLAS related to the accelerated AIS implementation
(including several phase-in options), for consideration at a December
2002 Diplomatic Conference. The Diplomatic Conference convened in
December 2002 and adopted the phased-in AIS carriage schedule as
described in Table 1 below.

        Table 1.--SOLAS AIS Schedule (Chapter V, Regulation 19.2.4) for Vessels on International Voyages
----------------------------------------------------------------------------------------------------------------
                 Constructed                            Type of vessel                 Implementation date
----------------------------------------------------------------------------------------------------------------
On or after July 1, 2002.....................  All.............................  July 1, 2002.
Before July 1, 2002..........................  Passenger ships (carrying 12 or   July 1, 2003.
                                                more passengers).
                                               Tankers.........................  First survey for safety
                                                                                  equipment on or after July 1,
                                                                                  2003
                                               Ships, other than passenger       July 1, 2004.
                                                ships and tankers, greater than
                                                or equal to 50,000 gross
                                                tonnage.
                                               Ships, other than passenger       First safety equipment survey
                                                ships and tankers, greater than   after July 1, 2004, or by
                                                or equal to 300, but less than    December 31, 2004, whichever
                                                50,000 gross tonnage.             occurs earlier.
----------------------------------------------------------------------------------------------------------------

    This interim rule implements this revised SOLAS schedule, as it
concerns vessels on international voyage, and through a separate notice
titled ``Automatic Identification System; Expansion of Carriage
Requirements for U.S. Waters'' [USCG-2003-14878], published elsewhere
in today's Federal Register, we seek comments regarding vessels solely
engaged in domestic voyages and not transiting a VMRS.
    The Coast Guard received some unfavorable comments regarding AIS
carriage (see USCG-1998-4399-3 at http://dms.dot.gov) in the VTS Lower
Mississippi River rulemaking docket (USCG-1998-4399). There were also
AIS comments made during the Public Meetings on Maritime Security,
discussed in the preamble to the interim rule titled ``Implementation
of National Maritime Security Initiatives,'' published elsewhere in
today's Federal Register. The Coast Guard is of the strong opinion that
an AIS should be installed not only on SOLAS vessels, but also on most
commercial vessels as soon as possible, particularly in vessel traffic
monitoring areas, such as VTS and VMRS areas. Thus, the Coast Guard is
requiring AIS carriage for non-SOLAS vessels while navigating these
areas. There is a general discussion of comments on AIS carriage
included in the preamble for the interim rule titled ``Implementation
of National Maritime Security Initiatives,'' published elsewhere in
today's Federal Register.

Automatic Identification System (AIS)

    The AIS integrates a number of technologies to enhance the safe and
efficient navigation of ships, protection of the environment, operation
of VTS, and maritime domain awareness. AIS does this by providing ship-
to-ship information for collision avoidance, and ship-to-shore
information about a ship and its cargo for traffic management and
increased maritime awareness. Included in these technologies are Global
Navigation Satellite System, frequency agile digital very high
frequency transceivers, self-organizing communications protocols, and
an architecture that allows input from and output to other shipborne
navigational equipment (for example, input from rate of turn indicator
and heading sensor; output to radar or electronic chart display
systems). Data from these technologies can be tailored to the mariner's
needs and desires. The automated operation of the AIS and the reduction
of voice interactions should enhance mariners' ability to navigate.
More than 5 million voice reports a year will be eliminated in existing
VTS areas alone by using AIS.
    The AIS transmits and receives vessel information in near real-time
from other ships and rebroadcasts from shore stations, such as--
    (1) Static Information--Vessel call sign, name, IMO identification
number, dimensions, type;
    (2) Voyage-Related Information--Draft, cargo type, destination, and
estimated time of arrival; and
    (3) Dynamic Information--Time in Universal Time Coordinated,
latitude/longitude position, course over ground, speed over ground,
heading, rate of turn, navigational status.
    The AIS provides mariners with accurate navigation information. In
addition, shore stations will be able to

[[Page 39357]]

relay pertinent navigational data from other sources, such as the
National Oceanic and Atmospheric Administration's Physical
Oceanographic Real Time System. An AIS enhances the mariner's
situational awareness, permits more effective and reliable passing
arrangements as intended by the Vessel Bridge-to-Bridge Radiotelephone
Act (33 U.S.C. 1201-1208) and the Inland Navigational Rules (33 U.S.C.
2001-2038), and provides the Coast Guard with a comprehensive and
informative traffic image not possible with radar or video
surveillance.

AIS Testing

    AIS tests and trials have been conducted by national maritime
safety administrations in a number of locations around the world
including Germany, Sweden, Finland, Singapore, South Korea, British
Columbia, the Panama Canal, the St. Lawrence Seaway, the Baltic Sea,
South Africa, and the Rhine River. The Coast Guard has conducted
numerous tests and simulations to identify various technical and
operational issues, such as the shoreside communications infrastructure
required to support full duplex operations; unit reliability,
development of operational procedures appropriate to an AIS-based VTS;
and identification of user requirements for graphical display
functionality.
    In August 1998, the Coast Guard leased 50 early-generation (Digital
Selective Calling (DSC) ITU-R M.825-3 version) transponders that were
evaluated aboard a variety of platforms. The principal purpose of this
testing was to evaluate the performance of a DSC-based system and
identify any operational and technical problems that would have to be
resolved before implementation of the latest AIS technology (ITU-R M.
1371-1 version).

Existing AIS-Like Systems

    This is not the first experience with AISs for the Coast Guard and
the maritime industry. Since July 1994, tankers operating in the Prince
William Sound area have carried DSC transponders that report to the
VTS.
    The DSC transponder system used in Prince William Sound is a one-
way system of limited capability, flexibility and potential. The VTS at
Prince William Sound remains dependent on radar and very high frequency
voice radio communications and is, in essence, a traditional VTS
augmented by a DSC system. Despite the reduced capability of this type
of transponder, it has proven valuable and has demonstrated its
potential as the foremost VTS surveillance sensor.
    The key difference between the DSC-based identification system used
in VTS Prince William Sound and the one required by this interim rule
is that the former only provides ship-to-shore (VTS) transmissions of
position data. The AIS technology being required ensures two-way
communication, radio frequency agility, greater capacity, non-
proprietary display interface standards, and a host of display
possibilities, including Electronic Chart Display Information System,
Automatic Radar Plotting Aid (ARPA), non-ARPA radar, Electronic Chart
System, Integrated Navigation System, or other proprietary graphical
user interfaces. See Technical Comparison Table 2.

   Table 2.--Technical Comparison of ITU-R M.825 Versus ITU-R M.1371-1
                               Based AIS.
------------------------------------------------------------------------
                                Digital selective    Broadcast automatic
   System characteristics         calling radio        identification
                                   transponder             system
------------------------------------------------------------------------
Technical Standards.........  ITU-R M.825-3/IEC     ITU-R M.1371-1/IEC
                               61993-1.              61993-2.
Intended Use................  Ship-to-shore.......  Ship-to-ship; ship-
                                                     to-shore; shore-to-
                                                     ship.
Message Schedule............  Shore synchronized..  Coordinated and
                                                     Synchronized. Self-
                                                     organizing timeslot
                                                     procedure.
Frequency Agility...........  Full very high        DSC reception locked
                               frequency spectrum    to very high
                               availability.         frequency Ch. 70
                                                     only. DSC
                                                     broadcasts and TDMA
                                                     reception and
                                                     broadcasts have
                                                     full very high
                                                     frequency spectrum
                                                     availability.
Radio Channels..............  One DSC (Simplex or   One DSC (Simplex).
                               Duplex).              Two TDMA (Simplex
                                                     or Duplex).
Permissive Channel Usage      No more than 15% on   No more than 7.5% on
 (loading).                    Channel 70. Up to     Channel 70. In
                               100% on dedicated     excess of 100% on
                               channel.              two dedicated
                                                     channels (AIS1/
                                                     AIS2).
Effective Data Rate.........  600 bits/second.....  Reception: 19,200
                                                     bits/second.
                                                     Broadcast: 9,600
                                                     bits/second.
System Capacity.............  9 polled messages/    TDMA: 4500 messages/
                               minute Ch. 70-60      minute plus. DSC: 4
                               polled message/       to 9 polled
                               minute not Ch 70-     messages/minute.
                               240 with special
                               shore station
                               control and
                               synchronization
                               using duplex
                               repeater.
------------------------------------------------------------------------

The Need for Standardization

    As evidenced by the number of navigation systems currently in use,
there is great interest in using technology to improve navigational
safety and maritime domain awareness. However, to correctly add
beneficial traffic information while also meeting the user demand to
avoid a multiplicity of incompatible systems, standardization was
needed. Without standardization, an AIS could not operate effectively
or achieve its maximum potential.
    Failure to adopt international standards would create a
proliferation of disparate units, with no guarantee that devices
offered by various manufacturers would be interoperable. In fact, the
DSC installation discussed in the Existing AIS-Like Systems section was
based on a standard communication protocol. However, it relies upon
proprietary software for data management and display. The Coast Guard
has been a leader in the drafting or adoption of technical standards
through its participation at IMO, ITU, and other international working
groups, including groups within the IEC; our goal being the universal
inter-operability of AIS.
    The key differences between previous technologies and AISs are that
the latter allows for reliable Self-Organizing Time-Division Multiple
Access, two-way communication, radio frequency agility, greater
capacity, and a host of display possibilities. For these reasons,
implementing international standards for AIS was a high priority for
the Coast Guard.

[[Page 39358]]

Ports and Waterways Safety System

    Recognizing the need to take advantage of this technology, the
Coast Guard has embarked in a major capitalization effort to upgrade
all existing and future VTSs with AIS capability.
    The Ports and Waterways Safety System is an effort to establish a
national transportation system that collects, processes, and
disseminates information on the marine operating environment and
maritime vessel traffic in major U.S. ports and waterways.
    The VTS mission is to monitor and assess vessel movements, exchange
information regarding vessel movements with other vessels and shore-
based personnel, and provide advisories to vessel Masters. The AIS
coverage capability and precision compared to other surveillance
technology (i.e., radar and closed circuit television (CCTV)), makes it
the sensor of choice for all future VTS operations.
    A major goal of the Ports and Waterways Safety System is to apply
AIS and other technologies that enable information gathering and
dissemination in ways that do not create an additional operational
burden for the mariner. An AIS-based VTS will augment the mariner's
navigational capability through automatic and effortless broadcast of
vessel traffic data, navigational advisories, and safety alerts.
Through AIS-based VTS technology and this rulemaking, we can maximize
the benefits of our vessel traffic management mission, provide the same
or more services, and enhance navigation.
    Each VTS has a Vessel Traffic Center (VTC) that will receive vessel
movement data from an AIS in addition to radar and CCTV, if so
equipped. An AIS-based VTS reduces the need for voice interactions,
expands situational awareness, and augments the VTS role to assist
mariners in the performance of their duties, thus mitigating the risk
of collisions.
    We have started this upgrade process and expect to complete it for
the following VTS ports by 2005: Berwick Bay, LA; Houston-Galveston,
TX; Port Arthur, TX; New Orleans, LA; New York, NY; San Francisco, CA;
Prince William Sound, AK; Puget Sound, WA; and St. Marys River, MI. As
these VTSs become AIS-capable, per the schedule established today in 33
CFR 164.46, the Coast Guard will eliminate VTS Users voice position
reports and rely upon AIS broadcasting. We will require all VTS Users
within a VTS to use an AIS.
    Given the reduced infrastructure needs of an AIS and associated
cost and operational efficiency, the Coast Guard intends to expand AIS
surveillance to other VMRS areas, such as the approaches to Los Angeles
and Long Beach Harbors, which is jointly operated by the Coast Guard
and the Southern California Marine Exchange (under the California Code
of Regulations, 14 CCR 852.20 through 852.30). Other VMRS areas are
envisioned and would be the subject of future rulemakings. However, the
Coast Guard in this interim rule defines VMRS centers, areas, and users
to distinguish them from VTS centers, areas, and users. This will allow
the Coast Guard to have monitoring capabilities in areas that may not
warrant the full interactivity of a VTS (that is, informational,
navigation assistance and active traffic organization services), but
that do warrant the Captain of the Port's (COTP's) vigilance and
greater situational awareness. It would also provide the COTPs a more
effective means to carry out their duties and communicate with vessels
reporting from within a vessel monitoring system area, and thus enhance
their maritime domain awareness.

Involvement of the Maritime Community

    We have long recognized that use of AIS on the nation's navigable
waters is a valuable asset to all mariners. In the past, many in the
maritime community have noted that to have a successful VTS, the Coast
Guard must strive to meet the needs of the users while imposing minimal
burden, especially in terms of voice communications.
    In 1997, the Coast Guard benefited from a national dialog conducted
by the Marine Board of the National Academies and its Committee on
Maritime Advanced Information Systems and ad hoc VTS committee formed
under the auspices of the Lower Mississippi River Waterway Safety
Advisory Committee. This ad hoc committee, which was made up of
representatives from the maritime community, port community,
government, and the public, was asked to define user requirements for
VTS that would accomplish the joint overall goals of safety and
efficiency. The result of this effort was a conceptual baseline VTS
plan. (See USCG-1998-4399-3 at http://dms.dot.gov). One key finding of
that plan was the need to implement AIS technology, and to incorporate
AIS as a key component of future VTS implementation. The Coast Guard
views AIS implementation not only as a key component of VTS, but also
as a valuable awareness tool that should be made available and required
in all the nation's seas and waterways.
    The Coast Guard also recognizes that wider implementation of a
surveillance capability is imperative to maritime domain awareness and
homeland security. Thus, it is moving forward with AIS capability as a
component of our nation's marine distress system network-Rescue 21.
Therefore, the Coast Guard wishes to avail itself of this opportunity
to seek comments, via the Notice accompanying this interim rule
published elsewhere in today's Federal Register, regarding expanding
AIS carriage requirements beyond those vessels and areas required in
this interim rule.

Discussion of Interim Rule

    This interim rule amends Vessel Bridge-to-Bridge Radiotelephone
Regulations in 33 CFR part 26, Vessel Traffic Management regulations in
part 161, Navigation Safety Regulations, in part 164, and the Prince
William Sound, Alaska regulated navigation area regulations in 33 CFR
165.1704. We are making the following changes to existing regulations.

Amendments to Part 26

    We are deleting Table 26.03(f) and directing the reader to newly
designated Table 161.12(c) for the same information.

Amendments to Part 161

    We are adding two definitions in Sec.  161.2--''navigable waters''
and ``Vessel Movement Center''; and revising definitions for ``Vessel
Movement Reporting System''; and ``Vessel Movement Reporting System
User'' to distinguish them from ``Vessel Traffic Service'', ``Vessel
Traffic Centers'', and ``Vessel Traffic Service Users''. Vessels within
a VTS receive a host of services (e.g., weather and navigation
advisories, reports of aids to navigation outages, and projected
traffic encounters) that will not necessarily be available from a VMRS
whose primary mission is to enhance Coast Guard maritime domain
awareness and homeland security.
    We are amending the Table 161.12(b), and redesignating it as Table
161.12(c) to reflect existing VTS and VMRS areas and their call signs,
designated frequencies, and clarifying Notes.
    We are revising Sec.  161.21 to establish a mandatory reporting and
broadcast requirement via AIS in denoted VMRS areas. The current
regulation has a voice reporting exemption for those vessels carrying
AISSE in VTS areas capable of receiving such reports, such as VTS
Prince William Sound (where the AISSE

[[Page 39359]]

requirement will remain in effect until July 1, 2004).
    We are deleting the Sailing Plan Deviation Report in Sec.  161.21,
but we are still requiring this information in the general reporting
requirements in Sec.  161.18.
    Throughout subpart B, we are adding ``VMRS'' after ``VTS'' to show
that the provisions of this subpart can apply to either a VTS and or a
VMRS.

Amendments to Part 164

    We are adding a paragraph to Sec.  164.01 to note that Sec.  164.46
applies to some vessels less than 1600 gross tons, and we are revising
Sec.  164.01(c) to add Sec.  164.46 to the list of sections not
applicable to U.S. public vessels.
    We are revising Sec.  164.02 to reflect that the AIS requirement in
part 164 applies to vessels subject to SOLAS Chapter V, Regulation
19.2.4.
    We are amending Sec.  164.03, the ``Incorporation by Reference''
section, by adding the IMO's MSC AIS performance standard (MSC.74(69)),
the ITU AIS technical standard (ITU-R M.1371-1), the IMO AIS shipborne
installation guidelines (SN/Circ.277), the SOLAS 2000 Amendments and
SOLAS 2002 Amendments (Conference resolution 1), and the IEC AIS
certification and testing standard (IEC 61993-2).
    We are renaming Sec.  164.43 as ``Automatic Identification System
Shipborne Equipment--Prince William Sound,'' and embedded an expiration
date. We are adding new Sec.  164.46 ``Automatic Identification System
(AIS)'' to address applicability, operation, placement, and use of AIS
units. In addition, we are extending AIS applicability to all vessels
subject to SOLAS; to commercial vessels 65 feet or more in length not
subject to SOLAS on an international voyage; and to other commercial
vessels required to participate in a VTS or VMRS (these vessels are all
passenger vessels certificated to have 50 or more passengers on board
and every vessel subject to Vessel Bridge-to-Bridge Radiotelephone
Act).
    Given the similarities between vessel bridge-to-bridge
radiotelephone and AIS, the usage, maintenance, and language
requirements in 33 CFR 26.04(a) and (c), 26.05, 26.06, and 26.07 for
Vessel Bridge-to-Bridge Radiotelephones, will also apply to AIS. We are
also clarifying that proper maintenance includes accurate and timely,
data entry and transmission. For vessels over 1600 gross tons, we are
requiring the AIS Pilot Plug be readily available, placed at the
conning position, and near an AC power outlet.
    The use of portable AIS units on vessels will be permissible only
if such use does not interfere with other installed navigation and
communications systems, and, such that only one unit be in operation at
a time.

Amendments to Part 165

    In Sec.  165.1704, we are amending the AISSE carriage requirement
for tankers in Prince William Sound, so that it expires, and thus
reverts to the AIS requirement, on July 1, 2004.

Incorporation by Reference

    The Director of the Federal Register has approved the material in
Sec.  164.03 for incorporation by reference under 5 U.S.C. 552 and 1
CFR part 51. You may inspect this material at U.S. Coast Guard
Headquarters where indicated under ADDRESSES. Copies of the material
are available from the sources listed in Sec.  164.03.

Regulatory Assessment

    This interim rule is not economically significant, however, it is a
``significant regulatory action'' under Executive Order 12866, and has
been reviewed by the Office of Management and Budget (OMB). It is also
significant under the regulatory policies and procedures of the
Department of Homeland Security due to significant public interest. A
more detailed Regulatory Assessment is available in the docket as
indicated under ADDRESSES. A summary of the assessment follows.

Cost Assessment

    The interim rule is requiring the carriage of an AIS on all U.S.
flag SOLAS vessels, certain domestic vessels in VTS areas, and foreign
flag vessels less than 300 gross tonnage that make ports of call in the
United States. We estimate that 438 U.S. flag SOLAS vessels, 4,121 non-
SOLAS domestic vessels, and 70 non-SOLAS foreign vessels will be
affected by the interim rule. These include the following:
    (1) Vessels subject to SOLAS;
    (2) All commercial, self-powered vessels of 65 feet or more in
length in VTS areas, including fishing vessels;
    (3) Most passenger vessels in VTS areas;
    (4) All dredges and floating plants engaged in operations in VTS
areas;
    (5) Certain commercial towing vessels of 26 feet or more in length
in VTS areas; and
    (6) Non-SOLAS foreign flag vessels that are 65 feet or more in
length that make port calls at any U.S. port.
    The estimated cost of complying with the interim rule for domestic
vessels is Present Value (PV) $66 million (2003-2012, 7 percent
discount rate). Approximately PV $5 million of this total is
attributable to U.S. flag SOLAS vessels. The remaining PV $61 million
is attributable to domestic vessels (non-SOLAS) that are affected. In
the first year of compliance, the cost of purchasing and installing
equipment and training personnel is an estimated $40 million (non-
discounted, $2 million for the U.S. flag SOLAS fleet, $38 million for
the domestic fleet). Following initial implementation, the annual cost
of compliance is an estimated $1 million (non-discounted, $0.1 million
for the U.S. flag SOLAS fleet, $0.9 million for the domestic fleet).
    Non-SOLAS foreign flag vessel costs attributed to this rule are not
included in the domestic cost calculations but are still considered
here. The PV cost for these vessels to comply with the interim rule is
estimated at $1 million over the 10-year period. The initial cost of
purchasing and installing equipment and training personnel is an
estimated $0.6 million (non-discounted). Following the initial
implementation, the annual cost of compliance is less than $0.1 million
(non-discounted).

Safety Benefits

    The Coast Guard expects both quantifiable and non-quantifiable
benefits as a result of the interim rule. Quantified benefits include
avoided property damage, injuries, fatalities, and pollution events as
a result of having an AIS. Other benefits include better situational
awareness, better information, and better communications. The interim
rule will also enhance Coast Guard missions such as marine safety and
security, aids to navigation, and maritime mobility.
    In order to quantify the benefits of AIS implementation, the Coast
Guard reviewed thousands of Marine Casualty Incident Reports (MCIRs)
from 1993-1999 that involved the vessel populations affected by this
interim rule. These incidents were used to develop a historical rate of
marine casualties in VTS areas to determine the effectiveness of AIS as
a mitigating factor. The estimated safety benefit of the interim rule
is PV $25 million (2003-2012, 7 percent discount rate). Approximately
PV $13 million is attributable to U.S. flag SOLAS vessels. The
remaining PV $12 million is attributable to domestic vessels (non-
SOLAS). The estimated average annual benefit is $5 million (non-
discounted).
    The costs of this interim rule are presented for a 10-year period.
The Regulatory Assessment available in the public docket for this
rulemaking

[[Page 39360]]

extends the assessment to a 15-year period.

Security Benefits

    This interim rule is one of six interim rules that implement
national maritime security initiatives concerning general provisions,
Area Maritime Security (ports), vessels, facilities, Outer Continental
Shelf (OCS) facilities, and AIS. The Coast Guard used the National Risk
Assessment Tool (N-RAT) to assess benefits that would result from
increased security for vessels, facilities, OCS facilities, and ports.
The N-RAT considers threat, vulnerability, and consequences for a host
of maritime entities in various security-related scenarios. For a more
detailed discussion on the N-RAT and how we employed this tool, refer
to ``Applicability of National Maritime Security Initiatives'' in the
interim rule titled ``Implementation of National Maritime Security
Initiatives'' (USCG-2003-14792) published elsewhere in today's Federal
Register. For this benefit assessment, the Coast Guard used a team of
experts to calculate a risk score for each entity and scenario before
and after the implementation of required security measures. The
difference in before and after scores indicates the benefit of the
proposed action.
    We recognize that the interim rules are a ``family'' of rules that
will reinforce and support one another in their implementation. We have
ensured, however, that risk reduction that is credited in one
rulemaking is not also credited in another. For a more detailed
discussion on the benefit assessment and how we addressed the potential
to double-count the risk reduced, refer to ``Benefit Assessment'' in
the interim rule titled ``Implementation of National Maritime Security
Initiatives'' (USCG-2003-14792) published elsewhere in today's Federal
Register.
    We determined annual risk points reduced for each of the six
interim rules using the N-RAT. The benefits are apportioned among the
Vessel, Facility, OCS Facility, AMS, and AIS requirements. As shown in
Table 3, the implementation of AIS for the affected population reduces
1,553 risk points annually through 2012. The benefits attributable for
part 101--General Provisions--were not considered separately since it
is an overarching section for all the parts.

                            Table 3.--Annual Risk Points Reduced by the Interim Rules
----------------------------------------------------------------------------------------------------------------
                                                     Annual Risk Points Reduced by Rulemaking
                                 -------------------------------------------------------------------------------
         Maritime entity              Vessel         Facility      OCS facility
                                  security plans  security plans  security plans     AMS plans          AIS
----------------------------------------------------------------------------------------------------------------
Vessels.........................         778,633           3,385           3,385           3,385           1,448
Facilities......................           2,025         469,686  ..............           2,025  ..............
OCS Facilities..................              41  ..............           9,903  ..............  ..............
Port Areas......................             587             587  ..............         129,792             105
                                 -----------------
    Total.......................         781,285         473,659          13,288         135,202           1,553
----------------------------------------------------------------------------------------------------------------

    Once we determined the annual risk points reduced, we discounted
these estimates to their present value (7 percent discount rate, 2003-
2012) so that they could be compared to the costs. We presented cost
effectiveness, or dollars per risk point reduced, in two ways: first,
we compared the first-year cost and first-year benefit because first-
year cost is the highest in our assessment as companies develop
security plans and purchase equipment. Second, we compared the 10-year
PV cost and the 10-year PV benefit. The results of our assessment are
presented in Table 4.

                    Table 4. First-Year and 10-Year PV Cost and Benefit of the Interim Rules.
----------------------------------------------------------------------------------------------------------------
                                                                   Interim Rule
                                 -------------------------------------------------------------------------------
              Item                    Vessel         Facility      OCS facility
                                  security plans  security plans  security plans     AMS plans        AIS\1\
----------------------------------------------------------------------------------------------------------------
First-year cost (millions)......            $218          $1,125              $3            $120             $41
First-year benefit..............         781,285         473,659          13,288         135,202           1,553
First-year cost effectiveness ($/            279           2,375             205             890          26,391
 risk point reduced)............
10-year PV cost (millions)......           1,368           5,399              37             477              42
10-year PV benefit..............       5,871,540       3,559,655          99,863       1,016,074          11,671
10-year PV cost effectiveness ($/            233           1,517             368             469          3,624
 risk point reduced)............
----------------------------------------------------------------------------------------------------------------
\1\ Cost less monetized safety benefit.

    Although we have quantified these security benefits relative to
AIS, the N-RAT is limited in its ability to measure benefits
attributable to intelligence or information gathering. These
limitations are discussed in the Assessment Limitations section in the
preamble of the interim rule titled ``Implementation of National
Maritime Security Initiatives'' (USCG-2003-14792) published elsewhere
in today's Federal Register.
    Congress mandated an AIS carriage requirement on domestic (non-
SOLAS) vessels in 46 U.S.C. 70114, and provided an explicit phase-in
schedule for AIS in section 102(e) of the MTSA. Strictly upon
consideration of monetized safety benefits, as measured through
decreased collisions and the resulting decrease in injuries,
mortalities, and pollution incidents, the cost of AIS installation for
the domestic fleet far outweighs the benefit over a 15-year period
(0.26 benefit-cost ratio). This ratio results from the high costs of
purchasing and installing the unit (an estimated $9,330 per vessel),
and the types of marine casualties that AIS is expected to mitigate,
where damage is not usually severe nor is there significant loss of
life. In view of the

[[Page 39361]]

benefit-cost ratio presented above, the Coast Guard will share with the
Congress any significant information provided by the public that
addresses the reasonableness of implementing the statute.
    Because there is not yet a mass market for AIS, the cost per unit
in the next few years, when the domestic fleet is required to purchase
AIS, is likely to be higher than when it is replaced (around 2012).
Because the AIS market is in its infancy, we cannot estimate how much
the unit cost will decrease over the next decade. If many manufactures
enter the market, costs are likely to drop through competition. Because
manufacturers have a potential world market and a significant U.S.
market, many may attempt to capture a segment. Conversely, if only a
few players emerge worldwide, AIS costs could remain high. Because
manufacturers must engage in a rigorous approval process and cannot be
assured that they will recoup research and development costs through
unit sales, there is the potential that only a few dominant players
will emerge in the AIS market. Because we cannot determine the trend of
the AIS market, and we did not want to understate the cost for AIS, we
assumed that the cost for units in 2012 would again be approximately
$9,000 per unit. It is possible that an AIS unit will not be this
expensive to replace.
    In terms of security, we estimated that we will not experience a
significant benefit from a decrease in risk, as measured in risk points
reduced in the N-RAT, as a result of AIS installation. There are two
primary reasons for this estimate. First, the N-RAT was an internal
Coast Guard tool that was modified to estimate the national benefits
attributable to the suite of security rulemakings mandated by the MTSA.
The tool was not designed to measure the security benefits of AIS
specifically. The N-RAT does not, therefore, robustly capture the risk
mitigation potential of AIS. Secondly, the Coast Guard strongly
believes that AIS is critical to maritime domain awareness. We are
unable to quantify or monetize the benefits of this Coast Guard mission
or the individual contribution of AIS.
    While the monetized benefit of the rule does not exceed its cost,
the Coast Guard believes that AIS has the potential to mitigate a
Transportation Security Incident (TSI) as described in the MTSA. The
Coast Guard recognizes that a single sensor, such as AIS, will not
likely prevent a TSI alone--but if AIS can have a mitigating effect on
just a single TSI, the security benefit could be significant. The Coast
Guard must consider AIS in its suite of security rulemakings and has
developed an interim rulemaking that considers the mandates of the MTSA
in light of the high initial costs of purchasing the unit, by requiring
AIS in VTS areas only for the domestic fleet. We are concentrating our
efforts in VTS areas, since this is where we can begin accruing the
most benefit--for industry, the public, and the Coast Guard--in the
shortest period of time. Through our interim rulemaking, we are
attempting to maximize the return to our investment as quickly as
practical.

Small Entities

    Under the Regulatory Flexibility Act (5 U.S.C. 601-612), we have
considered whether this rule would have a significant economic impact
on a substantial number of small entities. The term ``small entities''
comprises small businesses, not-for-profit organizations that are
independently owned and operated and are not dominant in their fields,
and governmental jurisdictions with populations of less than 50,000.
This rule does not require a general notice of proposed rulemaking and,
therefore, is exempt from the requirements of the Regulatory
Flexibility Act. Although this rule is exempt, we have reviewed it for
potential economic impacts on small entities. An Initial Regulatory
Flexibility Analysis discussing the impact of this rule on small
entities is available in the docket where indicated under ADDRESSES.

Number and Types of Small Entities Affected

U.S. Flag SOLAS Vessels

    Of the affected population, we estimate that 205 U.S. flag SOLAS
vessels, of 438 total, are owned by 122 small businesses. Approximately
40 large companies own the remaining 233 U.S. flag SOLAS vessels.
    We estimate the cost of an AIS per vessel in the first year will be
$9,330. Of this, $7,000 is for the AIS unit, $2,000 is for
installation, and $330 is for mariner training. We estimate that
following installation, each AIS will require $250 in annual
maintenance to replace such items as the antenna, keyboard, and display
screen. The entire unit will be replaced after 8 years.
    We found that annual maintenance costs will have a less-than-1-
percent impact on annual revenue for all small businesses with U.S.
flag SOLAS vessels. First-year impacts to small businesses, therefore,
are the focus of this assessment. To estimate the revenue impact on
small businesses in the first year, the cost per vessel for an AIS,
$9,330, is multiplied by the number of vessels owned by each company,
then divided by the average annual revenue for each company, as
reported in the online databases noted above. Of the 122 small
businesses that own U.S. flag SOLAS vessels, we found revenue for 59 of
them (48 percent). If we could not find revenue data for a business, we
assumed the business was small. For the remaining 63 small entities
without revenue data, we expanded the revenue impacts from the known 59
companies. For example, if 73 percent of 59 small entities (43
entities) had a 0-3 percent impact on their average annual revenues,
then 73 percent of 63 small entities (47 entities) had a 0-3 percent
impact, for a total of 90 small entities with an annual revenue impact
of 0-3 percent. Table 5 presents the revenue impact for the 59 entities
with known average annual revenue and the expanded results for the 63
entities without revenue information.

 Table 5.--Effect of First-Year Cost on Average Annual Revenue for Small Entities Owning U.S. Flag SOLAS Vessels
----------------------------------------------------------------------------------------------------------------
                                                                                     Expanded
                                                     Number of      Percent of       number of      Total small
Percent of annual revenue that is first-year AIS   entities with   entities with   entities with   entities per
                      cost                         known annual    known annual   unknown annual      impact
                                                     revenues        revenues        revenues        category
----------------------------------------------------------------------------------------------------------------
0-3%............................................              43              73              47              90
 3-5%................................               5               8               5              10
 5-10%...............................               4               7               4               8
 10-20%..............................               6              10               6              12
 20-30%..............................               0               0               0               0

[[Page 39362]]

 30%.................................               1               2               1               2
                                                 -----------------
    Total.......................................              59             100              63            122
----------------------------------------------------------------------------------------------------------------
Detail may not calculate to total due to independent rounding.

Number and Types of Small Entities Affected: Non-SOLAS Fleet in VTS
Areas

    We estimate that there are 1,491 small businesses that will be
affected by the interim rule that own non-SOLAS vessels that transit
VTS areas. These 1,491 companies own 2,360 vessels, representing 57
percent of the 4,121 non-SOLAS vessels affected by the rule. An
estimated 1,456 vessels (35 percent) are owned by 150 large businesses,
and 55 vessels (1 percent) are owned by State and local governments. We
have 248 vessels that transit VTS areas (7 percent of the non-SOLAS
fleet) that have no company associated with the vessel whatsoever, due
to missing company information in our data. We cannot be certain if
these vessels belong to small, large, or government entities and do not
apportion these 248 vessels to one type of entity or another.
    As with the U.S. flag SOLAS fleet, annual cost following
installation of an AIS will have little impact on annual revenues--a
less-than-1-percent impact on annual revenue for most small businesses.
The first-year cost of the interim rule, therefore, will again have the
greatest impact on average annual revenue. To estimate the revenue
impact on small businesses in the first year, the cost per vessel for
an AIS, $9,330, multiplied by the number of vessels owned by each
company, then divided by the average annual revenue for each company.
Of the 1,491 small businesses that own non-SOLAS vessels in VTS areas,
we found revenue for 453 of them (30 percent). As with the assessment
for the U.S. flag SOLAS fleet, if we could not find revenue data for a
business, we assumed the business was small. For the remaining 1,038
small entities without revenue data, we expanded the revenue impacts
for the known 453 companies. The results of the assessment for the non-
SOLAS fleet in VTS areas are presented in Table 6.

Table 6.--Effect of First-Year Cost on Average Annual Revenue for Small Entities Owning Non-SOLAS Vessels in VTS
                                                      Areas
----------------------------------------------------------------------------------------------------------------
                                                                                     Expanded
                                                     Number of      Percent of       number of      Total small
Percent of annual revenue that is first-year AIS   entities with   entities with   entities with   entities per
                      cost                         known annual    known annual   unknown annual      impact
                                                     revenues        revenues        revenues        category
----------------------------------------------------------------------------------------------------------------
0-3%............................................             334              74             767           1,101
 3-5%................................              47              10             104             151
 5-10%...............................              34               8              83             117
 10-20%..............................              20               4              42              62
 20-30%..............................              11               2              21              32
 30%.................................               7               2              21              28
                                                 -----------------
    Total.......................................             453             100           1,038          1,491
----------------------------------------------------------------------------------------------------------------
Detail may not calculate to total due to independent rounding.

    As shown, the interim rule will have a less-than-3-percent impact
on 74 percent of small businesses in the first year it is in effect.
Approximately 92 percent have a less-than-10-percent impact. We
conclude, therefore, that the interim rule may have a significant
economic impact on a substantial number of small entities.

Assistance for Small Entities

    Under section 213(a) of the Small Business Regulatory Enforcement
Fairness Act of 1996 (Public Law 104-121), we want to assist small
entities in understanding this rule so that they can better evaluate
its effects on them and participate in the rulemaking. If the rule
would affect your small business, organization, or governmental
jurisdiction and you have questions concerning its provisions or
options for compliance, please consult Mr. Jorge Arroyo (G-MWV) by
telephone 202-267-1103, toll-free telephone 1-800-842-8740 ext. 7-1103,
or electronic mail msregs@comdt.uscg.mil.    Small businesses may send comments on the actions of Federal
employees who enforce, or otherwise determine compliance with, Federal
regulations to the Small Business and Agriculture Regulatory
Enforcement Ombudsman and the Regional Small Business Regulatory
Fairness Boards. The Ombudsman evaluates these actions annually and
rates each agency's responsiveness to small business. If you wish to
comment on actions by employees of the Coast Guard, call 1-888-REG-FAIR
(1-888-734-3247).

Collection of Information

    This rule calls for no new collection of information under the
Paperwork Reduction Act of 1995 (44 U.S.C. 3501-3520). The reports
required by this rule are considered to be operational communications,
transitory in nature, and, therefore, do not constitute the collection
of information under the Paperwork Reduction Act.

[[Page 39363]]

Federalism

    A rule has implications for federalism under Executive Order 13132,
Federalism, if it has a substantial direct effect on State or local
governments and would either preempt State law or impose a substantial
direct cost of compliance on them. It is well settled that States may
not regulate in categories reserved for regulation by the Coast Guard.
It is also well settled, now, that all of the categories covered in 46
U.S.C. 3306, 3703, 7101, and 8101 (design, construction, alteration,
repair, maintenance, operation, equipping, personnel qualification, and
manning of vessels), as well as the reporting of casualties and any
other category in which Congress intended the Coast Guard to be the
sole source of a vessel's obligations, are within the field foreclosed
from regulation by the States. In addition, under the authority of
Title I of the Ports and Waterways Safety Act, 33 U.S.C. 1221-1232
(specifically 33 U.S.C. 1223) and the MTSA our regulation will preempt
any State action on the subject of automatic identification system
carriage requirements. (See the decision of the Supreme Court in the
consolidated cases of United States v. Locke and Intertanko v. Locke,
529 U.S. 89, 120 S.Ct. 1135 (March 6, 2000).) Our AIS carriage
requirement rule falls into the category of equipping of vessels.
Because the States may not regulate within this category, preemption
under Executive Order 13132 is not an issue.

Unfunded Mandates Reform Act

    The Unfunded Mandates Reform Act of 1995 (2 U.S.C. 1531-1538)
requires Federal agencies to assess the effects of their regulatory
actions not specifically required by law. In particular, the Act
addresses actions that may result in the expenditure by a State, local,
or tribal government, in the aggregate, or by the private sector of
$100 million or more in any one year. We do discuss the effects of this
interim rule elsewhere in this preamble. However, this interim rule is
exempted from assessing the effects of the regulatory action as
required by the Act because it is necessary for the national security
of the United States (2 U.S.C. 1503(5)).

Taking of Private Property

    This interim rule will not effect a taking of private property or
otherwise have taking implications under Executive Order 12630,
Governmental Actions and Interference with Constitutionally Protected
Property Rights.

Civil Justice Reform

    This interim rule meets applicable standards in sections 3(a) and
3(b)(2) of Executive Order 12988, Civil Justice Reform, to minimize
litigation, eliminate ambiguity, and reduce burden.

Protection of Children

    The Coast Guard has analyzed this interim rule under Executive
Order 13045, Protection of Children from Environmental Health Risks and
Safety Risks. This interim rule is not an economically significant
rule, and does not concern an environmental risk to health or risk to
safety that may disproportionately affect children.

Indian Tribal Governments

    This interim rule does not have tribal implications under Executive
Order 13175, Consultation and Coordination with Indian Tribal
Governments, because it would not have a substantial direct effect on
one or more Indian tribes, on the relationship between the Federal
Government and Indian tribes, or on the distribution of power and
responsibilities between the Federal Government and Indian tribes. We
invite your comments, however, on how this interim rule might impact
tribal governments, even if that impact may not constitute a ``tribal
implication'' under the Order.

Energy Effects

    We have analyzed this interim rule under Executive Order 13211,
Actions Concerning Regulations That Significantly Affect Energy Supply,
Distribution, or Use. We have determined that it is not a ``significant
energy action'' under that order because it is not an economically
significant regulatory action and is therefore not likely to have a
significant adverse effect on the supply, distribution, or use of
energy even though it is a ``significant regulatory action'' under
Executive Order 12866. It has not been designated by the Administrator
of the Office of Information and Regulatory Affairs as a significant
energy action. Therefore, it does not require a Statement of Energy
Effects under Executive Order 13211.

Trade Impact Assessment

    The Trade Agreement Act of 1979 (19 U.S.C. 2501-2582) prohibits
Federal agencies from engaging in any standards or related activities
that create unnecessary obstacles to the foreign commerce of the United
States. Legitimate domestic objectives, such as safety and security,
are not considered unnecessary obstacles. The Act also requires
consideration of international standards and, where appropriate, that
they be the basis for U.S. standards. We have assessed the potential
effect of this interim rule and have determined that it is not likely
to create substantial obstacles to the foreign commerce of the United
States because we are implementing an international standards (IEC/IMO/
ITU). In addition, because these regulations are being put in place in
order to further a legitimate domestic objective, namely to increase
the safety of vessels and the security of the United States, any
obstacles created by the regulation are not considered unnecessary
obstacles.

Environment

    We have considered the environmental impact of this rule and
concluded that under figure 2-1, paragraphs (34)(d), (34)(e), and
(34)(i) of Commandant Instruction M16475.lD, this rule is categorically
excluded from further environmental documentation. This interim rule
concerns vessel equipment requirements that will contribute to higher
levels of marine safety and maritime domain awareness for U.S. ports
and waterways. A ``Categorical Exclusion Determination'' is available
in the docket where indicated under ADDRESSES or SUPPLEMENTARY
INFORMATION.
    This rulemaking will not significantly impact the coastal zone.
Further, the rulemaking and the execution of this rule will be done in
conjunction with appropriate State coastal authorities. The Coast Guard
will, therefore, comply with the requirements of the Coastal Zone
Management Act while furthering its intent to protect the coastal zone.

List of Subjects

33 CFR Part 26

    Communications equipment, Marine safety, Radiotelephone, Vessels.

33 CFR Part 161

    Harbors, Navigation (water), Reporting and recordkeeping
requirements, Vessels, Waterways.

33 CFR Part 164

    Incorporation by reference, Marine safety, Navigation (water),
Reporting and recordkeeping requirements, Waterways.

33 CFR Part 165

    Harbors, Marine safety, Navigation (water), Reporting and
recordkeeping requirements, Security measures, Waterways.

0
For the reasons discussed in the preamble, the Coast Guard amends 33
CFR parts 26, 161, 164, and 165 as follows:

[[Page 39364]]

PART 26--VESSEL BRIDGE-TO-BRIDGE RADIOTELEPHONE REGULATIONS

0
1. Revise the authority for part 26 to read as follows:

    Authority: 14 U.S.C. 2; 33 U.S.C. 1201-1208; Pub. L. 107-295,
116 Stat. 2064; Department of Homeland Security Delegation No. 0170;
Rule 1, International Regulations for the Prevention of Collisions
at Sea.

0
2. In Sec.  26.03, in paragraph (f), remove the words, ``Table 26.03(f)
(VTS Call Signs, Designated Frequencies, and Monitoring Areas).'', and
add, in their place, the words ``Table 161.12(c) (VTS and VMRS Centers,
Call Signs/MMSI, Designated Frequencies, and Monitoring Areas).'', and
delete Table 26.03(f).

PART 161--VESSEL TRAFFIC MANAGEMENT

0
3. Revise the authority for part 161 to read as follows:

    Authority: 33 U.S.C. 1223, 1231; 46 U.S.C. 70114, 70117; Pub. L.
107-295, 116 Stat. 2064; Department of Homeland Security Delegation
No. 0170.

0
4. In Sec.  161.2--
0
a. Revise the definitions for ``Vessel Movement Reporting System
(VMRS)'', ``Vessel Movement Reporting System (VMRS) User''; and
0
b. Add the definitions for ``navigable waters'' and ``Vessel Movement
Center (VMC)'', in alphabetical order, to read as follows:

Sec.  161.2  Definitions.

* * * * *
    Navigable waters means all navigable waters of the United States
including the territorial sea of the United States, extending to 12
nautical miles from United States baselines, as described in
Presidential Proclamation No. 5928 of December 27, 1988.
* * * * *
    Vessel Movement Center (VMC) means the shore-based facility that
operates the vessel tracking system for a Vessel Movement Reporting
System (VMRS) area or sector within such an area. The VMC does not
necessarily have the capability or qualified personnel to interact with
marine traffic, nor does it necessarily respond to traffic situations
developing in the area, as does a Vessel Traffic Service (VTS).
    Vessel Movement Reporting System (VMRS) means a mandatory reporting
system used to monitor and track vessel movements. This is accomplished
by a vessel providing information under established procedures as set
forth in this part in the areas defined in Table 161.12(c) (VTS and
VMRS Centers, Call Signs/MMSI, Designated Frequencies, and Monitoring
Areas).
    Vessel Movement Reporting System (VMRS) User means a vessel, or an
owner, operator, charterer, Master, or person directing the movement of
a vessel that is required to participate in a VMRS.
* * * * *

0
5. In Sec.  161.12--
0
a. Redesignate paragraphs (a)(1), (b), Table 161.12(b), and paragraph
(c) as (b), (c), Table 161.12(c), and (d), respectively;
0
b. Revise newly designated paragraph (c) and newly designated Table
161.12(c) to read as follows:

Sec.  161.12  Vessel operating requirements.

* * * * *
    (c) When not exchanging voice communications, a VTS User must
maintain a listening watch as required by Sec.  26.04(e) of this
chapter on the VTS frequency designated in Table 161.12(c) (VTS and
VMRS Centers, Call Signs/MMSI, Designated Frequencies, and Monitoring
Areas). In addition, the VTS User must respond promptly when hailed and
communicate in the English language.

    Note to Sec.  161.12(c): As stated in 47 CFR 80.148(b), a very
high frequency watch on Channel 16 (156.800 MHz) is not required on
vessels subject to the Vessel Bridge-to-Bridge Radiotelephone Act
and participating in a Vessel Traffic Service (VTS) system when the
watch is maintained on both the vessel bridge-to-bridge frequency
and a designated VTS frequency.

      Table 161.12(c).--VTS and VMRS Centers, Call Signs/MMSI, Designated Frequencies, and Monitoring Areas
----------------------------------------------------------------------------------------------------------------
                                              Designated frequency (Channel
         Center MMSI 1 Call Sign                 designation)--purpose 2              Monitoring area 3 4
----------------------------------------------------------------------------------------------------------------
Berwick Bay 003669950--
Berwick Traffic..........................  156.550 MHz (Ch. 11)..............  The waters south of 29[deg]45'
                                                                                N., west of 91[deg]10' W., north
                                                                                of 29[deg]37' N., and east of
                                                                                91[deg]18' W.
Houston-Galveston--003669954.............  ..................................  The navigable waters north of
                                                                                29[deg] N., west of 94[deg]20'
                                                                                W., south of 29[deg]49' N., and
                                                                                east of 95[deg]20' W.
Houston Traffic..........................  156.550 MHz (Ch. 11)..............  The navigable waters north of a
                                           156.250 Mhz (Ch. 5A)..............   line extending due west from the
                                           --For Sailing Plans only..........   southern most end of Exxon Dock
                                                                                1 (20[deg]43.37' N.,
                                                                                95[deg]01.27' W.).
Houston Traffic..........................  156.600 MHz (Ch. 12)..............  The navigable waters south of a
                                           156.250 Mhz (Ch. 5A)..............   line extending due west from the
                                           --For Sailing Plans only..........   southern most end of Exxon Dock
                                                                                1 (29[deg]43.37' N.,
                                                                                95[deg]01.27' W.)
Los Angeles/Long Beach: MMSI/To be                                             .................................
 determined
San Pedro Traffic........................  156.700 MHz (Ch.14)...............  Vessel Movement Reporting System
                                                                                Area: The navigable waters
                                                                                within a 25 nautical mile radius
                                                                                of Point Fermin Light
                                                                                (33[deg]42.3' N., 118[deg]17.6'
                                                                                W.).
Louisville: Not applicable
Louisville Traffic.......................  156.650 MHz (Ch. 13)                The waters of the Ohio River
                                                                                between McAlpine Locks (Mile
                                                                                606) and Twelve Mile Island
                                                                                (Mile 593), only when the
                                                                                McAlpine upper pool gauge is at
                                                                                approximately 13.0 feet or
                                                                                above.
Lower Mississippi River 5--0036699952                                          .................................
New Orleans Traffic......................  156.700 MHz (Ch.14)...............  The navigable waters of the Lower
                                                                                Mississippi River below
                                                                                30[deg]38.7' N., 91[deg]17.5' W.
                                                                                (Port Hudson Light at 255 miles
                                                                                Above Head of Passes (AHP)), the
                                                                                Southwest Pass, and, within a 12
                                                                                nautical miles radius around
                                                                                28[deg]54.3' N., 89[deg]25.7' W.
                                                                                (Southwest Pass Entrance Light
                                                                                at 19.9 miles Below Head of
                                                                                Passes).

[[Page 39365]]

New Orleans Traffic......................  156.600 MHz (Ch.12)...............  New Orleans Sector. The navigable
                                                                                waters of the Lower Mississippi
                                                                                River bounded on the north by a
                                                                                line drawn perpendicularly at
                                                                                29[deg]56.4' N., 90[deg]08.36'
                                                                                W. and on the south by a line
                                                                                drawn perpendicularly at
                                                                                29[deg]56.24' N., 89[deg]59.86'
                                                                                W. (88 and 106 miles AHP).
New York--003669951
New York Traffic.........................  156.550 MHz (Ch. 11)..............  The area consists of the
                                           --For Sailing Plans only..........   navigable waters of the Lower
                                           156.600 MHz (Ch. 12)..............   New York Bay bounded on the east
                                           --For vessels at anchor...........   by a line drawn from Norton
                                                                                Point to Breezy Point; on the
                                                                                south by a line connecting the
                                                                                entrance buoys at the Ambrose
                                                                                Channel, Swash Channel, and
                                                                                Sandy Hook Channel to Sandy Hook
                                                                                Point; and on the southeast
                                                                                including the waters of Sandy
                                                                                Hook Bay south to a line drawn
                                                                                at latitude 40 25' N; then west
                                                                                in the Raritan Bay to the
                                                                                Raritan River Railroad Bridge,
                                                                                then north into waters of the
                                                                                Arthur Kill and Newark Bay to
                                                                                the Lehigh Valley Draw Bridge at
                                                                                latitude 40 41.9N; and then east
                                                                                including the waters of the Kill
                                                                                Van Kull and the Upper New York
                                                                                Bay north to a line drawn east-
                                                                                west from the Holland Tunnel
                                                                                ventilator shaft at latitude 40
                                                                                43.7' N, longitude 74 01.6' W,
                                                                                in the Hudson River; and then
                                                                                continuing east including the
                                                                                waters of the East River to the
                                                                                Throgs Neck Bridge, excluding
                                                                                the Harlem River.
New York Traffic.........................  156.700 MHz (Ch. 14)..............  The navigable waters of the Lower
                                                                                New York Bay west of a line
                                                                                drawn from Norton Point to
                                                                                Breezy Point; and north of a
                                                                                line connecting the entrance
                                                                                buoys of Ambrose Channel, Swash
                                                                                Channel, and Sandy Hook Channel,
                                                                                to Sandy Hook Point; on the
                                                                                southeast including the waters
                                                                                of the Sandy Hook Bay south to a
                                                                                line drawn at latitude 40 25' N;
                                                                                then west into the waters of
                                                                                Raritan Bay East Reach to a line
                                                                                drawn from Great Kills Light
                                                                                south through Raritan Bay East
                                                                                Reach LGB 14 to Comfort
                                                                                PT, NJ; then north including the
                                                                                waters of the Upper New York Bay
                                                                                south of 40 42.40' N (Brooklyn
                                                                                Bridge) and 40 43.70' N (Holland
                                                                                Tunnel Ventilator Shaft); west
                                                                                through the KVK into the Arthur
                                                                                Kill north of 40 38.25' N
                                                                                (Arthur Kill Railroad Bridge);
                                                                                then north into the waters of
                                                                                the Newark Bay, south of 40
                                                                                41.95' N (Lehigh Valley Draw
                                                                                Bridge).
New York Traffic.........................  156.600 MHz (Ch. 12)..............  The navigable waters of the
                                                                                Raritan Bay south to a line
                                                                                drawn at latitude 40 26' N; then
                                                                                west of a line drawn from Great
                                                                                Kills Light south through the
                                                                                Raritan Bay East Reach LGB
                                                                                14 to Point Comfort,
                                                                                NJ; then west to the Raritan
                                                                                River Railroad Bridge; and north
                                                                                including the waters of the
                                                                                Arthur Kill to 40 28.25' N
                                                                                (Arthur Kill Railroad Bridge);
                                                                                including the waters of the East
                                                                                River north of 40 42.40' N
                                                                                (Brooklyn Bridge) to the Throgs
                                                                                Neck Bridge, excluding the
                                                                                Harlem River.
Port Arthur 5--003669955                   ..................................  .................................
Sabine Traffic...........................  To be determined..................  The navigable waters south of
                                                                                30[deg]10' N., east of
                                                                                94[deg]20' W., west of
                                                                                93[deg]22' W, and, north of
                                                                                29[deg] 10' N.
Prince William Sound--003669958            ..................................  .................................
Valdez Traffic...........................  156.650 MHz (Ch. 13)..............  The navigable waters south of
                                                                                61[deg]05' N., east of
                                                                                147[deg]20' W., north of 60[deg]
                                                                                N., and west of 146[deg]30' W.;
                                                                                and, all navigable waters in
                                                                                Port Valdez.
Puget Sound 6                              ..................................  .................................
Seattle Traffic--003669957...............  156.700 MHz (Ch. 14)..............  The waters of Puget Sound, Hood
                                                                                Canal and adjacent waters south
                                                                                of a line connecting Marrowstone
                                                                                Point and Lagoon Point in
                                                                                Admiralty Inlet and south of a
                                                                                line drawn due east from the
                                                                                southernmost tip of Possession
                                                                                Point on Whidbey Island to the
                                                                                shoreline.
Seattle Traffic--003669957...............  156.250 MHz (Ch. 5A)..............  The waters of the Strait of Juan
                                                                                de Fuca east of 124[deg]40' W.
                                                                                excluding the waters in the
                                                                                central portion of the Strait of
                                                                                Juan de Fuca north and east of
                                                                                Race Rocks; the navigable waters
                                                                                of the Strait of Georgia east of
                                                                                122[deg]52' W.; the San Juan
                                                                                Island Archipelago, Rosario
                                                                                Strait, Bellingham Bay;
                                                                                Admiralty Inlet north of a line
                                                                                connecting Marrowstone Point and
                                                                                Lagoon Point and all waters east
                                                                                of Whidbey Island North of a
                                                                                line drawn due east from the
                                                                                southernmost tip of Possession
                                                                                Point on Whidbey Island to the
                                                                                shoreline.
Tofino Traffic--003160012................  156.725 MHz (Ch. 74)..............  The waters west of 124[deg]40' W.
                                                                                within 50 nautical miles of the
                                                                                coast of Vancouver Island
                                                                                including the waters north of
                                                                                48[deg] N., and east of 127[deg]
                                                                                W.
Victoria Traffi--003160010...............  156.550 MHz (Ch. 11)..............  The waters of the Strait of
                                                                                Georgia west of 122[deg] 52' W.,
                                                                                the navigable waters of the
                                                                                central Strait of Juan de Fuca
                                                                                north and east of Race Rocks,
                                                                                including the Gulf Island
                                                                                Archipelago, Boundary Pass and
                                                                                Haro Strait.

[[Page 39366]]

San Francisco--003669956                                                       .................................
San Francisco Traffic....................  156.700 MHz (Ch. 14)..............  The navigable waters of the San
                                                                                Francisco Offshore Precautionary
                                                                                Area, the navigable waters
                                                                                shoreward of the San Francisco
                                                                                Offshore Precautionary Area east
                                                                                of 122[deg]42.0' W. and north of
                                                                                37[deg]40.0' N. extending
                                                                                eastward through the Golden
                                                                                Gate, and the navigable waters
                                                                                of San Francisco Bay and as far
                                                                                east as the port of Stockton on
                                                                                the San Joaquin River, as far
                                                                                north as the port of Sacramento
                                                                                on the Sacramento River.
San Francisco Traffic....................  156.600 MHz (Ch. 12)..............  The navigable waters within a 38
                                                                                nautical mile radius of Mount
                                                                                Tamalpais (37[deg]55.8' N.,
                                                                                122[deg]34.6' W.) west of
                                                                                122[deg]42.0' W. and south of
                                                                                37[deg]40.0' N and excluding the
                                                                                San Francisco Offshore
                                                                                Precautionary Area.
St. Marys River--003669953
Soo Traffic..............................  156.600 MHz (Ch. 12)..............  The waters of the St. Marys River
                                                                                between 45[deg]57' N. (De Tour
                                                                                Reef Light) and 46[deg]38.7' N.
                                                                                (lle Parisienne Light), except
                                                                                the St. Marys Falls Canal and
                                                                                those navigable waters east of a
                                                                                line from 46[deg]04.16' N. and
                                                                                46[deg]01.57' N. (La Pointe to
                                                                                Sims Point in Potagannissing Bay
                                                                                and Worsley Bay).
----------------------------------------------------------------------------------------------------------------
Notes:
1 Maritime Mobile Service Identifier (MMSI) is a unique nine-digit number assigned that identifies ship
  stations, ship earth stations, coast stations, coast earth stations, and group calls for use by a digital
  selective calling (DSC) radio, an INMARSAT ship earth station or AIS. AIS requirements are set forth in Sec.
  Sec.   161.21 and 164.46 of this subchapter.
2 In the event of a communication failure, difficulties or other safety factors, the Center may direct or permit
  a user to monitor and report on any other designated monitoring frequency or the bridge-to-bridge navigational
  frequency, 156.650 MHz (Channel 13) or 156.375 MHz (Ch. 67), to the extent that doing so provides a level of
  safety beyond that provided by other means. The bridge-to-bridge navigational frequency, 156.650 MHz (Ch. 13),
  is used in certain monitoring areas where the level of reporting does not warrant a designated frequency.
3 All geographic coordinates (latitude and longitude) are expressed in North American Datum of 1983 (NAD 83).
4 Some monitoring areas extend beyond navigable waters. Although not required, users are strongly encouraged to
  maintain a listening watch on the designated monitoring frequency in these areas. Otherwise, they are required
  to maintain watch as stated in 47 CFR 80.148.
5 Until rules regarding VTS Lower Mississippi River and VTS Port Arthur are published, vessels are exempted of
  all VTS and VMRS requirements set forth in 33 CFR part 161, except those set forth in Sec.  Sec.   161.21 and
  164.46 of this subchapter.
6 A Cooperative Vessel Traffic Service was established by the United States and Canada within adjoining waters.
  The appropriate Center administers the rules issued by both nations; however, enforces only its own set of
  rules within its jurisdiction. Note, the bridge-to-bridge navigational frequency, 156.650 MHz (Ch. 13), is not
  so designated in Canadian waters, therefore users are encouraged and permitted to make passing arrangements on
  the designated monitoring frequencies.

* * * * *

Sec.  161.15  [Amended]

0
6. In Sec.  161.15--
0
a. In paragraph (a), remove the word ``manage'' and add, in its place,
the word ``monitor'';
0
b. In paragraph (a), following the words ``within a VTS'', add the
words ``or VMRS'';
0
c. In paragraph (a) following the words ``directed by the'', remove the
word ``VTS'' and add, in its place, the word ``Center'';
0
d. In paragraph (b), remove the word ``four'' and add, in its place,
the word ``three''; and
0
e. In paragraph (b), following the word ``position'', remove the words
``sailing plan deviation''.

0
7. In Sec.  161.16, revise the introductory text to read as follows:

Sec.  161.16  Applicability.

    Unless otherwise stated, the provisions of this subpart apply to
the following vessels and VMRS Users:
* * * * *

0
8. Revise Sec.  161.17 to read as follows:

Sec.  161.17  Definitions.

    As used in this subpart:
    Center means a Vessel Traffic Center or Vessel Movement Center.
    Published means available in a widely-distributed and publicly
available medium (e.g., VTS User's Manual, ferry schedule, Notice to
Mariners).

Sec.  161.18  [Amended]

0
9. In Sec.  161.18--
0
a. In paragraph (a), remove the word ``VTS'' and add, in its place
``Center'';
0
b. In paragraphs (b) and (c), remove the words ``Table 161.12(b) (VTS
Call Signs, Designated Frequencies, and Monitoring Areas)'' and add, in
their place ``Table 161.12(c) (VTS and VMRS Centers, Call Signs/MMSI,
Designated Frequencies, and Monitoring Areas)'';
0
c. Redesignate paragraph (d) as paragraph (e); and
0
d. Add new paragraph (d) to read as follows:

Sec.  161.18  Reporting requirements.

* * * * *
    (d) A vessel must report:
    (1) Any significant deviation from its Sailing Plan, as defined in
Sec.  161.19, or from previously reported information; or
    (2) Any intention to deviate from a VTS issued measure or vessel
traffic routing system.
* * * * *

Sec.  161.20  [Amended]

0
10. In Sec.  161.20--
0
a. In paragraph (a), remove the word ``VTS'' and add, in its place, the
word ``VMRS'';
0
b. In paragraph (c), remove the word ``VTC'' and add, in its place, the
word ``Center''; and
0
c. Remove the note at the end of the section.

0
11. Revise Sec.  161.21 to read as follows:

Sec.  161.21  Automated reporting.

    (a) Unless otherwise directed, vessels equipped with an Automatic
Identification System (AIS) are required to make continuous, all
stations, AIS broadcasts, in lieu of voice Position Reports, to those
Centers denoted in Table 161.12(c) of this part.
    (b) Should an AIS become non-operational, while or prior to
navigating a VMRS area, it should be restored to

[[Page 39367]]

operating condition as soon as possible, and, until restored a vessel
must:
    (1) Notify the Center;
    (2) Make voice radio Position Reports at designated reporting
points as required by Sec.  161.20(b) of this part; and
    (3) Make any other reports as directed by the Center.

Sec.  161.23  [Amended]

0
12. In Sec.  161.23, in paragraph (b)(1), remove the word ``VTS'' and,
in its place, add the word ``VMRS''; remove paragraph (c); and remove
the note at the end of the section.

Subpart C-Vessel Traffic Service and Vessel Movement Reporting
System Areas and Reporting Points

0
13. Revise the heading for subpart C to read as set forth immediately
above.

PART 164--NAVIGATION SAFETY REGULATIONS

0
14. Revise the authority citation for part 164 to read as follows:

    Authority: 33 U.S.C. 1223, 1231; 46 U.S.C. 2103, 3703, 70114,
70117; Pub. L. 107-295, 116 Stat. 2064; Department of Homeland
Security Delegation No. 0170. Sec. 164.13 also issued under 46
U.S.C. 8502. Sec. 164.61 also issued under 46 U.S.C. 6101.

0
15. In Sec.  164.01--
0
a. In paragraph (a) following the words ``except as provided in'',
remove the words ``paragraph (c)'' and, in their place, add the words
``paragraphs (c) and (d)'';
0
b. In paragraph (c) remove the words ``and 164.33'', and, in their
place, add the words ``164.33, and 164.46''; and
0
c. Add a new paragraph (d) to read as follows:

Sec.  164.01  Applicability.

* * * * *
    (d) Provisions of Sec.  164.46 apply to some self-propelled vessels
of less than 1600 gross tonnage.

Sec.  164.02  [Amended]

0
16. In Sec.  164.02, at the beginning of paragraph (a), remove the
words ``This part'', and, add in their place, the words ``Except as
provided in Sec.  164.46(a)(2) of this part''.

0
17. In Sec.  164.03(b), add the entry for ``International
Electrotechnical Commission''; under the entry for ``International
Maritime Organization (IMO),'' add entries for Resolution MSC.74(69),
SN/Circ.277, SOLAS 2000 Amendments, Conference resolution 1; and under
the entry for ``International Telecommunications Union
Radiocommunication Bureau (ITU-R)'', add an entry for ITU-R
Recommendation M.1371-1 to read as follows:

Sec.  164.03  Incorporation of reference.

* * * * *
    (b) * * *

International Electrotechnical Commission (IEC)

    3, rue de Varemb, Geneva, Switzerland.

IEC 61993-2, Maritime navigation and radiocommunication           164.46
 equipment and systems--Automatic identification systems
 (AIS)--part 2: Class A shipborne equipment of the universal
 automatic identification system (AIS)--Operational and
 performance requirements, methods of test and required test
 results First edition, 2001-12..............................

International Maritime Organization (IMO)

    Publication Section, 4 Albert Embankment, London SE1 7SR, United
Kingdom.

Resolution MSC.74(69), Annex 3, Recommendation on Performance     164.46
 Standards for a Universal Shipborne Automatic Identification
 System (AIS), adopted May 12, 1998..........................
SN/Circ.277, Guidelines for the Installation of a Shipborne       164.46
 Automatic Identification System (AIS), dated January 6, 2003
SOLAS, International Convention for Safety of Life at Sea,        164.46
 1974, and 1988 Protocol relating thereto, 2000 Amendments,
 effective January and July 2002, (SOLAS 2000 Amendments)....
Conference resolution 1, Adoption of amendments to the Annex      164.46
 to the International Convention for the Safety of Life at
 Sea, 1974, and amendments to Chapter V of SOLAS 1974,
 adopted December 12, 2002...................................

International Telecommunication Union Radiocommunication Bureau (ITU-R)

    Place de Nations, CH-1211 Geneva 20 Switzerland.

ITU-R Recommendation M.1371-1, Technical characteristics for      164.46
 a universal shipborne automatic identification system using
 time division multiple access in the VHF maritime mobile
 band, 1998-2001.............................................

Sec.  164.43  [Amended]

0
18. In Sec.  164.43--
0
a. Revise the section heading to read ``Automatic Identification System
Shipborne Equipment--Prince William Sound'' ; and
0
b. In paragraph (a), remove the word ``Each'', and add, in its place,
the words ``Until July 1, 2004, each''; and add the words ``under Sec.
165.1704 of this subchapter'' immediately after the words ``Vessel
Traffic Service (VTS)''.

0
19. Add new Sec.  164.46 to read as follows:

Sec.  164.46  Automatic Identification System (AIS).

    (a) The following vessels must have an installed, operational AIS
that complies with the IMO Resolution MSC.74(69), ITU-R Recommendation
M.1371-1, and IEC 61993-2, and that is installed using IMO SN/Circ.277
(Incorporated by reference, see Sec.  164.03) as of the date specified.
``Length'' refers to ``registered length'' as defined in 46 CFR, part
69.
    (1) Self-propelled vessels of 65 feet or more in length engaged in
commercial service and on an international voyage, not later than
December 31, 2004.
    (2) Notwithstanding paragraph (a)(1) of this section, the following
vessels subject to the International Convention for Safety at Life at
Sea, 1974, (SOLAS) as amended, that are on an international voyage must
also comply with SOLAS, chapter V, as amended by SOLAS 2000 Amendments
and Conference resolution 1 (Incorporated by reference, see Sec.
164.03):
    (i) Passenger vessels, of 150 gross tonnage or more, not later than
July 1, 2003;
    (ii) Tankers, regardless of tonnage, not later than the first
safety survey for safety equipment on or after July 1, 2003;
    (iii) Vessels, other than passenger vessels or tankers, of 50,000
gross tonnage or more, not later than July 1, 2004; and
    (iv) Vessels, other than passenger vessels or tankers, of 300 gross
tonnage or more but less than 50,000 gross tonnage, not later than the
first safety survey for safety equipment on or after July 1, 2004, but
no later than December 31, 2004.
    (b) Notwithstanding paragraphs (a)(1) and (a)(2) of this section,
the following vessels, transiting an area listed in table 161.12(c) of
Sec.  161.12 of this part.
    (1) Each self-propelled vessel of 65 feet or more in length,
engaged in commercial service;
    (2) Each towing vessel of 26 feet or more in length and more than
600 horsepower;
    (3) Each vessel of 100 gross tons or more carrying one or more
passengers for hire; and
    (4) Each passenger vessel certificated to carry 50 or more
passengers for hire.

[[Page 39368]]

    (c) The vessels listed in paragraph (b) of this section must comply
according to the following schedule:
    (1) For VTS St. Marys River, not later than December 31, 2003;
    (2) For VTS Berwick Bay, VMRS Los Angeles/Long Beach, VTS Lower
Mississippi River, VTS Port Arthur and VTS Prince William Sound, not
later than July 1, 2004; and
    (3) For VTS Houston-Galveston, VTS New York, VTS Puget Sound, and
VTS San Francisco, not later than December 31, 2004.
    (d) The requirements for Vessel Bridge-to-Bridge radiotelephones in
Sec. Sec.  26.04(a) and (c), 26.05, 26.06 and 26.07 of this chapter,
also apply to AIS. The term ``effective operating condition'' used in
Sec.  26.06 includes accurate input and upkeep of all AIS data fields,
including estimated time of arrival, destination, and number of people
on board.
    (e) The use of a portable AIS is permissible, only to the extent
that electromagnetic interference does not affect the proper function
of existing navigation and communication equipment on board, and such
that only one AIS unit may be in operation at any one time.
    (f) The AIS Pilot Plug, on each vessel over 1,600 gross tons, on
international voyage, shall be available for pilot use, easily
accessible from the primary conning position of the vessel, and near an
AC power receptacle.

PART 165--REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS

0
20. Revise the authority citation for part 165 to read as follows:

    Authority: 33 U.S.C. 1226, 1231; 46 U.S.C. Chapter 701; 50
U.S.C. 191, 195; 33 CFR 1.05-1(g), 6.04-1, 6.04-6, and 160.5; Pub.
L. 107-295, 116 Stat. 2064; Department of Homeland Security
Delegation No. 0170.

Sec.  165.1704  [Amended]

0
21. In Sec.  165.1704, at the beginning of paragraph (c)(6) remove the
words ``Not later than July 1, 1994,'', and, add in their place, the
words ``Until July 1, 2004,''.

    Dated: June 23, 2003.
Thomas H. Collins,
Admiral, Coast Guard, Commandant.
[FR Doc. 03-16191 Filed 6-27-03; 8:45 am]

BILLING CODE 4910-15-P

[Federal Register: July 1, 2003 (Volume 68, Number 126)]
[Notices]
[Page 39369-39371]
From the Federal Register Online via GPO Access [wais.access.gpo.gov]
[DOCID:fr01jy03-129]

[[Page 39369]]

-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

Coast Guard

[USCG-2003-14878]


Automatic Identification System; Expansion of Carriage
Requirements for U.S. Waters

AGENCY: Coast Guard, DHS.

ACTION: Notice; request for comments.

-----------------------------------------------------------------------

SUMMARY: The Maritime Transportation Security Act of 2002 requires
certain vessels to carry an Automatic Identification System. In an
interim rule published elsewhere in today's Federal Register, the Coast
Guard is requiring Automatic Identification System carriage as agreed
to by the international community in amendments to the International
Convention for the Safety of Life at Sea, 1974, and as directed by the
Maritime Transportation Security Act. That rulemaking, however, covers
only vessels on international voyages and certain vessels on specified
waterways of the United States. This notice solicits comment on how
best to address implementation on the remaining navigable waters of the
U.S. for vessels not on international voyages.

DATES: Comments and related material must reach the Docket Management
Facility on or before September 29, 2003.

ADDRESSES: To make sure that your comments and related material are not
entered more than once in the docket, please submit them by only one of
the following means:
    (1) By mail to the Docket Management Facility (USCG-2003-14878),
U.S. Department of Transportation, room PL-401, 400 Seventh Street SW.,
Washington, DC 20590-0001.
    (2) By delivery to room PL-401 on the Plaza level of the Nassif
Building, 400 Seventh Street SW., Washington, DC, between 9 a.m. and 5
p.m., Monday through Friday, except Federal holidays. The telephone
number is 202-366-9329.
    (3) By fax to the Docket Management Facility at 202-493-2251.
    (4) Electronically through the Web Site for the Docket Management
System at http://dms.dot.gov.
    The Docket Management Facility maintains the public docket for this
notice. Comments and material received from the public will become part
of this docket and will be available for inspection or copying at room
PL-401 on the Plaza level of the Nassif Building, 400 Seventh Street
SW., Washington, DC, between 9 a.m. and 5 p.m., Monday through Friday,
except Federal holidays. You may also find this docket on the Internet
at http://dms.dot.gov.

FOR FURTHER INFORMATION CONTACT: If you have questions on this notice,
contact Mr. Jorge Arroyo, Office of Vessel Traffic Management (G-MWV-
1), U.S. Coast Guard Headquarters, telephone: 202-267-6277, fax: 202-
267-4826 or e-mail: jarroyo@comdt.uscg.mil. If you have questions on
viewing or submitting material to the docket, call Ms. Dorothy Beard,
Chief, Dockets, Department of Transportation, telephone: 202-366-5149.

SUPPLEMENTARY INFORMATION:

Request for Comments

    We encourage you to participate by submitting comments and related
material. If you do so, please include your name and address, identify
the docket number [USCG-2003-14878], indicate the specific question of
this document to which each comment applies, and give the reason for
each comment. You may submit your comments and material by mail, hand
delivery, fax, or electronic means to the Docket Management Facility at
the address under ADDRESSES; but please submit your comments and
material by only one means. If you submit them by mail or hand
delivery, submit them in an unbound format, no larger than 8\1/2\ by 11
inches, suitable for copying and electronic filing. If you submit them
by mail and would like to know they reached the Facility, please
enclose a stamped, self-addressed postcard or envelope. We will
consider all comments and material received during the comment period.
Your comments and any other matters you bring to our attention during
the comment period will be taken into account in Coast Guard actions
regarding the issues raised in the Questions section below.
    Note, matters pertaining to AIS licensing, equipment certification,
and frequencies are subject to Federal Communications Commission
regulations and are not addressed in this notice, see FCC Public Notice
DA 02-1362 in the docket for further information.

Background and Purpose

    The Maritime Transportation Security Act of 2002 (MTSA), Public Law
107-295, was enacted November 25, 2002, and requires that four specific
categories of vessels be equipped with and operate an Automatic
Identification System (AIS). These categories are--
    1. Self-propelled commercial vessels 65 feet or more in length;
    2. Vessels carrying more than a number of passengers for hire
determined by the Secretary of the agency in which the Coast Guard is
operating;
    3. Towing vessels of more than 26 feet in length and 600
horsepower; and
    4. Other vessels for which the Secretary determines AIS is
necessary for safe navigation of the vessel. (46 U.S.C. 70114(a)(1)(A)-
(D)).
    Under the MTSA, vessels that must be equipped with AIS must use it
in all navigable waters of the United States, unless the Secretary
finds that AIS is not needed for safe navigation on specified navigable
waters. If such a finding is made, the Secretary may waive the AIS
requirements in those waters (46 U.S.C. 70114(a)(2)(B)). The MTSA also
allows the Secretary to exempt a vessel from the AIS requirement if the
Secretary finds that AIS is not necessary for the safe navigation of
the vessel on the waters on which the vessel operates (46 U.S.C.
70114(a)(2)(A)).
    In an interim rule published elsewhere in today's Federal Register,
titled ``Automatic Identification System; Vessel Carriage Requirement''
(Docket USCG-2003-14757, RIN 1625-AA67), the Coast Guard will require
the following vessels to install and operate AIS:
    (1) Vessels subject to the International Convention for the Safety
of Life at Sea, 1974, (SOLAS) and on international voyage, under the
schedule set forth in SOLAS chapter V, regulation 19.2.4;
    (2) Vessels not subject to SOLAS that are 65 feet or more in
length, in commercial service and on an international voyage, by
December 31, 2004; and
    (3) The following Vessel Traffic Service (VTS) and Vessel Movement
Reporting System (VMRS) users:
    (i) Self-propelled vessels of 65 feet or more in length, in
commercial service;
    (ii) Towing vessels 26 feet or more in length and more than 600
horsepower;
    (iii) Vessels of 100 gross tons or more carrying one or more
passengers for hire; and
    (iv) Passenger vessels certificated to carry 50 or more passengers
for hire.
    These vessels must comply: by December 31, 2003, within VTS St.
Marys River; by July 1, 2004, within VTS Berwick Bay, VMRS Los Angeles/
Long Beach, VTS Lower Mississippi River, VTS Port Arthur and VTS Prince
William Sound; by December 31, 2004, within VTS Houston-Galveston, VTS
New York, VTS Puget Sound, and VTS San Francisco.
    The Coast Guard recognizes the benefits of AIS and has been a
leading

[[Page 39370]]

proponent of AIS technology since its inception. AIS is an effective
navigation and communications tool for reducing collisions, enhancing
situational awareness, and playing a part in U.S. maritime domain
awareness. Its corollary function, as a surveillance tool, has taken on
greater import in these times of heightened vigilance and proactive
homeland security. Achieving accurate, real-time maritime domain
awareness is of vital interest to the Coast Guard and the Nation.
Congress passed the MTSA and the international community, upon the
initiative of the Unites States and through the actions of the
International Maritime Organization (IMO), amended SOLAS to accelerate
the implementation of AIS.
    Our AIS interim rule (USCG-2003-14757), published elsewhere in
today's Federal Register, is the first step in that process. That
interim rule will implement AIS in accordance with the schedule agreed
to at the IMO Diplomatic Conference held in December 2002 on vessels on
international voyages (see table below), and it also imposes an AIS
requirement on all commercial VTS and VMRS users.

          Table--SOLAS AIS Schedule (Chapter V, Regulation 19.2.4) for Vessels on International Voyages
----------------------------------------------------------------------------------------------------------------
                Constructed                            Type of vessel                  Implementation date
----------------------------------------------------------------------------------------------------------------
On or after July 1, 2002...................  All..............................  July 1, 2002.
Before July 1, 2002........................  Passenger ships (carrying 12 or    July 1, 2003.
                                              more passengers).
                                             Tankers..........................  First survey for safety
                                                                                 equipment on or after July 1,
                                                                                 2003.
                                             Ships, other than passenger ships  July 1, 2004
                                              and tankers, greater than or
                                              equal to 50,000 gross tonnage.
                                             Ships, other than passenger ships  First safety equipment survey
                                              and tankers, greater than or       after July 1, 2004, or by
                                              equal to 300, but less than        December 31, 2004, whichever
                                              50,000 gross tonnage.              occurs earlier.
----------------------------------------------------------------------------------------------------------------

    The process of deploying this technology into all existing and
future VTS areas is well underway. The Coast Guard intends to expand
the safety and security benefits of AIS by extending the shore-tracking
surveillance capability throughout our Nation's waterways as a major
element of maritime domain awareness and homeland security.
    Design and installation of the expanded capability is underway but
not yet fully operational. Therefore, we want to take this opportunity
to ask some questions of the public to (1) assist us in developing an
overall AIS strategy, and (2) address expanded carriage of AIS beyond
SOLAS vessels, VTS and VMRS areas, and certain other commercial and
non-commercial vessels that are omitted from the AIS interim rule
(USCG-2003-14757) published elsewhere in today's Federal Register.

Questions

    We need the public's assistance in answering the following
questions, and any additional information provided on this topic is
welcome. In responding to each question, please explain your reasons
for each answer as specifically as possible so that we can carefully
weigh the consequences and impacts of any future actions we may take.
    In preparing your response to these questions, please indicate your
position in the maritime industry as well as the type of vessel, cargo,
and charter agreement specific to your situation, if applicable.
    (1) Recognizing that AIS may ultimately be required on all
navigable waters, what particular waterways or ports should be
implemented before others?
    (2) Are there particular waterways where the AIS requirements
should be waived? Why?
    (3) AIS is not specifically mandated (by the MTSA) on all vessels.
The MTSA, however, does allow the Secretary to require AIS on any
vessel if deemed necessary for safe navigation. Should other vessels
(e.g., commercial vessels under 65 feet in length, towing vessels under
26 feet and 600 horsepower, dredges and floating plants, recreational
vessels, offshore facilities, or Mobile Offshore Drilling Units) be
required to have AIS?
    (4) SOLAS expects nations to implement their AIS carriage on their
domestic fleet (vessels over 500 gross tonnage and passenger vessels
not on international voyage) not later than July 1, 2008. However, the
MTSA requires AIS by December 31, 2004. Knowing this, should certain
vessels be granted temporary exemptions regarding the compliance dates
in MTSA?
    (5) Under what circumstances, if any, should a vessel be exempted
from the AIS requirements per the MTSA exemption?
    (6) SOLAS defines a passenger vessel as carrying 12 or more
passengers. VTS regulations define VTS users as passenger vessels over
100 gross tons carrying 1 or more passengers or those certificated to
carry 50 or more passenger. The MTSA allows the Secretary to determine
the threshold number of passengers when determining which passenger
vessels are required to have AIS. Should we expand AIS carriage beyond
what is already defined in SOLAS and our rule?
    (7) Should the Coast Guard encourage or require the use of systems
such as electronic chart display and information system (ECDIS) and
electronic chart system (ECS) to display AIS information to enhance
navigation safety? Are there other systems that could be used for this
purpose?
    (8) Would you be more likely to install an ECDIS or ECS on your
vessel, to display AIS information, if the system could be used to
comply with an existing requirement to carry nautical charts?
    As noted previously, comments regarding these questions, and any
other pertinent matters brought to our attention during the comment
period, will be taken into account in our future actions regarding the
issues raised by these questions.

Public Meeting

    The Coast Guard is considering having two public meetings on this
topic, in addition to the public meeting announced in the AIS interim
rule, published elsewhere in today's Federal Register. We would like
your comments on the questions and particular issues that should be
addressed at these meetings, as well as where the meetings should be
held. Send your comments requesting a public meeting to the Docket
Management Facility at the address under ADDRESSES. We will announce a
time and place for each meeting by a later notice in the Federal
Register.

[[Page 39371]]

    Dated: June 23, 2003.
Thomas H. Collins,
Admiral, U.S. Coast Guard Commandant.
[FR Doc. 03-16192 Filed 6-27-03; 8:45 am]

BILLING CODE 4910-15-P