Congressional Record: March 12, 2003 (Senate)
Page S3622-S3639

 
          STATEMENTS ON INTRODUCED BILLS AND JOINT RESOLUTIONS
				  
				  
      By Mr. LEAHY (for himself, Mr. Levin, Mr. Lieberman, Mr. 
        Jeffords, and Mr. Byrd):
  S. 609. A bill to amend the Homeland Security Act of 2002 (Public Law 
107-296) to provide for the protection of voluntarily furnished 
confidential information, and for other purposes; to the Committee on 
the Judiciary.
  Mr. LEAHY. Mr. President, last year when I voted to support passage 
of the Homeland Security Act, HSA, I voiced concerns about several 
flaws in the legislation. I called for the Administration and my 
colleagues on both sides of the aisle to monitor implementation of the 
new law and to craft corrective legislation in the 108th Congress. One 
of my chief concerns with the HSA was a subtitle of the act that 
granted an extraordinarily broad exemption to the Freedom of 
Information Act, FOIA, in exchange for the cooperation of private 
companies in sharing information with the government regarding 
vulnerabilities in the nation's critical infrastructure.
  Unfortunately, the law that was enacted undermines Federal and State 
sunshine laws permitting the American people to know what their 
government is doing. Rather than increasing security by encouraging 
private sector disclosure to the government, it guts FOIA at the 
expense of our national security and public health and safety.
  On March 16, we mark Freedom of Information Day, which falls on the 
anniversary of James Madison's birthday. Madison said, "A popular 
government, without popular information, or the means of acquiring it, 
is but a prologue to a farce or tragedy or perhaps both." As a long-
time supporter of open government, I believe we must heed Madison's 
warning and revisit the potentially damaging limitations placed on 
access to information by the HSA.
  I rise today to introduce legislation with my distinguished 
colleagues Senator Levin, Senator Jeffords, Senator Lieberman, and 
Senator Byrd to restore the integrity of FOIA. I want to thank my 
colleagues for working with me on this important issue of public 
oversight. This bill protects Americans' "right to know" while 
simultaneously providing security to those in the private sector who 
voluntarily submit critical infrastructure records to the newly created 
Department of Homeland Security, DHS.
  Encouraging cooperation between the private sector and the government 
to keep our critical infrastructure systems safe from terrorist attacks 
is a goal we all support. But the appropriate way to meet this goal is 
a source of great debate--a debate that has been all but ignored since 
the enactment of the HSA last year.
  The HSA created a new FOIA exemption for "critical infrastructure 
information." That broadly defined term applies to information 
regarding a variety of facilities--such as privately operated power 
plants, bridges, dams, ports, or chemical plants--that might be 
targeted for a terrorist attack. In HSA negotiations last fall, House 
Republicans and the administration promoted language that they 
described as

[[Page S3632]]

necessary to encourage owners of such facilities to identify 
vulnerabilities in their operations and share that information with the 
Department of Homeland Security, DHS. The stated goal was to ensure 
that steps could be taken to ensure the facilities' protection and 
proper functioning.
  In fact, such descriptions of the legislation were disingenuous. 
These provisions, which were eventually enacted in the HSA, shield from 
FOIA almost any voluntarily submitted document stamped by the facility 
owner as "critical infrastructure." This is true no matter how 
tangential the content of that document may be to the actual security 
of a facility. The law effectively allows companies to hide information 
about public health and safety from American citizens simply by 
submitting it to DHS. The enacted provisions were called "deeply 
flawed" by Mark Tapscott of the Heritage Foundation in a November 20, 
2002 Washington Post op-ed. "Too Many Secrets," Washington Post, 
November 20, 2002, at A25. He argued that the "loophole" created by 
the law "could be manipulated by clever corporate and government 
operators to hide endless varieties of potentially embarrassing and/or 
criminal information from public view."
  In addition, under the HSA, disclosure by private facilities to DHS 
neither obligates the private company to address the vulnerability, nor 
requires DHS to fix the problem. For example, in the case of a chemical 
spill, the law bars the government from disclosing information without 
the written consent of the company that caused the pollution. As the 
Washington Post editorialized on February 10, 2003, "A company might 
preempt environmental regulators by `voluntarily' divulging 
incriminating material, thereby making it unavailable to anyone else." 
"Fix This Loophole," Washington Post, February 10, 2003, at A20.
  The new law also 1. shields the companies from lawsuits to compel 
disclosure, 2. criminalizes otherwise legitimate whistleblower activity 
by DHS employees, and 3. preempts any state or local disclosure laws.
  The Restore FOIA bill I introduce today with Senators Levin, 
Jeffords, Lieberman, and Byrd is identical to language I negotiated 
with Senators Levin and Bennett last summer when the HSA was debated by 
the Governmental Affairs Committee. Senator Bennett stated in the 
Committee's July 25, 2003 mark up that the administration had endorsed 
the compromise. He also said that industry groups had reported to him 
that the compromise language would make it possible for them to share 
information with the government without fear of the information being 
released to competitors or to other agencies that might accidentally 
reveal it. The Governmental Affairs Committee reported out the 
compromise language that day. Unfortunately, much more restrictive 
House language was eventually signed into law.
  The February 10 Post editorial called the Leahy-Levin-Bennett 
language "a compromise that would accomplish the reasonable purpose" 
of "encouraging companies to share information with the government 
about infrastructure that might be vulnerable to terrorist attack 
without such broad harmful effects." Id. The Post editorial was 
titled, "Fix This Loophole," which is exactly what my colleagues and 
I hope to accomplish with the introduction of this bill. Id.
  The Restore FOIA bill would correct the problems in the HSA in 
several ways. First, it limits the FOIA exemption to relevant 
"records" submitted by the private sector, such that only those that 
actually pertain to critical infrastructure safety are protected. 
"Records" is the standard category referred to in FOIA. This corrects 
the effective free pass given to industry by the HSA for any 
information it labels "critical infrastructure."
  Second, unlike the HSA, the Restore FOIA bill allows for government 
oversight, including the ability to use and share the records within 
and between agencies. It does not limit the use of such information by 
the government, except to prohibit public disclosure where such 
information is appropriately exempted under FOIA.
  Third, it protects the actions of legitimate whistleblowers, rather 
than criminalizing their acts.
  Fourth, it does not provide civil immunity to companies that 
voluntarily submit information. This corrects a flaw in the current 
law, which would prohibit such information from being used directly in 
civil suits by government or private parties.
  Fifth, unlike the HSA, the Restore FOIA bill allows local authorities 
to apply their own sunshine laws. The Restore FOIA bill does not 
preempt any state or local disclosure laws for information obtained 
outside the Department of Homeland Security. Likewise, it does not 
restrict the use of such information by state agencies.
  Finally, the Restore FOIA bill does not restrict congressional use or 
disclosure of voluntarily submitted critical infrastructure 
information. The HSA language was unclear on this point, and even the 
Congressional Research Service could not say for certain that members 
of Congress or their staff would not be criminally liable. Homeland 
Security Act of 2002: Critical Infrastructure Information Act, February 
29, 2003, CRS Report for Congress, Order Code RL31762, at 14-15.
  These changes to the HSA would accomplish the stated goals of the 
critical infrastructure provisions in the HSA without tying the hands 
of the government in its efforts to protect Americans and without 
cutting the public out of the loop.
  The Administration has flip-flopped on how to best approach the issue 
of critical infrastructure information. The Administration's original 
June 18, 2002, legislative proposal establishing a new department 
carved out an FOIA exemption, in section 204, and required non-
disclosure of any "information" "voluntarily" provided to the new 
Department of Homeland Security by "non-Federal entities or 
individuals" pertaining to "infrastructure vulnerabilities or other 
vulnerabilities to terrorism" in the possession of, or that passed 
through, the new department. Critical terms, such as "voluntarily 
provided," were undefined.
  The Judiciary Committee had an opportunity to query Governor Ridge 
about the Administration's proposal on June 26, 2002, when the 
Administration reversed its long-standing position and allowed him to 
testify in his capacity as the Director of the Transition Planning 
Office.
  Governor Ridge's testimony at that hearing is instructive. He seemed 
to appreciate the concerns expressed by Members about the President's 
June 18 proposal and to be willing to work with us in the legislative 
process to find common ground. On the FOIA issue, he described 
the Administration's goal to craft "a limited statutory exemption to 
the Freedom of Information Act" to help "the Department's most 
important missions [which] will be to protect our Nation's critical 
infrastructure." (June 26, 2002 Hearing, Tr., p. 24). Governor Ridge 
explained that to accomplish this, the Department must be able to 
"collect information, identifying key assets and components of that 
infrastructure, evaluate vulnerabilities, and match threat assessments 
against those vulnerabilities." (Id., at p. 23).

  I do not understand why some have insisted that FOIA and our national 
security are inconsistent. Before the HSA was enacted, the FOIA already 
exempted from disclosure matters that are classified; trade secret, 
commercial and financial information, which is privileged and 
confidential; various law enforcement records and information, 
including confidential source and informant information; and FBI 
records pertaining to foreign intelligence or counterintelligence, or 
international terrorism. These already broad exemptions in the FOIA 
were designed to protect national security and public safety and to 
ensure that the private sector can provide needed information to the 
government.
  Prior to enactment of the HSA, the FOIA exempted from disclosure any 
financial or commercial information provided voluntarily to the 
government, if it was of a kind that the provider would not customarily 
make available to the public. Critical Mass Energy Project v. NRC, 975 
F.2d 871 (D.C. Cir. 1992) (en banc). Such information enjoyed even 
stronger nondisclosure protections than did material that the 
government requested. Applying this exception, Federal regulatory 
agencies safeguarded the confidentiality of all kinds of critical 
infrastructure information, like nuclear power plant safety reports 
(Critical

[[Page S3633]]

Mass, 975 F.2d at 874), information about product manufacturing 
processes and internal security measures (Bowen v. Food & Drug Admin., 
925 F.2d 1225 (9th Cir. 1991), design drawings of airplane parts 
(United Technologies Corp. by Pratt & Whitney v. F.A.A., 102 F.3d 688 
(2d Cir. 1996)), and technical data for video conferencing software 
(Gilmore v. Dept. of Energy, 4 F. Supp.2d 912 (N.D. Cal. 1998)).
  The head of the FBI National Infrastructure Protection Center, NIPC, 
testified more than five years ago, in September, 1998, that the "FOIA 
excuse" used by some in the private sector for failing to share 
information with the government was, in essence, baseless. He explained 
the broad application of FOIA exemptions to protect from disclosure 
information received in the context of a criminal investigation or a 
"national security intelligence" investigation, including information 
submitted confidentially or even anonymously. [Sen. Judiciary 
Subcommittee on Technology, Terrorism, and Government Information, 
Hearing on Critical Infrastructure Protection: Toward a New Policy 
Directive, S. HRG. 105-763, March 17 and June 10, 1998, at p. 107]
  The FBI also used the confidential business record exemption under 
(b)(4) "to protect sensitive corporate information, and has, on 
specific occasions, entered into agreements indicating that it would do 
so prospectively with reference to information yet to be received." 
NIPC was developing policies "to grant owners of information certain 
opportunities to assist in the protection of the information (e.g., by 
`sanitizing the information themselves') and to be involved in 
decisions regarding further dissemination by the NIPC." Id. In short, 
the former Administration witness stated:

       Sharing between the private sector and the government 
     occasionally is hampered by a perception in the private 
     sector that the government cannot adequately protect private 
     sector information from disclosure under the Freedom of 
     Information Act, FOIA. The NIPC believes that this perception 
     is flawed in that both investigative and infrastructure 
     protection information submitted to NIPC are protected from 
     FOIA disclosure under current law. (Id.)

  Nevertheless, for more than five years, businesses continued to seek 
a broad FOIA exemption that also came with special legal protections to 
limit their civil and criminal liability. That business wish list was 
largely granted in the Homeland Security Act.
  At the Senate Judiciary Committee hearing with Governor Ridge, I 
expressed my concern that an overly broad FOIA exemption would 
encourage government complicity with private firms to keep secret 
information about critical infrastructure vulnerabilities, reduce the 
incentive to fix the problems and end up hurting rather than helping 
our national security. In the end, more secrecy may undermine rather 
than foster security.
  Governor Ridge seemed to appreciate these risks, and said he was 
"anxious to work with the Chairman and other members of the committee 
to assure that the concerns that [had been] raised are properly 
addressed." Id. at p. 24. He assured us that "[t]his Administration 
is ready to work together with you in partnership to get the job done. 
This is our priority, and I believe it is yours as well." Id. at p. 
25. This turned out to be an empty promise.
  Almost before the ink was dry on the Administration's earlier June 
proposal, on July 10, 2002, the Administration proposed to substitute a 
much broader FOIA exemption that would (1) exempt from disclosure under 
the FOIA critical infrastructure information voluntarily submitted to 
the new department that was designated as confidential by the submitter 
unless the submitter gave prior written consent, (2) provide limited 
civil immunity for use of the information in civil actions against the 
company, with the likely result that regulatory actions would be 
preceded by litigation by companies that submitted designated 
information to the department over whether the regulatory action was 
prompted by a confidential disclosure, (3) preempt state sunshine laws 
if the designated information is shared with state or local government 
agencies, (4) impose criminal penalties of up to one year imprisonment 
on government employees who disclosed the designated information, and 
(5) antitrust immunity for companies that joined together with agency 
components designated by the President to promote critical 
infrastructure security.
  Despite the Administration's promulgation of two separate proposals 
for a new FOIA exemption in as many weeks, in July, Director Ridge's 
Office of Homeland Security released The National Strategy for Homeland 
Security, which appeared to call for more study of the issue before 
legislating. Specifically, this report called upon the Attorney General 
to "convene a panel to propose any legal changes necessary to enable 
sharing of essential homeland security information between the 
government and the private sector." (P. 33)
  The need for more study of the Administration's proposed new FOIA 
exemption was made amply clear by its possible adverse environmental, 
public health and safety affects. Keeping secret problems in a variety 
of critical infrastructures would simply remove public pressure to fix 
the problems. Moreover, several environmental groups pointed out that, 
under the Administration's proposal, companies could avoid enforcement 
action by "voluntarily" providing information about environmental 
violations to the EPA, which would then be unable to use the 
information to hold the company accountable and also would be required 
to keep the information confidential. It would bar the government from 
disclosing information about spills or other violations without the 
written consent of the company that caused the pollution.
  I worked on a bipartisan basis with many interested stakeholders from 
environmental, civil liberties, human rights, business and government 
watchdog groups to craft a compromise FOIA exemption that did not grant 
the business sector's wish-list but did provide additional 
nondisclosure protections for certain records without jeopardizing the 
public health and safety. At the request of Chairman Lieberman for the 
Judiciary Committee's views on the new department, I shared my concerns 
about the Administration's proposed FOIA exemption and then worked with 
Members of the Governmental Affairs Committee, in particular Senator 
Levin and Senator Bennett, to craft a more narrow and responsible 
exemption that accomplishes the Administration's goal of encouraging 
private companies to share records of critical infrastructure 
vulnerabilities with the new Department of Homeland Security without 
providing incentives to "game" the system of enforcement of 
environmental and other laws designed to protect our nation's public 
health and safety. We refined the FOIA exemption in a manner that 
satisfied the Administration's stated goal, while limiting the risks of 
abuse by private companies or government agencies.
  This compromise solution was supported by the Administration and 
other Members of the Committee on Governmental Affairs and was 
unanimously adopted by that Committee at the markup of the Homeland 
Security Department bill on July 25, 2002. The compromise which I now 
introduce as a free standing bill would exempt from the FOIA certain 
records pertaining to critical infrastructure threats and 
vulnerabilities that are furnished voluntarily to the new Department 
and designated by the provider as confidential and not customarily made 
available to the public. Notably, the compromise FOIA exemption made 
clear that the exemption only covered "records" from the private 
sector, not all "information" provided by the private sector and 
thereby avoided the adverse result of government agency-created and 
generated documents and databases being put off-limits to the FOIA 
simply if private sector "information" is incorporated. Moreover, the 
compromise FOIA exemption clearly defined what records may be 
considered "furnished voluntarily," which did not cover records used 
"to satisfy any legal requirement or obligation to obtain any grant, 
permit, benefit (such as agency forbearance, loans, or reduction or 
modifications of agency penalties or rulings), or other approval from 
the Government." The FOIA compromise exemption further ensured that 
portions of records that are not covered by the exemption would be 
released pursuant to FOIA requests. This compromise did not provide any 
civil liability or antitrust immunity that could be used to immunize 
bad actors or frustrate regulatory enforcement action, nor did

[[Page S3634]]

the compromise preempt state or local sunshine laws.
  Unfortunately, the version of the HSA that we enacted last November 
jettisoned the bipartisan compromise on the FOIA exemption, worked out 
in the Senate with the Administration's support, and replaced it with a 
big-business wish-list gussied up in security garb. The HSA's FOIA 
exemption makes off-limits to the FOIA much broader categories of 
"information" and grants businesses the legal immunities and 
liability protections they have sought so vigorously for over five 
years. This law goes far beyond what is needed to achieve the laudable 
goal of encouraging private sector companies to help protect our 
critical infrastructure. Instead, it ties the hands of the federal 
regulators and law enforcement agencies working to protect the public 
from imminent threats. It gives a windfall to companies who fail to 
follow federal health and safety standards. Most disappointingly, it 
undermines the goals of openness in government that the FOIA was 
designed to achieve. In short, the FOIA exemption in the HSA represents 
the most severe weakening of the Freedom of Information Act in its 36-
year history.
  In the end, the broad secrecy protections provided to critical 
infrastructure information in this bill will promote more secrecy, 
which may undermine rather than foster national security. In addition, 
the immunity provisions in the bill will frustrate enforcement of the 
laws that protect the public's health and safety.

  Let me explain in greater detail. The FOIA exemption enacted in the 
HSA allows companies to stamp or designate certain information as 
critical infrastructure information, or "CII," and then submit this 
information about their operations to the government either in writing 
or orally, and thereby obtain a blanket shield from FOIA's disclosure 
mandates as well as other protections. A Federal agency may not 
disclose or use voluntarily-submitted and CII-marked information, 
except for a limited "informational purpose," such as "analysis, 
warning, interdependency study, recovery, reconstitution," without the 
company's consent. Even when using the information to warn the public 
about potential threats to critical infrastructure, the bill requires 
agencies to take steps to protect from disclosure the source of the CII 
information and other "business sensitive" information.
  The law also contains an unprecedented provision that threatens jail 
time and job loss to any government employee who happens to disclose 
any critical infrastructure information that a company has submitted 
and wants to keep secret. These penalties for using the CII information 
in an unauthorized fashion or for failing to take steps to protect 
disclosure of the source of the information are severe and will chill 
any release of CII information--not just when a FOIA request comes in, 
but in all situations, no matter the circumstance. Criminalizing 
disclosures not of classified information or national security related 
information, but of information that a company decides it does not want 
public--is an effective way to quash discussion and debate over many 
aspects of the government's work. In fact, under the HSA, CII 
information is granted more comprehensive protection under Federal 
criminal laws than classified information.
  This provision of the law has potentially disastrous consequences. If 
an agency is given information from an internet service provider, ISP, 
about cyberattack vulnerabilities, agency employees will have to think 
twice about sharing that information with other ISPs for fear that, 
without the consent of the ISP to use the information, even a warning 
might cost their jobs or risk criminal prosecution.
  This provision means that if a Federal regulatory agency needs to 
issue a regulation to protect the public from threats of harm, it 
cannot rely on any voluntarily submitted information--bringing the 
normal regulatory process to a grinding halt. Public health and law 
enforcement officials need the flexibility to decide how and when to 
warn or prepare the public in the safest, most effective manner. They 
should not have to get "sign off" from a Fortune 500 company to do 
so.
  While the HSA risks making it harder for the government to protect 
American families, it makes it much easier for companies to escape 
responsibility when they violate the law by giving them unprecedented 
immunity from civil and regulatory enforcement actions. Once a business 
declares that information about its practices relates to critical 
infrastructure and is "voluntarily" provided, it can then prevent the 
Federal Government from disclosing it not just to the public, but also 
to a court in a civil action. This means that an agency receiving CII-
marked submissions showing invasions of employee or customer privacy, 
environmental pollution, or government contracting fraud will be unable 
to use that information in a civil action to hold that company 
accountable. Even if the regulatory agency obtains the information 
necessary to bring an enforcement action from an alternative source, 
the company will be able to tie the government up in protracted 
litigation over the source of the information.
  For example, if a company submits information that its factory is 
leaching arsenic in ground water, that information may not be turned 
over to local health authorities to use in any enforcement proceeding 
nor turned over to neighbors who were harmed by drinking the water for 
use in a civil tort action. Moreover, even if EPA tries to bring an 
action to stop the company's wrongdoing, the "use immunity" provided 
in the HSA will tie the agency up in litigation making it prove where 
it got the information and whether it is tainted as "fruit of the 
poisonous tree"--i.e., obtained from the company under the "critical 
infrastructure program."
  Similarly, if the new Department of Homeland Security receives 
information from a bio-medical laboratory about its security 
vulnerabilities, and anthrax is released from the lab three weeks 
later, the Department will not be able to warn the public promptly 
about how to protect itself without consulting with and trying to get 
the consent of the laboratory in order to avoid the risk of job loss or 
criminal prosecution for a non-consensual disclosure. Moreover, if the 
laboratory is violating any state, local or federal regulation in its 
handling of the anthrax, the Department will not be able to turn over 
to another Federal agency, such as the EPA or the Department of Health 
and Human Services, or to any State or local health officials, 
information or documents relating to the laboratory's mishandling of 
the anthrax for use in any enforcement proceedings against the 
laboratory, or in any wrongful death action, should the laboratory's 
mishandling of the anthrax result in the death of any person. The law 
specifically states that such CII-marked information "shall not, 
without the written consent of the person or entity submitting such 
information, be used directly by such agency, any other Federal, State, 
or local authority, or any third party, in any civil action arising 
under Federal or State law if such information is submitted in good 
faith." [H.R. 5710, section 214(a)(1)(C)]
  Most businesses are good citizens and take seriously their 
obligations to the government and the public, but this "disclose-and-
immunize" provision is subject to abuse by those businesses that want 
to exploit legal technicalities to avoid regulatory guidelines. The HSA 
lays out the perfect blueprint to avoid legal liability: funnel 
damaging information into this voluntary disclosure system and pre-empt 
the government or others harmed by the company's actions from being 
able to use it against the company. This is not the kind of two-way 
public-private cooperation that our country needs.
  The scope of the information that is covered by the new HSA FOIA 
exemption is overly broad and undermines the openness in government 
that FOIA was intended to guarantee. Under this law, information about 
virtually every important sector of our economy that today the public 
has a right to see can be shut off from public view simply by labeling 
it "critical infrastructure information." Prior to enactment of the 
HSA, under FOIA standards, courts had required federal agencies to 
disclose 1. pricing information in contract bids so citizens can make 
sure the government is wisely spending their taxpayer dollars; 2. 
compliance reports that allow constituents to insist that government 
contractors comply with federal equal

[[Page S3635]]

opportunity mandates; and 3. banks' financial data so the public can 
ensure that federal agencies properly approve bank mergers. Without 
access to this kind of information, it will be harder for the public to 
hold its government accountable. Under the HSA, all of this information 
may be marked CII information and kept out of public view.
  The HSA FOIA exemption goes so far in exempting such a large amount 
of material from FOIA's disclosure requirements that it undermines 
government openness without making any real gains in safety for 
families in Vermont and across America. We do not keep America safer by 
chilling Federal officials from warning the public about threats to 
their health and safety. We do not ensure our nation's security by 
refusing to tell the American people whether or not their federal 
agencies are doing their jobs or their government is spending their 
hard earned tax dollars wisely. We do not encourage real two-way 
cooperation by giving companies protection from civil liability when 
they break the law. We do not respect the spirit of our democracy when 
we cloak in secrecy the workings of our government from the public we 
are elected to serve.
  The argument over the scope of the FOIA and unilateral executive 
power to shield matters from public scrutiny goes to the heart of our 
fundamental right to be an educated electorate aware of what our 
government is doing. The Rutland Herald got it right in a November 26, 
2002 editorial that explained: "The battle was not over the right of 
the government to hold sensitive, classified information secret. The 
government has that right. Rather, the battle was over whether the 
government would be required to release anything it sought to 
withhold."
  We need to fix this troubling restriction on public accountability. 
Exempting the new Department from laws that ensure responsibility to 
the Congress and to the American people makes for a tenuous start not 
the sure footing we all want for the success and endurance of this new 
Department. I urge my colleagues to support the Restoration of Freedom 
of Information Act of 2003.
  I ask unanimous consent to print the editorials I mentioned and 
several letters of support of the Restore FOIA bill in the Record.
  There being no objection, the additional material was ordered to be 
printed in the Record, as follows:

Restoration of Freedom of Information Act ("Restore FOIA") Sectional 
                                Analysis

       Sec. 1. Short title. This section gives the bill the short 
     title, the "Restoration of Freedom of Information Act".
       Sec. 2. Protection of Voluntarily Furnished Confidential 
     Information. This section strikes subtitle B (secs. 211-215) 
     of the Homeland Security Act ("HSA") (P.L. 107-296) and 
     inserts a new section 211.
       Sections to be repealed from the HSA: These sections 
     contain an exemption to the Freedom of Information Act (FOIA) 
     that (1) exempt from disclosure critical infrastructure 
     information voluntarily submitted to the new department that 
     was designated as confidential by the submitter unless the 
     submitter gave prior written consent; (2) provide civil 
     immunity for use of such information in civil actions against 
     the company; (3) preempt state sunshine laws if the 
     designated information is shared with state or local 
     government agencies; and (4) impose criminal penalties of up 
     to one year imprisonment on government employees who 
     disclosed the designated information.
       Provisions that would replace the repealed sections of the 
     HAS: The Restore FOIA bill inserts a new section 211 to the 
     HSA that would exempt from the FOIA certain records 
     pertaining to critical infrastructure threats and 
     vulnerabilities that are furnished voluntarily to the new 
     Department and designated by the provider as confidential and 
     not customarily made available to the public. Notably, the 
     Restore FOIA bill makes clear that the exemption covers 
     "records" from the private sector, not all "information" 
     provided by the private sector, as in the enacted version of 
     the HSA. The Restore FOIA bill ensures that portions of 
     records that are not covered by the exemption would be 
     released pursuant to FOIA requests. It does not provide any 
     civil liability immunity or preempt state or local sunshine 
     laws, and it does not criminalize whistleblower activity.
       Specifically, this section of the Restore FOIA bill 
     includes the following:
       A definition of "critical infrastructure": This term is 
     given the meaning adopted in section 1016(e) the USA Patriot 
     Act (42 U.S.C. 5195c(e)) which reads, "critical 
     infrastructure means systems and assets, whether physical or 
     virtual, so vital to United States that the incapacity or 
     destruction of such systems and assets would have a 
     debilitating impact on security, national economic security, 
     national public health or safety, or any combination of those 
     matters." This definition is commonly understood to mean 
     facilities such as bridges, dams, ports, nuclear power 
     plants, or chemical plants.
       A definition of the term "furnished voluntarily": This 
     term signifies documents provided to the Department of 
     Homeland Security (DHS) that are not formally required by the 
     department and that are provided to it to satisfy any legal 
     requirement. The definition excludes any document that is 
     provided to DHS with a permit or grant application or to 
     obtain any other benefit from DHS, such as a loan, agency 
     forbearance, or modification of a penalty.
       An exemption from FOIA of records that pertain to 
     vulnerabilities of and threats to critical infrastructure 
     that are furnished voluntarily to DHS. This exemption is made 
     available where the provider of the record certifies that the 
     information is confidential and would not customarily be 
     released to the public.
       A requirement that other government agencies that have 
     obtained such records from DHS withhold disclosure of the 
     records and refer any FOIA requests to DHS for processing.
       A requirement that reasonably segregable portions of 
     requested documents be disclosed, as is well-established 
     under FOIA.
       An allowance to agencies that obtain critical 
     infrastructure records from a source other than DHS to 
     release requested records consistent with FOIA, regardless of 
     whether DHS has an identical record in its possession.
       An allowance to providers of critical infrastructure 
     records to withdraw the confidentiality designation of 
     records voluntarily submitted to DHS, thereby making the 
     records subject to disclosure under FOIA.
       A direction to the Secretary of Homeland Security to 
     establish procedures to receive, designate, store, and 
     protect the confidentiality of records voluntarily submitted 
     and certified as critical infrastructure records.
       A clarification that the bill would not preempt state or 
     local information disclosure laws.
       A requirement for the Comptroller General to report to the 
     House and Senate Judiciary Committees, the House Governmental 
     Reform Committee and the Senate Governmental Affairs 
     Committee the number of private entities and government 
     agencies that submit records to DHS under the terms of the 
     bill. The report would also include the number of requests 
     for access to records that were granted or denied. Finally, 
     the Comptroller General would make recommendations to the 
     committees for modifications or improvements to the 
     collection and analysis of critical infrastructure 
     information.
       Sec. 3. Technical and conforming amendment. This section 
     amends the table of contents of the Homeland Security Act.
                                  ____


               [From the Washington Post, Feb. 10, 2003]

                           Fix This Loophole

       The Homeland Security law enacted last year contains a 
     miserable provision that weakens important federal regulation 
     and public access to information. Congress should act soon to 
     repair the damage.
       The goal of the provision was reasonable enough: 
     encouraging companies to share information with the 
     government about infrastructure that might be vulnerable to 
     terrorist attack. Fearing public disclosure, companies have 
     been reluctant to share information on vulnerabilities at, 
     say, power plants or chemical factories. So under the law, 
     any such "critical infrastructure" information that 
     companies voluntarily provide to the government is exempted 
     from disclosure to the public, litigants and enforcement 
     agencies.
       But the law defines "information" so broadly that it will 
     cover, and thus keep secret, virtually anything a company 
     decides to fork over. A company might preempt environmental 
     regulators by "voluntarily" divulging incriminating 
     material, thereby making it unavailable to anyone else. 
     Unless regulators could show they had obtained the material 
     independently, it would be off limits to them. And the law 
     prescribes criminal penalties for whistle-blowers who make 
     such information public. The collective impact will be to put 
     in the hands of a regulated party the power, simply by 
     turning over information, to shield that information from 
     legitimate law enforcement purposes and from public 
     disclosure.
       Sens. Patrick J. Leahy (D-Vt.) and Robert F. Bennett (R-
     Utah) had negotiated a compromise that would accomplish the 
     reasonable purpose without such broad harmful effects. It 
     should be restored before the government finds its hands 
     tied--and the public finds itself out of the loop--on 
     important regulatory matters.
                                  ____


               [From the Washington Post, Nov. 20, 2002]

                            Too Many Secrets

                           (By Mark Tapscott)

       Why does the White House sometimes seem so determined to 
     close the door on the people's right to know what their 
     government is doing? Even some of us who admire the 
     leadership of President Bush in the war on terrorism would 
     like to know.
       Admittedly, insisting that the public's business be done in 
     public isn't a popular cause these days. Recent surveys show 
     that many Americans are willing to trade significant chunks 
     of their First Amendment rights for the promise of greater 
     security in the war on terrorism. Such surveys must gladden 
     the hearts of Bush administration

[[Page S3636]]

     officials who--presumably unintentionally--undermine measures 
     such as the Freedom of Information Act (FOIA).
       Consider just three examples from the past year: Section 
     204 of the White House's original proposal to establish a 
     Department of Homeland Security, White House Chief of Staff 
     Andrew Card's March 2002 directive that agencies restrict 
     access to "sensitive but unclassified" information, and the 
     administration's claim of executive privilege to keep secret 
     information regarding President Clinton's infamous midnight 
     pardons.
       The administration's Section 204 proposal exempted from 
     FOIA disclosure any information "provided voluntarily by 
     non-federal entities or individuals that relates to 
     infrastructure vulnerabilities or other vulnerabilities to 
     terrorism." One need not be a Harvard law graduate to see 
     that, without clarification of what constitutes such 
     vulnerabilities, this loophole could be manipulated by clever 
     corporate and government operators to hide endless varieties 
     of potentially embarrassing and/or criminal information from 
     public view.
       Subsequent negotiations in the Senate with the White House 
     resulted in compromise language that takes care of some of 
     the major problems, but in the rush to final passage, the 
     Senate has accepted the House version of the legislation, 
     which, being virtually identical to the administration's 
     original version, remains deeply flawed in this regard.
       The Card memo was issued when public anger over the Sept. 
     11, 2001, massacre was still intense. Despite the fact that 
     the memo failed to define what constitutes "sensitive but 
     unclassified" information, agencies responded by removing 
     thousands of previously public documents from FOIA 
     disclosure. The Pentagon, for example, estimated recently 
     that approximately 6,000 Defense Department documents were 
     removed from public view. Who now outside of government can 
     verify that any of those documents contained information that 
     could help terrorists?
       Few would argue that the Section 204 proposal and the Card 
     memo do not address legitimate national security needs in the 
     war against terrorism. But to date, nobody has produced a 
     single example of vital information that could not have been 
     properly exempted from disclosure under the current FOIA, 
     which is backed by 25 years of detailed case law. Instead, 
     the administration offers vague language that invites abuse.
       Finally, there are those pardons, which provoked a national 
     outcry when first reported. President Clinton had pardoned 
     140 people, including his Whitewater partner Susan McDougal, 
     his brother Roger (convicted on cocaine-related charges) and 
     international fugitive Marc Rich, wanted by the Justice 
     Department for allegedly conspiring with the Iranian 
     government in 1980 to buy 6 million barrels of oil, contrary 
     to a U.S. trade embargo.
       It is doubtful that the full facts behind the pardons will 
     ever be known as long as the administration refuses to 
     disclose nearly 4,000 pages related to the former president's 
     actions. The Bush administration has taken a similar position 
     on documents related to former attorney general Janet Reno's 
     controversial decision not to appoint a special counsel to 
     investigate possible Clinton administration campaign finance 
     illegalities.
       There was a time when at least one senior Bush 
     administration official thought the FOIA essential because 
     "no matter what party has held the political power of 
     government, there have been attempts to cover up mistakes and 
     errors." That same official added that "disclosure of 
     government information is particularly important today 
     because government is becoming involved in more and more 
     aspects of every citizen's personal and business life, and so 
     access to information about how government is exercising its 
     trust becomes increasingly important."
       So spoke a young Illinois Republican congressman named 
     Donald Rumsfeld, in a floor speech on June 20, 1966, 
     advocating passage of the FOIA, of which he was a co-sponsor.
       The writer is director of the Heritage Foundation's Center 
     for Media and Public Policy.
                                  ____


 Fix the Critical Infrastructure Information Subtitle in the Homeland 
                          Security Act of 2002

       The undersigned organizations are concerned about the 
     current language for Critical Infrastructure Information in 
     the Homeland Security Act of 2002, which contains ambiguous 
     definitions that could unintentionally allow companies to 
     keep broad categories of information secret and provisions 
     that restrict the government's ability to use the 
     information. In order to better serve the goal of improving 
     public safety and security, we support efforts to fix the 
     Homeland Security Act by clarifying the scope of the 
     information protected and removing provisions that overly 
     restrict the government's ability to use the information.
       Senators Leahy (D-VT), Levin (D-MI), Jeffords (I-VT), 
     Lieberman (D-CT), and Byrd (D-WV) will soon introduce 
     legislation entitled the Restoration of Freedom of 
     Information Act of 2003 ("Restore FOIA") addressing these 
     concerns, using bipartisan language developed last year by 
     the Senate Governmental Affairs Committee. The Restore FOIA 
     solution would:
       Clarify the FOIA exemption to be more consistent with 
     established law.
       Remove the restrictions on the government's ability to act 
     as it sees fit in response to the information it receives.
       Preserve whistleblower protections by removing unnecessary 
     criminal penalties.
       The information provisions currently within the Homeland 
     Security Act of 2002 do not accomplish the goal of the law--
     empowering the government to protect citizens using private-
     sector information which is "voluntarily" shared and 
     identifies potential vulnerabilities to terrorist attacks. 
     The current language could have devastating effects on the 
     work of the government to protect public health, safety and 
     security, as well as government accountability. It is 
     essential that these problems in the Homeland Security Act be 
     fixed immediately before they become too firmly entrenched in 
     the law.
       Jean AbiNader, Managing Director, Arab American Institute.
       Prudence S. Adler, Associate Executive Director, 
     Association of Research Libraries.
       Steven Aftergood, Project Director, Federation of American 
     Scientists.
       Gary Bass, Executive Director, OMB Watch.
       Jeremiah Baumann, Director, Toxics Right to Know Campaign, 
     U.S. Public Interest Research Group.
       Ruth Berlin, Executive Director, MD Pesticide Network.
       Lynne Bradley, Director, Government Relations, American 
     Library Association.
       Danielle Brian, Executive Director, Project on Government 
     Oversight.
       Sandy Buchanan, Executive Director, Ohio Citizen Action.
       Jeanne Butterfield, Executive Director, American 
     Immigration Lawyers Association.
       Alyssondra Campaigne, Legislative Director, Natural 
     Resources Defense Council.
       Kevin S. Curtis, Vice President, Government Affairs, 
     National Environmental Trust.
       Lucy Dalglish, Executive Director, Reporters Committee for 
     Freedom of the Press.
       Charles N. Davis, Executive Director, Freedom of 
     Information Center, University of Missouri School of 
     Journalism.
       Tom Devine, Legal Director, Government Accountability 
     Project.
       Rick Engler, Director, New Jersey Work Environment Council.
       Jason Erb, Director, Governmental Relations, Council on 
     American-Islamic Relations.
       Darryl Fagin, Legislative Director, Americans for 
     Democratic Action.
       Margaret Fung, Executive Director, Asian American Legal 
     Defense and Education Fund.
       Vickie Goodwin, Organizer, Powder River Basin Resource 
     Council.
       Evan Hendricks, Editor/Publisher, Privacy Times.
       Rick Hind, Legislative Director, Greenpeace.
       Khalil Jahshan, Director of Government Affairs, American-
     Arab Anti-Discrimination Committee.
       Susan E. Kegley, Staff Scientist/Program Coordinator, 
     Pesticide Action Network, North America.
       Robert Leger, President, Society of Professional 
     Journalists.
       Dave LeGrande, Director, Occupational Safety & Health, CWA/
     AFL-CIO.
       Sanford Lewis, Director, Strategic Counsel on Corporate 
     Accountability.
       Conrad Martin, Executive Director, Fund for Constitutional 
     Government.
       Alexandra McPherson, Director, Clean Production Action.
       Dena Mottola, Acting Director, New Jersey Public Interest 
     Research Group.
       Laura W. Murphy, Director, Washington National Office, 
     American Civil Liberties Union.
       Ralph G. Neas, President, People for the American Way.
       Robert Oakley, Washington Affairs Representative, American 
     Association of Law Libraries.
       Paul Orum, Director, Working Group on Community Right-to-
     Know.
       Deborah Pierce, Executive Director, Privacy Activism.
       Chellie Pingree, President and CEO, Common Cause.
       Ari Schwartz, Associate Director, Center for Democracy and 
     Technology.
       Debbie Sease, Legislative Director, Sierra Club.
       Bob Shavelson, Executive Director, Cook Inlet Keeper.
       Peggy M. Shepard, Executive Director, West Harlem 
     Environmental Action.
       Ted Smith, Executive Director, Silicon Valley Toxics 
     Coalition.
       David Sobel, General Counsel, Electronic Privacy 
     Information Center.
       Ed Spar, Executive Director, Council on Professional 
     Association of Federal Statistics.
       Vivian Stockman, Communications Coordinator, Ohio Valley 
     Environmental Coalition.
       Daniel Swartz, Executive Director, Children's Environmental 
     Health Network.
       Lee Tien, Senior Staff Attorney, Electronic Frontier 
     Foundation.
       Elizabeth Thompson, Legislative Director, Environmental 
     Defense.
       Sara Zdeb, Legislative Director, Friends of the Earth.

[[Page S3637]]

     
                                  ____
                                                   March 12, 2003.
     Hon. Susan Collins,
     Chair, Senate Committee on Governmental Affairs, U.S. Senate, 
         Dirksen Senate Office Building, Washington, DC.
     Hon. Orrin Hatch,
     Chair, Senate Committee on the Judiciary, U.S. Senate, 
         Dirksen Senate Office Building, Washington, DC.
     Hon. Joseph Lieberman,
     Ranking Member, Senate Committee on Governmental Affairs, 
         U.S. Senate, Hart Senate Office Building, Washington, DC.
     Hon. Patrick Leahy,
     Ranking Member, Senate Committee on the Judiciary, U.S. 
         Senate, Dirksen Senate Office Building, Washington, DC.
       Dear Senators Collins, Hatch, Lieberman, and Leahy: The 
     Homeland Security Act of 2002 was a very important 
     legislative accomplishment that responded to new challenges 
     facing our country.
       On the path to passage of the Act, however, certain 
     sections, particularly Section 214, dealing with Critical 
     Infrastructure Information, left a number of journalistic 
     organizations concerned that broad categories of 
     information--particularly information that relates to the 
     public's health and safety--would unnecessarily be shielded 
     from public view.
       Thus, we support efforts to clarify the language in favor 
     of essential openness, which, in fact, will also resolve 
     potential barriers that restrict the government's own use of 
     information provided by companies. The "Restoration of 
     Freedom of Information Act of 2003" would substitute 
     bipartisan language developed last year by the Senate 
     Government Affair Committee for that which was enacted into 
     law. This bill would:
       Clarify the FOIA exemption to be more consistent with 
     established law, while still protecting records on critical 
     infrastructure vulnerabilities submitted to the Department of 
     Homeland Security by private firms.
       Remove the restrictions on the government's ability to act 
     as it sees fit in response to the information it receives.
       Preserve whistleblower protections by removing unnecessary 
     criminal penalties.
       It is important for both citizens and the government 
     process that these changes in law are made quickly.
       Thank you for your consideration.
           Sincerely,
         American Society of Magazine Editors; American Society of 
           Newspaper Editors; Associated Press Managing Editors; 
           Freedom of Information Center, University of Missouri 
           School of Journalism; Magazine Publishers of America; 
           National Federation of Press Women; National Newspaper 
           Association; National Press Club; Newsletter & 
           Electronic Publishers Association; Newspaper 
           Association of America; Radio-Television News Directors 
           Association; Reporters Committee for Freedom of the 
           Press; Society of Professional Journalists.
                                  ____


                            Let Freedom Ring

                        (By Maurice J. Freedman)

       What if you want to find out if toxic chemicals are buried 
     under your child's schoolyard? How could you tell if your 
     veterans' benefits hinged on proving you were exposed to 
     biohazards during a top-secret mission? Or perhaps a 
     candidate for your city council wants to better understand 
     formerly classified plans for emergency evacuation.
       These days, it's possible, with considerable patience, 
     determination, and a few clicks of a mouse, to file a request 
     for answers to questions like these and a broad range of 
     government information that are critical to our lives, work, 
     health and well being.
       But like registering to vote, in some places and for some 
     people, this precious freedom hasn't always been so easy to 
     exercise.
       The main tool for such fact-finding, the Freedom of 
     Information Act, known as FOIA, which we honor each year on 
     the anniversary of James Madison's birthday, was first 
     enacted on July 4, 1966. Before that, any-one who wanted to 
     get records from the federal government had to establish his 
     or her legal right to examine those records. That was 
     expensive, time-consuming and a barrier for countless 
     legitimate requests for information on issues from whether 
     the nuclear reactor downwind had a record of safety 
     violations to how the Nixon administration tried to deport 
     John Lennon as detailed in his FBI files.
       With FOIA, the burden shifted to government agencies, 
     requiring them to meet these requests unless they fell within 
     a handful of specific national security exemptions. Indeed, 
     since then, any decision by an agency to withhold a document 
     could be challenged in federal court.
       From John Lennon's or Rev. Dr. Martin Luther King Jr.'s FBI 
     files to record of debates on whether to use nuclear weapons 
     in Vietnam, FOIA requests now run the gamut of what we need 
     to know about what our government is doing with our tax 
     dollars in our name. Whether it's internal NASA memos about 
     space shuttle safety or exchanges among federal officials 
     about Japanese internment camps during World War II, our 
     right to know about the deliberations and actions of our 
     federal government is a cornerstone of American democracy.
       In 1974, in reaction to Watergate, Congress moved to 
     strengthen FOIA. Unwilling to let our country be run more 
     like a closed corporation than an open, democratic society, 
     this change allowed courts to order the release of documents, 
     even when the President said they couldn't be made public.
       Our system of representative democracy depends on the free 
     flow of information produced, collected and published by our 
     government and available to the public so we can participate 
     as an informed electorate.
       Since the early 19th century, libraries have served as 
     depositories for the written record of our nation's 
     development and gateways to the decisions of its leaders, 
     thus assuring public access to government information. Today, 
     21st-century librarians are committed to ensuring the 
     public's right to know is protected in the electronic age. As 
     organizers, navigators and providers of government 
     information that serves the public, we help file FOIA 
     requests and otherwise support freedom of information @ your 
     library.
       Many Americans depend on access to information collected, 
     organized and disseminated by the federal government--from 
     farmers and health care professionals, to journalists and 
     veterans, community interest groups to local and state 
     government officials, and indeed, all voters.
       Americans come to libraries to find Census and other 
     statistics; to help plan new business and marketing 
     strategies; to research environmental issues and hazards, 
     laws and regulations; and to learn about job opportunities 
     from government and other employment lists.
       The ongoing transition to predominantly electronic 
     transmission of federal information offers both promise and 
     problems for the public in this realm. Information that is 
     only in electronic form quickly appears on--and as quickly 
     disappears from--Web sites. There is often no one charged 
     with capturing, preserving or making electronic data 
     available to future generations, as well as those, who for a 
     variety of reasons, cannot access or work with electronic 
     information.
       True national security is built on a vibrant democracy and 
     a well-informed citizenry, not a culture of secrecy. Said 
     James Madison, on whose birthday we make Freedom of 
     Information Day, "Knowledge will forever govern ignorance, 
     and a people who mean to be their own governors must arm 
     themselves with the power which knowledge gives." Although 
     he wrote in response to abuses by Britain's King George III, 
     his warnings ring equally true today.
       Every country has hospitals, police and schools. But only 
     free countries allow the free flow of ideas. Free libraries 
     are the hub of public access to government information. 
     Challenges to an informed citizenry range from the complexity 
     and inequality in information technology to illiteracy, 
     limited information literacy skills and unequal access to 
     education and information resources.
       Thankful for our freedoms, we must do our best as we 
     prepare to fight halfway around the world to ensure that we 
     continue to guard with unrelating vigilance the right to know 
     here at home.

  Mr. LEVIN. Mr. President, today I join with Senators Leahy, Byrd, 
Jeffords, and Lieberman to introduce the Restore Freedom of Information 
Act, Restore FOIA, that will provide the public with access to 
information, while at the same time ensuring that information 
voluntarily submitted to the government by companies is not improperly 
disclosed. In order to ensure public access and limit improper 
disclosure, we need to reexamine some aspects of the Homeland Security 
Act, HSA, which was rushed through Congress last year, dropping several 
carefully-crafted, bipartisan measures which had been adopted by the 
Senate Governmental Affairs Committee, along the way. Dropping those 
measures left ambiguities in the law that need to be clarified, and 
today's bill is an attempt to make those clarifications and address 
certain problems that could otherwise result.
  The issue this bill addresses is public access to information in the 
possession of the Homeland Security Department. Although some seem to 
want to shroud all homeland security efforts in secrecy, as Judge Damon 
Keith, writing for the U.S. Sixth Circuit of Appeals, recently warned 
"Democracies die behind closed doors." The principles of open 
government and the public's right to know are cornerstones of our 
democracy. We cannot sacrifice those principles in the name of 
protecting them.
  One of the reasons that I voted against the Homeland Security Act 
last year was because the final bill dropped a bipartisan provision, 
passed by the Senate Governmental Affairs Committee, clarifying how the 
new Department of Homeland Security, DHS, should comply with the 
Freedom of Information Act, FOIA. The final bill substituted a poorly 
drafted provision that could inappropriately close the door on persons 
seeking unclassified information from the Department related to 
critical infrastructure.
  What is critical infrastructure? Critical infrastructure is the 
backbone that holds our country together and

[[Page S3638]]

makes it work--our roads, computer grids, telephones, pipelines, water 
treatment plants, utilities, and other facilities essential to a fully 
functioning Nation. It so happens that, in the United States, much of 
our critical infrastructure is controlled by private entities, often 
privately owned or publicly traded corporations. To strengthen existing 
protections for these facilities, the Federal Government asked the 
companies that own them to submit unclassified information about their 
facilities to assist the government in evaluating them, identifying 
possible problems, and designing stronger protections from terrorist 
attack, natural disasters, or other threats to homeland security.
  Some companies asked to voluntarily submit this information feared 
that it might be improperly disclosed, and sought a new exemption from 
the Federal Freedom of Information Act, FOIA, to prohibit disclosure of 
so-called "critical infrastructure information." Reporters, public 
interest groups, and others feared that, if this FOIA exemption were 
granted, companies could send important environmental and safety 
information to DHS under the general heading of "critical 
infrastructure information" and thereby put this information out of 
the public's reach. To bring these sides together, last July, Senators 
Bennett, Leahy and I worked out a bipartisan FOIA compromise that 
codified existing case law with regard to companies voluntarily 
submitting information. At the Senate Governmental Affairs Committee 
mark-up of the homeland security legislation, Senator Bennett said that 
the Administration supported our compromise, but the language was 
ultimately dropped from the final Homeland Security Act. As a result, 
the media, public interest groups, and others continue to fear that 
companies may be hiding important health and safety information that 
has long been public and should be public behind the mask of "critical 
infrastructure."
  To rectify this situation, today we are introducing a bill that would 
change the existing HSA language in several important ways. First, our 
bill defines the key term, "critical infrastructure," in a more 
focused way than the overly broad language in the HSA. To do that, our 
bill draws from language in existing case law, that has already been 
tested by the courts. The existing HSA language, it interpreted 
broadly, could expand the prohibition on disclosing critical 
infrastructure information to include virtually every aspect of a 
company's operations, denying public access to a great deal of health 
and safety information that the public has a right to know. If this 
expansive interpretation was not the intent of the bill's drafters, 
then they should be willing to accept our court-tested language.
  A second important change that our bill would make in the existing 
HSA involves the issue of civil immunity for companies that violate the 
law. As currently worded, the HSA seems to suggest that companies 
which voluntarily submit to DHS critical infrastructure information 
indicating that the company is in violation of public health or safety 
regulations may gain protection from legal action in court to halt or 
penalize this wrongdoing, even if the information shows that the 
company is acting negligently. For example, the current HSA provisions 
could lead to the disturbing situation where DHS learns, through a 
critical infrastructure submission, that a company is leaking polluted 
sludge into a nearby waterway in violation of environmental 
restrictions, but is barred from going to court to stop the pollution 
because the law appears to prohibit the agency's use of the critical 
infrastructure information in a civil action. Our bill would eliminate 
the possibility that the HSA would provide companies with civil 
immunity under these circumstances.

  A third key problem with the existing HSA language is that it 
includes a provision that could send a Federal whistleblower who 
discloses critical infrastructure information, even to an appropriate 
authority, to prison. The language is clear that if a DHS employee 
discloses unclassified critical infrastructure information, even when 
acting as a whistleblower who reveals the information to Congress in an 
act of conscience or patriotism, that whistleblower could wind up in 
jail. My colleague, Senator Leahy, describes a whistleblower who works 
at the FAA who blew the whistle on government collusion to coverup 
failures by airlines to meet tests on airline preparedness. That 
whistleblower could have ended up in jail had he blown the whistle 
under today's law. A year in jail is quite a deterrent for a Federal 
employee who is thinking about blowing the whistle, and we have never 
before threatened Federal whistleblowers with jail terms. It is a bad 
idea, and it is counterproductive to homeland safety.
  There are other troubling provisions in the current HSA law as well, 
equally detrimental to the public's right to know. For example, the HSA 
exempts all communication of critical infrastructure information from 
the open meeting and other sunshine requirements of the Federal 
Advisory Committee Act, and places critical infrastructure information 
outside restrictions on ex parte contacts. The HSA also pre-empts state 
and local sunshine laws, an undue intrusion on the power of the States. 
The bill we are introducing today would strike all of these unnecessary 
provisions, and create in their stead a narrow FOIA exemption that 
balances the prohibition against improper disclosures of critical 
infrastructure information with the public's right to know.
  Finally, I would like to include in the Record two examples of 
situations that could occur under the language in the HSA but would not 
occur under our bill. These disturbing examples were provided by Dr. 
Rena Steinzor, Professor at the University of Maryland School of Law, 
on behalf of the center for Progressive Regulation.
  Case Study Number 1 is the following:
  A large Midwest utility decides to replace an old coal burning 
electric generation unit with a new one. The new unit, much larger than 
the first, will produce significantly greater air pollution emissions. 
The company could mitigate these increases by installing additional 
pollution control equipment, but decides it does not wish to incur the 
expense. It begins construction and simultaneously reports its plans to 
the DHS as "critical infrastructure information," so Federal security 
experts will know about its increased capacity to generate electricity.
  A Department of Homeland Security employee, visiting the plant to 
consult on government purchases of power during emergency situations, 
notices readings on internal gauges reflecting the dramatically 
increased emissions. She telephones EPA to report the situation. EPA 
issues a Notice of Violation to the company, and threatens to bring an 
action for civil penalties, but is instructed to desist by DHS 
officials who inform EPA that the HSA prohibits disclosing the 
information provided to the agency in court and that DHS wants to list 
the company as an emergency supplier capable of providing expanded 
electricity production in an upcoming report to Congress. EPA drops its 
enforcement action, and the DHS employee not only loses her job but 
also is prosecuted criminally.
  Case Study Number 2 is the following:
  Lobbyists representing companies that provide goods and services to 
the Department of Homeland Security routinely submit materials 
describing their companies' products in glowing terms. They arrange 
repeated trips for government purchasing agents to exotic locations 
under the guise of briefing them regarding the technical aspects of the 
products. All of this information is designated as critical 
infrastructure by the companies, and is therefore protected from 
disclosure and oversight by the media or possibly even individual 
members of Congress who could see the information but not reveal it.
  The Homeland Security Act was never intended to protect polluters or 
special interests from public scrutiny. But as these examples 
demonstrate, that is exactly what could happen if the current, vague 
language in the law is not corrected. The bill we are introducing today 
would make the needed corrections.
  On January 17, 2003 at his confirmation hearing before the 
Governmental Affairs Committee, I questioned Governor Ridge about these 
problems with the current wording of the Homeland

[[Page S3639]]

Security Act. I asked him whether the HSA could have the unintended 
consequences of providing protections for wrongdoing while impeding 
access to necessary information to protect public health and safety. 
Governor Ridge replied: "[T]hat certainly wasn't the intent, I am 
sure, of those who advocated the Freedom of Information Act exemption, 
to give wrongdoers protection or to protect illegal activity, and I 
will certainly work with you to clarify that language." If that was 
not the intent, then let us fix the vague, and potentially dangerous 
provisions that are in this bill.
  I would also note, for the record, that many organizations have 
endorsed our bill including the following:
  American Association of Law Libraries, American Civil Liberties 
Union, American Immigration Lawyers Association, American Library 
Association, American-Arab Anti-Discrimination Committee, Americans for 
Democratic Action, American Society of Magazine Editors, American 
Society of Newspaper Editors, Arab American Institute, Asian American 
Legal Defense and Education Fund, Associated Press Managing Editors, 
Association of Research Libraries, Center for Democracy and Technology, 
Children's Environmental Health Network, Clean Production Network, 
Common Cause, Communications Workers of America, Cook Inlet Keeper, 
Council on American-Islamic Relations, Council on Professional 
Association of Federal Statistics, Electronic Frontier Foundation, 
Electronic Privacy Information Center, Environmental Defense, 
Federation of American Scientists, Freedom of Information Center, 
Friends of the Earth, Fund for Constitutional Government, Government 
Accountability Project, Greenpeace, Magazine Publishers of America, 
Maryland Pesticide Network, National Federation of Press Women, 
National Newspaper Association, National Press Club, Natural Resources 
Defense Council, New Jersey Work Environment Council, Newsletter & 
Electronic Publishers Association, Newspaper Association of America, 
Ohio Valley Environmental Coalition, OMB Watch, Pesticide Action 
Network, North America Powder River Basin Resource Council, Privacy 
Activism, Privacy Times, Project on Government Oversight, Radio-
Television News Directors Association, Reporters Committee for Freedom 
of the Press, Sierra Club, Silicon Valley Toxics Coalition, Society of 
Professional Journalists, Strategic Counsel on Corporate 
Accountability, U.S. Public Interest Research Group, University of 
Missouri School of Journalism, West Harlem Environmental Action Working 
Group on Community Right-to-Know.

                          ____________________