Combating Terrorism

Actions Needed to Improve Force Protection for DOD Deployments through Domestic Seaports Gao ID: GAO-03-15 October 22, 2002

The October 12, 2000, attack against the Navy destroyer U.S.S. Cole in the port of Aden illustrated the danger of unconventional threats to U.S. ships in seaports. The September 11, 2001, attacks further heightened the need for a significant change in conventional antiterrorist thinking, particularly regarding threats to the U.S. homeland. The new security paradigm assumes that all U.S. forces, be they abroad or at home, are vulnerable to attack, and that even those infrastructures traditionally considered of little interest to terrorists, such as commercial seaports in the continental United States, are now commonly recognized as highly vulnerable to potential terrorist attack. Of the more than 300 seaports in the United States, the Departments of Defense (DOD) and Transportation have designated 17 as "strategic," because in the event of a large-scale military deployment, DOD would need to transport more than 95 percent of all equipment and supplies needed for military operations by sea. If the strategic ports were attacked, not only could massive civilian casualties be sustained, but DOD could also lose precious cargo and time and be forced to rely heavily on its overburdened airlift capabilities. The security environment at strategic seaports remains uncertain because comprehensive assessments of threats, vulnerabilities, and critical port infrastructure and functions have not been completed, and no effective mechanism exists to coordinate and disseminate threat information at the seaports. GAO identified two significant weaknesses in DOD's force protection process for deployments through domestic seaports. First, DOD lacks a central authority responsible for overseeing force protection measures of DOD organizations that move forces from domestic installations through U.S. seaports. Second, during some phases of a deployment, DOD transfers custody of its military equipment to non-DOD entities, including foreign-owned ships crewed by non-U.S. citizens.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-03-15, Combating Terrorism: Actions Needed to Improve Force Protection for DOD Deployments through Domestic Seaports This is the accessible text file for GAO report number GAO-03-15 entitled 'Combating Terrorism: Actions Needed to Improve Force Protection for DOD Deployments through Domestic Seaports' which was released on November 21, 2002. This text file was formatted by the U.S. General Accounting Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products‘ accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. Report to the Chairman, Subcommittee on National Security, Veterans Affairs, and International Relations, Committee on Government Reform, House of Representatives: United States General Accounting Office: GAO: October 2002: combating terrorism: Actions Needed to Improve Force Protection for DOD Deployments through Domestic Seaports: Combating Terrorism: GAO-03-15: Contents: Letter: Results in Brief: Background: Current Risk Management Approach Creates Uncertainties about the Security Environment at Strategic Seaports: Weaknesses in DOD Force Protection Process Increase Risks for Deployments through Domestic Seaports: Conclusions: Recommendations for Executive Action: Agency Comments and Our Review: Appendix I: Scope and Methodology: Appendix II: Comments from the Department of Defense: Appendix III: GAO Contacts and Staff Acknowledgments: Related GAO Products: Tables: Table 1: Ownership and Crew for Commercial Ships Used in Deployments GAO Reviewed from Three Installations in 2001: Table 2: Examples of Equipment Carried on Foreign-Owned and Foreign- Crewed Ships: Figures: Figure 1: Reserve Sealift Ships Berthed at a Commercial Seaport: Figure 2: A Commercial Container Vessel and Related Infrastructure at a Seaport: Figure 3: Coast Guard Crew in a Rigid Hull Inflatable Boat Demonstrating Enforcement of a Security Zone at a Commercial Port: Figure 4: The Domestic Phases of the Deployment Process and Responsible Organizations: United States General Accounting Office: Washington, DC 20548: October 22, 2002: The Honorable Christopher Shays Chairman, Subcommittee on National Security, Veterans Affairs, and International Relations Committee on Government Reform House of Representatives: Dear Mr. Chairman: The October 12, 2000, attack against the Navy destroyer U.S.S. Cole in the port of Aden illustrated the danger of unconventional threats to U.S. ships in seaports. The September 11 attacks further heightened the need for a significant change in conventional antiterrorist thinking, particularly regarding threats to the U.S. homeland. The new security paradigm assumes that all U.S. forces, be they abroad or at home, are vulnerable to attack, and that even those infrastructures traditionally considered of little interest to terrorists, such as commercial seaports in the continental United States, are now commonly recognized as highly vulnerable to potential terrorist attack. The Department of Defense (DOD) and all agencies associated with seaport security recognize this new paradigm and are taking steps to reduce vulnerabilities and increase security. Of the more than 300 seaports in the United States, the Departments of Defense and Transportation have designated 17 as ’strategic,“ because in the event of a large-scale military deployment, DOD would transport more than 95 percent of all equipment and supplies needed for military operations by sea. These ports are therefore vital to national security. If the strategic ports (or the ships carrying military supplies) were attacked, not only could massive civilian casualties be sustained, but DOD could also lose precious cargo and time and be forced to rely heavily on its overburdened airlift capabilities. Military commanders are responsible for the protection of personnel, equipment, and other assets. To achieve this objective, commanders apply a ’risk management“ approach, which is a systematic, analytical process to determine the likelihood that a threat will negatively impact physical assets, individuals, or operations and identify actions to reduce risk and mitigate the consequences of an attack. The principles of risk management acknowledge that although risk generally cannot be eliminated, it can be significantly reduced by enhancing protection from known or potential threats. You asked us to examine how DOD protects its forces and assets as it deploys them through strategic commercial seaports. This report focuses on domestic seaports and analyzes (1) the security environment at domestic strategic seaports used by DOD for military deployments and (2) DOD‘s process for securing military deployments through those ports. Overseas seaports will be the focus of a subsequent review. As part of our evaluation, we examined seaport force protection efforts at six strategic seaports in the United States. Although the information we obtained at these locations cannot be generalized to describe DOD‘s overall seaport force protection, it provides insight into how force protection efforts at strategic seaports were implemented at selected locations. For security reasons, we do not discuss location-specific information in this report. Further information on our scope and methodology appears in appendix I. Results in Brief: The security environment at strategic seaports remains uncertain because comprehensive assessments of threats, vulnerabilities, and critical port infrastructure and functions have not been completed, and no effective mechanism exists to coordinate and disseminate threat information at the seaports. These conditions compound the already difficult task of protecting deploying forces and increase the risk that threats--both traditional and nontraditional[Footnote 1] ones-- may not be recognized or that threat information may not be communicated in a timely manner to all relevant organizations. Recent efforts by the Coast Guard, the Transportation Security Administration, and other agencies at the ports have begun to address many of these weaknesses. The Coast Guard initiated vulnerability assessments of port infrastructure and is deploying additional teams dedicated to seaport security. Further, if enacted, legislation currently before the Congress proposes steps that may assist these efforts and provides additional measures that could improve the coordination and dissemination of threat information. We identified two significant weaknesses in DOD‘s force protection process for deployments through domestic seaports. First, DOD lacks a central authority responsible for overseeing force protection measures of DOD organizations that move forces from domestic installations through U.S. seaports. As a result, potential force protection gaps and weaknesses requiring attention and action might be overlooked. DOD has such an authority for the overseas portions of deployments and is therefore better able to identify and mitigate force protection gaps there. Second, during some phases of a deployment, DOD transfers custody of its military equipment to non-DOD entities, including foreign-owned ships crewed by non-U.S. citizens. Although consistent with current DOD policies and procedures, this practice limits DOD‘s ability to provide security oversight. As a result, equipment could fall into the hands of individuals or groups whose interests are counter to those of the United States. We are making recommendations to improve (1) threat information coordination at strategic seaports, (2) DOD‘s oversight and coordination of force protection for deployments through seaports, and (3) DOD‘s control over the in-transit phases of a movement of equipment. In comments on a draft of this report, the Departments of Defense and Transportation generally agreed with the contents of this report and its recommendations. Background: DOD defines force protection as ’actions taken to prevent or mitigate hostile actions against Department of Defense personnel (to include family members), resources, facilities, and critical information.“[Footnote 2] Our review concentrated mostly on the physical security and related aspects of force protection that include measures to protect personnel and property and encompass consequence management, intelligence, and critical infrastructure protection. We have identified a risk management approach used by DOD to defend against terrorism that also has relevance for the organizations responsible for security at commercial seaports. This approach can provide a process to enhance preparedness to respond to terrorist attacks or other emergencies, whether natural or man-made (intentional or unintentional). The approach is based on assessing threats, vulnerabilities, and criticalities (the importance of critical infrastructure and functions). Threat assessments identify and evaluate potential threats on the basis of factors such as capabilities, intentions, and past activities. These assessments represent a systematic approach to identifying potential threats before they materialize. However, even if updated frequently, threat assessments may not adequately capture all emerging threats. The risk management approach therefore uses vulnerability and criticality assessments as additional input to the decision-making process. Vulnerability assessments identify weaknesses that may be exploited by identified threats and suggest options that address those weaknesses. For example, a vulnerability assessment might reveal weaknesses in a seaport‘s security systems, police force, computer networks, or unprotected key infrastructure such as water supplies, bridges, and tunnels. In general, teams of experts skilled in areas such as structural engineering, physical security, and other disciplines conduct these assessments. Criticality assessments evaluate and prioritize important assets and functions in terms of factors such as mission and significance as a target. For example, certain power plants, bridges, computer networks, or population centers might be identified as important to the operation of a seaport. Criticality assessments provide a basis for identifying which assets and structures are more important to protect from attack. These assessments also help determine mission-essential requirements to better prioritize limited force protection resources while reducing the potential for expending resources on lower priority assets. In the event of a major military mobilization and overseas deployment, such as Operation Desert Shield, a large percentage of U.S. forces (equipment and other materiel) would be sent by sea through a number of commercial seaports in the United States to their respective areas of operations. [Footnote 3] To accomplish this, DOD would use several shipping methods, including government-owned and maintained reserve sealift ships[Footnote 4] and ships operated or chartered by the Military Sealift Command. Figure 1 shows two reserve sealift ships berthed at a commercial seaport. Figure 1: Reserve Sealift Ships Berthed at a Commercial Seaport: [See PDF for image] Source: GAO. [End of figure] The military also uses commercial seaports for deployments such as those to operations in the Balkans. The Departments of Defense and Transportation have identified 17 seaports on the Pacific, Atlantic, and Gulf Coasts (13 commercial ports, 1 military port, and 3 military ammunition ports) as ’strategic,“ meaning that they are necessary for use by DOD in the event of a large scale military deployment. Because the security activities that DOD may conduct outside its installations are limited, it must work closely with a broad range of federal, state, and local agencies to ensure that adequate force protection measures exist and are executed during deployments through strategic seaports. Force protection responsibilities for DOD deployments through commercial seaports are divided among a number of DOD organizations including the U.S. Transportation Command and its components (particularly the Military Traffic Management Command and the Military Sealift Command), the U.S. Army Forces Command, and individual deploying units. Port Readiness Committees[Footnote 5] at each strategic port provide a common coordination structure for DOD, the Coast Guard, and other federal, state, and local agencies at the port level and are the principal interface between DOD and other officials at the ports during the movement of military equipment. The Port Readiness Committees are focused largely on preparing for potential military movements through a port and not on day-to-day security concerns at the port. The issue of security at the nation‘s seaports has been the subject of a recent major study, as has the broader issue of homeland security. In fall 2000, the Interagency Commission on Crime and Security in U.S. Seaports reported that security at seaports needed to be improved in a number of areas, including: * assessments of threats, vulnerabilities, and critical infrastructure at ports; * coordination and cooperation among agencies; and: * establishment of guidelines for commercial facilities handling military cargo. In February 2001, the Commission on National Security/21st Century (commonly referred to as the Hart-Rudman Commission) reported that threats such as international terrorism would place the U.S. homeland in great danger. In addition to recommending national action, the commission urged DOD to pay closer attention to operations within the United States. Current Risk Management Approach Creates Uncertainties about the Security Environment at Strategic Seaports: The security environment at strategic seaports is uncertain because comprehensive assessments of threats, vulnerabilities, and port infrastructure and functions have not been completed. Recent efforts by the Coast Guard, the Transportation Security Administration, and other agencies at the ports have begun to address several important security issues, and maritime security legislation before the Congress may assist these efforts. Further, proposed legislation may provide a framework for seaport organizations to improve the coordination and dissemination of threat information. Weaknesses Exist in the Process to Assess Risk at Seaports: There is a wide range of vulnerabilities at strategic seaports, including critical infrastructure such as bridges and refineries in close proximity to open shoreline, shipping containers with unknown contents, and an enormous volume of foreign and domestic shipping traffic. Figure 2 illustrates typical commercial port infrastructure and operations. Figure 2: A Commercial Container Vessel and Related Infrastructure at a Seaport: [See PDF for image] Source: GAO. [End of figure] Many of the organizations responsible for seaport security do not have the resources (such as trained personnel, equipment, and funding) necessary to mitigate all vulnerabilities. To determine how best to allocate available resources and address security at seaports, it is vital that responsible agencies involved follow a risk management approach that includes assessments of threats, vulnerabilities, and critical infrastructure and functions. The results of these assessments should then be used to better conduct risk-based decisions involving security planning and actions. Since September 11, the organizations responsible for security at strategic seaports have increased emphasis on security planning. They now recognize that planning must include the protection of critical seaport infrastructure and assets that have not generally been considered vulnerable. Port authority officials stated that increased security planning has led to improvements in physical security, such as higher fences, more security personnel, and better coordination with local law enforcement and other agencies. The Coast Guard has taken broad actions forward and has redirected resources towards security planning improvements. However, in their planning efforts, the organizations at the ports we visited applied the elements of risk management differently. At only one of six ports we visited were the results of threat, vulnerability, and criticality assessments incorporated into a seaport security plan that included all relevant agencies. The Port Mobilization Master Plan developed by the Port Readiness Committee at this port employs a risk- based process and systematically identifies the mission, responsibilities, and functional relationships of each activity or agency involved in supporting a military deployment through the port.[Footnote 6] Specific weaknesses in the assessment process used at ports we studied include the following: * Individual organizations at the seaports conducted separate vulnerability assessments that were not coordinated with those of other agencies and were not based on standardized approaches. The Coast Guard has taken the lead in developing a standard methodology for comprehensive portwide vulnerability assessments (also called port security assessments) that it plans to complete at 50 major ports, including all strategic seaports. * Assessments of the criticality of seaport infrastructure were not done at all the ports we visited prior to September 11. The Coast Guard has since addressed this shortcoming by conducting assessments of high- risk infrastructure at all major ports. It coordinated the assessments with commercial facilities at the ports. Criticality of seaport assets and functions will also be incorporated into the port security assessments. * In some cases, threat assessment information received by agencies at the ports is based on higher-level regional assessments that do not focus on the local port facility. These regional assessments, while helpful in providing a broader view of the security environment, do not provide site-specific local threat information to the port. * Agencies involved with seaport security have different concepts of how threat assessments should be developed and the degree to which threat information should be shared and disseminated. Some agencies have not traditionally shared threat information as widely as may be necessary for comprehensive security measures at seaports. In addition to these specific weaknesses, we found that there is no single mechanism (such as a working group or committee) at the seaports we visited to analyze, coordinate, and disseminate information on a routine basis on the broad range of threats at each port. Most threat information at the ports was coordinated on an informal basis, such as through personal contacts between law enforcement individuals and those at other agencies. The lack of such a mechanism compounds the already difficult task of protecting deploying military forces and increases the risk that threats--both traditional and nontraditional ones--may not be recognized or that threat information may not be communicated in a timely manner to all relevant organizations. Currently, interagency bodies at or near the ports, such as port readiness committees, joint terrorism task forces, or the newly formed antiterrorism task forces, do not routinely coordinate threat information focused solely on the ports. The port readiness committees were designed to prepare commercial ports to conduct military movements. The task forces were designed to focus on threat information but on a regional rather than a port level. The need for efficient coordination of threat information has been amply documented and recognized, and there are examples of improved coordination efforts. The Interagency Commission on Crime and Security in U.S. Seaports noted in 2000 the importance of interagency threat coordination. The commission said that officials at seaports need a means to analyze, coordinate, and disseminate information on the broad range of threats they face. This includes information on ships, crews, and cargo and information on criminal, terrorist, and other threats with foreign and domestic origins. Although the commission did not recommend centralizing threat information distribution into a single agency or regulating dissemination procedures at seaports, it did recommend improvements in integrating threat information systems and improved coordination mechanisms for law enforcement agencies at the seaport level. Furthermore, the Coast Guard recognizes that agencies involved with seaport security are currently unable to adequately analyze, share, and exploit available threat information, and it also recognizes that asymmetric[Footnote 7] military and terrorist threats have a natural gateway into America via its ports. In response, the Coast Guard has developed a ’maritime domain awareness“ concept that emphasizes a risk management approach for preventing or mitigating both traditional and nontraditional threats through the analysis and dissemination of threat information. The concept involves being knowledgeable of all activities and elements in the maritime domain that could represent threats to the safety, security, or environment of the United States or its citizens. Through the timely delivery to the appropriate civilian or military authorities of processed information, drawn from all available sources, effective actions involving limited resources can be taken. Additionally, the maritime domain awareness concept allows the Coast Guard and other relevant agencies to incorporate nontraditional threat information, such as unintentional biological hazards in empty cargo containers or impending weather hazards into actionable intelligence. Both of these issues can constitute potential threats to a port and its operation. In commenting on a draft of this report, Transportation Security Administration officials agreed that the coordination and dissemination of threat information at the port level is an issue that needs to be addressed. They noted that the Transportation Security Administration is overseeing studies (as part of ’Operation Safe Commerce“) aimed at identifying potential threats and risk mitigation techniques that will contribute to meeting this goal. Finally, as we have previously reported, DOD uses threat working groups at its installations as a forum to involve installation force protection personnel with local, state, and federal law enforcement officials to identify potential threats to the installation and to improve communication between these organizations.[Footnote 8] These working groups help coordinate as much information as possible on a broad range of potential threats. Given the limited information available on threats posed by terrorist groups or individuals, such a mechanism assists the installation commander and local authorities in gaining a more complete picture of internal and external threats on a more continuous basis over and above what is provided by an annual threat assessment. Recent Efforts and Proposed Legislation May Assist Port Security Improvements: Since the September 11 attacks, the Coast Guard and other agencies at ports have made efforts to improve risk management and security measures. The Coast Guard, traditionally a multimission organization, has made a significant shift in operational focus toward seaport security. In so doing, the Coast Guard, in the months immediately following September 2001, diverted resources from other missions such as drug interdiction but has since restored some of its effort in those areas. Examples of additional recent efforts by the Coast Guard and other agencies include: * formation of Coast Guard maritime safety and security teams based at selected ports to assist in providing port security personnel and equipment; * Coast Guard escorts or boarding of high-risk ships, including cruise ships, in ports; * Coast Guard escorts for naval vessels; * establishment and enforcement of new security zones and increased harbor security patrols (figure 3); and: * port authority cost estimates for improving facility security and interim security improvement measures. In commenting on a draft of this report, Transportation Security Administration officials indicated that they are taking initial steps toward accomplishing seaport security goals by awarding approximately $217 million in grants (funded through both regular and emergency appropriations) to public and private entities at the ports for initial security assessments, preliminary security improvements, and port incident response training. Figure 3: Coast Guard Crew in a Rigid Hull Inflatable Boat Demonstrating Enforcement of a Security Zone at a Commercial Port: [See PDF for image] Source: GAO. [End of figure] Legislation on maritime security before the Congress (as of October 22, 2002)[Footnote 9] may promote and enhance these seaport security efforts. Some of the major provisions include: * vulnerability assessments to be conducted at ports; * establishment of port security committees at each port, with broad representation by relevant agencies, to plan and oversee security measures; * development of standardized port security plans; * background checks and access control to sensitive areas for port workers; and: * federal grants for security improvements. On the basis of our discussions with agency officials at the ports we visited, we believe that if enacted and properly implemented, these and other provisions of the maritime security legislation should assist officials in addressing many of the weaknesses we have identified. For example, comprehensive vulnerability assessments and the proposed standardized security plans could provide a more consistent approach to identifying and mitigating security weaknesses. In providing for port security committees and interagency coordination, the legislation would also provide a framework for organizations at seaports to establish a mechanism to coordinate, analyze, and disseminate threat information at the port level. There may be challenges, however, to implementing the maritime security legislation, including uncertainty about the amount and sources of funds needed to address security needs at seaports. We recently reported on these and other challenges to implementing the provisions of this legislation and the establishment of a new Department of Homeland Security.[Footnote 10] In commenting on a draft of this report, Coast Guard officials reported that notwithstanding the status of the proposed legislation, port security committees have already been established at some major ports and that the Coast Guard is preparing a nationwide policy to delineate the purpose and composition of these committees. Coast Guard officials believe that in addition to consideration of vulnerabilities and security planning, the port security committees, as currently envisioned, may provide a more effective mechanism for threat information coordination. Weaknesses in DOD Force Protection Process Increase Risks for Deployments through Domestic Seaports: During our review, we identified two significant weaknesses in DOD‘s force protection process. First, DOD lacks a central authority responsible for overseeing force protection measures of DOD organizations while carrying out the various domestic phases of military deployments to and through U.S. seaports. As a result, potential force protection gaps and weaknesses requiring attention and action might be overlooked. Second, there are instances during some phases of these deployments when DOD transfers custody of its military equipment to nongovernment entities. At these times, the equipment could fall into the hands of individuals or groups whose interests are counter to those of the United States. DOD Lacks a Central Authority to Coordinate and Execute Domestic Force Protection Measures: Deploying units traditionally focus their force protection efforts primarily on their overseas operations. Before they arrive in an overseas region, the units are required to submit force protection plans to the unified combatant commanders, who are responsible for force protection of all military units in their regions, with the exception of DOD personnel assigned to the Department of State. The tactics, techniques, and procedures in the units‘ plans must match the guidance developed by the unified commander, who coordinates and approves the individual plans. This allows the commander to ensure that a unit‘s plan takes into account all current threats that could affect the mission and to accept or mitigate any security risks that arise. The situation for the domestic phases of overseas deployments is different: there is no designated commander with centralized force protection responsibilities similar to those of the overseas unified combatant commander. This creates gaps, during the domestic phases of a deployment, in DOD‘s ability to coordinate individual force protection plans, identify gaps that may exist, and mitigate the identified risk. The one coordination mechanism that is in place--the Port Readiness Committee--is focused largely on port operations and at this time does not coordinate all phases of a deployment from an installation through the port. Figure 4 illustrates the domestic phases of a deployment and key organizations responsible for force protection. Figure 4: The Domestic Phases of the Deployment Process and Responsible Organizations: Source: GAO, based on DOD information. In the deployments we reviewed, service guidance and DOD antiterrorism standards, particularly those that emphasize the elements of risk management (such as Army major command force protection operations orders), were not always followed in all phases of a deployment from an installation through a port. For example, the Military Traffic Management Command‘s transportation units recognized the vulnerability of seaport operations and prepared security plans for deployment operations at the ports that were based on assessments of threats, vulnerabilities, and critical infrastructure. The transport of military equipment to the port by commercial carrier was not always supported by such detailed plans and assessments. In contrast, we found that when a military unit travels by road to a seaport in its own convoy, it generally follows exhaustive planning and risk management measures. In discussing the absence of a focal point for coordinating and executing force protection measures for the domestic phases of military deployments, DOD officials indicated that the recently established U.S. Northern Command may serve as such a coordinating mechanism. Additionally, in commenting on a draft of this report, DOD officials noted that the principal defense guidance on military transportation issues[Footnote 11] is in the process of being revised to incorporate force protection guidance. Military Equipment and Cargo Are Sometimes Not under DOD Control: During deployments from domestic installations through commercial seaports, there are three phases in which DOD either transfers custody of its equipment to nongovernment persons (in some cases foreign nationals) or does not have adequate information about who is handling its equipment, as follows: * Private trucking and railroad carriers transport equipment and cargo from military installations to seaports. * Civilian port workers handle and load equipment onto ships. * Private shipping companies with civilian crews sometimes transport DOD equipment overseas. The four deployments we reviewed from three military installations in 2001 involved the use of road and rail contract carriers transporting equipment from the installation to a port of embarkation. Contract carriers are required to provide security for the equipment they transport, including sensitive items. For example, contract carriers are required to provide their own security at railroad switching yards, rest areas, overnight stops, and along the entire route whenever they transport sensitive equipment. Although we did not review the steps taken by DOD to evaluate the contractors‘ security measures, the transfer of accountability to these nongovernmental agents creates a gap in DOD‘s oversight of its assets between installations and ports. Once equipment arrives at a commercial seaport, it comes under the control of the military units responsible for managing the loading process. However, civilian port workers, stevedores, and longshoremen- -who undergo limited screening and background checks by port authorities or terminal operators--handle military equipment and cargo, as well as the loading and unloading of ships used to transport the equipment overseas. This was the case in all the deployments we reviewed. In all cases, the stevedores or longshoremen were in the same labor pool as the one used for commercial port operations. While DOD officials have not identified port workers as a particular threat, they are concerned that lack of information on the background of individuals handling military equipment increases potential risk. Organizations at some of the ports we visited are now implementing or reviewing efforts to increase screening of port workers. And the maritime security legislation currently before the Congress includes provisions for background checks and access control for port workers. These measures, if approved and properly implemented, may help address this issue. In commenting on a draft of this report, Transportation Security Administration officials acknowledged the problems posed by the lack of screening for port workers and indicated that they plan to study and eventually issue nationwide standards for credentialing port workers. DOD also transfers custody of its equipment when the equipment is placed aboard a commercial ship for transport overseas. We reviewed four major overseas deployments from three military installations during calendar year 2001 that involved about 6,550 tons of military equipment and supplies. Although these four deployments are not representative of all DOD deployments conducted in 2001, they do illustrate the use of foreign-owned commercial vessels by DOD. In commenting on a draft of this report, DOD officials stated that about 43 percent of cargo shipped overseas in 2001 as part of deployments involving major equipment in support of overseas operations was carried on foreign-flagged ships.[Footnote 12] As indicated in table 1, most of the ships for the deployments we reviewed were both foreign-owned and foreign-crewed. Table 1: Ownership and Crew for Commercial Ships Used in Deployments GAO Reviewed from Three Installations in 2001: [See PDF for table] [End of table] In addition to transferring custody over its assets to non-DOD personnel, DOD did not generally provide security forces aboard these vessels. Several of the ships used in the deployments we reviewed did have DOD maintenance personnel aboard, but the ship manifests did not indicate that armed DOD personnel were aboard as a security force. The Military Sealift Command reviews charter vessel crew lists to determine whether any crewmembers are known security threats. Some of the materiel transported by these vessels included sensitive and mission essential items. Table 2 provides examples of equipment carried aboard foreign-owned and foreign-crewed ships for the deployments we reviewed. Table 2: Examples of Equipment Carried on Foreign-Owned and Foreign- Crewed Ships: Equipment Category: Major weapon system; Example: * Bradley fighting vehicles; * 155mm howitzers; * Apache attack helicopters; * Blackhawk helicopters; * Stinger anti-aircraft launchers; * Armored light vehicles. Equipment Category: Other weapons; Example: * Antitank missile launchers; * .50 caliber machineguns; * 40mm grenade launchers; * 9mm pistols; * M-16A2 rifles; * Squad automatic weapons; * Bayonets. Equipment Category: Individual equipment; Example: * Night vision goggles; * Minefield marking system; * Chemical agent monitor; * Body armor; * Nuclear, biological, and chemical protective suits and masks; * Mine detection sets; * Global positioning system receivers. Equipment Category: Communications equipment; Example: * Radio sets; * Antenna assemblies; * Satellite communications terminals. Source: DOD. [End of table] When DOD relinquishes control over its equipment, it relies on nongovernment third parties to protect its assets. Placing military equipment outside DOD‘s control also complicates the steps needed to mitigate the higher risk and could disrupt military units from performing their intended missions. An example of the dangers of such loss of control occurred in summer 2000. While in the North Atlantic, the captain of a commercial vessel carrying Canadian military equipment and three Canadian Forces personnel from the Balkans refused to proceed to the ship‘s destination port in Canada after a dispute over payment to the vessel‘s owner. The vessel, GTS Katie, was owned by a U.S. company but registered in St. Vincent and the Grenadines and crewed by non-U.S. citizens. Alarmed at the loss of control over its equipment, including sensitive items, the Canadian government was compelled to board the Katie with a contingent of Canadian Forces naval personnel from a nearby warship. The vessel was then brought safely into a Canadian port.[Footnote 13] The Canadian Defense Minister explained that the loss of control over military equipment compromised Canada‘s ongoing military operations and the ability to undertake new ones.[Footnote 14] Similarly, when the third parties to whom DOD relinquishes control of its equipment include foreign nationals, there may be an increased risk of the equipment being tampered with, seized, or destroyed by individuals or groups whose interests run counter to those of the United States and an increased chance that those weapons or equipment might be used against military or civilian targets. During our review, officials from several military commands expressed concern about placing military equipment aboard ships that are outside DOD control. DOD officials told us that the reasons for the use of commercial contract carriers include, among others, economy and efficiency over using government-owned and -operated vessels and the adequacy and availability of the U.S.-flagged merchant marine. In commenting on a draft of this report, Maritime Administration officials agreed with our concerns related to the use of foreign ships and crews to transport sensitive military equipment and reiterated their interest in increasing the number of U.S.-flag vessels appropriate for DOD use. They indicated that the shortage of appropriate U.S.-flagged ships will be exacerbated by Military Sealift Command plans to terminate existing charters for some U.S.-flag vessels. Conclusions: The events of September 11 highlighted the vulnerability of the U.S. homeland to unconventional attack, and the resulting new security environment warrants that more attention be paid to the domestic phases of military deployments. It is clearly evident that since September 11, DOD and the organizations responsible for seaport security recognize the need for increased vigilance at home during the domestic phases of a military deployment, and this recognition provides an opportunity to improve seaport security in a systematic and effective manner. However, the inadequate assessment of threats and vulnerabilities and lack of comprehensive security plans prevent organizations at seaports and DOD from thoroughly analyzing the security environment at the ports. This hampers the identification and prioritization of requirements for the protection of critical assets. This situation compounds an already difficult task of protecting deploying DOD forces. However, if enacted and properly implemented, pending maritime security legislation would address most of these issues. We are therefore making no recommendations in this area. The absence of a mechanism at the strategic seaports for coordinating and disseminating comprehensive threat information increases the risk that threats--both traditional and nontraditional--will not be identified and appropriately communicated to all relevant organizations. If established at the port level such a mechanism could provide a formal, rather than informal and ad-hoc, process for coordinating information, and it could focus on port-specific threats, rather than a regionwide perspective. A central coordination mechanism could also provide a means to analyze threats on a continuous basis. Without a DOD authority or organization to coordinate force protection planning and execution for the domestic phases of DOD deployments to and through strategic seaports, potential gaps in force protection may go unnoticed, increasing the risk to DOD operations and equipment. Having such an authority would not only reduce such risks, but would also provide oversight to ensure that risk management and antiterrorism standards are consistently applied through all phases of a deployment from an installation through a port. When military equipment is entrusted to non-DOD personnel, with limited DOD control over the equipment, there is a greater risk that it could be tampered with, seized, or destroyed. While we recognize there are times during a deployment when DOD will relinquish direct control of its equipment, the new security environment warrants that DOD re- evaluate its current policies and procedures to ensure that appropriate security measures are applied during these times. Weaknesses in DOD‘s force protection approach along with uncertainties in the security environment at strategic seaports result in increased risks that military operations could be disrupted, successful terrorist attacks might occur, or sophisticated military equipment might be seized by individuals or organizations whose interests run counter to those of the United States. Recommendations for Executive Action: To improve the information available to develop effective seaport security measures, we recommend that the Secretary of Transportation identify and direct the appropriate transportation agency to develop a mechanism at the port level to compile, coordinate, analyze, and disseminate threat information on a real-time basis to all relevant organizations. Such a mechanism might be similar to DOD‘s threat working groups but with broader membership or be part of an existing coordinating body (such as the proposed port security committees or the joint terrorism task forces). Whether established as a new entity or as a modification of an existing coordinating body, this mechanism should include representatives from a broad range of federal, state, and local agencies. It should also include in its assessment process nontraditional threats such as natural emergencies and information technology attacks. To improve DOD‘s oversight and execution of force protection for deployments to and through domestic strategic seaports, we recommend that the Secretary of Defense: * designate a single authority (such as the recently established U.S. Northern Command) to coordinate and execute force protection planning for deployments of units from installations in the United States through seaports and until ships enter the destination areas of operation (this responsibility would be similar to that of the overseas unified combatant commands for their respective areas of operation) and: * direct the single coordinating authority (once established), along with the U.S. Transportation Command, to develop and implement measures to maintain greater security over equipment transported by non-DOD carriers. Agency Comments and Our Review: DOD agreed with the need for a single DOD authority to coordinate and execute force protection planning for deployments from installations in the United States through seaports and until ships enter the destination areas of operation. In commenting on this report, DOD stated that the recently established U.S. Northern Command will work closely with the U.S. Transportation Command to examine security for deployments through domestic seaports. DOD also agreed with the need for measures to maintain greater security over equipment transported by non-DOD carriers. In its comments, however, DOD stated that it has for decades relied on the commercial sector to provide a large portion of the nation‘s strategic sealift capabilities in both peacetime and during contingencies and that it is not cost effective to use government-owned sealift vessels for routine cargo movements or force rotations of the type included in GAO‘s analysis. Nonetheless, DOD stated that the U.S. Transportation Command and the new U.S. Northern Command will continue to seek ways to improve the security of DOD cargo transported via commercial carrier, including the use of satellite tracking of cargo and vessels and placing security personnel aboard those ships. On those occasions when DOD transfers custody of its equipment to non-DOD carriers, the kinds of additional measures DOD discussed should help improve the overall security of sensitive DOD cargoes. DOD‘s written comments are included in their entirety in appendix II. In addition, DOD officials suggested a number of technical clarifications and corrections, which we have incorporated into this report where appropriate. In oral comments on a draft of this report, Department of Transportation officials generally agreed with the findings, conclusions, and recommendations. They also provided additional information and suggested a number of technical clarifications and corrections, which we have incorporated into this report where appropriate. Transportation officials discussed several new and ongoing efforts affecting seaport security by the newly established Transportation Security Administration. Among other initiatives, these include measures for seaport security grants, studies on credentialing port workers, and a study on developing a threat assessment center. These initiatives are funded through regular and emergency appropriations for fiscal year 2002. Additionally, proposed appropriations for fiscal year 2003 would provide further funding if enacted into law. If properly implemented, these initiatives should contribute to the goal of improved seaport security. As arranged with your office, unless you publicly announce its contents earlier, we plan no further distribution of this report until 30 days from its issue date. At that time, we will send copies to the Secretaries of Defense and Transportation and interested congressional committees. We will also make copies available to others upon request. In addition, the report will be available at no cost on the GAO Web site at http://gao.gov. If you or your staff have any questions regarding this report, or wish to discuss this matter further, please contact me at (202) 512-6020. Key contributors are acknowledged in appendix III. Sincerely yours, Raymond J. Decker, Director Defense Capabilities and Management: Signed by Raymond J. Decker [End of section] Appendix I: Scope and Methodology: To analyze the security environment at strategic seaports we reviewed security planning and procedures during the conduct of site visits at six selected commercial seaports and two military-owned ammunition ports. These six commercial ports included ports that regularly support DOD deployments as well as those that are used less frequently. We selected ports on the West Coast, East Coast and on the Gulf of Mexico. We visited two of the three dedicated ammunition ports identified by DOD, one on each coast. For security reasons, we do not discuss location-specific information in this report. At these selected ports we reviewed documents, observed security measures, and discussed port operations, security planning, coordination mechanisms, specific vulnerabilities, mitigation plans, and resource issues with government and nongovernment officials. Among the organizations we visited during our seaport visits were the Coast Guard, the U.S. Maritime Administration, the Federal Bureau of Investigation, the U.S. Customs Service, port authorities, and local law enforcement agencies. Although the information we obtained at these locations could not be generalized to describe the environment DOD could expect at all seaports, it provides insight into what DOD could expect to encounter at domestic seaports. We also discussed these issues with officials at Coast Guard headquarters and the U.S. Maritime Administration, both in the Department of Transportation in Washington, D.C. To analyze DOD‘s process for securing deployments of military equipment through strategic seaports we examined force protection plans, procedures, and coordination measures for four deployments conducted in 2001. We selected these deployments based on information provided by the U.S. Army Forces Command. The command provided a list of deployments involving units moving from within the continental United States to an overseas location during calendar year 2001 that required the use of sealift to transport military equipment. We selected four deployments originating from three installations in calendar year 2001 because they represented about 65 percent of the total tonnage of equipment for all deployments to major DOD contingency operations during that period. An additional factor in our selection was the geographic dispersion of the domestic seaports used for the deployments. Our review of force protection procedures included the guidance and criteria for force protection for deployments, the extent to which these are clearly defined and carried out, and the extent to which DOD works with other federal, state, and local agencies to plan and carry out force protection measures. We also reviewed information from the Military Sealift Command and Military Traffic Management Command on the ships used to transport equipment for these deployments and the equipment they carried. We interviewed officials from the following organizations: * Office of Assistant Secretary of Defense for Special Operations and Low-Intensity Conflict in Washington, D.C. * U.S. Transportation Command at Scott Air Force Base, Ill. * Military Transportation Management Command in Fort Eustis, Va. * Military Sealift Command in Washington, D.C. * U.S. Central Command in Tampa, Fla. * U.S. Army Forces Command in Atlanta, Ga. * Army and Navy Force Protection Offices in Washington D.C. * Transportation and force protection officials at the installation and unit levels for Army and Marine Corps units: To examine DOD force protection efforts, we conducted site visits at three military installations that were the origins of the four 2001 deployments in our review. During these site visits, we reviewed DOD force protection plans, policies and standards used for the equipment involved in the deployments and discussed with unit and installation personnel how DOD addressed security weaknesses identified at the seaports. We also discussed the experience of past deployments and recent deployments with DOD officials at installations and the ports. We also reviewed the findings and recommendations of the Interagency Commission of Crime and Security in U.S. Seaports and the provisions of maritime security legislation now before Congress to determine the potential impact on current and future seaport security efforts. We analyzed the provisions of both House and Senate versions of the legislation and discussed key provisions with staff members of cognizant Congressional committees. We conducted our review from January through August 2002 in accordance with generally accepted government auditing standards. [End of section] Appendix II: Comments from the Department of Defense: OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE WASHINGTON, D.C. 20301- 2500: SPECIAL OPERATIONS/ LOW-INTENSITY CONFLICT: OCT 4 2002: Mr. Raymond J. Decker: Director, Defense Capabilities Management, U.S. General Accounting Office, Washington, D.C. 20548: Dear Mr. Decker: The Department of Defense (DoD) has reviewed the GAO draft report. GAO- 0315, ’COMBATING TERRORISM: Actions Needed to Improve Force Protection for DoD Deployments Through Domestic Seaports,“ dated October 2002 (GAO Code 350156). The draft report reflects an extensive research and reporting effort by your analysis team. The Department concurs with comment on the two recommendations (Tab A) in the report. Additionally, technical comments have been forwarded to your staff to correct and clarify information in selected sections of the report. Sincerely, Marshall Billingslea Principal Deputy Signed by Marshall Billingslea Enclosures: As stated: Prepared by: CDR Carlos E. Aponte, (703) 697-3254: GAO DRAFT REPORT - DATED OCTOBER 2002 GAO-03-15/CODE 350156: ’COMBATING TERRORISM: Actions Needed to Improve Force Protection for DoD Deployments Through Domestic Seaports“: DEPARTMENT OF DEFENSE RESPONSE TO THE RECOMMENDATIONS: RECOMMENDATION 1: To improve DoD‘s oversight of force protection for deployments to and through domestic strategic seaports, we recommend that the Secretary of Defense designate a single authority (such as the recently proposed U.S. Northern Command) to coordinate and execute force protection planning for deployments of units from installations in the United States through seaports and until ships enter the destination areas of operation (this responsibility would be similar to that of the overseas unified combatant commands for their respective areas of operation). (pp. 23-24/GAO Draft Report): DoD RESPONSE: Concur. USNORTHCOM was recently established as a combatant command with regional responsibility for the express purpose of coordinating DoD‘s Homeland Security efforts within CONUS. USTRANSCOM will work closely with USNORTHCOM in the coming months to examine security for deployments through domestic seaports. RECOMMENDATION 2: To improve DoD‘s oversight of force protection for deployments to and through domestic strategic seaports, we recommend that the Secretary of Defense direct the single coordination authority (once established), along with the U.S. Transportation Command, to develop and implement measures to maintain greater security over equipment transported by non-DoD carriers. (p. 24/GAO Draft Report): DoD RESPONSE: Partially concur. It must be understood that DoD has, for decades, relied upon the commercial sector to provide a large portion of the nation‘s strategic sealift capability in both peacetime and during contingency. This reliance is borne both out of necessity and for cost reasons. Military Sealift Command maintains a fleet of government owned strategic sealift vessels that are intended to surge into action in event of a large-scale deployment. In such a contingency, these vessels will be used primarily to move our most critical war fighting equipment and supplies, such as deploying war fighting forces and munitions. However, it is not cost effective to use this fleet for routine cargo movement or deployment of forces for exercises or force rotations. Military Sealift Command does decide what type of vessel should be used (be it U.S. government owned or leased, U.S. flagged commercial or foreign flagged commercial) based, in part, on the type of cargo to be shipped and the perceived threat to that cargo and vessel. The necessity for using non-DoD carriers will continue for both routine movements of cargo absent a contingency as well as to support an increased flow of cargo in the event of one. USTRANSCOM will work with USNORTHCOM and the Services to continue to improve the security of DoD cargo moved via commercial carriers. Satellites tracking cargo and vessels, as well as increased use of Supercargos (security personnel aboard vessels), are two methods that we are moving forward with. [End of section] Appendix III: GAO Contacts and Staff Acknowledgments: GAO Contacts: Ray Decker (202) 512-6020: Bob Repasky (202) 512-9868: Staff Acknowledgements: In addition to those names above, Willie J. Cheely, Jr., Brian G. Hackett, Joseph W. Kirschbaum, Jean M. Orland, Stefano Petrucci, Elizabeth G. Ryan, and Tracy M. Whitaker also made key contributions to this report. [End of section] Related GAO Products: Homeland Security: Department of Justice‘s Response to Its Congressional Mandate to Assess and Report on Chemical Industry Vulnerabilities. GAO-03-24R. Washington, D.C.: October 10, 2002. Homeland Security: Information Sharing Activities Face Continued Management Challenges. GAO-02-1122T. Washington, D.C.: October 1, 2002. Combating Terrorism: Department of State Programs to Combat Terrorism Abroad. GAO-02-1021. Washington, D.C.: September 6, 2002. National Preparedness: Technology and Information Sharing Challenges. GAO-02-1048R. Washington, D.C.: August 30, 2002. Homeland Security: Effective Intergovernmental Coordination is Key to Success. GAO-02-1013T. Washington, D.C.: August 23, 2002. Homeland Security: Effective Intergovernmental Coordination is Key to Success. GAO-02-1012T. Washington, D.C.: August 22, 2002. Homeland Security: Effective Intergovernmental Coordination Is Key to Success. GAO-02-1011T. Washington, D.C.: August 20, 2002. Port Security: Nation Faces Formidable Challenges in Making New Initiatives Successful. GAO-02-993T. Washington, D.C.: August 5, 2002. Combating Terrorism: Preliminary Observations on Weaknesses in Force Protection for DOD Deployments Through Domestic Seaports. GAO-02- 955TNI. Washington, D.C.: July 23, 2002. Homeland Security: Critical Design and Implementation Issues. GAO-02- 957T. Washington, D.C.: July 17, 2002. Homeland Security: Title III of the Homeland Security Act of 2002. GAO- 02-927T. Washington, D.C.: July 9, 2002. Homeland Security: Intergovernmental Coordination and Partnerships Will Be Critical to Success. GAO-02-899T. Washington, D.C.: July 1, 2002. Homeland Security: New Department Could Improve Coordination but May Complicate Priority Setting. GAO-02-893T. Washington, D.C.: June 28, 2002. Homeland Security: Proposal for Cabinet Agency Has Merit, But Implementation Will be Pivotal to Success. GAO-02-886T. Washington, D.C.: June 25, 2002. Homeland Security: Key Elements to Unify Efforts Are Underway but Uncertainty Remains. GAO-02-610. Washington, D.C.: June 7, 2002. National Preparedness: Integrating New and Existing Technology and Information Sharing into an Effective Homeland Security Strategy. GAO- 02-811T. Washington, D.C.: June 7, 2002. Homeland Security: Responsibility And Accountability For Achieving National Goals. GAO-02-627T. Washington, D.C.: April 11, 2002. National Preparedness: Integration of Federal, State, Local, and Private Sector Efforts Is Critical to an Effective National Strategy for Homeland Security. GAO-02-621T. Washington, D.C.: April 11, 2002. Combating Terrorism: Intergovernmental Cooperation in the Development of a National Strategy to Enhance State and Local Preparedness. GAO-02- 550T. Washington, D.C.: April 2, 2002. Combating Terrorism: Enhancing Partnerships Through a National Preparedness Strategy. GAO-02-549T. Washington, D.C.: March 28, 2002. Combating Terrorism: Critical Components of a National Strategy to Enhance State and Local Preparedness. GAO-02-548T. Washington, D.C.: March 25, 2002. Combating Terrorism: Intergovernmental Partnership in a National Strategy to Enhance State and Local Preparedness. GAO-02-547T. Washington, D.C.: March 22, 2002. Homeland Security: Progress Made; More Direction and Partnership Sought. GAO-02-490T. Washington, D.C.: March 12, 2002. Combating Terrorism: Key Aspects of a National Strategy to Enhance State and Local Preparedness. GAO-02-473T. Washington, D.C.: March 1, 2002. Homeland Security: Challenges and Strategies in Addressing Short-and Long-Term National Needs. GAO-02-160T. Washington, D.C.: November 7, 2001. Homeland Security: A Risk Management Approach Can Guide Preparedness Efforts. GAO-02-208T. Washington, D.C.: October 31, 2001. Combating Terrorism: Considerations For Investing Resources in Chemical and Biological Preparedness. GAO-01-162T. Washington, D.C.: October 17, 2001. Homeland Security: Key Elements of a Risk Management Approach. GAO-02- 150T. Washington, D.C.: October 12, 2001. Homeland Security: A Framework for Addressing the Nation‘s Issues. GAO- 01-1158T, September 21, 2001. Combating Terrorism: Selected Challenges and Related Recommendations. GAO-01-822. Washington, D.C.: September 20, 2001. Combating Terrorism: Actions Needed to Improve DOD‘s Antiterrorism Program Implementation and Management. GAO-01-909. Washington, D.C.: September 19, 2001. FOOTNOTES [1] Nontraditional threats can include natural or man-made disasters, such as hurricanes, industrial accidents, and cyber attacks. [2] Department of Defense, Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms (Apr. 12, 2001, as amended through May 7, 2002). [3] Most personnel would be transported by air. [4] These reserve ships are part of the Maritime Administration‘s Ready Reserve Force. [5] The Port Readiness Committees are part of the National Port Readiness Network chaired by the Maritime Administration. [6] The local Port Readiness Committee is currently revising the master plan. [7] Asymmetric threats include unconventional approaches (such as terrorism, the use or threatened use of weapons of mass destruction, and information warfare) that circumvent traditional U.S. military strengths. [8] U.S. General Accounting Office, Combating Terrorism: Actions Needed to Improve Antiterrorism Program Implementation and Management, GAO-01-909 (Washington, D.C.: Sept. 19, 2001). [9] S. 1214 passed the Senate on December 20, 2001. The House of Representatives passed an amendment to S. 1214 on June 4, 2002. [10] U.S. General Accounting Office, Port Security: Nation Faces Formidable Challenges in Making New Initiatives Successful, GAO-02-993T (Washington, D.C.: Aug. 5, 2002). [11] DOD Directive 4500.9, Transportation and Traffic Management, Jan. 26, 1989. [12] DOD further stated that only 18 percent of all cargo (including deployments and general cargo, such as household goods) shipped by the Military Sealift Command was transported by foreign-flagged vessels. [13] The Department of Defense had also chartered the same vessel to transport military equipment from operations in the Balkans. [14] Although he recognized the danger of the Katie incident, the Canadian Defense Minister also acknowledged that it would still be necessary for Canada to charter nongovernment vessels for future military movements. GAO‘s Mission: The General Accounting Office, the investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO‘s commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through the Internet. GAO‘s Web site ( www.gao.gov ) contains abstracts and full-text files of current reports and testimony and an expanding archive of older products. The Web site features a search engine to help you locate documents using key words and phrases. You can print these documents in their entirety, including charts and other graphics. Each day, GAO issues a list of newly released reports, testimony, and correspondence. GAO posts this list, known as ’Today‘s Reports,“ on its Web site daily. The list contains links to the full-text document files. To have GAO e-mail this list to you every afternoon, go to www.gao.gov and select ’Subscribe to daily E-mail alert for newly released products“ under the GAO Reports heading. Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. General Accounting Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Public Affairs: Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S. General Accounting Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.