[House Hearing, 110 Congress] [From the U.S. Government Publishing Office] THE GOODYEAR EXPLOSION: ENSURING OUR NATION IS SECURE BY DEVELOPING A RISK MANAGEMENT FRAMEWORK FOR HOMELAND SECURITY ======================================================================= HEARING before the SUBCOMMITTEE ON TRANSPORTATION SECURITY AND INFRASTRUCTURE PROTECTION of the COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED TENTH CONGRESS SECOND SESSION __________ JUNE 25, 2008 __________ Serial No. 110-123 __________ Printed for the use of the Committee on Homeland Security [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Available via the World Wide Web: http://www.gpoaccess.gov/congress/ index.html __________ U.S. GOVERNMENT PRINTING OFFICE 44-064 PDF WASHINGTON : 2008 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC 20402-0001 COMMITTEE ON HOMELAND SECURITY Bennie G. Thompson, Mississippi, Chairman Loretta Sanchez, California Peter T. King, New York Edward J. Markey, Massachusetts Lamar Smith, Texas Norman D. Dicks, Washington Christopher Shays, Connecticut Jane Harman, California Mark E. Souder, Indiana Peter A. DeFazio, Oregon Tom Davis, Virginia Nita M. Lowey, New York Daniel E. Lungren, California Eleanor Holmes Norton, District of Mike Rogers, Alabama Columbia David G. Reichert, Washington Zoe Lofgren, California Michael T. McCaul, Texas Sheila Jackson Lee, Texas Charles W. Dent, Pennsylvania Donna M. Christensen, U.S. Virgin Ginny Brown-Waite, Florida Islands Gus M. Bilirakis, Florida Bob Etheridge, North Carolina David Davis, Tennessee James R. Langevin, Rhode Island Paul C. Broun, Georgia Henry Cuellar, Texas Candice S. Miller, Michigan Christopher P. Carney, Pennsylvania Yvette D. Clarke, New York Al Green, Texas Ed Perlmutter, Colorado Bill Pascrell, Jr., New Jersey I. Lanier Lavant, Staff Director & General Counsel Rosaline Cohen, Chief Counsel Michael Twinchek, Chief Clerk Robert O'Connor, Minority Staff Director ______ SUBCOMMITTEE ON TRANSPORTATION SECURITY AND INFRASTRUCTURE PROTECTION SHEILA JACKSON LEE, Texas, Chairwoman Edward J. Markey, Massachusetts Daniel E. Lungren, California Peter A. DeFazio, Oregon Ginny Brown-Waite, Florida Eleanor Holmes Norton, District of Gus M. Bilirakis, Florida Columbia Paul C. Broun, Georgia Yvette D. Clarke, New York Peter T. King, New York (Ex Ed Perlmutter, Colorado Officio) Bennie G. Thompson, Mississippi (Ex Officio) Michael Beland, Director & Counsel Natalie Nixon, Deputy Chief Clerk Coley O'Brien, Minority Senior Counsel (II) C O N T E N T S ---------- Page Statements The Honorable Sheila Jackson Lee, a Representative in Congress From the State of Texas, and Chairwoman, Subcommittee on Transportation Security and Infrastructure Protection.......... 1 The Honorable Gus M. Bilirakis, a Representative in Congress From the State of Florida........................................... 5 Witnesses Panel I Mr. Robert D. Jamison, Under Secretary, National Protection and Programs Directorate, Department of Homeland Security: Oral Statement................................................. 7 Prepared Statement............................................. 9 Mr. Norman J. Rabkin, Managing Director, Homeland Security and Justice, Government Accountability Office: Oral Statement................................................. 12 Prepared Statement............................................. 14 Panel II Mr. John P. Paczkowski, Director, Emergency Management and Security, Port Authority of New York and New Jersey: Oral Statement................................................. 30 Prepared Statement............................................. 32 Mr. James Jay Carafano, The Heritage Foundation: Oral Statement................................................. 37 Prepared Statement............................................. 38 Mr. Raymond Mcinnis, Private Citizen, Widower of Victim of Goodyear Explosion: Oral Statement................................................. 43 Prepared Statement............................................. 45 Mr. John S. Morawetz, Director, Health and Safety, International Chemical Workers Union Council/UFCW: Oral Statement................................................. 47 Prepared Statement............................................. 49 For the Record Mr. Joseph Copeland, Vice President, Goodyear Tire and Rubber Company: Prepared Statement............................................. 4 THE GOODYEAR EXPLOSION: ENSURING OUR NATION IS SECURE BY DEVELOPING A RISK MANAGEMENT FRAMEWORK FOR HOMELAND SECURITY ---------- Wednesday, June 25, 2008 U.S. House of Representatives, Committee on Homeland Security, Subcommittee on Transportation Security and Infrastructure Protection, Washington, DC. The subcommittee met, pursuant to call, at 2:33 p.m., in Room 311, Cannon House Office Building, Hon. Sheila Jackson Lee [Chairwoman of the subcommittee] presiding. Present: Representatives Jackson Lee and Bilirakis. Ms. Jackson Lee [presiding]. The subcommittee will come to order. The subcommittee is meeting today to receive testimony on the Goodyear explosion, ensuring our Nation is secure by developing a risk-management framework for homeland security. Our witnesses today will testify about the Department of Homeland Security's approach to risk management. In addition, we will hear a real-life story, real-life testimony on the tragedy of the Goodyear explosion that occurred in Houston exactly 2 weeks ago. I offer to all of those who have been affected and all of those who have lost loved ones, in particular our witness on the second panel, our deepest and expressed and sincere sympathy. I do want to indicate that my colleague, Congressman Green, was here earlier, and I would like to ask without objection that the gentleman from Texas, if he is able to arrive again, be authorized to sit for the purpose of questioning witnesses during the hearing today. Without objection, hearing none, it is so ordered. Before I begin, there is always a moment of reflection and joy, and I do want to acknowledge the Calentar family. Mr. Perez and his nephew Mr. Calentar, if you all would stand? This young man is the recipient of the Artist Award from Wheaton High School in Houston, Texas. So we welcome him and we welcome his family, his sister, his brother, and his uncle. Thank you. You are all very welcome. Thank you very much. [Applause.] I am proud to convene today's hearing, which will focus on the Government's homeland security approach to risk management--a very key element of survival in this Nation. If you cannot manage risk, then you are ultimately unable to address the questions of pending terrorist acts if they are to occur, and those unpredictable natural disasters. Two weeks ago, there was a tragic accident at the Goodyear chemical plant in Houston, Texas. It is my belief that these types of incidents can be avoided if the appropriate risk management strategies are put in place. If the Department of Homeland Security can facilitate a comprehensive risk management program across the Federal Government and the private sector, it will go a long way toward preventing additional tragedies like the one that occurred in my own home town. We are well aware that 85 percent of the critical infrastructure is in the hands of private entrepreneurs. Therefore, this must be a deeply embedded partnership in order for us to be able to save lives. In particular, I want to thank Mr. Raymond McInnis for his courage to testify here today after tragically losing his wife in the chemical explosion at the Goodyear plant on June 11. We thank him for his courage. His courage reminds us that we must push our Nation's chemical plants to take all of the necessary precautions to ensure that the American people are not put in unnecessary danger. Mr. McInnis will address what this Government and our country's employers can do to keep events like the one at the Goodyear plant from happening. Again, Mr. McInnis, we thank you very much for being here today. We are well aware of the service of years that you have given to the Goodyear plant, so we are aware as well that in addition to your tragedy and your personal loss, you will give us a welcome knowledge and understanding. We are so grateful for your presence here today. I would like to note that Goodyear declined our invitation to testify this afternoon. However, I have been assured that I will be kept informed of the developments related to its investigation of this serious matter. I have had an opportunity for discussion. Discussion must continue. The involvement must continue. We must find a way to ensure that these incidents do not occur. The DHS must be on the frontlines of being preventive in preventing these tragedies however they may occur from happening to undermine the security and the safety of America. In no way is this hearing intended to influence an ongoing investigation. I encourage my colleagues to respect this fact as we attempt to learn about the need for a risk management framework for homeland security and how such a framework may apply to workers at chemical facilities. Chairman Thompson, Ranking Member Lungren and I have taken a special interest in risk management. The reason for this is clear. Scarce Federal resources must be devoted to implementing meaningful homeland security strategies and programs designed to reduce risk from all hazards. I applaud Secretary Chertoff for espousing a risk-based approach to homeland security. Today, we are going to learn more about what that means and how it can be improved. Our focus on risk cannot come at a more meaningful time. The threat posed by all types of hazards continues to endanger the American people. The resources to mitigate that threat must be allocated efficiently. We are in a budgetary situation that requires us to make difficult choices and to embrace a risk management strategy that will help us make rational investment decisions with our homeland security dollars. This subcommittee has sent three letters to the Department in an effort to understand its risk management practices. We have not been satisfied with many of its responses. Today, I look forward to getting answers from Under Secretary Jamison, who oversees many of the Department's risk-related programs. Our approach to homeland security risk management must encompass all of the Federal departments and agencies, State and local governments, and the private sector. Today, we will hear from the Port Authority of New York and New Jersey. It has developed what I consider to be an effective risk management program. The more we learn about these types of successes, the more alternatives we have to choose from in adopting and promoting strategies at the Federal level. I am fully aware that no methodology or analytical tool exists that will serve as a silver bullet. Indeed, there needs to be a baseline or set of principles that guides the Department's components so that they can develop new methods of risk analysis to support their activities. I have many concerns about the Department's Office of Risk Management and Analysis. I believe we should increase the budget. It has yet to produce a baseline or a set of principles to guide the Department's risk management program. It has yet to justify its $10 million budget. I believe it will need more money. In order to do that, because risk management is so important, it is at the cutting edge of saving lives, we need to have the first baseline so we can make the argument for more funding. Still more troubling is the fact that there is no clear legislative or executive mandate supporting this office. It is unclear to this subcommittee whether it has the necessary authority to do its job. In the shadow or in the sunrise of a pending new administration, this all points to being prepared during the transitional time. The fact that we have this transitional time is key to focus on this risk management question. Today's discussion will not end here, but I hope it will encourage the Department to implement policies adequate for the task at hand. I look forward to hearing the opinions of our witnesses on a new risk management Presidential directive, the potential for a chief homeland security risk officers and national homeland security risk assessment, and how we can ensure that budget recommendations are based upon risk management principles. Furthermore, we want to know where the Office of Risk Management and Analysis fits into the Department's risk management program. Once again, I would like to thank everyone for their participation today. I look forward to hearing from our witnesses. At this time, without objection, I would like to enter two documents into the record. The first is a statement submitted by Dr. Henry H. Willis of the RAND Corporation entitled ``Challenges of Applying Risk Management to Terrorism Security Policy''. The second is an April, 2008 report by GAO, ``Highlights of a Forum: Strengthening the Use of Risk Management Principles in Homeland Security.'' Hearing no objection, it is so ordered.* --------------------------------------------------------------------------- * The documents have been retained in committee files. --------------------------------------------------------------------------- Let me also indicate that at the conclusion of the opening statements, you will be entering into the record three documents. So let me correct the record and indicate that instead of two, we will have three. That is the additional statement that is now being presented to us by Goodyear. As I indicated, Goodyear was invited to testify, and this committee will keep an open record and also continue to the extent that legislation will probably generate it out of this hearing. They declined to testify, Goodyear, at today's hearing because they indicated that it was inappropriate to testify at this time. As I have already informed you, we have no intention of interfering with a pending investigation, but we welcome Goodyear's future testimony. As I have indicated that it is appropriate, we are going to submit a statement from Goodyear for the record that I would like to include at this time if there is no objection. Hearing no objection, their statement will be submitted and we appreciate the presence of their statement. [The information follows:] Prepared Statement of Joseph Copeland, Vice President, Goodyear Tire and Rubber Company June 25, 2008 Goodyear appreciates the opportunity to submit this brief statement for the record of the hearing before the House Subcommittee on Transportation Security and Infrastructure Protection of the Committee on Homeland Security entitled ``The Goodyear Explosion: Ensuring Our Nation is Secure by Developing A Risk Management Framework for Homeland Security.'' We want to express our heartfelt condolences to the McInnis family and friends for their tragic loss, and to assure the committee, as we have the Chairwoman, our employees and our community, that we are cooperating fully with all ongoing investigations of the accident by our company and the Occupational Safety and Health Administration (OSHA) and will be available to discuss their findings when the investigations are complete. In light of the brief passage of time since the accident 14 days ago, and these ongoing investigations, it would be inappropriate for us to speculate at the hearing today. Since witnesses may be offering opinions on this matter at the hearing, we ask that the following brief statement by Goodyear be included in today's hearing record. On the morning of June 11, an explosion occurred at the Goodyear chemical plant in Houston, killing longtime Goodyear associate Gloria McInnis and injuring six other workers. The explosion, which appears to have been caused by the buildup of pressure in a device called a heat exchanger, also resulted in the release of ammonia in the immediate vicinity and required us to evacuate associates and contractors from the entire site. As required by our safety protocols, emergency response coordinators began accounting for everyone who was on site at the time of the explosion. In fact, Mrs. McInnis was an emergency response coordinator and therefore would not have been evacuated off the plant property, but would have worked with other coordinators to respond to the emergency. Unfortunately, the shift foreman responsible for accounting for Mrs. McInnis' whereabouts mistakenly attributed a telephone conversation he had with Mrs. McInnis moments before the explosion as occurring after the explosion. He wrongly marked Mrs. McInnis as accounted for and assumed she was attending to duties elsewhere on site. That incorrect assessment resulted in the Goodyear plant manager making an inaccurate statement to the public, and Goodyear and the plant manager sincerely apologize to the community and to the McInnis family in particular. Later in the morning, it was deemed safe for associates to return to work in other areas of the plant, but not the area in the immediate vicinity of the explosion. When work crews were able to access that area and inspect it more thoroughly, they tragically found Mrs. McInnis' body. During the course of the day, investigators from multiple agencies--OSHA, the Department of Homeland Security, the U.S. Chemical Safety and Hazard Investigation Board, the Texas Commission on Environmental Quality and others--visited the site or made inquiries. As this has been deemed an industrial accident and not a matter of homeland security, OSHA has assumed jurisdiction over the investigation. That investigation is ongoing, and Goodyear is cooperating fully. Goodyear's Houston team was shaken to its core by Mrs. McInnis' death and the injuries to another Goodyear associate and several contractors. Mrs. McInnis was a well-liked and hard-working associate who had been with the company for 31 years. Like Mrs. McInnis, a high percentage of our associates in Houston have worked at the plant for decades and they know each other quite well. Goodyear immediately offered grief counseling services to all who needed it. Despite some media reports to the contrary, Goodyear officials made multiple attempts to reach out to the family. After the McInnis family retained an attorney, the attorney required all attempts to communicate with the family go through him. Company officials extended their condolences and requested permission to attend the funeral. In addition, the company offered to pay for the funeral and to use its Government relations team to help get Mrs. McInnis' son returned from Iraq for the funeral. Our human resources department immediately began processing the necessary paperwork to ensure that the family members receive all the benefits that they are entitled to. Her coworkers created a memorial to Mrs. McInnis at the plant, held a plant-wide moment of silence in her memory and even collected donations for the family. Goodyear itself is conducting an investigation into whether individuals adhered to our safety and security protocols before and after the explosion. At this point, we do know that our security system was not compromised and no unauthorized individuals were on the site at the time of the explosion. As for safety protocols, Goodyear works hard to eliminate injuries of any degree through its ``No One Gets Hurt'' safety initiative. The initiative includes educating all associates about our safety protocols and conducting drills to ensure that associates know what they are to do in case of an emergency. In fact, the initiatives have been so successful that OSHA recordable incidents--meaning injuries of any type, large or small--at the Houston plant dropped from 67 in 2000 to just 7 last year. We have seen similar improvements company-wide, and we have set even more aggressive goals to reduce workplace accidents and injuries. This is another reason why Mrs. McInnis' death and the injuries to the other workers are so devastating to the Goodyear family. Our investigation into what caused the pressure to buildup in the heat exchanger and the aftermath is continuing. Therefore, it is premature for us to speculate on the cause. We have committed to cooperating fully with the committee, and we will provide our findings at the appropriate time. In the meantime, we are grateful that the last two injured workers have been released from local hospitals. And we again want to extend our apologies to our community for the mistaken initial reports and our heartfelt condolences to Mrs. McInnis' family and friends for their loss. Ms. Jackson Lee. I am also very pleased to, No. 1, share this podium with the distinguished gentleman from California, who is the Ranking Member, Mr. Lungren. As was indicated by his office, he has been detained because of an item that could not be removed. We will be looking forward to working with him. I am more than pleased to have a very dedicated, committed, and very informed Member of the House, but also a respected Member of the Homeland Security Committee, and an equally respected Member of the Subcommittee on Transportation Security and Infrastructure Protection, to serve today as Ranking Member. The Chair now recognizes Mr. Bilirakis, the distinguished gentleman from Florida, for an opening statement. Mr. Bilirakis. Thank you, Madam Chairwoman. I really appreciate it very much. I am pleased that you have called this hearing to examine the use of risk management in homeland security. I am honored to be filling in for Ranking Member Lungren who could not be with us today. I think it is important to acknowledge at the outset of this hearing that neither public nor private sector entities can protect everyone everywhere from everything at all times. The Government and others instead seek to accurately understand the nature of threats, vulnerabilities, and their potential consequences to better inform themselves and us of the smartest and most efficient ways to manage and reduce risk. Congress has rightly directed Federal agencies to use a risk-based approach to help guide important decisions about policy and resource allocation. The results have been mixed at best. However, the Department of Homeland Security has made progress analyzing risk within certain critical sectors. The progress of these risk assessments differs across each sector and within the Department for comparing cross-sector risk. This is an area that clearly needs attention and improvement. Federal policymakers and those we represent deserve to know whether we are using scarce public resources as wisely as possible to minimize risk and maximize security. To be fair, I am not sure whether anyone can reasonably be expected to definitely answer that question right now, but we surely need to. I think we also must be especially sensitive to the roll that Congress plays in providing political obstacles to risk- based resource allocation and strategic thinking in this area. We each fight to represent our constituents as best as we can, and in that process zealously, and perhaps without the benefit of having the broadest possible perspective, direct and redirect funding and policy priorities in a manner that may be inconsistent with the most effective risk-based homeland security strategy. In that regard, I am interested to hear the perspectives of today's witnesses on whether the Federal policies and investment priorities are properly aligned with those areas that are most vulnerable and in which an attack or natural catastrophe could have the greatest consequence on our homeland security. We should not simply be throwing money at problems without reasonable assurances objectively based in fact that we are actually reducing risk. Before I conclude, I want to express my condolences to Mr. Raymond McInnis, whose wife Gloria was killed in the explosion at the Goodyear plant in Houston earlier this month. My heart goes out to him and the other victims of this tragedy. Madam Chairwoman, I want to thank you again for calling this hearing to help shed more light on a critical component of our homeland security strategy. I look forward to hearing from our distinguished witnesses on this very important topic. Thank you again, Madam Chairwoman. I yield back the balance of my time. Ms. Jackson Lee. Let me thank the gentleman very much for his statement today, a very constructive statement as we lay the groundwork for this hearing. Other Members of the subcommittee are reminded that under committee rules, opening statements may be submitted for the record. It is my pleasure now to begin the testimony of the first witness, the witnesses on the first panel. Our first witness is Under Secretary Robert D. Jamison. Mr. Jamison is under secretary for the National Protection and Programs Directorate at the Department of Homeland Security. In his capacity as under secretary, Mr. Jamison looks at the Department's integrated efforts to analyze, manage and reduce risk. Prior to joining NPPD, Mr. Jamison served as deputy administrator at the Transportation Security Administration. Before joining DHS, Mr. Jamison served for over 3 years as a deputy administrator of the Federal Transit Administration at the Department of Transportation. Our second witness, Mr. Norman Rabkin, is a managing director for homeland security and justice at the Government Accountability Office. Mr. Rabkin helped to host a comptroller general's forum on strengthening the use of risk management principles in homeland security on October 25, 2007. The forum convened a group of experts to address effective practices and the challenges Federal agencies face in applying risk management to homeland security, and actions that can strengthen homeland security risk management. We believe that setting the framework on the challenges as we move forward in looking for the legislative reform, these witnesses are going to add very much to our discussion and our roadmap in going forward. Without objection, the witnesses' full statements will be inserted in the record. I now ask each witness to summarize his statement for 5 minutes, beginning with Under Secretary Jamison. Gentlemen, you are welcome. STATEMENT OF ROBERT D. JAMISON, UNDER SECRETARY, NATIONAL PROTECTION AND PROGRAMS DIRECTORATE, DEPARTMENT OF HOMELAND SECURITY Mr. Jamison. Thank you, Chairwoman Jackson Lee and Congressman Bilirakis, for the opportunity to appear before you this afternoon to address the Department's implementation of risk management practices. DHS is committed to applying a risk management framework across all homeland security efforts to prioritize our prevention, protection and resource efforts. The standup of the Office of Risk Management and Analysis within the National Protection and Programs Directorate and the longstanding collaboration on risk analysis and risk management across the Department bear out this commitment. With approximately 95,000 miles of coastline, 1 million passengers arriving daily through our ports, 450 airports and thousands of other critical infrastructure assets, our homeland cannot be secured at every moment in every way against every possible threat. Instead, as a Nation, we must be able to determine what levels of risk are acceptable and prioritize our efforts. As a result, the Department must adopt an approach of analyzing risk and using the information to devise the most effective ways to improve security. DHS components have long recognized the need to use risk analysis as a guide to decisionmaking. Eager to leverage DHS components' existing work, DHS has made it a priority for the new Office of Risk Management and Analysis to examine risk from a departmental perspective, working closely with each component with risk management responsibilities. DHS's risk management architecture must allow for the diversity of operational environments in DHS, yet consistently generate reliable results that can be further utilized for strategic decisionmaking across the domain. It must be simultaneously flexible, yet robust. Because DHS has multiple responsibilities with several unique operating environments, the Department-wide risk management architecture has to be flexible enough to allow for the development of customized component-level risk analysis by experts who know the characteristics of their mission space. For example, TSA's air domain risk analysis was developed by experts who understand the particulars of airports, airlines and the Nation's air space, while NPPD's chemical facility regulatory regime known as CFAS was developed by risk experts in DHS and the chemical industry. On the other hand, DHS risk architecture needs to be robust enough to allow us to draw from those component analyses to inform decisionmaking at a strategic level. DHS seeks to create a structure that provides components with guidance to conduct those risk analyses, but does not constrain them with overly specific or rigid requirements, while providing the leaders of the Department comprehensive information to make resource and management decisions that are risk-based. How are we going to unite these two competing requirements? First, we need to establish an integrated risk management framework. This framework will consist of the doctrine, principles, processes, guidance and information flows that will enable risk-informed and cost-effective decisionmaking at all levels. A properly executed risk management framework serves as a force multiplier because it enables better alignment of security priorities and resources to needs. Next, we will conduct strategic integrated risk analyses. Integrated risk analyses defines a path forward, while leveraging the existing body of work that has already been completed or conducted within or outside the Department. These integrated analyses will put all the hard work DHS components have completed to date to work, and provide DHS leadership with a strategic look at risk across multiple mission areas. The ultimate goal is to fully integrate those strategic analyses into a larger planning and resource allocation process. The principal vehicle for implementing these goals is the DHS steering committee that NPPD has established. The risk steering committee is comprised of risk analysis leaders from across the Department, and works to ensure collaboration, information sharing, and consensus building across the Department. The committee is already working on several projects that support the development of the integrated risk management framework and the integrated strategic risk analysis. NPPD is confident this approach will reap the benefits of all the hard work that has already been completed in the area of risk analysis, while also delineating a strategic vision for risk management. Finally, I would like to take a moment to offer my personal condolences to the McInnis family. Events such as the recent plant explosion in Houston weigh on all of us. Earlier, I mentioned CFAS, the chemical facility regulation that requires identification of high-risk facilities that hold chemicals of interest, and the subsequent development of security measures. As we implement CFAS, we are striving to manage the risks associated with chemical security across the country. Over the coming months, we will be requiring high-risk chemical facilities to determine their most critical security vulnerabilities and put strategies in place to address those vulnerabilities. This risk-based approach not only advances the security of chemical facilities, but will also contribute to the broader understanding of risk as we integrate those results across the Department. Thank you for holding this hearing and for your attention to this critical area of risk management. I would be happy to answer any questions you might have. [The statement of Mr. Jamison follows:] Prepared Statement of Robert D. Jamison June 24, 2008 Thank you, Chairwoman Jackson Lee, and distinguished Members of the subcommittee. It is a pleasure to appear before you today to address the Department's implementation and execution of risk management practices. The Department of Homeland Security (DHS) is committed to the careful analysis of risk to inform a broad range of decisions. This commitment is demonstrated by the establishment of the Office of Risk Management and Analysis (RMA) within the National Protection and Programs Directorate (NPPD), the long-standing level of attention devoted to risk assessment and analysis within DHS components, and the collaboration in risk analysis across DHS components. the challenges Secretary Chertoff has reiterated the theme that no one entity-- public or private--can effectively protect every single person at every moment in every place against every threat. Rather, the approach that the Department, indeed the Nation as a whole, must adopt is one of analyzing risk and using that information to devise the most cost- effective way of managing risk and improving security. In the context of homeland security, estimating risk includes characterization of three key factors: threats, vulnerabilities, and consequences. Terrorist threats can change rapidly and adapt to new security measures, making the estimation of threat extremely challenging. Vulnerabilities are usually quantifiable through subject matter expert judgment and ``red team'' exercises that probe for weaknesses, but they vary widely for different scenarios or types of attack. The direct consequences of an attack are fairly straightforward to calculate, but it is very difficult to quantify indirect consequences, potential cascading effects, and the impact on the public psyche. Last, integrating terrorism risk assessments with other all- hazard risk assessments, such as natural disasters, is difficult. For these reasons, and many others, risk management in homeland security remains a complex and arduous undertaking. Given these complexities in conducting risk assessments, there are two priorities when designing an overarching risk architecture for the Department. These priorities are: 1. Allowing for the development of customized, component-level risk analyses by analysts who know the unique characteristics of their mission space and the decision needs of their leaders, and 2. Creating risk analysis guidelines and standards that will allow the Department to aggregate risk information across the broad spectrum of the DHS mission space to inform strategic decisionmaking. The key challenge for DHS and RMA moving forward is to develop approaches and guidance materials that are both flexible and robust enough to accommodate these two priorities. dhs' risk management vision The Department's approach to risk-informed decisionmaking has matured considerably over the past 5 years. It will continue to evolve as our understanding grows and as new analytic approaches are developed to deal with the complexities and uncertainties inherent in many of the risks for which DHS holds responsibility. Despite the progress already made, there is clearly much that remains to be done. The Department continues to focus on improving DHS risk assessment methodologies, advancing decision support tools, and identifying risk-related information gaps. For example:The Transportation Security Administration (TSA) has identified critical vulnerabilities within certain transportation modes, such as unattended railcars carrying Toxic Inhalation Hazards, and analyzes the mitigation of these vulnerabilities through the use of detailed metrics reports. The Office of Infrastructure Protection (IP) continuously tracks National Infrastructure Protection Plan (NIPP) implementation activities across all sectors. This allows IP to monitor the progress of establishing sector-specific risk management processes. The Homeland Infrastructure Threat and Risk Analysis Center (HITRAC) conducts an annual risk assessment called the Strategic Homeland Infrastructure Risk Assessment (SHIRA) that spans across all Critical Infrastructure/Key Resource (CIKR) sectors. RMA has instituted a risk governance structure within the Department. The Federal Emergency Management Agency (FEMA) is modernizing flood maps to help communities improve their level of security from a natural disaster through smart building and setting of construction standards to create safer housing. The Office of Health Affairs is relying on risk assessments conducted by the Science and Technology Directorate to guide all of our bio-defense countermeasure strategies--both medical and nonmedical--and to inform our policies. In all of these examples, DHS and its components are improving the Department's ability to develop information about risks and use this information to inform decisions. To advance these efforts, and to leverage the expertise, the Department must continue to further the integration efforts. Based on this key challenge, RMA, in collaboration with the Department's components, has developed a vision to support the Department's efforts to advance its risk management capabilities. The vision is twofold: 1. Establish and institutionalize an integrated risk management framework. This framework will consist of the doctrine, principles, processes, guidance, and information flows that will enable risk-informed and cost-effective decisionmaking within components and at the DHS headquarters level. A properly executed risk management framework effectively serves as a force multiplier, as it enables better alignment of security priorities and resources to needs. 2. Conduct strategic, integrated risk analysis. We must be informed, at the strategic level, by an integrated departmental risk assessment. The integrated risk assessment should leverage the various risk analyses being conducted within and outside the Department. An integrated risk management framework will help better ensure that these efforts are harmonized and work from the same principles and understanding. Strategic, cross-component analysis will leverage the advances DHS' components have made with regard to risk management while incorporating those advances into DHS' larger planning and resource allocation processes. current risk management practices The Department is tasked with fulfilling missions that range from finding persons lost at sea to detecting renegade nuclear weapons. Without a clear understanding of the risks facing our society, decisionmaking could become less effective. Our resources could be spent to protect the Nation against risks that are less significant, while we simultaneously fail to protect the Nation against the risks that are more critical. NPPD, through RMA, is continuing to build the foundation for sound risk management practices across the Department. To enable the sharing and integration of RMA and component risk-related efforts, RMA has implemented a risk governance process within the Department. Central to this risk governance process is the DHS Risk Steering Committee (RSC) that RMA established. The RSC is comprised of risk analysis leads from across the Department and meets on a monthly basis. This approach ensures that there is collaboration, information-sharing, and consensus-building across the Department as we identify guidelines and recommendations for risk management and analysis. Currently, there are three working groups within the RSC. The efforts of the RSC working groups will provide the foundation for the integrated risk management framework and for strategic, cross-component analysis. The Risk Assessment Process for Informed Decision-Making (RAPID) Working Group.--RAPID is a strategic-level, Department- wide process that will assess risk and inform strategic planning, programming, budgeting, and execution processes. The process is focused on developing techniques to evaluate the risk reduction impacts of relevant DHS programs. The Lexicon Working Group.--The lexicon is a comprehensive glossary of words and terms relevant to the practice of homeland security risk management that will be used to ensure better understanding of risk management terminology throughout the homeland security organization. The Best Practices Working Group.--The product is an inventory of risk management lessons learned and recommended procedures and guidelines that will be used to guide the components to ensure that the Department's risk methods are coherent, consistent, and technically sound. The RSC has also been a very useful means for DHS components to coordinate their risk management efforts with each other. Examples of the programs that have RSC representation and participation include: IP's NIPP Risk Management Framework and its work with Federal/State/local/tribal partners in setting and pursuing CIKR protection goals and the establishment of Risk Integration and Analysis programs; The United States Coast Guard's (USCG) Maritime Security Risk Analysis Model (MSRAM), which allows USCG to develop and aggregate risk information at the port, sector, area, and national levels, and which supports numerous Coast Guard/DHS planning and resource allocation efforts at the strategic, operational, and tactical levels; The Office of Science and Technology's risk model, which analyzes the risk-reduction potential of various research and development initiatives. The Federal Emergency Management Agency's (FEMA) grant programs that utilize a risk-informed approach by considering both the risk profiles of specific jurisdictions and the quality of the business cases that the grant applicants develop to mitigate the risk. TSA's agent-based risk simulation model, called the Risk Management Analysis Tool, which takes into account that terrorists are a dynamic and adaptive adversary and allows TSA to identify the risk reduction value of any single layer of security within the U.S. aviation system. These component efforts demonstrate both the quality and diversity of risk management efforts within DHS. The goal of RMA is not to mandate that DHS components use a certain tool or analytical technique to conduct their specific risk analyses. Instead, RMA is serving as the bridge to connect these existing efforts together and is building products and collaboration forums to better ensure they are harmonized moving forward. The DHS integrated risk management framework will embrace a wide range of analytical tools and techniques. Most importantly, the framework will help ensure that all DHS risk analysis efforts are transparent, defensible, and documented. It will also help ensure that these analyses can be leveraged for strategic, cross- component analysis at the DHS headquarters level. Lastly, the RSC is a primary formal mechanism for the internal sharing of DHS risk information. However, a number of key external communications mechanisms are also in place at DHS because a critical part of the Department's risk management practices is how it communicates and works with its State, local, and tribal partners. For example, through the NIPP, DHS has established a framework that enables stakeholders from the private sector and public sector to coordinate on risk management issues. Government Coordinating Councils and Sector Coordinating Councils have been established across all CIKR sectors. Active information exchange occurs through the councils and through the Homeland Security Information Network. As the integrated risk management framework is developed, it will be shared with Federal, State, local, tribal and private sector stakeholders through these and other mechanisms that RMA is currently assessing. advancing risk management at dhs While we have made significant progress in our efforts to build an integrated, effective, and harmonized architecture for risk management at the Department, we are still in the early stages of a long journey. As a Department, we are striving to implement an approach where major decisions about investments, budgets, grants, planning priorities, operational posture, and security priorities are risk informed. To do so, we are moving toward an integrated framework of risk-informed decisionmaking where: 1. Decisions are framed to include an understanding of the risks associated with them; 2. Risks are identified, analyzed, communicated and assessed, so as to ensure we fully understand the nature of the problems we are trying to manage; 3. Alternative strategies for risk management are developed and analyzed for costs and benefits; 4. Decisions amongst these strategies are made with the best understanding of how they impact the risk; and 5. Decisions are monitored and reviewed so as to understand how they mitigated the risk. Such a risk management process for decisionmaking will be applied across DHS to address strategic, operational, and tactical risks. As we move forward, the Department, through RMA and the RSC, expects to make this process the center of an integrated risk management framework. In addition, DHS will continue to build the foundational efforts necessary to execute the framework and strategic analyses. These efforts will include the development of a risk management training and education program for both risk analysts and senior leaders, investment in new technologies for risk data collection, improved Department-wide access to resources for modeling and simulation, and the identification of useful risk management metrics. conclusion As noted in the 2007 National Strategy for Homeland Security, the assessment and management of risk underlies the full spectrum of our homeland security activities, including decisions about when, where, and how to invest in resources that eliminate, control, or mitigate risk. We at DHS recognize that risk management within the context of homeland security is an evolving field. We know that there are improvements that we can make in applying risk management and analysis to support our decisionmaking. We rely on collaboration with experts inside and outside the Government to learn how we can improve our abilities to understand, communicate about, and manage risk. Managing risk depends on accepting uncertainty; managing risk does not mean eliminating it. At DHS our goal with regard to risk management is to continually improve our ability to understand and recognize those risks, while developing the processes and methods that allow us to use that information to make better decisions. Those decisions govern how we invest our efforts in increasing preparedness, protection, and, ultimately, homeland security. Thank you for holding this important hearing. I would be happy to respond to any questions you might have. Ms. Jackson Lee. Thank you, Secretary Jamison. Mr. Rabkin, we thank you for your testimony. STATEMENT OF NORMAN J. RABKIN, MANAGING DIRECTOR, HOMELAND SECURITY AND JUSTICE, GOVERNMENT ACCOUNTABILITY OFFICE Mr. Rabkin. Madam Chairwoman, Mr. Bilirakis, and other Members of the subcommittee, thank you for inviting me to participate in today's hearing on the use of risk management principles in homeland security. The Congress, the President, and the Department all recognize that the Federal Government can never assure complete security, and it certainly can't afford to invest unlimited resources trying to do so. Using risk as a basis to intelligently allocate relatively limited resources makes sense. How to do it is much more difficult. Even before September 11, 2001, GAO was looking at how Federal agencies could make investment decisions based on risk. We created a conceptual framework for this decision process. We have displayed that in this graphic to my right and your left. This begins with identifying a program's goals, then assessing the risks, evaluating potential alternatives to mitigate the risks, deciding which alternatives in which to invest, and finally implementing the decision and monitoring the results of the investment, as well as any changes in goals and risks. As you mentioned, last year we invited about two dozen international experts to the GAO to discuss how to strengthen the use of risk management principles in homeland security. My written statement summarizes the results of that session. Here are some of the highlights. The participants first identified effective public and private sector risk management practices. For example, participants discussed the private sector's use of a chief risk officer, an executive responsible for focusing on understanding information about risks and reporting this information to other senior-level managers. They also discussed examples of public sector organizations that have effectively integrated risk management practices into their operations, such as the U.S. Coast Guard, and compared and contrasted public and private sector risk management practices. Then the participants identified four key challenges to applying risk management to homeland security. Many participants agreed that improving risk communication posed the greatest challenge to using risk management principles. More specifically, they cited the need to first establish a common lexicon for discussing risk; second, educating policymakers and the public about risks and engage in public discourse to reach consensus on acceptable levels of risk; and third, developing new risk communication practices to alert the public during emergencies. The second challenge they cited were political obstacles to risk-based resource allocation. They discussed the reluctance of politicians and others to make risk-based funding decisions. Participants noted that elected officials' investment priorities are informed by the public's beliefs about which risks should be given the highest priority--beliefs that are often based on incomplete information. As a result, the participants felt that there was less incentive for officials to invest in long-term opportunities to reduce risk, such as investing in specific border security assets or transportation infrastructure, when the public may not view these investments as addressing a perceived risk. The third challenge is in the area of strategic thinking. They commented that a better national strategic planning process is needed to guide Federal investments in homeland security, one that more explicitly involves discussions of tradeoffs of investing in programs that protect against one risk rather than another. They also suggested that fragmented approaches within and across the Federal Government be addressed by developing Government-wide guidance on using risk management principles. The final challenge they discussed was related to developing public-private partnerships. They believe that risk management is the responsibility of both the public and the private sectors. They suggested that public-private collaboration would be improved if representatives from State and local governments, as well as the private sector, were more involved in public risk assessments and had more access to the Federal Government's information about threats, vulnerabilities and consequences, and this information being used to assess these various risks. The challenges that our participants cited are consistent with the goals and strategies of the National Infrastructure Protection Plan. Our sense is that DHS also recognizes them and is organizing itself to deal with them. This concludes my statement. I would be pleased to answer any questions you or the subcommittee Members may have. [The statement of Mr. Rabkin follows:] Prepared Statement of Norman J. Rabkin June 25, 2008 gao highlights Highlights of GAO-08-904T, a testimony before the Subcommittee on Transportation Security and Infrastructure Protection, Homeland Security Committee, House of Representatives. Why GAO Convened This Forum From the terrorist attacks of September 11, 2001, to Hurricane Katrina, homeland security risks vary widely. The Nation can neither achieve total security nor afford to protect everything against all risks. Managing these risks is especially difficult in today's environment of globalization, increasing security interdependence, and growing fiscal challenges for the Federal Government. Broadly defined, risk management is a process that helps policymakers assess risk, strategically allocate finite resources, and take actions under conditions of uncertainty. GAO convened a forum of 25 national and international experts on October 25, 2007, to advance a national dialog on applying risk management to homeland security. Participants included Federal, State, and local officials and risk management experts from the private sector and academia. Forum participants identified: (1) What they considered to be effective risk management practices used by organizations from the private and public sectors; and (2) key challenges to applying risk management to homeland security and actions that could be taken to address them. Comments from the proceedings do not necessarily represent the views of all participants, the organizations of the participants, or GAO. Participants reviewed a draft of this report and their comments were incorporated, as appropriate. risk management: strengthening the use of risk management principles in homeland security What Participants Said Forum participants identified what they considered to be effective public and private sector risk management practices. For example, participants discussed the private sector use of a chief risk officer, though they did not reach consensus on how to apply the concept of the chief risk officer to the public sector. One key practice for creating an effective chief risk officer, participants said, was defining reporting relationships within the organization in a way that provides sufficient authority and autonomy for a chief risk officer to report to the highest levels of the organization. Participants stated that the U.S. Government needs a single risk manager. One participant suggested that this lack of central leadership has resulted in distributed responsibility for risk management within the administration and Congress and has contributed to a lack of coordination on spending decisions. Participants also discussed examples of public sector organizations that have effectively integrated risk management practices into their operations, such as the U.S. Coast Guard, and compared and contrasted public and private sector risk management practices. According to the participants at our forum, three key challenges exist to applying risk management to homeland security: improving risk communication, political obstacles to risk-based resource allocation, and a lack of strategic thinking about managing homeland security risks. Many participants agreed that improving risk communication posed the single greatest challenge to using risk management principles. To address this challenge, participants recommended educating the public and policymakers about the risks we face and the value of using risk management to establish priorities and allocate resources; engaging in a national discussion to reach a public consensus on an acceptable level of risk; and developing new communication practices and systems to alert the public during an emergency. In addition, to address strategic thinking challenges, participants recommended the Government develop a national strategic planning process for homeland security and Government-wide risk management guidance. To improve public-private sector coordination, forum participants recommended that the private sector should be more involved in the public sector's efforts to assess risks and that more State and local practitioners and experts be involved through intergovernmental partnerships. Madam Chairwoman and Members of the subcommittee: Thank you for inviting me to participate in today's hearing on the use of risk management principles in homeland security. As shown by the terrorist attacks of September 11, 2001, and Hurricane Katrina, homeland security risks vary widely. The Nation can neither achieve total security nor afford to protect everything against all risks. Managing these risks is especially difficult in today's environment of globalization, increasing security interdependence, and growing fiscal challenges for the Federal Government. It is increasingly important that organizations effectively target homeland security funding--totaling nearly $65 billion in 2008 Federal spending alone--to address the Nation's most critical priorities. Using principles of risk management can help policymakers reach informed decisions regarding the best ways to prioritize investments in security programs so that these investments target the areas of greatest need. Broadly defined, risk management is a strategic process for helping policymakers make decisions about assessing risk, allocating finite resources, and taking actions under conditions of uncertainty. The Department of Homeland Security (DHS) has established a risk management framework to help the Department target its investments in security programs based on risk. This framework defines risk as a function of threat, vulnerability, and consequence, or, in other words, a credible threat of attack on a vulnerable target that would result in unwanted consequences. Our prior work has shown that using risk management principles to prioritize which programs to invest in and to measure the extent to which such principles mitigate risk is a challenging endeavor. For this reason, to assist both Congress and Federal agencies, including DHS, GAO convened an expert panel to advance the national dialog on strengthening the use of risk management principles to manage homeland security programs. Today, I'll discuss the highlights of our panel's thoughts on the issues we asked them to identify: (1) Effective risk management practices used by organizations from the public and private sectors; and (2) key challenges faced by public and private organizations in adopting and implementing a risk-based approach to manage homeland security programs and actions that could be taken to address them. summary Participants identified effective public and private sector risk management practices. For example, participants discussed the private sector use of the chief risk officer. However, participants discussed but did not reach consensus on how to apply this concept of a chief risk officer to the public sector. They also discussed examples of public sector organizations that have effectively integrated risk management practices into their operations, such as the U.S. Coast Guard, and compared and contrasted public and private sector risk management practices. According to the participants at our forum, three key challenges exist to applying risk management to homeland security: improving risk communication, political obstacles to allocating resources based on a consideration of risk, and a lack of strategic thinking about managing homeland security risks. Many participants, 35 percent, agreed that improving risk communication posed the single greatest challenge to using risk management principles. Further, 19 percent of participants stated political obstacles to risk-based resource allocation was the single most critical challenge, and the same number of participants, 19 percent, said the single most critical challenge was a lack of strategic thinking. The remaining participants identified other key challenges, for example, technical issues such as the difficult but necessary task of analyzing threat, vulnerability, and consequences of a terrorist attack in order to assess risk; partnership and coordination challenges; and the need for risk management education. The expert panel also identified ways to address some of these challenges. To better communicate about risks, participants recommended that we educate the public and policymakers about the risks we face and the value of using risk management to establish priorities and allocate resources; engage in a national discussion to reach a public consensus on an acceptable level of risk; and develop new communication practices and systems to alert the public during an emergency. To better allocate resources based on risk, participants recommended that public officials and organizations consider investing in protective measures that yield long-term benefits. In addition, to address strategic thinking challenges, participants recommended the Government develop a national strategic planning process for homeland security and Government-wide risk management guidance. To improve public-private sector coordination, forum participants recommended that the private sector should be more involved in the public sector's efforts to assess risks and that more State and local practitioners and experts be involved through intergovernmental partnerships. background The Comptroller General convened this expert panel from the United States and abroad to advance a national dialog on strengthening the use of risk management principles to better manage homeland security programs. The forum brought together a diverse array of experts from the public and private sectors, including, from the public sector, a former Governor, a former DHS under secretary, a U.S. Coast Guard Admiral, and senior executives from DHS, the U.S. Army, and the National Intelligence Council, as well as State and local officials with homeland security responsibilities. From the private sector, participants included executives from leading multinational corporations such as Swiss Re, Westfield Group, JPMorgan Chase, and Wal-Mart. In addition, several of the world's leading scholars from major universities, the National Research Council, and the RAND Corporation participated in the forum. (See app. I for a list of participants.) Recognizing that risk management helps policymakers make informed decisions, Congress and the administration have charged Federal agencies to use a risk-based approach to prioritize resource investments. Nevertheless, Federal agencies often lack comprehensive risk management strategies that are well integrated with program, budget, and investment decisions. To provide a basis for analyzing these strategies, GAO has developed a risk management framework \1\ based on industry best practices and other criteria. This framework, shown in figure 1, divides risk management into five major phases: (1) setting strategic goals and objectives, and determining constraints; (2) assessing risks;\2\ (3) evaluating alternatives for addressing these risks; (4) selecting the appropriate alternatives; and (5) implementing the alternatives and monitoring the progress made and results achieved. --------------------------------------------------------------------------- \1\ For a description of this framework, see Appendix I of GAO, Risk Management: Further Refinements Needed to Assess Risks and Prioritize Protective Measures at Ports and Other Critical Infrastructure, GAO-06-91 (Washington, DC: Dec. 15, 2005). \2\ Risk assessment is the process of qualitatively or quantitatively determining the probability of an adverse event and the severity of its impact on an asset. [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Our work has indicated that while DHS is making progress in applying risk management principles to guide its operational and resource allocation decisions, challenges remain. GAO has assessed DHS's risk management efforts across a number of mission areas-- including transportation security, port security, border security, critical infrastructure protection, and immigration enforcement--and found that risk management principles have been considered and applied to varying degrees. For example, in June 2005 we reported that the Coast Guard had developed security plans for seaports, facilities, and vessels based on risk assessments.\3\ However, other components had not always utilized such an approach. As we reported in August 2007, while the Transportation Security Administration has developed tools and processes to assess risk within and across transportation modes, it had not fully implemented these efforts to drive resource allocation decisions.\4\ Moreover, in February 2007, we reported that DHS faced substantial challenges related to strengthening its efforts to use information on risk to inform strategies and investment decisions, for example, by integrating a consideration of risk into annual budget and program review cycles.\5\ We also reported that while integrating a risk management approach into decisionmaking processes is challenging for any organization, it is particularly difficult for DHS given its diverse set of responsibilities. The Department is responsible for dealing with all-hazards homeland security risks--ranging from natural disasters to industrial accidents and terrorist attacks. The history of natural disasters has provided experts with extensive historical data that are used to assess risks. By contrast, data about terrorist attacks are comparatively limited, and risk management is complicated by the asymmetric and adaptive nature of our enemies. --------------------------------------------------------------------------- \3\ GAO, Strategic Budgeting: Risk Management Principles Can Help DHS Allocate Resources To Highest Priorities, GAO-05-824T (Washington, DC: June 29, 2005). \4\ GAO, Department of Homeland Security: Progress Report on Implementation of Mission and Management Functions, GAO-07-454 (Washington, DC: Aug. 17, 2007). \5\ GAO, Homeland Security: Applying Risk Management Principles to Guide Federal Investments, GAO-07-386T (Washington, DC: Feb. 7, 2007). --------------------------------------------------------------------------- In addition to helping Federal agencies like DHS focus their efforts, risk management principles can help State and local governments and the private sector--which owns over 85 percent of the Nation's critical infrastructure--prioritize their efforts to improve the resiliency of our critical infrastructure and make it easier for the Nation to rebound after a catastrophic event. Congress has recognized State and local governments and the private sector as important stakeholders in a national homeland security enterprise and has directed Federal agencies to foster better information sharing with these partners. Without effective partnerships, the Federal Government alone will be unable to meet its responsibilities in protecting and securing the homeland. A shared national approach--among Federal, State, and local governments as well as between public and private sectors--is needed to manage homeland security risk. identifying effective risk management practices in the private and public sectors Participants discussed effective risk management practices used in the public and private sector. For example, they discussed the concept of a chief risk officer but did not reach consensus on how to apply the concept to the public sector. The participants also identified examples of public sector organizations that effectively integrated risk management into their operations and compared and contrasted public and private sector risk management practices. Chief Risk Officer Participants said that private sector organizations have established the position of the chief risk officer, an executive responsible for focusing on understanding information about risks and reporting this information to senior executives. One key practice for creating an effective chief risk officer, participants said, was defining reporting relationships within the organization in a way that provides sufficient authority and autonomy for a chief risk officer to report to the highest levels of the organization. However, participants did not reach consensus on how to apply the concept of the chief risk officer to the public sector. Participants stated that the U.S. Government needs a single risk manager. One participant suggested that this lack of central leadership has resulted in distributed responsibility for risk management within the administration and Congress and has contributed to a lack of coordination on spending decisions. Another participant stated that the Secretary of DHS fills the chief risk officer role. Participants identified various challenges associated with appointing a chief risk officer within the public sector, including: (1) Balancing the responsibilities for protection against seizing opportunities for long-range risk reduction; (2) creating a champion but not another silo that is not integrated with other components of the organization; and (3) generating leadership support for the position. Integration of Risk Management Principles into Public Sector Operations Participants identified examples of organizations that effectively integrated risk management into the operations of public sector organizations, including the U.S. Coast Guard, the U.S. Army Corps of Engineers, and the Port Authority of New York and New Jersey. Participants stated that the Coast Guard uses risk management principles to allocate resources, balance competing needs of security with the efficient flow of commerce, and implement risk initiatives with its private sector partners, for example, through Area Maritime Security Committees. According to another participant, the Army Corps developed flood risk management practices that he saw as notable because this information was used to digest and share critical information with the public. One participant noted that the Port Authority of New York and New Jersey developed and implemented a risk assessment program that guided the agency's management in setting priorities for a 5-year, $500 million security capital investment program. According to this participant, this methodology has since been applied to over 30 other transportation and port agencies across the country, and the Port Authority has moved from conducting individual risk assessments to implementing an ongoing program of risk management. Comparing and Contrasting Public and Private Sector Risk Management Practices Participants observed that while, in some instances, the public and private sector should apply risk management principles in similar ways, in other instances, the public and private sectors manage risk differently. One participant stated in both the public and private sectors the risk management process should include the systematic identification and assessment of risks through scientific efforts; efforts to mitigate risks; and risk adaptation to address financial consequences or to allow for effective transfer of risk. However, participants noted that the private and public sectors also manage risk differently. One participant said the private sector manages risk by ``pre-funding'' and diversifying risk through insurance. In addition, the private sector creates incentives for individuals to lower the risks they face from, for example, a car accident or a natural disaster, by offering to reduce insurance premiums if the policy holder takes certain steps to mitigate these risks. Similarly, the public sector also plays a unique role in managing risk, for instance, regulating land use and establishing building codes; organizing disaster protection, response, and recovery measures; setting regulatory frameworks; and supplementing the insurance industry. In addition, participants noted that the private sector organizations have more flexibility than the public sector to select which risks to manage. For instance, participants stated that the private sector could avoid risks in cases where the costs of ensuring these risks are too high. Additionally, a participant noted that the private sector tends to naturally consider opportunity analysis--or the process of identifying and exploring situations to better position an organization to realize desirable objectives--as an important part of risk management. In contrast, participants observed, public sector organizations have less flexibility to select which risks to address through protective measures. Like the private sector, the Government has to makes choices about which risks to protect against--since it cannot protect the Nation against all hazards. Unlike the private sector, the Government has a wide responsibility for preparing for, responding to, and recovering from all acts of terrorism and natural or manmade disasters and is accountable to the public for the investment decisions it makes. identifying and addressing the most critical homeland security risk management challenges Participants identified three key challenges to strengthening the use of risk management in homeland security--risk communication, political obstacles to making risk-based investments, and a lack of strategic thinking. Participants also recommended ways to address them. Key Challenges Many participants, 35 percent, agreed that improving risk communication posed the single greatest challenge to using risk management principles (see fig. 2 below). Further, 19 percent of participants stated political obstacles to risk-based resource allocation was the single most critical challenge, and the same proportion of participants, 19 percent, said the single most critical challenge was a lack of strategic thinking. The remaining participants identified other key challenges, for example, technical issues such as the difficult but necessary task of analyzing threat, vulnerability, and consequences of a terrorist attack in order to assess and measure risk reduction; and partnership and coordination challenges. [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Risk Communication Challenges Participants identified several risk communication challenges and recommended actions to address them as follows: Educate the public about risks and engage in public discourse to reach consensus on an acceptable level of risk.-- Participants said that the public lacks a fact-based understanding of what homeland security risks the Nation faces. Participants attributed these problems to media coverage that undermines a fact-based public discussion of risk by sensationalizing acts of terrorism that have dramatic consequences but may be unlikely to occur. In addition, participants stated that even though it is not possible to prevent all disasters and catastrophes, public officials need to engage the public in defining an acceptable level of risk of a terrorist attack or natural disaster in order to make logical, risk-based resource allocation decisions. To communicate with the public about risks in a meaningful way, participants recommended educating the public on how risk is defined, providing fact-based information on what risks we face and the probability they might occur, and explaining how risk informs decisionmaking. One expert recommended the Government communicate about risks through public outreach in ways that calms the public's fears while raising awareness of risks. Another participant recommended that the country engage in a national public discourse to reach consensus on an acceptable level of risk. Educate policymakers and establish a common lexicon for discussing risk.--Participants emphasized the importance of educating elected officials on risk management. Several participants believed that the distinction between risk assessment--involving scientific analysis and modeling--and risk management--involving risk reduction and evaluation--is not widely understood by policymakers. In addition, one expert also noted that the Nation should do more to train a cadre of the next generation of risk management professionals. Given differences in education and levels of understanding about risk management, the participants felt it would be important to develop a common lexicon that can be used for dialog with both the layman and the subject matter expert. Without a common, shared understanding of risk management terms, communicating about risks is challenging. Some members of our expert panel recommended focusing specifically on educating elected officials and the next generation of policymakers about risk management. One participant pointed out that a new administration and Congress will soon enter office with a new set of policy objectives, and it will be important to highlight the importance of risk management to incoming policymakers and to persuade them to discuss it. Panelists also recommended creating a common vocabulary or lexicon that defines common risk management terms. Develop new risk communication practices to alert the public during emergencies.--Participants said that Government officials lack an understanding of what information to share and how to communicate with the public during an emergency. Participants said that risk analysis, including predictive modeling, tends to neglect a consideration of how the public's expectations and emotions can impact the effectiveness of response efforts and affect the likelihood the public will respond as predicted or directed by Government officials during an emergency. According to one participant, Hurricane Katrina demonstrated that the efficacy of emergency response efforts depends on how the public behaves, as some people chose to shelter in place while others followed directions to evacuate. Participants recommended that governments consider what information should be communicated to the public during a crisis and how best to communicate that information. For instance, one participant suggested that experts look at existing risk communication systems, such as the National Weather Service, that could be used as models for a homeland security risk communication system. The participant noted that the service provides both national and local weather information, looks at overall risks, and effectively provides actionable information to be used by both the public and private sectors. Participants criticized the current color- coded DHS Homeland Security Advisory System as being too general, suggesting that the public does not understand what is meant by the recommended actions such as being vigilant. Political Obstacles to Risk-Based Resource Allocation Participants said political obstacles pose challenges to allocating homeland security resources based on risk. Participants identified the reluctance of politicians and others to make risk-based funding decisions. Participants noted that elected officials' investment priorities are informed by the public's beliefs about which risks should be given the highest priority, beliefs that are often based on incomplete information. As a result, participants stated that there is less incentive for officials to invest in long-term opportunities to reduce risk, such as investing in transportation infrastructure, when the public does not view these investments as addressing a perceived risk. To better allocate resources based on risk, participants recommended that public officials and organizations consider investing in protective measures that yield long-term benefits. Need to Improve Strategic Thinking Participants agreed that a lack of strategic thinking was a key challenge to incorporating risk-based principles in homeland security investments. In particular, participants noted that challenges existed in these areas: A national strategic planning process is needed to guide Federal investments in homeland security.--Participants said there is a lack of a national strategic planning process to guide Federal investments in homeland security. Balancing the security concerns of various Federal Government agencies that have diverse missions in areas other than security, such as public safety and maintaining the flow of commerce, poses a significant strategic challenge, some participants stated. One participant stated that the President had developed a strategy to guide, organize, and unify the Nation's homeland security efforts in the October 2007 National Strategy for Homeland Security. However, several other participants said that a better process is needed for strategic planning. For example, to think strategically about risk they recommended that stakeholders discuss tradeoffs, such as whether more resources should be spent to protect against risks from a conventional bomb, nuclear attack, biological attack, or a hurricane. Another participant noted that the purpose of risk assessment is to help answer these strategic questions. One participant also recommended that the short-term goal for a national strategic planning process should be identifying the big problems that strategic planning needs to address, such as measuring the direct and indirect costs of reducing risk. Fragmented approaches to managing security risk within and across the Federal Government could be addressed by developing Government-wide risk management guidance.--Some participants agreed that approaches to risk management were fragmented within and across the Federal Government. For example, one participant said that each of the Department of Defense combatant commands has its own perspective on risk. According to this participant, this lack of consistency requires recalculations and adjustments as each command operates without coordinating efforts or approaches. Three participants also said that there is a lack of Government-wide guidance on using risk management principles to manage programs. To address this problem, participants said Government-wide guidance should be developed. Two participants suggested that OMB or another Government agency should play a lead role in outlining goals and general principles of risk assessment and getting agencies to implement these principles. Partnership and Coordination Challenges Participants agreed that risk management should be viewed as the responsibility of both the public and private sector. They identified challenges related to public-private collaboration: Private sector should be more involved in public risk assessments.--Participants said that public-private partnerships are important and should be strengthened. One reason partnerships may not be as strong as they could be is that the private sector may not be appropriately involved in the public sector's risk assessments or risk-based decision- making. Participants agreed that the private sector should be involved in developing risk assessments because when these stakeholders are not sufficiently involved they lose faith in Government announcements and requirements related to new risks and threats. To this end, DHS has established coordinating councils for critical infrastructure protection that allow for the involvement of representatives from all levels of Government and the private sector, so that collaboration and information sharing can occur to assess events accurately, formulate risk assessments, and determine appropriate protective measures. Increase the involvement of State and local practitioners and experts.--Participants observed that intergovernmental partnerships--between Federal, State, local, and tribal governments--are important for effective homeland security risk management. They recommended that more State and local practitioners and experts become involved in applying risk management principles to homeland security. This concludes my prepared statement. I would be pleased to answer any questions you and the subcommittee Members may have. Appendix I: List of Participants Moderators Cathleen A. Berrick: Director, Homeland Security and Justice, Government Accountability Office; Sallyanne Harper: Chief Administrative Officer and Chief Financial Officer, Government Accountability Office; Norman J. Rabkin: Managing Director, Homeland Security and Justice, Government Accountability Office. Participants Michael Balboni: Deputy Secretary for Public Safety, State of New York; Esther Baur: Director, Group Communications, Head of Issue Management & Messages, Swiss Re; Baruch Fischhoff: Howard Heinz University Professor, Department of Social and Decision Sciences and Department of Engineering and Public Policy, Carnegie Mellon University; George W. Foresman: President, Highland Risk & Crisis Solutions, Ltd., Former Under Secretary for National Protection and Programs, Former Under Secretary for Preparedness, U.S. Department of Homeland Security; Tina W. Gabbrielli: Director, Office of Risk Management and Analysis, National Protection and Programs Directorate, Department of Homeland Security; James Gilmore: Partner, Kelley Drye & Warren, LLP, Chairman, Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction, Governor of Virginia, 1998-2002; Corey D. Gruber: Assistant Deputy Administrator, National Preparedness Directorate, Federal Emergency Management Agency, Department of Homeland Security; Brian Michael Jenkins: Senior Advisor to the President, RAND Corporation; RDML Wayne E. Justice: Rear Admiral, Director of Response Policy, United States Coast Guard; Kenneth L. Knight, Jr.: National Intelligence Officer for Warning, National Intelligence Council, Office of the Director of National Intelligence; Howard Kunreuther: Cecilia Yen Koo Professor, Department of Decision Sciences and Public Policy, Wharton School, University of Pennsylvania, Co-Director, Wharton Risk Management and Decision Processes Center; Peter Lowy: Group Managing Director, Westfield Group; Thomas McCool: Director of the Center for Economics, Government Accountability Office; Susan E. Offutt: Chief Economist, Government Accountability Office; John Paczkowski: Director, Emergency Management and Security, Port Authority of New York and New Jersey; John Piper: Senior Security Consultant, Talisman, LLC; William G. Raisch: Director, International Center for Enterprise Preparedness, New York University; Joseph A. Sabatini: Managing Director, Head of Corporate Operational Risk, JPMorgan Chase; Kenneth H. Senser: Senior Vice President for Global Security, Aviation and Travel, Wal-Mart Stores, Inc.; Hemant Shah: President and Chief Executive Officer, Risk Management Solutions; Steven L. Stockton: Deputy Director of Civil Works, U.S. Army Corps of Engineers; William F. Vedra, Jr.: Executive Director, Ohio Homeland Security; Detlof von Winterfeldt: Professor, Industrial and Systems Engineering Viterbi School of Engineering, University of Southern California, Professor of Public Policy and Management, School of Policy Planning, Director, Center for Risk and Economic Analysis of Terrorism Events, University of Southern California; Scott T. Weidman: Director, Board on Mathematical Sciences and Their Applications, National Research Council; Henry H. Willis: Policy Researcher, RAND Corporation. Ms. Jackson Lee. Thank you very much, Mr. Rabkin. Thank you both for your testimony. As I proceed on this question, there are many variables that come to mind when we think about risk. One of the most striking, beyond the horrific tragedy of 9/11 that caused the organization of the Department of Homeland Security and this committee, of which I was one of the early members of the Homeland Security Steering Committee, the organizing committee, was the lack of risk assessment that played into our response during Hurricane Katrina--less so with Hurricane Rita, but certainly the tragedies of what occurred were enhanced or worsened because it seemed as if we had no understanding of how you project risk. As we watch levees standing or falling in the recent episode of flooding that has created a great deal of tragedy in many parts of the United States, we wonder whether or not we have even improved. So my questions go in the context of reality. That is why we are holding this hearing. Certainly, as all of us have expressed our sympathy to Mr. McInnis, we know that tragedies, incidents can result in loss of life. Let me start, Secretary Jamison, as I yield myself 5 minutes, to ask you quickly, and your answers please, I have a number of questions. In our letter to Secretary Chertoff dated May 15, 2008, the committee requested quarterly briefings by the Office of Risk Management and Analysis to ensure that it was staying focused on its core mission. Will the Department commit to this request? Mr. Jamison. Yes, I would be glad to come up and brief you quarterly or as frequently as you would like to keep you up to speed on our progress. Ms. Jackson Lee. We just wanted to get that on the record so we can get that scheduled and to make sure that we have gotten that answer. The Office of Risk Management and Analysis has asserted to this committee that among its major functions is the construction of a risk lexicon. Many of us think that this is work already done. I assume this is part of a baseline that we are trying to work on. Can you tell us how far along they are on this project, and when can we expect to receive a copy of this particular report? Mr. Jamison. We are actually very far along in the process and have been working on it through the risk management working groups within the Department for several months now. We have identified I believe about 80 terms for the lexicon. We expect it to be completed by the end of the summer. Hopefully, that will play a much larger portion role in the broader framework that we are trying to put together in addition to a lexicon, best practices and other strategic frameworks of guidance that needs to be delivered across the Department and to be implemented down into the national infrastructure protection plan in that framework. Ms. Jackson Lee. That would be helpful. I think these quarterly meetings that you will have with us will be important, but we would like to see minutes of the meetings that you are having and try to find out how often these meetings are going on. I have tried to give this hearing a sense of urgency. So how often are these meetings going on in the Department? Mr. Jamison. We have meetings at different levels, so we have an integrated framework. We have a steering committee that is at a higher level, an executive level at the under secretary and the assistant secretary level. We also have working group levels that are meeting. I believe the working group levels have met more than 40 times already on trying to work on these strategic issues such as the lexicon, the integrated framework, and RAPID. Ms. Jackson Lee. We know the United Kingdom has already organized itself around a national risk assessment for homeland security. It outlines the Nation's risk assessment in Great Britain strategy and framework. Have we done so? Why have we not done so? Or if we haven't done so, why not? Mr. Jamison. I think there has been a lot of work that has been done, as you mentioned earlier, in the standup of the Department and all the individual agencies, whether it is TSA or Coast Guard or even the Infrastructure Protection Division. Ms. Jackson Lee. But do we have something similar to the one in Great Britain? Mr. Jamison. That is what we are working toward. Ms. Jackson Lee. We don't have it yet? Mr. Jamison. No. Ms. Jackson Lee. All right. What about a position for a chief risk officer? Mr. Jamison. I think that we have in fact got a chief risk officer as the director of the Risk Management Directorate. The way I have read the report that GAO recommends, you need one person that is in charge of that guidance, and one person that is in charge across DHS in providing that consistency. That is the Risk Management Directorate. It is located within the headquarters and NPDD. Ms. Jackson Lee. While I would commend you, Secretary Jamison, and we know that people are hard working, I don't think that office even has a strategy or strategic plan. I would also say that is something that we need to have. But let me continue because I want to ask Mr. Rabkin some questions. I think we are going to make a good start by having these quarterly meetings. In terms of risk assessment and management, what kinds of communications are being given to State and county and local government which really would have impact on the tragic incident of Goodyear? What kind of directives are coming out for those entities to be conscious of risk and risk assessment and risk management? Mr. Jamison. I think there are several ways that we can address that question. I think, as Mr. Rabkin alluded to, the national infrastructure protection framework that we put out to the infrastructure sector and the sector coordinating councils and government coordinating councils is the mechanism by which we communicate with those sectors. Ms. Jackson Lee. Government coordinating councils? Mr. Jamison. The sector coordinating council process, so for the individual infrastructure sector, for example, the chemical sector has representation from private industry, and communication portals where we provide best practices and provide risk assessments. Ms. Jackson Lee. Is that overlapping secretariats? Is that overlapping assistant secretaries that address that within DHS? Mr. Jamison. It does overlap because it is critical infrastructure sectors. For instance, TSA has a role in the transportation sectors of critical infrastructure. Ms. Jackson Lee. But are you all coordinated? Why don't I just jump to this steering committee concept and ask you how often you all are meeting. Mr. Jamison. The working group steering committees are meeting very frequently. We have had strategic executive-level committee meetings as well. We are waiting for the next level of work to be pushed up by the working group level--the lexicon, the framework guidelines--before our next meeting. We have a commitment from Secretary Chertoff to drive this consistency. We also have the commitment from the executive committee of this steering committee to move forward and to get a framework integrated by the end of the year. Ms. Jackson Lee. Mr. Secretary, I appreciate it. Glean from my tone a sense of urgency to move forward. We are talking about 2008. I think I heard you clearly that we don't have a chief risk officer, if I am not mistaken. It is long overdue. I am not sure whether we are communicating to local, State and county government--long overdue. So let me just put on the record that we need these quarterly meetings. We would like to see the work of the team that you have in place, the steering committee, as well as the meetings that are going on. I think time is of the essence and we are urgently in need of trying to understand to protect ourselves. I thank you for answering my questions. Mr. Rabkin, you mentioned the word ``communication.'' It seemed like that just jumped out at me. It really did because I used the backdrop of Hurricane Katrina. We certainly were not communicating there. That is just one example. But tell me what progress the Department of Homeland Security made in implementing its risk management framework? In a more important sense, what are the challenges that remain? Mr. Rabkin. There is progress that has been made. I think the Department has outlined where they want to go. They have communicated that through the national infrastructure protection plan and some of the internal operations that Secretary Jamison has been talking about. But certainly they have many different components that are all considering risk as they make their own investment decisions, as they make recommendations to the secretary of how much budget they should get and where it should be invested. These kinds of decisions ought to be guided by some common risk principles. I think that is what this Office of Risk Management and Analysis is planning to do is to get some commonality across. I understand that they all have individual missions and they should have some flexibility in how they apply the principles, but once the principles are straight and we have some confidence that they are being applied equally, then the secretary can make informed judgments as to which of these various investments get priority and where the next dollar ought to go. Ms. Jackson Lee. So what you are saying is this work is crucial in terms of putting these guidelines, these directives in place, to give guidance to the secretary, to give guidance on how we move forward in the Department. Mr. Rabkin. Absolutely. I think it is only reality that these decisions have been made in the past and some have been more risk-informed than others. They have to be made. Budgets have to be submitted and acted upon. Ms. Jackson Lee. Let me ask the obvious question. Does our Government need a national risk assessment? If so, who should lead it? How quickly should we get it? Mr. Rabkin. If we are talking about homeland security only, then obviously it does. I think it gets it through both the secretary and the Homeland Security Council in the White House that can look across departments and across issues. If we are talking about more than homeland security, if we are talking about risk assessment for all the issues that the Federal Government has to deal with, I think OMB is in a better position to ensure that risk management principles are applied to all the departments, and that the consolidated Federal budget is based on these principles so that decisions about investing in homeland security or any other need--national defense or education or environment--are made based on the same guidelines. Ms. Jackson Lee. Since we are starting here in DHS, I think my focus will be getting our shop in order and using the internal mechanisms. Do you think, then, there is great validity in a chief risk officer for DHS? Mr. Rabkin. I agree with the discussion that took place at our forum, that by identifying someone as a chief risk officer puts credibility and focus on that issue and raises it to the same level as chief information officer, chief management officer, chief human capital officer. That is what the Department deals with all the time, and I think it is appropriate. Ms. Jackson Lee. Thank you so very much. It is my pleasure to yield to the distinguished gentleman from Florida, Mr. Bilirakis, for his questioning. Mr. Bilirakis. Thank you, Madam Chairwoman. This question is for both panelists. Are there metrics or performance measures that can help determine whether risk-based resource allocation and Federal homeland security programs are in fact actually reducing risks to critical infrastructure and key resources? Can you provide specific examples of how such risk-informed decisionmaking has brought down risk to certain sectors? For both panelists, please. Mr. Jamison. I will take a first shot at that. I think that there has been a lot of work across the Department trying to prioritize risk and to try to incorporate it into the individual areas that we are trying to mitigate risk in, for instance the aviation sector or the maritime sector. There has been a lot of work in trying to prioritize the grant process to make sure we are capturing the threats, vulnerabilities and consequences to effectively give out resources to manage that risk. We are in the process of trying to get better metrics to determine how that funding and how those resources have driven down and mitigated that risk. The Coast Guard has done some work in that area. FEMA has undertaken that work for their management process. We have a ways to go. It is a difficult problem to be able to determine how individual pieces of that system of systems of security have an impact that you can bring back and quantifiably measure. But it is definitely the direction that we are going to try to make sure that those investments are having an impact in the State and local communities that we are trying to protect. Mr. Rabkin. I would like to put a little different twist on it, and perhaps lower your expectations about how much we can quantify risk across the board. When we talk about assessing the risk that is inherent in any of these problem areas or components of homeland security, we are talking about a combination of threat and vulnerability and consequences. So we are talking about how well can we measure what the threat is. Threat, as best I can tell, generates from the intelligence community and is to a certain extent subjective. Second, we talk about the vulnerabilities of various sectors to attack, either by terrorists or some natural disasters. The vulnerabilities can be better measured. I think we have in the various sectors checklists of things to look for, whether they have closed-circuit surveillance cameras or not, for example; whether the perimeters are secure. The consequences of any bad event are also quantifiable, but there is a lot of judgment that goes into how far you go and what kind of results you are trying to quantify. If something bad happens, what are the consequences? Well, if a chemical plant is attacked and there is an explosion, there are immediate consequences to the workers and to the immediate community. There are also downwind consequences as the chemicals spread, and you have to try to measure that. There is also the psychological effect of a terrorist attack being successful. That is much more difficult to measure. Mr. Bilirakis. Okay. In your written testimony, Mr. Secretary, you noted that the Department is still working to implement an integrated framework of risk-informed decisionmaking. How far off is DHS from developing a methodology for cross-sector risk analysis? Are you confident that DHS is allocating resources in the most effective manner in the absence of the ability to measure cross-sector risk? Mr. Jamison. Well, there are two different efforts that are ongoing that get at the intent of your question, I believe: one within the National Infrastructure Protection Directorate, Bob Stefan's directorate. They are working at a cross-sector methodology across those sectors to aggregate that information and are looking at about five different methodologies to be able to roll up a more comprehensive risk picture. We anticipate that we will have a lot of that work done by early next year. There is also the effort across the Department to roll up the risk not only from infrastructure protection, but also from TSA, from the other components into a much broader framework. There has been a lot of work done applying the different program that we have, the well over 120 programs that we have focused on risk mitigation and how they stack up against our priorities. We are currently going through a methodology called the RAPID process to be able to run some prototypes on different scenarios and to try to give a quantification to how well we are managing risk against those different scenarios. We hope to be able to prototype them in the fall. Mr. Bilirakis. Mr. Rabkin, what are some of the ways that the public and private sectors should apply risk management principles similarly? Are there ways they should manage risk differently? What do you mean when you say that risk communication is the single greatest challenge to using risk management principles? Mr. Rabkin. I think the participants at our forum focused on risk communication because the decisionmaking process is so inexact as a science. It is an art that is developing. In the absence of solid ways to make these decisions, what really works best is an informed public, sharing of information between people that have it and people that need it. In the case of the transportation sector, for example, sharing between TSA and the airlines or TSA and railroad operators, passenger rail or freight rail. I think the witnesses on the next panel can talk very well about that kind of interaction between the locals who need to take actions and make investments to take specific actions. Those investments may be funded by DHS. They may be funded locally. To the extent that they have better information and there is more communication that takes place, the more confidence they have that they are making wise investments. Mr. Bilirakis. One more question, Madam Chair? Is that all right? Okay. During GAO's forum last year on applying risk management in homeland security, participants concluded that the public needs to be educated about acceptable levels of risk and better understanding of the homeland security risks facing our Nation. How did the forum participants propose doing that? Mr. Rabkin. There were a couple of ideas that were suggested. I don't have them at my fingertips. I can certainly provide them for the record. Mr. Bilirakis. We would appreciate that. Thank you. Thank you, Madam Chair. I appreciate it. Ms. Jackson Lee. The gentleman's time has expired. Let me thank the witnesses. There being no further questions for our first panel, I thank Mr. Jamison and Mr. Rabkin for appearing before the subcommittee today for this very important hearing. I am going to request, Mr. Jamison and Mr. Rabkin, that we have a briefing that may come in short order in the month of July, when we have more extensive time of trying to understand where the Department of Homeland Security is in particular, the chief risk officer's status, and the level of performance in getting to the baseline. We really need to have an understanding both by this committee and the Department of how and what risk means. Risk means urgency. I frankly believe that we have not captured that as we have moved forward. So I believe that a briefing would be appropriate. So I will look forward to extending an invitation to you, as I thank you for appearing before this committee on this important hearing. The Members of the subcommittee may have additional questions for you, and we ask that you respond to them expeditiously in writing. You are now dismissed. We now welcome our second panel to take their seats at the witness table. Let me thank you both very much. It is my pleasure to welcome the second panel of witnesses. Our first witness, Mr. John Paczkowski, has worked for the Port Authority of New York and New Jersey since 1978, holding a variety of executive-level positions in planning, policy and operations. In September, 2001, he was the assistant director for operations and managed the agency's emergency operations center following the 9/11 attacks on the World Trade Center. In 2002, he worked in partnership with the Office for Domestic Preparedness to develop and implement a risk assessment program that guided the setting of priorities for a 5-year, $500 million security investment program. This methodology has been applied at over 30 other transportation and port agencies across the country. Mr. Paczkowski is also a member of the board of directors for the Security Analysis and Risk Management Association. SARMA is a nonprofit professional association serving those responsible for formulizing and managing security risk to systems, structures, operations and information systems from manmade threats. Welcome to you. Our second witness, Dr. James Carafano, is an expert in defense affairs, military operations and strategy, and homeland security at the Heritage Foundation. Dr. Carafano's research focuses on developing the national security needed to secure the long-term interests of the United States, protecting its citizens, providing for economic growth, and preserving civil liberties. Dr. Carafano was an assistant professor at the U.S. Military Academy in West Point, New York. He served as director of military studies at the Army's Center of Military History. He has also taught at Mount Saint Mary College in New York and served as a fleet professor in the U.S. Naval War College. He is a visiting professor at the National Defense University and Georgetown University. He is a graduate of West Point, and also has a master's degree and a doctorate from Georgetown University and a master's degree in strategy from the U.S. Army College. You are welcome. Our third witness is Mr. Raymond McInnis. Mr. McInnis recently lost his wife, Gloria McInnis, on June 11, when a chemical explosion blast occurred in the heat exchange unit of the Goodyear plant in Houston. Gloria had worked at the plant for 31 years as a faithful and dedicated and committed worker. Mr. McInnis retired from the Goodyear chemical plant in Houston after working there for 38 years as a committed and dedicated and knowledgeable worker, where he rose to the rank of shift foreman. Ray and Gloria McInnis were married for 18 years. In his grief, we are very honored and respectful of his presence here today. Welcome, Mr. McInnis. Our fourth witness is Mr. John Morawetz. Mr. Morawetz has worked for the International Chemical Workers Union Council, which is part of the United Food and Commercial Workers International Union, since 1988. The ICWUC was founded in 1944 and represents more than 20,000 chemical workers in 32 States, including many of them in the State of Texas. In 1988, Mr. Morawetz was hired as the founding director of the Council Center for Worker Health and Safety Education in Cincinnati, Ohio. In 2005, he was named the director of the union's Health and Safety Department. The center is part of a union consortium made up of six unions. It trains 2,000 participants each year in industrial, hospital and school chemical emergency response and disaster preparedness, and has an extensive worker training and development program which develops rank-and-file workers as educators. Without objection, the witnesses' full statements will be inserted in the record. I also want to acknowledge Ms. Sue Davis who has traveled here with Mr. McInnis. Welcome. I now ask each witness to summarize his statement for 5 minutes, beginning with Mr. Paczkowski. Again, we welcome you. Thank you. STATEMENT OF JOHN P. PACZKOWSKI, DIRECTOR, EMERGENCY MANAGEMENT AND SECURITY, PORT AUTHORITY OF NEW YORK AND NEW JERSEY Mr. Paczkowski. Thank you, Madam Chairwoman, Ranking Member Bilirakis and Members of the subcommittee. Thank you for the opportunity to testify here today. I am John Paczkowski, director of emergency management and security for the Port Authority of New York and New Jersey, and a member of the board of directors of the Security Analysis and Risk Management Association, also known as SARMA. I will be speaking with you from both perspective today. My organization, the Port Authority of New York and New Jersey, is a bi-State public agency responsible for operating some of the New York region's most significant critical infrastructure, to include its major airports, its largest marine cargo terminals, and its network of interstate tunnels and bridges. The World Trade Center was our flagship facility and headquarters for over 30 years. Among the nearly 3,000 lives that perished on 9/11, the agency lost 84 of its corporate staff, to include 37 port authority police officers. Having been twice the victim of significant acts of terrorism, and as the operator of transportation facilities that are lucrative terror targets, no other organization is more aware of the importance of homeland security than the port authority. Following the 9/11 attacks, we conducted a comprehensive series of security audits performed by expert consultants. The results were staggering, with over 20 individual reports, 1,100 recommendations, and potential costs of just over $1 billion. Management's reactions were predictable. No. 1, do we really need to do it all? No. 2, what is most important to do first? No. 3, how do we know what will return the greatest security benefit? And No. 4, how will we be able to measure performance? Beginning in 2002, we partnered with DOJ and later DHS to develop and implement a risk assessment methodology to guide security planning and priorities for our initial 5-year, $500 million security investment program. Since then, we have implemented an ongoing program of security risk management where new assessments are compared against prior results, allowing us to measure the risks as a measure for security program performance. Unfortunately, as successful as we have been, our results are unique to our agency and not compatible with other efforts on a regional, State or national level, and are therefore of limited value to DHS when assessing overall homeland security risk. Nonetheless, I think our success proves that new approaches to security risk management do work and this should reinforce DHS, the administration and Congress to continue to advance risk management as a national homeland security policy. Before this body considers what to do next, it is important to note that risk assessment approaches are not being applied in a range of industry sectors at different levels of government, using different methods and with different objectives. As a new field, this is to be expected and to some degree beneficial. However, we are now at an important crossroads, and in the view of SARMA, stronger and more unified Federal leadership is urgently needed. The focus on homeland security that emerged after 9/11 produced significant new funding for security risk management efforts. Unfortunately, those efforts are not necessarily coordinated or compatible in their approach. As a result, almost 7 years after 9/11, the Nation has yet to achieve a consistent and well-integrated risk management framework providing decisionmakers at all levels with the ability to intelligently manage homeland security risk. In SARMA's view, this is largely the result of the following factors. Security risk management is an immature discipline that has developed independently and unevenly across the Federal Government and private industry. There is no national system of governance to guide risk practitioners and ensure collaboration and interoperability in the development or risk management approaches. There is no comprehensive documented body of knowledge on the current state of the discipline from which to implement new security risk management efforts. There is currently no capability to train or certify the knowledge and technical skills of security risk management professionals and bring new entrants into the field. These factors notwithstanding, SARMA believes there are a few practical steps within existing authorities that can be taken now to remedy the situation. Most significantly, we believe the Federal Government should create a national security risk management program. Under that program, Federal departments and agencies should be required to create a chief security risk officer appropriately positioned and empowered to synchronize, coordinate and monitor all security risk management efforts within their organizations. A DHS chief security risk officer would harmonize homeland security risk management policies and programs to ensure consistency, compatibility and integration, not only within DHS, but also with State and local governments and the private sector. Moreover, the program would create a risk management governance structure to span the interagency community and bring standardization and rigor to the assessment of security risks, while increasing overall confidence in the process and the decisions that result. In closing, a more uniform and coordinated approach to security risk management will greatly enhance our Nation's ability to understand and manage the multitude of threats we face now and well into the future. That will lead to improved decisionmaking and more efficient prioritization of resources by not only Congress and the White House, but by the thousands of State and local government and private sector leaders that make up the fabric of our national homeland security effort. This challenge is beyond the scope of DHS alone, and therefore SARMA encourages the Congress, the White House, Federal departments, State and local governments, and the security profession to join forces and achieve a risk management framework that will provide the Nation with the security it needs at a price it can afford. The members of SARMA stand ready to assist in whatever way we can to help advance this important initiative. Thank you. [The statement of Mr. Paczkowski follows:] Prepared Statement of John P. Paczkowski June 25, 2008 Chairwoman Jackson Lee, Ranking Member Lungren, and Members of the subcommittee, thank you for the opportunity to testify on ways the Federal Government can build on the efforts of the Department of Homeland Security (DHS) and others in applying risk management practices to better secure our Nation. I am John Paczkowski, Director for Emergency Management and Security at The Port Authority of New York & New Jersey and a member of the Board of Directors of the Security Analysis and Risk Management Association. The assessment and management of risk enables and supports the full spectrum of our national security and homeland security efforts, including decisions about when, where, and how to invest limited human and financial resources. In the face of multiple and diverse threats and hazards, we must accept that security risk--a function of threats, vulnerabilities, and consequences--is a permanent condition, but one that can be better managed through the creation of a well-integrated national framework. As an emergency management and security professional that has successfully applied risk management practices at an agency level and across multiple transportation sectors, I have experienced the value of using these tools to support homeland security decisionmaking first hand. This experience, as well as my leadership role with SARMA, has provided me with broad exposure to the range of national efforts undertaken in the wake of the 9/11 terror attacks. I will be speaking with you from both perspectives today. the port authority experience The Port Authority is a bi-State public agency responsible for operating some of the New York/New Jersey region's most significant critical infrastructure. We manage all of the areas major commercial airports (Newark Liberty, John F. Kennedy, LaGuardia, Stewart, and Teterboro); its largest complex of marine cargo terminals (Port Newark and Elizabeth, Howland Hook, and Brooklyn Piers); and its network of interstate tunnels and bridges (the Lincoln and Holland Tunnels; the George Washington, Bayonne, and Goethals Bridges; and the Outerbridge Crossing). The agency also operates the Port Authority Bus Terminal, a major transit hub near the heart of Times Square and the largest facility of its kind in the world. Our PATH rail transit system is a vital trans-Hudson commuter link and was the target of a serious terror plot foiled by the FBI not long after the London and Madrid metro bombings. The World Trade Center was our flagship facility and headquarters for over 30 years. We still own that site today and are responsible for its redevelopment. Among the nearly 3,000 lives that perished on 9/11, our agency lost 84 of its corporate staff, to include 37 Port Authority Police Officers. Having been twice the victim of significant acts of terrorism and endured numerous potential threats that thankfully never materialized, and as the owner and operator of vital transportation infrastructure that remain lucrative terror targets, no other organization is more acutely aware of the importance of homeland security than the Port Authority. Following the 9/11 attacks, the Port Authority conducted a comprehensive series of security audits at all of it facilities. Performed by expert consultants, the results were staggering. Over 20 individual reports, 1,100 recommendations, and a potential cost, by staff's estimate, of just over $1 billion to implement. Moreover, there was no sense of priority among the recommendations. Management's reactions were predictable, and not unlike those of the Congress for the Nation at large: (1) Do we really need to do all of the things recommended?; (2) Assuming we do, if we can't pay for it all, what is most important to address first?; (3) How do we know what types of solutions will return the greatest security benefit given what we have to invest?; and finally, (4) How will we be able to measure the performance of those investments after they have been implemented? Believing these to be the fundamental questions that would ultimately drive homeland investment going forward, we reached out for assistance to pursue our own security risk management program. Beginning in 2002, we partnered with DOJ, and later DHS, to develop and implement a risk assessment methodology to guide security planning and priorities for our initial 5-year, $500 million security investment program. The methodology permitted the agency to examine an array of potential security threats, assess the criticality of its assets, estimate the potential consequences of successful attacks, and make cross-sector comparisons of risk. Under a DHS technical assistance program, it has since been applied to 36 other transportation agencies across the country. Following completion of our first assessment in 2002, we have subsequently repeated the process on a 2-year cycle, updating security priorities, plans, and budgets in two successive iterations. In so doing, we have moved the agency from conducting individual risk assessments to implementing an ongoing program of security risk management. As each risk assessment is conducted, the results are compared against the prior one and the change in relative risk is calculated. This comparison shows not only the improvement in the agency's risk profile as the result of new investment but also any changes arising from adjustments to our infrastructure portfolio or the overall threat picture. In this way, we can measure the ``buy-down'' in risk as a metric for security program performance. In addition to measuring risk reduction performance, we have worked with DHS consultants to implement a cost-benefit analysis component to the methodology that facilitates comparisons of competing high-cost security alternatives. This tool permits us to evaluate which security improvements or, more importantly, which sets of improvements will provide greatest risk reduction ``value'' for the money invested and risk reduction potential to be achieved. We recently used this tool with great success in evaluating complex, high-cost alternatives for securing our PATH rail transit system, and will be applying it to the development of our long-range security investment plan going forward. The next evolution of the Port Authority's risk management program will go beyond security risks and examine a range of additional man-made and natural threats in an agency-wide, cross-sector, ``all hazards'' assessment. To my knowledge, no other organization at the State and local level has advanced security risk management practice to the degree that we have at the Port Authority. Unfortunately, as successful as we have been, our risk assessment results are unique to our own agency and not compatible with other similar efforts on a regional, State or national level, and are therefore of limited value to DHS when assessing overall homeland security risk. Nonetheless, our success proves that new approaches to security risk management do work, and this fact should reinforce efforts by DHS, the administration, and the Congress to advance risk management as a fundamental element of national homeland security policy. Before the administration and the Congress consider what to do next, it is important to note that risk assessment approaches are now being applied within a range of industry sectors, at different levels of government, by different agencies, using different methods, and with different objectives. As a new field, this is to be expected and to some degree necessary. However, we are now at an important crossroads and, in the view of the Security Analysis and Risk Management Association (SARMA), stronger and more unified Federal leadership on this issue is urgently needed to lead and coordinate the numerous duplicative and conflicting efforts in DHS and across the Federal Government. the sarma perspective SARMA is an all-volunteer, non-profit, professional association serving those responsible for analyzing and managing security risks to individuals, structures, systems, operations, and information. SARMA was founded in April 2006 by career security analysis and risk management professionals dedicated to fostering more effective public/ private partnerships to advance consistent, risk-based approaches that provide decisionmakers with measurable results for intelligently reducing security risks. The span of SARMA interest includes terrorism, intelligence collection, cyber crime, and natural hazards. SARMA fosters an open collaborative and non-partisan environment to promote the further development, standardization, and professionalization of the security analysis and risk management discipline for the benefit of the American public, the Nation's security, and the security profession in general. SARMA's mission is to elevate the practice of security analysis and risk management to a mature, standardized, and consistent discipline among a growing cadre of formally trained and certified professionals, all working together to make the Nation more secure and resilient. SARMA provides a vital link between the Government, the private sector, academia, and individual practitioners. Without this link, homegrown risk methods and theories tend to proliferate, making it even more difficult to coordinate protective efforts between all levels of government or with the private sector. Over the years, significant resources have been expended by Federal departments and the private sector to implement security risk management processes and methods. However, despite the considerable sums spent to effect improvement, security risk management efforts remained largely unchanged until the terrorist attacks of September 11, 2001. The focus on homeland security that emerged after 9/11 resulted in considerable numbers of new analysts and consumers of security risk information, and also produced significant new funding for security risk management efforts. Nonetheless progress to advance a well- integrated national framework still lags. DHS, other Federal agencies, academia, and the private sector have used newly available homeland security funding to develop and implement a wide array of new security risk methodologies, which are not necessarily coordinated or compatible in their approach. In addition, various homeland security directives and plans either provide conflicting guidance or remain silent on the security risk assessment methods to be used by Federal agencies, State and local government, and the private sector. As a result, almost 7 years after 9/11, the Nation has yet to achieve a consistent and well-integrated risk management framework providing decisionmakers at all levels with the ability to intelligently manage homeland security risk. In SARMA's view, this is largely the result of the following factors: Security risk management is an immature discipline that has developed independently and unevenly across the Federal Government and private industry. DHS correctly seized on the applicability of security risk management to its mandate of protecting the homeland, but it has not taken steps to ensure the structure, processes, and cadre of qualified risk analysts are in place as necessary to effectively serve the mission. Accordingly, there is still no formal system or framework to standardize technical and professional development or to otherwise build the professional infrastructure required. There is no national system of governance to guide risk practitioners and ensure collaboration and interoperability in development of risk management approaches. Absent interagency coordination, an advisory board, and/or a recognized standard-setting body, there is no way to synchronize divergent methods, arbitrate disputes, or resolve crosscutting issues. As a result, risk practitioners often develop new methods rather than adopt or adapt an existing approach. Because the underlying methods currently in use are not based on commonly recognized or compatible standards, the resulting data is often less than useful to others who must then collect similar data using another methodology. There is no comprehensive, documented body of knowledge on the current state of the discipline from which to implement new security risk management efforts. There are no common references that practitioners can consult when considering how to best meet their security risk analysis needs. Without such a body of knowledge, there is no way to determine where adequate methods already exist, decide where to focus additional research and development, or ensure existing efforts are not duplicative and wasteful. Moreover, without this collection of knowledge, it will be difficult to train the next generation of security risk analysts and managers in a consistent manner. The lack of a common professional language for security risk analysis and risk management divides practitioners and makes collaboration difficult. This ``language deficit'' serves as a significant impediment to a cooperative approach on security risk analysis and management between the Federal Government, State and local governments, and the private sector. While attempts to set standards within individual Federal departments and agencies have been made, conflict with similar efforts elsewhere only exacerbates the problem. Without a common language for use by practitioners, future progress will remain frustratingly slow. There is currently no capability to train or certify the knowledge and technical skill of security risk management professionals and bring new entrants into the field. Given the huge investments being made in homeland security, coupled with the central role of risk management, it would seem logical that training and certification of risk practitioners should be a national requirement. Unfortunately, there is no recognized approach to risk management training in Federal, State, and local government agencies, or in the private sector. Absent this, it is difficult to imagine that risk management will ever be done with the degree of reliability and compatibility that decisionmakers require. sarma recommendations There are a few practical steps that can be taken within existing authorities, and the support of the Congress, to remedy the current situation and more fully realize the vision of more effectively managing security risks to the American homeland. Accordingly, SARMA recommends that the administration: Issue a joint National Security Presidential Directive (NSPD) and Homeland Security Presidential Directive (HSPD) to create a ``National Security Risk Management Program.'' The joint NSPD/HSPD should establish a national program for security risk management, complete with funding for a system of governance over all Federal efforts to implement supporting risk management policies, programs and practices across the interagency community. Such a program would accelerate progress, reduce duplication of effort, and eliminate organizational conflicts and other barriers to implementation. Require Federal departments and agencies to create a Chief Security Risk Officer (CSRO) appropriately positioned and empowered to synchronize, coordinate, and monitor all security risk management efforts within their organizations. The Chief Risk Officer (CRO) concept has been in widespread use by the private sector for decades. Implementing such a position within key Federal departments and agencies would elevate the importance of security risk management and end debates over who creates necessary policies and procedures and leads security risk management initiatives at the department and/or agency level. Though we believe that the initial focus of this position should be on coordination of security risk activities, the ultimate goal should be a convergence of all risk management activities within a consolidated CRO portfolio. Establish a DHS CRSO and harmonize homeland security risk management policies and programs to ensure consistency, and as needed, compatibility and integration, not only within DHS but with State and local governments, and the private sector. In addition to reconciling and ensuring coordination among all homeland security risk management policies and programs across the Department, the DHS CSRO should identify appropriate DHS agencies and offices to serve as homeland security risk management advocates to State and local governments and the private sector. This would extend the benefits of a common risk management framework to industry and all levels of government as part of a truly integrated and ``national'' effort. Create a security risk management governance structure to span the interagency community and bring standardization and rigor to the assessment of security risks, while increasing overall confidence in the process and the decisions that result. To this end, two essential elements of this structure are recommended: A Chief Security Risk Officer (CSRO) Council.--The CSRO Council would be officially recognized as the authoritative body for Federal security risk management strategy, policy, and standards. The CSRO Council should include security risk management officials from all agencies with significant homeland security and national security responsibilities. In addition, the CSRO Council would: Oversee the implementation of the joint HSPD/NSPD for a National Security Risk Management Program; Coordinate and set direction for national security risk management efforts; and Analyze and broker resolution of disagreements between Federal departments and agencies over security risk management issues. An Interagency Security Risk Management Staff.--This interagency staff function would serve as a security risk management Center of Excellence, providing program development support, technical expertise, and training to Federal, State, and local governments, as well as the private sector. The staff would address the shortage of qualified risk methodologists and trainers by centralizing that expertise and making it available to support practitioners in achieving the national goal of a mature, unified, and broadly accepted approach to security risk management. The staff would: Provide technical assistance in carrying out security risk assessments and implementing security risk management programs; Provide security risk management training, establish minimum training and certification standards, and produce associated training materials; and Maintain public/private partnerships to support the use of risk management in the implementation of national security and homeland security policies and strategies. conclusion Homeland security efforts since the terrorist attacks of September 11, 2001 have highlighted the difficulty of protecting an almost infinite number of targets with finite human and financial resources. The use of security risk management is the approach correctly chosen by our Nation's leadership to address this enormous challenge. In response, considerable work is underway. Yet, in order to ensure the effectiveness of these efforts, the development and implementation of a well-integrated national framework for security risk management is needed. The refinement and application of a more uniform and coordinated approach to analyzing security risks will greatly enhance our Nation's ability to understand and manage the multitude of threats we face, now and well into the future. That will then lead to improved decisionmaking and more efficient prioritization of resources by not only Congress and the White House, but by the thousands of State and local government and private sector leaders that make up the fabric of our national homeland security effort. The creation of a national system of governance and standards for security risk management is beyond the mission and authorities of any one agency. The development of security risk management, as both a process and a profession, is a national priority that cannot be achieved by DHS acting alone. A well-integrated national security risk management framework will require a broad-based partnership with State and local government, private sector industry, academia, and related professional associations. Even with visionary leadership and direction it will not be easy, as the Government Accountability Office and others have noted. Yet such a framework is necessary if we are to protect the people, infrastructure, and economic prosperity of the United States. SARMA encourages Congress, the White House, Federal departments and agencies, State and local governments, and the security profession to join forces and collaborate to achieve a national security risk management framework that will help provide the Nation with the protection and response capabilities it needs at a price it can afford. The members of the Security Analysis and Risk Management Association stand ready to assist Congress, the administration, and DHS in whatever way we can to help advance this important initiative. Ms. Jackson Lee. I thank you for your testimony. I now recognize Dr. Carafano to summarize his statement for 5 minutes. Dr. Carafano. STATEMENT OF JAMES JAY CARAFANO, THE HERITAGE FOUNDATION Mr. Carafano. Thank you. Homeland security, and indeed the functions of all Government, is to enable Americans to live their lives in freedom, safety and prosperity. The key is that it is Government's responsibility to ensure that its measures support all three of those goals equally well. Nowhere is that task more difficult than the issues that we are talking about today, which is managing basically the tools of everyday life that Americans use to go to work, to govern themselves, to take care of their family and their children. So I would like to offer three brief recommendations. The observations that I am going to offer are based on my 25 years of experience in the Army and issues dealing with national security for over a half-decade working on homeland security issues here in Washington, and being a proud member of a family of first-responders that is filled with nurses and cops and firemen and folks like that. As a prelude to my comments, I would just like to offer this observation. We live in a great and powerful Nation. That means we live in a Nation with infinite number of vulnerabilities. If you do the math and you want to spend--you pick a number, $25 billion, $30 billion, whatever, taking one vulnerability off the table, you then live in a Nation with infinity-minus-one. It doesn't get you very far. So you have two options. The one option, which I think everyone here would uniformly agree to, is that we do need a risk-based approach, a rational, not non-political because you can't depoliticize a risk assessment. That is part of the risk management process, but a functional integrated process, as opposed to the opposite which is fundamentally what we generally have now, which is policies are really being driven by constituents and stakeholders that speak out the loudest and get the most attention. That is a problem because at the end of the day, you just put money where you want, as opposed to where it really needs. It can actually make you less safe. You get less return for your dollar. You actually distract people from doing useful things. You actually undermine the competitiveness of the American economy and the industry, all of which at the end of the day make you less able to withstand a terrorist threat or a natural disaster. Quite frankly, my grade for the Department of Homeland Security and its ability to move forward on risk assessment and risk management techniques, given the stage it is in its development, is not bad. On the other hand, I would actually grade the Congress much more poorly in its ability to deal with risk management. I think if you look across congressional mandates in border security, container security and mass transit and others, Congress has actually done a very poor job in the sense of trying to use a risk-based approach. Fundamentally, I think the problem is generally what politicians tend to do, and what we gravitate toward, is focusing on protection. The Government's job is to protect things, as opposed to what I really think the function of Government is, which is to be much more concerned about the resiliency of the Nation, the Nation's ability to move and withstand and deliver goods and services regardless of the political and the economic conditions and different kinds of disasters it might face. I would argue this is really a product because we really lack a common doctrine and common understanding between Congress and Federal agencies about who does what in risk assessment. I really think that threat assessments and threat reduction are fundamentally a Government's responsibility. It is Government's job to get rid of terrorists. It is Government's job to go after malicious actors. Criticality or consequence is really a joint responsibility. Government can't do it alone because the private sector has most of the information, most of the knowledge. On the other hand, Government is the only person who can give the broad perspective about what really is a national priority. So that is really a joint function. I argue that vulnerability assessments, both the assessment of vulnerability and the reduction of vulnerability is really the responsibility of the people who own and use the infrastructure, so it is largely a private sector responsibility. We have really failed to kind of stick to that adherence of responsibilities, so we have really kind of been all over the map. So very quickly, just three recommendations. One is, Government's role is enormous in the threat reduction area. I think that is primarily where its focus should be. In terms of vulnerability reduction, I think primarily for most infrastructure, the answer from Government is reasonable measures that are largely performance-based that are very similar to the kinds of requirements that we do in public health and safety and environmental. I think GAO is exactly right. Risk communications and managing expectations are a vitally important job that we really do very poorly. For example, I think it is a very unrealistic expectation to think that Government or the DHS is going to do a risk assessment for the entire country. That means it is going to assess risks and manage the reduction of risks and threat criticality and vulnerability. I think it is unrealistic and unachievable and quixotic. Third, I think there are some very practical measures that if Government wants to incentivize and move the private sector forward on the vulnerability reduction side, there are some interesting things I think that can be done in terms of liability protections and incentives. I would put the SAFETY Act out as an excellent model of the kind of legislation that could incentivize the private sector to take risk management seriously and to incorporate it into its business practices and adopt realistic and cost-effective means to have a reasonable measure of vulnerability in the infrastructure. Thank you. I look forward to the questions. [The statement of Mr. Carafano follows:] Prepared Statement of James Jay Carafano June 24, 2008 risk and resiliency: developing the right homeland security public policies for the post-bush era My name is James Jay Carafano. I am the Assistant Director of the Kathryn and Shelby Cullom Davis Institute for International Studies and a Senior Research Fellow for the Douglas and Sarah Allison Center for Foreign Policy Studies at The Heritage Foundation. The views I express in this testimony are my own, and should not be construed as representing any official position of The Heritage Foundation. Thank you for the opportunity to appear before the committee today to discuss the subject of this hearing ``Ensuring our Nation is secure by developing a risk management framework for Homeland Security: How are they measuring risk? Are the risk management principles being followed uniformly?'' My testimony today will focus on the point that risk management is interwoven with the concept of resiliency. The current paradigm of ``protecting'' infrastructure is unrealistic. We should shift our focus to that of resiliency. Resiliency is the capacity to maintain continuity of activities even in the face of threats, disaster, and adversity. The concept recognizes that we cannot deter all threats or prevent all natural catastrophes. Effective resiliency strategy should: Focus on more than just physical infrastructure.--Resiliency works with the goal of resilient communities and reflects the geography, culture, economy, politics and other societal factors of the United States. Recognize initiatives must be national in character and international in scope.--Recognizes that America is part of the global marketplace with a global industrial base. Remain proactive.--It is a bad idea to wait until catastrophe strikes to discover our resilience, in terms of both humanitarian concerns and Government legitimacy. Manage public expectations.--Out-of-scale expectations greatly undermine the legitimacy of a national response effort. We must inform the public about what it should reasonably expect in the face of disaster or disruptions. Unreasonable expectations are fueled by both media and political posturing. Define expectations of public-private partnerships.--Despite the focus on homeland security since 9/11, 5 years after the event the appropriate public and private rolls in dealing with transnational terrorist threats are still poorly understood. Pay greater attention to the development of public and private infrastructure.--Developing more robust national infrastructure that both enhance the competitiveness and capacity of the United States to withstand catastrophic threats should be a priority. Resiliency and Risk.--Risk assessments and risk reduction are at the heart of a sound resiliency strategy. Although there are a number of risk assessment methodologies, they all consist of common components. Threat Assessment.--Examines what our adversary can accomplish and with what degree of lethality or effect. Criticality Assessment.--Evaluates the effect that will be achieved if the adversary accomplishes his goals. This examines both physical consequences, social and economic disruption and psychological effects. Not all consequences can be prevented. So in order to assist in prioritization, there is a process designed to identify the criticality of various assets: What is the asset's function or mission and how significant is it? Vulnerability Assessment.--Looks at our vulnerabilities and how they can be mitigated including weaknesses in structures (both physical and cyber) and other systems/processes that could be exploited by a terrorist. It then asks what options there are to reduce the vulnerabilities identified or, if feasible, eliminate them. Since 9/11, however, the nature of shared public-private responsibility for risk assessment and risk reduction has been poorly understood. Establishing a common appreciation of rolls and responsibilities must be a priority. Assessing and reducing transnational terrorist threats is fundamentally a Government responsibility, an inherent obligation derived from the preamble of the Constitution that obligates Government to ``provide for the common defense.'' Threat appreciation and effective counter-terrorism programs that identify, quantify, and reduce threats is not only primarily Government's responsibility, it is arguably the most essential component of risk management. Taking the offensive against terrorist threats is both the most effective and cost- effective means to respond to transnational terrorism. Criticality is an activity that must be conducted jointly by the public and private sectors. They equally share responsibility for determining what is most vital to protect the public good. There is no practical alternative to this shared obligation. Most national infrastructure is private hands. The private sector understands best how systems function and impact the economy. On the other hand, only the national Government can offer the national ``perspective'' of prioritizing needs and obligations in times of national emergency. Thus, criticality can only be determined by sharing information and joint assessments made in trust and confidence between the public and private sectors. Assessing vulnerability, determining the best risk mitigation means, managing and providing the resources to reduce vulnerability are largely the responsibility of the entity that owns and operates infrastructure. Most often the consumers and users of the infrastructure and the services they provide bear the fiscal responsibility for implementing measures to reduce vulnerability. These measures should be ``reasonable.'' Vulnerability reduction is an ``economy of force'' measure, an additional and supplementary line of defense designed to supplement not supplant addressing threats and criticality. Over-emphasis on vulnerability reductions threatens the competitiveness of private sector activity, which in turn could represent a far greater threat to the resiliency of the American economy than any terrorist threat. Understanding this fundamental division of labor between the public and private sector is fundamental to developing sound public policies. In order to achieve the goal of ``resiliency'' as well as to ensure effective risk management, Congress should focus on four initiatives: 1. Promote public-private models for risk management by developing doctrine defining reasonable roles for Government and industry. 2. Encourage bilateral cooperation addressing liability issues. 3. Develop national and international forums for collaboration on resiliency issues. 4. Promote the development of resilient 21st century public infrastructure. 1. Public-private models for risk management.--Public-private models for risk management are essential to the concept of resiliency. A model public-private regime would: (1) Define reasonable roles for both Government and industry through clear performance measures, (2) create transparency and the means to measure performance, and (3) provide legal protections to encourage information sharing and initiative. Both Government and industry must be given reasonable roles in order to ensure the effectiveness of these models. Understanding, communicating, and reducing threats is primarily a national responsibility, fundamentally a responsibility of Government to ensure public safety and provide for the common defense. It is not the job of the private sector to defeat terrorists. It is the responsibility of the Federal Government to prevent terrorist acts through intelligence gathering, early warning, and domestic counterterrorism. National Security and Resiliency.--In terms of what is reasonable for the Government, the role of national security instruments should be treated with caution. National security is not about trying to child- proof a country against every potential misfortune. It is the task of protecting people from their mortal enemies--that means other people. These enemies may be from states, trans-states or no states. They may be abroad or homegrown. What they have in common is that they are humans--and that they threaten the Nation by preparing to attack its people for a political purpose. We should be careful not to dilute the definition of national security to include a plethora of threats or use the proliferation of threats to scope a national resiliency strategy. The Government has many resources to deal with all kinds of problems. Resources, however, are not infinite. National security instruments should be reserved for the critical task of battling those people who plot how to kill citizens, undermine the society and destroy our individual freedoms. A second reason not to label every ``danger du jour'' as a national security threat concerns protecting the civil society. In times of peril, the Nation should rely on the Government to provide the common defense--providing the leadership and resolve needed to deal with threats to the Nation. That's why, for example, in the United States the President is vested with the authority to conduct foreign policy and act as commander-in-chief. The U.S. Constitution envisioned an executive who could wield significant power to act decisively in time of war or crisis. That said, the President's national security powers should be reserved only for serious, imminent dangers from America's enemies. Elevating other issues like global warming, pandemics or energy supplies, to the level of national security, only encourages Government to bring the extraordinary powers of the Executive branch to bear on the problem. For the most part, the parts of Government involved in national security should stick to hunting terrorists, thwarting rogue states, and dealing with the other serious enemies who spend their days and nights plotting against the state. In most cases a strategy of resiliency should rely primarily on other instruments. Criticality as a Shared Activity.--Criticality, on the other hand, has to be a shared activity. In many cases the private sector owns or is responsible for managing both private and public infrastructure that provide the vital goods and services for the society. Meanwhile, only the national Government has the overall perspective to determine national needs and priorities in the face disasters and catastrophic threats. Thus, they must work together to determine what is truly critical to keep the heart beat of the Nation beating in the face of adversity. Not all infrastructure should be deemed critical. Indeed, the national designations of ``critical'' infrastructure and key assets have been detrimental to the effort to prioritize national efforts. The ``failure is not an option'' mentality with regards to protecting infrastructure has led to an over-zealous approach to ``critical'' infrastructure. The designation has become increasingly pointless driven by politics and stakeholder interests rather than rational assessments.\1\ If everything is critical, nothing is critical. --------------------------------------------------------------------------- \1\ See, for example, the debate over container security in ``Container Security at U.S. Ports: The Heritage Foundation's Research,'' WebMemo No. 1260, November 27, 2006, at http:// www.heritage.org/Research/HomelandSecurity/wm1260.cfm. --------------------------------------------------------------------------- Vulnerability as a Private Sector Function.--Vulnerability should be largely the responsibility of the entity that owns, manages, and uses the infrastructure. It is largely the private sector's duty to address vulnerability and to take reasonable precautions, in much the same way as society expects it to take reasonable safety and environmental measures. Resiliency and its role in protecting society actually transcend homeland security and other national security concerns. Resiliency is about building strong, cohesive societies in that can prevail in the face of many challenges whether the malicious acts of terrorists or the heartless whims of Mother Nature. Indeed, rather than national security instruments, the most common tool to be used in building resiliency is establishing an appropriate legal regime the will allow the private sector and the market place adapt and innovate, to provide a robust, redundant capacity to provided goods services everyday--and especially in times of crisis. Armed with these assessments and a common sense division of roles and responsibilities, public-private partnerships can set about instituting practical measures that will reduce risk and enhance resiliency. 2. Encourage bilateral cooperation addressing liability issues.-- Addressing concerns of liability may be the most vital contribution Government can make to implement a strategy of resiliency. The recent bitter debate in the United States between Congress and the administration over extending immunity against civil suits to telecommunications companies that cooperated with a classified Government surveillance program highlights one of the knotty challenges in promoting public-private cooperation in combating terrorism.\2\ Congress can promote private sector participation and alleviate liability concerns by: --------------------------------------------------------------------------- \2\ See, James Jay Carafano, Robert Alt, and Andrew Grossman, ``Congress Must Stop Playing Politics with FISA and National Security,'' Web Memo No. 1791, January 31, 2006, at http:// www.heritage.org/Research/LegalIssues/wm1791.cfm. --------------------------------------------------------------------------- Providing ``safe harbors'' for sharing critical information; Promoting cooperative joint action for public-private partnerships; Collaborating with other nations, such as the Technical Cooperation Program (TTCP), an international organization that collaborates in defense scientific and technical information exchange and shared research activities. Promoting liability protection regimes could be the centerpiece of a facilitating global bi-lateral participation in promoting resiliency strategies.\3\ --------------------------------------------------------------------------- \3\ For specific recommendations, see James Jay Carafano, Jonah J. Czerwinski, and Richard Weitz, ``Homeland Security Technology, Global Partnerships, and Winning the Long War,'' Heritage Foundation Backgrounder No. 1977, October 5, 2006, at www.heritage.org/Research/ HomelandSecurity/bg1977.cfm. --------------------------------------------------------------------------- The Safety Act as a Model for Liability Concerns.--A great example of the ability of Government to handle these concerns over liability decisively and with good effect was addressed in the Support Antiterrorism by Fostering Effective Technologies (SAFETY) Act. This Act lowered the liability risks of manufactures that provide products and services for combating terrorism. Passed in 2002, the Act protects the incentive to produce products designated as ``Qualified Anti- terrorism Technologies'' (QATTs) by the Secretary for Homeland Security. The Department of Homeland Security (DHS) has made a concerted effort to implement the program and a number of companies have availed themselves of the opportunity to obtain SAFETY Act certification. By addressing liability concerns, Congress intended the SAFETY Act to serve as a critical tool for promoting the creation, proliferation and use of technologies to fight terrorism.\4\ The act provides risk and litigation management protections for businesses that produce QATTs and other providers in the supply and distribution chain. The act included a limitation on liability with regards to third parties claims for losses resulting from an act of terrorism where the technologies were deployed to help prevent or mitigate the danger of a terrorist attack. In turn, the promotion and deployment of new technologies help make the society more resilient in the face of terrorist threats. --------------------------------------------------------------------------- \4\ U.S. Department of Homeland Security, Final Rule of the Implementation of the SAFETY Act, Vol. 71, June 2006, at http:// a257.g.akamaitech.net/7/257/2422/01jan20061800/edocket.access.gpo.gov/ 2006/06-5223.htm (March 2008). --------------------------------------------------------------------------- 3. Develop national and international forums for collaboration on resiliency issues.--Both within the United States and with international partners, the United States should begin to establish regular forums to promote the resiliency concept, share best practices and facilitate joint action. State-Based Regional Response Network.--Within the United States, these forums could be structured around a regional homeland security structure that promotes voluntary cooperation among States, local communities, and the private sector. The Homeland Security Act of 2002 mandated that DHS set up a regional structure--though the Department did follow through on this mandate. State-based regional programs would focus on ensuring that States are prepared to sustain themselves. Successful regional programs would focus not on Federal structures in each region, but rather on regional emergency management programs and capabilities that are developed, coordinated, and managed by the States. Similar small-scale programs that use a regional model, such as the Emergency Management Assistance Compact (EMAC), have already proven successful. DHS regional offices should be required to strengthen State and local preparedness capabilities; facilitate regional cooperation among Governments, the private sector, and non-Governmental organizations; and plan and exercise with Federal entities that support regional disaster response. Such offices would enable regions to access and integrate their capabilities quickly and improve preparedness and resiliency initiatives.\5\ --------------------------------------------------------------------------- \5\ See, Jill Rhodes and James Jay Carafano, ``State and Regional Responses to Disasters: Solving the 72-Hour Problem,'' Backgrounder No. 1962 (August 21, 2006) http://www.heritage.org/Research/ HomelandSecurity/bg1962.cfm. --------------------------------------------------------------------------- Internationally, the United States can use both current international institutions and new multi-national and bilateral partnerships to create resiliency forums. For example, the NATO Industrial Advisory Group (NIAG) solicits industry advice on how to promote public-private and transnational cooperation in defense production. This group or other NATO forums might serve as opportunities to discuss resiliency issues. 4. Resiliency's Building Blocks.--Promote the development of resilient 21st century public infrastructure. In the end, public- private partnerships must produce the kind of infrastructure necessary to sustain 21st century societies against 21st century threats. Within the United States much of the national infrastructure is aging and not keeping up with the demands of a growing population. Additionally, for all of the focus on U.S. critical infrastructure, equally vital is the resiliency of the global economy. What is required is more innovation and experimentation as a means of speeding the development of modern infrastructure. One option to consider is encouraging public-private partnerships (PPP) that invest in public infrastructure. The United States has utilized the PPP model for its public highways and other infrastructure projects. Creating opportunities for governments and private firms to work together on improving the infrastructure should be further explored. Rather than relying heavily on subsidized public funding of infrastructure, investments should focus on ``project-based'' financing that shifts the risks and rewards to the private sector. Project-based financing focuses on obtaining stand-alone investment from private investors and could include multiple investors, each with a different level of investment, varying rate of return, and different timelines for realizing those returns. Such strategies not only shift risk to the private sector, but should also lead to improved decisionmaking about needed infrastructure investments. Resilience is the right strategy.--Resiliency is the right strategy for the United States and its allies in facing the dangers of the 21st century. Congress and the administration can promote this approach both within American communities and across all free nations by means of the initiatives mentioned in my testimony. These initiatives offer a more reasonable and cost-effective means for ensuring the continuity of services and processes, but all for building a more resilient civil society, one prepared to face the future with confidence and surety. Ms. Jackson Lee. Mr. Carafano, thank you very much for your statement. I now recognize and welcome and offer my sympathy to Mr. McInnis, and ask him to summarize his statement for 5 minutes. Mr. McInnis. STATEMENT OF RAYMOND MCINNIS, PRIVATE CITIZEN, WIDOWER OF VICTIM OF GOODYEAR EXPLOSION Mr. McInnis. Good afternoon, and thank you for inviting me. My name is Raymond McInnis. I live in Houston, Texas. I am a former employee of Goodyear, a retiree of 12 years now and employed for 38 years. My wife of 18 years, Gloria, has worked at the plant for 31 years--a very knowledgeable person in that plant. She was killed in an explosion at that plant 2 weeks ago today, June 11. It is not easy for me to come here today, but I come here because I want changes made in the workplace. There are so many things that are wrong today that are just sloughed over by OSHA, companies. I have a lot to say. I can't get it done here, believe me. I have heard a lot. Ms. Jackson Lee. Mr. McInnis, you can take your time to explain what you are trying to say to us. Mr. McInnis. I just want things to change for her, change the workplace for the people that are working there today and in the future, so that place will be there where people can have a job. My wife's title at that plant was latex coordinator. She did not work in the part of the plant. It was not her primary duty. Because of the shortage of leadership and supervision, she was there. That was one things she always did. We discussed it. ``Why? You don't have to go there. Make them supply supervisors.'' Well, if they don't have them, somebody has got to do it, and she always went there. She did not have to be at that place. The thing is, it just lacks supervision and supervisors with training and knowledge. There is a way they go about picking supervisors now that you don't have to know the job. You just take a test and you are a supervisor in a chemical plant. That is what creates these situations. I would like to go into the story of how this went down and how I found out about my wife's death. On the morning of June 11, I had taken her dog to get groomed, the dog she loved. I went by Goodyear on 225 which I don't ever do, but I saw all the fire trucks and ambulances and what have you, and I figured well, they are having a FEMA drill. I went on to my home and a friend of my son's, who is a fireman in the city of Houston, made a call to me and asked me how my wife Gloria was. I said, well, I guess all right. He said, well, there was an explosion. I said, well, I will get on the phone, and I will call you back and let you know. I made calls time and time again, and got a recording. The recording was ``leave a message.'' I left messages and called other numbers that I could remember in that plant. I finally got through to the gatehouse, and one of the security guards told me that she was all right. I asked that question, ``Have you seen Gloria?'' She said she is all right. So I felt relieved, and I wait for the 11 o'clock news, local, to find out what really happened. I saw the statement by the plant manager that everything was clear. They had six minor injuries, and everybody was going back to work. Well, that made me feel much better. I had to call family back and give them all the information--our wife, their daughter, grandmother, mother, and my wife was all right, which made everything all right until that time. Then about 1:45 p.m. that day, I received a call from the same woman that I had talked to at the gatehouse, asking me ``Was my wife at home?'' I said, ``You mean you don't know?'' This goes back to the accountability. Where in the heck was it? Nobody is counting. Who is responsible? Anyhow, I went to the plant. Nobody would tell me. They just passed me from one person to another and led me to the front office. I already had an idea that there had to be something like that, and I ran across one of my former associates at the plant. He told me, ``He said, I am sorry, Mac,'' and I knew then that I had lost my wife. That was the only notification I had. Nobody would tell me nothing else. All they wanted to do was take me home. I wanted information. I couldn't get any information about anything. All they wanted me to do was go home. So I went. I have had no details of what transpired, what caused the explosion, the people involved. All I know is my wife is gone. I want changes, the type of changes I want are that the people that work at that plant are trained, supervisors are trained on the job and know the job. Can you imagine in school, every one of us in school, a teacher at some time during your progress, she was there. What was the first thing that woman did? You count your people. You account for them. You want to know where they are at. This place has no plan like that. They have no supervision to properly set up such a plan for an incident. There is no plan, one man, a foreman with no leaders, and lieutenants in every part of that plant cannot run a proper incident. That is why my wife was not found. Nobody looked. That is why. That is the sad part. There is a proper way. It has been done, but because of the cuts by the company, to save the dollar, supervision and leadership is gone from that plant. There is no leadership at all. You just can't operate that way. Where is the script? I am sorry. I just get carried away. I am sorry. I am angry. I want to get back to covering what I came to talk about. What I found out, and this is the story I found out to go along with that. I found out how they found my wife. After the fire department of Houston was turned away from that plant, because Goodyear gave the all-clear and everybody was accounted for, they had a meeting, calling the supervisor and the people that were involved in this situation. So they were going to have a meeting, a debriefing, and go over what they had. They ordered lunch and somebody happened to say, well, where is Gloria? Now, that tells you how their accountability system works. They have no idea what is going on in that plant. I am telling you. Please do something about it. I am pleading with you. Check it. I know every time OSHA comes to that plant, we know about it. Everything is covered up. Everything is prettied up. Everything, for any kind of inspection. This is wrong. I just want to make sure that everything gets done to help the people of that plant. It is too late, I know, but I want it done for the people there. They need jobs. That is what our economy is about, people working. We are not taking care of them. I would like at some point for you to ask me questions about how the incident command system should be set up, how it should work. I would be glad to go over that or any other questions you may have for me. Thank you. [The statement of Mr. McInnis follows:] Prepared Statement of Raymond McInnis June 25, 2008 Good afternoon. My name is Raymond McInnis. I live in Houston and am retired after working 38 years at the Goodyear Chemical Plant in Houston. My wife of 18 years, Gloria, had worked at the Goodyear plant for more than 31 years before she was killed in an explosion at that plant 2 weeks ago today, June 11, 2008. This is not easy for me but I came here today to talk about what happened to Gloria because I don't want this to happen to anyone else. Neither would Gloria. This may sound corny to you but it's the truth. Gloria was a Latex Coordinator. She loved her job. But it had gotten harder because of all the cuts at the plant. They didn't have enough supervisors with experience, so Gloria was always willing to help out the team wherever and whenever she could. Her motto was ``Somebody's got to do it.'' As bad as it is losing a loved one like this, one thing that still haunts me is that after the explosion I was originally told by a Goodyear employee that Gloria was safe. You cannot believe how relieved my family and I were to get that good news. Later, I was shocked when I found out that she was dead and that she had lain there for 7 hours before she was found. How could Goodyear have not known one of their own was missing? Even though I know now that Gloria was killed in the explosion, my first thought was: Would Gloria be alive and at home today if they had realized that she was missing and tried to find her right away? The explosion occurred at 7:36 a.m. I saw some fire trucks outside the plant at 8 a.m. but because there seemed to be no activity, I assumed it was a drill. A friend of my son's who works in the Houston Fire Department called me later that morning and asked if Gloria was all right. That was the first I had heard of the explosion. I repeatedly called Gloria's office phone but only got her voice mail. I called the Goodyear office with the same result. I called the gatehouse but got no answer. At 10 a.m., I finally reached Jackie at the gatehouse and asked about Gloria. Jackie told me ``She's all right.'' At that point, I felt relieved. Friends and relatives were calling and I told them Gloria was okay. I watched the TV news around 11 a.m. The plant manager said everyone was okay, only six minor injuries, that the ``all clear'' was being given. Again, I felt relieved. I kept trying Gloria's office phone and kept getting voice mail. I assumed she'd be out in the plant helping clean up, because ``someone had to do it.'' Gloria's shift was from 6 a.m. to 2 p.m., so I was expecting her home soon. At 1:45 p.m., Jackie called and asked me ``Is Gloria home?'' I said, ``You mean, you don't know?'' That's when I knew. Another woman came on the phone and told me to stay put and they would call me back. I just threw down the phone and rushed to the plant. The Goodyear plant people kept telling me to go to the office. I didn't want to but finally did. On the way, I ran into a Goodyear employee that I had known when I worked at the plant. He said ``I'm so sorry, Mac.'' That was my official notice from Goodyear. The people in the office kept telling me they were sorry, offering me water, insisting on driving me home. I asked what happened; they said they didn't know. I said I want to see Gloria; they said no, the investigators won't let you. I never spoke with the plant manager, Mr. Lockwood--he talked to the reporters, but he didn't talk to me. Goodyear drove me home. They later drove Gloria's truck home with her purse. I ask you ladies and gentlemen of Congress, how can you leave one of your own behind? Why don't you make sure everyone is safe? Who was supposed to count? Who was supposed to report? When I was a shift foreman, we knew who reported to whom. We knew our responsibilities. We wouldn't have left anyone behind. Our son is a Marine serving in Iraq. And I want to thank you, Congresswoman Jackson Lee for your help and Congressman Gene Green's help cutting through red tape and getting him home quickly to be with his family at this terrible time. Ask him about leaving anyone behind and he'll tell you a Marine never leaves one of his own behind. I did not understand why the Houston Fire Department did not go into the plant and search for employees. But my son's firefighter friend explained that the department had considered going in and told Goodyear several times they were willing to go in but Goodyear was adamant that everyone was accounted for. The department weighed that against the danger to their rescue crews and decided it was not worth the risk since Goodyear told them everyone was safe. The fire department left the plant and then had to be called back after Gloria was found by plant workers. This plant was a disaster ready to happen and its people are not safe today. The plant has done away with its fire department. EMS crews are trained 2 days a year only. The total number of employees has been cut. Contract workers who are unfamiliar with the plant have been hired in their place. Supervisors used to be experienced in all plant operations. Now, you can apply to be a supervisor after working at the plant for 90 days. Equipment is patched up again and again rather than replacing it with new equipment. Industrial plants are too interested in promoting themselves by giving lip service to safety rather than actually trying to cut the risk of injury to their workers. Worker safety is taking a backseat. Gloria's case shows you that there are failed systems in these plants for accounting for the safety and welfare of the individual workers. Here is another example. My attorney, Terry Bryant, has represented a number of injured plant workers. He has been told that some subcontractors are so concerned about reporting a good safety record that they confiscate an injured worker's ID card and swipe it at the plant as if the employee were on the job, even though the employee is recuperating at home. They do this just so they can report so-many injury-free work days. You can imagine the situation. If something bad happens at that plant and family members were told their loved ones are unaccounted for. Additionally, first responders could be putting their lives in danger searching for workers who were never there in the first place! Mr. Bryant suggests OSHA should audit these plants to make sure that they have reliable systems in place to know who's really at work and where at any given time and that they have the proper amount of supervision. Sure, OSHA sets minimum guidelines. But that's all the plants seem to do--the minimum. No one seems to care until someone dies. Then OSHA puts a fine on a company, the company pays it and life for them continues as before. The lives of my family will not continue as before. Do fines really mean anything to these companies? Perhaps if you changed the system to put someone in jail when their greed drives their safety decisions, then they'll pay attention. The men and women who work at these chemical and petroleum plants do dangerous jobs that are necessary to keep our country functioning. The least we owe them is to do what we reasonably can to ensure that they are safe in view of the risks of their assignments and to make sure that we never again leave one of our own behind. I was told by one of Gloria's friends that she was with her in the storeroom that morning when they heard about trouble in that part of the plant. She said Gloria told her ``I better go over there and see if I can help.'' Her friend told her she didn't have to do that but my Gloria said her usual, ``Someone's got to do it.'' Gloria was a wonderful wife, mother, friend and an exceptional employee. If she could have a legacy for her sacrifice, she would want for these plants to be safer for everyone working in them. I thank the Members of the Homeland Security committee for their attention to this problem. I hope a significant improvement will come out of Gloria's death. This is what Gloria would have wanted. God bless you. I would be pleased to entertain any questions you may have about any statements I have made. Because of the time limit, I could not go into much detail. If you want any more information, you can contact me or my attorney Terry Bryant. Ms. Jackson Lee. Mr. McInnis, thank you so very much for your testimony, particularly in this very difficult time in your life. I thank you for being our hero today. The bells have rung, but Mr. Morawetz, I would like for you to have the opportunity to begin and end your testimony, so we will return and ask questions. Mr. Morawetz will be recognized for 5 minutes. Thank you very much. STATEMENT OF JOHN S. MORAWETZ, DIRECTOR, HEALTH AND SAFETY, INTERNATIONAL CHEMICAL WORKERS UNION COUNCIL/UFCW Mr. Morawetz. Thank you, Chairman Jackson Lee, Representative Bilirakis, and Members of the subcommittee, for holding this important hearing. I am here today representing the National Chemical Workers Union Council of the United Food and Commercial Workers Union. I would also like to take a moment to offer my sincere condolences to Mr. McInnis and his family on the loss of his wife. While we do not represent these workers, we have been active for years in safety issues with hazardous materials and support strong laws to protect both workers and the public. Our members are tragically well aware of these dangers and have a real interest in their facility's safe operation. In 1971, we represented workers at a Georgia facility that manufactured magnesium trip flares. The facility was evacuated after several small fires broke out, but flares ignited and the plant blew up. Horribly, the evacuation distance was not sufficient and 27 workers were killed. We can and must learn from any event, large or small or from near-misses. This accident served as a valuable lesson in learning what must be done, just as the recent Goodyear explosion hopefully will. It is far too early to know the full facts and key failure, and most importantly, what the root cause of the explosion was. We believe the explosion took place in a reactor vessel cooled by ammonia that also uses a number of very hazardous and explosive raw materials. Where the Thiokol explosion led to a better understanding of safe evacuation distances, Goodyear management probably needs to have better training, drills for proper evacuation, vulnerability assessments, and methods for accounting for its entire workforce. These vessels are protected usually from excess pressures by release systems. If an over-pressure situation occurs, a relief valve will relieve the pressure, but often directly into the atmosphere. I am familiar with this type of failure. In 1990, a BSF facility in Cincinnati where I live exploded. Two workers died and 17 others were seriously injured. I still remember driving down Dana Avenue and seeing the cracked foundations of houses. That explosion was caused by excess pressure that blew a relief valve. The fumes spread around the vessel, found an ignition source, and exploded. Luckily, this release was recognized before the explosion. People were evacuated and a much worse disaster averted. The Federal Chemical Safety Board is responsible for investigating these incidents and issues excellent reports on their root cause. The CSB visited the Goodyear facility last week, but doesn't have the funds to launch a full investigation. The board also has issued generic CSB reports on nitrogen asphyxiation and chlorine releases. If we are serious about protecting our Nation's chemical industry infrastructure, the question of the proper and improper use of relief valves should be a subject of a future CSB report and CSB must be fully funded. Chemical workers know first-hand how a plant works, what chemicals are used, any particular facility's weaknesses, and are responsible for loading and unloading chemical cars. These make chemical workers the first line of defense and explain why we believe employee involvement in the implementation of a plant's chemical security plan is crucial. Proper and sufficient training is necessary. My union has run training programs and collected data on how much training workers received in the last year in 10 specific areas. Since there is no mandate for refresher training, the vast majority of workers have had none. Effective training needs resources that can be easily understood. New Jersey has written readable chemical fact sheets, that I have provided the committee, for the substances that we believe were involved in the Goodyear explosion. There are a number of other changes to make chemical facilities safer. First, there must be clear statements and laws to defend workers' jobs if they face disciplinary procedures for reporting any significant security weaknesses. Workers who bravely come forward to protect themselves should not fear losing their jobs when they speak out. Second, while OSHA standards might be beyond the jurisdiction of this committee, they are a useful model. The process safety management standard mandates that if companies reach a threshold amount of certain substances, there must be operating procedures, process hazard analysis, pre-startup safety reviews, hot work permits, training, and emergency planning. There must be inspections and investigations to make sure that these laws are being followed and enforced. It is fine to have laws and standards, but far too often facilities only act when there is enforcement. Third, releases that affect thousands of people calls for technology to reduce the risk. These include better-designed containers, reducing quantities, and reinforcing vulnerability sections. Although this committee's mandate is the protection of all facilities from terrorist attacks, I applaud the recognition that we are also discussing natural disasters or so-called accidents. The chemical workers support the work of this subcommittee to ensure the safety of all and strongly support legislation that has the protections that you have embodied in H.R. 5577. There is no guarantee that any legislation will prevent tragedies like the one at Goodyear, the 27 who died at Thiokol in 1971, the hundreds who died in 1947 in the Texas City freighter explosions, the Bhopal disaster that killed thousands, or future terrorist attacks. But the chemical workers believe stronger laws and enforced regulations will make them less likely. There is much work to be done to reduce risk and protect workers and communities, and we urge you to act. We look forward to working with this committee to address this crucial problem. Thank you for your time. I am pleased to answer questions. [The statement of Mr. Morawetz follows:] Prepared Statement of John S. Morawetz June 25, 2008 Thank you Chairwoman Jackson Lee, Ranking Member Lungren, and Members of the subcommittee for holding this important hearing and for the opportunity to testify. I am here today representing the International Chemical Workers Union Council (ICWUC) of the United Food and Commercial Workers Union (UFCW). The ICWUC, which was founded in 1944, represents more than 20,000 chemical workers in 32 States. In 1996, we merged with the UFCW and this mutually beneficial partnership continues to serve our members well. I would like to take a moment to offer my sincere condolences to Mr. McInnis and his family on the loss of his wife in the Goodyear explosion. While we do not represent the workers at the Goodyear plant in Houston, where the explosion occurred on June 11, we have been active for many years in a variety of health and safety issues which relate to workers in facilities where chemicals are used, especially those with extremely hazardous materials. The ICWUC has supported strong and effective standards and laws to protect both our members and the public. Unions have a proud history of fighting for the right to a safe workplace and for the basic right for workers to return home after a day on the job as healthy as when they left. From workers who are concerned about their safety and health, to union negotiators seeking health and safety contract language, to unions investigating health hazards or testifying in support of legislation, we are actively involved in making our workplaces safer. It is therefore an honor for me to appear before you to address the safety and health of our members who work in chemical plants. As to my background, in the early 1980's, I investigated occupational health hazards for the National Institute for Occupational Safety and Health. In the mid-1980's, as the Director of Health and Safety for the Molders Union, I investigated a number of traumatic injuries and deaths and worked to get new standards on the well- documented hazards of confined spaces and failure to lock out equipment. In 1988, I was hired by the Chemical Workers Union as the Director of their Training Center in Cincinnati, Ohio and in 2005, I was asked to also serve as the Director of Health and Safety for the union. I am testifying today in that capacity. UFCW chemical workers work in many different manufacturing industries including petroleum and coal products, fertilizers, pharmaceuticals, pesticides and other agricultural chemicals in smelters and refineries as well as natural gas distribution and power plants. Our members work with extremely hazardous substances and have a real interest in their facilities safe operation for their own health for their coworkers' health and for their communities' well-being. The manufacturing of chemical substances involves the handling of highly hazardous materials. The dangers of that work are well known to all workers involved. In a strange irony, the site of one of ICWUC's most tragic loss of lives was a Thiokol facility near Woodbine, Georgia, in 1971. This company started the original manufacturing of synthetic rubber like in the Goodyear plant. The Woodbine plant manufactured magnesium trip flares for the U.S. Army during the Vietnam War. On February 3, 1971, the Thiokol facility was evacuated after several small fires broke out inside the plant. These fires caused the flares to ignite and the plant was destroyed. Horribly, the evacuation distance was not sufficient and 27 workers were killed when the plant blew up. This accident served as a valuable tool in learning what must be done to protect workers--just as the recent Goodyear explosion hopefully will. We can and must learn from any event, large or small, or from near-misses. The Thiokol explosion led to a better understanding of the full danger of the materials in that plant and what a safe evacuation distance should be. Clearly, Goodyear management must also look into what needs to be corrected including better trainings and drills for proper evacuation. In addition, given the long delay of knowing what was happening with the workers inside the plant, Goodyear management must improve its methods for accounting for its entire workforce. We have expressed time and time again how important it is to mandate annual training for workers as well as other crucial changes needed to improve workers' safety. It is far too early to know what the full facts are from the Goodyear explosion--what the key failures were that lead to the explosion and most importantly what the root cause of the explosion was. But after a full analysis, there will likely be a root cause and that is where we can learn our most important lessons. From what little we know, the explosion took place in a reactor vessel, which was cooled by ammonia, a very dangerous substance by itself. In addition, the reactor handles a number of very hazardous and explosive chemicals. The dangers of these chemicals are also very significant and well known. After the explosion, a number of workers were hospitalized due to exposure to ammonia. In this synthetic rubber operation, as in others, the pressure vessels such as reactors, storage tanks and process vessels are protected from excess pressures by pressure relief systems. These systems consist of one or more relief valves that are pre-set to a certain level if an over-pressure situation occurs the valve will relieve the pressure until it again drops to the regulated amount. The problem with the relief systems at many facilities is that they relieve directly into the atmosphere. In the 1970's and 1980's, many States passed legislation that required the relief systems to relieve into an internal closed system. This system can be a recovery system, flare stack or some other way of not having the explosive or flammable vapors relieve to the atmosphere. Most of the legislation provided that the companies were not required to install the closed systems if it was not feasible. Companies could be exempted if they thought changing the system would be too expensive. I am very familiar with this type of failure. On July 19, 1990, a BASF facility in Cincinnati, where I live and a facility that my neighbor retired from, exploded. Two workers died, 17 others were seriously injured and there was extensive damage to houses in the neighborhood. I still remember driving down Dana Avenue and seeing the cracked foundations of people's houses. The analysis of that explosion pointed to a reactor vessel that over pressurized and blew a relief valve. These valves were designed historically to vent steam to the atmosphere, a significant heat hazard but not explosive. The releases we are talking about today however are very explosive substances. In Cincinnati, the fumes spread around the vessel, found an ignition source and exploded. Luckily, the hazard of the over-pressurized vessel was recognized, people were evacuated and a much worse disaster was averted. But again, there are lessons to learn from this explosion. Many, if not the majority, of these chemical facilities never installed the closed systems. The danger associated with this technology is that if there is a terrorist event that results in a fire and subsequent evacuation, reactions will go wild. When reactors build excessive pressure, their relief systems will vent to the atmosphere. Since many of these chemicals are heavier than air, they will drift to the ground and find an ignition source. As a result, more explosions will take place. Prior to the Goodyear plant opening in Houston, there was another Goodyear facility in Akron, Ohio that produced the same product. One of the main reasons for moving the production was the Houston plant had much larger reactors that could produce larger quantities of the product. Yet, the Akron facility, unlike the Houston facility, had relief systems that vented to a closed system such as a flare stack or recovery system. It is reported that the Texas facility's largest tank could release up to 18,500 pounds of ammonia in a single event endangering 35,000 people at a distance of up to 1.7 miles. The largest single event of 1,3-Butadiene, a powerful carcinogen and reproductive hazard, could release up to 1.1 million pounds endangering 4,300 people. There is also a chronic risk to the community with releases of these chemicals. Clearly, this type of release that can affect thousands of people calls for safer technologies in these plants including chemical substitution and safer process systems. While the Houston plant has relief systems, it is likely to be an atmospheric relief system. Closed relief systems can mitigate an accidental event, terrorist activity or natural disaster. This Goodyear facility serves as a strong reminder of why vulnerability assessments of these facilities are required; why workers should be involved in those assessments; why annual drills should take place; and why workers need to be better trained. The Chemical Safety Board (CSB) is the Federal agency which is responsible for investigating incidents like that at the Goodyear facility. In the past, the CSB has issued excellent reports that get to the root cause of an incident and then publish recommendations for preventing future similar events. The CSB did in fact visit the Goodyear facility in Houston recently but did not have the funds to launch a full investigation. In Cincinnati this last weekend, a worker died from what looks like overexposure to hydrogen sulfide that was released when some chemicals reacted in a wastewater treatment facility. CSB had a team at the scene but does not have the funds to fully investigate. These national tragedies need to be fully investigated, the causes determined, reports written and then the results must be widely distributed. The CSB must have the resources to do its job. In addition, the Board must be able to research all individual releases, evaluate the generic problems and then offer solutions. There are CSB reports on nitrogen asphyxiation, chlorine release from large containers and combustible dust. If we are serious about protecting our Nation's chemical industry infrastructure, the question of the proper and improper use of relief valves should be a subject of a future CSB report. Reviewing what happened and learning from all accidents including the Goodyear explosion is crucial to protecting chemical workers. Besides accidents that can injure and kill workers, chemical plants can also become the targets for terrorists' attacks. Whether it is from a terrorist attack, accidents, or from natural disasters, the result threatens the safety of workers and surrounding communities. This vulnerability is well documented and has resulted in many important legislative discussions. Currently, the Department of Homeland Security (DHS) has addressed a National Risk Management Framework to protect our critical infrastructure and key national resources. This DHS Risk Management Framework identifies a number of key steps, one of which is ``Implementing Protective Programs.'' Much of what the current CFATS regulations require in collecting Top Screen information and assigning facilities to tiers remains in place. What will be different is the implementation of these protective programs as well as what should be included in the programs. Crafting well-thought-out legislation and regulations is no easy task and we appreciate the subcommittee's efforts to draft legislation that will address the problems. As you know, the current DHS regulations expire in October, 2009. It is important that chemical workers and their management have as much time as possible to plan for any final rule. It is critical that we have the time to address our concerns and hope you will move legislation that will help us resolve these concerns. In order to improve the safety of chemical plants, it is crucial that we also concentrate on worker involvement in security plans, effective training requirements, strong whistleblower protection, strong OSHA standards and use of methods to reduce the consequences of a catastrophic release. A key element in enhancing chemical plant security is worker involvement and participation. Chemical workers know first-hand how a plant works, what chemicals are used, how those chemicals react to one another and any particular facilities' weaknesses. We know the exact location of hazardous materials and we know if our training is really effective. We also know if backup systems will work when the power goes out. We are responsible for off-loading and loading chemical railway cars and transferring them around the plants. It has long been known that workers have direct and current knowledge and experience of plant operations that is invaluable in solving site-specific problems. All these responsibilities make chemical workers the first line of defense and explain why we believe employee involvement in the drafting and implementation of a plant's chemical security plan is crucial. It is a vital national resource that workers' expertise--the same expertise that operates these plants everyday--be utilized. All plants should take heed of its workers' expertise and concerns--prior to an explosion occurring. Including chemical workers in this process will enhance facility security and protection. Proper and sufficient training is also crucial in protecting workers. My union has run training programs and collected data on how much training our members received in the last 12 months in ten specific areas. Since the primary OSHA training mandate, the Hazard Communication Standard, only requires training on initial assignment, the vast majority of workers have had no recent training in Engineering Controls, Air Monitoring, Decontamination, Toxic Effects, Emergency Response Procedures, OSHA Regulations, or Hazard Recognition (the actual percentage ranges from 69 to 89 percent with no training). About half of these workers did not receive ANY training in ANY of these areas. Although I do not know what kind of training the workers at Goodyear had, I do know that there is really no such thing as too much training. The Government and companies must increase the amount and type of training to all workers inside these plants. Let me add that to conduct effective training you need resources that can be easily understood. It is no coincidence that New Jersey, a State that has taken a strong interest in the security of their chemical plants, has devoted a considerable amount of time and effort over the last 30 years to write readable and valuable resources on these key issues. I have provided some of those fact sheets to the Chairwoman on substances we believe were involved in the Goodyear explosion including ammonia, 1,3-Butadiene and styrene. Another key element of improving the safety in plants must include a clear statement and defense of workers' jobs if they face disciplinary procedures for reporting any significant security weaknesses at their facility. Fear is a fact of life at all too many workplaces and jeopardizing one's job by blowing the whistle is a risky thing to do. Defending members' jobs is regrettably all too common a task unions are forced to do. Workers, who bravely come forward to protect themselves, their co-workers, and communities around the plant, should not fear losing their jobs when they speak out. Whistleblower protection is vital in assuring the free exchange of ideas, improves security and ensures that effective measures are actually implemented. Workers must have the ability to come forth and communicate program deficiencies without fear of retribution. Occupational Safety and Health Act (OSHA) standards are beyond the jurisdiction of this subcommittee but they serve as a useful model and one that needs to be considered. Many, but by no means all, hazardous chemicals are already part of the standards that have improved our facilities. There are also broad standards that apply to many workplaces that improve the ability to investigate health hazards and make further improvements. We have a relatively easy time getting Material Safety Data Sheets (MSDS) on substances our members are exposed to, thanks to OSHA's Hazard Communication Standard. I worked in a wire and cable factory before this law went into affect and we did NOT know the contents of containers or what the chemicals could do to us. This Communication Standard changed that and is an invaluable tool in health investigations. Recently, I left a message for a company's health and safety representative about our members getting sick working around a new product line. Within 2 days, I received the MSDS for the substances and an industrial hygiene report on a sampling that was done--all without ever talking to this staff person. It is also possible that lists of chemicals and threshold amounts from one standard can dovetail with another. One standard that probably applies at Goodyear is the Process Safety Management Standard (PSM), 29 CFR 1910.119. If companies reach a threshold amount of these substances, this standard mandates investigation of their processes, clear operating procedures, regular inspections, process hazard analysis, procedures for contractors, pre-startup safety reviews, procedures for mechanical integrity, hot work permits, mandatory training, incident investigations, emergency planning, compliance audits and written procedures for any process changes. Ammonia is covered by this standard but from what I can tell, the raw materials, 1,3-Butadiene and styrene are not. I do not know the PSM procedures in place at this Goodyear facility but nationally there needs to be inspections and investigations at chemical plants to make sure that this law is being followed and enforced. It is all well and good to have general recommendations and laws but far too often facilities only take note when a law is actually enforced. Unfortunately, laws mean little if everyone knows that they will never be enforced. Even in the best of our facilities there is always room for improvement. One facility that comes to my mind is actually trying to implement the right procedures but after careful review, I realized that all the drills were taking place on the first shift. This is probably because that is when the salaried employees work. Yet, this facility has three shifts and operates continuously. At the end of the day, only a fraction of the workers are being drilled for these types of events. There are many steps and measures that could and should be taken to improve chemical plant safety and security. Substituting less dangerous formulations, different size and better designed containers, or various engineering steps, can minimize the consequences of an accident or attack at a chemical plant. This safer technology can significantly reduce the risk of a catastrophic release of chemicals from intentional attacks or unintentional disasters. Although safer processes may not be feasible in all circumstances, either technologically or economically, safer solvents or formulations should be substituted for more dangerous ones. The quantities can be reduced, stronger containers can be used, vulnerable sections can be reinforced and maintenance schedules must be reviewed. It is invaluable to devote time and funds to develop technologies and practices to decrease threats, vulnerabilities, and consequences of any event. I recently toured a facility, located just outside a major urban area, which utilizes a significant amount of chlorine in its operation. In discussing the potential danger with management and the union representatives, they explained that they had analyzed ways to minimize the risk including using smaller containers. They concluded, rightly I think, that given the volume they use, that smaller containers would have to be changed out so frequently that the risk of releases would be that much greater by using the smaller containers. When I suggested that perhaps these large tank cars could be designed better to minimize the consequences of any failure, they agreed that might be a partial solution. Clearly, we must put on our thinking caps and consider every possibility to make these facilities safer. Although this subcommittee's mandate is the protection of our facilities from terrorist attack, I applaud the recognition that the measures that you are discussing will protect us not only from a terrorist attack but will also minimize a hazardous release from a natural disaster or so called ``accidents.'' The dangers we face in a chemical release come from a variety of directions, but these changes as outlined in my testimony will mitigate the consequences and risks of a release regardless of the cause of that release. Homeland Security Presidential Directive No. 8 on National Preparedness stated that we must ``strengthen the preparedness of the United States to prevent and respond to threatened or actual domestic terrorist attacks, major disasters, and other emergencies by requiring a national domestic all-hazards preparedness goal.'' Worksite measures and improvements will result in changes that go beyond a possible terrorist attack and will address a wider range of hazards as stated in this Directive. They will minimize the threat of not only attacks, but catastrophic events and releases which are a reality that chemical workers and the public living around plants experience frequently. The International Chemical Workers Union Council supports the work of this subcommittee to ensure the safety of our chemical workers, the communities around the facilities and all Americans. We strongly support legislation that has the protections embodied in H.R. 5577. There is no guarantee that any legislation will prevent tragedies like the one at Goodyear, the BP explosion in 2005 where 15 contractors died, the 27 who died at Thiokol in 1971, the hundreds who died in the 1947 Texas City freighter fire and explosions, the Bhopal disaster that killed thousands, or a terrorist attack but the ICWUC believes it is necessary to make these changes in law and regulations. There is much work to be done to reduce risk and protect workers and communities. You have heard today of the real risks and you have the opportunity to take significant steps forward. On behalf of the ICWUC, I urge you to act now to protect America--to protect all workers and their families--by reducing the consequences of any release, be it intentional or unintentional. The ICWUC looks forward to working with every Member of this subcommittee and the House of Representatives to address this crucial problem. Again, I thank you for your time and would be pleased to answer any questions that you may have. Ms. Jackson Lee. Mr. Morawetz, I thank you for your testimony. I thank all the witnesses for their testimony. As you have been hearing a number of bells, I hope that by being here in the Capitol you realize that Members have been called to vote. I am going to now yield myself 5 minutes for questioning. I am going to start with Mr. McInnis, and then we will recess probably midway in the middle of the questions, Mr. McInnis. We ask the witnesses to in essence, Mr. Carafano, stand down. We will come back as quickly as possible to proceed with our questioning. This is an enormously important hearing, and we thank you gentlemen for your testimony. But I think, Mr. McInnis, you have crafted the overall and broad theme of this hearing. That is why it is so important for you and the other witnesses to be here. It is risk assessment and it is the ability to respond to that risk. This is an incident that occurred, and at this point of the investigation, we don't know, if you will, the genesis. We will not define this as a terrorist act. We make it very plain. But this committee has the responsibility of risk assessment for the Department of Homeland Security. It covers a number of ranges of parameters that may occur. We must protect against what might be. So you made a very important point, and I want to go back to that. That is the de facto search. That is the lunch meeting where lunch is ordered, meeting is gathered, and then a de facto search occurs by some humble soul asking, ``Where is Gloria?'' I will ask Mr. Paczkowski the same question, having been present during 9/11. One of the major issues was the logistics of search and accounting for persons. So Mr. McInnis, would you please tell us I think what you wanted to, the line of command, or what you thought of in a situation of a de facto search, where a meeting was called, lunch was ordered, and all of a sudden someone said, ``Where is Gloria?'' Mr. McInnis. Yes. There is a plan for that and an incident command set up. That is why I say they are short of personnel. You have a plan, I think all these plants have it, and all these people know. You have a supervisor in each area who has a responsibility for his people to keep count in an evacuation or any incident. Because of the lack of supervision to do this and lead, they don't have that. It is just everybody run for themselves. Ms. Jackson Lee. So there is no one, you are saying, that paused for a moment and counted one, two, three, four, five, six, seven, eight, and knew that all persons were out. Mr. McInnis. It is obvious they didn't, ma'am. One was still missing for 7 hours and they didn't know it. I hate to say it that way, but no, it doesn't work. They have no idea what they are doing. They haven't set it up. If they did, it would have been fine, but no. How do you think everybody felt in the family when we find out they were going to have lunch and go over what happened, and somebody says, ``Where is Gloria?'' You know? They don't know. They don't have any idea what is going on out there. I am sorry. I got expounded on that, and I forgot the second half of what you asked me. Ms. Jackson Lee. I will ask that question when I return, but what I was asking is, do you know if there is a plan where there is a chain of command that would have someone be responsible for all the persons and it is a known plan? Mr. McInnis. There was when I was there 12 years ago. They have cut the force so much, I don't know what the plan is, or do they have it in writing. I am sure they have it in writing, but can they implement it properly with the people they have? I am sure they have a plan. Ms. Jackson Lee. Let me, Mr. McInnis, we are now going to declare that the hearing is in recess. I have to go vote, along with other Members who have been in markup. We will return in short order. The hearing is now recessed to be convened in a very short moment. [Recess.] Ms. Jackson Lee. I call this meeting back to order. As we recessed, we were questioning Mr. McInnis. I am going to allow Mr. McInnis to give us any thoughts that he may desire, and then yield to the distinguished acting Ranking Member, who had a meeting and who is now here, for his 5 minutes. I do want everyone to be aware of the enormous sacrifice that Mr. McInnis is making. I know that other witnesses certainly respect that. We respect their presence here. I frankly want to place on the record, Mr. McInnis, that you are doing a remarkable job, and we thank you because you are making a sacrifice. We appreciate it. So right now, I am going to yield to you. I don't want to gavel, but to allow you to finish your thought that you may have had as I was leaving. Then I am going to yield to Mr. Bilirakis. Mr. McInnis. Thank you very much. First off, I want to make a comment. The people at Goodyear, the employees who work there, these are not the guilty people. I think when I rant and rave, I may have said things, but it is not the people that work at that plant. It is the company that developed by the hierarchy of Goodyear itself to set this kind of operation in motion. They have to follow the procedures that Goodyear sets for them. So I just want to make that clear. The people and employees of Goodyear itself in that plant are not guilty of anything. It is the culture and the set-up by the hierarchy of Goodyear itself that created that situation. So thank you. Ms. Jackson Lee. Let me quickly ask Mr. Paczkowski in my time remaining, how important, upon reflection, is the knowledge and the acceptance of the responsibility of establishing a risk assessment on any number of infrastructures we have? What is the level of importance of having a logistical plan that provides for accountability or accounting of all those that would be under your command? Mr. Paczkowski. Well, Madam Chairwoman, I think that accountability of personnel, both before and after an incident, is extremely important. I had the unfortunate experience of living through both the 1993 bombing of the World Trade Center and the 2001, and I can tell you that one of the things we did in the emergency operations center was not only accountability of Port Authority personnel, but also everyone else who was either working in or visiting the World Trade Center complex on 9/11. Of course, the tremendous amount of effort that went into accountability right after that event, we have established those as standard operating procedures in our emergency plans. The change of command that exists even pre-event doesn't stop post- of that, once the evacuation begins. Our supervisors are trained to make sure that they account for those persons. In every evacuation drill at our facilities, we practice personnel accountability, so it is extremely important in terms of the planning that we do. Ms. Jackson Lee. Let me thank you. We will have a second round. I now recognize the distinguished gentleman from Florida for 5 minutes. Mr. Bilirakis. Thank you, Madam Chairwoman. I appreciate it. Again, Mr. McInnis, thank you for appearing. I, too, would like to give you some time if you wanted to add anything else that you haven't already stated. Mr. McInnis. I would like to take this opportunity to the whole committee, but I also want to extend my thanks to Mr. Gene Green and Sheila Jackson Lee for helping me get my son back in a difficult situation from Iraq. We struggled with that. I had a lot of problems, and the kid sat on a tarmac for 3 days not being able to get home. Through your efforts, he got home very quick, and I appreciate you all doing that very much. You don't know how much it means to the family. Thank you both, and the committee. Mr. Bilirakis. Mr. Carafano, you argue that resiliency is the right strategy for homeland security. Do you not believe that the Federal Government currently considers resiliency as part of risk management? How do you believe the Federal Government should focus on resiliency? Mr. Carafano. I think the problem is we never start--we used the term ``risk management'' from the beginning, but we also talked about protecting critical infrastructure. What has overwhelmingly kind of driven the train is really this notion of protecting critical infrastructure. Well, there are two problems with that. One is, protection is a strategy. Again, when you live in a society with an infinite number of vulnerabilities, it is much more cost- effective to reduce threats than it is to try to eliminate vulnerabilities. The second notion is, the term ``critical'' quickly became politicized. Pretty soon, everybody wanted to be ``critical.'' So we have an overwhelming abundance of critical infrastructure now. So in a sense what we have is a lack of focus. Again, I think it is largely not driven by DHS, which I think if left to their own devices would want to not just impose risk management philosophies, but to focus the resources on what is truly the responsibility of the Department, which is dealing with transnational terrorist threats and coordinating national response in the face of catastrophic disasters. Again, I think a big challenge here is to Congress. If you think about it, if Congress wants to be a player in risk management, it has to do business differently. It has Congressional Research Service. It can say this is the state of the debate. It has the CBO, and that can tell you this is what it is going to cost. And it has GAO, which can tell you this is how effective the processes are. What they don't really have is they don't have an investigative arm or an assessment arm themselves that assesses outcomes, that really looks at whether this makes sense. This is traditionally what is called operational research, which just doesn't look at the process itself, but looks at the outcome this produces. So once Congress has some kind of mechanism similar to, for example what the Government relies on, in terms of FFRDCs, federally funded research and development centers, like RAND and MITRE and these kinds of corporations, but until they have some kind of in-house capability to do risk assessments to both be a check on Government, and to do assessments of what is reasonable, Congress is just kind of taking a stab at what they think kind of sounds intuitively right. I think the record so far shows that Congress doesn't really get it very right very often. Mr. Bilirakis. Okay. Mr. Paczkowski, do you believe there should be a national standard for risk methodology that could be used at both the public and private levels? Who do you believe should be responsible for developing such a standard? Has any group in the private or academic arena attempted to develop such a standard? Mr. Paczkowski. Well, I think there is no one standard. I think that risk management is both a process and a profession. We are advancing improvements in process all the time, but we are not developing the professional infrastructure to make that happen. A piece of that is standardizing terminology, standardizing process, much in the same way like other professional disciplines would do in engineering or accounting. Where it should reside in the Federal Government, I am not really sure, except it should be in a position where it could influence the development of risk management across the interagency community, wherever that is best placed. Organizations like OMB come to mind, but I am not necessarily certain whether that is the right place or not. Certainly, I believe that risk management in the way we have talked about it is larger than the Department of Homeland Security alone, and it requires a kind of interagency perspective that I am not sure the Department alone can provide. Mr. Bilirakis. Thank you, Madam Chairwoman. Ms. Jackson Lee. I thank the gentleman. We will now begin a second round. Let me ask Mr. Morawetz, your testimony was very moving. As you well know, we have authored in this committee the chemical security bill, H.R. 5577, that really is applicable to any incident that occurs in the course of a chemical plant's responsibility to its employees and also to the issues of safety and security. For example, the bill, H.R. 5577, which we are looking to move as quickly as we can in light of the dual jurisdiction that occurs, has a provision, the role of employees in vulnerability assessments and site security plans, which means these are overlapping responsibilities, that if you secure a plant for the potential of a security risk, it also I think spills over, if you will, into securing the plant for it to be safe. You have mentioned several incidents, which I would like you to go forward and use, the present state of affairs as possibly contributing to companies not having risk assessment plans, processes for accounting for employees, certainly safe handling of chemicals, which we found lacking. If you would answer that question, then would you explore the point you made about the Chemical Safety Board not having enough funds to investigate, which I frankly believe is an appalling, outrageous posture and position to have heard in a hearing room in the U.S. Congress of a committee that deals with homeland security. So if you would, Mr. Morawetz, approach those two questions for us. Mr. Morawetz. Let me start with the second one. From what I know, and I am not an expert on the Chemical Safety Board, is they are a relatively new Federal agency. They are modeled after the FAA. When there is an accident, they go investigate it. I think that that is a good role model and one that is deserving, but it is interesting that it is recent. There wasn't such a body before 10 years ago. They are relatively small. They have a budget of I believe about $9 million. They have a small staff of 40 employees. As much as I would like them to investigate this incident, I hope it is not at the sacrifice of another town in another part of the country which can't get an investigation. For instance, in my written testimony, I think it was there, in Cincinnati last weekend we had an employee die in a wastewater treatment facility from hydrogen sulfide exposure. I believe again that the Chemical Safety Board was going to go, but I am not sure whether they can investigate it. That dovetails for me into more these generic problems. It is not the only wastewater treatment facility. Goodyear in Houston isn't the only synthetic rubber facility. CSB has done these generic reports which I think are very valuable. The recommendations they make can apply to a number of facilities, and as I said, the relief valve. So that is what I know about the Chemical Safety Board. Ms. Jackson Lee. It is funded, I think for the record, it is a federally funded entity? Mr. Morawetz. Yes. It is a Federal agency. Ms. Jackson Lee. So when you speak of funding, I just want to make sure the record is clear, you are suggesting that there has been a short-changing or a difficulty in funding the agency. Mr. Morawetz. I don't think they have enough funds. I would defer to other people. You probably know much more about the Federal budget and how that works. But it is relatively small and has a relatively small amount of a budget. Ms. Jackson Lee. Well, you can feel perfectly free to suggest, if that is what you believe, that there is not enough funding. Yes, we do have to make budget decisions, but we also have to make risk assessment decisions, and we have to prioritize decisions. So is your testimony that you would believe that there needs to be more funding for the Chemical Safety Board? Mr. Morawetz. Yes, that is correct. Ms. Jackson Lee. And that there is a greater need than what is imagined with a budget that may be $9 million, maybe a little bit more, and with 40 employees? Mr. Morawetz. Yes, that is correct. Ms. Jackson Lee. You may continue. Mr. Morawetz. The other one, you raised some points about homeland security, H.R. 5577, which I am familiar with, but also what comes to mind is the Goodyear situation. It is very interesting having this hearing because when I look at risk management in the context of this committee, it is one answer. When I look at risk management as I do for these facilities, all of them, what comes to mind to me, and it is part of my testimony, is that, wait, what we really need is enforcement of the standards that are in existence. If those standards were enforced better, I think there would be a bottom level that would be more protective for a lot of facilities, that then we would have to undoubtedly do more on for terrorist threats and other threats. But without that bottom line, that basic level of protection, we are in a very difficult situation. I don't want to just think about the terrorist threat, and then those facilities for instance with the current CFAS rules that don't have the threshold, fall through. Ms. Jackson Lee. Do you think that threshold is the responsibility of the Federal Government, whether it be the Department of Homeland Security or another agency, to establish a baseline of risk or a baseline of what is necessary to protect critical infrastructure that may be subject to incidents like Goodyear and what you have mentioned, and obviously, unfortunately some untoward action that may be premeditated? Mr. Morawetz. In general, I support the CFAS regulations, that idea of a threshold amount. I do equally support the idea of the process safety management threshold amounts. What also comes to mind are other standards like hazard communications in my field that do not have a threshold amount. If you have that chemical, if you work around ammonia, butadiene and styrene, you have a right to know what the hazards of those chemicals are. You have a right to get trained in it. You have a right to get access to the material safety data sheet. So sometimes you might not need a threshold. For our purposes, risk management I think you do need a threshold amount. I do not believe, as we have actually put in writing to the Department of Homeland Security, in the original appendix say that it had any amount. We thought that was going too far. Ms. Jackson Lee. Without knowing all the facts that Mr. McInnis has spoken of, but you heard him speak to the facts as he knows them: Do you believe a basic level of risk analysis, risk assessment, risk planning, proactive planning, training and accountability would have been helpful in the Goodyear incident? Mr. Morawetz. I hesitate to go very far there, but just to say that something clearly went wrong. My guess is that that will be identified in the investigation, especially with the hearing that you have here today, but I don't know what that is. Ms. Jackson Lee. Well, simply, do you believe that something went awry to not be able to account for all employees? Mr. Morawetz. That is certainly, and I think Mr. McInnis's testimony is very clear. You should have that procedure in place. If an incident happens, you should have a check-off procedure. Clearly, the situation went much too long without an adequate procedure to account for all employees. Ms. Jackson Lee. Would you make the argument, or at least make the suggestion, that in plants that deal with chemical elements, that such a plan and also a risk plan is very important? Mr. Morawetz. Yes. Ms. Jackson Lee. Mr. Carafano, are you aware, or can you help us describe for the committee any Federal department that you may be aware of--agency or office--that has created an effective risk management framework? You gave us three points. Do you have any knowledge of that? Mr. Carafano. Well, risk management is increasingly proliferating throughout the Federal Government. In the Army, I was actually taught risk management as a young officer. We did convoy operations and in all our military operations, we were actually given a matrix that explained how to asses risk and how to reduce risk. This was in the early 1980's. So it is not as if there aren't risk processes going on in various parts of the Federal Government. The point is two things. I totally agree with the comment that the professionalization of risk management as a business practice in the United States is absolutely important, not just from a disaster preparedness perspective, but from a resiliency and from a sound business practice and business continuity perspective. So it is vitally important that we do that. But I think the approach that we have to take is this is a new competency that we have become aware of actually as we have basically developed analytical tools and the ability to do this in a very kind of sophisticated way. It has to be ingrained throughout the professional development of our entire workforce in the Federal Government and in the private sector. So this is kind of a ``bigger than a breadbox'' problem. It is not a point of creating risk offices and risk managers in agencies. It is about taking risk management skills, in coordination with having a professional risk management force, but in ingraining basic risk management methodologies in professionals and managers and leaders throughout the Federal Government and the private sector. Ms. Jackson Lee. Let me, Mr. Paczkowski--your experience, I think, framed as you have given it in your testimony, can be very instructive for how we communicate locally, and when I say that, take what local entities unfortunately have done through tragedies that have been experienced, and begin to question or help frame how we do this at the Department of Homeland Security. So tell us again how effective a risk management program that has been implemented at the Port Authority really is, whether or not it has grown in light of 1993 and 9/11, and to suggest whether you can do so with the backdrop of no further acts to date, but how has it mitigated, if you will, the risks that might come about because of where the Port Authority is and what it represents to those who might wish to do it harm. Mr. Paczkowski. I will echo Mr. Carafano's remarks about individual corporations and folks in the private sector, but also in the private sector agencies, taking responsibility for risk mitigation. I think it is very important. We did that at the Port Authority. We saw it as a responsibility of our agency regardless of what was done by others. We certainly began very early after 9/11 to understand the magnitude of what we were dealing with, and that risk management was the only approach we could take. We have ingrained that process into our ongoing planning and budgeting cycle now. It is part of our education in management to really think in terms of risk mitigation. In fact, I will be in discussions later this week about an enterprise-wide risk management program to look at all kinds of corporate risk, not just those in terms of security or all hazards. Ms. Jackson Lee. Did you say ``enterprise-wide''? Mr. Paczkowski. Enterprise-wide risk management. That is a practice that is common in---- Ms. Jackson Lee. So you will be involved with the private sector? Mr. Paczkowski. Absolutely. In fact, as we move forward with our all-hazard risk assessment, one of the things that is essential for the Port Authority is our ports and our airports do not operate without our private sector partners. We have a very small professional cadre of public sector folks at those facilities. Involvement of the private sector in assessing risks to those operations at those facilities is absolutely critical. How we do that, how we introduce them to the process, and how we make them partners is certainly something we are going to be cutting our teeth on in the next couple of years, but we see it as absolutely essential. That partnership extends not only at the local level, but all the way up to the national level. DHS has done a lot in the national infrastructure protection plan to create a sector partnership model. We need to work across industry sectors to help coordinate risk management, and in the way that those sectors take responsibility for the security of their operations. I think DHS can facilitate that process much in the way it is done in the rest of critical infrastructure protection policy. Ms. Jackson Lee. Has the Department of Homeland Security looked closely at some of the aspects of what has been done in the private sector and utilized those? Can they do it more effectively? Mr. Paczkowski. I think they could do it much more effectively, to be honest with you. Being what I often refer to as the 9/11 agency and having spent so much effort on risk assessment, I have been rather surprised by the lack of attention we have gotten from DHS. We spend more time, frankly, with GAO in discussing our approaches to risk management. I think that there are good models out there, not only in the public sector like the Port Authority, but also in the private sector about security risk that could very well be instructive to DHS as it advances this program. Ms. Jackson Lee. So we need to try to push that collaboration between DHS and the private sector? Mr. Paczkowski. Yes, ma'am. Ms. Jackson Lee. Let me reserve for a moment, and yield to Mr. Bilirakis for a second round. Mr. Bilirakis. Thank you, Madam Chairwoman. I have a couple of questions. Mr. Morawetz, in my opinion, much of your testimony is outside of the scope of this hearing, and many of the policy issues you raise are under the jurisdiction of other congressional committees. Explain how do safety incidents that you describe and discuss in your written testimony relate to developing a risk management framework in homeland security? Are these lessons that you believe policymakers can learn from these incidents that you describe, that will help in the formulation of risk-based methodologies in homeland security? If so, what are they? Mr. Morawetz. It is a good question, but one that is a little bit difficult to answer. Let me take a step backward, though, and this is in my written testimony, and mention one of the homeland security Presidential directives, No. 8, which mentions specifically an all-hazard approach that I know some of the other members of the panel here are familiar with, that homeland security should look at all hazards, should look at terrorist threat as well as disasters such as Katrina or the flooding--I was in Cedar Rapids last week actually--or these disasters. Maybe I got it wrong, but it seemed to me that this hearing clearly was part of it, and it was a question of the Goodyear explosion. I like to look at the field as holistically as how do we protect the infrastructure from all the hazards. The other way to look at it is I think that the very measures that you have put in proposed legislation, and some of the actions in the existing rules and regulations at DHS, of CFAS, I think can be protective of the infrastructure, whether it is a terrorist attack or whether it is a natural disaster. I think there are things that you can put in place to minimize the effects so no matter why an incident happens--and let's take Goodyear--that you can account for all employees. That would be helpful whether it is a terrorist attack on a chemical plant or whether it is the Goodyear explosion or whether it is a facility that a tornado hits through Oklahoma. In terms of jurisdiction of this committee, I would defer to the committee. I am not an expert on that. Mr. Bilirakis. Thank you, Madam Chairwoman. Thank you, sir. Ms. Jackson Lee. I just have a couple more questions. I thank you, gentlemen, and I thank the acting Ranking Member, Mr. Bilirakis, for both his contributions and his interest, and I look forward to collaborating with him on a number of important issues that we have discovered in this hearing. Thank you very much, Mr. Bilirakis. I have a few more questions. I want to pursue your answer, Mr. Morawetz, because I think it gets somewhat muddy between safety and the word ``security.'' I think the best way this Congress can function is to recognize that they are two very valid terms that overlap, frankly. A safe facility may be prepared for the worst, because it has all of the four corners of being prepared in place. So let me ask you, with your experience, which reflects very importantly on security issues, can you assess how safe America's chemical plants currently are? An unsafe plant, obviously--and this is my interpretation--certainly is a great conspicuous target for terrorists. You also have the concern of chemical plants being launched, located in neighborhoods, usually residential communities are nearby. So I would appreciate it if you would assess how safe you believe America's chemical plants currently are, and I would like you to assess whether or not you think the private sector is doing everything it can to mitigate the risk, whether it comes in the form of an unsafe incident or they come in the form of something premeditated. Mr. Morawetz. Mr. Morawetz. It is a good question, but not that easy to answer. I don't believe in painting with this huge paint brush that says this is where we are, or that we can judge it easily on a scale from one to ten. From the facilities that I have been to, on the initial look at guns and gates, I think that the facilities are really, the ones I have seen are doing a pretty good job. I think they are looking at them. They are seeing room for improvements. I just talked to a local this week in preparation of coming that talked about gates that they were improving, the spaces, gates under railway lines, and an interesting one where at some gates that they would stop somebody and remotely let them in, but they realized that a car could easily hide behind the truck, and so they wanted to get double gates. So there is room for improvement. I talked to a member, he said everything is going very well, but I pushed him a little bit further, and they do a lot of drills. They do a couple a year, far beyond what the mandates of any regulation is now or even proposed. But I asked him further, well, what about all the shifts? It turns out since salary, of course, is mainly on first shift, the drills were only on first shift. I think that is a point he will bring back to management, and I think it is a process back and forth. So my impression is of the facilities I have seen is that they are somewhat secure. Does that mean that all the procedures are in place that can minimize the risk? I am not sure. I would say that clearly from my example there is room for improvement, but it is hard otherwise to paint the broad brush. Ms. Jackson Lee. Would you just, if you will, philosophize or stretch your analysis that a safe plant would also have procedures in place that would be equally responsive in light of a potential terrorist attack? If a plant had risk procedures in place, accountability, accounting, evacuation procedures in place, that would translate potentially if the incident was provoked by an accident or provoked by something premeditated? Mr. Morawetz. I think that is exactly correct. Let me just add one other point, beyond my direct experience, you mentioned before the Chemical Safety Board. There still are these accidents. There still are these investigations. It is not just Goodyear that happened or hydrogen sulfide in Cincinnati. These incidents do happen. So the question is, is it just that they are going to happen? Or are there steps that we can take reasonably to protect them? Ms. Jackson Lee. Mr. McInnis, you have served in this industry for some I believe 38 years. Is that accurate? Mr. McInnis. Yes, ma'am. Ms. Jackson Lee. Certainly, your service pre-dates the horrific tragedy of 9/11, meaning that you started working before we had an idea of terrorist attacks in the United States. Is that right? Mr. McInnis. Yes, ma'am. Ms. Jackson Lee. This is an appropriate moment to thank your son for his service in Iraq. We thank the sergeant very much, and we honor him, and we offer our sympathy to him and other family members. But I am glad you recounted the story of how hard it was for him to get back and how he needed to get back for is mom. It was our honor and pleasure, I know. Mr. McInnis. He thanks you both very, very much. I am relaying that message from his heart and mine, the family. Ms. Jackson Lee. We are honored with his service. So let me just go back to having been in this business for 38 years. Can you tell us how worker security and safety has changed since you started telling about training and staff cuts and things that might have impacted? What do you see are the missing elements? What is missing in what you have seen since you came into the plant? Mr. McInnis. Well, in the past every facility that had manpower in it had a supervisor, which I say would be the leader in charge. The day shift had a lot more supervision. They had more personnel, and the fire department was fully loaded. Everything was proper. They had a procedure. I don't think we had too much. It was small drills, little fires, and everything went smooth. But in the past 14 years, I would say, before I started to leave, this was Goodyear's goal to cut everything. They used this threat for contracts. They were going to do away with jobs or they were going to shut the plant down. So the people who needed a job took these cutbacks in wages and jobs so they could have a job to support their families. They would sign these. Take for instance the fire department. I will tell you how it is staffed now. Before, it was staffed 24 hours a day. Now, they have two to three firemen per se each day, and the backshift, which is anything after 3 o'clock, they have none, they have nobody. Then because of the cuts you go to the EMS or emergency response teams, there is no set pattern on those. You may run across a shift that may have eight individuals working in the medical, and another shift may only have one or none. So what I am saying is now, with just a shift foreman himself running the plant on backshift, he is by himself. So if he had a disaster by himself, it would be worse than what happened 2 weeks ago. Ms. Jackson Lee. Did you make the point that your wife, who was also a dedicated employee, was in essence stretching herself helping out somewhere else where it seems that you said she didn't have to be there, but she was helping out. Could you explain that? Mr. McInnis. Yes, ma'am. Like I said, we discussed that many times, and that was one of the things we talked about, that she would come home exhausted because her job was in one end of that plant, and they would call her or she would volunteer to go up. I spent many a day talking to her on the phone, and I would hear them calling and saying, ``Can you come help us?'' They don't have the personnel. The supervision has been cut to a bare minimum, and that is why she went to those areas. She didn't have to go. What I am saying is these cuts by the company has caused--you know what I am talking about. It just caused this incident itself because she wouldn't normally be there. Ms. Jackson Lee. So the worksite where she normally works, was that impacted by the incident? Or would she have been in a safe area or been able to evacuate? Do you know? Mr. McInnis. I am sorry, ma'am. I missed the first part. Ms. Jackson Lee. The area where she traditionally worked, where she had to leave and go to that part of the plant, would she have been away from the incident if she had been where she traditionally worked? Mr. McInnis. Yes, ma'am. There is another plant between where this explosion occurred and where she worked. So there was a whole other plant between that situation where her job really was. Ms. Jackson Lee. Thank you, Mr. McInnis. Dr. Carafano, in your testimony you mentioned that it is not necessary for issues pertaining to pandemics or energy supplies to be elevated to national security status. Can you please elaborate on this? How should the Government then address these issues? Mr. Carafano. Yes, ma'am. The problem with labeling things as national security issues is that automatically does two things. When you say something is a national security issue, it means that we intend to invest our Federal authorities with enormous power and responsibility. The preamble of the Constitution says that providing for the common defense is fundamentally the Government's job. So when you do that, you have a tendency to over- Federalize, over-centralize and make Government very intrusive in your life. So we do that for basically threats of other malicious actors, whether they are state or non-state actors, threatening the United States. It doesn't mean there aren't other problems and they don't rise to the level of national importance, but when you start to call them national security issues, you are in a sense ceding all kinds of authority to the Federal power, and I think we want to be very cautious about doing that under any circumstances. The second thing is when you call something a national security problem, the tendency is to look for a national security solution, so the tendency is to default to national security instruments such as the military or such as, again, having DHS do this. So I think we should be very cautious in what we call a national security issue. In my mind, the only thing that rises to the level of a national security issue is a state or non-state external threat who is threatening the stability and the coherence of the Nation. Other issues are national issues which we should certainly address, and they can be national issues and national priorities, but we shouldn't call them national security issues. If I could just follow up very quickly, I just wanted to go back to the excellent point that you made, and I think a point that we all should account for, and that is what is the most effective way to instill risk assessment in the private sector and the public sector. You brought up a really excellent point about employee involvement in disaster planning and business continuity. The data on this is absolutely really clear. There is a tremendous researcher up in New York, Roz Lasker, who has done a lot of work on this. She has compared emergency planning for communities where it is done by professionals, and then where it is done with the input of people in the community. The answer is exactly the same in the workplace. When the people in the workplace participate in the planning, No. 1, you get much better buy-in because they are part of the planning process; and No. 2, you get much, much better plans. So emergency and disaster planning which integrally includes the workforce and the people in the planning process is infinitely better and stronger. We know that. The data suggests that. So how do we get people to start doing this? I go back to the point I made before about the SAFETY Act. For example, one of the things you can do under the SAFETY Act is you can give SAFETY Act protections to risk management processing, management and planning. So for example, a good company that has a good risk management product, they would include in that risk management assessment, did you bring the workforce into making that plan? Then a company that would use that risk management, that got SAFETY Act protection, you know, a company might be incentivized to use that risk management process and to integrate it into their business practices and a business continuity plan. Then you get a stronger, better plan for that. So I do think we need to look at things like the SAFETY Act, where we can really incentivize people to adapt best practices, which are in the end going to save lives, prevent tragedies like this from happening, allow businesses to operate better and more efficiently, and be more resilient in the face of disasters. Ms. Jackson Lee. Well, let me say, I appreciate the importance of both my question and your answer, which is that we need collaboration. We need to be able to focus on ensuring that the private sector is in tune with risk assessment and risk management. But let me tell you why we need to be sensitive to the question of national security. I don't believe that the solution to national security is always the military, but I would like to think that it is preparedness and that it has some home in the Department of Homeland Security. My example is such. Prior to 9/11, our focus was not on the vulnerability per se of tall skyscrapers. We admired them. We toured them. We didn't have much of a focus on them. In fact, as my recollection serves me, the towers built in the 1970's had a different approach in terms of how they were structured. They thought they were meeting the test of what could happen. They could not predict or did not predict a forceful missile coming in with how many tons of fuel. So in essence, entities have now come under the umbrella of national security, i.e. airports, because we have been awakened to the possibility of a national security through airports and airplanes. So I think we cannot limit our thinking in that. I will give you a chance to answer it, but I am going to go to Mr. Paczkowski. Do you see where I am going on that? I think you have lived in the World Trade Towers, or you really know them. Doesn't our risk assessment, and particularly from local governments and local entities, have to take into consideration the risk, if you will, of non-threatening entities becoming unfortunately a tool of terrorism? Do we have to take that into account in our preparedness and our risk assessments? Mr. Paczkowski. I think we have become a lot smarter, that we need to take a more holistic look at a full range of threats. I think when we think about risk assessment, and I agree with Mr. Carafano that a lot of the dialog has been on mitigating a vulnerability. We have focused an awful lot of attention on the very moment we think someone is going to show up with a bomb at our facility, and not enough attention on all the things that might in fact prevent that from happening, so focus on prevention, and also building into in particular our infrastructure and our key resources the kind of ability to withstand an impact over the long term, the resilience that we need to build into our systems. Ms. Jackson Lee. But don't we need to look at ports and airports and trains with a different eye than we previously look at them? Mr. Paczkowski. Absolutely. I mean, if you were to ask questions of the Port Authority in 1990, let's say, you know, you would get a very different answer than you would get today. We certainly do feel that we are on the frontlines, if you will, of this security challenge. Ms. Jackson Lee. Let me ask Mr. Morawetz just a question about helping employees to be part of the safety. Is it helpful that employers give to employees both risk assessment plans, but also records of previous incidents? You may be a new employee or you may be a longstanding employee, but you have the ability to access those records. Mr. Morawetz. Well, in terms of incidents, there is the OSHA log, so certainly any serious injury or fatalities would be part of the OSHA log that is posted and the union has a right to it. Ms. Jackson Lee. But this would be incidents that may not have resulted in injury, but it occurred. Should employees have the ability to have access to that? Mr. Morawetz. I think they should, and I think that that can be invaluable information as part of the communication back and forth, as Dr. Carafano said. Two things happen. No. 1, you get additional information from a wide variety of people who work at an institutional workplace, but No. 2, you get the buy- in, you get the ownership. So I think people will then implement the plan. Ms. Jackson Lee. You may get ideas on how you can avoid it. Mr. Morawetz. Yes. Ms. Jackson Lee. What about whistleblower protection for employees? Mr. Morawetz. I think that is a fact of life, that people feel scared on the job. It was part of my testimony, and I think that having whistleblower protection is important. It may never be used, but in an instance where people need it, it should be in place. Ms. Jackson Lee. I hope that that translates to making, in your opinion, a safer plant. Mr. Morawetz. Yes, it does, because the information won't come forward. If the information or weakness doesn't come forward, then the weakness may not be seen and won't be corrected. Ms. Jackson Lee. Dr. Carafano--we call you ``doctor,'' and I see ``mister.'' I want to correct the record. Mr. Carafano. [OFF MIKE] [Laughter.] Ms. Jackson Lee. And humor. Are you a doctor? Mr. Carafano. I am a doctor. Ms. Jackson Lee. All right. We will correct the record. It is Dr. Carafano. Did you want to comment briefly? I am going to let Mr. McInnis have the last word. Mr. Carafano. Thank you, Madam Chairwoman. You know, you made an absolutely excellent and critical point. Before 9/11, we grossly underestimated vulnerabilities in this country. That is true. The point is, we also grossly underestimated threats, and we also grossly underestimated criticality. If you want to walk the walk of risk assessment, you have to have a holistic discussion that balances all three. Today, we focused on a lot of really valuable issues, but we virtually only talked about mitigation and vulnerabilities. We really didn't have a discussion about criticality and about threat reduction. You have to combine all three of those if you really want to do serious risk assessments. Ms. Jackson Lee. My answer to that, Dr. Carafano, is the first panel. That is what we were proposing to the Department of Homeland Security. That is their responsibility. That is the necessity of a chief risk officer. That is a need for getting a baseline and for quarterly meetings, for giving us their minutes, to get where you need us to be. We had to highlight what happens, unfortunately. Mr. Paczkowski is an example of what happens when we were, in essence, not informed. I will put quotes around ``asleep at the wheel'' because I know there are many hard-working people in a certain instance. So your testimony and what you have just allowed us to understand is a guidepost for what we believe the Department of Homeland Security must do to impact on our plants as it relates in all instances security, but we have to also overlap on safety, because any vulnerability projects us into the 21st century for what we know can happen as it relates to terrorism. So you are very right and you have just posed the questions that we are demanding of the Department of Homeland Security as evidenced by my earlier questions to that panel. We do thank you. Mr. McInnis, I will pose the last question to you. I am giving you the last word, inasmuch as you have come in this time of need and also a time of concern. How much concern should we have? You are an experienced plant worker. You are not all over America, but how much concern should we have for the plants in America if the trend that you have discussed, the losing supervisors and losing employees and lack of training prevails? How much concern should this committee have? Mr. McInnis. Ma'am, there should be plenty for the simple reason, as I mentioned earlier, all these things are slid by. I sat back and watched years ago when OSHA would come by with a small slap on the wrist. It is posted and everybody knows it. But these things don't bother people. Getting to the accidents happening, and security as far as that goes: If you are cutting the personnel, you are cutting your own throat. You have these people sitting up there in Akron, as I said, making these changes, and these poor individuals down here happen to work under those conditions. It affects the safety and security of the plant. Like I mentioned, the fire department, the EMS or emergency response teams, and the security is--I know we don't have time, ma'am. I can go over issues of those things that happened over the years that I personally tried to change myself. But there again, it comes from up above what goes on. My thought on this particularly, and I thought about this today, Enron goes to jail for fraud of the people. What happens when somebody is killed in a plant because of unsafe conditions and everything? What happens to them? I think these people need to go to jail. Forget the fines. Let's put them in jail and see if this will change their philosophy as opposed to wanting greed and wanting money. It might slow them down and do the right thing. Ms. Jackson Lee. Well, Mr. McInnis, you may have just made yourself a consultant to this committee as we go forward for the many issues that you know about. I think all the witnesses have made this hearing a good first start, or a continuing of what we are trying to achieve in the Department of Homeland Security, which is the understanding of risk assessment, risk management, and the roadmap that we need to take, Mr. Paczkowski, to make your job easier and to create that collaboration that you have spoken of, and certainly for Dr. Carafano to ensure that we do reach those aspects that you mentioned, and to Mr. Morawetz, that we have the kind of plant system across America that is befitting of this 21st century Nation. I thank all of the witnesses for their testimony. If you would just wait a moment so that I can get the appropriate language into the record for my committee Members. I want to thank the witnesses for their valuable testimony and the Members for their questions. The Members of the subcommittee may have additional questions for the witnesses. We would appreciate it if you would answer them expeditiously, and we ask that they come both expeditiously and in writing. Hearing no further business, the subcommittee stands adjourned. [Whereupon, at 5:33 p.m., the subcommittee was adjourned.]