DHS drops plan to screen chemical-plant workers for terrorist ties

The Homeland Security Department has withdrawn its plan to screen people with access to dangerous chemical plants for possible terrorist ties, prompting questions on how the department will move forward with the task of implementing its struggling chemical-security program.

Suzanne Spaulding, deputy undersecretary for the DHS National Protection and Programs Directorate, confirmed during a congressional hearing on Thursday that the department had pulled the proposal late last week. The plan, under which chemical companies would have been required to submit information about people who have access to their high-risk facilities, had been languishing at the White House Office of Management and Budget since June 2011.

In April, a broad range of industry trade groups — including the U.S. Chamber of Commerce, the American Chemistry Council, and the American Petroleum Institute — sent a letter to OMB Office of Information and Regulatory Affairs Administrator Cass Sunstein urging him to reject the plan, which is part of the DHS Chemical Facility Antiterrorism Standards initiative. Under the Paperwork Reduction Act, federal agencies must seek approval from the White House when demanding information from companies.

The DHS plan would require companies to submit information — including name, date, place of birth, and passport and visa information — about “facility personnel and, as appropriate, unescorted visitors with access to restricted areas or critical assets” to their sites. The department would then check the data against the FBI’s Terrorist Screening Database.

The intent of the DHS proposal was to prevent terrorists from gaining access to facilities that house chemicals that could be lethal if released into the environment. Industry officials argue, though, that the DHS effort is duplicative of other screening programs in which they already participate and would create costly paperwork without a tangible security benefit. Homeland Security estimates put the total operational and maintenance cost of the proposed requirement at $29 million and say it would likely affect about 1.3 million individuals, according to a June 2011 notice in the Federal Register.

Labor and environmental groups also opposed the DHS plan, raising concerns about privacy and suggesting it could ruin employment opportunities for people wrongly added to the FBI’s database, as well as for those who were never removed from the database after being cleared of any wrongdoing.

Spaulding on Thursday did not provide an explanation for why the department had withdrawn the plan, nor did she say how the proposal would be replaced. She told members of the House Appropriations Homeland Security Subcommittee that the department pulled the plan in advance of the hearing so that she could discuss the issue with panel members. The hearing ended abruptly, however, when lawmakers were called to the House floor for a series of votes on unrelated issues.

Homeland Security officials declined to comment on the matter after the hearing.

Personnel screening is a component of Homeland Security’s Chemical Facility Antiterrorism Standards program. The program has been under fire from House Republicans since late last year when a leaked DHS memo detailed a host of problems with its implementation, including that it had failed to complete site inspections and approve facility security plans.

Republicans in the lower chamber also opposed the personnel-screening proposal, however. Now that the department has withdrawn the plan, it is unclear how it will complete implementation of the broader security effort that encompasses thousands of chemical plants.

An industry official argued that a key reason Homeland Security has been unable to completely approve security plans thus far is because it does not yet have a sanctioned method for conducting personnel screening.

“A lot of the failure to implement the program ties back to this barrier that has been around since June of last year,” Bill Almond, vice president for government relations at the Society of Chemical Manufactures and Affiliates, said, referring to the point at which the department submitted its controversial proposal for OMB review.

“Let’s hope [withdrawing the proposal] helps the department move forward,” Almond, who also opposed the plan, told Global Security Newswire. “If the department has a new program that they want to propose to OMB, they’ll need to do that relatively soon.”

By law, a new proposal would have to go through multiple rounds of public comment and win OMB approval before it could be finalized, meaning the process would be likely to take several months or even years.

Labor and environmental organizations, meanwhile, argue that the law underlying the DHS program is too lax. On Thursday, the groups, including the United Steel Workers, Communications Workers of America, and Greenpeace, submitted a formal petition requesting that the Environmental Protection Agency craft stricter chemical-security rules using its Clean Air Act authority.

Unlike the Homeland Security Department, EPA officials would have the authority to require facilities to use so-called inherently safer technology, meaning the government could force a plant to, when possible, use chemicals and systems that are less dangerous than those that might now be in place, the groups argue.

According to the petition for rulemaking that the groups submitted pursuant to the Administrative Procedure Act, “such requirements are necessary to protect the public against possible chemical releases, including those that may be cause by terrorist attacks, and are well within EPA’s existing authority under section 112(r) of the Clean Air Act.”

Industry groups strongly oppose such technology mandates, arguing that they are overly burdensome and unnecessary.
Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.