[Federal Register: September 20, 2007 (Volume 72, Number 182)]
[Notices]               
[Page 53784-53789]
From the Federal Register Online via GPO Access [wais.access.gpo.gov]
[DOCID:fr20se07-57]                         

=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

Transportation Security Administration

[Docket No. TSA-2006-24191; USCG-2007-27415]

 
Transportation Worker Identity Credential (TWIC) Biometric Reader 
Specification and TWIC Contactless Smart Card Application

AGENCY: Transportation Security Administration; United States Coast 
Guard; DHS.

ACTION: Notice of availability.

-----------------------------------------------------------------------

SUMMARY: The Department of Homeland Security, through the U.S. Coast 
Guard (Coast Guard) and the Transportation Security Administration 
(TSA), announces the availability of the

[[Page 53785]]

working specification for Transportation Worker Identification 
Credential (TWIC) biometric readers and the TWIC contactless smart card 
application. This specification is based on recommendations to the 
Coast Guard and TSA from the National Maritime Security Advisory 
Committee (NMSAC); comments from the public following publication of 
the NMSAC recommendations and request for comment; and, the 
government's review of the NMSAC recommendations and comments received. 
The working specification is available to review at http://www.tsa.gov/twic 

and at http://dms.dot.gov in docket USCG-2007-27415.


DATES: The reader specifications and card application are available 
September 20, 2007.

FOR FURTHER INFORMATION CONTACT: John Schwartz, Office of 
Transportation Threat Assessment and Credentialing (TSA-19), 
Transportation Worker Identification Credential Program Transportation 
Security Administration, 601 South 12th Street, Arlington, VA 22202-
4220; telephone (571) 227-2177; facsimile (703) 603-0409; e-mail 
john.schwartz@dhs.gov.


Reviewing Comments and the TWIC Working Technology Specification in the 
Docket

    Please be aware that anyone is able to search the electronic form 
of all comments received into any of our dockets by the name of the 
individual submitting the comment (or signing the comment, if submitted 
on behalf of an association, business, labor union, etc.). You may 
review the applicable Privacy Act Statement published in the Federal 
Register on April 11, 2000 (65 FR 19477), or you may visit http://dms.dot.gov
.

    You may review the comments in the public docket by visiting the 
Dockets Office between 9 a.m. and 5 p.m., Monday through Friday, except 
Federal holidays. The Dockets Office is located in the West Building 
Ground Floor, Room W12-140, at the Department of Transportation 
address, previously provided under ADDRESSES. Also, you may review 
public dockets on the Internet at http://dms.dot.gov.


Availability of Document

    You can get an electronic copy of this Notice and the actual 
working specifications using the Internet by--
    (1) Searching the Department of Transportation's electronic Docket 
Management System (DMS) Web page (http://dms.dot.gov/search);    (2) Accessing the Government Printing Office's Web page at http://

http://www.gpoaccess.gov/fr/index.html (Notice only); or

    (3) Visiting TSA's Security Regulations Web page at http://www.tsa.gov
 and accessing the link for ``Research Center'' at the top 

of the page.
    In addition, copies are available by writing or calling the 
individual in the FOR FURTHER INFORMATION CONTACT section. Make sure to 
identify the docket number of this action.

I. Background

    The National Maritime Security Advisory Council (NMSAC) was created 
pursuant to the Federal Advisory Committee Act, 5 U.S.C., App. 2 (FACA) 
in 2003. The membership of NMSAC, which includes 21 voting members, was 
selected to represent a broad range of viewpoints regarding maritime 
security challenges and to advise the Secretary of Homeland Security 
through the Commandant of the Coast Guard of relevant maritime security 
issues.
    At the NMSAC meeting of November 14, 2006, the Coast Guard and TSA 
asked NMSAC to provide advice on a contactless biometric smart card 
application and reader specification for TWIC by February 28, 2007, 
taking into account expertise from the biometric credentialing industry 
and maritime/TWIC industry stakeholders. The specification is necessary 
for biometric readers and the TWICs that will be issued to individuals 
in the initial rollout of the TWIC program, beginning in the fall of 
2007, and that will be used in pilot programs required by the Security 
and Accountability for Every Port Act of 2006 (SAFE Port Act).\1\
---------------------------------------------------------------------------

    \1\ Pub. L. 109-347; October 13, 2006.
---------------------------------------------------------------------------

    TSA and Coast Guard provided NMSAC the following baseline 
requirements for the specification:
    1. Be non-proprietary;
    2. Incorporate appropriate security and privacy controls;
    3. Be interoperable with FIPS 201-1 credential specifications;
    4. Be capable of serving as a platform for future capabilities;
    5. Be capable of supporting maritime operations; and
    6. Be suitable for manufacturing.
    TSA and Coast Guard recommended that the task be addressed by 
dividing responsibilities to construct operational maritime 
requirements and technology specifications. We recommended that members 
of the maritime industry develop operational maritime requirements and 
address credential authentication (e.g. authentication time and 
process, and alternate authentication procedures) requirements; 
durability requirements; and credential management procedures, 
including key management. We recommended that the biometric 
credentialing experts develop technology specifications, including a 
smart card, reader, and keying specifications.
    In the course of our discussions with NMSAC, members of the 
committee stated that they did not wish to recommend a specification 
that included encryption of the biometric and corresponding processes 
to decrypt the biometric when the card engages the reader. Many of the 
NMSAC members asserted that encryption was not necessary because the 
biometric--a fingerprint minutiae template, rather than an actual 
fingerprint--should not require the added protection that encryption 
provides. Also, members of NMSAC did not want to take on the additional 
responsibility of key management, which would be necessary if the 
recommended specification included encryption. However, TSA and Coast 
Guard disagreed with NMSAC's suggestion that the fingerprint template 
does not need to be encrypted and therefore asked NMSAC to provide one 
specification with encryption of the biometric and a corresponding 
process to decrypt the biometric when the card engages the reader. The 
formal request from the TWIC program to NMSAC is available at the 
following URL: http://homeport.uscg.mil, and in the docket for this 

notice.
    On March 1, 2007, the Coast Guard received NMSAC's report, entitled 
``Recommendations on Developing a Contactless Biometric Specification 
for the TWIC.'' The report included two specifications. The first 
recommended specification, preferred by NMSAC for the reasons discussed 
in the paragraph above, does not provide for encryption of the TWIC 
cardholder's biometric fingerprint minutiae template. Without 
encryption, the template is transmitted in the clear and could be read 
by a third party whenever the card is energized by a contactless 
reader. Therefore, there is a risk that the template on the TWIC could 
be read without the knowledge or overt action of the cardholder.
    NMSAC's second specification includes encryption of the biometric 
fingerprint minutiae template, which will protect the template from 
being decrypted unless information on the card's magnetic stripe or 
contact integrated circuit chip (ICC), is also provided to the reader. 
The information on the card's magnetic strip (or ICC) is needed to 
decrypt the template, which is obtained contactlessly from the card.

[[Page 53786]]

This method of encryption protects the template from being read even if 
it is obtained covertly since the information on the card's magnetic 
stripe (or ICC) cannot be obtained without physical possession of the 
card. If a TWIC is physically obtained by someone other than the 
rightful owner, the information necessary to obtain and decrypt the 
template would be available to them.
    Note that each TWIC will contain three magnetic stripes and the 
first is reserved exclusively for TSA's use to store encryption 
information. Owner/operators may use the remaining two magnetic stripes 
for information that facilitates the use of local access control 
systems so long as doing so does not interfere with the information 
encoded by TSA on the first magnetic stripe that allows contactless 
operation of the TWIC. Technical specifications for the magnetic stripe 
and areas reserved for TSA use are contained in the TWIC contactless 
card and reader working specification.
    In March 2007, the Coast Guard published a Notice of Availability 
of the NMSAC Recommendations and requested comments from all interested 
parties. (72 FR 12626, March 16, 2007.) In addition to requesting 
general comments, Coast Guard asked the public to respond to specific 
questions, including: (1) Whether the use of a Personal Identification 
Number (PIN) is justified to further minimize the chance that a 
fingerprint template from a lost or stolen credential could be obtained 
by an unauthorized individual; (2) what, if any, privacy concerns exist 
if the fingerprint template is obtained by an unauthorized individual; 
(3) how the recommended specifications impact maritime security and 
operations; (4) how the recommended specifications impact existing 
physical access control systems (PACS); (5) whether TSA and Coast Guard 
should consider alternative designs; (6) how the recommended 
specifications impact product, system, and operational costs; (7) how 
quickly the recommended specifications could be incorporated into the 
design and manufacture of access control equipment; and (8) whether 
there should be a qualified products list (QPL) or equivalent regime.
    Over thirty separate entities submitted comments to these 
questions. The majority of commenters represented the maritime 
industry, but several technology companies and trade associations also 
responded. Generally, the commenters praised the work of the NMSAC TWIC 
Contactless Specification Workgroup. TSA and Coast Guard agree that 
NMSAC delivered excellent recommendations in a very short time-frame, 
and we greatly appreciate NMSAC's efforts in this important security 
endeavor. In the following section, we summarize all comments received.

II. Summary of Comments

Question 1--Additional Security Features

    Commenters generally agreed that the additional security feature 
mentioned, a PIN, was not a good idea for general use due to 
operational concerns. Others stated that a PIN should be considered 
only if it could be used in a way that does not adversely impact 
maritime operations. Many commenters stated that TWIC holders would 
likely forget their PINs, which would become burdensome to TWIC users 
and maritime operations. As for PIN length, the few who commented 
prefer a 4-digit PIN over a longer PIN.
    Only one commenter discussed an alternative security feature--the 
use of a smart card holder that protects information stored on the 
card's integrated circuit chip until the holder is activated by the 
card holder's live biometric. At least one commenter suggested that to 
help deter fraudulent use of the TWIC, fingerprint scanners associated 
with card readers should be able to confirm that the fingerprint being 
presented is that of a live person rather than an artificial replica of 
a fingerprint or fingerprint template. This capability is called 
``liveness'' detection.

Question 2--Privacy Concerns

    Most commenters from the maritime industry stated that maintaining 
the privacy of the information stored on the card is important, but 
they do not believe additional measures are necessary to protect the 
privacy of biometric fingerprint templates. However, commenters from 
the technology industry generally asserted that biometric fingerprint 
templates should be protected, and that the TWIC Privacy Key (TPK) 
scheme provided in NMSAC's alternative recommended specification is 
sufficient to protect the template.

Question 3--Vessel and Facility Security Operations

    A number of maritime commenters stated that use of a PIN and TPK 
card swipe scheme, and, encryption of the fingerprint biometric 
template have the potential to adversely impact port and facility 
operations. Specifically, commenters expressed concern about error 
rates that might impact gate throughput, particularly during times of 
high-volume access; and, the effect of requiring the use of both PINs 
and biometrics at certain Maritime Security (MARSEC) levels. Commenters 
also mentioned that the upcoming TWIC pilot program that TSA and Coast 
Guard are implementing to test card and reader interaction will be 
helpful in identifying impacts on facility and vessel operations.

Question 4--Impacts on Existing Physical Access Control Systems

    Commenters generally agreed that the TWIC program will have a 
significant impact on existing PACS if the two are integrated and will 
be duplicative if they are not. They cited the need for replacing or 
enhancing existing systems; additional trenching and related 
construction activities; and, installing or upgrading electrical power 
supplies and wiring to readers as examples of the impacts TWIC will 
have on existing PACS. Some commenters mentioned that the use of TPK 
would impact legacy PACS by requiring the modification or replacement 
of existing readers to include a magnetic stripe reading capability. 
Some commenters expressed concern that multiple credentials may be 
required of certain workers at certain locations and that multiple 
credentials would have to be processed to allow entry. Several 
commenters asserted that the cost of integration should be supported by 
Federal grant funding. One commenter suggested that TWIC PACS 
requirements should have a long phase-in period to allow facilities to 
use legacy equipment through the end of its useful life.

Question 5--Alternative Designs

    Commenters mentioned that any alternative designs should be 
evaluated in the context of the maritime operating requirements 
established by the NMSAC working group. Several commenters suggested 
that the short time period allotted for development of the technical 
specification may have prevented alternative designs from emerging. 
However, a technology industry commenter stated that alternatives were 
considered and rejected by the technology team during their 
deliberations. The commenter stated that the following alternative 
designs were considered and rejected:
1. Shared Symmetric Keys
    Key management is operationally complex and exposure of the key 
would have a negative impact on the entire TWIC system. Shared 
symmetric keys rely on one secret key to be distributed among all 
readers and cards to establish secure communications between card and 
reader. Keys must be changed

[[Page 53787]]

regularly, and securely distributed and stored to maintain system 
security. Secure key management would be difficult to accomplish due to 
the number and dispersion of TWIC readers.
2. Public Key Infrastructure (PKI)
    In a PKI system, secure communication and authentication are done 
using public key certificates which require online communication. The 
fragmented TWIC PACS would lack the real-time network access required 
of a PKI system.
3. Biometric Match-on-Card (MOC)
    MOC involves matching a biometric sample against a reference 
biometric template stored inside the secure environment of a smart 
card. The reference template cannot be read outside of the card, but is 
only used internally by the matching process inside the smart card. MOC 
is a relatively new approach within the smart card and biometrics 
industries and provides a good level of security and privacy. This is 
because the user's biometric information is protected by the smart card 
and is never released from the card. Internal to the smart card, MOC 
matches the user's live biometric template provided by an external 
biometric reader with the user's stored reference template. A major 
advantage to MOC over other approaches is that the card never releases 
personally identifying information (the biometric template) to the 
reader. Thus, the biometric could not be lifted or ``skimmed'' by an 
unauthorized individual. Also, under the MOC process, the need for 
reader authentication and associated reader key management is minimized 
because the reader only stores public keys that do not need to be 
protected from disclosure by using a Secure Access Module (SAM) to 
store secret keys to identify a particular smart card. With MOC, the 
transmission of the biometric template from the reader to the card is 
done using the public key and can only be decrypted using the private 
key that is stored securely on the smart card. For all of these 
reasons, MOC is a very promising technology to pursue. However, it has 
not been fully tested in a variety of laboratory or field settings and 
currently, there are no approved MOC standards. Therefore, we have 
determined that it would not be advisable to implement MOC for the 
upcoming TWIC rollout. We will continue to follow the development of 
MOC and if it matures for operational use, we will again consider its 
use in the maritime environment.
    One commenter requested that the distance between the card reader 
and the card be increased from four to 18 inches to allow truck drivers 
to remain in their cabs while their TWICs are read. Some commenters 
reiterated their view that the specification should not include 
encryption in any form.

Question 6--Cost Impacts

    A number of commenters reiterated their endorsement of NMSAC's non-
encryption recommendation to minimize costs. Commenters who operate 
existing PACS expressed concern about integrating TWIC into their 
operation, particularly if encryption of the biometric is required and 
if wiring upgrades are necessary to support TWIC readers. Commenters 
who do not have PACS now expressed concern about how much it will cost 
to purchase, install, and maintain TWIC systems.

Question 7--Incorporation of TWIC Into Existing Access Control 
Equipment

    Maritime industry commenters generally deferred this question to 
the technical experts. Technical commenters stated that the 
specifications TSA and Coast Guard choose for the TWIC program will 
determine the ease of design, manufacture, and integration. They also 
stated that knowledge gained through experience with designs for other 
PACS that share common attributes with TWIC will lessen the time needed 
to create TWIC PACS products. Conversely, features that are unique to 
TWIC will have to be created, but some commenters believe TWIC-unique 
features can be accommodated through software or firmware (i.e., 
computer programming instructions that are stored in a read-only memory 
unit rather than being implemented through software) applications for 
existing readers. The commenters estimate that it may take from only a 
few months up to 36 months to integrate TWIC with certain PACS designs.

Question 8--Quality Products List Process & Creation

    Almost universally, commenters agreed that TSA and Coast Guard 
should use a QPL process to help stakeholders know what equipment is 
best for use in the maritime environment. Many commented that the 
process the U.S. General Services Administration uses should be 
considered as a starting point for development of a TWIC QPL. 
Commenters also stated that product testing should include harsh 
maritime conditions.

III. Working Specification Selected

A. Summary of Selection

    TSA and the Coast Guard have selected the NMSAC alternate 
recommendation that requires encryption and use of the TWIC Privacy Key 
(TPK) as the working specification for readers that will be used during 
the pilot programs. If the readers that meet this working specification 
perform as planned during the pilot testing, we will finalize the 
specification as we complete the rulemaking that requires the use of 
readers. Also, it is important to note that the TWICs that will be 
issued this fall in the initial rollout of the TWIC program will 
operate as designed when engaged in readers that are built to this 
working specification.
    We are choosing to adopt this specification to protect the 
personally identifiable information (PII) contained in the TWIC from 
unintended disclosure while the TWIC is in the possession of the 
credential's rightful owner. Even assuming individuals suffer no real 
injury today if their template is taken or lifted through an 
unauthorized process, the template is personal information connected to 
that individual. Using a fingerprint template in lieu of a fingerprint 
image does not necessarily prevent the long-term potential for 
unauthorized use of personally identifying fingerprint information, if 
intercepted by unauthorized persons. Even assuming the fingerprint 
template cannot be reverse-engineered to produce an accurate duplicate 
fingerprint today, we cannot be certain that such a capability will not 
arise in the future. With the use of the TPK model, security and 
privacy protection are provided without the burden that other 
encryption models would place on PACS owners and operators.
    TSA and Coast Guard take the industry's concerns about adverse 
operational impacts very seriously. Consequently, as the card and 
readers are envisioned to operate when TWIC is fully implemented, use 
of a PIN will not be necessary to release the biometric unless the 
owner/operator chooses to use contact readers and the contact side of 
the credential. In addition, we are in the process of finalizing plans 
for the pilot tests required by the SAFE Port Act and we are working 
with experts within DHS to establish a very thorough test plan to 
evaluate the card-reader interface under a variety of conditions and 
assess its impact on operations. Through the pilot tests, we will 
investigate the impacts of requiring biometric identity verification on 
business processes, technology, and operations on facilities and 
vessels of

[[Page 53788]]

various size, type, and location. As detailed below, while the 
government has removed any specific language about MARSEC levels from 
the specifications, the pilot testing process will be used to evaluate 
various use case scenarios that will influence the upcoming TWIC reader 
rulemaking process, including TWIC card and reader use requirements at 
various MARSEC levels.
    We understand that the decision to implement the TPK model for 
contactless biometric identity verification will have impacts on the 
installed base of PACS systems. However, the TPK model allows 
facilities to integrate the model with their local PACS in several 
different ways. The TPK model allows use of: (1) The magnetic stripe to 
transfer TPK information by swiping the card through a magnetic strip 
reader and then presenting the card to a contactless reader to securely 
transmit the biometric template; (2) pre-registration of the 
information on the magnetic stripe into the local PACS and then 
presenting the card to a contactless reader; or (3) pre-registering the 
biometric minutiae templates into the local PACS until retrieved upon 
presentation of the TWIC to a contactless reader. The TPK model also 
allows several options for handheld readers. Handheld reader options 
include the use of either the contact or contactless portion of the 
TWIC to enable biometric identity verification.
    We do not wish to implement any alternative designs at this time. 
However, we may add additional security features to the card or card 
reader with due notice to the industry and regard for operational 
impacts. One alternative technology of particular interest to the 
government is match-on-card (MOC) technology. The TWIC program and 
Coast Guard remain in close contact with the National Institute of 
Standards and Technology (NIST) in their consideration of MOC 
technology for various Federal smart card and personal identification 
initiatives.
    We are mindful that cost is a strong consideration in the 
operational implementation of TWIC and we are working to minimize costs 
on the operational users of TWIC where possible. Also, we are working 
closely with other DHS components to continue to make available Port 
Security Grant funds to mitigate some of the costs to vessel and 
facility operators and owners of implementing the TWIC program.
    We have worked closely with the NMSAC working group to understand 
the impacts of the TWIC program on the maritime sector. Our choice of 
the TPK model is grounded in the specific recommendation of smart card, 
PACS, and biometrics industry experts involved in the NMSAC working 
group process and a thorough review of technology choices and impacts 
by government experts. These experts leveraged other similar 
technologies from contactless identification regimes in their 
deliberations. While implementation of the TWIC program should be as 
timely as possible, we understand that technical implementation 
timelines must incorporate engineering and manufacturing time, field 
testing, facility adaptation, and final field installation.
    We are encouraged by the positive responses we received regarding 
the creation of a QPL. However, unlike other government smart card 
programs, TWIC card readers, in most cases, will not be procured by the 
government. This lessens the ability of the government to leverage 
existing QPL-type programs already in existence, such as those 
supporting the Homeland Security Presidential Directive (HSPD)--12 
Personal Identity Verification (PIV) Program.

B. Technical Changes to the TPK Working Specification

    TSA and Coast Guard are making some technical modifications to the 
TPK working specification recommended by NMSAC. We believe these 
changes are necessary to further protect privacy and security for the 
TWIC program. There are four important changes involving verification 
of the cardholder unique identifier (CHUID) data, MARSEC level 
operations, biometric liveness detection, and contactless transmission 
speed that are discussed in detail below. In addition, we made minor 
changes to the specification that is discussed below.
B.1. Signature Verification of CHUID Data
    The NMSAC specification recommends that verification of the 
signature on the CHUID be optional. However, regardless of whether the 
credential is digitally signed, CHUID data can be copied or ``cloned'' 
to another card. Signature verification mitigates counterfeited CHUID 
data from being accepted as authentic. For this reason, verification of 
the digital signature on any CHUID unknown to a PACS is mandatory and 
is included in the final specification. Signature verification will 
have minimal performance impact to the contactless transaction and 
minimal impact on reader implementation.
B.2. Authentication Methods Used at MARSEC Levels:
    NMSAC recommended that CHUID authentication should be used at 
MARSEC 1 and biometric authentication should be used at MARSEC 2. 
Specifying authentication methods for various threat or risk levels is 
outside of the scope of a technical specification for contactless cards 
and readers, and is more appropriately addressed separately in the risk 
management and security requirements for maritime operators. Therefore, 
we have removed the MARSEC guidance relating to use of specific 
authentication levels at different MARSEC levels from the working 
specification.
B.3. Biometric Liveness Detection
    NMSAC recommended that biometric liveness detection may be employed 
in TWIC readers, making liveness detection optional. Liveness detection 
is an important means to prevent spoofing of a biometric sensor and is 
generally something that is strongly recommended by the reader 
industry. Because standards for liveness detection are currently not 
available, and there is no conformance testing protocol to validate its 
effectiveness, it is difficult to specify liveness detection as a 
mandatory requirement. However, we have changed the language for 
liveness detection from may to should, to stress that liveness 
detection (or attended verification) in TWIC readers is a highly 
desirable feature. This change will have no operational impact on TWIC 
contactless transactions.
B.4. Contactless Transmission Speed
    The contactless reader performance requirements in the NMSAC 
specification are based upon transaction completion time. We have 
determined that specific requirements for contactless transmission 
speed should be specified so that the reader will support negotiation 
of a contactless speed with the card that achieves at least 400K bits 
per second. This will minimize transaction timings based on 
transmission capabilities of both current and future TWIC card 
versions. This change will not adversely impact TWIC contactless 
transactions.

C. List of All Changes to the TPK Specification

    Listed below is a complete list of the changes TSA and Coast Guard 
have made to the TPK specification that NMSAC recommended. The changes 
of interest are discussed in detail above in Section III.B.
    1. Section 4, TWIC Modes of Operation. Requirement for specific

[[Page 53789]]

authentication modes to be used at specific MARSEC levels has been 
removed and available authentication modes have been clarified.
    2. Section 4, TWIC Modes of Operation. Ability to configure 
specific authentication modes depending on a given perimeter security 
requirement and to be used at differing MARSEC levels has been added.
    3. Section 4, TWIC Modes of Operation. Verification of CHUID 
signature changed to mandatory. CHUID signature is either verified 
once, either when the card holder's CHUID is registered in a local 
PACS, or read by the TWIC reader each time the card is presented for 
access.
    4. Section 5.1.1, Device Dimensions. Note added to stress 
contactless reader sensitivity to location and electromagnetic 
conditions of their environment.
    5. Section 6, Portable Reader Requirements. Requirements for 
confidentiality and authentication added for wireless devices used in 
physical access systems.
    6. Section 7, Operational Requirements. Contactless transmission 
speed requirement changed to support 106kbit/s, 212kbit/s or 424kbit/s, 
based on the card's capabilities.
    7. Section 7, Operational Requirements. Requirement added to reject 
transaction if multiple cards are simultaneously detected in the 
reader's contactless field.
    8. Section 8, Performance Requirements. Support for biometric 
liveness detection strengthened from ``may'' to ``should'' indicating a 
strong preference for liveness detection.
    9. Appendix A.1, CHUID Authentication. CHUID authentication 
clarified.
    10. Appendix A.2, TWIC Biometric Authentication. Biometric 
authentication clarified.
    11. Appendix A.3, Card Authentication Key Authentication. Card 
Authentication data object reference corrected.
    12. Appendix A.3, Card Authentication Key Authentication. Card 
Authentication Key usage clarified to indicate that it is only 
available via the PIV application, and is not shared with the TWIC 
application.
    13. Appendix D, TWIC Reader Compatibility with Other Card Types. 
Reader compatibility and default card support clarified and modified to 
allow configuration of default AID.
    14. Appendix E.4, Alternate Implementations. Minor clarifications 
to PACS enrollment.
    15. Appendix F, Proposed TWIC AID Structure. TSA RID added, AID 
structure clarified.

D. Future Changes to Specification

    TSA and Coast Guard will continue to evaluate and test the working 
specification as we implement the TWIC Pilot Program. We anticipate 
that, as with any testing program, we will encounter technical issues 
that can be corrected by making minor changes to the working 
specification. We will make such changes available to the public as 
they occur, through use of the following link/Web site: http://www.tsa.gov/twic.
 In addition, we will address any necessary changes to the working 

specification prior to finalizing the regulations requiring TWIC 
readers.

    Issued in Arlington, Virginia, on September 14, 2007.
Stephanie Rowe,
Assistant Administrator, Transportation Threat Assessment and 
Credentialing, Transportation Security Administration.
[FR Doc. 07-4649 Filed 9-19-07; 8:45 am]

BILLING CODE 4910-15-P