Congressional Record: March 12, 2003 (Senate)
Page S3622-S3639
STATEMENTS ON INTRODUCED BILLS AND JOINT RESOLUTIONS
By Mr. LEAHY (for himself, Mr. Levin, Mr. Lieberman, Mr.
Jeffords, and Mr. Byrd):
S. 609. A bill to amend the Homeland Security Act of 2002 (Public Law
107-296) to provide for the protection of voluntarily furnished
confidential information, and for other purposes; to the Committee on
the Judiciary.
Mr. LEAHY. Mr. President, last year when I voted to support passage
of the Homeland Security Act, HSA, I voiced concerns about several
flaws in the legislation. I called for the Administration and my
colleagues on both sides of the aisle to monitor implementation of the
new law and to craft corrective legislation in the 108th Congress. One
of my chief concerns with the HSA was a subtitle of the act that
granted an extraordinarily broad exemption to the Freedom of
Information Act, FOIA, in exchange for the cooperation of private
companies in sharing information with the government regarding
vulnerabilities in the nation's critical infrastructure.
Unfortunately, the law that was enacted undermines Federal and State
sunshine laws permitting the American people to know what their
government is doing. Rather than increasing security by encouraging
private sector disclosure to the government, it guts FOIA at the
expense of our national security and public health and safety.
On March 16, we mark Freedom of Information Day, which falls on the
anniversary of James Madison's birthday. Madison said, "A popular
government, without popular information, or the means of acquiring it,
is but a prologue to a farce or tragedy or perhaps both." As a long-
time supporter of open government, I believe we must heed Madison's
warning and revisit the potentially damaging limitations placed on
access to information by the HSA.
I rise today to introduce legislation with my distinguished
colleagues Senator Levin, Senator Jeffords, Senator Lieberman, and
Senator Byrd to restore the integrity of FOIA. I want to thank my
colleagues for working with me on this important issue of public
oversight. This bill protects Americans' "right to know" while
simultaneously providing security to those in the private sector who
voluntarily submit critical infrastructure records to the newly created
Department of Homeland Security, DHS.
Encouraging cooperation between the private sector and the government
to keep our critical infrastructure systems safe from terrorist attacks
is a goal we all support. But the appropriate way to meet this goal is
a source of great debate--a debate that has been all but ignored since
the enactment of the HSA last year.
The HSA created a new FOIA exemption for "critical infrastructure
information." That broadly defined term applies to information
regarding a variety of facilities--such as privately operated power
plants, bridges, dams, ports, or chemical plants--that might be
targeted for a terrorist attack. In HSA negotiations last fall, House
Republicans and the administration promoted language that they
described as
[[Page S3632]]
necessary to encourage owners of such facilities to identify
vulnerabilities in their operations and share that information with the
Department of Homeland Security, DHS. The stated goal was to ensure
that steps could be taken to ensure the facilities' protection and
proper functioning.
In fact, such descriptions of the legislation were disingenuous.
These provisions, which were eventually enacted in the HSA, shield from
FOIA almost any voluntarily submitted document stamped by the facility
owner as "critical infrastructure." This is true no matter how
tangential the content of that document may be to the actual security
of a facility. The law effectively allows companies to hide information
about public health and safety from American citizens simply by
submitting it to DHS. The enacted provisions were called "deeply
flawed" by Mark Tapscott of the Heritage Foundation in a November 20,
2002 Washington Post op-ed. "Too Many Secrets," Washington Post,
November 20, 2002, at A25. He argued that the "loophole" created by
the law "could be manipulated by clever corporate and government
operators to hide endless varieties of potentially embarrassing and/or
criminal information from public view."
In addition, under the HSA, disclosure by private facilities to DHS
neither obligates the private company to address the vulnerability, nor
requires DHS to fix the problem. For example, in the case of a chemical
spill, the law bars the government from disclosing information without
the written consent of the company that caused the pollution. As the
Washington Post editorialized on February 10, 2003, "A company might
preempt environmental regulators by `voluntarily' divulging
incriminating material, thereby making it unavailable to anyone else."
"Fix This Loophole," Washington Post, February 10, 2003, at A20.
The new law also 1. shields the companies from lawsuits to compel
disclosure, 2. criminalizes otherwise legitimate whistleblower activity
by DHS employees, and 3. preempts any state or local disclosure laws.
The Restore FOIA bill I introduce today with Senators Levin,
Jeffords, Lieberman, and Byrd is identical to language I negotiated
with Senators Levin and Bennett last summer when the HSA was debated by
the Governmental Affairs Committee. Senator Bennett stated in the
Committee's July 25, 2003 mark up that the administration had endorsed
the compromise. He also said that industry groups had reported to him
that the compromise language would make it possible for them to share
information with the government without fear of the information being
released to competitors or to other agencies that might accidentally
reveal it. The Governmental Affairs Committee reported out the
compromise language that day. Unfortunately, much more restrictive
House language was eventually signed into law.
The February 10 Post editorial called the Leahy-Levin-Bennett
language "a compromise that would accomplish the reasonable purpose"
of "encouraging companies to share information with the government
about infrastructure that might be vulnerable to terrorist attack
without such broad harmful effects." Id. The Post editorial was
titled, "Fix This Loophole," which is exactly what my colleagues and
I hope to accomplish with the introduction of this bill. Id.
The Restore FOIA bill would correct the problems in the HSA in
several ways. First, it limits the FOIA exemption to relevant
"records" submitted by the private sector, such that only those that
actually pertain to critical infrastructure safety are protected.
"Records" is the standard category referred to in FOIA. This corrects
the effective free pass given to industry by the HSA for any
information it labels "critical infrastructure."
Second, unlike the HSA, the Restore FOIA bill allows for government
oversight, including the ability to use and share the records within
and between agencies. It does not limit the use of such information by
the government, except to prohibit public disclosure where such
information is appropriately exempted under FOIA.
Third, it protects the actions of legitimate whistleblowers, rather
than criminalizing their acts.
Fourth, it does not provide civil immunity to companies that
voluntarily submit information. This corrects a flaw in the current
law, which would prohibit such information from being used directly in
civil suits by government or private parties.
Fifth, unlike the HSA, the Restore FOIA bill allows local authorities
to apply their own sunshine laws. The Restore FOIA bill does not
preempt any state or local disclosure laws for information obtained
outside the Department of Homeland Security. Likewise, it does not
restrict the use of such information by state agencies.
Finally, the Restore FOIA bill does not restrict congressional use or
disclosure of voluntarily submitted critical infrastructure
information. The HSA language was unclear on this point, and even the
Congressional Research Service could not say for certain that members
of Congress or their staff would not be criminally liable. Homeland
Security Act of 2002: Critical Infrastructure Information Act, February
29, 2003, CRS Report for Congress, Order Code RL31762, at 14-15.
These changes to the HSA would accomplish the stated goals of the
critical infrastructure provisions in the HSA without tying the hands
of the government in its efforts to protect Americans and without
cutting the public out of the loop.
The Administration has flip-flopped on how to best approach the issue
of critical infrastructure information. The Administration's original
June 18, 2002, legislative proposal establishing a new department
carved out an FOIA exemption, in section 204, and required non-
disclosure of any "information" "voluntarily" provided to the new
Department of Homeland Security by "non-Federal entities or
individuals" pertaining to "infrastructure vulnerabilities or other
vulnerabilities to terrorism" in the possession of, or that passed
through, the new department. Critical terms, such as "voluntarily
provided," were undefined.
The Judiciary Committee had an opportunity to query Governor Ridge
about the Administration's proposal on June 26, 2002, when the
Administration reversed its long-standing position and allowed him to
testify in his capacity as the Director of the Transition Planning
Office.
Governor Ridge's testimony at that hearing is instructive. He seemed
to appreciate the concerns expressed by Members about the President's
June 18 proposal and to be willing to work with us in the legislative
process to find common ground. On the FOIA issue, he described
the Administration's goal to craft "a limited statutory exemption to
the Freedom of Information Act" to help "the Department's most
important missions [which] will be to protect our Nation's critical
infrastructure." (June 26, 2002 Hearing, Tr., p. 24). Governor Ridge
explained that to accomplish this, the Department must be able to
"collect information, identifying key assets and components of that
infrastructure, evaluate vulnerabilities, and match threat assessments
against those vulnerabilities." (Id., at p. 23).
I do not understand why some have insisted that FOIA and our national
security are inconsistent. Before the HSA was enacted, the FOIA already
exempted from disclosure matters that are classified; trade secret,
commercial and financial information, which is privileged and
confidential; various law enforcement records and information,
including confidential source and informant information; and FBI
records pertaining to foreign intelligence or counterintelligence, or
international terrorism. These already broad exemptions in the FOIA
were designed to protect national security and public safety and to
ensure that the private sector can provide needed information to the
government.
Prior to enactment of the HSA, the FOIA exempted from disclosure any
financial or commercial information provided voluntarily to the
government, if it was of a kind that the provider would not customarily
make available to the public. Critical Mass Energy Project v. NRC, 975
F.2d 871 (D.C. Cir. 1992) (en banc). Such information enjoyed even
stronger nondisclosure protections than did material that the
government requested. Applying this exception, Federal regulatory
agencies safeguarded the confidentiality of all kinds of critical
infrastructure information, like nuclear power plant safety reports
(Critical
[[Page S3633]]
Mass, 975 F.2d at 874), information about product manufacturing
processes and internal security measures (Bowen v. Food & Drug Admin.,
925 F.2d 1225 (9th Cir. 1991), design drawings of airplane parts
(United Technologies Corp. by Pratt & Whitney v. F.A.A., 102 F.3d 688
(2d Cir. 1996)), and technical data for video conferencing software
(Gilmore v. Dept. of Energy, 4 F. Supp.2d 912 (N.D. Cal. 1998)).
The head of the FBI National Infrastructure Protection Center, NIPC,
testified more than five years ago, in September, 1998, that the "FOIA
excuse" used by some in the private sector for failing to share
information with the government was, in essence, baseless. He explained
the broad application of FOIA exemptions to protect from disclosure
information received in the context of a criminal investigation or a
"national security intelligence" investigation, including information
submitted confidentially or even anonymously. [Sen. Judiciary
Subcommittee on Technology, Terrorism, and Government Information,
Hearing on Critical Infrastructure Protection: Toward a New Policy
Directive, S. HRG. 105-763, March 17 and June 10, 1998, at p. 107]
The FBI also used the confidential business record exemption under
(b)(4) "to protect sensitive corporate information, and has, on
specific occasions, entered into agreements indicating that it would do
so prospectively with reference to information yet to be received."
NIPC was developing policies "to grant owners of information certain
opportunities to assist in the protection of the information (e.g., by
`sanitizing the information themselves') and to be involved in
decisions regarding further dissemination by the NIPC." Id. In short,
the former Administration witness stated:
Sharing between the private sector and the government
occasionally is hampered by a perception in the private
sector that the government cannot adequately protect private
sector information from disclosure under the Freedom of
Information Act, FOIA. The NIPC believes that this perception
is flawed in that both investigative and infrastructure
protection information submitted to NIPC are protected from
FOIA disclosure under current law. (Id.)
Nevertheless, for more than five years, businesses continued to seek
a broad FOIA exemption that also came with special legal protections to
limit their civil and criminal liability. That business wish list was
largely granted in the Homeland Security Act.
At the Senate Judiciary Committee hearing with Governor Ridge, I
expressed my concern that an overly broad FOIA exemption would
encourage government complicity with private firms to keep secret
information about critical infrastructure vulnerabilities, reduce the
incentive to fix the problems and end up hurting rather than helping
our national security. In the end, more secrecy may undermine rather
than foster security.
Governor Ridge seemed to appreciate these risks, and said he was
"anxious to work with the Chairman and other members of the committee
to assure that the concerns that [had been] raised are properly
addressed." Id. at p. 24. He assured us that "[t]his Administration
is ready to work together with you in partnership to get the job done.
This is our priority, and I believe it is yours as well." Id. at p.
25. This turned out to be an empty promise.
Almost before the ink was dry on the Administration's earlier June
proposal, on July 10, 2002, the Administration proposed to substitute a
much broader FOIA exemption that would (1) exempt from disclosure under
the FOIA critical infrastructure information voluntarily submitted to
the new department that was designated as confidential by the submitter
unless the submitter gave prior written consent, (2) provide limited
civil immunity for use of the information in civil actions against the
company, with the likely result that regulatory actions would be
preceded by litigation by companies that submitted designated
information to the department over whether the regulatory action was
prompted by a confidential disclosure, (3) preempt state sunshine laws
if the designated information is shared with state or local government
agencies, (4) impose criminal penalties of up to one year imprisonment
on government employees who disclosed the designated information, and
(5) antitrust immunity for companies that joined together with agency
components designated by the President to promote critical
infrastructure security.
Despite the Administration's promulgation of two separate proposals
for a new FOIA exemption in as many weeks, in July, Director Ridge's
Office of Homeland Security released The National Strategy for Homeland
Security, which appeared to call for more study of the issue before
legislating. Specifically, this report called upon the Attorney General
to "convene a panel to propose any legal changes necessary to enable
sharing of essential homeland security information between the
government and the private sector." (P. 33)
The need for more study of the Administration's proposed new FOIA
exemption was made amply clear by its possible adverse environmental,
public health and safety affects. Keeping secret problems in a variety
of critical infrastructures would simply remove public pressure to fix
the problems. Moreover, several environmental groups pointed out that,
under the Administration's proposal, companies could avoid enforcement
action by "voluntarily" providing information about environmental
violations to the EPA, which would then be unable to use the
information to hold the company accountable and also would be required
to keep the information confidential. It would bar the government from
disclosing information about spills or other violations without the
written consent of the company that caused the pollution.
I worked on a bipartisan basis with many interested stakeholders from
environmental, civil liberties, human rights, business and government
watchdog groups to craft a compromise FOIA exemption that did not grant
the business sector's wish-list but did provide additional
nondisclosure protections for certain records without jeopardizing the
public health and safety. At the request of Chairman Lieberman for the
Judiciary Committee's views on the new department, I shared my concerns
about the Administration's proposed FOIA exemption and then worked with
Members of the Governmental Affairs Committee, in particular Senator
Levin and Senator Bennett, to craft a more narrow and responsible
exemption that accomplishes the Administration's goal of encouraging
private companies to share records of critical infrastructure
vulnerabilities with the new Department of Homeland Security without
providing incentives to "game" the system of enforcement of
environmental and other laws designed to protect our nation's public
health and safety. We refined the FOIA exemption in a manner that
satisfied the Administration's stated goal, while limiting the risks of
abuse by private companies or government agencies.
This compromise solution was supported by the Administration and
other Members of the Committee on Governmental Affairs and was
unanimously adopted by that Committee at the markup of the Homeland
Security Department bill on July 25, 2002. The compromise which I now
introduce as a free standing bill would exempt from the FOIA certain
records pertaining to critical infrastructure threats and
vulnerabilities that are furnished voluntarily to the new Department
and designated by the provider as confidential and not customarily made
available to the public. Notably, the compromise FOIA exemption made
clear that the exemption only covered "records" from the private
sector, not all "information" provided by the private sector and
thereby avoided the adverse result of government agency-created and
generated documents and databases being put off-limits to the FOIA
simply if private sector "information" is incorporated. Moreover, the
compromise FOIA exemption clearly defined what records may be
considered "furnished voluntarily," which did not cover records used
"to satisfy any legal requirement or obligation to obtain any grant,
permit, benefit (such as agency forbearance, loans, or reduction or
modifications of agency penalties or rulings), or other approval from
the Government." The FOIA compromise exemption further ensured that
portions of records that are not covered by the exemption would be
released pursuant to FOIA requests. This compromise did not provide any
civil liability or antitrust immunity that could be used to immunize
bad actors or frustrate regulatory enforcement action, nor did
[[Page S3634]]
the compromise preempt state or local sunshine laws.
Unfortunately, the version of the HSA that we enacted last November
jettisoned the bipartisan compromise on the FOIA exemption, worked out
in the Senate with the Administration's support, and replaced it with a
big-business wish-list gussied up in security garb. The HSA's FOIA
exemption makes off-limits to the FOIA much broader categories of
"information" and grants businesses the legal immunities and
liability protections they have sought so vigorously for over five
years. This law goes far beyond what is needed to achieve the laudable
goal of encouraging private sector companies to help protect our
critical infrastructure. Instead, it ties the hands of the federal
regulators and law enforcement agencies working to protect the public
from imminent threats. It gives a windfall to companies who fail to
follow federal health and safety standards. Most disappointingly, it
undermines the goals of openness in government that the FOIA was
designed to achieve. In short, the FOIA exemption in the HSA represents
the most severe weakening of the Freedom of Information Act in its 36-
year history.
In the end, the broad secrecy protections provided to critical
infrastructure information in this bill will promote more secrecy,
which may undermine rather than foster national security. In addition,
the immunity provisions in the bill will frustrate enforcement of the
laws that protect the public's health and safety.
Let me explain in greater detail. The FOIA exemption enacted in the
HSA allows companies to stamp or designate certain information as
critical infrastructure information, or "CII," and then submit this
information about their operations to the government either in writing
or orally, and thereby obtain a blanket shield from FOIA's disclosure
mandates as well as other protections. A Federal agency may not
disclose or use voluntarily-submitted and CII-marked information,
except for a limited "informational purpose," such as "analysis,
warning, interdependency study, recovery, reconstitution," without the
company's consent. Even when using the information to warn the public
about potential threats to critical infrastructure, the bill requires
agencies to take steps to protect from disclosure the source of the CII
information and other "business sensitive" information.
The law also contains an unprecedented provision that threatens jail
time and job loss to any government employee who happens to disclose
any critical infrastructure information that a company has submitted
and wants to keep secret. These penalties for using the CII information
in an unauthorized fashion or for failing to take steps to protect
disclosure of the source of the information are severe and will chill
any release of CII information--not just when a FOIA request comes in,
but in all situations, no matter the circumstance. Criminalizing
disclosures not of classified information or national security related
information, but of information that a company decides it does not want
public--is an effective way to quash discussion and debate over many
aspects of the government's work. In fact, under the HSA, CII
information is granted more comprehensive protection under Federal
criminal laws than classified information.
This provision of the law has potentially disastrous consequences. If
an agency is given information from an internet service provider, ISP,
about cyberattack vulnerabilities, agency employees will have to think
twice about sharing that information with other ISPs for fear that,
without the consent of the ISP to use the information, even a warning
might cost their jobs or risk criminal prosecution.
This provision means that if a Federal regulatory agency needs to
issue a regulation to protect the public from threats of harm, it
cannot rely on any voluntarily submitted information--bringing the
normal regulatory process to a grinding halt. Public health and law
enforcement officials need the flexibility to decide how and when to
warn or prepare the public in the safest, most effective manner. They
should not have to get "sign off" from a Fortune 500 company to do
so.
While the HSA risks making it harder for the government to protect
American families, it makes it much easier for companies to escape
responsibility when they violate the law by giving them unprecedented
immunity from civil and regulatory enforcement actions. Once a business
declares that information about its practices relates to critical
infrastructure and is "voluntarily" provided, it can then prevent the
Federal Government from disclosing it not just to the public, but also
to a court in a civil action. This means that an agency receiving CII-
marked submissions showing invasions of employee or customer privacy,
environmental pollution, or government contracting fraud will be unable
to use that information in a civil action to hold that company
accountable. Even if the regulatory agency obtains the information
necessary to bring an enforcement action from an alternative source,
the company will be able to tie the government up in protracted
litigation over the source of the information.
For example, if a company submits information that its factory is
leaching arsenic in ground water, that information may not be turned
over to local health authorities to use in any enforcement proceeding
nor turned over to neighbors who were harmed by drinking the water for
use in a civil tort action. Moreover, even if EPA tries to bring an
action to stop the company's wrongdoing, the "use immunity" provided
in the HSA will tie the agency up in litigation making it prove where
it got the information and whether it is tainted as "fruit of the
poisonous tree"--i.e., obtained from the company under the "critical
infrastructure program."
Similarly, if the new Department of Homeland Security receives
information from a bio-medical laboratory about its security
vulnerabilities, and anthrax is released from the lab three weeks
later, the Department will not be able to warn the public promptly
about how to protect itself without consulting with and trying to get
the consent of the laboratory in order to avoid the risk of job loss or
criminal prosecution for a non-consensual disclosure. Moreover, if the
laboratory is violating any state, local or federal regulation in its
handling of the anthrax, the Department will not be able to turn over
to another Federal agency, such as the EPA or the Department of Health
and Human Services, or to any State or local health officials,
information or documents relating to the laboratory's mishandling of
the anthrax for use in any enforcement proceedings against the
laboratory, or in any wrongful death action, should the laboratory's
mishandling of the anthrax result in the death of any person. The law
specifically states that such CII-marked information "shall not,
without the written consent of the person or entity submitting such
information, be used directly by such agency, any other Federal, State,
or local authority, or any third party, in any civil action arising
under Federal or State law if such information is submitted in good
faith." [H.R. 5710, section 214(a)(1)(C)]
Most businesses are good citizens and take seriously their
obligations to the government and the public, but this "disclose-and-
immunize" provision is subject to abuse by those businesses that want
to exploit legal technicalities to avoid regulatory guidelines. The HSA
lays out the perfect blueprint to avoid legal liability: funnel
damaging information into this voluntary disclosure system and pre-empt
the government or others harmed by the company's actions from being
able to use it against the company. This is not the kind of two-way
public-private cooperation that our country needs.
The scope of the information that is covered by the new HSA FOIA
exemption is overly broad and undermines the openness in government
that FOIA was intended to guarantee. Under this law, information about
virtually every important sector of our economy that today the public
has a right to see can be shut off from public view simply by labeling
it "critical infrastructure information." Prior to enactment of the
HSA, under FOIA standards, courts had required federal agencies to
disclose 1. pricing information in contract bids so citizens can make
sure the government is wisely spending their taxpayer dollars; 2.
compliance reports that allow constituents to insist that government
contractors comply with federal equal
[[Page S3635]]
opportunity mandates; and 3. banks' financial data so the public can
ensure that federal agencies properly approve bank mergers. Without
access to this kind of information, it will be harder for the public to
hold its government accountable. Under the HSA, all of this information
may be marked CII information and kept out of public view.
The HSA FOIA exemption goes so far in exempting such a large amount
of material from FOIA's disclosure requirements that it undermines
government openness without making any real gains in safety for
families in Vermont and across America. We do not keep America safer by
chilling Federal officials from warning the public about threats to
their health and safety. We do not ensure our nation's security by
refusing to tell the American people whether or not their federal
agencies are doing their jobs or their government is spending their
hard earned tax dollars wisely. We do not encourage real two-way
cooperation by giving companies protection from civil liability when
they break the law. We do not respect the spirit of our democracy when
we cloak in secrecy the workings of our government from the public we
are elected to serve.
The argument over the scope of the FOIA and unilateral executive
power to shield matters from public scrutiny goes to the heart of our
fundamental right to be an educated electorate aware of what our
government is doing. The Rutland Herald got it right in a November 26,
2002 editorial that explained: "The battle was not over the right of
the government to hold sensitive, classified information secret. The
government has that right. Rather, the battle was over whether the
government would be required to release anything it sought to
withhold."
We need to fix this troubling restriction on public accountability.
Exempting the new Department from laws that ensure responsibility to
the Congress and to the American people makes for a tenuous start not
the sure footing we all want for the success and endurance of this new
Department. I urge my colleagues to support the Restoration of Freedom
of Information Act of 2003.
I ask unanimous consent to print the editorials I mentioned and
several letters of support of the Restore FOIA bill in the Record.
There being no objection, the additional material was ordered to be
printed in the Record, as follows:
Restoration of Freedom of Information Act ("Restore FOIA") Sectional
Analysis
Sec. 1. Short title. This section gives the bill the short
title, the "Restoration of Freedom of Information Act".
Sec. 2. Protection of Voluntarily Furnished Confidential
Information. This section strikes subtitle B (secs. 211-215)
of the Homeland Security Act ("HSA") (P.L. 107-296) and
inserts a new section 211.
Sections to be repealed from the HSA: These sections
contain an exemption to the Freedom of Information Act (FOIA)
that (1) exempt from disclosure critical infrastructure
information voluntarily submitted to the new department that
was designated as confidential by the submitter unless the
submitter gave prior written consent; (2) provide civil
immunity for use of such information in civil actions against
the company; (3) preempt state sunshine laws if the
designated information is shared with state or local
government agencies; and (4) impose criminal penalties of up
to one year imprisonment on government employees who
disclosed the designated information.
Provisions that would replace the repealed sections of the
HAS: The Restore FOIA bill inserts a new section 211 to the
HSA that would exempt from the FOIA certain records
pertaining to critical infrastructure threats and
vulnerabilities that are furnished voluntarily to the new
Department and designated by the provider as confidential and
not customarily made available to the public. Notably, the
Restore FOIA bill makes clear that the exemption covers
"records" from the private sector, not all "information"
provided by the private sector, as in the enacted version of
the HSA. The Restore FOIA bill ensures that portions of
records that are not covered by the exemption would be
released pursuant to FOIA requests. It does not provide any
civil liability immunity or preempt state or local sunshine
laws, and it does not criminalize whistleblower activity.
Specifically, this section of the Restore FOIA bill
includes the following:
A definition of "critical infrastructure": This term is
given the meaning adopted in section 1016(e) the USA Patriot
Act (42 U.S.C. 5195c(e)) which reads, "critical
infrastructure means systems and assets, whether physical or
virtual, so vital to United States that the incapacity or
destruction of such systems and assets would have a
debilitating impact on security, national economic security,
national public health or safety, or any combination of those
matters." This definition is commonly understood to mean
facilities such as bridges, dams, ports, nuclear power
plants, or chemical plants.
A definition of the term "furnished voluntarily": This
term signifies documents provided to the Department of
Homeland Security (DHS) that are not formally required by the
department and that are provided to it to satisfy any legal
requirement. The definition excludes any document that is
provided to DHS with a permit or grant application or to
obtain any other benefit from DHS, such as a loan, agency
forbearance, or modification of a penalty.
An exemption from FOIA of records that pertain to
vulnerabilities of and threats to critical infrastructure
that are furnished voluntarily to DHS. This exemption is made
available where the provider of the record certifies that the
information is confidential and would not customarily be
released to the public.
A requirement that other government agencies that have
obtained such records from DHS withhold disclosure of the
records and refer any FOIA requests to DHS for processing.
A requirement that reasonably segregable portions of
requested documents be disclosed, as is well-established
under FOIA.
An allowance to agencies that obtain critical
infrastructure records from a source other than DHS to
release requested records consistent with FOIA, regardless of
whether DHS has an identical record in its possession.
An allowance to providers of critical infrastructure
records to withdraw the confidentiality designation of
records voluntarily submitted to DHS, thereby making the
records subject to disclosure under FOIA.
A direction to the Secretary of Homeland Security to
establish procedures to receive, designate, store, and
protect the confidentiality of records voluntarily submitted
and certified as critical infrastructure records.
A clarification that the bill would not preempt state or
local information disclosure laws.
A requirement for the Comptroller General to report to the
House and Senate Judiciary Committees, the House Governmental
Reform Committee and the Senate Governmental Affairs
Committee the number of private entities and government
agencies that submit records to DHS under the terms of the
bill. The report would also include the number of requests
for access to records that were granted or denied. Finally,
the Comptroller General would make recommendations to the
committees for modifications or improvements to the
collection and analysis of critical infrastructure
information.
Sec. 3. Technical and conforming amendment. This section
amends the table of contents of the Homeland Security Act.
____
[From the Washington Post, Feb. 10, 2003]
Fix This Loophole
The Homeland Security law enacted last year contains a
miserable provision that weakens important federal regulation
and public access to information. Congress should act soon to
repair the damage.
The goal of the provision was reasonable enough:
encouraging companies to share information with the
government about infrastructure that might be vulnerable to
terrorist attack. Fearing public disclosure, companies have
been reluctant to share information on vulnerabilities at,
say, power plants or chemical factories. So under the law,
any such "critical infrastructure" information that
companies voluntarily provide to the government is exempted
from disclosure to the public, litigants and enforcement
agencies.
But the law defines "information" so broadly that it will
cover, and thus keep secret, virtually anything a company
decides to fork over. A company might preempt environmental
regulators by "voluntarily" divulging incriminating
material, thereby making it unavailable to anyone else.
Unless regulators could show they had obtained the material
independently, it would be off limits to them. And the law
prescribes criminal penalties for whistle-blowers who make
such information public. The collective impact will be to put
in the hands of a regulated party the power, simply by
turning over information, to shield that information from
legitimate law enforcement purposes and from public
disclosure.
Sens. Patrick J. Leahy (D-Vt.) and Robert F. Bennett (R-
Utah) had negotiated a compromise that would accomplish the
reasonable purpose without such broad harmful effects. It
should be restored before the government finds its hands
tied--and the public finds itself out of the loop--on
important regulatory matters.
____
[From the Washington Post, Nov. 20, 2002]
Too Many Secrets
(By Mark Tapscott)
Why does the White House sometimes seem so determined to
close the door on the people's right to know what their
government is doing? Even some of us who admire the
leadership of President Bush in the war on terrorism would
like to know.
Admittedly, insisting that the public's business be done in
public isn't a popular cause these days. Recent surveys show
that many Americans are willing to trade significant chunks
of their First Amendment rights for the promise of greater
security in the war on terrorism. Such surveys must gladden
the hearts of Bush administration
[[Page S3636]]
officials who--presumably unintentionally--undermine measures
such as the Freedom of Information Act (FOIA).
Consider just three examples from the past year: Section
204 of the White House's original proposal to establish a
Department of Homeland Security, White House Chief of Staff
Andrew Card's March 2002 directive that agencies restrict
access to "sensitive but unclassified" information, and the
administration's claim of executive privilege to keep secret
information regarding President Clinton's infamous midnight
pardons.
The administration's Section 204 proposal exempted from
FOIA disclosure any information "provided voluntarily by
non-federal entities or individuals that relates to
infrastructure vulnerabilities or other vulnerabilities to
terrorism." One need not be a Harvard law graduate to see
that, without clarification of what constitutes such
vulnerabilities, this loophole could be manipulated by clever
corporate and government operators to hide endless varieties
of potentially embarrassing and/or criminal information from
public view.
Subsequent negotiations in the Senate with the White House
resulted in compromise language that takes care of some of
the major problems, but in the rush to final passage, the
Senate has accepted the House version of the legislation,
which, being virtually identical to the administration's
original version, remains deeply flawed in this regard.
The Card memo was issued when public anger over the Sept.
11, 2001, massacre was still intense. Despite the fact that
the memo failed to define what constitutes "sensitive but
unclassified" information, agencies responded by removing
thousands of previously public documents from FOIA
disclosure. The Pentagon, for example, estimated recently
that approximately 6,000 Defense Department documents were
removed from public view. Who now outside of government can
verify that any of those documents contained information that
could help terrorists?
Few would argue that the Section 204 proposal and the Card
memo do not address legitimate national security needs in the
war against terrorism. But to date, nobody has produced a
single example of vital information that could not have been
properly exempted from disclosure under the current FOIA,
which is backed by 25 years of detailed case law. Instead,
the administration offers vague language that invites abuse.
Finally, there are those pardons, which provoked a national
outcry when first reported. President Clinton had pardoned
140 people, including his Whitewater partner Susan McDougal,
his brother Roger (convicted on cocaine-related charges) and
international fugitive Marc Rich, wanted by the Justice
Department for allegedly conspiring with the Iranian
government in 1980 to buy 6 million barrels of oil, contrary
to a U.S. trade embargo.
It is doubtful that the full facts behind the pardons will
ever be known as long as the administration refuses to
disclose nearly 4,000 pages related to the former president's
actions. The Bush administration has taken a similar position
on documents related to former attorney general Janet Reno's
controversial decision not to appoint a special counsel to
investigate possible Clinton administration campaign finance
illegalities.
There was a time when at least one senior Bush
administration official thought the FOIA essential because
"no matter what party has held the political power of
government, there have been attempts to cover up mistakes and
errors." That same official added that "disclosure of
government information is particularly important today
because government is becoming involved in more and more
aspects of every citizen's personal and business life, and so
access to information about how government is exercising its
trust becomes increasingly important."
So spoke a young Illinois Republican congressman named
Donald Rumsfeld, in a floor speech on June 20, 1966,
advocating passage of the FOIA, of which he was a co-sponsor.
The writer is director of the Heritage Foundation's Center
for Media and Public Policy.
____
Fix the Critical Infrastructure Information Subtitle in the Homeland
Security Act of 2002
The undersigned organizations are concerned about the
current language for Critical Infrastructure Information in
the Homeland Security Act of 2002, which contains ambiguous
definitions that could unintentionally allow companies to
keep broad categories of information secret and provisions
that restrict the government's ability to use the
information. In order to better serve the goal of improving
public safety and security, we support efforts to fix the
Homeland Security Act by clarifying the scope of the
information protected and removing provisions that overly
restrict the government's ability to use the information.
Senators Leahy (D-VT), Levin (D-MI), Jeffords (I-VT),
Lieberman (D-CT), and Byrd (D-WV) will soon introduce
legislation entitled the Restoration of Freedom of
Information Act of 2003 ("Restore FOIA") addressing these
concerns, using bipartisan language developed last year by
the Senate Governmental Affairs Committee. The Restore FOIA
solution would:
Clarify the FOIA exemption to be more consistent with
established law.
Remove the restrictions on the government's ability to act
as it sees fit in response to the information it receives.
Preserve whistleblower protections by removing unnecessary
criminal penalties.
The information provisions currently within the Homeland
Security Act of 2002 do not accomplish the goal of the law--
empowering the government to protect citizens using private-
sector information which is "voluntarily" shared and
identifies potential vulnerabilities to terrorist attacks.
The current language could have devastating effects on the
work of the government to protect public health, safety and
security, as well as government accountability. It is
essential that these problems in the Homeland Security Act be
fixed immediately before they become too firmly entrenched in
the law.
Jean AbiNader, Managing Director, Arab American Institute.
Prudence S. Adler, Associate Executive Director,
Association of Research Libraries.
Steven Aftergood, Project Director, Federation of American
Scientists.
Gary Bass, Executive Director, OMB Watch.
Jeremiah Baumann, Director, Toxics Right to Know Campaign,
U.S. Public Interest Research Group.
Ruth Berlin, Executive Director, MD Pesticide Network.
Lynne Bradley, Director, Government Relations, American
Library Association.
Danielle Brian, Executive Director, Project on Government
Oversight.
Sandy Buchanan, Executive Director, Ohio Citizen Action.
Jeanne Butterfield, Executive Director, American
Immigration Lawyers Association.
Alyssondra Campaigne, Legislative Director, Natural
Resources Defense Council.
Kevin S. Curtis, Vice President, Government Affairs,
National Environmental Trust.
Lucy Dalglish, Executive Director, Reporters Committee for
Freedom of the Press.
Charles N. Davis, Executive Director, Freedom of
Information Center, University of Missouri School of
Journalism.
Tom Devine, Legal Director, Government Accountability
Project.
Rick Engler, Director, New Jersey Work Environment Council.
Jason Erb, Director, Governmental Relations, Council on
American-Islamic Relations.
Darryl Fagin, Legislative Director, Americans for
Democratic Action.
Margaret Fung, Executive Director, Asian American Legal
Defense and Education Fund.
Vickie Goodwin, Organizer, Powder River Basin Resource
Council.
Evan Hendricks, Editor/Publisher, Privacy Times.
Rick Hind, Legislative Director, Greenpeace.
Khalil Jahshan, Director of Government Affairs, American-
Arab Anti-Discrimination Committee.
Susan E. Kegley, Staff Scientist/Program Coordinator,
Pesticide Action Network, North America.
Robert Leger, President, Society of Professional
Journalists.
Dave LeGrande, Director, Occupational Safety & Health, CWA/
AFL-CIO.
Sanford Lewis, Director, Strategic Counsel on Corporate
Accountability.
Conrad Martin, Executive Director, Fund for Constitutional
Government.
Alexandra McPherson, Director, Clean Production Action.
Dena Mottola, Acting Director, New Jersey Public Interest
Research Group.
Laura W. Murphy, Director, Washington National Office,
American Civil Liberties Union.
Ralph G. Neas, President, People for the American Way.
Robert Oakley, Washington Affairs Representative, American
Association of Law Libraries.
Paul Orum, Director, Working Group on Community Right-to-
Know.
Deborah Pierce, Executive Director, Privacy Activism.
Chellie Pingree, President and CEO, Common Cause.
Ari Schwartz, Associate Director, Center for Democracy and
Technology.
Debbie Sease, Legislative Director, Sierra Club.
Bob Shavelson, Executive Director, Cook Inlet Keeper.
Peggy M. Shepard, Executive Director, West Harlem
Environmental Action.
Ted Smith, Executive Director, Silicon Valley Toxics
Coalition.
David Sobel, General Counsel, Electronic Privacy
Information Center.
Ed Spar, Executive Director, Council on Professional
Association of Federal Statistics.
Vivian Stockman, Communications Coordinator, Ohio Valley
Environmental Coalition.
Daniel Swartz, Executive Director, Children's Environmental
Health Network.
Lee Tien, Senior Staff Attorney, Electronic Frontier
Foundation.
Elizabeth Thompson, Legislative Director, Environmental
Defense.
Sara Zdeb, Legislative Director, Friends of the Earth.
[[Page S3637]]
____
March 12, 2003.
Hon. Susan Collins,
Chair, Senate Committee on Governmental Affairs, U.S. Senate,
Dirksen Senate Office Building, Washington, DC.
Hon. Orrin Hatch,
Chair, Senate Committee on the Judiciary, U.S. Senate,
Dirksen Senate Office Building, Washington, DC.
Hon. Joseph Lieberman,
Ranking Member, Senate Committee on Governmental Affairs,
U.S. Senate, Hart Senate Office Building, Washington, DC.
Hon. Patrick Leahy,
Ranking Member, Senate Committee on the Judiciary, U.S.
Senate, Dirksen Senate Office Building, Washington, DC.
Dear Senators Collins, Hatch, Lieberman, and Leahy: The
Homeland Security Act of 2002 was a very important
legislative accomplishment that responded to new challenges
facing our country.
On the path to passage of the Act, however, certain
sections, particularly Section 214, dealing with Critical
Infrastructure Information, left a number of journalistic
organizations concerned that broad categories of
information--particularly information that relates to the
public's health and safety--would unnecessarily be shielded
from public view.
Thus, we support efforts to clarify the language in favor
of essential openness, which, in fact, will also resolve
potential barriers that restrict the government's own use of
information provided by companies. The "Restoration of
Freedom of Information Act of 2003" would substitute
bipartisan language developed last year by the Senate
Government Affair Committee for that which was enacted into
law. This bill would:
Clarify the FOIA exemption to be more consistent with
established law, while still protecting records on critical
infrastructure vulnerabilities submitted to the Department of
Homeland Security by private firms.
Remove the restrictions on the government's ability to act
as it sees fit in response to the information it receives.
Preserve whistleblower protections by removing unnecessary
criminal penalties.
It is important for both citizens and the government
process that these changes in law are made quickly.
Thank you for your consideration.
Sincerely,
American Society of Magazine Editors; American Society of
Newspaper Editors; Associated Press Managing Editors;
Freedom of Information Center, University of Missouri
School of Journalism; Magazine Publishers of America;
National Federation of Press Women; National Newspaper
Association; National Press Club; Newsletter &
Electronic Publishers Association; Newspaper
Association of America; Radio-Television News Directors
Association; Reporters Committee for Freedom of the
Press; Society of Professional Journalists.
____
Let Freedom Ring
(By Maurice J. Freedman)
What if you want to find out if toxic chemicals are buried
under your child's schoolyard? How could you tell if your
veterans' benefits hinged on proving you were exposed to
biohazards during a top-secret mission? Or perhaps a
candidate for your city council wants to better understand
formerly classified plans for emergency evacuation.
These days, it's possible, with considerable patience,
determination, and a few clicks of a mouse, to file a request
for answers to questions like these and a broad range of
government information that are critical to our lives, work,
health and well being.
But like registering to vote, in some places and for some
people, this precious freedom hasn't always been so easy to
exercise.
The main tool for such fact-finding, the Freedom of
Information Act, known as FOIA, which we honor each year on
the anniversary of James Madison's birthday, was first
enacted on July 4, 1966. Before that, any-one who wanted to
get records from the federal government had to establish his
or her legal right to examine those records. That was
expensive, time-consuming and a barrier for countless
legitimate requests for information on issues from whether
the nuclear reactor downwind had a record of safety
violations to how the Nixon administration tried to deport
John Lennon as detailed in his FBI files.
With FOIA, the burden shifted to government agencies,
requiring them to meet these requests unless they fell within
a handful of specific national security exemptions. Indeed,
since then, any decision by an agency to withhold a document
could be challenged in federal court.
From John Lennon's or Rev. Dr. Martin Luther King Jr.'s FBI
files to record of debates on whether to use nuclear weapons
in Vietnam, FOIA requests now run the gamut of what we need
to know about what our government is doing with our tax
dollars in our name. Whether it's internal NASA memos about
space shuttle safety or exchanges among federal officials
about Japanese internment camps during World War II, our
right to know about the deliberations and actions of our
federal government is a cornerstone of American democracy.
In 1974, in reaction to Watergate, Congress moved to
strengthen FOIA. Unwilling to let our country be run more
like a closed corporation than an open, democratic society,
this change allowed courts to order the release of documents,
even when the President said they couldn't be made public.
Our system of representative democracy depends on the free
flow of information produced, collected and published by our
government and available to the public so we can participate
as an informed electorate.
Since the early 19th century, libraries have served as
depositories for the written record of our nation's
development and gateways to the decisions of its leaders,
thus assuring public access to government information. Today,
21st-century librarians are committed to ensuring the
public's right to know is protected in the electronic age. As
organizers, navigators and providers of government
information that serves the public, we help file FOIA
requests and otherwise support freedom of information @ your
library.
Many Americans depend on access to information collected,
organized and disseminated by the federal government--from
farmers and health care professionals, to journalists and
veterans, community interest groups to local and state
government officials, and indeed, all voters.
Americans come to libraries to find Census and other
statistics; to help plan new business and marketing
strategies; to research environmental issues and hazards,
laws and regulations; and to learn about job opportunities
from government and other employment lists.
The ongoing transition to predominantly electronic
transmission of federal information offers both promise and
problems for the public in this realm. Information that is
only in electronic form quickly appears on--and as quickly
disappears from--Web sites. There is often no one charged
with capturing, preserving or making electronic data
available to future generations, as well as those, who for a
variety of reasons, cannot access or work with electronic
information.
True national security is built on a vibrant democracy and
a well-informed citizenry, not a culture of secrecy. Said
James Madison, on whose birthday we make Freedom of
Information Day, "Knowledge will forever govern ignorance,
and a people who mean to be their own governors must arm
themselves with the power which knowledge gives." Although
he wrote in response to abuses by Britain's King George III,
his warnings ring equally true today.
Every country has hospitals, police and schools. But only
free countries allow the free flow of ideas. Free libraries
are the hub of public access to government information.
Challenges to an informed citizenry range from the complexity
and inequality in information technology to illiteracy,
limited information literacy skills and unequal access to
education and information resources.
Thankful for our freedoms, we must do our best as we
prepare to fight halfway around the world to ensure that we
continue to guard with unrelating vigilance the right to know
here at home.
Mr. LEVIN. Mr. President, today I join with Senators Leahy, Byrd,
Jeffords, and Lieberman to introduce the Restore Freedom of Information
Act, Restore FOIA, that will provide the public with access to
information, while at the same time ensuring that information
voluntarily submitted to the government by companies is not improperly
disclosed. In order to ensure public access and limit improper
disclosure, we need to reexamine some aspects of the Homeland Security
Act, HSA, which was rushed through Congress last year, dropping several
carefully-crafted, bipartisan measures which had been adopted by the
Senate Governmental Affairs Committee, along the way. Dropping those
measures left ambiguities in the law that need to be clarified, and
today's bill is an attempt to make those clarifications and address
certain problems that could otherwise result.
The issue this bill addresses is public access to information in the
possession of the Homeland Security Department. Although some seem to
want to shroud all homeland security efforts in secrecy, as Judge Damon
Keith, writing for the U.S. Sixth Circuit of Appeals, recently warned
"Democracies die behind closed doors." The principles of open
government and the public's right to know are cornerstones of our
democracy. We cannot sacrifice those principles in the name of
protecting them.
One of the reasons that I voted against the Homeland Security Act
last year was because the final bill dropped a bipartisan provision,
passed by the Senate Governmental Affairs Committee, clarifying how the
new Department of Homeland Security, DHS, should comply with the
Freedom of Information Act, FOIA. The final bill substituted a poorly
drafted provision that could inappropriately close the door on persons
seeking unclassified information from the Department related to
critical infrastructure.
What is critical infrastructure? Critical infrastructure is the
backbone that holds our country together and
[[Page S3638]]
makes it work--our roads, computer grids, telephones, pipelines, water
treatment plants, utilities, and other facilities essential to a fully
functioning Nation. It so happens that, in the United States, much of
our critical infrastructure is controlled by private entities, often
privately owned or publicly traded corporations. To strengthen existing
protections for these facilities, the Federal Government asked the
companies that own them to submit unclassified information about their
facilities to assist the government in evaluating them, identifying
possible problems, and designing stronger protections from terrorist
attack, natural disasters, or other threats to homeland security.
Some companies asked to voluntarily submit this information feared
that it might be improperly disclosed, and sought a new exemption from
the Federal Freedom of Information Act, FOIA, to prohibit disclosure of
so-called "critical infrastructure information." Reporters, public
interest groups, and others feared that, if this FOIA exemption were
granted, companies could send important environmental and safety
information to DHS under the general heading of "critical
infrastructure information" and thereby put this information out of
the public's reach. To bring these sides together, last July, Senators
Bennett, Leahy and I worked out a bipartisan FOIA compromise that
codified existing case law with regard to companies voluntarily
submitting information. At the Senate Governmental Affairs Committee
mark-up of the homeland security legislation, Senator Bennett said that
the Administration supported our compromise, but the language was
ultimately dropped from the final Homeland Security Act. As a result,
the media, public interest groups, and others continue to fear that
companies may be hiding important health and safety information that
has long been public and should be public behind the mask of "critical
infrastructure."
To rectify this situation, today we are introducing a bill that would
change the existing HSA language in several important ways. First, our
bill defines the key term, "critical infrastructure," in a more
focused way than the overly broad language in the HSA. To do that, our
bill draws from language in existing case law, that has already been
tested by the courts. The existing HSA language, it interpreted
broadly, could expand the prohibition on disclosing critical
infrastructure information to include virtually every aspect of a
company's operations, denying public access to a great deal of health
and safety information that the public has a right to know. If this
expansive interpretation was not the intent of the bill's drafters,
then they should be willing to accept our court-tested language.
A second important change that our bill would make in the existing
HSA involves the issue of civil immunity for companies that violate the
law. As currently worded, the HSA seems to suggest that companies
which voluntarily submit to DHS critical infrastructure information
indicating that the company is in violation of public health or safety
regulations may gain protection from legal action in court to halt or
penalize this wrongdoing, even if the information shows that the
company is acting negligently. For example, the current HSA provisions
could lead to the disturbing situation where DHS learns, through a
critical infrastructure submission, that a company is leaking polluted
sludge into a nearby waterway in violation of environmental
restrictions, but is barred from going to court to stop the pollution
because the law appears to prohibit the agency's use of the critical
infrastructure information in a civil action. Our bill would eliminate
the possibility that the HSA would provide companies with civil
immunity under these circumstances.
A third key problem with the existing HSA language is that it
includes a provision that could send a Federal whistleblower who
discloses critical infrastructure information, even to an appropriate
authority, to prison. The language is clear that if a DHS employee
discloses unclassified critical infrastructure information, even when
acting as a whistleblower who reveals the information to Congress in an
act of conscience or patriotism, that whistleblower could wind up in
jail. My colleague, Senator Leahy, describes a whistleblower who works
at the FAA who blew the whistle on government collusion to coverup
failures by airlines to meet tests on airline preparedness. That
whistleblower could have ended up in jail had he blown the whistle
under today's law. A year in jail is quite a deterrent for a Federal
employee who is thinking about blowing the whistle, and we have never
before threatened Federal whistleblowers with jail terms. It is a bad
idea, and it is counterproductive to homeland safety.
There are other troubling provisions in the current HSA law as well,
equally detrimental to the public's right to know. For example, the HSA
exempts all communication of critical infrastructure information from
the open meeting and other sunshine requirements of the Federal
Advisory Committee Act, and places critical infrastructure information
outside restrictions on ex parte contacts. The HSA also pre-empts state
and local sunshine laws, an undue intrusion on the power of the States.
The bill we are introducing today would strike all of these unnecessary
provisions, and create in their stead a narrow FOIA exemption that
balances the prohibition against improper disclosures of critical
infrastructure information with the public's right to know.
Finally, I would like to include in the Record two examples of
situations that could occur under the language in the HSA but would not
occur under our bill. These disturbing examples were provided by Dr.
Rena Steinzor, Professor at the University of Maryland School of Law,
on behalf of the center for Progressive Regulation.
Case Study Number 1 is the following:
A large Midwest utility decides to replace an old coal burning
electric generation unit with a new one. The new unit, much larger than
the first, will produce significantly greater air pollution emissions.
The company could mitigate these increases by installing additional
pollution control equipment, but decides it does not wish to incur the
expense. It begins construction and simultaneously reports its plans to
the DHS as "critical infrastructure information," so Federal security
experts will know about its increased capacity to generate electricity.
A Department of Homeland Security employee, visiting the plant to
consult on government purchases of power during emergency situations,
notices readings on internal gauges reflecting the dramatically
increased emissions. She telephones EPA to report the situation. EPA
issues a Notice of Violation to the company, and threatens to bring an
action for civil penalties, but is instructed to desist by DHS
officials who inform EPA that the HSA prohibits disclosing the
information provided to the agency in court and that DHS wants to list
the company as an emergency supplier capable of providing expanded
electricity production in an upcoming report to Congress. EPA drops its
enforcement action, and the DHS employee not only loses her job but
also is prosecuted criminally.
Case Study Number 2 is the following:
Lobbyists representing companies that provide goods and services to
the Department of Homeland Security routinely submit materials
describing their companies' products in glowing terms. They arrange
repeated trips for government purchasing agents to exotic locations
under the guise of briefing them regarding the technical aspects of the
products. All of this information is designated as critical
infrastructure by the companies, and is therefore protected from
disclosure and oversight by the media or possibly even individual
members of Congress who could see the information but not reveal it.
The Homeland Security Act was never intended to protect polluters or
special interests from public scrutiny. But as these examples
demonstrate, that is exactly what could happen if the current, vague
language in the law is not corrected. The bill we are introducing today
would make the needed corrections.
On January 17, 2003 at his confirmation hearing before the
Governmental Affairs Committee, I questioned Governor Ridge about these
problems with the current wording of the Homeland
[[Page S3639]]
Security Act. I asked him whether the HSA could have the unintended
consequences of providing protections for wrongdoing while impeding
access to necessary information to protect public health and safety.
Governor Ridge replied: "[T]hat certainly wasn't the intent, I am
sure, of those who advocated the Freedom of Information Act exemption,
to give wrongdoers protection or to protect illegal activity, and I
will certainly work with you to clarify that language." If that was
not the intent, then let us fix the vague, and potentially dangerous
provisions that are in this bill.
I would also note, for the record, that many organizations have
endorsed our bill including the following:
American Association of Law Libraries, American Civil Liberties
Union, American Immigration Lawyers Association, American Library
Association, American-Arab Anti-Discrimination Committee, Americans for
Democratic Action, American Society of Magazine Editors, American
Society of Newspaper Editors, Arab American Institute, Asian American
Legal Defense and Education Fund, Associated Press Managing Editors,
Association of Research Libraries, Center for Democracy and Technology,
Children's Environmental Health Network, Clean Production Network,
Common Cause, Communications Workers of America, Cook Inlet Keeper,
Council on American-Islamic Relations, Council on Professional
Association of Federal Statistics, Electronic Frontier Foundation,
Electronic Privacy Information Center, Environmental Defense,
Federation of American Scientists, Freedom of Information Center,
Friends of the Earth, Fund for Constitutional Government, Government
Accountability Project, Greenpeace, Magazine Publishers of America,
Maryland Pesticide Network, National Federation of Press Women,
National Newspaper Association, National Press Club, Natural Resources
Defense Council, New Jersey Work Environment Council, Newsletter &
Electronic Publishers Association, Newspaper Association of America,
Ohio Valley Environmental Coalition, OMB Watch, Pesticide Action
Network, North America Powder River Basin Resource Council, Privacy
Activism, Privacy Times, Project on Government Oversight, Radio-
Television News Directors Association, Reporters Committee for Freedom
of the Press, Sierra Club, Silicon Valley Toxics Coalition, Society of
Professional Journalists, Strategic Counsel on Corporate
Accountability, U.S. Public Interest Research Group, University of
Missouri School of Journalism, West Harlem Environmental Action Working
Group on Community Right-to-Know.
____________________