Maritime Security
New Structures Have Improved Information Sharing, but Security Clearance Processing Requires Further Attention
Gao ID: GAO-05-394 April 15, 2005
Sharing information with nonfederal officials is an important tool in federal efforts to secure the nation's ports against a potential terrorist attack. The Coast Guard has lead responsibility in coordinating maritime information sharing efforts. The Coast Guard has established area maritime security committees--forums that involve federal and nonfederal officials who identify and address risks in a port. The Coast Guard and other agencies have sought to further enhance information sharing and port security operations by establishing interagency operational centers--command centers that tie together the efforts of federal and nonfederal participants. GAO was asked to review the efforts to see what impact the committees and interagency operational centers have had on improving information sharing and to identify any barriers that have hindered information sharing.
Area maritime security committees provide a structure that improves information sharing among port security stakeholders. At the four port locations GAO visited, federal and nonfederal stakeholders said that the newly formed committees were an improvement over previous information sharing efforts. The types of information shared included assessments of vulnerabilities at port locations and strategies the Coast Guard intends to use in protecting key infrastructure. The three interagency operational centers established to date allow for even greater information sharing because the centers operate on a 24-hour-a-day basis, and they receive real-time information from data sources such as radars and sensors. The Coast Guard is planning to develop its own centers--called sector command centers--at up to 40 additional port locations to monitor information and to support its operations. The relationship between the interagency operational centers and the planned expansion of sector command centers remains to be determined. The major barrier hindering information sharing has been the lack of federal security clearances for nonfederal members of committees or centers. By February 2005--or 4 months after the Coast Guard developed a list of 359 committee members who needed a security clearance--28 of the 359 members had submitted the necessary paperwork for a security clearance. Coast Guard field officials did not clearly understand that they were responsible for contacting nonfederal officials about the clearance process. To deal with this, in early April 2005, the Coast Guard issued guidance to field offices that clarified their role. In addition, the Coast Guard did not have formal procedures that called for the use of data to monitor application trends. Developing such procedures would aid in identifying deficiencies in the future. As the Coast Guard proceeds with its program, another way to improve the submission of paperwork involves educating nonfederal officials about the clearance process.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-05-394, Maritime Security: New Structures Have Improved Information Sharing, but Security Clearance Processing Requires Further Attention
This is the accessible text file for GAO report number GAO-05-394
entitled 'Maritime Security: New Structures Have Improved Information
Sharing, but Security Clearance Processing Requires Further Attention'
which was released on May 17, 2005.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to Congressional Requesters:
United States Government Accountability Office:
GAO:
April 2005:
Maritime Security:
New Structures Have Improved Information Sharing, but Security
Clearance Processing Requires Further Attention:
GAO-05-394:
GAO Highlights:
Highlights of GAO-05-394, a report to congressional requestors.
Why GAO Did This Study:
Sharing information with nonfederal officials is an important tool in
federal efforts to secure the nation‘s ports against a potential
terrorist attack. The Coast Guard has lead responsibility in
coordinating maritime information sharing efforts. The Coast Guard has
established area maritime security committees”forums that involve
federal and nonfederal officials who identify and address risks in a
port. The Coast Guard and other agencies have sought to further enhance
information sharing and port security operations by establishing
interagency operational centers”command centers that tie together the
efforts of federal and nonfederal participants. GAO was asked to review
the efforts to see what impact the committees and interagency
operational centers have had on improving information sharing and to
identify any barriers that have hindered information sharing.
What GAO Found:
Area maritime security committees provide a structure that improves
information sharing among port security stakeholders. At the four port
locations GAO visited, federal and nonfederal stakeholders said that
the newly formed committees were an improvement over previous
information sharing efforts. The types of information shared included
assessments of vulnerabilities at port locations and strategies the
Coast Guard intends to use in protecting key infrastructure.
The three interagency operational centers established to date allow for
even greater information sharing because the centers operate on a 24-
hour-a-day basis, and they receive real-time information from data
sources such as radars and sensors. The Coast Guard is planning to
develop its own centers”called sector command centers”at up to 40
additional port locations to monitor information and to support its
operations. The relationship between the interagency operational
centers and the planned expansion of sector command centers remains to
be determined.
The major barrier hindering information sharing has been the lack of
federal security clearances for nonfederal members of committees or
centers. By February 2005”or 4 months after the Coast Guard developed a
list of 359 committee members who needed a security clearance”28 of the
359 members had submitted the necessary paperwork for a security
clearance. Coast Guard field officials did not clearly understand that
they were responsible for contacting nonfederal officials about the
clearance process. To deal with this, in early April 2005, the Coast
Guard issued guidance to field offices that clarified their role. In
addition, the Coast Guard did not have formal procedures that called
for the use of data to monitor application trends. Developing such
procedures would aid in identifying deficiencies in the future. As the
Coast Guard proceeds with its program, another way to improve the
submission of paperwork involves educating nonfederal officials about
the clearance process.
Interagency Operational Centers Coordinate Harbor Patrols:
[See PDF for image]
Source: GAO.
[End of figure]
What GAO Recommends:
To help ensure that nonfederal officials receive security clearances in
a more timely fashion, GAO recommends that the Coast
Guard (1) develop formal procedures to use data as a tool to monitor
the security clearance program and (2) raise the awareness of
nonfederal officials about the process of applying for a clearance. The
Department of Homeland Security and the Coast Guard concurred with our
recommendations.
www.gao.gov/cgi-bin/getrpt?GAO-05-394.
To view the full product, including the scope and methodology, click on
the link above. For more information, contact Margaret Wrightson at
(415) 904-2200 or wrightsonm@gao.gov.
[End of section]
Contents:
Letter:
Results in Brief:
Background:
Area Maritime Security Committees Have Improved Information Sharing:
Interagency Operational Centers Have Also Improved Information Sharing:
Lack of Security Clearances Is a Key Barrier to More Effective
Information Sharing:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendix I: Objectives, Scope, and Methodology:
Appendix II: Stakeholder Groups Recommended for Membership on Area
Maritime Security Committees:
Appendix III: Port-Level Information Sharing Is Supported by, and
Supports, National-Level Intelligence Infrastructure:
Appendix IV: Comments from the Department of Homeland Security:
Appendix V: GAO Contacts and Staff Acknowledgments:
GAO Contacts:
Staff Acknowledgments:
Related GAO Products:
Tables:
Table 1: Representatives That an Area Maritime Security Committee Could
Include:
Table 2: Department and Agency Intelligence Organizations at the
National, Regional, and Field Level That Are Potentially Involved in
Maritime Information Sharing:
Figures:
Figure 1: Ports Facilitate Cargo Container Traffic, an Important
Segment of Maritime Commerce:
Figure 2: Area Maritime Security Committees Protect a Wide Range of
Port Facilities and Adjacent Infrastructure:
Figure 3: Coast Guard Patrol Enforces Security Zone at a Port:
Figure 4: Flow of Information from National and Regional Coast Guard
Sources to Area Maritime Security Committees and Interagency
Operational Centers at the Port Level:
Figure 5: Flow of Information between National Intelligence and Law
Enforcement Agencies and between the National and the Port Level:
Abbreviations:
DHS: Department of Homeland Security:
DOD: Department of Defense:
DOJ: Department of Justice:
FBI: Federal Bureau of Investigation:
MTSA: Maritime Transportation Security Act of 2002:
OMB: Office of Management and Budget:
United States Government Accountability Office:
Washington, DC 20548:
April 15, 2005:
The Honorable Henry A. Waxman:
Ranking Minority Member:
Committee on Government Reform:
House of Representatives:
The Honorable C. A. Dutch Ruppersberger:
The Honorable George Miller:
House of Representatives:
Securing the nation's ports against a potential terrorist attack has
become one of the nation's security priorities since the terrorist
attacks of September 11, 2001. Factors that make ports vulnerable to a
terrorist attack include their location near major urban centers, such
as New York and Los Angeles; their inclusion of critical infrastructure
such as oil refineries and terminals; and their economic importance for
the nation's economy and trade. Although no port-related terrorist
attacks have occurred in the United States, internationally terrorists
have demonstrated their ability to access and destroy infrastructure,
assets, and lives in and around seaports. According to the Coast Guard,
a major port closure for 1 month could cost tens of billions of
dollars, disrupting trade and the U.S. economy as a whole.[Footnote 1]
Given that ports are sprawling enterprises that often cross
jurisdictional boundaries, the need to share information among federal,
state, and local agencies is central to effective prevention and
response. The Homeland Security Act of 2002, which provided the basis
for federal efforts against terrorism in the aftermath of the September
11 attacks, underscores the importance of sharing timely, effective,
and useful information to enhance the shared partnership among federal,
state, and local entities in the fight against terrorism.[Footnote 2]
The act recognizes that sharing information with state and local
officials can improve the capability of nonfederal officials to deter,
prevent, or disrupt a possible terrorist attack.
Since the terrorist attacks, the federal government has taken a number
of approaches designed to enhance information sharing.[Footnote 3] One
of these approaches, called for under the Maritime Transportation
Security Act of 2002 (MTSA), was to provide the Coast Guard with
authority for creating area maritime security committees at the port
level.[Footnote 4] These committees--which were to include
representatives from the federal, state, local, and private sectors--
were intended as a way to identify and deal with vulnerabilities in and
around ports, as well as to provide a forum for sharing information on
issues related to port security. Much of the federally generated
information about port security--such as assessments of specific port
vulnerabilities or information about potential threats being monitored-
-is classified national security information and cannot be released,
even to law enforcement personnel, if they have not undergone the
necessary federal background checks and received a security clearance.
Lacking access to such information, nonfederal officials may be at a
disadvantage in their efforts to respond to or combat a terrorist
threat.
As another approach to improving information sharing and port security
operations, various federal agencies, including the Department of
Homeland Security (through the U.S. Coast Guard), the Department of the
Navy, and the Department of Justice (DOJ), have developed interagency
operational centers at certain port locations.[Footnote 5] These
centers are command posts that tie together the intelligence and
operational efforts of various federal and nonfederal participants.
They currently exist in three locations: Charleston, South Carolina;
Norfolk, Virginia; and San Diego, California. Congress has expressed
interest in knowing more about the applicability of such centers in
other locations, and it required the Coast Guard to submit a report by
February 2005 that describes, among other things, the number of ports
that could benefit from such centers and the associated cost of
implementing them.
The experience gleaned to date from both of these approaches to
improving information sharing represents an opportunity that could help
guide future efforts to improve port security. Therefore, we examined
the efforts of the Coast Guard and other federal agencies in improving
information sharing between and among federal, state, local, and
industry stakeholders. This report addresses the following questions:
* What impact have area maritime security committees had on information
sharing?
* What impact have interagency operational centers had on information
sharing?
* What barriers, if any, have hindered improvements in information
sharing among port security stakeholders?
To answer these questions, we focused much of our work at the port
level. To review the activities of area maritime security committees,
we selected four ports for detailed review. These four ports--
Baltimore, Maryland; Charleston, South Carolina; Houston, Texas; and
Seattle, Washington--were selected to reflect various coastal regions
and a wide range of volume and types of operations. To review the
activities of the interagency operational centers, we visited all three
centers currently in operation, discussing ways in which the centers
operate with both federal and nonfederal participants as well as
observing operations at the centers. During our visits, we talked with
Coast Guard officials involved in sharing information and we also
discussed information sharing issues with numerous nonfederal
stakeholders, including private sector officials and officials from
port authorities or local law enforcement. We examined in more detail
the Coast Guard's procedures for processing security clearances for
members of area maritime security committees. We also reviewed
legislation and congressional committee reports related to information
sharing, reviewed numerous other documents and reports on the issue,
and spoke with officials at the Coast Guard and the Federal Bureau of
Investigation (FBI) about their approaches to sharing information with
nonfederal entities. See appendix I for further explanation of our
scope and methodology. Our work, which was conducted between May 2004
and March 2005, was done in accordance with generally accepted
government auditing standards.
Results in Brief:
Area maritime security committees have provided a structure to improve
the timeliness, completeness, and usefulness of information sharing
between federal and nonfederal stakeholders. At the four port locations
we visited, stakeholders said the newly formed committees were an
improvement over previous information sharing efforts because the
committees established a formal structure for communicating information
and established new procedures for sharing information. Stakeholders
stated that among other things, the committees have been used as a
forum for sharing assessments of vulnerabilities, providing information
on illegal or suspicious activities and providing input on portwide
security plans--called area maritime security plans--that describe the
joint strategies of the Coast Guard and its partner agencies for
protecting key infrastructure against terrorist activities. Nonfederal
stakeholders, including state officials, local port authority
operators, and representatives of private companies, said the
information sharing had increased their awareness of security issues
around the port and allowed them to identify and address security
issues at their facilities. Likewise, Coast Guard officials said the
information they received from nonfederal participants had helped in
mitigating and reducing risks. While committees at each of the four
locations had the same guidance, they varied in such ways as the size
of the membership and the types of stakeholders represented. For
example, to prevent a duplication of efforts, some of the committees
rely on existing information sharing networks, such as trade and
industry associations, and have Coast Guard officials participate
directly with these groups, while other ports we visited carried out
more of the work in the committee forum. We were not able to determine
if certain of these structures or approaches work better than others,
largely because the committees are just over a year old. More time will
be needed before such assessments can be made.
The three interagency operational centers established to date allow for
even greater information sharing because the centers operate 24 hours a
day and receive real-time operational information from radars, sensors,
and cameras, as well as classified data on personnel, vessels, and
cargo, according to center participants. In contrast, the area maritime
security committees, while they have a broader membership, primarily
provide information through meetings, documents, and other means that
are often used for long-term planning purposes rather than day-to-day
operations. The three existing interagency centers fulfill varying
missions and operations, and thus share different types of information.
For example, the center in Charleston, South Carolina, focuses on port
security alone and is led by DOJ. In contrast, the center in San Diego
supports the Coast Guard's missions beyond port security, including
drug interdiction, alien migrant interdiction, and search and rescue
activities, and is led by the Coast Guard. The Coast Guard is planning
to develop its own operational centers--called sector command centers-
-at up to 40 additional port locations to monitor maritime information
and to support Coast Guard operations. The relationship between the
planned expansion of centers by the Coast Guard and the existing
interagency operational centers--in particular, how many other agencies
will participate in the Coast Guard's centers--remains to be determined.
While information sharing has generally improved, a major barrier
mentioned most frequently by stakeholders as hindering information
sharing has been the lack of federal security clearances among port
security stakeholders. The lack of security clearances may limit the
ability of state, local, and industry officials, such as those involved
in area maritime security committees or interagency operational
centers, to deter, prevent, and respond to a potential terrorist
attack. By February 2005--or over 4 months after the Coast Guard had
developed a list of over 350 nonfederal area maritime security
committee participants with a need for a security clearance--28 had
submitted the necessary paperwork for the background check. There were
two main reasons why the Coast Guard had not processed security
clearances more expeditiously. First, local Coast Guard officials said
they did not clearly understand their responsibility for communicating
with state and local officials about the process for obtaining a
security clearance. After receiving a draft of our report, the Coast
Guard issued guidelines clarifying the role that local Coast Guard
officials play in the program. Second, the Coast Guard had not
developed formal procedures for using its database on security
clearance applicants to troubleshoot potential problems and take
appropriate management action. As the Coast Guard proceeds with its
program, nonfederal officials could benefit from more information on
the process for obtaining a security clearance. The FBI, which
spearheaded a similar effort (but not specific to ports) to expedite
security clearances for nonfederal officials, found that nonfederal
officials were slow in submitting application forms in part because of
the lack of awareness about the security clearance process, and the
agency made specific efforts to educate local officials about the
application process. Similar educational efforts by the Coast Guard
might help clear up any such uncertainties about the application
process. Other barriers to greater information sharing identified by
committee participants included the size and complexity of ports--
factors that are intrinsic to port operations--but none of these
barriers were mentioned as frequently and considered as important as
the lack of security clearances.
In this report, we recommending that the Secretary of Homeland Security
direct the Commandant of the Coast Guard to develop formal procedures
so that local Coast Guard and headquarters officials use the Coast
Guard's database as a management tool to monitor who has submitted
applications for a security clearance and to take appropriate action
when application trends point to possible problems. For example,
updating the database on a routine basis could identify port areas
where progress is slow and indicate that follow-up with local field
office officials may be needed. Finally, we are also recommending that
the Coast Guard raise the awareness of state, local, and industry
officials about the process of applying for security clearances. This
effort could involve using brochures and other information that the FBI
has used in its program for educating state and local officials about
the security clearance process.
In commenting on a draft of this report, the Department of Homeland
Security, including the Coast Guard, generally agreed with our findings
and recommendations. The Department of Homeland Security's written
comments are in appendix IV.
Background:
Ports Are Important and Vulnerable:
Ports play an important role in the nation's economy and security.
Ports are used to import and export cargo worth hundreds of billions of
dollars, generating jobs, both directly and indirectly, for Americans
and our trading partners. Ports, which include inland waterways, are
used to move bulk agricultural, mineral, petroleum, and paper products.
In addition, ports are also used to move cargo containers (as shown in
fig. 1)--one of the most important segments of global commerce,
accounting for 90 percent of the world's maritime cargo. In 2002,
approximately 7 million containers arrived in U.S. seaports, carrying
more than 95 percent of the nation's non-North American trade by weight
and 75 percent by value. Ports also contribute to the economy through
recreational activities such as boating, fishing, and cruises. As an
indication of the economic importance of ports, a 2002 simulation of a
terrorist attack at a port led to the temporary closure of every
seaport in the United States and resulted in an estimated loss of $58
billion in revenue to the U.S. economy, including spoilage, loss of
sales, manufacturing slowdowns, and halts in production.[Footnote 6]
Ports are also important to national security because they host naval
bases and vessels, facilitate the movement of military equipment, and
supply troops deployed overseas.
Figure 1: Ports Facilitate Cargo Container Traffic, an Important
Segment of Maritime Commerce:
[See PDF for image]
Source: GAO.
[End of figure]
Since the terrorist attacks of September 11, the nation's 361 seaports
have been increasingly viewed as potential targets for future terrorist
attacks. Ports are vulnerable because they are sprawling, interwoven
with complex transportation networks, close to crowded metropolitan
areas, and easily accessible. Ports and their maritime approaches
facilitate a unique freedom of movement and flow of goods while
allowing people, cargo, and vessels to transit with relative anonymity.
Because of their accessibility, ports are vulnerable to a wide variety
of types of attacks. Cargo containers--mentioned above as important to
maritime commerce--are a potential conduit for terrorists to smuggle
weapons of mass destruction or other dangerous materials into the
country. Finally, ports contain a number of specific facilities that
could be targeted by terrorists, including military vessels and bases,
cruise ships, passenger ferries, terminals, dams and locks, factories,
office buildings, power plants, refineries, sports complexes, and other
critical infrastructure.
Multiple Jurisdictions Are Involved in Securing the Nation's Ports:
The responsibility for protecting ports from a terrorist attack is a
shared responsibility that crosses jurisdictional boundaries, with
federal, state, and local organizations involved. For example, at the
federal level, the Department of Homeland Security (DHS) has overall
homeland security responsibility, and the Coast Guard, an agency of the
department, has lead responsibility for maritime security. Other
federal departments that may be involved include the Department of
Defense (DOD) and DOJ. The Coast Guard and other federal agencies share
their security responsibilities with several local stakeholder groups.
Some port authorities, operated privately or by the state or local
government, have responsibility for protecting certain facilities in
and around ports. Port authorities provide protection through
designated port police forces, private security companies, and
coordination with local law enforcement agencies. Private sector
stakeholders play a major role in identifying and addressing the
vulnerabilities in and around their facilities, which may include oil
refineries, cargo facilities, and other property adjacent to navigable
waterways.
Information Sharing Is Important to Port Security Activities:
Information sharing among federal, state, and local officials is
central to port security activities. The Homeland Security Act of 2002
and several congressionally chartered commissions call attention to the
importance of sharing information among officials from multiple
jurisdictions as a way to prevent or respond to a terrorist
attack.[Footnote 7] The act recognizes that the federal government
relies on state and local personnel to help protect against terrorist
attacks, and these officials need homeland security information to
prevent and prepare for such attacks.[Footnote 8] One of the
congressionally chartered commissioned reports--the 9/11 Commission
Report--placed emphasis on the importance of sharing information among
federal and nonfederal entities as a means of deterring a terrorist
attack in the future. In January 2005, we designated information
sharing for homeland security as a high-risk area because the federal
government still faces formidable challenges in gathering, identifying,
analyzing, and disseminating key information within and among federal
and nonfederal entities.[Footnote 9]
Information sharing between federal officials and nonfederal officials
can involve information collected by federal intelligence agencies. In
order to gain access to classified information, state and local law
enforcement officials generally need to apply for and receive approval
to have a federal security clearance. Presidential Executive Order
12968, Access to Classified Information, dated August 1995, established
federal criteria for granting access to classified information. As
implemented by the Coast Guard, the primary criterion for granting
access to classified information is an individual's "need to know,"
which is defined as the determination made by an authorized holder of
classified information that a prospective recipient requires access to
specific classified information in order to perform or assist in a
lawful and authorized governmental function.[Footnote 10] To obtain a
security clearance, an applicant must complete a detailed questionnaire
that asks for information on all previous employment, residences, and
foreign travel and contacts that reach back 7 years. After submitting
the questionnaire, the applicant then undergoes a variety of screenings
and checks by the Coast Guard Security Center. The Office of Personnel
Management conducts background investigations on the applicant.
Area Maritime Security Committees Are Established to Facilitate
Information Sharing between Port Security Stakeholders:
The Maritime Transportation Security Act, passed in the aftermath of
the September 11 attacks and with the recognition that ports contain
many potential security targets, provided for area maritime security
committees to be established by the Coast Guard at ports across the
country.[Footnote 11] A primary goal of these committees is to assist
the local Captain of the Port--the senior Coast Guard officer who leads
the committee--to develop a security plan--called an area maritime
security plan--to address the vulnerabilities and risks in that port
zone.[Footnote 12] In developing these plans, the committees serve as
forums to communicate with stakeholders from federal agencies, state
and local governments, law enforcement, and private industries in an
effort to gain a comprehensive perspective of security issues at a port
location. The committees also serve as a link for communicating threats
and disseminating security information to port stakeholders. In all,
the Coast Guard ultimately organized 43 area maritime security
committees, covering the nation's 361 ports.[Footnote 13] Besides the
Coast Guard, federal agencies such as the Customs and Border
Protection, FBI, or Maritime Administration may be part of the
committee. State, local, and industry members could include officials
from port authorities, oil refineries, and local police or fire
departments. Appendix II lists the various stakeholder groups that may
be eligible.
To supplement the statutory and regulatory framework of the committees,
the Coast Guard developed specific guidelines on communication and
collaboration among committee members.[Footnote 14] This guidance
emphasizes the importance of information in successfully implementing
security measures and recognizes that the committee structure allows
stakeholders to identify other federal, state, and local agencies that
are simultaneously developing security standards for other critical
infrastructure, such as bridges and airports. The guidance tasks the
committee with developing information sharing procedures for various
situations, including relaying instances of suspicious activity to
appropriate authorities and communicating to port stakeholders threat
information, among other things.
Interagency Operational Centers Involve Multiple Participants and Offer
Another Means of Improving Information Sharing:
Another approach at improving information sharing and port security
operations involves interagency operational centers--command centers
that bring together the intelligence and operational efforts of various
federal and nonfederal participants. These centers provide intelligence
information and real-time operational data from sensors, radars, and
cameras at one location to federal and nonfederal participants 24 hours
a day. The three current centers are in Charleston, South Carolina;
Norfolk, Virginia; and San Diego, California. Two of the centers
(Norfolk and San Diego) are located in ports that have a substantial
number of vessels and facilities operated by the Department of the
Navy. The third center (Charleston) is located at a port that moves
military equipment in and out of the port, and it is a major container
cargo port.
The development of interagency operational centers represents an effort
to improve awareness of incoming vessels, port facilities, and port
operations. In general, these centers are jointly operated by federal
and nonfederal law enforcement officials. The centers can have command
and control capabilities that can be used to communicate information to
vessels, aircraft, and other vehicles and stations involved in port
security operations.
Port-Level Information Sharing Is Supported by, and Supports, National-
Level Intelligence Infrastructure:
While area maritime security committees and interagency operational
centers are port-level organizations, they are supported by, and
provide support to, a national-level intelligence infrastructure.
National-level departments and agencies in the intelligence and law
enforcement communities may offer information that ultimately could be
useful to members of area maritime security committees or interagency
operational centers at the port level. These intelligence and law
enforcement agencies conduct maritime threat identification and
dissemination efforts in support of tactical and operational maritime
and port security efforts, but most have missions broader than maritime
activities as well. In addition, some agencies also have regional or
field offices involved in information gathering and sharing. See
appendix III for a description of the departments and agencies or
components involved in maritime information sharing at the national and
port levels.
Area Maritime Security Committees Have Improved Information Sharing:
Area maritime security committees have improved information sharing
among port security stakeholders, and made improvements in the
timeliness, completeness, and usefulness of information. The types of
information shared include assessments of vulnerabilities at specific
port locations, information about potential threats or suspicious
activities, and strategies the Coast Guard intends to use in protecting
key infrastructure. These efforts at sharing information generally did
not exist prior to the creation of area maritime security committees.
At the ports we visited, the collaboration and sharing of information
between committee members reflected the different types of stakeholders
and variations in the information needs of each port location. While
improvements were noted, it is too early to determine if any one port
has developed a better structure for information sharing than another,
because the committees have only been operating for just over a year.
Ports Reviewed Showed Improvements in Timeliness, Completeness, and
Usefulness of Shared Information:
Area maritime security committees have provided a structure to improve
the timeliness, completeness, and usefulness of information sharing.
For example, a primary function served by the committees was to develop
security plans for port areas--called area maritime security plans. The
goal of these plans was to identify vulnerabilities to a terrorist
attack in and around a port location and to develop strategies for
protecting a wide range of facilities and infrastructure (as shown in
fig. 2). In doing so, the committees established new procedures for
sharing information by holding meetings on a regular basis, issuing
electronic bulletins on suspicious activities around port facilities,
and sharing key documents, including vulnerability assessments and the
portwide security plan itself, according to committee participants.
These activities did not exist prior to the creation of the committees,
and they have contributed to the improvements in information sharing.
The area maritime security plan provides a framework for communication
and coordination among port stakeholders and law enforcement officials,
and identifies strategies for reducing vulnerabilities to security
threats in and near ports. It is designed to capture the information
necessary to coordinate and communicate security procedures at each
maritime security level, complement and encompass facility and vessel
security plans, and ultimately be integrated into the National Maritime
Security Plan. Coast Guard officials and nonfederal stakeholders we
contacted agreed that efforts such as these have improved information
sharing.
Figure 2: Area Maritime Security Committees Protect a Wide Range of
Port Facilities and Adjacent Infrastructure:
[See PDF for image]
Source: GAO.
[End of figure]
Committee participants we spoke with noted that an essential component
that has improved the timeliness of information sharing has been the
development of both formal and informal stakeholder networks resulting
from the formation of area maritime security committees. As part of the
process for developing the plan, the committee identifies critical
stakeholders and assembles their contact information, allowing for
timely dissemination of relevant information. For example, in the event
the Coast Guard learns of a potential and credible threat, the
committee would designate who should be contacted, the order in which
members should be contacted, and what information the committee
provides or receives. Participants in the committees told us that the
interactions of committee members have also led to the formation of
informal stakeholder networks as committee members encounter other
stakeholders with similar concerns and perspectives. The committee also
provides a forum for real-time sharing of information between
stakeholders through meetings or electronic communications. For
example, our discussions with federal and nonfederal officials at the
ports of Charleston and Houston indicated that committee members
representing private industries were granted access to daily
information bulletins that they had not received prior to the formation
of area maritime security committees, and these information bulletins
have allowed them to stay informed of important Coast Guard decisions.
In Houston, the Captain of the Port has used such bulletins to notify
and inform local stakeholders of unannounced drills, changes in
security levels, and Coast Guard guidance for vessel inspections and
voluntary screening. In Charleston, bulletins have been used to share
information on closure of waterways, release of new regulations, and
methods for preventing a possible terrorist attack.
At the ports we visited, committee members noted that their
participation has allowed them to disseminate more complete information
and receive more useful information in return. Committee members
representing the private sector at two of the ports we visited noted an
increased willingness to disclose vulnerabilities to federal
stakeholders with confidence that the information would be protected.
Coast Guard officials noted that access to more complete information
regarding vulnerabilities and threats at individual facilities has
aided them in mitigating risks. Additionally, having a complete view of
vulnerabilities at the port as a whole has been useful in identifying
gaps and common security needs. For example, while private sector
stakeholders are sharing their written assessments of their
vulnerabilities with the Coast Guard, the Coast Guard is, in turn,
sharing its strategies for the overall protection of ports against
potential terrorist activities. State and local port authority
operators and private sector stakeholders commented that the committees
have increased their awareness of security issues around the port and
that information received from the Coast Guard has been useful in
identifying and addressing security concerns at their facilities.
Efforts at sharing information prior to the creation of area maritime
security committees had not produced such effects.
Committees Have Flexibility in Their Structure and in the Way in Which
They Share Information:
While the committees are required to follow the same guidance regarding
their structure, purpose, and processes, each of the committees is
allowed the flexibility to assemble and operate in a way that reflects
the needs of its port area. Each port is unique in many ways, including
the geographic area covered and the type of operations that take place
there. These port-specific differences influence the number of members
that participate, the types of state and local organizations that
members represent, and the way in which information is shared.
One aspect of this flexibility is the way in which information is
channeled to specific stakeholders. The representation of various
stakeholders on a committee can cause differences in the type of
information that is shared. While committee members from federal
agencies may have access to classified information because they have
obtained a security clearance, other members may receive a sanitized
version of the information or be restricted from participating in
certain committee meetings. To mitigate this situation, some committees
have formed subcommittees that deal with classified materials such as
intelligence reports or details of military deployments.[Footnote 15]
The role stakeholders play in protecting strategic assets or the type
of cargo they handle may also affect what types of information they
receive as well as what types of information they can share with the
committee at large. For example, at one port we visited, the details
regarding a shipment of a sensitive material were restricted to
committee members that had a direct involvement in the operation.
The committees also show marked differences in how their meetings
occur, and these differences in turn affect the specific ways in which
information is shared. For example, at Baltimore, officials told us
that committee meetings are open to the general port community and can
draw over 80 participants in addition to the 48 committee members.
Coast Guard officials told us that such a large attendance made it
difficult to conduct committee business. To include all interested
stakeholders in the information network while maintaining a working
structure for the committee, the Captain of the Port designated 17
members to an executive committee, while the remaining 31 members
served on a general committee. This structure allowed the committee to
incorporate a large amount of stakeholder input and to share
information with all interested parties while keeping the decision
making duties of the committee at a manageable level. In contrast to
Baltimore's 48 members, the Puget Sound area maritime security
committee consists of 25 members who each share in decision making. The
smaller committee allows for greater familiarity amongst members as
well as immediate decision making at meetings because stakeholders with
decision making authority are all present.
At least two of the other committees we reviewed leveraged existing
information sharing networks, such as trade and industry associations,
by having Coast Guard officials participate in these groups. For
example, at Charleston, Coast Guard officials noted that many of the
stakeholders included on the area maritime security committee were
already members of a local maritime association that had been operating
since 1926. Officials from the Coast Guard and other federal agencies
are members of the association and use the group's meetings as one way
of sharing information with stakeholders. Coast Guard officials noted
that while this approach may reduce the role and level of participation
in the committee, it avoids duplication of efforts and allows the
committee to be part of a broader information sharing network. At the
port of Houston, the strong presence of the petrochemical industry also
made sharing information easier since an association of petrochemical
companies was already in place, according to local petrochemical and
Coast Guard officials.
Regardless of the structures and communication networks a committee
adopted, stakeholders at all four locations we reviewed agreed that the
committees fostered improved information sharing. We were not able,
however, to determine if any of these structures worked better than
others for two reasons. First, the different structures reflected the
specific needs of each port location. Second, the committees are still
in their early stages of operation and more time will be needed before
any comparative assessments can be made.
Interagency Operational Centers Have Also Improved Information Sharing:
Interagency operational centers--command centers where officials from
multiple agencies can receive data 24 hours a day on maritime
activities--have further improved information sharing at three
locations. According to participants at each of these centers, the
improvements come mainly from the 24-hour coverage and greater amount
of real-time, operational data, which the centers can use in their role
as command posts for coordinating multi-agency efforts. The Coast Guard
is developing plans to develop its own centers, called sector command
centers, as part of an effort to reorganize and improve its awareness
of the maritime domain. Some of these sector command centers may be
interagency on either a regular or an ad hoc basis. However, the
potential relationship between interagency operational centers and the
Coast Guard's new sector command centers remains to be determined,
pending a Coast Guard report to Congress.
Centers Process and Share Information on Operations:
Information sharing at the three existing interagency operational
centers (Charleston, Norfolk, and San Diego), represents a step toward
further improving information sharing, according to participants at all
three centers. They said area maritime security committees have
improved information sharing primarily through a planning process that
identifies vulnerabilities and mitigation strategies, as well as
through development of two-way communication mechanisms to share threat
information on an as-needed basis. In contrast, interagency operational
centers can provide continuous information about maritime activities
and involve various agencies directly in operational decisions using
this information. Radar, sensors, and cameras offer representations of
vessels and facilities. Other data are available from intelligence
sources, including data on vessels, cargo, and crew. For example:
* In Charleston, four federal agencies (DOJ, Coast Guard, U.S. Customs
and Border Protection, and U.S. Immigration and Customs Enforcement)
coordinate in a unified command structure, and each of these agencies
feeds information into the center. Eight state or local agencies (such
as the county sheriff and the state's law enforcement division) have
participants at the center full-time, and eight others participate on
an as-needed or part-time basis. Federal and nonfederal officials told
us that information sharing has improved, since participants from
multiple agencies are colocated with each other and work together to
identify potential threats by sharing information.
* In San Diego, the center is located in a Coast Guard facility that
receives information from radars and sensors operated by the Navy and
cameras operated by the local harbor patrol. Local harbor patrol
officials are colocated with Coast Guard and Navy personnel. Harbor
patrol and Coast Guard staff said the center has leveraged their
resources through the use of shared information.
* In Norfolk, the center is staffed with Coast Guard and Navy personnel
and receives information from cameras and radars. A Coast Guard Field
Intelligence Support Team is colocated at the center and shares
information related to the large concentration of naval and commercial
vessels in and around the port area with Navy and Coast Guard
personnel. According to Coast Guard officials, having a central
location where two agencies can receive data from multiple sources on a
24-hour-a-day basis has helped improve information sharing.
Greater information sharing among participants at these centers has
also enhanced operational collaboration, according to participants.
Unlike the area maritime security committees, these centers are
operational in nature--that is, they have a unified or joint command
structure designed to receive information and act on it. In the three
centers, representatives from the various agencies work side by side,
each having access to databases and other sources of information from
their respective agencies. The various information sources can be
reviewed together, and the resulting information can be more readily
fused together. Officials said such centers help leverage the resources
and authorities of the respective agencies. For example, federal and
nonfederal participants collaborate in vessel boarding, cargo
examination, and other port security responsibilities, such as
enforcing security zones (as shown in fig. 3). If the Coast Guard
determines that a certain vessel should be inspected on maritime safety
grounds and intends to board it, other federal and nonfederal agencies
might join in the boarding to assess the vessel or its cargo, crew, or
passengers for violations relating to their areas of jurisdiction or
responsibility.
Figure 3: Coast Guard Patrol Enforces Security Zone at a Port:
[See PDF for image]
Source: GAO.
[End of figure]
Variations across Centers Affect Information Sharing:
The types of information and the way information is shared varies at
the three centers, depending on their purpose and mission, leadership
and organization, membership, technology, and resources, according to
officials at the centers. The Charleston center has a port security
purpose, so its missions are all security related. It is led by DOJ,
and its membership includes 4 federal agencies and 16 state and local
agencies. The San Diego center has a more general purpose, so it has
multiple missions to include, not just port security, but search and
rescue, environmental response, drug interdiction, and other law
enforcement activities. It is led by the Coast Guard, and its
membership includes two federal agencies and one local agency. The
Norfolk center has a port security purpose, but its mission focuses
primarily on force protection for the Navy. It is led by the Coast
Guard, and its membership includes two federal agencies and no state or
local agencies. As a result, the Charleston center shares information
that focuses on law enforcement and intelligence related to port
security among a very broad group of federal, state, and local agency
officials. The San Diego center shares information on a broader scope
of activities (beyond security) among a smaller group of federal and
local agency officials. The Norfolk center shares the most focused
information (security information related to force protection) among
two federal agencies. While the Norfolk center officials said they were
planning to broaden the scope of their purpose, mission, and
membership, they had not done so at the time of our visit.
The centers also share different information because of their
technologies and resources. The San Diego and Norfolk centers have an
array of standard and new Coast Guard technology systems and access to
Coast Guard and various national databases, while the Charleston center
has these as well as additional systems and databases. For example, the
Charleston center has access to and shares information on Customs and
Border Protection's databases on incoming cargo containers from the
National Targeting Center. In addition, Charleston has a pilot project
with the Department of Energy to test radiation detection technology,
which provides additional information to share. The Charleston center
is funded by a special appropriation that allows it to use federal
funds to pay for state and local agency salaries. This arrangement
boosts the participation of state and local agencies, and thus
information sharing beyond the federal government, according to port
stakeholders in Charleston. While the San Diego center also has 24-hour
participation by the local harbor patrol, that agency pays its own
salaries.
Other Ad Hoc Arrangements for Interagency Information Sharing:
In addition to the three interagency operational centers we visited,
our work has identified other interagency arrangements that facilitate
information sharing and interagency operations in the maritime
environment. One example is a predesignated single-mission task force,
which becomes operational when needed. DHS established the Homeland
Security Task Force, South-East--a working group consisting of federal
and nonfederal agencies with appropriate geographic and jurisdictional
responsibilities that have the mission to respond to any mass migration
of immigrants affecting southeast Florida. Task force members (both
agencies and individuals) are predesignated, and they have a
contingency plan (called Vigilant Sentry) that describes each agency's
specific coordination and mission responsibilities. The task force
meets regularly to monitor potential migration events, update the
contingency plan, and otherwise coordinate its activities. When a mass
migration event occurs, the task force is activated and becomes a full-
time interagency effort to share information and coordinate operations
to implement the contingency plan. This task force was activated in
February 2004 to implement Operation Able Sentry to interdict a mass
migration from Haiti.
Another example of an interagency arrangement for information sharing
can occur in single-agency operational centers that become interagency
to respond to specific events. For example, the Coast Guard has its own
command centers for both its District Seven and Sector Miami. While
these centers normally focus on a variety of Coast Guard missions and
are not normally interagency in structure, they have established
protocols with other federal agencies, such as Customs and Border
Protection and Immigration and Customs Enforcement, to activate a
unified or incident command structure should it be needed. For example,
the interagency Operation Able Sentry (discussed above) was directed
from the Coast Guard's District Seven command center. Similarly, to
respond to a hijacking of a ship, an interagency operation was directed
from the Coast Guard's Sector Miami command center. While an
interagency operation might be directed from these Coast Guard command
centers, it might be led by another agency with greater interests or
resources to respond to an event. For example, this was the case with a
recent interagency operation to arrange for the security of dignitaries
at an international conference in Miami that was led by Immigration and
Customs Enforcement. These Coast Guard centers make it possible to host
interagency operations because they have extra space and equipment that
allow for surge capabilities and virtual connectivity with each partner
agency.
Officials from the Coast Guard, Customs and Border Protection, and
Immigration and Customs Enforcement in Miami all said that these ad hoc
interagency arrangements were crucial to sharing information and
coordinating operations.
Coast Guard Plans to Develop Sector Command Centers at Ports:
The Coast Guard is planning to develop its own operational centers--
called sector command centers--at additional ports. These command
centers are being developed to provide local port activities with a
unified command as the Coast Guard reorganizes its marine safety
offices and groups into unified sectors. In addition, the Coast Guard
sector command centers are designed to improve awareness of the
maritime domain through a variety of technologies. The Coast Guard is
planning to have command centers feed information to the Coast Guard's
two area offices--one on the Pacific Coast and the other on the
Atlantic Coast. Over the long term, the Coast Guard plans to have
information from sector command centers and area offices channeled to a
center at the national level--allowing the Coast Guard to have a
nationwide common operating picture of all navigable waters in the
country. A Coast Guard official indicated that this nationwide
information will be available to other field office commanders at the
same time it is given to area and headquarters officials. To develop
this nationwide operating picture, the Coast Guard hopes to install
equipment that allows it to receive information from sensors,
classified information on maritime matters, and data related to ships
and crewmembers as part of its expansion plans. Communication from
Coast Guard ships and aircraft, as well as federal and nonfederal
systems for monitoring vessel traffic and identifying the positions of
large ships, would be among the other types of information that could
be integrated into a command center.
The Coast Guard plans to develop sector command centers at 10 port
locations, with potential expansion to as many as 40 port locations.
The Coast Guard is currently conducting site surveys to identify
locations where it believes centers should be located. For fiscal year
2006, the Coast Guard is requesting funds that support its plans to
improve awareness of the maritime domain by, among other things,
continuing to evaluate the potential expansion of sector command
centers to other port locations. For example, the Coast Guard's budget
request includes $5.7 million to continue developing a nationwide
maritime monitoring system, the common operational picture. The common
operational picture is primarily a computer software package that fuses
data from different sources, such as radar, sensors on aircraft, and
existing information systems. The Coast Guard has also requested
funding for training personnel in common operational picture deployment
at command centers and to modify facilities to implement the picture in
command centers. While the total cost of operating command centers is
still unknown, the Coast Guard's Five-Year Capital Investment Plan
shows that the capital costs of this effort amount to an estimated $400
million, with acquisition of the system estimated to start in fiscal
year 2007.
Coast Guard Report Pending on Interagency Operational Centers:
The relationship between the interagency operational centers and the
Coast Guard's sector command centers has not been determined yet. Coast
Guard sector command centers can involve multiple agencies, and the
Coast Guard has begun using the term "sector command center--joint" for
the interagency operational centers in San Diego and Norfolk. Coast
Guard officials have told us that their planned sector command centers
will be the basis for any interagency operational centers at ports.
However, the sector command center we visited, in Sector Miami, was not
interagency on a routine basis--the Coast Guard is the single entity
operating the center.
During our visits to the interagency operational centers, port
stakeholders raised the following issues as important factors to
consider in any expansion of interagency operational centers: (1)
purpose and mission--the centers could serve a variety of overall
purposes, as well as support a wide number of specific missions; (2)
leadership and organization--the centers could be led by several
departments or agencies and be organized a variety of ways; (3)
membership--the centers could vary in membership in terms of federal,
state, local, or private sector participants and their level of
involvement; (4) technology deployed--the centers could deploy a
variety of technologies in terms of networks, computers,
communications, sensors, and databases; and (5) resource requirements-
-the centers could also vary in terms of resource requirements, which
agency funds the resources, and how resources are prioritized.
In a related step, Congress directed the Coast Guard to report on the
existing interagency operational centers, covering such matters as the
composition and operational characteristics of existing centers and the
number, location, and cost of such new centers as may be required to
implement maritime transportation security plans and maritime
intelligence activities.[Footnote 16] This report, which Congress
called for by February 2005, had not been issued by the time we had
completed our work and prepared our report for printing. According to
DHS, the report has been written and has been approved by DHS and the
Office of Management and Budget (OMB), and is now in the final stages
of review at the Coast Guard. Until the report on the centers is
issued, it is unclear how the Coast Guard will define the potential
relationship between interagency operational centers and its own sector
command centers.
Lack of Security Clearances Is a Key Barrier to More Effective
Information Sharing:
The lack of security clearances was most frequently cited as a barrier
to more effective information sharing among port stakeholders, such as
those involved in area maritime security committees and interagency
operational centers. The Coast Guard has initiated a security clearance
program for members of area maritime security committees. However, the
results of the Coast Guard's efforts have been mixed. For example, only
a small percentage of application forms from state, local, and industry
officials had actually been submitted by February 2005--over 4 months
after the Coast Guard had developed its list of officials. The primary
reason given for this was that Coast Guard field office officials did
not clearly understand their role in helping nonfederal officials apply
for a security clearance. The Coast Guard's program does not have
formal procedures for using data to manage the program, but developing
such procedures would allow the Coast Guard to identify and deal with
possible problems in the future. Finally, as the Coast Guard moves
forward with its state, local, and industry security clearance program,
the experience of other federal agencies that manage similar programs
suggests that the limited awareness of state, local, and industry
officials about the process for obtaining a security clearance could
also impede the submission of applications for a security clearance.
Port Security Stakeholders Cite the Lack of Clearances as a Problem:
At the ports we visited, the lack of security clearances was cited as a
key barrier to information sharing among participants of area maritime
security committees and interagency operational centers we contacted.
Port stakeholders involved in the four area maritime security
committees consistently stated that the lack of federal security
clearances for nonfederal members was an impediment to effective
information sharing. Here are several examples:
* An official of the Washington State Ferries who participates on the
Puget Sound area maritime security committee said that not having a
security clearance--and therefore the ability to access classified
information--affected his ability to carry out security-related
activities.[Footnote 17] He noted that the local U.S. Attorney reported
to a local newspaper in the summer of 2004 that suspicious activities
had been reported on the state ferry system. The Washington State
Ferries official indicated that he or his staff was the source for some
of the data but that federal officials would not provide him with more
details on the activities because he did not have a security clearance.
A Coast Guard field intelligence official corroborated this by stating
that the Captain of the Port was unable to share classified information
from the U.S. Attorney's office that indicated a pattern of incidents
involving the ferries. Although Coast Guard officials said they wanted
to share this information, ferry officials' lack of a federal security
clearance precluded them from doing so. Both Coast Guard and ferry
officials indicated that more complete information would aid local
security officers in identifying or deterring illegal activities.
* A senior Maryland state official involved in making budget decisions
on improving security around facilities in the port of Baltimore
indicated that having a security clearance would aid his ability to
make decisions on how the state could more effectively spend its
resources on homeland security. He said information on what
transportation sectors are probable targets would be a valuable input
on where the state should prioritize its spending decisions.
* A senior Coast Guard official in Houston told us that granting
security clearances to selected members of the area maritime security
committee would make it easier for nonfederal officials to make
decisions on how to respond to specific threats. A local Coast Guard
intelligence official cited an example in which classified information
could not be shared with port stakeholders. The official told us that
there were delays in sharing the information until the originator of
the information supplied a sanitized version.
Similar to the concerns expressed by area maritime security committee
members, participants we contacted at the three interagency operational
centers cited the lack of security clearances as a barrier to
information sharing. At the center in San Diego, the chief of the local
harbor patrol noted that the lack of security clearances was an issue
for patrol staff who are involved in the center. Subsequent to raising
this issue, DHS sponsored security clearances for 18 harbor patrol
officials. At the center in Charleston, participants in the interagency
operational center cited the lack of security clearances as a potential
barrier to information sharing. The Department of Justice addressed
this potential barrier by granting security clearances to nonfederal
officials involved in the center. Finally, Coast Guard officials
indicated that when nonfederal officials begin working at the
interagency operational center in Norfolk, granting security clearances
to nonfederal participants will be critical to their success in sharing
information.
According to the Coast Guard and state and local officials we
contacted, the shared partnership between the federal government and
state and local entities may fall short of its potential to fight
terrorism because of the lack of security clearances. If state and
local officials lack security clearances, the information they possess
may be incomplete. According to Coast Guard and nonfederal officials,
the inability to share classified information may limit their ability
to deter, prevent, and respond to a potential terrorist attack.
While security clearances for nonfederal officials who participate in
interagency operational centers are sponsored by DOJ and DHS, the Coast
Guard sponsors security clearances for members of area maritime
security committees. For the purposes of our review, we examined in
more detail the Coast Guard's efforts to address the lack of security
clearances among members of area maritime security committees.
Coast Guard Has Taken Steps to Grant Additional Clearances to State,
Local, and Industry Officials, but Efforts to Date Have Been Mixed:
As part of its effort to improve information sharing at ports, the
Coast Guard initiated a program in July 2004 to sponsor security
clearances for members of area maritime security committees, but
nonfederal officials have been slow in submitting their applications
for a security clearance. By October 2004, the Coast Guard had
identified 359 nonfederal committee members who had a need to know and
should receive a security clearance, but as of February 2005, only 28
officials, or about 8 percent, had submitted the application forms for
a security clearance. Twenty-four of these officials have been granted
an interim clearance, which allows access to classified material while
the final clearance is being processed.
We interviewed local Coast Guard officials at the four ports we visited
to gain a better understanding of the role of the Coast Guard in
guiding state and local officials through the process. Our work shows
that there were two areas that affected the Coast Guard's efforts: (1)
local Coast Guard officials did not clearly understand their role in
the security clearance program and (2) the Coast Guard did not use
available data to track the status of security clearances for state and
local officials.
Coast Guard Field Office Officials Said They Did Not Clearly Understand
Their Role in the Security Clearance Program:
Coast Guard field office officials said they did not clearly understand
their role in helping nonfederal officials apply for a security
clearance. In July 2004, Coast Guard headquarters sent guidance to
Coast Guard field offices requesting them to proceed with submissions
of personnel security investigation packages and to submit the
additional names of state and local officials who had a need for a
security clearance. However, this guidance evidently was unclear to
field office officials. For example, by January 2005--3 months after
they submitted names to headquarters--Coast Guard officials at three of
the ports we visited were still awaiting further guidance from
headquarters on how to proceed.[Footnote 18] These officials said they
thought that headquarters was processing security clearances for
nonfederal officials, and they were waiting for notification from
headquarters that security clearances had been granted.
Our discussions with a Coast Guard field office official at the fourth
port location suggest that additional guidance about the process for
the state, local, and industry security clearance program could be
beneficial. For example, according to this official, membership on area
maritime security committees changes over time, and it would be helpful
to have guidance on the process for obtaining additional security
clearances or dropping clearances for officials who no longer
participate on the committees or who no longer have a need to know
classified information. This official noted that the process differed
depending on whether a committee participant is considered to be a
military or civilian official.
In early February 2005, we expressed our concerns about the security
clearance program to Coast Guard officials. On the basis, in part, of
our discussions, Coast Guard headquarters took action and drafted
guidance informing its field office officials that they were
responsible for contacting nonfederal officials and for providing them
with application forms for obtaining a security clearance, according to
Coast Guard officials. Additionally, to further clarify the role of
field office officials, the Coast Guard's draft guidance included
information on various procedures for obtaining a security clearance.
After receiving a draft of this report, the Coast Guard finalized this
guidance and sent it to field office officials in early April 2005. Our
review of the guidance shows that it clarifies the role of field office
officials in administering the security clearance process at the local
level and that it provides more detailed procedures on how to check the
status of applications that have been submitted for a security
clearance.
In addition to writing draft guidance on the program, the Coast Guard
recently demonstrated that the security clearance program has produced
some positive results. For example, in late 2004, the Coast Guard
determined the need to share the results of a security study on
ferries, portions of which were classified, with some members of an
area maritime security committee. Working with Coast Guard field office
officials, Coast Guard headquarters and the Coast Guard Security Center
were able to process and grant about a dozen security clearances to
state, local, and industry officials. As a result, the Coast Guard was
able to share classified information with state, local, and industry
officials that it believed would help them in carrying out their port
security responsibilities.
Data Could Be More Effectively Used as a Tool to Manage the Security
Clearance Program:
A key component of a good management system is to have relevant,
reliable, and timely information available to assess performance over
time and to correct deficiencies as they occur. The Coast Guard has two
databases that contain information on the status of security clearances
for state, local, and industry officials. The first database is a
commercial off-the-shelf system that contains information on the status
of all applications that have been submitted to the Coast Guard
Security Center, such as whether a security clearance has been issued
or whether personnel security investigations have been conducted. In
February 2004, the Coast Guard began testing the database for use by
field staff, and while headquarters has still not granted field staff
access to the database, it plans to do so in the future. The second
database--an internally developed spreadsheet on the 359 area maritime
committee participants--summarizes information on the status of the
security clearance program, such as whether they have submitted their
application forms and whether they have received their clearances.
Although the Coast Guard has databases that could be used to manage the
state, local, and industry security clearance program, thus far, it has
not developed formal procedures for using the data as a management tool
to follow up on possible problems at the national or local level to
verify the status of clearances. In regard to the database used by the
Security Center, a Coast Guard official told us that the database was
not designed to monitor application trends, but instead is used to
provide information on individual applicants. The Coast Guard's
internally developed spreadsheet on committee participants who have
been deemed candidates for a security clearance, however, does offer
information on application trends, and could be used to monitor
progress that has been made at the national or local level. For
example, updating the database on a routine basis could identify port
areas where progress is slow and indicate that follow-up with local
field office officials may be needed. In a similar security clearance
program, the experience of the FBI shows the utility of data as a tool
for managing the program. For example, FBI officials indicated that its
databases have served as management tools for tracking state, local,
and industry security applications and for monitoring application
trends and percentages. The Coast Guard has yet to develop formal
procedures for using its data on committee participants as a tool to
assess potential problems and to take appropriate action, if necessary.
Doing so would likely aid its efforts to manage the state, local, and
industry security clearance program at both the local and the national
levels.
While the Coast Guard's databases on security clearances shows promise
as a tool for monitoring the state, local, and industry security
clearance program, the database also has limitations in that it cannot
be used to determine how many nonfederal officials have a federal
security clearance sponsored by other federal agencies. For example, a
Coast Guard official stated that this information is difficult to
obtain because the Coast Guard does not have easy access to databases
of other agencies. In September 2004, we testified that existing
impediments to managing the security clearance process include the lack
of a governmentwide database of clearance information, which hinders
efforts to provide timely, high-quality clearance
determinations.[Footnote 19] As a way to deal with this problem, a
local Coast Guard official sent a survey to port security stakeholders
to determine how many stakeholders had security clearances sponsored by
other federal agencies.
Raising the Awareness of State, Local, and Industry Officials Might
Improve the Processing of Application Forms:
Our prior reviews of DOD and FBI efforts to manage a large number of
security clearances for service members, government employees, and
industry personnel have demonstrated long-standing backlogs and delays.
In addition, our FBI work showed that it is important to address
training and education to successfully carry out an effective security
clearance program.[Footnote 20] Our reviews also showed that the use of
internal controls to ensure that security clearances are granted in
compliance with existing rules and regulations will become increasingly
important.
The experience of the FBI in managing its security clearance program
shows that educating nonfederal officials about the security clearance
program resulted in improvements in the processing of applications for
a security clearance. The FBI grants security clearances to state and
local law enforcement officials who may require access to classified
national security information to help prevent or respond to terrorist
attacks. After September 11, an increasing number of state and local
officials began requesting security clearances to obtain terrorism-
related information that might affect their jurisdictions. However,
when the FBI received a low percentage of application forms for
security clearances from nonfederal officials, the agency consulted
with state and local officials to collect their views and
recommendations regarding information sharing and improving the
security clearance process, and the FBI identified unfamiliarity with
the requirements for processing security clearance applications as one
of the main impediments to timely processing of applications. For
example, some state and local officials said that they did not have
adequate guidance for filling out and submitting the appropriate
application forms. In response, the FBI widely distributed step-by-step
guidance to state and local law enforcement officials through
informational brochures (available on a FBI Web site) and meetings with
state and local officials, among other efforts. Some law enforcement
officials we interviewed stated that the FBI's guidance and
consultation with law enforcement professional organizations helped
improve state and local officials' understanding of the security
clearance application process.[Footnote 21]
Once the Coast Guard begins notifying more state, local, and industry
officials about the process for obtaining a security clearance, raising
the awareness of nonfederal officials about the program could improve
the processing of application forms. An official at the field office
that had actually contacted state and local officials about the
security clearance program indicated that field office officials did
not have basic information about the security clearance program. Among
other things, he mentioned that informational brochures and Web sites
could be given to nonfederal officials as a way to improve their
awareness of the security clearance process.
Attending to the potential lack of awareness by nonfederal officials
about the security clearance program is important because the number of
nonfederal officials who submit application forms for a security
clearance may be much larger than the several hundred state, local, and
industry officials who participate on area maritime security
committees. For example, DHS will sponsor an estimated 5,000 security
clearances for state, local, and industry officials and the Coast Guard
Security Center will process these clearances, according to Coast Guard
officials. Additionally, the Coast Guard plans to grant clearances to
about 200 other nonfederal officials who are involved in supporting
other Coast Guard operations, such as sector command centers. In
addition, as the Coast Guard's security clearance program evolves,
participants on area maritime security committees or in sector command
centers may change over time, thus highlighting the importance of
having ways to raise the awareness of nonfederal officials about the
security clearance process.
Other Barriers Intrinsic to Port Operations May Also Impede Information
Sharing:
Port security stakeholders cited other barriers to effective
information sharing intrinsic to ports we visited, but none of these
barriers were mentioned as frequently as the lack of security
clearances. At the four ports we visited, characteristics intrinsic to
the port, such as their size and complexity were stated as barriers to
effective information sharing. In Houston, for example, multiple
stakeholders, such as port authorities, numerous jurisdictions, and a
diverse set of users, were presented as challenges in information
sharing efforts. The length of the Houston Ship Channel (50 miles),
with numerous public and private entities using the channel, also
complicates information sharing efforts. To deal with the size and
complexity of this port area, Coast Guard officials said they have
worked with associations representing the commercial fishing industry,
petrochemical companies, and state and local law enforcement as a means
to share information about port security with as many users of the port
and the Houston Ship Channel as possible. For example, the local Coast
Guard officials said they held informational meetings with recreational
boating associations and with area maritime security committee
participants to inform boaters and other stakeholders of "safety
zones"--areas where recreational use of the waterway is prohibited--in
the Houston Ship Channel. Another barrier mentioned at another port
location was the "cultural" barrier between various members of the area
maritime security committees. For example, officials at this port
location stated that an informal network has created insiders and
outsiders drawing particular distinctions between law enforcement and
non-law enforcement officials.
Conclusions:
Effective information sharing among members of area maritime security
committees and participants in interagency operational centers can
enhance the partnership between federal and nonfederal officials, and
it can improve the leveraging of resources across jurisdictional
boundaries for deterring, preventing, or responding to a possible
terrorist attack at the nation's ports. The Coast Guard has recognized
the importance of granting security clearances to nonfederal officials
as a means to improve information sharing, but progress in moving these
officials through the application process has been slow. In the future,
the Coast Guard may need to grant additional security clearances to
state, local, or industry participants who join area maritime security
committees or sector command centers to support counterterrorism
programs. In this way, as the Coast Guard's state, local, and industry
security clearance program matures, the importance of effectively
managing the security clearance program will become even more
important. Increased management attention and guidance about the
process would strengthen the program for security clearances, and it
would reduce the risk that nonfederal officials may have incomplete
information as they carry out their law enforcement activities.
Recommendations for Executive Action:
To help ensure that nonfederal officials receive needed security
clearances as quickly as possible, both now and in the future, we
recommend that the Secretary of Homeland Security direct the Commandant
of the Coast Guard to take the following two actions.
* Develop formal procedures so that local and headquarters officials
use the Coast Guard's internal databases of state, local, and industry
security clearances for area maritime committee members as a management
tool to monitor who has submitted applications for a security clearance
and to take appropriate action when application trends point to
possible problems. For example, updating the database on a routine
basis could identify port areas where progress is slow and indicate
that follow-up with local field office officials may be needed.
* Raise the awareness of state, local, and industry officials about the
process of applying for security clearances. This effort could involve
using brochures, Web sites, or other information that the FBI has used
in its program for educating state and local officials about the
security clearance process.
Agency Comments and Our Evaluation:
We provided a draft of this report to DHS, DOJ, and DOD for comment.
DHS, including the Coast Guard, generally agreed with our findings and
recommendations. Specifically, DHS noted that our recommendations
should enhance the Coast Guard's efforts to promote information sharing
among port security stakeholders. DHS also indicated that changes
associated with processing security clearances should overcome
identified impediments. DOJ and DOD declined to provide comments.
Our draft report included a recommendation that the Coast Guard clarify
the role of field office officials in communicating with state, local,
and industry officials about the process for obtaining a security
clearance. After receiving our draft report, the Coast Guard issued a
memo to field office officials that clarified their role in the
security clearance program. The Coast Guard's memo also provided more
detailed guidance on the process for sponsoring additional state,
local, or industry officials for a security clearance. As a result of
the Coast Guard's action, we have dropped this recommendation from our
final report. In regard to interagency operational centers, DHS also
noted that the Coast Guard report required by Congress on existing
interagency operational centers has been approved by DHS and OMB and is
now in the final stages of review at the Coast Guard. In addition to
commenting on our findings and recommendations, DHS provided technical
comments on the report under separate cover and we revised the draft
report where appropriate. Written comments from DHS are reprinted in
appendix IV.
As agreed with your office, unless you publicly announce its contents
earlier, we plan no further distribution of this report until 30 days
after its issue date. At that time, we will provide copies of this
report to appropriate departments and interested congressional
committees. We will also make copies available to others upon request.
This report will also be available at no charge on the GAO Web site at
http://www.gao.gov.
If you or your staff have any question about this report, please
contact me at (415) 904-2200 or at wrightsonm@gao.gov or Stephen L.
Caldwell, Assistant Director, at (202) 512-9610 or at
caldwells@gao.gov. Key contributors to this report are listed in
appendix V.
Signed by:
Margaret T. Wrightson:
Director, Homeland Security and Justice Issues:
[End of section]
Appendix I: Objectives, Scope, and Methodology:
Each of our objectives involved information sharing between federal
agencies and nonfederal stakeholders. Specifically,
* What impact have area maritime security committees had on information
sharing?
* What impact have interagency operational centers had on information
sharing?
* What barriers, if any, have hindered improvements in information
sharing among port security stakeholders?
We carried out part of our work at Coast Guard headquarters or in
consultation with headquarters officials. We spoke with Coast Guard
officials to obtain information on how information is shared within the
maritime security community and reviewed pertinent legislation,
guidance, rules, and other relevant documents related to the sharing of
maritime security information with nonfederal stakeholders. For
example, we reviewed pertinent statutes, such as the Maritime
Transportation Security Act and the Homeland Security Act. We also
reviewed selected maritime security plans, Coast Guard regulations
implementing the Maritime Transportation Security Act, and various
reports from congressionally chartered commissions related to
information sharing.
To address our first objective, we conducted structured interviews with
officials from federal agencies and representatives from state and
local governments, law enforcement agencies, maritime industry
associations, and private sector entities who were stakeholders in port
security issues. Many of these officials were members of area maritime
security committees. These interviews were largely conducted during
site visits to four specific maritime port areas. We selected these
ports to provide a diverse sample of security environments and
perspectives, basing our selections on such matters as geographic
location, varying levels of strategic importance, and unique local
characteristics. The four port areas and some of our reasons for
choosing them are as follows:
* Baltimore, Maryland: a Mid-Atlantic port that is managed by a state
agency and services a variety of cargo, including bulk and container
cargo, and cruise passengers;
* Charleston, South Carolina: a South Atlantic port that is state owned
and operated, with three separate facilities and military facilities
and installations;
* Houston, Texas: a Gulf coast port that is governed by an appointed
commission and consists of a 25-mile-long complex of diversified public
and private facilities, including the nation's largest petrochemical
complex; and:
* Seattle/Tacoma, Washington: a Pacific coast port area that is
operated by municipal corporations, represents the third largest
container cargo port in the country, and services the country's largest
state-operated passenger ferry system.
During each of our visits to these four ports, we met with the
identified port stakeholders, Coast Guard marine safety offices, and
Captains of the Port. In our meetings with Captains of the Port and
marine safety offices, we discussed the creation of and composition of
the area maritime security committee at their port and the
effectiveness of the committee in facilitating information sharing. We
also discussed and collected documents related to policies and
procedures pertaining to sharing information with nonfederal
stakeholders. We collected documentary evidence in the form of
information bulletins that are used to disseminate information to
stakeholders. When we met with the nonfederal stakeholders at the
ports, we discussed specific security concerns at their facilities or
in their jurisdictions and how they were being addressed. We also
discussed their involvement and experiences with the local area
maritime security committee, of which most were members, and how they
receive and share information with federal agencies, particularly the
Coast Guard. With both groups, we discussed any perceived barriers to
information sharing and ideas and plans to resolve these issues. This
information was used in conducting a comparative analysis of the port
areas and allowed us to distinguish differences between the locations
while identifying common issues.
In addressing the second objective, we conducted site visits at the
three interagency operational centers located in Charleston, South
Carolina; Norfolk, Virginia; and San Diego, California. Related to
this, we visited the Homeland Security Task Force South-East and
command centers for the Coast Guard district and sector in Miami,
Florida because these centers also aim to facilitate information
sharing and joint operations related to maritime security. At each
location, we conducted structured interviews with officials from the
agencies participating in the centers. These interviews allowed us to
obtain information regarding the history of the centers and how their
missions and structures are changing. Specifically, we discussed how
their presence affects information sharing among federal stakeholders
as well as with nonfederal stakeholders. We also discussed challenges
facing the centers as they become more formalized. During the visits,
documents that describe the centers as well as examples of the products
they distribute were collected. Observations made at the facilities
allowed us to provide context to the testimonial evidence we collected.
We also viewed demonstrations of the emerging technologies as well as
differences in the physical attributes of each center. The testimonial
evidence, aided by our observations, was synthesized and analyzed,
allowing us to perform a comparative analysis, identifying differences
and commonalities in information sharing among the centers.
To address the third objective, we followed up with officials at Coast
Guard headquarters and obtained guidance and data regarding the current
effort to administer security clearances at the secret level to
selected nonfederal stakeholders at each port. In subsequent phone
interviews with the officials of marine safety offices at the ports we
visited, we discussed problems encountered in the communication and
implementation of this effort and steps that are being taken to resolve
these problems. In addition, we reviewed Coast Guard documents related
to information sharing, such as data on the number of nonfederal
officials who had received security clearances, guidance from Coast
Guard headquarters to field offices, and other pertinent instructions.
In regard to this database, we checked the reliability of the database
for the four ports we visited and found that the database was generally
accurate. We found that 24 of the 27 entries were correct. In addition,
we reviewed prior GAO reports that dealt with information sharing
issues. Finally, we interviewed 64 federal and nonfederal stakeholders
at the four ports we visited and asked them whether there were any
barriers to information sharing. The results of our interviews cannot
be projected to all participants on the area maritime security
committees.
Our review was conducted from May 2004 to March 2005 in accordance with
generally accepted government auditing standards.
[End of section]
Appendix II: Stakeholder Groups Recommended for Membership on Area
Maritime Security Committees:
This appendix provides information on the Coast Guard's guidance for
developing the local membership and organization of the area maritime
security committee. The Coast Guard's guidance directs the Captain of
the Port to take into account all aspects of each port area and its
adjacent waterways and coastal areas. The committees should be composed
of federal, state, and local agencies; law enforcement and security
agencies; and port stakeholders. Representatives for each aspect of the
port and those charged with its regulation or enforcement should be
encouraged to participate. Table 1 provides a list of representatives
that an area maritime security committee could include.
Table 1: Representatives That an Area Maritime Security Committee Could
Include:
Federal agencies: U.S. Coast Guard (USCG);
Department of Defense (DOD);
Nuclear Regulatory Commission (NRC);
U.S. Department of Agriculture (USDA);
Environmental Protection Agency (EPA);
Occupational Safety and Health Agency (OSHA);
Federal Bureau of Investigation (FBI);
Emergency Preparedness and Response (EPR);
Customs and Border Protection (CBP);
Immigration and Customs Enforcement (ICE);
Transportation Security Administration (TSA);
Army Corps of Engineers (ACOE);
U.S. Transportation Command (TRANSCOM);
Military Sealift Command (MSC);
Military Traffic Management Command (MTMC);
Animal and Plant Health Inspection Service (APHIS);
Maritime Administration (MARAD);
Research and Special Programs Administration (RSPA);
Federal Railway Administration (FRA);
Federal Highway Administration (FHWA);
Federal Transit Administration (FTA);
Other government representatives, where appropriate.
State and local agencies: National Guard;
Marine police;
Port authority police and security forces;
Fire departments;
Civil defense;
City government officials;
Transportation agencies;
Fish and wildlife marine units;
Health agencies;
Occupational safety agencies;
Terminal/facility security forces;
Pilot associations;
Other state, local, and city government representatives;
State department of natural or environmental resources;
marine units;
Other environmental agencies;
Regional development agencies/metropolitan planning organizations.
Industry-related agencies: Facility owners/operators;
Terminal owners/operators;
Trade organizations;
Recreational boating organizations (yacht clubs, rowing clubs);
Railroad companies;
Trucking companies;
Shipyards;
Tow-boat operators;
Marine exchanges;
Industry organizations;
Organized labor;
Commercial fishing industry;
Waterborne vendors and service providers (harbor tugs, launch services,
line handlers, small ferry operators, water taxis);
Other facilities within the port having waterside access, e.g.,
refineries, chemical plants, power plants.
Source: Coast Guard.
[End of table]
Area maritime security committees are not limited to the agencies and
organizations on this list. As each port has specific needs and issues,
the membership of committees can vary greatly from port to port.
[End of section]
Appendix III: Port-Level Information Sharing Is Supported by, and
Supports, National-Level Intelligence Infrastructure:
This appendix provides information on the departments and
agencies/components involved in maritime information sharing, at both
the national level and the regional or field level. Table 2 lists
departments and agencies/components (including the Coast Guard) that
potentially play a role in disseminating maritime threat information
to, and receiving information from, area maritime security committees
and interagency operational centers.
Table 2: Department and Agency Intelligence Organizations at the
National, Regional, and Field Level That Are Potentially Involved in
Maritime Information Sharing:
Department of Homeland Security:
Agency/component: U.S. Coast Guard (USCG);
National-level intelligence organizations: The Coast Guard Intelligence
Coordination Center (ICC), working in conjunction with the Navy's
Office of Naval Intelligence (ONI) at the National Maritime
Intelligence Center (NMIC), tracks the movement of vessels, cargoes,
and crews while providing intelligence analysis and warning
information;
Regional or field-level intelligence organizations: Two Coast Guard
Maritime Intelligence Fusion Centers (MIFCs), located on each coast,
receive intelligence from, and provide intelligence to, ICC. MIFCs also
provide actionable intelligence to Coast Guard commanders at the
district and port levels, and share that analysis with interagency
partners. At the port level, Captains of the Ports (COTPs) head area
maritime security committees that include federal and nonfederal
stakeholders and help facilitate information sharing. Field
Intelligence Support Teams (FISTs), also located at the port level, are
composed of intelligence specialists who collect, analyze, and
disseminate critical maritime threat information. FISTs can be
colocated at interagency operational centers or Coast Guard district or
sector command centers.
Agency/component: U.S. Customs and Border Protection (CBP);
National-level intelligence organizations: The CBP Office of
Intelligence collects, develops, analyzes, and disseminates
intelligence in support of tactical and operational maritime security
mission requirements and prepares strategic analysis for key decision
makers. Analytical reports are prepared for DHS to disseminate to
appropriate agency components and other federal agencies. CBP's
National Targeting Center (NTC) conducts "sweep" operations of
information on air, sea, and land passengers, conveyances, and cargo.
The center does 24-hour tactical targeting that coordinates CBP's field
operations response to terrorist threats and national security
concerns, develops raw intelligence into actionable targets, and works
as a liaison between other CBP offices and other federal agencies such
as the Coast Guard;
Regional or field-level intelligence organizations: CBP Advanced
Targeting Units (ATUs), at the port level, screen incoming cargo that
poses a possible threat to the national security of the United States.
Agency/component: U.S. Immigration and Customs Enforcement (ICE);
National-level intelligence organizations: ICE Office of Intelligence
evaluates, disseminates, and coordinates classified intelligence
community and law enforcement reporting. A central component of the ICE
information-sharing effort is ICE Intelligence Watch, which evaluates
all tactical intelligence of terrorist threats to the homeland and
provides additional analytical support through crosschecks of all
agency and intelligence community databases;
Regional or field-level intelligence organizations: ICE has six Field
Intelligence Units (FIUs) that provide geographic and regional
intelligence analysis and supervise Intelligence Collection and
Analysis Teams (ICATs) that are also active in the field. In the
maritime domain, ICE maintains Watchtower, which is a field maritime
intelligence operation that provides detailed information on incoming
vessels resulting from targeted inspections of vessels and cargo. Over
20 Watchtower specialists, located at 17 seaports nationwide, produce
Field Intelligence Reports (FIRs) covering all domestic seaports.
Watchtower specialists meet and work with state and local law
enforcement, Coast Guard, CBP, and DOJ officials. Among other things,
these specialists provide information on ships (e.g., container cargo
ships, tankers, and bulk carriers) that may require an enforcement
action, such as a boarding or interview of the vessel master.
Agency/component: Transportation Security Administration (TSA);
National-level intelligence organizations: As part of its mission to
protect the nation's transportation system, TSA is tasked to develop a
maritime information system in accordance with requirements of the
Maritime Transportation Security Act of 2002. As such, DHS is exploring
the most appropriate means of fulfilling this legislative requirement.
The TSA Transportation Security Intelligence Service (TSIS)
disseminates intelligence and law enforcement information about threats
to transportation security and serves as a liaison for transportation
security to the intelligence community. In this capacity, TSIS helps to
coordinate domestic and international transportation security
activities with DHS and other government agencies;
Regional or field-level intelligence organizations: No domestic
presence at the regional or field levels specifically related to
maritime security.
Agency/component: Information Analysis and Infrastructure Protection
(IAIP);
National-level intelligence organizations: The mission of IAIP is to
identify and assess current and future threats to the homeland, map
those threats against known vulnerabilities, develop protective
measures, issue timely warnings, and take preventive and protective
action. This threat information includes, but is not limited to, the
maritime environment. As part of this mission, IAIP is to provide
information to federal, state, local, tribal government, law
enforcement, and private sector officials as appropriate, both
classified and unclassified, and also conducts a daily Information
Analysis Morning Executive Brief, whereby DHS components share and
coordinate threat information;
Regional or field-level intelligence organizations: No domestic
presence at the regional or field levels specifically related to
maritime security.
Department of Justice:
Agency/component: U.S. Attorneys' Offices;
National-level intelligence organizations: Executive Office for U.S.
Attorneys (EOUSA) provides for close liaison between DOJ in Washington,
D.C., and the 94 U.S. Attorneys' offices located throughout the nation,
as well as direction, oversight, and support;
Regional or field-level intelligence organizations: DOJ, through U.S
Attorney Anti-Terrorism Advisory Councils (ATACs), has established
state and regional task forces and coordination centers that may
include a maritime component or nexus, such as the Maryland
Coordination and Analysis Center (MCAC).
Agency/component: Federal Bureau of Investigation (FBI);
National-level intelligence organizations: Counterterrorism Division
(CTD) is colocated with the National Counterterrorism Center, but
remains under the direction of FBI. CTD conducts analysis, evidence
exploitation, and the preparation and dissemination of finished
intelligence products and briefing materials related to
counterterrorism; National Joint Terrorism Task Force (NJTTF) includes
representatives from the Departments of Homeland Security, Defense,
Justice, Treasury, Transportation, Commerce, Energy, State, and
Interior; and collects terrorism information and intelligence and
funnels it to Joint Terrorism Task Forces (JTTFs);
Regional or field-level intelligence organizations: Joint Terrorism
Task Forces are multi-agency investigative teams composed of federal,
state and local agencies that work jointly with other nonmember
agencies to investigate terrorism matters. JTTFs are designated
conduits of information from federal to state and local officials (and
the private sector) and are located in 66 field offices across the
country; In addition, the FBI Maritime Liaison Agent (MLA) Program is
intended to enhance the security of the U.S. maritime environment by
training special agents and Joint Terrorism Task Force officers serving
at various port area on subjects pertaining to preventing terrorism at
our nation's seaports. Designated MLAs throughout the nation are
required to increase interaction between law enforcement and the
private sector, state and local port authorities, and other federal
agencies with maritime responsibilities.
Department of Defense:
Agency/component: Department of the Navy;
National-level intelligence organizations: The Office of Naval
Intelligence (ONI) provides national-level maritime intelligence on
merchant and non-merchant ship activity to determine possible terrorist
threats abroad and at home. ONI is colocated with the Coast Guard ICC
at NMIC; Naval Criminal Investigative Service (NCIS) is the primary law
enforcement and counterintelligence arm of the Navy. The NCIS Multiple
Threat Alert Center (MTAC) tracts worldwide threats against navy
facilities and vessels;
Regional or field-level intelligence organizations: ONI has no domestic
presence at the regional or field levels specifically related to
domestic maritime security; NCIS has regional agents who work closely
with federal, state, and local agencies to counter terrorism and
protect navy facilities and vessels, as well as shipping military
equipment.
Other Intelligence Community:
Agency/component: Central Intelligence Agency (CIA);
National-level intelligence organizations: CIA's Counterterrorism
Center (CTC), colocated at the National Counterterrorism Center,
assists CIA in coordinating the counterterrorist efforts of the
intelligence community by implementing a counterterrorist operations
program to collect intelligence on international terrorist groups,
producing analyses of the groups and states responsible for
international terrorism and coordinating the counterterrorist
activities of the intelligence community. CTC has dedicated analysts to
the threat against U.S. seaports and maritime assets;
Regional or field-level intelligence organizations: No domestic
presence at the regional or field levels specifically related to
maritime security.
Agency/component: National Counterterrorism Center (NCTC);
National-level intelligence organizations: NCTC is responsible for
analyzing and integrating foreign and domestic intelligence acquired
from all U.S. government departments and agencies pertaining to
terrorism. The center will identify, coordinate, and prioritize the
counterterrorism intelligence requirements of the nation's intelligence
agencies;
Regional or field-level intelligence organizations: No domestic
presence at the regional or field levels specifically related to
maritime security.
Source: GAO.
[End of table]
The Coast Guard, as the lead in domestic maritime security, plays a
central role in maritime threat information sharing and has a robust
presence at the national, regional, and port levels. In this capacity,
it conducts intelligence activities in support of all its missions,
maritime homeland security, and national security objectives, including
information collection, analysis, and dissemination of intelligence
information. Figure 4 illustrates how Coast Guard national and regional
maritime information is channeled to and from representatives of a
local area maritime security committee (AMSC) or interagency
operational center.
Figure 4: Flow of Information from National and Regional Coast Guard
Sources to Area Maritime Security Committees and Interagency
Operational Centers at the Port Level:
[See PDF for image]
[End of figure]
Beyond the Coast Guard, other agencies can also play a major role in
channeling maritime security information to the port level. As shown in
table 2, some of these agencies have broader responsibilities for
intelligence across all domains. For example, DOJ has a number of
organizations involved in terrorist threat information sharing, such as
the National Joint Terrorism Task Force, which act as a liaison and
conduit for "all domain" (e.g., maritime and nonmaritime) information
from FBI headquarters to Joint Terrorism Task Forces operating in the
field. The FBI also has designated Maritime Liaison Agents at the port
level who interact with state, local, and private sector officials and
other federal agencies, to enhance security at the nation's seaports.
In addition, U.S. Attorneys' Offices of DOJ set up Anti-terrorism
Advisory Councils that sponsor state-or regional-level task forces or
coordination centers that may include a maritime security component.
Figure 5 graphically illustrates (1) how maritime and nonmaritime
information and intelligence is shared among agencies at the national
level and (2) organizational conduits through which information is
shared with the port level. The left side of the figure shows DOJ
channels for information discussed above. On the right side, the figure
also shows the flow of information through Coast Guard channels, as
already shown in figure 4.
Figure 5: Flow of Information between National Intelligence and Law
Enforcement Agencies and between the National and the Port Level:
[See PDF for image]
[End of figure]
[End of section]
Appendix IV: Comments from the Department of Homeland Security:
U.S. Department of Homeland Security:
Washington, DC 20528:
April 5, 2005:
Ms. Margaret T. Wrightson:
Director, Homeland Security and Justice Issues:
U.S. Government Accountability Office:
441 G Street, NW:
Washington, DC 20548:
Dear Ms. Wrightson:
RE: Draft Report GAO-05-394, New Structures Have Improved Information
Sharing, but Security Clearance Processing Requires Further Attention
(GAO Job Code 440283):
The Department of Homeland Security (DHS), including the Coast Guard,
appreciates the opportunity to comment on the Government Accountability
Office's draft report.
We generally agree with the findings and recommendations made. The
report notes that Coast Guard has lead responsibility in coordinating
maritime information sharing efforts to secure the nation's ports
against potential terrorist attack. Coast Guard established area
maritime security committees and, working with other agencies including
other DHS components, has further enhanced information sharing and port
security operations by establishing interagency operational centers.
Both the area maritime security committee structure and the interagency
operational centers have resulted in greater information sharing among
interested federal, state, and local governments, and the private
sector.
Recommendations intended to improve information sharing among
nonfederal officials should enhance Coast Guard's on-going efforts
promoting information sharing among port security stakeholders. Changes
associated with processing security clearances should overcome
identified impediments to otherwise successful attempts to strengthen
port security through the involvement of various stakeholders. As
mentioned in the draft, Coast Guard officials are taking steps to
provide guidance to field office personnel to improve information
sharing.
GAO also acknowledges the role of other DHS components in promoting
information sharing. For example, Customs and Border Protection (CBP)
officials may be members of area maritime security committees thereby
lending their expertise in an effort to promote security. In addition,
the interagency operational center in Charleston, South Carolina
includes the Department of Justice as well as DHS' CBP, Immigration and
Customs Enforcement (ICE), and Coast Guard. The report notes that
representatives from the various agencies and DHS' components work side
by side, each having access to databases and other sources of
information from their respective agencies. For example, the Charleston
center has access to both Coast Guard technology systems and various
national databases in addition to CBP's databases on incoming cargo
containers.
Coast Guard, other DHS components, other federal agencies, state and
local governments, and the private sector are sharing information. More
can be done, but progress has been made.
We also appreciate the recognition of the DHS Homeland Security Task
Force, South-East. This interagency arrangement is in addition to the
interagency operational centers and consists of federal and nonfederal
agencies that have the mission to respond to mass migration of
immigrants affecting the south eastern United States. This task force
was activated in 2004 to interdict a mass migration from Haiti.
The report discusses another example of an interagency arrangement for
information. sharing wherein single-agency operational centers can
become interagency. As mentioned, Coast Guard has its own command
centers that normally focus on a variety of Coast Guard missions and
that are not normally interagency in structure. However, Coast Guard
has established protocols with DHS components, CBP and ICE, to activate
a unified or incident command structure should one be needed to respond
to specific events. These types of interagency arrangements often
include various DHS components and are crucial to sharing information
and coordinating operations.
Since the release of the draft report, the Coast Guard report required
by Congress relating to existing interagency operational centers has
been approved by DHS and the Office of Management and Budget. The
report is now in the final stages of review at Coast Guard.
We are providing technical comments to your office under separate cover.
Sincerely,
Signed by:
Steven Pecinovsky:
Director:
Departmental GAO/OIG Liaison Office:
[End of section]
Appendix V: GAO Contacts and Staff Acknowledgments:
GAO Contacts:
Margaret T. Wrightson (415) 904-2200;
Stephen L. Caldwell (202) 512-9610:
Staff Acknowledgments:
In addition to those named above, David Alexander, Neil Asaba, Juliana
Bahus, Christine Davis, Kevin Heinz, Emily Pickrell, Albert Schmidt,
Amy Sheller, Stan Stenersen, and April Thompson made key contributions
to this report.
[End of section]
Related GAO Products:
Coast Guard: Observations on Agency Priorities in Fiscal Year 2006
Budget Request. GAO-05-364T. Washington, D.C.: March 17, 2005.
Homeland Security: Process for Reporting Lessons Learned from Seaport
Exercises Needs Further Attention. GAO-05-170. Washington, D.C.:
January 14, 2005.
Port Security: Better Planning Needed to Develop and Operate Maritime
Worker Identification Card Program. GAO-05-106. Washington, D.C.:
December 10, 2004.
Maritime Security: Better Planning Needed to Help Ensure an Effective
Port Security Assessment Program. GAO-04-1062. Washington, D.C.:
September 30, 2004.
Maritime Security: Partnering Could Reduce Federal Costs and Facilitate
Implementation of Automatic Vessel Identification System. GAO-04-868.
Washington, D.C.: July 23, 2004.
Maritime Security: Substantial Work Remains to Translate New Planning
Requirements into Effective Port Security. GAO-04-838. Washington,
D.C.: June 30, 2004.
Coast Guard: Key Management and Budget Challenges for Fiscal Year 2005
and Beyond. GAO-04-636T. Washington, D.C.: April 7, 2004.
Homeland Security: Summary of Challenges Faced in Targeting Oceangoing
Cargo Containers for Inspection. GAO-04-557T. Washington, D.C.: March
31, 2004.
Coast Guard Programs: Relationship between Resources Used and Results
Achieved Needs to Be Clearer. GAO-04-432. Washington, D.C.: March 22,
2004.
Homeland Security: Preliminary Observations on Efforts to Target
Security Inspections of Cargo Containers. GAO-04-325T. Washington,
D.C.: December 16, 2003.
Posthearing Questions Related to Aviation and Port Security. GAO-04-
315R. Washington, D.C.: December 12, 2003.
Maritime Security: Progress Made in Implementing Maritime
Transportation Security Act, but Concerns Remain. GAO-03-1155T.
Washington, D.C.: September 9, 2003.
Homeland Security: Efforts to Improve Information Sharing Need to Be
Strengthened. GAO-03-760. Washington D.C.: August 27, 2003.
Container Security: Expansion of Key Customs Programs Will Require
Greater Attention to Critical Success Factors. GAO-03-770. Washington,
D.C.: July 25, 2003.
Homeland Security: Challenges Facing the Department of Homeland
Security in Balancing its Border Security and Trade Facilitation
Missions. GAO-03-902T. Washington, D.C.: June 16, 2003.
Coast Guard: Challenges during the Transition to the Department of
Homeland Security. GAO-03-594T. Washington, D.C.: April 1, 2003.
Transportation Security: Post-September 11th Initiatives and Long-Term
Challenges. GAO-03-616T. Washington, D.C.: April 1, 2003.
Coast Guard: Comprehensive Blueprint Needed to Balance and Monitor
Resource Use and Measure Performance for All Missions. GAO-03-544T.
Washington, D.C.: March 12, 2003.
Homeland Security: Challenges Facing the Coast Guard as It Transitions
to the New Department. GAO-03-467T. Washington, D.C.: February 12, 2003.
Coast Guard: Strategy Needed for Setting and Monitoring Levels of
Effort for All Missions. GAO-03-155. Washington, D.C.: November 12,
2002.
Port Security: Nation Faces Formidable Challenges in Making New
Initiatives Successful. GAO-02-993T. Washington, D.C.: August 5, 2002.
Combating Terrorism: Preliminary Observations on Weaknesses in Force
Protection for DOD Deployments through Domestic Seaports. GAO-02-
955TNI. Washington, D.C.: July 23, 2002.
FOOTNOTES
[1] See U.S. Department of Homeland Security, U.S. Coast Guard Fiscal
Year 2004 Report (Washington D.C.: February 2004).
[2] P.L. 107-296, § 891-892 (Nov. 25, 2002).
[3] Homeland security information sharing is the two-way exchange of
information, including intelligence, critical infrastructure, and law
enforcement information, among federal, state, and local governments
and the private sector to establish timely, effective, and useful
communications to detect, prevent, and mitigate potential terrorist
attacks.
[4] The Maritime Transportation Security Act of 2002, P.L.107-295,
contains many of the homeland security requirements related
specifically to port security. The area maritime security committees
are authorized by section 102 of MTSA, as codified at 46 U.S.C. §
70112(a)(2) and implemented at 33 C.F.R. Part 103.
[5] We use the term interagency operational centers to refer to centers
where multiple federal (and in some cases, state and local) agencies
are involved in monitoring maritime security and planning related
operations.
[6] The consulting firm Booz Allen Hamilton and the Conference Board
sponsored the simulation in 2002. In the simulation, representatives
from government and industry participated in a scenario involving the
discovery and subsequent detonation of radioactive bombs hidden in
cargo containers.
[7] These congressionally chartered commissions include the 9/11
Commission (the National Commission on Terrorist Attacks upon the
United States), the Gilmore Commission (the Advisory Panel to Assess
Domestic Response Capabilities for Terrorism Involving Weapons of Mass
Destruction), the Bremer Commission (the National Commission on
Terrorism), and the Hart-Rudman Commission (the U.S. Commission on
National Security/21st Century).
[8] P.L. 107-296, § 891 (Nov. 25, 2002).
[9] GAO, High-Risk Series: An Update, GAO-05-207 (Washington D.C.:
January 2005).
[10] Executive Order 12968, Access to Classified Information, Section
1.1(h).
[11] See 46 U.S.C. § 70112(a)(2). Prior to MTSA, some port locations
had harbor safety committees that had representatives from federal,
state, and local organizations. In addition, port security committees
had been organized and still exist at ports where substantial out-load
and in-load of military equipment occurs.
[12] See 33 C.F.R. § 103.500.
[13] Because some ports are located close to one another, some
committees cover several ports. For example, the Puget Sound area
maritime security committee includes the ports of Seattle, Tacoma,
Bremerton, Port Angeles, and Everett.
[14] Navigation and Vessel Inspection Circular 9-02, Change 1, Sept.
2002.
[15] The area maritime security committee for the port of Charleston
has a separate intelligence subcommittee made up of members that have
security clearances.
[16] See The Coast Guard and Maritime Transportation Act of 2004, P.L.
108-293, § 807 (August 9, 2004). While the statute uses the term "joint
operational centers," we are using the term "interagency operational
centers" to denote centers where multiple agencies participate.
According to Coast Guard officials, the term "joint" refers to command
centers where the Coast Guard and Navy are involved in carrying out the
responsibilities of the center.
[17] Washington State Ferries is the largest state-operated ferry
system in the country.
[18] At the fourth location, the local Coast Guard official initiated
contact with nonfederal officials on his own, and he asked for
additional information from headquarters. At this location, the field
office is working with nonfederal officials to submit their application
forms or to verify that they already have a security clearance.
[19] GAO, Intelligence Reform: Human Capital Considerations Critical to
9/11 Commission's Proposed Reforms, GAO-04-1084T (Washington, D.C.:
September 14, 2004).
[20] GAO, DOD Personnel Clearances: Preliminary Observations Related to
Backlogs and Delays in Determining Security Clearance Eligibility for
Industry Personnel, GAO-04-202T (Washington, D.C.: May 6, 2004);
Aviation Security: Federal Air Marshal Service Is Addressing Challenges
of Its Expanded Mission and Workforce, but Additional Actions Needed,
GAO-04-242 (Washington, D.C.: Nov. 19, 2003); and Security Clearances:
FBI Has Enhanced Its Process for State and Local Law Enforcement
Officials, GAO-04-596 (Washington, D.C.: Apr. 30, 2004).
[21] GAO-04-596, p.24.
GAO's Mission:
The Government Accountability Office, the investigative arm of
Congress, exists to support Congress in meeting its constitutional
responsibilities and to help improve the performance and accountability
of the federal government for the American people. GAO examines the use
of public funds; evaluates federal programs and policies; and provides
analyses, recommendations, and other assistance to help Congress make
informed oversight, policy, and funding decisions. GAO's commitment to
good government is reflected in its core values of accountability,
integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through the Internet. GAO's Web site ( www.gao.gov ) contains
abstracts and full-text files of current reports and testimony and an
expanding archive of older products. The Web site features a search
engine to help you locate documents using key words and phrases. You
can print these documents in their entirety, including charts and other
graphics.
Each day, GAO issues a list of newly released reports, testimony, and
correspondence. GAO posts this list, known as "Today's Reports," on its
Web site daily. The list contains links to the full-text document
files. To have GAO e-mail this list to you every afternoon, go to
www.gao.gov and select "Subscribe to e-mail alerts" under the "Order
GAO Products" heading.
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office
441 G Street NW, Room LM
Washington, D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm
E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470:
Public Affairs:
Jeff Nelligan, managing director,
NelliganJ@gao.gov
(202) 512-4800
U.S. Government Accountability Office,
441 G Street NW, Room 7149
Washington, D.C. 20548: