Defense Critical Infrastructure
Actions Needed to Improve the Identification and Management of Electrical Power Risks and Vulnerabilities to DOD Critical Assets
Gao ID: GAO-10-147 October 23, 2009
The Department of Defense (DOD) relies on a global network of defense critical infrastructure so essential that the incapacitation, exploitation, or destruction of an asset within this network could severely affect DOD's ability to deploy, support, and sustain its forces and operations worldwide and to implement its core missions, including those in Iraq and Afghanistan as well as its homeland defense and strategic missions. In October 2008, DOD identified its 34 most critical assets in this network--assets of such extraordinary importance to DOD operations that according to DOD, their incapacitation or destruction would have a very serious, debilitating effect on the ability of the department to fulfill its missions. Located both within the United States and abroad, DOD's most critical assets include both DOD- and non-DOD-owned assets. DOD relies overwhelmingly on commercial electrical power grids for secure, uninterrupted electrical power supplies to support its critical assets. DOD is the single largest consumer of energy in the United States, as we have noted in previous work. According to a 2008 report by the Defense Science Board Task Force on DOD's Energy Strategy, DOD has traditionally assumed that commercial electrical power grids are highly reliable and subject to only infrequent (generally weather-related), short-term disruptions. For backup supplies of electricity, DOD has depended primarily on diesel generators with short-term fuel supplies. In 2008, however, the Defense Science Board reported that "[c]ritical national security and homeland defense missions are at an unacceptably high risk of extended outage from failure of the [commercial electrical power] grid" upon which DOD overwhelmingly relies for its electrical power supplies. Specifically, the reliability and security of commercial electrical power grids are increasingly threatened by a convergence of challenges, including increased user demand, an aging electrical power infrastructure, increased reliance on automated control systems that are susceptible to cyberattack, the attractiveness of electrical power infrastructure for terrorist attacks, long lead times for replacing key electrical power equipment, and more frequent interruptions in fuel supplies to electricity-generating plants. As a result, commercial electrical power grids have become increasingly fragile and vulnerable to extended disruptions that could severely impact DOD's most critical assets, their supporting infrastructure, and ultimately the missions they support.
DOD's most critical assets are vulnerable to disruptions in electrical power supplies, but DOD lacks sufficient information to determine the full extent of the risks and vulnerabilities these assets face. All 34 of these most critical assets require electricity continuously to support their military missions, and 31 of them rely on commercial power grids--which the Defense Science Board Task Force on DOD Energy Strategy has characterized as increasingly fragile and vulnerable--as their primary source of electricity. DOD Instruction 3020.45 requires DOD to conduct vulnerability assessments on all its most critical assets at least once every 3 years. Also, the Office of the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs ASD(HD&ASA) has requested the U.S. Army Corps of Engineers--which serves as the Defense Critical Infrastructure Program's Defense Infrastructure Sector Lead Agent for Public Works--to conduct preliminary technical analyses of DOD installation infrastructure (including electrical power infrastructure) to support the teams conducting Defense Critical Infrastructure Program vulnerability assessments on the most critical assets. (1) As of June 2009, and according to ASD(HD&ASA) and the Joint Staff, DOD had conducted Defense Critical Infrastructure Program vulnerability assessments on 14 of the 34 most critical assets.18 DOD has not conducted the remaining assessments because it did not identify the most critical assets until October 2008. To comply with the instruction, DOD would have to complete Defense Critical Infrastructure Program vulnerability assessments on all most critical assets by October 2011. (2) DOD has neither conducted, nor developed additional guidelines and time frames for conducting, these vulnerability assessments on any of the five non-DOD-owned most critical assets located in the United States or foreign countries, citing security concerns and political sensitivities. (3) The U.S. Army Corps of Engineers has not completed the preliminary technical analyses requested because it has not yet received infrastructure-related information regarding the networks, assets, points of service, and inter- and intradependencies related to electrical power systems that it requires from the military services. (4) Although DOD is in the process of developing guidelines, it does not systematically coordinate Defense Critical Infrastructure Program vulnerability assessment processes and guidelines with those of other, complementary DOD mission assurance programs--including force protection; antiterrorism; information assurance; continuity of operations; chemical, biological, radiological, nuclear, and high-explosive defense; readiness; and installation preparedness--that also examine electrical power vulnerabilities of the most critical assets, because DOD has not established specific guidelines for such systematic coordination. (5) The 10 Defense Critical Infrastructure Program vulnerability assessments we reviewed did not explicitly consider assets' vulnerabilities to longer-term (i.e., of up to several weeks' duration) electrical power disruptions19 on a mission-specific basis, as DOD has not developed explicit Defense Critical Infrastructure Program benchmarks for assessing electrical power vulnerabilities associated with longer-term electrical power disruptions. With more comprehensive knowledge of the most critical assets' risks and vulnerabilities to electrical power disruptions, DOD can better avoid compromising crucial DOD-wide missions during electrical power disruptions. This additional information may also improve DOD's ability to effectively prioritize funding needed to address identified risks and vulnerabilities of its most critical assets to electrical power disruptions.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-10-147, Defense Critical Infrastructure: Actions Needed to Improve the Identification and Management of Electrical Power Risks and Vulnerabilities to DOD Critical Assets
This is the accessible text file for GAO report number GAO-10-147
entitled 'Defense Critical Infrastructure: Actions Needed to Improve
the Identification and Management of Electrical Power Risks and
Vulnerabilities to DOD Critical Assets' which was released on October
23, 2009.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to Congressional Committees:
United States Government Accountability Office:
GAO:
October 2009:
Defense Critical Infrastructure:
Actions Needed to Improve the Identification and Management of
Electrical Power Risks and Vulnerabilities to DOD Critical Assets:
Defense Critical Infrastructure:
GAO-10-147:
Contents:
Letter:
Results in Brief:
Background:
DOD's Most Critical Assets Are Vulnerable to Electrical Power
Disruptions, but DOD Lacks Sufficient Information to Determine the Full
Extent of Their Vulnerability:
DOD Has Taken Steps to Assure Availability of Electrical Power to
Critical Assets, but It Lacks a Mechanism for Tracking Implementation,
and Its Coordination with Electricity Providers Remains Limited:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendix I: Scope and Methodology:
Appendix II: Typical Electrical Power Vulnerabilities and Remediation
Measures:
Appendix III: Survey of DOD Critical Assets:
Appendix IV: Survey of DOD Critical Asset Missions:
Appendix V: Survey of Coordination Efforts for DOD Critical Assets:
Appendix VI: Comments from the Department of Defense:
Appendix VII: GAO Contact and Staff Acknowledgments:
Related GAO Products:
Obtaining Copies of GAO Reports and Testimony:
Table:
Table 1: Summary of Selected DOD Mission Assurance Programs:
Figures:
Figure 1: The U.S. Commercial Electrical Power Grid Interconnects:
Figure 2: Overview of the Electric Power System and Control
Communications:
Figure 3: Key Elements of DCIP Risk Management:
Abbreviations:
ASD(HD&ASA): Office of the Assistant Secretary of Defense for Homeland
Defense and Americas' Security Affairs:
DCIP: Defense Critical Infrastructure Program:
DHS: Department of Homeland Security:
DISLA: Defense Infrastructure Sector Lead Agent:
DOD: Department of Defense:
DOE: Department of Energy:
[End of section]
United States Government Accountability Office:
Washington, DC 20548:
October 23, 2009:
Congressional Committees:
The Department of Defense (DOD) relies on a global network of defense
critical infrastructure so essential that the incapacitation,
exploitation, or destruction of an asset within this network could
severely affect DOD's ability to deploy, support, and sustain its
forces and operations worldwide and to implement its core missions,
including those in Iraq and Afghanistan as well as its homeland defense
and strategic missions. In October 2008, DOD identified its 34[Footnote
1] most critical assets in this network--assets of such extraordinary
importance to DOD operations that according to DOD, their
incapacitation or destruction would have a very serious, debilitating
effect on the ability of the department to fulfill its missions.
Located both within the United States and abroad, DOD's most critical
assets include both DOD-and non-DOD-owned assets.
DOD relies overwhelmingly on commercial electrical power grids[Footnote
2] for secure, uninterrupted electrical power supplies to support its
critical assets. DOD is the single largest consumer of energy in the
United States, as we have noted in previous work.[Footnote 3] According
to a 2008 report by the Defense Science Board Task Force on DOD's
Energy Strategy,[Footnote 4] DOD has traditionally assumed that
commercial electrical power grids are highly reliable and subject to
only infrequent (generally weather-related), short-term disruptions.
For backup supplies of electricity, DOD has depended primarily on
diesel generators with short-term fuel supplies.
In 2008, however, the Defense Science Board reported that "[c]ritical
national security and homeland defense missions are at an unacceptably
high risk of extended outage from failure of the [commercial electrical
power] grid" upon which DOD overwhelmingly relies for its electrical
power supplies. Specifically, the reliability and security of
commercial electrical power grids are increasingly threatened by a
convergence of challenges, including increased user demand, an aging
electrical power infrastructure, increased reliance on automated
control systems that are susceptible to cyberattack, the attractiveness
of electrical power infrastructure for terrorist attacks, long lead
times for replacing key electrical power equipment, and more frequent
interruptions in fuel supplies to electricity-generating plants. As a
result, commercial electrical power grids have become increasingly
fragile and vulnerable to extended disruptions that could severely
impact DOD's most critical assets, their supporting infrastructure, and
ultimately the missions they support.
DOD addresses risk and vulnerabilities[Footnote 5]--including those
associated with electrical power--to its critical assets and
installations through a variety of mission assurance-related
programs.[Footnote 6] In particular, as we have previously
reported,[Footnote 7] DOD has been responsible since September 2003 for
developing and ensuring implementation of defense critical
infrastructure protection policy and program guidance. To identify and
help assure the availability of this mission-critical infrastructure,
in August 2005 DOD established the Defense Critical Infrastructure
Program (DCIP), assigning overall responsibility for the program to the
Office of the Assistant Secretary of Defense for Homeland Defense and
Americas' Security Affairs (ASD(HD&ASA)).[Footnote 8] Since then,
ASD(HD&ASA) has issued formal DCIP program guidance, including a
directive articulating the roles and responsibilities of relevant DOD
organizations;[Footnote 9] an instruction on program
management;[Footnote 10] and several program manuals, including ones on
identifying critical assets and remediating asset risks and
vulnerabilities.[Footnote 11] Under DCIP, DOD also established 10
functionally based defense sectors--including one for public works,
which encompasses electrical power infrastructure--and designated a
Defense Infrastructure Sector Lead Agent (DISLA) for each
sector.[Footnote 12] In addition to using DCIP, DOD can also assess
risks and vulnerabilities to its critical assets and installations (at
the departmental, combatant command, military service, and installation
levels) through other mission assurance programs and efforts, including
those related to force protection; antiterrorism; defense continuity;
information assurance; continuity of operations; chemical, biological,
radiological, nuclear, and high-explosive defense; readiness; and
installation preparedness. In addition, within the framework of the
National Infrastructure Protection Plan of 2009,[Footnote 13] DOD also
collaborates with the Department of Homeland Security (DHS) and the
Department of Energy (DOE) to address risks and vulnerabilities
associated with electrical power infrastructure.
In its May 2008 report on H.R. 5658,[Footnote 14] the House Committee
on Armed Services noted the risks of electrical power disruptions to
critical DOD missions and, among other things, directed that GAO
continue its review of DCIP.[Footnote 15] In response to this mandate,
we have examined (1) the extent to which DOD's most critical assets are
vulnerable to disruptions in electrical power supplies and (2) the
extent to which DOD--both within and outside of the Defense Critical
Infrastructure Program--has attempted to assure the availability of
electrical power supplies to its most critical assets.
We have previously conducted an extensive body of work on DOD's efforts
to assure the availability of defense critical infrastructure,
reporting on DOD's progress in addressing the evolving management
framework for DCIP; coordination among DCIP stakeholders;
implementation of key program elements; availability of public works
infrastructure; and reliability issues in DOD's lists of critical
assets, among other issues. We have also issued reports concerning
federal critical infrastructure protection, cybersecurity, and
electrical power. A list of these reports by category can be found at
the end of this report in the Related GAO Products section.
To address our objectives in this report, we conducted three structured
written surveys regarding the electrical power vulnerabilities of DOD's
34 most critical assets, which DOD identified through DCIP as of
October 2008. We pretested the survey with U.S. Army, U.S. Navy, and
U.S. Air Force officials representing three most critical asset sites
as well as officials from the Joint Staff (J-34) and ASD(HD&ASA) to
ensure that the questions were relevant, clearly stated, and easy to
understand. We then administered one survey to the military services
and DOD agencies that own or have program responsibility for the
assets[Footnote 16] through DCIP to obtain information about the
assets' reliance on electrical power; the assets' primary and backup
sources of electrical power supplies; the number and type of unplanned
electrical power disruptions to the assets; DCIP and non-DCIP
assessments of the assets' risks and vulnerabilities to electrical
power disruptions from January 2006 through December 2008; and measures
recommended, implemented, or planned to address or manage such risks
and vulnerabilities.[Footnote 17] We administered another survey to the
Joint Staff to obtain information about the missions supported by the
assets. Finally, we administered the third survey to ASD(HD&ASA)
regarding coordination efforts with relevant DOD and non-DOD
stakeholders. (These surveys are reproduced in full in apps. III, IV,
and V.) We also conducted six follow-up site visits to a nonprobability
sample of critical assets to verify and validate the surveys' results
and evaluate in-depth issues identified in the surveys' responses,
including vulnerability assessments.
We also interviewed and obtained information from officials
representing ASD(HD&ASA)/DCIP Office, the Joint Staff's Directorate for
Antiterrorism and Homeland Defense, the U.S. Air Force, the U.S. Army,
the U.S. Navy, the U.S. Marine Corps, the U.S. Army Corps of Engineers,
the Defense Threat Reduction Agency, the Mission Assurance Division of
the Naval Surface Warfare Center, the Defense Science Board's Task
Force on DOD Energy Security, selected DOD installations, DHS, DOE, the
Federal Energy Regulatory Commission, the North American Electric
Reliability Corporation, the Edison Electrical Institute, and other
private-sector energy organizations.
As agreed with staff of the House Committee on Armed Services, in
addition to issuing this unclassified report, we are issuing a separate
classified product.
We conducted this performance audit from October 2008 through October
2009 in accordance with generally accepted government auditing
standards. Those standards require that we plan and perform the audit
to obtain sufficient, appropriate evidence to provide a reasonable
basis for our findings and conclusions based on our audit objectives.
We believe that the evidence obtained provides a reasonable basis for
our findings and conclusions based on our audit objectives. A more
thorough description of our scope and methodology is provided in
appendix I.
Results in Brief:
DOD's most critical assets are vulnerable to disruptions in electrical
power supplies, but DOD lacks sufficient information to determine the
full extent of the risks and vulnerabilities these assets face. All 34
of these most critical assets require electricity continuously to
support their military missions, and 31 of them rely on commercial
power grids--which the Defense Science Board Task Force on DOD Energy
Strategy has characterized as increasingly fragile and vulnerable--as
their primary source of electricity. DOD Instruction 3020.45 requires
DOD to conduct vulnerability assessments on all its most critical
assets at least once every 3 years. Also, ASD(HD&ASA) has requested the
U.S. Army Corps of Engineers--which serves as the Defense Critical
Infrastructure Program's Defense Infrastructure Sector Lead Agent for
Public Works--to conduct preliminary technical analyses of DOD
installation infrastructure (including electrical power infrastructure)
to support the teams conducting Defense Critical Infrastructure Program
vulnerability assessments on the most critical assets.
* As of June 2009, and according to ASD(HD&ASA) and the Joint Staff,
DOD had conducted Defense Critical Infrastructure Program vulnerability
assessments on 14 of the 34 most critical assets.[Footnote 18] DOD has
not conducted the remaining assessments because it did not identify the
most critical assets until October 2008. To comply with the
instruction, DOD would have to complete Defense Critical Infrastructure
Program vulnerability assessments on all most critical assets by
October 2011.
* DOD has neither conducted, nor developed additional guidelines and
time frames for conducting, these vulnerability assessments on any of
the five non-DOD-owned most critical assets located in the United
States or foreign countries, citing security concerns and political
sensitivities.
* The U.S. Army Corps of Engineers has not completed the preliminary
technical analyses requested because it has not yet received
infrastructure-related information regarding the networks, assets,
points of service, and inter-and intradependencies related to
electrical power systems that it requires from the military services.
* Although DOD is in the process of developing guidelines, it does not
systematically coordinate Defense Critical Infrastructure Program
vulnerability assessment processes and guidelines with those of other,
complementary DOD mission assurance programs--including force
protection; antiterrorism; information assurance; continuity of
operations; chemical, biological, radiological, nuclear, and high-
explosive defense; readiness; and installation preparedness--that also
examine electrical power vulnerabilities of the most critical assets,
because DOD has not established specific guidelines for such systematic
coordination.
* The 10 Defense Critical Infrastructure Program vulnerability
assessments we reviewed did not explicitly consider assets'
vulnerabilities to longer-term (i.e., of up to several weeks' duration)
electrical power disruptions[Footnote 19] on a mission-specific basis,
as DOD has not developed explicit Defense Critical Infrastructure
Program benchmarks for assessing electrical power vulnerabilities
associated with longer-term electrical power disruptions.
With more comprehensive knowledge of the most critical assets' risks
and vulnerabilities to electrical power disruptions, DOD can better
avoid compromising crucial DOD-wide missions during electrical power
disruptions. This additional information may also improve DOD's ability
to effectively prioritize funding needed to address identified risks
and vulnerabilities of its most critical assets to electrical power
disruptions.
While DOD has taken some steps toward assuring the availability of its
electrical power supplies to its most critical assets, it lacks a
mechanism for tracking the implementation of future Defense Critical
Infrastructure Program risk management decisions and responses, and its
coordination with local electricity providers has been limited. From
August 2005 through October 2008, DOD issued Defense Critical
Infrastructure Program guidance for identifying critical assets,
assessing their vulnerabilities, and making risk management decisions
about those vulnerabilities. In addition, DOD has conducted various
types of vulnerability assessments--including Defense Critical
Infrastructure Program vulnerability assessments, Joint Staff
Integrated Vulnerability Assessments, and other mission assurance-
related assessments--on 24 of the most critical assets, including
multiple assessments on some of the same assets. According to the
survey, these Defense Critical Infrastructure Program and other DOD
vulnerability assessments have identified various electrical power
vulnerabilities for 10 of the assets. DOD has also coordinated with
other federal agencies--including DHS, DOE, and the Federal Energy
Regulatory Commission--and industry organizations in an effort intended
to assure the availability of electrical power supplies to the most
critical assets. However, ASD(HD&ASA)--which has responsibility for
overseeing the implementation of actions for the remediation,
mitigation, or acceptance of risks to DOD critical assets--has not yet
developed a mechanism to track the implementation of future Defense
Critical Infrastructure Program risk management decisions, along with
responses intended to address risks and vulnerabilities identified for
the most critical assets. Without such information, DOD cannot
comprehensively determine whether asset owners are taking the necessary
steps to address identified risks and vulnerabilities of all of the
most critical assets to electrical power disruptions. In addition,
Defense Critical Infrastructure Program guidance encourages
coordination between DOD installations with critical assets and their
respective public utilities, including electricity providers, in order
to remediate risks involving those utilities--for example, by
discussing potential changes in service agreements with those
utilities. However, according to our survey results, such coordination
with local electricity providers has occurred for only 7 of DOD's 34
most critical assets. As a result, DOD may not be taking advantage of
available expertise on electrical power issues from such providers.
Without increased coordination between more DOD installations with
critical assets and their respective local electricity providers, DOD
potentially limits the risk mitigation or remediation options available
to it for addressing the vulnerabilities of its most critical assets to
electrical power disruptions.
We are recommending that DOD complete Defense Critical Infrastructure
Program vulnerability assessments on all DOD-owned most critical
assets; develop additional guidelines, an implementation plan, and a
schedule for conducting such assessments on all non-DOD-owned most
critical assets; establish a time frame for the military services to
provide the infrastructure data required to complete preliminary
technical analysis of public works (including electrical system)
infrastructure at DOD installations that support DOD's most critical
assets; finalize guidelines to coordinate Defense Critical
Infrastructure Program assessment criteria and processes more
systematically with those of other DOD mission assurance programs;
develop Defense Critical Infrastructure Program guidelines for
assessing the most critical assets' vulnerabilities to longer-term
electrical power disruptions; develop a mechanism to track the
implementation of future Defense Critical Infrastructure Program risk
management decisions; and ensure or facilitate that asset owners and
host installations of the most critical assets reach out to local
electricity providers to coordinate and help remediate or mitigate
risks and vulnerabilities to electrical power disruptions.
DOD concurred with all of our recommendations. Based on DOD's comments,
we modified our original recommendation that the department establish a
time frame for the military services to provide infrastructure data
required by the Public Works Defense Infrastructure Sector Lead Agent
(the U.S. Army Corps of Engineers) to conduct preliminary technical
analysis of public works (including electrical system) infrastructure
at DOD installations that support DOD's most critical assets. According
to DOD, the U.S. Army Corps of Engineers has already completed this
technical analysis for public works infrastructure located outside of
the installations, but is still waiting for the military services to
provide data required to complete the analysis on infrastructure
located within the installations. As a result, our final recommendation
indicates that these data are required for completing, rather than
conducting, the preliminary technical analysis.
Background:
DOD's Vulnerability to Electrical Power Disruptions:
DOD depends overwhelmingly on the U.S. commercial electrical power grid
for electricity to support its operations and missions.[Footnote 20] As
illustrated in figures 1 and 2, the grid is a vast, complex network of
interconnected regional systems and infrastructure (e.g., power plants,
electricity lines, and control centers) used to generate, transmit,
distribute, and manage electrical power supplies across the United
States. According to the Defense Science Board Task Force on DOD Energy
Strategy, approximately 99 percent of the electrical power DOD
installations consume originates from outside installation boundaries,
while approximately 85 percent of the energy infrastructure that DOD
relies on for electrical power is commercially owned and outside of
DOD's control[Footnote 21].:
Figure 1: The U.S. Commercial Electrical Power Grid Interconnects:
[Refer to PDF for image: illustration]
Maps:
Western Interconnect:
Eastern Interconnect:
Texas Interconnect:
Source: GAO-04-204 and North American Electric Reliability Corporation.
[End of figure]
Figure 2: Overview of the Electric Power System and Control
Communications:
[Refer to PDF for image: illustration]
Source: DOE, Energy Sector Specific Plan (May 2007).
[End of figure]
There are currently a variety of mechanisms in place that may help to
mitigate the risk of losing electricity service due to electrical power
disruptions, including mandatory reliability standards for the
electrical power industry approved by the Federal Energy Regulatory
Commission. In addition, other risk mitigation measures are being
considered, such as islanding.[Footnote 22] However, while the U.S.
commercial electrical power grid is generally a reliable source of
electricity and is subject to some reliability standards that typically
assure its availability over 99 percent of the time, concerns have been
raised about the increasing vulnerability of the grid to more frequent
or longer electrical power disturbances. For example, the Defense
Science Board Task Force reported that the commercial power grid is
"brittle, increasingly centralized, capacity-strained, and largely
unprotected from physical attack, with little stockpiling of critical
hardware." Similarly, according to the May 2007 Infrastructure
Resiliency Guide for DOD's Defense Critical Infrastructure Program,
"the electric power network is a complex system of interconnected
components that can fail and cause massive service disruptions."
Factors that contribute to the grid's vulnerability include (1)
increasing national demand for electricity; (2) an aging electrical
power infrastructure; (3) increased reliance on automated control
systems that are susceptible to cyberattacks; (4) the attractiveness of
electrical power infrastructure as targets for physical or terrorist
attacks; (5) long lead times (of several months to several years) for
replacing high-voltage transformers--which cost several millions of
dollars and are manufactured only in foreign countries--if attacked or
destroyed; and (6) more frequent interruptions in fuel supplies to
electricity-generating plants.[Footnote 23]
The National Science and Technology Council's Committee on Homeland and
National Security also established a task force in January 2009 to
identify research and development needs for electric grid
vulnerabilities and to coordinate with other federal agencies to
address those needs.[Footnote 24] In addition, government and industry
efforts are under way to examine cybersecurity threats, develop
potential "Smart Grid"[Footnote 25] solutions to address some of the
grid's vulnerabilities, and develop and enforce electricity reliability
standards for the industry.[Footnote 26]
DOD assets are vulnerable to electrical power disruptions in various
ways. For example, according to the DCIP Infrastructure Resiliency
Guide,[Footnote 27] vulnerabilities may involve the co-location of both
primary and secondary electrical power equipment, single points of
failure in an electrical power network, lack of security access
controls to critical electrical power equipment, electrical power lines
sharing rights-of-way with other utilities, and insufficient backup
sources of electrical power generation. To address such
vulnerabilities, the guide suggests that owners or operators of DOD
assets consider diversifying the locations of primary and secondary
electrical power equipment, establishing independent transmission paths
for commercial and backup electrical power, increasing security and
monitoring access to critical electrical power equipment, establishing
mitigation options based on potential loss of rights-of- way, and
developing additional backup sources of electrical power. For more
detailed information regarding typical electrical power vulnerabilities
that could affect DOD assets and potential measures to address them,
see appendix II.
DCIP:
DOD identifies the vulnerabilities and manages the risks of its most
critical assets to electrical power disruptions primarily through DCIP.
On October 14, 2008, DOD designated 34[Footnote 28] assets through DCIP
as its most critical assets--assets of such extraordinary importance to
DOD operations that according to DOD, their incapacitation or
destruction would have a very serious, debilitating effect on the
ability of the department to fulfill its missions. While most (29 of
34) of these critical assets--which may be located in the United
States, U.S. territories, or foreign countries--are owned by DOD, 5 are
owned by other entities, including both domestic and foreign commercial
and other governmental entities. To ensure the availability of these
and other networked assets critical to DOD missions, DCIP uses a risk
management model that helps decision makers (1) identify the
department's critical assets based on the criticality of their
missions; (2) conduct "threat and hazard assessments;" (3) conduct
"vulnerability assessments" (that include detailed reviews of
electrical power vulnerabilities); (4) conduct "risk assessments" to
determine the consequences of the assets' loss, evaluate the importance
and urgency of proposed actions, and develop alternate courses of
action; (5) reach "risk management decisions" to accept risks or reduce
risks to acceptable levels; and (6) formulate "risk responses" to
implement the risk management decisions.[Footnote 29]
Key stakeholders involved in these DCIP processes include ASD(HD&ASA),
which serves as the principal civilian advisor to the Secretary of
Defense on the identification, prioritization, and protection of
defense critical infrastructure; the Chairman of the Joint Chiefs of
Staff, who serves as DOD's principal military advisor for the program;
and the combatant commands, the military services, and other DOD
agencies and organizations, which may serve as asset owners or mission
owners for specific critical assets.[Footnote 30] In addition, as the
DISLA for the DCIP Public Works Defense Sector--which includes both DOD-
owned and non-DOD assets used to support, generate, produce, or
transport electrical power for and to DOD users--the U.S. Army Corps of
Engineers is responsible for identifying asset interdependencies in its
sector, including those related to electrical power, as appropriate.
Figure 3 illustrates the key elements of the DCIP risk management
model.
Figure 3: Key Elements of DCIP Risk Management:
[See PDF for image: illustration]
Flowchart of key elemebts of DCIP risk management.
Note: The DCIP Risk Management process begins with the combatant
commands, military services, and Defense Infrastructure Sector Lead
Agents decomposing (i.e., identifying and analyzing) their missions and
functions to identify defense critical infrastructure (DCI).
Source: DOD Instruction 3020.45.
[End of figure]
Other Risk Management Programs and Activities in DOD:
In addition to using DCIP, DOD also identifies vulnerabilities and
manages the risks of its most critical assets, including those related
to electrical power, through other DOD mission assurance programs or
activities, including those related to force protection; antiterrorism;
information assurance; continuity of operations; chemical, biological,
radiological, nuclear, and high-explosive defense; readiness; and
installation preparedness. These programs and activities are intended
to ensure that required capabilities and supporting infrastructures are
available to DOD to carry out the National Military Strategy.[Footnote
31] DOD has established several complementary programs that help
protect critical assets, including those listed in table 1. In
addition, the military departments have developed service-level
critical infrastructure protection programs, which they coordinate with
DCIP.[Footnote 32]
Table 1: Summary of Selected DOD Mission Assurance Programs:
Program: Antiterrorism Program;
Mission assurance emphasis: Establish standards for DOD assets to
protect them against acts of terrorism.[A].
Program: Department of Defense Continuity Programs[B];
Mission assurance emphasis: Ensure that DOD mission-essential functions
continue under all circumstances across the spectrum of threats.[C].
Program: Information Assurance Program;
Mission assurance emphasis: Ensure that essential DOD information
systems maintain an appropriate level of confidentiality, integrity,
authenticity, nonrepudiation, and availability.[D].
Program: Installation Emergency Management Program;
Mission assurance emphasis: Prepare DOD installations for emergencies
by using a comprehensive all-hazards approach to protect personnel and
save lives, and recover and restore operations after an emergency.[E].
Program: Chemical, Biological, Radiological, Nuclear, and High-Yield
Explosive Emergency Response Guidelines;
Mission assurance emphasis: Prepare DOD installation emergency
responders for the effects of a chemical, biological, radiological,
nuclear, or high explosive incident to preserve life, prevent human
suffering, mitigate incidents, and protect critical assets and
infrastructure.[F].
Source: GAO analysis of DOD guidance.
[A] DOD Directive 2000.12, DOD Antiterrorism (AT) Program (Washington,
D.C., Aug. 18, 2003, certified current as of Dec. 13, 2007).
[B] DOD Directive 3020.40 calls for DCIP to complement DOD's continuity
of operations program, which is addressed as part of DOD's Defense
Continuity Programs.
[C] DOD Directive 3020.26, Department of Defense Continuity Programs
(DCP) (Washington, D.C., Jan. 9, 2009).
[D] DOD Directive 8500.01E, Information Assurance Program (IA)
(Washington, D.C., Oct. 24, 2002; certified current as of Apr. 23,
2007).
[E] DOD Instruction 6055.17, DOD Installation Emergency Management
Program (IEM) (Washington, D.C., Jan. 13, 2009).
[F] DOD Instruction 2000.18, Department of Defense Installation
Chemical, Biological, Radiological, Nuclear, and High-Yield Explosive
Emergency Response Guidelines (CBRNE) (Washington, D.C., Dec. 4, 2002).
[End of table]
Other Agencies and Organizations with Roles in Risk Management:
Other federal agencies and industry organizations are to collaborate
with DOD and play significant roles in protecting critical electrical
power infrastructure within the framework of Homeland Security
Presidential Directive 7. This directive, issued in December 2003,
requires all federal departments and agencies to identify, prioritize,
and coordinate the protection of critical infrastructure and key
resources from terrorist attacks.[Footnote 33] These entities and their
roles are summarized below.
Department of Homeland Security. DHS is the principal federal entity
responsible for leading, integrating, and coordinating the overall
national effort to protect the nation's critical infrastructure and key
resources. DHS led the development of the National Infrastructure
Protection Plan, which provides a framework for managing risks to U.S.
critical infrastructure and outlines the roles and responsibilities of
DHS and other security partners--including other federal agencies;
state, territorial, local, and tribal governments; and private
companies.[Footnote 34] DHS is responsible for leading and coordinating
a national effort to enhance protection through 18 critical
infrastructure and key resource sectors,[Footnote 35] and a "sector-
specific agency" has lead responsibility for coordinating the
protection of each of the sectors.
Department of Energy. DOE serves as the sector-specific agency for the
Energy Sector, which includes critical infrastructure and key resources
related to electricity. DOE is responsible for developing an Energy
Sector Specific Plan, in close collaboration with other National
Infrastructure Protection Plan stakeholders, that applies the plan's
risk management model to critical infrastructure and key resources
within that sector. Within DOE, the Office of Electricity Delivery and
Energy Reliability seeks to lead national efforts to modernize the
electrical grid; enhance security and reliability of energy
infrastructure; and facilitate recovery from disruptions to energy
supply. When requested, DOE and its national laboratories[Footnote 36]
can provide energy-related expertise and assistance to DOD. According
to DOE officials, DOE and several DOD combatant commands, including
U.S. European Command and U.S. Africa Command, are considering
utilizing DOE representatives as energy attachés to those commands. The
DOE representatives can provide energy-related expertise to their
respective commands, particularly with respect to the commands' energy-
related planning activities and the security and reliability of the
commands' energy infrastructure.
Federal Energy Regulatory Commission and the North American Electric
Reliability Corporation. The Energy Policy Act of 2005 provided the
Federal Energy Regulatory Commission[Footnote 37] and its subsequently
appointed Electric Reliability Organization--the North American
Electric Reliability Corporation[Footnote 38]--new responsibilities for
helping protect and improve the reliability and security of the U.S.
bulk power system[Footnote 39] through the establishment, approval, and
enforcement of mandatory electrical reliability standards.[Footnote 40]
Both of these organizations also participate in safeguarding the
nation's critical infrastructures and key resources, and they have
interacted with DOD regarding electrical power vulnerabilities.
Similarly, the North American Electric Reliability Corporation has
collaborated with DOD and military service officials through the
federal Task Force on Electric Grid Vulnerability, which is co-chaired
by DOD, to identify and address electrical power vulnerabilities.
The Electrical Power Industry. Electrical power industry
representatives also contribute to the assurance of electrical power
supplies through industry associations--such as the Edison Electric
Institute, the American Public Power Association, and the National
Rural Electric Cooperative Association--and through local electrical
power providers to DOD installations or assets. Electrical power
industry associations, for example, collaborate with the federal
government to help secure the U.S. electrical power grid through
coordinating mechanisms in the National Infrastructure Protection Plan.
In early 2009 the institute established the Energy Security Partnership
Group, which includes officials from DOD installations and focuses on
improving communications between DOD and its utilities and on
identifying and removing barriers to the development of comprehensive
energy security programs at DOD installations.
DOD's Most Critical Assets Are Vulnerable to Electrical Power
Disruptions, but DOD Lacks Sufficient Information to Determine the Full
Extent of Their Vulnerability:
DOD's Most Critical Assets Rely on Electrical Power and Depend
Overwhelmingly on Commercial Electrical Power Grids as Their Primary
Supply:
DOD's most critical assets and the missions they support are vulnerable
to disruptions in electrical power supplies because of the extent of
their reliance on electricity, particularly from the commercial
electrical power grid. According to our survey of DOD's most critical
assets, all of these assets require electrical power continuously in
order to function and support their mission(s). Furthermore, the survey
results indicate that all of the most critical assets depend on other
supporting infrastructure--such as water; natural gas; and heating,
ventilation, and air conditioning--that in turn also rely on
electricity to function. As a result, without appropriate backup
electrical power supplies or risk management measures, these critical
assets may be unable to function fully and support their mission(s) in
the event of an electrical power disruption. According to our survey,
at least 24 of the 34 most critical assets experienced some electrical
power disruptions--lasting up to 7 days--during the 3-year period from
January 2006 through December 2008, and the missions supported by 3 of
those critical assets were adversely impacted by electrical power
disruptions. In addition, based on our survey, 31 of these 34 assets
rely primarily on commercial electrical power grids for their
electricity supplies. The U.S. commercial electrical power grids have
become increasingly fragile and vulnerable to prolonged outages because
of such factors as (1) increased user demand, (2) fewer spare parts for
key electrical power equipment, (3) increased risks of deliberate
physical or cyberattacks on electrical power infrastructure by
terrorists, and (4) more frequent interruptions in fuel supplies to
electricity-generating plants.[Footnote 41] Based on our survey,
vulnerability assessments of 6 of the most critical assets reported
vulnerabilities associated with the reliability of the electrical power
grids of their commercial electricity providers or DOD installations.
Furthermore, 8 of these critical assets attributed some of their
electrical power disruptions to their commercial electrical power
provider.
DOD Has Not Yet Completed DCIP Vulnerability Assessments on All of Its
Most Critical Assets:
DOD is identifying key vulnerabilities--including those related to
electrical power--of its most critical assets through DCIP
vulnerability assessments, but as of June 2009, the department had
conducted such assessments on only 14 of its 34 most critical assets.
As part of the DCIP risk management process, DCIP vulnerability
assessments are intended to systematically examine the characteristics
of an installation, system, asset, application, or its dependencies
that could cause it to suffer a degradation or loss--that is,
incapacity to perform its designated function--as a result of having
been subjected to a certain level of threat or hazard. These
vulnerability assessments--most of which the Defense Threat Reduction
Agency has been conducting for DOD[Footnote 42]--include specific
reviews of the critical assets' supporting electrical power networks
"to ensure that the distribution network at a given location and
supporting offsite [electrical power] system has the capacity,
redundancy, path diversity, security, survivability, and reliability to
properly support a given mission."[Footnote 43]
DOD Instruction 3020.45 requires DOD to conduct DCIP vulnerability
assessments on all of its most critical assets at least once every 3
years. However, while DOD has conducted DCIP assessments on some of its
most critical assets since March 2007, ASD(HD&ASA) and Joint Staff
officials indicated that the department could not schedule or conduct
these assessments systematically until its most critical assets were
formally identified in October 2008.[Footnote 44] As a result, as of
June 2009, DOD had conducted DCIP vulnerability assessments on 14 of
the 34 most critical assets; had scheduled additional assessments for
13 other most critical assets from July 2009 through December 2010; and
had not yet scheduled assessments for the remaining 7 most critical
assets.[Footnote 45] According to ASD(HD&ASA) and Joint Staff
officials, DCIP vulnerability assessments will be conducted on all the
most critical assets by October 2011, as required by DOD Instruction
3020.45. Nevertheless, until DOD completes these DCIP vulnerability
assessments, the department will not have complete information about
electrical power vulnerabilities for all the most critical assets.
DOD Lacks Additional Guidance for Conducting DCIP Vulnerability
Assessments on Its Non-DOD-Owned Most Critical Assets:
DOD has not yet conducted or scheduled DCIP vulnerability assessments,
including assessments of electrical power vulnerabilities, on any of
its non-DOD-owned most critical assets--both those located in the
United States and in foreign countries--and has not yet developed
guidance addressing the unique challenges related to conducting the
assessments on such assets. While the majority of the most critical
assets--which may be located in the United States, U.S. territories, or
foreign countries--are owned by DOD, 5 of the 34 are not owned by DOD.
Instead, such critical assets are owned by either U.S. or foreign
commercial or governmental entities. DOD Instruction 3020.45 requires
DOD to conduct DCIP vulnerability assessments at least once every 3
years on all of its most critical assets, regardless of the assets'
ownership or location. However, DOD has not yet conducted or even
scheduled DCIP vulnerability assessments for any of the non-DOD-owned
most critical assets located in the United States or abroad.
Furthermore, while DOD has issued extensive DCIP guidance applicable to
all defense critical infrastructure (including non-DOD-owned critical
infrastructure), as discussed above, DOD has not yet developed a
systematic approach or guidelines addressing the unique challenges
related to conducting the assessments on such non-DOD-owned critical
assets. ASD(HD&ASA) and Joint Staff officials cited security concerns,
political sensitivities, and lack of DOD authority over non-DOD-owned
assets as key challenges in conducting the DCIP vulnerability
assessments on the non-DOD-owned most critical assets in foreign
countries. For example, according to these officials, notifying a U.S.
or foreign commercial entity, or a foreign government, about its
asset's designation as one of DOD's most critical assets could
compromise DCIP security guidelines or U.S. national security.
Similarly, for political reasons, foreign companies or governments may
not want to have their assets identified as supporting U.S. or DOD
military missions.
ASD(HD&ASA) and Joint Staff officials recognize the need for developing
an approach and guidelines to conduct DCIP vulnerability assessments on
the five non-DOD-owned most critical assets, particularly those located
abroad. According to these officials, DOD has begun to coordinate with
the Department of State's Office of the Coordinator for
Counterterrorism to help address some of the security concerns and
political sensitivities associated with conducting such assessments. We
have previously reported on DOD efforts to coordinate with the
Department of State on similar sensitive matters involving foreign
governments' support for DOD assets abroad. For example, we have
previously reported that through the Department of State, the United
States and host-nation governments have successfully established
various types of agreements--including general agreements, intelligence
exchange agreements, written agreements, and informal agreements--that
have been used to help protect U.S. forces and facilities
abroad,[Footnote 46] and nothing prohibits DOD from developing a
similar approach for conducting DCIP vulnerability assessments on non-
DOD-owned most critical assets in foreign countries. Until DOD
completes the vulnerability assessments on such assets, which DOD is
also required to complete by October 2011, DOD officials will not know
the extent of those assets' vulnerabilities to electrical power
disruptions.
The Defense Infrastructure Sector Lead Agent for Public Works Has Not
Completed Its Technical Analysis of Public Works Infrastructure
(Including Electricity) Supporting DOD Critical Assets:
The U.S. Army Corps of Engineers (Corps)--which serves as DCIP's DISLA
for Public Works (including electricity)--has not completed preliminary
technical analyses of DOD installation infrastructure. Such analyses
are intended to identify public works infrastructure networks, assets,
points of service, and inter-and intradependencies that support the
critical assets on DOD installations.[Footnote 47] ASD(HD&ASA)
requested these analyses for all the most critical assets from the
Corps in order to support the teams conducting DCIP vulnerability
assessments on those assets. Preliminary desktop analyses are intended
to help brief DCIP vulnerability assessment teams on the most critical
assets' supporting public works infrastructure--including electrical
power systems--before those teams conduct the vulnerability assessments
on the assets in the field.[Footnote 48] According to ASD(HD&ASA), the
Corps has completed these analyses for public works infrastructure
located outside of DOD installations with the most critical assets.
However, as of July 2009, the Corps had not yet conducted these
analyses for public works infrastructure located within DOD
installations for any of the most critical assets. According to a Corps
official, the Corps has been unable to begin these analyses because it
has not received infrastructure-related information that it requires
from the military services.[Footnote 49] According to the official, the
Corps has been requesting this infrastructure-related information
informally from the military services for several months and recently
augmented its requests with formal written requests to the services.
However, as of July 2009, the U.S. Navy is the only service that has
begun to gather the requested information. In written correspondence
with us, the remaining two military departments have indicated that
limited funds and personnel will affect their ability to respond to the
Corps' request for the infrastructure-related information, which one of
the services considers to be an unfunded mandate. Without this
information, however, the Corps will be unable to conduct its
preliminary technical analyses of public works infrastructure,
including electrical power systems, which support the most critical
assets. As a result, the teams conducting DCIP vulnerability
assessments will be unable to consider crucial background information
about the most critical assets' public works infrastructure--including
networks, assets, points of service, and inter-and intradependencies
related to electrical power systems--before the teams conduct the DCIP
vulnerability assessments in the field.
DCIP Vulnerability Assessments Are Not Systematically Coordinated with
Those from Related Mission Assurance Programs:
DOD does not systematically coordinate DCIP vulnerability assessment
policy, guidelines, or processes with those of other, related DOD
mission-assurance programs that also examine electrical power
vulnerabilities of DOD critical assets. DOD Directive 3020.40 calls for
DCIP to complement other DOD mission assurance programs and efforts,
including force protection; antiterrorism; information assurance;
continuity of operations; chemical, biological, radiological, nuclear,
and high-explosive defense; readiness; and installation preparedness.
Vulnerability assessments from these other mission programs and efforts
also examine electrical power vulnerabilities of DOD critical assets.
For example, as part of DOD's antiterrorism and force protection
efforts, the Defense Threat Reduction Agency conducts Joint Staff
Integrated Vulnerability Assessments at selected DOD installations
worldwide, including some that host critical assets. These assessments
identify vulnerabilities related to terrorism and force protection at
the selected installations, including those related to electrical power
systems, and provide options to assist installation commanders in
mitigating or overcoming the vulnerabilities. Similarly, as part of the
critical asset protection processes, the military services also conduct
vulnerability assessments related to mission assurance at installations
that may also host critical assets. However, DOD Directive 3020.40 does
not provide specific guidelines or requirements for systematically
coordinating policy, guidelines, and processes or the results from DCIP
vulnerability assessments on the critical assets with those of other
DOD mission assurance programs.
ASD(HD&ASA) and Joint Staff officials acknowledge the benefits of
coordinating and leveraging the results of assessments from DCIP and
other DOD mission assurance programs--particularly those related to
antiterrorism/force protection, continuity of operations, and
information assurance--and have already taken some steps to further
such coordination. For example, as of June 2009, the Defense Threat
Reduction Agency has conducted DCIP vulnerability assessments on 12 of
the most critical assets in conjunction with Joint Staff Integrated
Vulnerability Assessments being conducted on installations that host
those assets,[Footnote 50] while the military services have conducted
DCIP vulnerability assessments on 2 of the most critical assets. Also,
according to ASD(HD&ASA) and Joint Staff officials, the results of
other DOD mission assurance vulnerability assessments already conducted
on critical assets are made available for DCIP vulnerability assessment
teams to consider before they conduct the DCIP vulnerability
assessments. In addition, the Joint Staff and the Defense Threat
Reduction Agency have begun to develop a formal agreement to align more
closely the standards and benchmarks used to conduct vulnerability
assessments for related DOD mission assurance programs, particularly
DCIP, antiterrorism/force protection, continuity of operations, and
information assurance.[Footnote 51] However, until DOD finalizes the
guidelines being developed in this agreement, it may be unable to
systematically leverage the results of related vulnerability
assessments that may be conducted on the same critical assets by
multiple sources, and thus enhance DOD's ability to identify those
assets' electrical power vulnerabilities.
DCIP Assessments to Date Do Not Consistently Consider Vulnerabilities
to Longer-Term Power Disruptions:
DCIP vulnerability assessment teams do not consistently consider the
vulnerabilities of the critical assets to longer-term electrical power
disruptions on a mission-specific basis,[Footnote 52] which is not
explicitly defined in the DCIP vulnerability assessment benchmarks for
electrical power. These benchmarks serve as detailed criteria by which
DCIP vulnerability assessment teams assess whether the electrical power
networks[Footnote 53] that support the critical assets--at the host
installation and in the supporting off-site electrical power system--
have the "capacity, redundancy, path diversity, security,
survivability, and reliability to properly support a given
mission."[Footnote 54] Although the benchmarks consider how long
electrical power backup systems can sustain continuity of critical
operations, how to define what an unacceptable loss of power is, and
whether the asset owner maintains a contingency plan to ensure
availability of the electrical power network to accomplish an asset's
mission, they do not explicitly consider vulnerabilities related to
longer-term electrical power disruptions. As a result, DOD's DCIP
vulnerability assessments may only focus on vulnerabilities associated
with shorter-term electrical power disruptions.
According to ASD(HD&ASA) officials, DCIP vulnerability assessment teams
already consider longer-term electrical power disruptions indirectly
through questions in the benchmarks that ask about contingency plans
and continuity of operations. However, we found that the DCIP
vulnerability assessment reports that were available for 10 of the 34
most critical assets did not explicitly consider specific
vulnerabilities or risk mitigation options associated with longer-term
electrical power disruptions on a mission-specific basis. Consequently,
such vulnerabilities or options may not be identified and DOD may not
make appropriate risk management decisions.
Nevertheless, several DOD sources have recognized the need for the
department to more explicitly consider the effects of longer-term
electrical power disruptions to DOD's critical assets. For example, the
Department of Defense Energy Manager's Handbook[Footnote 55] calls for
DOD components to develop strategies for both short-and long-term
energy disruptions, including electricity disruptions. Also, in its
February 2008 report, the Defense Science Board Task Force on DOD
Energy Strategy--which concluded that DOD's critical national security
and homeland defense missions were at an unacceptably high risk of
failure from extended power disruptions--recommended that DOD consider
the duration of electrical power disruptions, among other factors, in
its risk management approach to reducing risks to critical missions
from the loss of commercial electrical power. An update by the Office
of the Under Secretary of Defense for Acquisition, Technology and
Logistics on DOD's Energy Security Task Force also proposed a subgoal
of "reduc[ing] the risk of loss of critical functions due to extended
commercial grid power disruptions at fixed installations." Without
explicit guidance in the DCIP vulnerability assessment benchmarks for
considering longer-term electrical power disruptions, future DCIP
vulnerability assessments on other critical assets may be unable to
identify vulnerabilities associated specifically with such electrical
power disruptions.
DOD Has Taken Steps to Assure Availability of Electrical Power to
Critical Assets, but It Lacks a Mechanism for Tracking Implementation,
and Its Coordination with Electricity Providers Remains Limited:
DOD Has Taken Some Steps to Assure the Availability of Electrical Power
to Its Critical Assets:
DOD has taken some steps to assure the availability of its electrical
power supplies by identifying and addressing the vulnerabilities and
risks of its critical assets to electrical power disruptions. For
example, from August 2005 through October 2008, DOD issued Defense
Critical Infrastructure Program guidance for identifying critical
assets, assessing their vulnerabilities, and making risk management
decisions about those vulnerabilities. Also, as previously discussed,
DOD has conducted DCIP vulnerability assessments on 14 of the 34 most
critical assets and has scheduled assessments for 13 of the remaining
assets, but it has not yet scheduled assessments for 5 of the non-DOD-
owned most critical assets.[Footnote 56] The DCIP vulnerability
assessments conducted so far have identified specific electrical power-
related vulnerabilities to some of the critical assets, including
vulnerabilities associated with the reliability of the assets'
supporting commercial electrical power grid, the availability of backup
electrical power supplies, and single points of failure in electrical
power systems supporting the assets.[Footnote 57] Addressing the risks
associated with these vulnerabilities--by remediating, mitigating, or
accepting those risks--can help DOD assure the availability of
electrical power to the critical assets. For example, at all 6 most
critical assets we visited, the DOD asset owners have installed diesel-
based electrical power generators as backup sources of electricity
during electrical power disruptions. Other (non-DCIP) DOD mission
assurance programs also have the potential to help DOD assure the
availability of electrical power supplies to its most critical assets.
For example, we found that Joint Service Integrated Vulnerability
Assessments and similar vulnerability assessments from the military
services, which have been conducted on some of the installations with
critical assets for antiterrorism and force protection purposes, also
have identified vulnerabilities related to electrical power.
Furthermore, DOD also has taken steps to coordinate with other federal
agencies, including DOE and DHS, as well as electrical industry
organizations, and these steps may help to assure the supply of
electricity to its critical assets. For example, to represent its
concerns and interests on electricity, DOD participates in the Energy
Government Coordinating Council. The council provides DOD and other
federal agencies with a forum for sharing their concerns, comments, and
questions on energy-related matters--including critical infrastructure
protection--with DOE, which chairs the group.[Footnote 58] In another
effort involving DOE, several DOD combatant commands--including U.S.
European Command and U.S. Africa Command--have recently agreed to
accept a DOE departmental representative to serve as an energy attaché
to the commands. The DOE representatives will provide energy-related
expertise to their respective commands, particularly with respect to
the commands' energy-related planning activities and the security and
reliability of the commands' energy infrastructure. DOD has also
partnered with various federal agencies and industry organizations to
further increase the assurance of electrical power. For example, DOD
serves as co-chair of the federal Task Force on Electric Grid
Vulnerability of the National Science and Technology Council's
Committee on Homeland and National Security, which was established in
January 2009 to identify research and development needs for electrical
grid vulnerabilities and to coordinate with other federal agencies to
address those needs.[Footnote 59] In addition, DOD officials are
collaborating with a working group established by the Edison Electric
Institute in early 2009 called the Energy Security Partnership Group.
The group focuses on improving communications between DOD and its
utilities and on identifying and removing barriers to the development
of comprehensive energy security programs at DOD installations. Also,
in July 2009, DOD participated in an interagency exercise cosponsored
by DHS, DOE, and DOD called Secure Grid 2009, Electric Grid Tabletop
Exercise, for which officials from DOD, DOE, DHS, the Federal Energy
Regulatory Commission, the North American Electric Reliability
Corporation, and the Edison Electric Institute, among others, jointly
developed recommendations and potential responses to two scenarios
involving theoretical physical and cyber-related attacks on U.S.
electrical power grids.
Our survey results confirm that some steps are being taken at various
levels within DOD to improve the assurance of electrical power supplies
to its most critical assets. For example, according to the survey and
reports we reviewed, DOD conducted vulnerability and risk assessments
involving electrical power on 24 of the most critical assets through a
variety of DOD mission assurance reviews, including DCIP assessments,
Joint Staff Integrated Vulnerability Assessments, combatant command
assessments, DOD agency assessments, and local installation
assessments. The survey results also indicate that secondary sources of
electricity--such as uninterruptible power supply systems and diesel
generators--provide some backup electrical power capabilities to almost
all of the critical assets. In addition, according to the survey, asset
owners and host installations for some of the critical assets whose
vulnerabilities have been assessed have taken specific measures to
address those vulnerabilities, such as eliminating single points of
failure, developing electrical power disruption contingency plans,
installing emergency electrical power generators, and increasing
physical security measures around electrical power facilities.
DOD Lacks a Mechanism for Tracking Implementation of Future DCIP Risk
Management Decisions and Responses to Vulnerabilities:
DOD has not yet established a mechanism for systematically tracking the
implementation of future DCIP risk management decisions, which are
intended to address vulnerabilities (including those involving
electrical power) that have been identified for the most critical
assets. Such tracking could help DOD ensure that DCIP stakeholders are
developing and implementing measures to address the most critical
assets' identified vulnerabilities to electrical power disruptions and
thereby help assure the availability of electrical power to those
assets.[Footnote 60] As previously discussed, DCIP's risk management
program involves the identification of DOD's most critical assets; the
assessment of those assets' vulnerabilities through vulnerability
assessments; and subsequent risk assessments, risk management
decisions, and risk responses involving relevant DCIP stakeholders.
DCIP guidance contained in DOD Instruction 3020.45 requires
stakeholders to coordinate to make risk management decisions regarding
whether and how to address identified vulnerabilities--through
remediation or mitigation--or accept the risk posed by not addressing
those vulnerabilities.[Footnote 61]
Under DCIP, ASD(HD&ASA) has overall responsibility for overseeing the
implementation of actions for the remediation, mitigation, or
acceptance of risks to DOD critical assets, while owners of the
critical assets are required to monitor the status and progress of the
implementation of DCIP risk management decisions for their respective
assets.[Footnote 62] ASD(HD&ASA) officials indicated to us that they do
not systematically track the results of DCIP vulnerability assessments,
asserting that they consider it more important to track the
implementation of the subsequent DCIP risk management decisions and
responses to be made concerning the vulnerabilities that are
identified. The officials told us that these risk management decisions
would reflect the consensus that would be reached by relevant DCIP
stakeholders (such as asset owners, mission owners, and defense
infrastructure sector lead agents) on either remediating, mitigating,
or accepting specific vulnerabilities--actions that may require the
stakeholders to provide funding or other resources in order to
implement.[Footnote 63] However, the officials have not yet tracked any
such decisions or responses, because no such decisions or responses
have yet been made in response to the 14 DCIP vulnerability assessments
conducted so far. According to these officials, because of the number
of stakeholders and potential resources involved, risk management
decisions can take several months to coordinate following a DCIP
vulnerability assessment. These officials said that they plan to
monitor the implementation of DCIP risk management decisions and
responses, but they have not yet developed a mechanism, such as a
schedule to track the implementation status of those decisions and
responses, by which to do so. Without systematic tracking of risk
management decisions and responses, DOD may be unable to
comprehensively determine whether asset owners and host installations
are taking the steps agreed to by relevant DCIP stakeholders to address
the vulnerabilities of the critical assets, including vulnerabilities
related to electrical power disruptions.
DOD's Coordination with Local Electricity Providers Has Been Limited:
DCIP guidance recognizes the importance of collaboration by encouraging
coordination[Footnote 64] between DOD facilities with critical assets
and their respective public utilities--including electricity providers--
in order to remediate risks involving those utilities.[Footnote 65]
According to this guidance, a DOD installation "should establish good
communications with public service providers [including electrical
power providers] about service requirements," and "that relationship
does not have to wait for the identification of a vulnerability," as
"the remediation of risks posed by commercial dependency may be more
complicated than that of DOD-owned infrastructure."[Footnote 66]
Similarly, in recognition of the important role that local utility
providers play in supporting DOD installations with critical assets,
the U.S. Army Corps of Engineers is requesting funds for a pilot
program that would involve extensive collaboration with the local
electricity providers at selected U.S. Army installations with critical
assets. The pilot program is intended to analyze the reliability of
community infrastructure in meeting current and anticipated needs of
the installations and the critical missions.[Footnote 67]
As previously discussed, our survey indicated that 31 of the DOD's 34
most critical assets identified the commercial electrical power grid as
their primary source of electrical power. Yet despite this overwhelming
reliance, host installations or owners of only 7 of the surveyed
critical assets reported coordinating with their local electricity
providers to either identify or address their assets' vulnerabilities
to electrical power disruptions.[Footnote 68] Furthermore, according to
the survey and our analysis, none of the host installations or owners
of the critical assets have developed any formal agreements with their
local electricity providers to help manage the risks and
vulnerabilities of those assets to electrical power disruptions. Survey
respondents cited various reasons for not coordinating with local
electricity providers, including the absence of a requirement for such
coordination and the lack of a vulnerability assessment on the asset
that would indicate the need to initiate such coordination.
Coordinating with local electricity providers could usefully enhance
DOD's efforts to identify or address the vulnerabilities of critical
assets to electrical power disruptions and thereby better assure the
availability of electrical power to those assets. However, few host
installations or owners of critical assets have coordinated with their
local electrical power providers to help identify or address the
assets' vulnerabilities to electrical power disruptions. According to
an electrical power industry association representative, local
electricity providers may have technical expertise or be pursuing
activities that could help DOD installations develop risk remediation
or mitigation measures to address electrical power vulnerabilities
affecting a critical asset.[Footnote 69] According to this
representative, such coordination, for example, could lead to
agreements in which local electricity providers would prioritize the
restoration of electrical power to a DOD installation with a critical
asset following an electrical power disruption. In addition, DOD
installations could usefully coordinate with their respective
electricity providers concerning an industry initiative called Spare
Transformer Equipment Program, in which electricity providers agree to
share spare electrical power transformers--which are often foreign
made, expensive, and can take several years to order--in the event of
an emergency.[Footnote 70] Without more extensive coordination between
DOD DCIP stakeholders and local electricity providers, DOD may be
limiting the risk remediation or mitigation options that it could
consider for addressing the vulnerabilities of its critical assets to
electrical power disruptions.
Conclusions:
DOD relies on commercial electrical power grids for secure,
uninterrupted electrical power supplies to support its most critical
assets--those whose incapacitation or destruction would have a very
serious, debilitating effect on the department's ability to fulfill its
missions. However, according to the Defense Science Board Task Force on
DOD Energy Strategy, the commercial electrical power grids have become
increasingly fragile and vulnerable to extended power disruptions that
could severely impact DOD's most critical assets, their supporting
infrastructure, and the missions they support, and disruptions to the
electrical power grid have occurred. DOD's most critical assets are
vulnerable to disruptions in electrical power supplies, but DOD would
benefit from additional information to determine the full extent of the
risks and vulnerabilities these assets face. By completing DCIP
vulnerability assessments on all of its most critical assets, DOD would
have more information to determine the full extent of these assets'
risks and vulnerabilities to such disruptions. Similarly, with
additional guidelines, an implementation plan, and a schedule for
conducting DCIP vulnerability assessments on all non-DOD-owned most
critical assets, particularly those located abroad, DOD could more
accurately determine the full extent of those assets' risks and
vulnerabilities to such disruptions. Further, until the U.S. Army Corps
of Engineers is able to complete the preliminary technical analyses of
public works (including electrical power) infrastructure in support of
the DCIP vulnerability assessments of the critical assets, DOD may be
unable to identify all electrical power vulnerabilities to its most
critical assets. Additionally, once DOD finalizes guidelines specifying
how DCIP assessment criteria and processes should be coordinated with
those of other DOD mission assurance programs, DOD could more
systematically determine whether these programs may also be identifying
electrical power vulnerabilities and risk management options for its
most critical assets. Also, explicit guidelines to assess
vulnerabilities to critical assets from long-term electrical power
disruptions would further enhance DOD's ability to manage the risks
associated with such disruptions.
While DOD has taken some steps toward assuring the availability of its
electrical power supplies to its critical assets, additional DCIP
measures could further enhance efforts to address these assets' risks
and vulnerabilities to electrical power disturbances. DOD could also
improve its ability to leverage related mission assurance assessments
and respond to future disruptions by developing a mechanism to
systematically track the results of future risk management decisions
and responses intended to address risks and vulnerabilities identified
for the most critical assets. Additionally, DOD could expand its
options for addressing disruptions in the commercial electrical power
grid by encouraging greater collaboration between the owners or host
installations of the most critical assets and their respective local
electricity providers.
With more comprehensive knowledge of DOD's most critical assets' risks
and vulnerabilities to electrical power disruptions and more effective
coordination with electricity providers, DOD can better avoid
compromising crucial DOD-wide missions during electrical power
disruptions. This additional information may also improve DOD's ability
to effectively prioritize funding needed to address identified risks
and vulnerabilities of its most critical assets to electrical power
disruptions.
Recommendations for Executive Action:
To ensure that DOD has sufficient information to determine the full
extent of the risks and vulnerabilities to electrical power disruptions
of its most critical assets, we recommend that the Secretary of Defense
direct the Assistant Secretary of Defense for Homeland Defense and
Americas' Security Affairs, in collaboration with the Joint Staff's
Directorate for Antiterrorism and Homeland Defense, combatant commands,
military services, and other Defense Critical Infrastructure Program
stakeholders, as appropriate, to take the following five actions:
* Complete Defense Critical Infrastructure Program vulnerability
assessments, as required by DOD Instruction 3020.45, on all of DOD's
most critical assets by October 2011.
* Develop additional guidelines, an implementation plan, and a schedule
for conducting Defense Critical Infrastructure Program vulnerability
assessments on all non-DOD-owned most critical assets located in the
United States and abroad in conjunction with other federal agencies, as
appropriate, that have a capability to implement the plan.
* Establish a time frame for the military services to provide the
infrastructure data required for the Public Works Defense
Infrastructure Sector Lead Agent--the U.S. Army Corps of Engineers--to
complete its preliminary technical analysis of public works (including
electrical system) infrastructure at DOD installations that support
DOD's most critical assets.
* Finalize guidelines currently being developed to coordinate Defense
Critical Infrastructure Program assessment criteria and processes more
systematically with those of other DOD mission assurance programs.
* Develop explicit Defense Critical Infrastructure Program guidelines
for assessing the critical assets' vulnerabilities to long-term
electrical power disruptions.
To enhance DOD's efforts to mitigate these assets' risks and
vulnerabilities to electrical power disruptions and leverage previous
assessments and multiple asset owners' information, we recommend that
the Secretary of Defense direct the Assistant Secretary of Defense for
Homeland Defense and Americas' Security Affairs, in collaboration with
the Joint Staff's Directorate for Antiterrorism and Homeland Defense,
combatant commands, military services, and other Defense Critical
Infrastructure Program stakeholders, as appropriate, to take the
following two actions:
* Develop a mechanism to systematically track the implementation of
future Defense Critical Infrastructure Program risk management
decisions and responses intended to address electrical power-related
risks and vulnerabilities to DOD's most critical assets.
* Ensure for DOD-owned most critical assets, and facilitate for non-
DOD-owned most critical assets, that asset owners or host installations
of the most critical assets, where appropriate, reach out to local
electricity providers in an effort to coordinate and help remediate or
mitigate risks and vulnerabilities to electrical power disruptions that
may be identified for DOD's most critical assets.
Agency Comments and Our Evaluation:
In written comments on a draft of this report, DOD concurred with all
of our recommendations and provided technical comments, which we
incorporated in the report where appropriate.[Footnote 71] DOD's
comments are reprinted in appendix VI. Due to the sensitivity of DOD's
most critical assets and its concerns about the classification and
dissemination of the initial draft report, as well as the focus of the
recommendations on DOD's program, we did not request agency comments on
the full draft report from DOE, DHS, and the Federal Energy Regulatory
Commission. However, we did seek technical comments from these entities
on sections of the initial draft report that pertained to their roles
and responsibilities, which we also incorporated in the report where
appropriate.
DOD concurred with our five recommendations to ensure that DOD has
sufficient information to determine the full extent of the risks and
vulnerabilities to electrical power disruptions of its most critical
assets. Based on DOD's comments, we modified our original
recommendation concerning the establishment of a time frame for the
military services to provide the infrastructure data required for
preliminary technical analysis of public works (including electrical
system) infrastructure at DOD installations that support DOD's most
critical assets.
* First, DOD concurred with our recommendation that the department
complete DCIP vulnerability assessments on all of its most critical
assets by October 2011, as required by DOD Instruction 3020.45. DOD
noted that the Joint Staff, in coordination with ASD(HD&ASA), has
already begun to conduct these assessments using an all-hazards and
mission-assurance approach. As we reported, as of June 2009, DOD had
conducted DCIP assessments on 14 of the 34 most critical assets.
* Second, DOD concurred with our recommendation that the department
develop additional guidelines, an implementation plan, and a schedule
for conducting vulnerability assessments on all non-DOD-owned most
critical assets located in the United States and abroad in conjunction
with other federal agencies, as appropriate, that have a capability to
implement the plan. DOD acknowledged that conducting vulnerability
assessments on such assets, particularly those located abroad, presents
significant challenges, as they require the agreement of the assets'
non-DOD owners. According to the department, the ASD(HD&ASA)/DCIP
Office is coordinating with appropriate offices to examine the
possibility of conducting "remote assessments" on these assets. We
recognize the challenges faced by DOD in identifying the electrical
power vulnerabilities of non-DOD-owned critical assets and support
DOD's efforts to coordinate with appropriate federal agencies in this
area. We previously have reported on DOD's efforts to coordinate with
the Department of State on similar sensitive matters involving foreign
governments' support for DOD assets abroad, noting that such efforts
have resulted in various types of agreements to help protect U.S.
forces and facilities abroad. We also note that if DOD decides to
conduct "remote" DCIP vulnerability assessments on the non-DOD-owned
most critical assets, such assessments should rely on the same
benchmarks used for conducting DCIP vulnerability assessments on DOD-
owned most critical assets.
* Third, DOD concurred with our recommendation that the department
establish a time frame for the military services to provide the
infrastructure data required for the Public Works Infrastructure Sector
Lead Agent--the U.S. Army Corps of Engineers--to complete its
preliminary technical analysis of public works infrastructure at DOD
installations that support DOD's most critical assets. Based on
comments from DOD that the Corps has already completed the technical
analysis for public works infrastructure located outside of the
installations, but is still waiting for the data required to complete
the analysis on infrastructure located within the installations, we
modified this recommendation to indicate that these data are required
for completing--rather than conducting--the preliminary technical
analysis. DOD acknowledged that such information is necessary for the
proper characterization of its critical assets from a public works
perspective. We believe that the establishment of specific time frames
for the military services to provide this important information is
necessary because, as of July 2009, only one of the military services-
-the U.S. Navy--had begun to gather the requested information.
* Fourth, DOD concurred with our recommendation that the department
finalize guidelines currently being developed to coordinate DCIP
assessment criteria and processes more systematically with those of
other DOD mission-assurance programs. While acknowledging the
synergistic effect of complementary risk management program activities
and security-related functions, DOD noted that such programs are
subject to different directives and appropriations, and that critical
infrastructure protection at the installation level is not yet mature.
According to DOD, the Joint Staff is now overseeing a "way ahead"
process to better synchronize these efforts. We encourage the Joint
Staff to complete this initiative and identify specific ways for
coordinating DCIP assessment criteria and processes more systematically
with those of DOD's other mission assurance programs.
* Fifth, DOD concurred with our recommendation that the department
develop explicit DCIP guidelines for assessing the most critical
assets' risks and vulnerabilities to long-term electrical power
disruptions. According to DOD, the ASD(HD&ASA)/DCIP Office will review
current vulnerability assessment criteria and standards and work with
the Joint Staff to include considerations of long-term electrical power
disruptions.
DOD also concurred with our two recommendations to enhance DOD's
efforts to mitigate its most critical assets' risks and vulnerabilities
to electrical power disruptions and leverage previous assessments and
multiple asset owners' information:
* First, DOD concurred with our recommendation that the department
develop a mechanism to systematically track the implementation of
future DCIP risk management decisions and responses intended to address
electrical power-related risks and vulnerabilities to DOD's most
critical assets. According to DOD, the ASD(HD&ASA)/DCIP Office has
developed draft DOD Manual 3020.45, Volume 5, Defense Critical
Infrastructure Program (DCIP) Coordination Timeline, that is being
coordinated within the department. DOD notes that manual's purpose is
to provide uniform procedures and timelines for DCIP stakeholders--that
is, ASD(HD&ASA), the Joint Staff, military departments, combatant
commands, defense agencies, and DISLAs--to execute DCIP activities and
responsibilities, including those related to risk management decisions
and responses. We encourage DOD to finalize this draft manual and
ensure that it provides explicit guidance on tracking the
implementation of DCIP risk management decisions and responses
resulting from DCIP vulnerability assessments of DOD's most critical
assets. DOD also notes that the DCIP Office is developing an automated
Critical Asset Identification Process Collaboration Tool that will
document and track the status of DCIP stakeholders' progress in the
DCIP risk management process.
* Second, DOD also concurred with our recommendation that the
department ensure for DOD-owned most critical assets, and facilitate
for non-DOD-owned most critical assets, that asset owners or host
installations of the most critical assets, where appropriate, reach out
to local electricity providers in an effort to coordinate and help
remediate or mitigate risks and vulnerabilities to electrical power
disruptions that may be identified for DOD's most critical assets.
DOD's comments cited existing guidance that, among other things, (1)
encourages government and private-sector decision makers to work with
electricity providers to identify remedies to potential single points
of failure and (2) advises DOD facility managers to establish good
communications with public service providers about service
requirements, and to review service-level agreements, acquisition
programs, contracts, and operational processes for opportunities to
address and include stronger resiliency language and requirements for
future remediation efforts. According to DOD, this guidance will be
reinforced at DCIP forums for collaboration, such as meetings of the
Defense Critical Infrastructure Integration Staff, Operational Advisory
Board, and Defense Infrastructure Sector Council. We encourage DOD to
reinforce such guidance concerning collaboration with local electricity
providers directly with asset owners or host installations for each of
the most critical assets, as appropriate, in order to help mitigate the
risks and vulnerabilities to electrical power disruptions that may be
identified for those assets.
We are sending copies of this report to other interested congressional
parties; the Secretary of Defense; the Chairman, Joint Chiefs of Staff;
the Secretaries of the U.S. Army, the U.S. Navy, and the U.S. Air
Force; the Commandant of the U.S. Marine Corps; and the Director,
Office of Management and Budget. This report also is available at no
charge on GAO's Web site at [hyperlink, http://www.gao.gov].
If you or your staff have any questions concerning this report, please
contact me at (202) 512-5431 or dagostinod@gao.gov. Contact points for
our Offices of Congressional Relations and Public Affairs may be found
on the last page of this report. GAO staff who made key contributions
to this report are listed in appendix VII.
Signed by:
Davi M. D'Agostino:
Director Defense Capabilities and Management:
List of Committees:
The Honorable Carl Levin:
Chairman:
The Honorable John McCain:
Ranking Member:
Committee on Armed Services:
United States Senate:
The Honorable Daniel K. Inouye:
Chairman:
The Honorable Thad Cochran:
Ranking Member:
Subcommittee on Defense:
Committee on Appropriations:
United States Senate:
The Honorable Tim Johnson:
Chairman:
The Honorable Kay Bailey Hutchison:
Ranking Member:
Subcommittee on Military Construction, Veterans Affairs, and Related
Agencies:
Committee on Appropriations:
United States Senate:
The Honorable Ike Skelton:
Chairman:
The Honorable Howard P. McKeon:
Ranking Member:
Committee on Armed Services:
House of Representatives:
The Honorable John P. Murtha:
Chairman:
The Honorable C.W. Bill Young:
Ranking Member:
Subcommittee on Defense:
Committee on Appropriations:
House of Representatives:
The Honorable Chet Edwards:
Chair:
The Honorable Zach Wamp:
Ranking Member:
Subcommittee on Military Construction, Veterans Affairs, and Related
Agencies:
Committee on Appropriations:
House of Representatives:
[End of section]
Appendix I: Scope and Methodology:
To conduct our review of the assurance of electrical power supplies to
Department of Defense (DOD) critical assets, we administered three
structured written surveys to the owners or those with program
responsibility for 100 percent of DOD's 34 most critical assets, which
DOD identified through the Defense Critical Infrastructure Program
(DCIP) as its most critical assets as of October 2008. We administered
one survey to the military services and DOD agencies that own or have
program responsibility for the assets through DCIP to obtain
information about the (1) assets' degree of reliance on electrical
power; (2) assets' primary and backup sources of electrical power
supplies; (3) number and type of unplanned electrical power disruptions
to the assets; (4) DCIP and non-DCIP assessments of the assets' risks
and vulnerabilities to electrical power disruptions from January 2006
through December 2008; and (5) measures recommended, implemented, or
planned to address or manage such risks and vulnerabilities. We
administered another survey to the Joint Staff to obtain information
about the missions supported by the assets. Finally, we administered
the third survey to the Office of the Assistant Secretary of Defense
for Homeland Defense and Americas' Security Affairs (ASD(HD&ASA))
regarding coordination efforts with relevant DOD and non-DOD
stakeholders. (These surveys are reproduced in full in apps. III, IV,
and V, respectively.) We limited our surveys to the universe of DOD's
most critical assets because of concerns over the reliability of DOD's
larger list of about 675 Tier 1 Task Critical Assets,[Footnote 72]
which support critical DOD missions at the departmental, combatant
command, and military service levels. We also conducted six follow-up
site visits to a nonprobability sample of critical assets to verify and
validate the surveys' results and evaluate in-depth issues identified
in the surveys' responses. We selected the sites for visits
judgmentally based on the survey responses regarding issues addressed
in this report.
We initially selected a random sample from DOD's universe of about 675
Tier 1 Task Critical Assets to survey for this review. However, based
on discussions with DOD officials and our own analysis, we found
significant data reliability and validity problems with DOD's Tier 1
Task Critical Asset list. We found that the use of disparate sets of
guidance, including draft and nonbinding guidance, resulted in the
selection and submission of assets to the Tier 1 Task Critical Asset
list based on inconsistent criteria, thus limiting the usefulness of
the Tier 1 Task Critical Asset list to DOD decision makers in
determining DOD's most critical assets and prioritizing funding to
address identified vulnerabilities. As a result, we determined that for
methodological purposes, DOD's current Tier 1 Task Critical Asset list
did not represent a meaningful universe from which we should select our
survey sample or to which we should project our survey results. Because
the universe of critical assets did not represent an accurate,
comprehensive list of DOD Tier 1 Task Critical Assets, we determined
that this issue in and of itself warranted further analysis. Therefore,
we issued a separate report, with recommendations, on issues relating
specifically to the Tier 1 Task Critical Asset list to enable DOD to
take timely actions to update and improve its list of Defense Critical
Assets in the fall of 2009 and prioritize funding.
In addition to our survey, we obtained relevant documentation and
interviewed officials from the following DOD organizations:
* Office of the Deputy Under Secretary of Defense for Installations and
Environment:
* ASD(HD&ASA)/DCIP Office:
* Joint Staff (J-34), Directorate for Antiterrorism/Homeland Defense,
DCIP Resources and Assessments Branch:
* Military Services:
- Headquarters, Department of the Army:
-- Critical Infrastructure Risk Management Branch:
-- Headquarters, Installation Management Command, Anti-Terrorism/Force
Protection:
-- Office of the Assistant Chief of Staff for Installation Management,
Energy & Utilities for Installation Office:
- Headquarters, Department of the Navy:
-- Critical Infrastructure Protection:
- Headquarters, U.S. Marine Corps:
-- Marine Corps Critical Infrastructure Program, Mission Assurance
Branch:
- Headquarters, Department of the Air Force:
-- Assistant Deputy Chief of Staff Logistics, Installations, and
Mission Support:
-- Critical Infrastructure Program, Air Force Directorate of Current
Operations & Training, Air Force Homeland Defense Division:
* Defense Information Systems Agency:
* Defense Infrastructure Sector Lead Agents:
- Headquarters, U.S. Army Corps of Engineers, DCIP Public Works Defense
Sector Lead:
* Defense Threat Reduction Agency, Support Branch Chief, Combat Support
Assessments Division:
* Director of Defense Research and Engineering:
* Defense Science Board, Task Force on DOD Energy Strategy:
* Mission Assurance Division, Naval Surface Warfare Center at Dahlgren:
* Selected DOD critical assets at U.S. military installations within
the continental United States:
To become more familiar with efforts currently taking place to assure
the nation's electrical power grid, we met with various officials from
federal agencies, electrical power industry associations, and private-
sector entities and other officials to determine their roles and
responsibilities, ongoing initiatives, and the extent of their
coordination efforts with DOD in assuring electrical power to the
nation's power grid. We obtained relevant documentation and interviewed
officials from the following organizations:
* Department of Homeland Security (DHS):
- National Protection and Programs Directorate:
- Office of Infrastructure Protection:
- Infrastructure Information Collection Division:
- Partnership and Outreach Division:
- Protective Security Coordination Division:
- Office of Cybersecurity and Communications:
* Department of Energy (DOE), Office of Electricity Delivery & Energy
Reliability:
* Federal Energy Regulatory Commission, Office of Electric Reliability:
* North American Electric Reliability Corporation:
* CACI International, Inc.
* Edison Electric Institute:
* Pareto Energy, Inc.
* Talisman International, LLC:
We did not request agency comments from DOE, DHS, and the Federal
Energy Regulatory Commission on the full draft report, which at the
time was classified as SECRET because of (1) DOD's concerns about the
classification and dissemination of the report and (2) the focus of the
recommendations on DOD's program. We did seek technical comments from
these entities on sections of the initial draft report that pertained
to their roles and responsibilities, which we incorporated in the
report where appropriate. We also shared sections of the initial draft
report that discussed the 2008 Report of the Defense Science Board Task
Force on DOD Energy Strategy, "More Fight--Less Fuel," and the entities
either agreed or did not take issue with the conclusions of this
report.
To learn more about the assurance of electrical power supplies to DOD
critical assets, we developed three electronic surveys for DOD critical
assets, their missions, and coordination efforts regarding the assets.
We asked responders about (1) missions supported by the assets; (2)
assets' degree of reliance on electrical power; (3) assets' primary and
backup sources of electrical power supplies; (4) number and type of
unplanned electrical power disruptions to the assets; (5) DCIP and non-
DCIP assessments of the assets' risks and vulnerabilities to electrical
power disruptions; and (6) measures recommended, implemented, or
planned to address or manage such risks and vulnerabilities, including
coordination efforts with relevant DOD and non-DOD stakeholders.
We conducted our surveys from May 2009 through August 2009, using self-
administered electronic surveys. We sent a questionnaire on DOD
critical assets to the owners and operators of DOD-owned critical
assets. We sent a second questionnaire on DOD critical asset missions
to the Joint Staff (J-34). We sent a third questionnaire on
coordination efforts for DOD critical assets to ASD(HD&ASA)/DCIP
Office. We sent the questionnaires by SIPRNet in an attached Microsoft
Word form that respondents could return electronically via SIPRNet
after marking check boxes or entering responses up to the SECRET
classification level into open answer boxes. We also made provisions
for receiving completed questionnaires at the TOP SECRET classification
level, if needed, via a GAO Joint Worldwide Intelligence Communications
System account, which was established for us at the DOD Office of the
Inspector General.
We sent the original three electronic questionnaires in May and June
2009. We sent out reminder e-mail messages at different times to all
nonrespondents in order to encourage a higher response rate. In
addition, we made several courtesy telephone calls to nonrespondents to
encourage their completion of the surveys. All questionnaires were
returned by August 2009. In the end, we achieved a 100 percent response
rate.
Because this was not a sample survey, but rather a survey of the
universe of respondents, it has no sampling errors. However, the
practical difficulties of conducting any survey may introduce errors,
commonly referred to as nonsampling errors. For example, difficulties
in interpreting a particular question, determining sources of
information available to respondents, or entering data into a database
or analyzing them can introduce unwanted variability into the survey
results. We took steps in developing the questionnaire, collecting the
data, and analyzing them to minimize such nonsampling error.
For example, design methodologists designed the questionnaire in
collaboration with GAO staff who had subject matter expertise. In
addition to an internal expert technical review by GAO's Survey
Coordination Group, we pretested the survey with U.S. Army, U.S. Navy,
and U.S. Air Force officials representing three most critical asset
sites as well as officials from the Joint Staff (J-34) and ASD(HD&ASA)
to ensure that the questions were relevant, clearly stated, and easy to
understand. Since there were relatively few changes based on the
pretests and because we were conducting surveys with the universe of
respondents, we did not find it necessary to conduct additional
pretests. Instead, changes to the content and format of the
questionnaire were made after the pretests based on the feedback we
received.
When we analyzed the data, an independent analyst checked all computer
programs. All data were double keyed during the data entry process, and
GAO staff traced and verified all of the resulting data to ensure
accuracy.
To verify and validate the survey recipients' responses and evaluate in
more detail issues identified in the surveys, we conducted six follow-
up site visits to a nonprobability sample of surveyed assets. We
selected the sites for visits judgmentally based on the survey
responses regarding issues addressed in this report. During these site
visits, we spoke with installation personnel, including asset owners
and operators, about their reliance on supporting electrical
infrastructure and electricity providers. While findings from our site
visits are not generalizable to all 34 most critical assets, we
obtained follow-up survey information from installation personnel for
critical assets and visited those assets to validate the survey
responses, as applicable. We clarified responders' interpretation of
the survey questions, discussed their responses in detail, and visited
the critical assets and their supporting infrastructure to better
understand each asset's unique situation. Finally, we reviewed
documentation and guidance related to those critical assets, including
vulnerability assessments.
We conducted this performance audit from October 2008 through October
2009 in accordance with generally accepted government auditing
standards. Those standards require that we plan and perform the audit
to obtain sufficient, appropriate evidence to provide a reasonable
basis for our findings and conclusions based on our audit objectives.
We believe that the evidence obtained provides a reasonable basis for
our findings and conclusions based on our audit objectives.
[End of section]
Appendix II: Typical Electrical Power Vulnerabilities and Remediation
Measures:
Common types of electrical power vulnerabilities: Co-location of
primary and backup electrical power equipment;
Examples of electrical power vulnerabilities: Both the primary and
backup power supply systems exist in the same room for convenience of
maintenance;
Possible remediation measures: * Implement physical diversity in
location of backup support;
* Ensure fire suppression systems support continued operation of non-
affected systems;
* Increase security on the location during higher threat periods.
Common types of electrical power vulnerabilities: Single transformer
provides both commercial and backup power to a critical asset;
Examples of electrical power vulnerabilities: Alternate paths that
supply electrical power converge at single component (i.e., a
transformer) and represent potential point of failure if common
component fails;
Possible remediation measures: * Have independent commercial and backup
power paths;
* Identify alternate location to relocate critical operations;
* Use portable generations and uninterruptible power supplies to
provide power in case of a single component failure;
* Arrange for immediate emergency maintenance response to restore the
component capability.
Common types of electrical power vulnerabilities: Critical electrical
power assets have no access controls;
Examples of electrical power vulnerabilities: Access to buildings that
house electrical power supplies to critical assets;
Possible remediation measures: * Establish strict access control
procedures for buildings and areas housing important system components;
* Relocate important system components to secured areas;
* Bury electric power lines or protect poles with anti-ram barriers.
Common types of electrical power vulnerabilities: Power lines share
right-of-way with other key utilities;
Examples of electrical power vulnerabilities: Bridges, tunnels, and
trenches often involve shared rights-of-way for electrical power that
may contain other key utilities;
Possible remediation measures: * Establish mitigation options, such as
backup power or transferring mission to another location, based on loss
of the right-of-way;
* Establish agreements with local community to increase security or
patrols for these locations during increased threat periods;
* Be aware of maintenance or repair activities for other utilities in
these locations.
Common types of electrical power vulnerabilities: Backup generation is
insufficient;
Examples of electrical power vulnerabilities: Generators and
uninterruptible power supplies are not large enough to support the
critical asset in case of primary power loss or in case the location
does not stockpile sufficient fuel to support the operational time
frame during an electrical power loss;
Possible remediation measures: * Determine critical asset needs and
purchase backup generators accordingly;
* Maintain at least minimum operational requirements for consumables
(i.e., fuel);
* Distribute critical asset operations to other backup power supplied
locations.
Source: DOD, Defense Critical Infrastructure Program: Infrastructure
Resiliency Guide: Reduce Your Vulnerabilities and Make Your
Infrastructure Stronger, Version 1.0 (May 2007).
[End of table]
[End of section]
Appendix III: Survey of DOD Critical Assets:
United States Government Accountability Office:
Survey of DOD Critical Assets Accountability:
Introduction:
The U.S. Government Accountability Office (GAO) is an independent, non-
partisan legislative branch agency that assists Congress in evaluating
how the federal government spends taxpayer dollars. GAO supports the
Congress in meeting its constitutional responsibilities and to help
improve the performance and ensure the accountability of the federal
government for the benefit of the American people. GAO provides
Congress with timely information that is objective, fact-based,
nonpartisan, nonideological, fair, and balanced.
In response to a congressional mandate in the House Report on the
National Defense Authorization Act for Fiscal Year 2009, Title XXVIII,
Defense Critical Infrastructure Program, Report 110-652 (May 16, 2008),
GAO is conducting a review of the Assurance of Electrical Power
Supplies to DOD Critical Assets (GAO code 351266). The following
critical asset was selected for this survey:
Please enter asset here:
Since you have been identified as a subject matter expert for this
asset, we ask that you coordinate the completion of this survey with
other officials as necessary and return one consolidated survey for
this asset.
Follow-Up:
After we receive your reply, we may call you to schedule a follow-up
telephone interview if we need to clarify some answers in the survey.
Deadline:
To assist us, we ask that you complete and return this survey by June
5, 2009, via SIPRNet to ArtadiD@gao.gov. Please return the completed
survey by e-mail. Simply save this file to your classified computer
desktop, hard drive, or disk and attach it to your e-mail.
Instructions for Completing This Survey:
You can answer most of the questions easily by checking boxes or
filling in blanks. A few questions request narrative answers. Please
note that the space provided will expand to accommodate your answer.
You may write additional comments at the end of the survey. We request
that you provide the most recent information from no earlier than
January 1, 2006.
* Please use your mouse to navigate throughout the survey by clicking
on the field or check box you wish to fill in. Do not use the "Tab" or
"Enter" keys as doing so may cause formatting problems.
* To select or deselect a check box, simply click or double click on
the box.
* Please indicate the security classification of your narrative
responses by writing (U) for "unclassified" or (S) for "SECRET" at the
beginning of each entry or paragraph, as appropriate. Please limit your
responses to Task Critical Asset information classified no higher than
"SECRET" in accordance with the Defense Critical Infrastructure Program
(DCIP) Security Classification Guide, May 2007.
Contact Information:
Thanks in advance for taking the time to complete this survey. If you
have any questions about the survey or security classification of your
responses, please contact either:
David Artadi, GAO Analyst-in-Charge:
Phone: (404) 679-1989:
SIPRNet: ArtadiD@gao.gov:
or:
Lt Col Norman Worthen:
Phone: (703) 693-7542:
SIPRNet:: Norman.Worthen@js.pentagon.smil.mil:
Thank you for your help.
Contact Information:
1. Although several people may participate in the completion of this
survey, we ask that you provide contact information below for the
person coordinating the completion of the survey in case we need to
follow-up with additional questions.
Name:
Rank:
Title:
Unit Name:
Base/Organization:
Commercial Phone #: ( ):
E-mail:
SIPRNet:
Section A. Reliance on Electrical Power:
Again, please enter the name of the asset for which this survey is
being completed.
2. Does this asset require electrical power in order to function and
support its military mission(s)? (Mark x only one response):
Yes:
No: Skip To Question #62:
3. To what extent does this critical asset require electrical power to
function? (Mark only x one response):
All of the time (continuous/constant):
Most of the time:
About half of the time:
Less than half of the time:
None of the time: No: Skip To Question #62:
Please explain if necessary:
4. Does this critical asset require supporting infrastructure, such as
water; natural gas; heating, ventilating, and air conditioning (HVAC);
or any other supporting utility to function? (Mark x only one
response):
Yes:
No: Skip To Question #6:
5. Does this critical asset's supporting infrastructure require
electrical power to function? (Mark x only one response):
Yes:
No:
6. From what source does this asset generally receive its primary
electrical power supply? (Mark x only one response):
Non-DOD electricity provider(s) or utility(ies) (e.g., the commercial
power grid):
* Name of provider(s) or utility(ies):
DOD-generated electricity supply based on fossil fuels (e.g., diesel-
powered generators):
DOD-generated electricity supply based on solar energy:
DOD-generated electricity supply based on geothermal energy 1-1 DOD-
generated electricity supply based on wind energy:
DOD-generated electricity supply based on biomass energy:
DOD-generated electricity supply based on nuclear energy:
7. Does this asset rely on an intermediate or transitional
uninterruptible power supply (UPS) (i.e. a battery backup) to provide
power in the event of an electrical power disruption? (Mark x only one
response):
Yes: How many minutes is the UPS expected to provide electrical power
to the asset?:
* minutes
No: Why not?
8. Does this asset have a back-up power source, other than UPS, in the
event of an electrical power disruption from any of the following
sources? (Mark x one response for each row):
Source:
a. Batteries or fuel cells (other than UPS):
Yes:
No:
b. Non-DOD electricity provider(s)/utility(ies) (e.g., the commercial
power grid):
Yes:
No:
* Name of provider(s) or utility(ies):
c. DOD-generated electricity supply based on fossil fuels (e.g., diesel-
powered generators):
Yes:
No:
d. DOD-generated electricity supply based on solar energy:
Yes:
No:
e. DOD-generated electricity supply based on geothermal energy:
Yes:
No:
f. DOD-generated electricity supply based on wind energy:
Yes:
No:
g. DOD-generated electricity supply based on biomass energy:
Yes:
No:
h. DOD-generated electricity supply based on nuclear energy:
Yes:
No:
9. How long, collectively, can back-up electrical power sources
identified in question 8 provide electricity to the critical asset?
(Mark x only one response)
Less than 24 hours:
Between 1 and 3 days (72 hours):
More than 3 days up to 1 week:
Between 1 and 2 weeks:
Over 2 weeks:
Indefinitely (as long as fuel is available):
Section B. Back-Up Generators:
10. Do the back-up electrical power sources identified in question 8
involve electrical power generators? (Mark x only one response):
Yes:
No: Skip To Question #25
11. Are back-up generators dedicated to the critical asset or shared
with other critical assets or infrastructure? (Mark x only one
response):
Dedicated to the critical asset:
Shared with other critical assets or infrastructure:
12. Is the back-up generator(s) sufficient to maintain the critical
asset and meet its mission(s) requirements?
Yes:
No: Skip To Question #25:
13. How many days can these generators function before requiring
replenishing energy supplies (e.g., diesel fuel, natural gas, JP-8,
etc.)?
days:
14. How many days would the energy supply that is currently stored at
the installation or location of the critical asset be able to support
these generators?
days:
15. How many days can these generators function before requiring
preventive maintenance?
days:
16. How many days can these generators function before requiring
corrective maintenance?
days:
17. Do you have another back-up generator that could be utilized while
performing preventive or corrective maintenance on the primary
generator?
Yes:
No:
18. How frequently are the generators identified in question 10 above
subject to inspection and preventive maintenance to ensure that they
function as intended?
19. Do you conduct inspections and preventive maintenance to these
generators as prescribed by schedule requirements?:
Yes:
No:
20. How frequently are these generators subject to routine testing to
ensure that they function as intended?
21. What plans, if any, do you have to obtain additional energy
supplies for these generators once currently stocked supplies run out?
22. What size (in terms of electricity production capacity, such as
kilowatts) are these generators?
23. What are the electrical requirements (such as kilowatts) for the
critical asset?
24. When was this electrical requirement last validated?
(date):
Section C. Unplanned Disruptions to Electrical Power:
25. How many unplanned disruptions, if any, to this asset's primary
electrical power sources have occurred between January 1, 2006, and
December 31, 2008?
(Mark only one response):
Zero:
l to 5:
6 to 10:
More than 10:
Unknown:
26. When did the disruption(s) occur? (List date(s) for each
disruption):
27. How long did each of these disruptions last?
28. Do you know the cause(s) for each disruption?
Yes:
No: Skip To Question #31:
29. What were the causes of each disruption?
30. What trends, if any, did you identify regarding causes of the
disruptions?
31. How, if at all, did the disruption(s) affect the asset's
mission(s)?
32. What actions, if any, did you take to mitigate the impact of the
disruption(s) on the asset's mission(s)?
33. Is this asset incorporated into its electricity
provider's/utility's reconstitution or restoration planning? (Mark x
only one response):
Yes:
No:
Unknown:
34. Have any cyber or computer-based attacks or probes occurred that
have negatively affected the delivery of electrical power to the asset
or its supporting infrastructure? (Mark x only one response):
Yes:
No: Skip To Question #37:
Unknown 4 Skip To Question #37:
35. How did you determine that such cyber or computer-based attacks or
probes occurred? (Mark m only one response)
36. Who did you inform, if anyone, about the cyber or computer-based
attacks or probes? (Mark x only one response)
Section D. Assessments:
37. Were any assessments conducted between January 1, 2006, and
December 31, 2008, that specifically examined (1) the vulnerabilities
of this asset to electrical power disruptions and/or (2) the risks of
electrical power disruptions to this asset? (Mark only one response):
Yes:
No: Skip To Question #54:
38. What organization(s) conducted the assessment(s)?
39. What were the date(s) of the assessment(s)?
40. Did the assessment(s) consider vulnerabilities or risks up to one
node (electrical power substation) nearest to the installation or
location of the critical asset (i.e., "one node beyond the fence")?
(Mark x only one response):
Yes:
No:
41. Did the assessment(s) consider vulnerabilities or risks beyond one
node (electrical power substation) nearest to the installation or
location of the critical asset (i.e., more than "one node beyond the
fence")? (Mark x only one response):
Yes:
No:
42. Which of the following vulnerabilities or risks listed below were
identified from the assessments? (Mark x one response for each row):
Vulnerabilities or risks:
a. The reliability and resiliency of a commercial or DOD installation's
power grid.
Yes:
No:
b. The physical security of commercial and DOD electrical power
infrastructures.
Yes:
No:
c. The cyber-security of commercial and DOD electrical power
infrastructures.
Yes:
No:
d. The lack of back-up electrical generation capabilities (maintenance,
testing, fuel supplies, etc.).
Yes:
No:
e. Single points of failure within commercial/DOD electrical power
infrastructures.
Yes:
No:
f. The lack of contingency plans for addressing electrical power
disruptions to critical assets.
Yes:
No:
g. Other vulnerability or risk 4 Please describe:
Yes:
No:
43. What detail was provided about each vulnerability or risk
identified in question #42 above?
Section E. Measures Taken:
44. Were measures proposed or recommended to address or manage these
vulnerabilities or risks? (Mark x only one response):
Yes:
No: Skip To Question #54:
45. What measures were proposed or recommended to address or manage
these vulnerabilities or risks?
46. At what level within DOD was the decision made to implement the
recommended measure(s) or not implement the measure(s) and accept the
risks?
47. What criteria, if any, were used in determining which measure(s)
would be taken to address, manage, or accept vulnerabilities or risks
(e.g., asset criticality, costs, staffing, technology, funding
availability, time constraints, prior Base Realignment and Closure
decisions, etc.)?
48. Was the decision made to implement the recommended measure(s) or
not implement the measure(s) and accept the vulnerabilities or risks?
Yes, implement recommended measure(s):
No, decided not to implement the recommended measure(s) and accept the
vulnerabilities or risks:
49. Were measures selected for implementation?
Yes:
No: Skip To Question #54:
50. What were the estimated costs for implementing these measures?
51. Have these measures been implemented, scheduled for implementation,
or not scheduled for implementation at this time? (Mark x for all that
apply).
Been implemented: Please identify measure(s):
Been scheduled for implementation: Please identify measure(s):
Not scheduled for implementation at this time:
Please identify measure(s):
52. Which DOD major budget category was (or is being) used to implement
these measures? (Mark x for all that apply).
Operations and Maintenance:
Military Personnel:
Procurement:
Research and Development:
Other (Please specify):
Unknown:
53. What DoD organizational level implemented (or is implementing)
these measures? (Mark x for all that apply).
Host installation:
Higher headquarters:
Major command:
Combatant command:
Other (Please specify):
Unknown:
Section F. Coordination with Other Entities:
54. Is this asset located within the United States?
Yes:
No: Skip To Question #57:
55. To what extent, if at all, did you or the host installation of this
asset coordinate with U.S. electricity provider(s) to identify or
address potential vulnerabilities or risks identified in question 42
above? (Mark x only one response):
Not at all: Skip To Question #62:
Some extent:
Moderate extent:
Great extent:
56. What was the nature of the coordination with U.S. electricity
providers?
57. Is this asset located outside the United States?
Yes:
No: Skip To Question #62:
58. Have there been any efforts to coordinate with host-nation
governments and/or foreign- owned electricity providers to identify or
address potential vulnerabilities or risks identified in question #40
above?
Yes:
No: Skip To Question #62:
Unknown 4 Skip To Question #62:
59. What was the nature of the coordination with the host-nation
governments and/or foreign-owned electricity provider(s)?
60. Did you or the host installation of this asset coordinate with any
other organizations or entities (other than U.S. electricity providers
or host-nation governments and/or foreign-owned electricity
provider(s)) to identify or address potential vulnerabilities or risks?
(Mark x only one response):
Yes:
No: Skip To Question #62:
61. With whom did you or the host installation of this asset
coordinate?
Section G. Additional Information:
62. Please provide any additional information about efforts to
identify, assess, or address the vulnerabilities and risks associated
with electrical power disruptions to this asset that may not have been
addressed through the previous questions.
[End of section]
Appendix IV: Survey of DOD Critical Asset Missions:
United States Government Accountability:
Survey of DOD Critical Asset Missions:
Introduction:
The U.S. Government Accountability Office (GAO) is an independent, non-
partisan legislative branch agency that assists Congress in evaluating
how the federal government spends taxpayer dollars. GAO supports the
Congress in meeting its constitutional responsibilities and to help
improve the performance and ensure the accountability of the federal
government for the benefit of the American people. GAO provides
Congress with timely information that is objective, fact-based,
nonpartisan, nonideological, fair, and balanced.
In response to a congressional mandate in the House Report on the
National Defense Authorization Act for Fiscal Year 2009, Title XXVIII,
Defense Critical Infrastructure Program, Report 110-652 (May 16, 2008),
GAO is conducting a review of the Assurance of Electrical Power
Supplies to DOD Critical Assets (GAO code 351266). The following
critical asset was selected for this survey:
Please enter asset here:
Since the Joint Staff (J-34) has agreed to respond to the mission-
related questions for this asset, we ask that the Joint Staff (J-34)
coordinate the completion of this survey with other officials as
necessary and return one consolidated survey for this asset.
Follow-Up:
After we receive your reply, we may call you to schedule a follow-up
telephone interview if we need to clarify some answers in the survey.
Deadline:
To assist us, we ask that you complete and return this survey by June
26, 2009, to David Artadi via SIPRNet at ArtadiD@gao.sgov.gov or to
Mark Pross via JWICS at igproma@dodigic.gov, as appropriate. Please
return the completed survey by e-mail. Simply save this file to your
classified computer desktop, hard drive, or disk and attach it to your
e-mail.
Instructions for Completing This Survey:
You can answer most of the questions easily by checking boxes or
filling in blanks. A few questions request narrative answers. Please
note that the space provided will expand to accommodate your answer.
You may write additional comments at the end of the survey. We request
that you provide the most recent information from no earlier than
January 1, 2006.
* Please use your mouse to navigate throughout the survey by clicking
on the field or check box you wish to fill in. Do not use the "Tab" or
"Enter" keys as doing so may cause formatting problems.
* To select or deselect a check box, simply click or double click on
the box.
* Please indicate the security classification of your narrative
responses by writing (U) for "unclassified," (S) for "SECRET," or (TS)
for TOP SECRET at the beginning of each entry or paragraph, as
appropriate. However, please try to limit your responses to Task
Critical Asset information classified no higher than "SECRET" in
accordance with the Defense Critical Infrastructure Program (DCIP)
Security Classification Guide, May 2007.
Contact Information:
Thanks in advance for taking the time to complete this survey. If you
have any questions about the survey, please contact:
David Artadi, GAO Analyst-in-Charge:
Phone: (404) 679-1989:
SIPRNet: ArtadiD@gao.sgov.gov.
Thank you for your help.
Section A. Background:
Again, please enter the name of the asset for which this survey is
being completed.
1. Within which DCIP defense sector(s), as identified in DOD Directive
3020.40, Defense Critical Infrastructure Program (DCIP), is this asset?
(Mark x all that apply.)
Defense Industrial Base (DIB):
Financial Services:
Global Information Grid (GIG):
Health Affairs:
Intelligence, Surveillance, and Reconnaissance (ISR):
Logistics:
Personnel:
Public Works:
Space:
Transportation:
Unknown:
2. Where is this asset physically located? (Mark x only one response):
At a military installation: please specify name of installation:
At a commercial facility: please specify name of facility:
At an industrial site: please specify name of industrial site:
At a stand-alone facility: please specify name of facility:
3. What is the nearest city (and U.S. state or country) to this
installation, facility, or site?
a. City:
b. State (only if in the U.S.):
c. Country (only if outside the U.S.):
4. Who owns the asset? (Mark x only one response):
DOD military service: please specify:
DOD combatant command: please specify:
Other DOD organization: please specify:
Other (non-DOD) U.S. government organization (federal, state, or
local): please specify:
U.S. private organization: please specify:
Foreign military organization: please specify:
Foreign government (nonmilitary) please specify:
Foreign private company: please specify:
Other: please specify:
5. Who primarily operates the asset during normal operational status?
(Mark x all that apply.)
DOD military department: please specify:
DOD combatant command: please specify:
Other DOD organization: please specify:
Other (non-DOD) U.S. government organization (federal, state, or
local): please specify:
U.S. private organization: please specify:
Foreign military: please specify:
Foreign government (nonmilitary): please specify:
Foreign private company: please specify:
Other: please specify:
Section B. Mission(s), Combatant Command(s), and Military Service(s)
Supported by Asset:
6. Which military mission(s) does this asset support within DOD during
normal operational status other than those missions already described
in the document that the Joint Staff (J-34) provided to GAO about the
surveyed assets on November 19, 2008? (Please list and describe the
mission(s) based on the "mission impact statements"and "mission
essential tasks"”as defined in DOD Manual 3020.45, Vol. I, DOD Critical
Asset Identification Process (Oct. 24, 2008)”that were used to
designate this asset at its current DCIP critical asset
classification.):
7. For the military missions identified in question #6, which DOD
Unified Combatant Command(s) with regional responsibilities, if any,
does this asset support? (Mark x all that apply):
United States Africa Command (USAFRICOM):
United States Central Command (USCENTCOM):
United States European Command (USEUCOM):
United States Northern Command (USNORTHCOM):
United States Pacific Command (USPACOM):
United States Southern Command (USSOUTHCOM):
8. For the military missions identified in question #6, which DOD
Unified Combatant Command(s) with functional responsibilities, if any,
does this asset support? (Mark x all that apply):
United States Joint Forces Command (USJFCOM):
United States Special Operations Command (USSOCOM):
United States Strategic Command (USSTRATCOM):
United States Transportation Command (USTRANSCOM):
9. For the military missions identified in question #6, which DOD
military service(s), if any, does this asset support? (Mark m all that
apply):
United States Army:
United States Air Force:
United States Navy:
United States Marine Corps:
10. For the military missions identified in question #6, which other
DOD agencies or organizations, if any, does this asset support?
11. Which non-DOD mission(s), if any, does this asset support during
normal operational status? (Please include the names of the non-DOD
organizations whose missions are supported by the asset.)
12. Please provide any additional information regarding the missions,
combatant commands, and military services supported by the asset that
may not have been addressed through the previous questions.
[End of section]
Appendix V: Survey of Coordination Efforts for DOD Critical Assets:
United States Government Accountability Office:
Survey of Coordination Efforts for DOD Critical Assets:
Introduction:
The U.S. Government Accountability Office (GAO) is an independent, non-
partisan legislative branch agency that assists Congress in evaluating
how the federal government spends taxpayer dollars. GAO supports the
Congress in meeting its constitutional responsibilities and to help
improve the performance and ensure the accountability of the federal
government for the benefit of the American people. GAO provides
Congress with timely information that is objective, fact-based,
nonpartisan, nonideological, fair, and balanced.
In response to a congressional mandate in the House Report on the
National Defense Authorization Act for Fiscal Year 2009, Title XXVIII,
Defense Critical Infrastructure Program, Report 110-652 (May 16, 2008),
GAO is conducting a review of the Assurance of Electrical Power
Supplies to DOD Critical Assets (GAO code 351266). The following
critical asset was selected for this survey:
Please enter asset here:
Since ASD(HD&ASA)/DCIP Office has agreed to respond to the coordination-
related questions for this asset, we ask that ASD(HD&ASA)/DCIP Office
coordinate the completion of this survey with other officials as
necessary and return one consolidated survey for this asset.
Follow-Up:
After we receive your reply, we may call you to schedule a follow-up
telephone interview if we need to clarify some answers in the survey.
Deadline:
To assist us, we ask that you complete and return this survey by June
26, 2009, to David Artadi via SIPRNet at ArtadiD@gao.sgov.gov or to
Mark Pross via JWICS at igproma@dodig.ic.gov, as appropriate. Please
return the completed survey by e-mail. Simply save this file to your
classified computer desktop, hard drive, or disk and attach it to your
e-mail.
Instructions for Completing This Survey:
You can answer most of the questions easily by checking boxes or
filling in blanks. A few questions request narrative answers. Please
note that the space provided will expand to accommodate your answer.
You may write additional comments at the end of the survey. We request
that you provide the most recent information from no earlier than
January 1, 2006.
* Please use your mouse to navigate throughout the survey by clicking
on the field or check box you wish to fill in. Do not use the "Tab" or
"Enter" keys as doing so may cause formatting problems.
* To select or deselect a check box, simply click or double click on
the box.
* Please indicate the security classification of your narrative
responses by writing (U) for "unclassified," (S) for "SECRET," or (TS)
for TOP SECRET at the beginning of each entry or paragraph, as
appropriate. However, please try to limit your responses to Task
Critical Asset information classified no higher than "SECRET" in
accordance with the Defense Critical Infrastructure Program (DCIP)
Security Classification Guide, May 2007.
Contact Information:
Thanks in advance for taking the time to complete this survey. If you
have any questions about the survey, please contact:
David Artadi, GAO Analyst-in-Charge:
Phone: (404) 679-1989:
SIPRNet: ArtadiD@gao.sgov.gov.
Thank you for your help.
Section A. Coordination with DOD DCIP Stakeholders:
Again, please enter the name of the asset for which this survey is
being completed.
1. To what extent has coordination taken place between the
owner/custodian/operator of this asset with the following DOD DCIP
stakeholders to identify and/or address potential vulnerabilities or
risks involving electrical power disruptions? (Mark x one response for
each row)
DOD DCIP stakeholders: a. Military service(s):
(Specify service(s):
Not at all:
Some extent:
Moderate extent:
Great Extent:
DOD DCIP stakeholders: b. Combatant command(s):
(Specify command(s):
Not at all:
Some extent:
Moderate extent:
Great Extent:
DOD DCIP stakeholders: c. Defense Infrastructure Sector Lead Agent(s):
(Specify Agent(s):
Not at all:
Some extent:
Moderate extent:
Great Extent:
DOD DCIP stakeholders: d.ASD(HD&ASA)/DCIP Office:
Not at all:
Some extent:
Moderate extent:
Great Extent:
DOD DCIP stakeholders: e. Joint Staff (J-34):
Not at all:
Some extent:
Moderate extent:
Great Extent:
DOD DCIP stakeholders: f.Mission Assurance Division/Dahlgren, VA:
Not at all:
Some extent:
Moderate extent:
Great Extent:
DOD DCIP stakeholders: g. Defense Threat Reduction Agency (DTRA):
Not at all:
Some extent:
Moderate extent:
Great Extent:
DOD DCIP stakeholders: h. Other DOD DCIP stakeholder(s) (Specify other
stakeholder(s):
Not at all:
Some extent:
Moderate extent:
Great Extent:
Note: If you answered "Not At All" to Question #1, skip to Question #4.
Otherwise, continue to Question #2.
2. What was the nature of the coordination with these DOD DCIP
stakeholders?
3. What impact, if any, did this coordination with these DOD DCIP
stakeholders have on identifying and/or addressing potential
vulnerabilities or risks to the asset?
Section B. Coordination with Non-DOD Entities:
4. To what extent has coordination taken place between DOD stakeholders
and the U.S. Department of Homeland Security to identify and/or address
potential vulnerabilities or risks involving electrical power
disruptions to the asset?
Not at all: Skip To Question #8:
Some extent:
Moderate extent:
Great extent:
5. Which DOD stakeholder(s) were involved in these coordination efforts
with the U.S. Department of Homeland Security?
6. What was the nature of the coordination with the U.S. Department of
Homeland Security?
7. What impact, if any, did this coordination with the U.S. Department
of Homeland Security have on identifying and/or addressing potential
vulnerabilities or risks involving electrical power disruptions to the
asset?
8. To what extent has coordination taken place between DOD stakeholders
and the U.S. Department of Energy to identify and/or address potential
vulnerabilities or risks involving electrical power disruptions to the
asset?
Not at all (Skip to question #12.):
Some extent:
Moderate extent:
Great extent:
9. Which DOD stakeholder(s) were involved in these coordination efforts
with the U.S. Department of Energy?
10. What was the nature of the coordination with the U.S. Department
of Energy?
11. What impact, if any, did this coordination with the U.S.
Department of Energy have on identifying and/or addressing potential
vulnerabilities or risks to the asset?
12. To what extent has coordination taken place between DOD
stakeholders and the U.S. Federal Energy Regulatory Commission (FERC)
to identify and/or address potential vulnerabilities or risks involving
electrical power disruptions to the asset?
Not at all: Skip To Question #16:
Some extent:
Moderate extent:
Great extent:
13. Which DOD stakeholder(s) were involved in these coordination
efforts with the FERC?
14. What was the nature of the coordination with the FERC?
15. What impact, if any, did this coordination with the FERC have on
identifying and/or addressing potential vulnerabilities or risks to the
asset?
16. To what extent has coordination taken place between DOD
stakeholders and the North American Electric Reliability Corporation
(NERC) to identify and/or address potential vulnerabilities or risks
involving electrical power disruptions to the asset?
Not at all: Skip To Question #20:
Some extent:
Moderate extent:
Great extent:
17. Which DOD stakeholder(s) were involved in these coordination
efforts with the NERC?
18. What was the nature of the coordination with the NERC?
19. What impact, if any, did this coordination with the NERC have on
identifying and/or addressing potential vulnerabilities or risks to the
asset?
20. To what extent has coordination taken place between DOD
stakeholders and DOE national laboratories to identify and/or address
potential vulnerabilities or risks involving electrical power
disruptions to the asset?
Not at all: Skip To Question #24:
Some extent (Specify laboratory(ies):
Moderate extent (Specify laboratory(ies):
Great extent (Specify laboratory(ies):
21. Which DOD stakeholder(s) were involved in these coordination
efforts with DOE national laboratories?
22. What was the nature of the coordination with DOE national
laboratories?
23. What impact, if any, did this coordination with DOE national
laboratories have on identifying and/or addressing potential
vulnerabilities or risks to the asset?
24. To what extent has coordination taken place between DOD
stakeholders and the U.S. Department of State to identify and/or
address potential vulnerabilities or risks involving electrical power
disruptions to the asset?
Not at all: Skip To Question #28:
Some extent:
Moderate extent:
Great extent:
25. Which DOD stakeholder(s) were involved in these coordination
efforts with the U.S. Department of State?
26. What was the nature of the coordination with the U.S. Department of
State?
27. What impact, if any, did this coordination with the U.S. Department
of State have on identifying and/or addressing potential
vulnerabilities or risks to the asset?
28. To what extent has coordination taken place between DOD
stakeholders and electrical power industry associations to identify
and/or address potential vulnerabilities or risks involving electrical
power disruptions to the asset?
Not at all: Skip To Question #32:
Some extent (Specify association(s):
Moderate extent (Specify association(s):
Great extent (Specify association(s):
29. Which DOD stakeholder(s) were involved in these coordination
efforts with electrical power industry associations?
30. What was the nature of the coordination with electrical power
industry associations?
31. What impact, if any, did this coordination have on identifying
and/or addressing potential vulnerabilities or risks to the asset?
32. To what extent has coordination taken place between DOD
stakeholders and any other organizations not mentioned above to
identify and/or address potential vulnerabilities or risks involving
electrical power disruptions to the asset?
Not at all: Skip To Question #26:
Some extent (Specify other organization(s):
Moderate extent (Specify other organization(s):
Great extent (Specify other organization(s):
33. Which DOD stakeholder(s) were involved in these coordination
efforts with these other organizations?
34. What was the nature of the coordination with these other
organizations?
35. What impact, if any, did this coordination with these other
organizations have on identifying and/or addressing potential
vulnerabilities or risks to the asset?
36. Please provide any additional information regarding coordination
with DOD or non- DOD organizations to identify and/or address potential
vulnerabilities or risks involving electrical power disruptions to the
asset that may not have been addressed through the previous questions.
[End of section]
Appendix VI Comments from the Department of Defense:
Note: The cover letter for DOD's written comments indicates that the
DOD Office of Security Review reviewed the draft report and recommended
that the draft report be protected at the SECRET level. However, by
deleting certain sections from the draft report, we were able to issue
this unclassified report with the approval of the DOD Office of
Security Review with a different report number.
Assistant Secretary Of Defense:
2600 Defense Pentagon:
Washington, D.C. 20301-2600:
Homeland Defense & Americas' Security Affairs:
October 6, 2009:
Ms. Davi M. D'Agostino:
Director, Defense Capabilities and Management U.S. Government
Accountability Office:
441 G Street, N.W.:
Washington, DC 20548:
Dear Ms. D'Agostino:
This is the Department of Defense (DoD) response to the GAO draft
report, GAO-09-954C, "Defense Critical Infrastructure: Actions Needed
to Improve the Identification and Management of Electrical Power Risks
and Vulnerabilities to DoD Critical Assets," dated August 21, 2009 (GAO
Code 351266). DoD concurs with the seven recommendations in the report.
Our response to your recommendations is attached. The DoD Office of
Security Review has reviewed the report and recommends that the report
be protected at the SECRET level. Our point of contact for this action
is Mr. Jamie Clark, Office of the Assistant Secretary of Defense for
Homeland Defense and Americas' Security Affairs (OASD (HD&ASA)), (703)
602-5730, Extension 142 or Jamie.Clark@osd.mil.
Sincerely,
Signed by:
Paul N. Stockton:
Attachment:
As stated:
GAO Draft Report ” Dated August 24, 2009:
GAO CODE 351266/GA0-09-954C:
"Defense Critical Infrastructure: Actions Needed to Improve the
Identification and Management of Electrical Power Risks and
Vulnerabilities to DoD Critical Assets"
Department Of Defense Comments To The Recommendations:
Recommendation 1: The GAO recommends that the Secretary of Defense
direct the Assistant Secretary of Defense for Homeland Defense and
Americas' Security Affairs, in collaboration with the Joint Staffs
Directorate for Antiterrorism and Homeland Defense, combatant commands,
military services, and other Defense Critical Infrastructure
stakeholders, as appropriate, to complete Defense Critical
Infrastructure Program vulnerability assessments, as required by DoD
Instruction 3020.45, on all of DoD's most critical assets by October
2011.
DOD Response: Concur. The Assistant Secretary of Defense for Homeland
Defense and Americas' Security Affairs (ASD (HD&ASA)) Defense Critical
Infrastructure Program (DCIP) Office has been working closely with the
Joint Staff, which is assigned responsibility for the implementation of
vulnerability assessments in DoD Instruction 3020.45, to ensure that
DCIP vulnerability assessments focus on DoD's most critical assets. The
Joint Staff, in coordination with OASD (HD&ASA) has begun ensuring that
these most critical assets are assessed utilizing an all-hazards and
mission-assurance approach.
Recommendation 2: The GAO recommends that the Secretary of Defense
direct the Assistant Secretary of Defense for Homeland Defense and
Americas' Security Affairs, in collaboration with the Joint Staffs
Directorate for Antiterrorism and Homeland Defense, combatant commands,
military services, and other Defense Critical Infrastructure
stakeholders, as appropriate, to develop additional guidelines, an
implementation plan, and a schedule for conducting vulnerability
assessments on all non-DoD-owned most critical assets located in the
United States and abroad in conjunction with other federal agencies, as
appropriate, that have a capability to implement the plan.
DOD Response: Concur. The ASD (HD&ASA) DCIP Office has been working
closely with the Joint Staff, which is assigned responsibility for the
implementation of vulnerability assessments in DoD Instruction 3020.45,
to ensure that DCIP vulnerability assessments focus on DoD's most
critical assets. The Joint Staff, in coordination with OASD (HD&ASA)
has begun ensuring that these most critical assets are assessed
utilizing an all-hazards and mission- assurance approach, including the
development of a self assessment capability. Non-DoD- owned assets,
especially those located abroad, require agreement of owners and
present significant challenges. The ASD(HD&ASA) DCIP Office is
coordinating with the appropriate offices to determine if remote
assessments of these assets are possible.
Recommendation 3: The GAO recommends that the Secretary of Defense
direct the Assistant Secretary of Defense for Homeland Defense and
Americas' Security Affairs, in collaboration with the Joint Staffs
Directorate for Antiterrorism and Homeland Defense, combatant commands,
military services, and other Defense Critical Infrastructure
stakeholders, as appropriate, to establish a time frame for the
military services to provide the infrastructure data required for the
Public Works Infrastructure Sector Lead Agent-the U.S. Army Corps of
Engineers-to conduct its preliminary technical analysis of public works
(including electrical system) infrastructure at DoD installations that
support DoD's most critical assets.
DOD Response: Concur. The ASD(HD&ASA) DCIP Office has been working
closely with the U.S. Army Corps of Engineers (USACE), which is the
lead agent for the Public Works Defense Sector, to ensure that proper
characterization of critical assets is taking place from a public works
perspective. The effort, while time intensive, has so far been
successful and is on- going. The USACE has completed its
characterization of public works infrastructure "outside the fence" for
all of DoD's most critical assets, and is working with the Military
Services to obtain information on the public works infrastructure
"inside the fence."
Recommendation 4: The GAO recommends that the Secretary of Defense
direct the Assistant Secretary of Defense for Homeland Defense and
Americas' Security Affairs, in collaboration with the Joint Staff's
Directorate for Antiterrorism and Homeland Defense, combatant commands,
military services, and other Defense Critical Infrastructure
stakeholders, as appropriate, to finalize guidelines currently being
developed to coordinate Defense Critical Infrastructure Program
assessment criteria and processes more systematically with those of
other DOD mission assurance programs.
DOD Response: Concur. DoD Directive 3020.40 acknowledges the existence
of, and the synergistic effect of various complimentary risk management
program activities and security related functions in its definition of
Mission Assurance. The other activities respond to their own directives
and appropriations, and several have their own assessment programs, but
they have not yet been brought under a common mission assurance
umbrella. Critical Infrastructure Protection (CIP) at the installation
level is in its early stages and is not yet mature. For example, many
of the positions dealing with CIP at the installation level are
additional duties. The Joint Staff is overseeing a vulnerability
assessment way ahead to better synchronize these efforts.
Recommendation 5: The GAO recommends that the Secretary of Defense
direct the Assistant Secretary of Defense for Homeland Defense and
Americas' Security Affairs, in collaboration with the Joint Staff's
Directorate for Antiterrorism and Homeland Defense, combatant commands,
military services, and other Defense Critical Infrastructure
stakeholders, as appropriate, to develop explicit Defense Critical
Infrastructure Program guidelines for assessing the critical assets'
vulnerabilities to long-term electrical power disruptions.
DOD Response: Concur. The ASD (HD&ASA) DCIP Office will review current
vulnerability assessment criteria and standards and work with the Joint
Staff to include considerations of long-term electrical power
disruptions. Vulnerabilities are directly related to mission and its
duration and the duration of the outage. A significant number of
critical assets have back up power sources available in the event that
commercial power is disrupted. As GAO noted in its report, 25 of the 34
assets surveyed reported that electrical power disruptions resulted in
no or minimal impact to their missions. The Department is working on
providing the same protection from commercial power disruption to the
remaining assets.
Recommendation 6: The GAO recommends that the Secretary of Defense
direct the Assistant Secretary of Defense for Homeland Defense and
Americas' Security Affairs, in collaboration with the Joint Staff's
Directorate for Antiterrorism and Homeland Defense, combatant commands,
military services, and other Defense Critical Infrastructure
stakeholders, as appropriate, to develop a mechanism to systematically
track the implementation of future Defense Critical Infrastructure
Program risk management decisions and responses intended to address
electrical power-related risks and vulnerabilities to DoD's most
critical assets.
DOD Response: Concur. The ASD(HD&ASA) DCIP Office has developed a draft
DoD Manual 3020.45 Volume 5, Defense Critical Infrastructure Program
(DCIP) Coordination Timeline, currently in coordination within the
Department. The purpose of the manual is to provide uniform procedures
for the execution of DCIP activities and timelines that OASD (HD&ASA),
the Joint Staff, Military Departments, Combatant Commands, Defense
Agencies, and the Defense Infrastructure Sector Lead Agencies will use
to coordinate the execution of activities and responsibilities assigned
in DoD Directive 3020.40, DoD Instruction 3020.45, DoD Manual 3020.45
Volumes 1 and 2, and the resultant risk decision packages. The DCIP
Office is also developing an automated CAIP Collaboration Tool that
will document and track the status of each organization's progress as
they work through the risk management process. The Collaboration Tool
in conjunction with the Coordination Timeline will serve as a forcing
function to ensure the accomplishment of tasks and to provide feedback
to the components on status of actions, including electrical power-
related risks and vulnerabilities.
Recommendation 7: The GAO recommends that the Secretary of Defense
direct the Assistant Secretary of Defense for Homeland Defense and
Americas' Security Affairs, in collaboration with the Joint Staffs
Directorate for Antiterrorism and Homeland Defense, combatant commands,
military services, and other Defense Critical Infrastructure
stakeholders, as appropriate, to ensure for DoD-owned most critical
assets, and facilitate for non-DoD-owned most critical assets, that
asset owners or host installations of the most critical assets, where
appropriate, reach out to local electricity providers in an effort to
coordinate and help remediate or mitigate risks and vulnerabilities to
electrical power disruptions
DOD Response: Concur. In May 2007, the ASD(HD&ASA) DCIP Office
promulgated the DCIP Infrastructure Resiliency Guide that provides
information for improving the resiliency of infrastructure systems,
networks, and solutions for reducing risks to infrastructure networks.
The Department has identified the common vulnerabilities to
infrastructure as a result of numerous infrastructure vulnerability
assessments conducted by multiple agencies and organizations within the
Department of Defense. The guide is a compilation of these findings and
the resultant corrective actions. The guide contains a section devoted
to electric power and provides guidelines to government and private-
sector decision makers and those responsible for electric power supply,
to ensure electric power disruptions do not adversely or unexpectedly
affect mission accomplishment. The guide includes such actions as:
* Understand the requirements for electric power, how it is delivered,
and the relative priority for restoring power;
* Ensure and maintain provider awareness of critical times when power
is essential to mission execution;
* Work with the electric power providers to identify remedies to
potential single points of failure.
On October 28, 2008, the ASD(HD&ASA) DCIP Office also promulgated DoD
Manual 3020.45 Volume 2, DCIP Remediation Planning which describes a
process for DoD leaders, once risk has been assessed, to determine,
plan, justify, and implement remediation actions to reduce risk to
defense critical infrastructure. The manual acknowledges that the DoD
mission depends upon public infrastructure networks and services such
as transportation, electric power, and communication networks. The
manual advises the DoD facility managers to establish good
communications with public service providers about service requirement,
and to review service level agreements, acquisition programs,
contracts, and operational processes for opportunities to address and
include stronger resiliency language and requirements for future
remediation efforts. This guidance will be reinforced at DCIP
collaboration forums such as Defense Critical Infrastructure
Integration Staff, Operational Advisory Board, and Defense
Infrastructure Sector Council.
[End of section]
Appendix VII: GAO Contact and Staff Acknowledgments:
GAO Contact:
Davi M. D'Agostino, (202) 512-5431 or dagostinod@gao.gov:
Acknowledgments:
In addition to the contact named above, Mark A. Pross, Assistant
Director; David G. Artadi; James D. Ashley; Yecenia C. Camarillo; Gina
M. Flacco; Brian K. Howell; Katherine S. Lenane; Greg A. Marchand;
Michael S. Pose; Terry L. Richardson; John W. Van Schaik; Marc J.
Schwartz; and Cheryl A. Weissman made key contributions to this report.
[End of section]
Related GAO Products:
Defense Critical Infrastructure Protection:
Defense Critical Infrastructure: Actions Needed to Improve the
Consistency, Reliability, and Usefulness of DOD's Tier 1 Task Critical
Asset List. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-09-740R].
Washington, D.C.: July 17, 2009.
Defense Critical Infrastructure: Developing Training Standards and an
Awareness of Existing Expertise Would Help DOD Assure the Availability
of Critical Infrastructure. [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-09-42]. Washington, D.C.: October 30, 2008.
Defense Critical Infrastructure: Adherence to Guidance Would Improve
DOD's Approach to Identifying and Assuring the Availability of Critical
Transportation Assets. [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-08-851]. Washington, D.C.: August 15, 2008.
Defense Critical Infrastructure: DOD's Risk Analysis of Its Critical
Infrastructure Omits Highly Sensitive Assets. [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-08-373R]. Washington, D.C.: April
2, 2008.
Defense Infrastructure: Management Actions Needed to Ensure
Effectiveness of DOD's Risk Management Approach for the Defense
Industrial Base. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-
1077]. Washington, D.C.: August 31, 2007.
Defense Infrastructure: Actions Needed to Guide DOD's Efforts to
Identify, Prioritize, and Assess Its Critical Infrastructure.
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-461]. Washington,
D.C.: May 24, 2007.
Critical Infrastructure Protection:
The Department of Homeland Security's (DHS) Critical Infrastructure
Protection Cost-Benefit Report. [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-09-654R]. Washington, D.C.: June 26, 2009.
Influenza Pandemic: Opportunities Exist to Address Critical
Infrastructure Protection Challenges That Require Federal and Private
Sector Coordination. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-
08-36]. Washington, D.C.: October 31, 2007.
Critical Infrastructure: Sector Plans Complete and Sector Councils
Evolving. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-1075T].
Washington, D.C.: July 12, 2007.
Critical Infrastructure Protection: Sector Plans and Sector Councils
Continue to Evolve. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-
07-706R]. Washington, D.C.: July 10, 2007.
Critical Infrastructure: Challenges Remain in Protecting Key Sectors.
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-626T]. Washington,
D.C.: March 20, 2007.
Critical Infrastructure Protection: Progress Coordinating Government
and Private Sector Efforts Varies by Sectors' Characteristics.
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-39]. Washington,
D.C.: October 16, 2006.
Critical Infrastructure Protection: Challenges for Selected Agencies
and Industry Sectors. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-
03-233]. Washington, D.C.: February 28, 2003.
Critical Infrastructure Protection: Commercial Satellite Security
Should Be More Fully Addressed. [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-02-781]. Washington, D.C.: August 30, 2002.
Electrical Power:
Electricity Restructuring: FERC Could Take Additional Steps to Analyze
Regional Transmission Organizations' Benefits and Performance.
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-987]. Washington,
D.C.: September 22, 2008.
Department of Energy, Federal Energy Regulatory Commission: Mandatory
Reliability Standards for Critical Infrastructure Protection.
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-493R]. Washington,
D.C.: February 21, 2008.
Electricity Restructuring: Key Challenges Remain. [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-06-237]. Washington, D.C.:
November 15, 2005.
Meeting Energy Demand in the 21st Century: Many Challenges and Key
Questions. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-414T].
Washington, D.C.: March 16, 2005.
Electricity Restructuring: Action Needed to Address Emerging Gaps in
Federal Information Collection. [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-03-586]. Washington, D.C.: June 30, 2003.
Restructured Electricity Markets: Three States' Experiences in Adding
Generating Capacity. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-
02-427]. Washington, D.C.: May 24, 2002.
Energy Markets: Results of FERC Outage Study and Other Market Power
Studies. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-1019T].
Washington, D.C.: August 2, 2001.
Cybersecurity:
Cybersecurity: Continued Federal Efforts Are Needed to Protect Critical
Systems and Information. [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-09-835T]. Washington, D.C.: June 25, 2009.
Information Security: Cyber Threats and Vulnerabilities Place Federal
Systems at Risk. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-09-
661T]. Washington, D.C.: May 5, 2009.
National Cybersecurity Strategy: Key Improvements Are Needed to
Strengthen the Nation's Posture. [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-09-432T]. Washington, D.C.: March 10, 2009.
Critical Infrastructure Protection: DHS Needs to Better Address Its
Cybersecurity Responsibilities. [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-08-1157T]. Washington, D.C.: September 16, 2008.
Critical Infrastructure Protection: DHS Needs to Fully Address Lessons
Learned from Its First Cyber Storm Exercise. [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-08-825]. Washington, D.C.:
September 9, 2008.
Cyber Analysis and Warning: DHS Faces Challenges in Establishing a
Comprehensive National Capability. [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-08-588]. Washington, D.C.: July 31, 2008.
Critical Infrastructure Protection: Further Efforts Needed to Integrate
Planning for and Response to Disruptions on Converged Voice and Data
Networks. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-607].
Washington, D.C.: June 26, 2008.
Information Security: TVA Needs to Address Weaknesses in Control
Systems and Networks. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-
08-526]. Washington, D.C.: May 21, 2008.
Critical Infrastructure Protection: Sector-Specific Plans' Coverage of
Key Cyber Security Elements Varies. [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-08-64T]. Washington, D.C.: October 31, 2007.
Critical Infrastructure Protection: Sector-Specific Plans' Coverage of
Key Cyber Security Elements Varies. [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-08-113]. Washington, D.C.: October 31, 2007.
Critical Infrastructure Protection: Multiple Efforts to Secure Control
Systems Are Under Way, but Challenges Remain. [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-07-1036]. Washington, D.C.:
September 10, 2007.
Critical Infrastructure Protection: DHS Leadership Needed to Enhance
Cybersecurity. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-06-
1087T]. Washington, D.C.: September 13, 2006.
Critical Infrastructure Protection: Challenges in Addressing
Cybersecurity. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-
827T]. Washington, D.C.: July 19, 2005.
Critical Infrastructure Protection: Department of Homeland Security
Faces Challenges in Fulfilling Cybersecurity Responsibilities.
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-434]. Washington,
D.C.: May 26, 2005.
Critical Infrastructure Protection: Improving Information Sharing with
Infrastructure Sectors. [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-04-780]. Washington, D.C.: July 9, 2004.
Technology Assessment: Cybersecurity for Critical Infrastructure
Protection. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-321].
Washington, D.C.: May 28, 2004.
Critical Infrastructure Protection: Establishing Effective Information
Sharing with Infrastructure Sectors. [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-04-699T]. Washington, D.C.: April 21, 2004.
Critical Infrastructure Protection: Challenges and Efforts to Secure
Control Systems. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-
628T]. Washington, D.C.: March 30, 2004.
Critical Infrastructure Protection: Challenges and Efforts to Secure
Control Systems. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-
354]. Washington, D.C.: March 15, 2004.
Posthearing Questions from the September 17, 2003, Hearing on
"Implications of Power Blackouts for the Nation's Cybersecurity and
Critical Infrastructure Protection: The Electric Grid, Critical
Interdependencies, Vulnerabilities, and Readiness." [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-04-300R]. Washington, D.C.:
December 8, 2003.
Critical Infrastructure Protection: Challenges in Securing Control
Systems. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-140T].
Washington, D.C.: October 1, 2003.
Combating Terrorism: Observations on National Strategies Related to
Terrorism. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-519T].
Washington, D.C.: March 3, 2003.
Critical Infrastructure Protection: Efforts of the Financial Services
Sector to Address Cyber Threats. [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-03-173]. Washington, D.C.: January 30, 2003.
High-Risk Series: Protecting Information Systems Supporting the Federal
Government and the Nation's Critical Infrastructures. [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-03-121]. Washington, D.C.:
January 2003.
Critical Infrastructure Protection: Significant Challenges Need to Be
Addressed. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-961T].
Washington, D.C.: July 24, 2002.
Critical Infrastructure Protection: Federal Efforts Require a More
Coordinated and Comprehensive Approach for Protecting Information
Systems. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-474].
Washington, D.C.: July 15, 2002.
Critical Infrastructure Protection: Significant Homeland Security
Challenges Need to Be Addressed. [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-02-918T]. Washington, D.C.: July 9, 2002.
Critical Infrastructure Protection: Significant Challenges in
Safeguarding Government and Privately Controlled Systems from Computer-
Based Attacks. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-
1168T]. Washington, D.C.: September 26, 2001.
Critical Infrastructure Protection: Significant Challenges in
Protecting Federal Systems and Developing Analysis and Warning
Capabilities. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-
1132T]. Washington, D.C.: September 12, 2001.
Critical Infrastructure Protection: Significant Challenges in
Developing Analysis, Warning, and Response Capabilities. [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-01-1005T]. Washington, D.C.: July
25, 2001.
Critical Infrastructure Protection: Significant Challenges in
Developing Analysis, Warning, and Response Capabilities. [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-01-769T]. Washington, D.C.: May
22, 2001.
Critical Infrastructure Protection: Significant Challenges in
Developing National Capabilities. [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-01-323]. Washington, D.C.: April 25, 2001.
Critical Infrastructure Protection: Challenges to Building a
Comprehensive Strategy for Information Sharing and Coordination.
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-AIMD-00-268].
Washington, D.C.: July 26, 2000.
Critical Infrastructure Protection: Comments on the Proposed Cyber
Security Information Act of 2000. [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO/T-AIMD-00-229]. Washington, D.C.: June 22, 2000.
Critical Infrastructure Protection: "ILOVEYOU" Computer Virus
Highlights Need for Improved Alert and Coordination Capabilities.
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-AIMD-00-181].
Washington, D.C.: May 18, 2000.
Critical Infrastructure Protection: National Plan for Information
Systems Protection. [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO/AIMD-00-90R]. Washington, D.C.: February 11, 2000.
Critical Infrastructure Protection: Comments on the National Plan for
Information Systems Protection. [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO/T-AIMD-00-72]. Washington, D.C.: February 1, 2000.
Critical Infrastructure Protection: Fundamental Improvements Needed to
Assure Security of Federal Operations. [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO/T-AIMD-00-7]. Washington, D.C.:
October 6, 1999.
Critical Infrastructure Protection: Comprehensive Strategy Can Draw on
Year 2000 Experiences. [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO/AIMD-00-1]. Washington, D.C.: October 1, 1999.
[End of section]
Footnotes:
[1] Although DOD's validated list of its most critical assets totals 29
assets, for purposes of this report, we refer to 34 most critical
assets, since 4 of them have several components. Together, these
components represent a larger capability, which constitutes the most
critical asset.
[2] The U.S. commercial electrical power grid is a system of
synchronized power providers and consumers connected by transmission
and distribution lines and operated by one or more control centers. The
U.S. power grid serving the contiguous 48 states is composed of three
distinct power grids, or "interconnections"--the Eastern
Interconnection, the Western Interconnection, and the Electric
Reliability Council of Texas Interconnection. These interconnections
provide power to the continental United States, Canada, and a small
portion of northern Mexico.
[3] GAO, Defense Management: Overarching Organizational Framework
Needed to Guide and Oversee Energy Reduction Efforts for Military
Operations, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-426]
(Washington, D.C.: Mar. 13, 2008).
[4] Defense Science Board, Report of the Defense Science Board Task
Force on DOD Energy Strategy, "More Fight--Less Fuel" (Washington,
D.C., February 2008).
[5] For purposes of this report, we are using "risk" and
"vulnerability" as defined in DOD Directive 3020.40, Defense Critical
Infrastructure Program (DCIP) (Aug. 19, 2005). The directive defines
"risk" as the probability and severity of loss linked to threats and
hazards and defines "vulnerability" as the characteristics of an
installation, system, asset, application, or its dependencies that
could cause it to suffer a degradation or loss (incapacity to perform
its designated function) as a result of having been subjected to a
certain level of threat or hazard.
[6] While DOD acknowledges that the execution of its missions depends
heavily on ensuring the availability of electrical power to
installations with critical assets, DOD is not responsible for
improving the reliability of the commercial electrical power grid.
[7] GAO, Defense Infrastructure: Actions Needed to Guide DOD's Efforts
to Identify, Prioritize, and Assess Its Critical Infrastructure,
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-461] (Washington,
D.C.: May 24, 2007). Also, see Related GAO Products at the end of this
report.
[8] Earlier programs analogous to DCIP can be traced back to 1998.
[9] DOD Directive 3020.40, Defense Critical Infrastructure Program
(DCIP) (Aug. 19, 2005).
[10] DOD Instruction 3020.45, Defense Critical Infrastructure Program
(DCIP) Management (Apr. 21, 2008).
[11] DOD Manual 3020.45, Volume 1, Defense Critical Infrastructure
Program (DCIP) DOD Mission-Based Critical Asset Identification Process
(CAIP) (Oct. 24, 2008), and DOD Manual 3020.45, Volume 2, Defense
Critical Infrastructure Program (DCIP) DCIP Remediation Planning (Oct.
28, 2008).
[12] The 10 defense sectors are the Defense Industrial Base; Financial
Services; Global Information Grid; Health Affairs; Intelligence,
Surveillance, and Reconnaissance; Logistics; Personnel; Public Works;
Space; and Transportation.
[13] The National Infrastructure Protection Plan is a risk management
framework intended to protect the nation's critical infrastructures and
key resources. This framework is composed of 18 critical infrastructure
and key resource sectors, including an Energy Sector. According to the
Energy Sector Specific Plan, the Energy Sector is composed of three
subsectors (petroleum, natural gas, and electricity). The Department of
Energy is the Sector-specific Agency tasked with implementing the
framework and developing guidance tailored to the specific
characteristics and risks associated with the Energy Sector.
[14] H.R. Rep. No. 110-652, pp. 523-524 (May 16, 2008).
[15] In this same report, the House Committee on Armed Services also
directed the Secretary of Defense to complete an assessment of
corrective actions required to provide assured power and secure and
maintain redundancy of DOD's Tier 1 critical assets. DOD was directed
to submit the report to the congressional defense committees by March
1, 2009; however, DOD notified the House Committee on Armed Services in
April 2009 that because of the number of Tier 1 assets and the pace of
the vulnerability assessments, the report would not be completed and
delivered until September 2010.
[16] For non-DOD-owned most critical assets, DOD organizations may be
called asset owners because of their DCIP risk management
responsibilities for those assets.
[17] We planned to select a random sample of DOD Tier 1 Task Critical
Assets--which support critical DOD missions at the departmental,
combatant command, and military service levels--to survey for this
review. These assets represent DOD's second most important group of
critical assets. However, our discussions with DOD officials and our
own analysis led us to determine that the DOD-identified universe of
critical assets did not represent an accurate, comprehensive list of
DOD Tier 1 Task Critical Assets, and that this issue in and of itself
warranted further analysis. Therefore, we issued a separate report,
with recommendations, on issues relating specifically to the Tier 1
Task Critical Asset list to enable DOD to take timely actions to update
and improve its list of Defense Critical Assets in the fall of 2009 and
prioritize funding. See GAO, Defense Critical Infrastructure: Actions
Needed to Improve the Consistency, Reliability, and Usefulness of DOD's
Tier 1 Task Critical Asset List, [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-09-740R] (Washington, D.C.: July 17, 2009).
[18] DOD began conducting DCIP assessments in 2007 on selected DOD Task
Critical Assets, some of which were subsequently designated as DOD's
most critical assets in October 2008.
[19] Definitions of "longer-term" or "extended" electrical power
disruptions vary. For example, in the January 2008 report, The MITRE
Corporation, Power Grid Security, JSR-07-125 (McLean, Va., January
2008), which was requested by DHS, the JASON Program Office of The
MITRE Corporation defined a catastrophic, long-term failure of the
electrical power grid as one lasting 5 days or longer. In contrast, in
the Report of the Defense Science Board Task Force on DOD Energy
Strategy, the Defense Science Board refers to a "long term outage" as
lasting "several months." DOD officials also noted that the duration of
a longer-term or extended electrical power disruption for a specific
asset varies depending on the nature of the particular mission(s)
supported by that asset.
[20] For more information about the U.S. commercial electrical power
grid, see GAO, Electricity Restructuring: 2003 Blackout Identifies
Crisis and Opportunity for the Electricity Sector, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-04-204] (Washington, D.C.: Nov.
18, 2003).
[21] Defense Science Board, Report of the Defense Science Board Task
Force on DOD Energy Strategy, "More Fight--Less Fuel."
[22] The concept of islanding entails the isolation of critical loads
or entire installations from the grid to make them self-sufficient.
[23] For example, the stresses of increased demand for electrical power
contributed to the 2003 Northeast Blackout, which was an extended
cascading power outage that affected about 50 million people living in
a 9,300 square mile area in the United States and Canada. More than 500
generating units at 265 power plants shut down during the outage, 22 of
which were nuclear. It took over 2 weeks for power plants to regain
full capacity. For additional information, see [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-04-204].
[24] Members of the Task Force on Electric Grid Vulnerability represent
DOD (co-chair), DOE (co-chair), DHS, the Director of National
Intelligence, the Environmental Protection Agency, the Federal Energy
Regulatory Commission, the National Aeronautics and Space
Administration, the Nuclear Regulatory Commission, the Office of
Science and Technology Policy, and the Office of Management and Budget.
[25] Government and industry efforts to develop a "Smart Grid" are
intended to modernize the aging U.S. electrical power transmission and
distribution system, which uses technologies and strategies that are
several decades old and include limited use of digital communication
and control technologies. The Smart Grid would use advanced sensing,
communication, and control technologies to generate and distribute
electricity more effectively, economically, and securely. DOE's Office
of Electricity Delivery and Energy Reliability calls for the Smart Grid
to be more reliable, secure, economical, efficient, environmentally
friendly, and safe, and expects it to enable active participation by
consumers; accommodate a range of generation and storage options;
enable new products, services, and markets; provide power quality for
the digital economy; optimize asset utilization and operate
efficiently; anticipate and respond to system disturbances; and operate
resiliently against attacks and natural disasters. However, Smart Grid-
related technologies may also introduce additional vulnerabilities to
the U.S. electrical power grid, such as increased susceptibility to
cyberattacks.
[26] For example, on July 21, 2009, the Subcommittee on Emerging
Threats, Cybersecurity, and Science and Technology of the House
Committee on Homeland Security held a hearing, "Securing the Modern
Electric Grid from Physical and Cyber Attacks." Similarly, on July 23,
2009, the Subcommittee on Energy and Environment of the House Committee
on Science and Technology held a hearing, "Effectively Transforming Our
Electric Delivery System to a Smart Grid." In addition, as discussed
later in this background section, the Federal Energy Regulatory
Commission has approved reliability standards for the electrical power
industry, which may be enforced by either the Federal Energy Regulatory
Commission or the North American Electric Reliability Corporation.
[27] Office of the Assistant Secretary of Defense for Homeland Defense
and Americas' Security Affairs, Defense Critical Infrastructure Program
Infrastructure Resiliency Guide: Reduce Your Vulnerabilities and Make
Your Infrastructure Stronger, Version 1.0 (Washington, D.C., May 2007).
[28] See footnote 1 regarding the number of most critical assets.
[29] DCIP guidance defines a "threat" as an adversary having the
intent, capability, and opportunity to cause loss or damage, and a
"hazard" as a nonhostile incident, such as an accident, natural force,
or technological failure, that causes loss or damage to an asset. DCIP
defines a "vulnerability" as a characteristic of an installation,
system, asset, application, or its dependencies that could cause it to
suffer a degradation or loss (incapacity to perform its designated
function) as a result of having been subjected to a certain level of
threat or hazard. A "risk response" may involve DCIP stakeholders
accepting an identified risk or applying funding and resources to
reduce the risk (i.e., remediation); to minimize the effects of
potential threats or hazards (i.e., mitigation); or to restore lost
capacity in the aftermath of an event (i.e., reconstitution). A risk
response is intended to ensure that limited resources are optimally
allocated toward those assets that are most important to DOD's overall
mission success and for which an identified level of risk is deemed
unacceptable.
[30] ASD(HD&ASA), within the Office of the Under Secretary of Defense
for Policy, serves as the principal civilian advisor, and the Chairman
of the Joint Chiefs of Staff serves as the principal military advisor
to the Secretary of Defense on critical infrastructure protection.
ASD(HD&ASA) has lead responsibility for developing and ensuring the
implementation of DCIP policy and program guidance for the
identification, prioritization, and protection of defense critical
infrastructure.
[31] Mission assurance links numerous risk management program
activities and security-related functions to create the synergistic
effect required for DOD to mobilize, deploy, support, and sustain
military operations throughout the continuum of operations.
[32] For example, the military departments have also conducted service-
level Critical Asset Risk Assessments on some of the most critical
assets.
[33] Homeland Security Presidential Directive 7, Critical
Infrastructure Identification, Prioritization, and Protection
(Washington, D.C., Dec. 17, 2003).
[34] Department of Homeland Security, National Infrastructure
Protection Plan: Partnering to Enhance Protection and Resiliency, 2009
(Washington, D.C., 2009).
[35] The National Infrastructure Protection Plan designates 18 sectors
to focus on specific categories of critical infrastructure and key
resources--including one for Energy and another one for the Defense
Industrial Base--and assigns a federal agency to lead each sector.
[36] DOE"s system of 17 national laboratories performs research and
development that is not well-suited to university or private-sector
research facilities because of its scope, infrastructure, or
multidisciplinary nature, but for which there is a strong public and
national need.
[37] The Federal Energy Regulatory Commission is an independent federal
agency that regulates the interstate transmission of electricity,
natural gas, and oil, and oversees the reliability of high-voltage
interstate transmission systems, among other responsibilities.
[38] The North American Electric Reliability Corporation is an
independent, self-regulatory, not-for-profit organization whose mission
is to ensure the reliability of the bulk power system in North America.
[39] The bulk power system is that part of the power grid that includes
the transmission of electricity over high-voltage transmission lines to
distribution companies and the generation of electricity into those
transmission lines. This includes most power generation facilities and
most transmission lines over 100,000 volts, but excludes all
distribution facilities.
[40] Reliability standards are the reliability requirements for
planning and operating the North American bulk power system. The North
American Electric Reliability Corporation's reliability standards for
the bulk power system cover 14 areas, including critical infrastructure
protection, emergency preparedness and operations, and protection and
control.
[41] Defense Science Board, Report of the Defense Science Board Task
Force on DOD Energy Strategy, "More Fight--Less Fuel."
[42] As of June 1, 2009, the Defense Threat Reduction Agency had
conducted DCIP vulnerability assessments on 12 of the most critical
assets as additional modules to its Joint Staff Integrated
Vulnerability Assessments, which focus on antiterrorism and force
protection vulnerabilities. The agency also conducted a DCIP
vulnerability assessment on one most critical asset in conjunction with
a Balanced Survivability Assessment. In addition, the U.S. Air Force
conducted a DCIP vulnerability assessment on one other most critical
asset as part of its service-level critical infrastructure protection
program.
[43] Department of Defense, DCIP Electrical Power Standards and
Benchmarks, Version 1.1 (Apr. 15, 2007).
[44] Before October 2008, the Defense Threat Reduction Agency conducted
DCIP vulnerability assessments on assets that ASD(HD&ASA) and the Joint
Staff considered to be likely candidates for the list of most critical
assets.
[45] These remaining assets include five non-DOD-owned assets located
in the United States and foreign countries, which are discussed in the
following section of this report, and two DOD-owned assets located in
the United States.
[46] GAO, Combating Terrorism: Improved Training and Guidance Needed to
More Effectively Address Host Nation Support and Enhance DOD's Force
Protection Efforts, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-
07-200NI] (Washington, D.C.: Jan. 31, 2007).
[47] We have previously reported on delays in the completion of
important sector-specific interdependency analyses by the various DCIP
Defense Infrastructure Sector Lead Agents. See GAO, Defense
Infrastructure: Actions Needed to Guide DOD's Efforts to Identify,
Prioritize, and Assess Its Critical Infrastructure, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-07-461] (Washington, D.C.: May
24, 2007).
[48] ASD(HD&ASA) also has requested that the Mission Assurance Division
of the Naval Surface Warfare Center at Dahlgren, Virginia, support the
DCIP vulnerability assessments by conducting similar desktop technical
analyses of the commercial public works infrastructure that supports
DOD's most critical assets outside of DOD installations. The Mission
Assurance Division has completed these assessments for all DOD's most
critical assets.
[49] The information requested includes Geographic Information System
spatial data and imagery of installations' electrical systems,
including data about the systems' size and capacity, power plants,
transmission lines, substations, distribution lines, and emergency
generators.
[50] During these combined assessments, a DCIP vulnerability assessment
module using DCIP-specific assessment benchmarks is added to the Joint
Staff Integrated Vulnerability Assessment, which is conducted using
different assessment standards. According to ASD(HD&ASA) officials,
conducting these two assessments simultaneously also decreases the
negative impacts and disruptions to the installation's commands from
the assessment team's visit.
[51] According to Joint Staff officials, the agreement may be finalized
by calendar year 2011 but will first require the full transfer of all
antiterrorism program elements from the previous DOD program of
responsibility in the Office of the Assistant Secretary of Defense for
Special Operations/Low Intensity Conflict and Interdependent
Capabilities to the new program of responsibility in ASD(HD&ASA).
[52] Definitions of "longer-term" or "extended" electrical power
disruptions vary. See footnote 19 on page 7.
[53] The DCIP vulnerability assessment benchmarks for electrical power
define an electrical power network as consisting of substations,
transmission lines, and power plants, each of which contain equipment,
including transformers, circuit breakers, switches, and supervisory
control and data acquisition systems.
[54] The benchmarks consist of questions to determine whether the owner
of a most critical asset is (1) maintaining information about the
configuration of the electrical power system that directly supports the
critical asset; (2) determining if the electrical power system has the
ability to meet the current and identified electrical power needs of
the asset; (3) identifying all system assets essential to supporting
the continued and reliable delivery of electrical power to the asset;
(4) maintaining security to protect against threats and hazards to all
identified critical electrical power assets, including identifying the
network's single points of failure, if applicable (for commercial
assets, DOD may work with the owner of the electrical power equipment
and installations to enhance equipment security on a case-by-case
basis); (5) maintaining mitigation options and plans to eliminate or
reduce the potential impact to a mission in the event of an electrical
system disruption with appropriate government and commercial electrical
power suppliers and on-site operators/maintainers (e.g., backup
generators, uninterruptible power supplies, and redundant feeds); (6)
conducting routine preventive maintenance and testing of electrical
power system components; and (7) identifying dependencies on and
support provided to other supporting infrastructure to the asset.
[55] Office of the Deputy Under Secretary of Defense for Installations
and Environment, Department of Defense Energy Manager's Handbook
(Washington, D.C., Aug. 25, 2005).
[56] DOD has also not yet scheduled DCIP vulnerability assessments for
two DOD-owned most critical assets.
[57] We observed during our site visits to six of the most critical
assets that all six assets depend on unsecured, overhead electrical
power lines that constitute single points of failure. According to DOD
officials at one of these sites, animals caused a disruption in the
electrical power lines supporting one of these assets, resulting in
mission failure.
[58] The Energy Government Coordinating Council is one of 18
governmental coordinating councils created within the framework of the
National Infrastructure Protection Plan. Issued in June 2006, the plan
serves as a road map for DHS and other relevant stakeholders, such as
owners and operators of key critical infrastructure, to use risk
management principles to prioritize protection activities within and
across sectors in an integrated, coordinated fashion. Each sector is
assigned a lead sector agent, with the Energy Sector and its Government
Coordinating Council led by DOE. The purpose of this council is to
create the structure through which respective groups from all levels of
government and the private sector can participate in planning efforts
related to the development of sector-specific plans and implement
efforts to protect critical infrastructure, among other things.
[59] Members of the Task Force on Electric Grid Vulnerability represent
DOD (Co-Chair), DOE (Co-Chair), DHS, the Director of National
Intelligence, the Environmental Protection Agency, the Federal Energy
Regulatory Commission, the National Aeronautics and Space
Administration, the Nuclear Regulatory Commission, the Office of
Science and Technology Policy, and the Office of Management and Budget.
[60] The Government Performance and Results Act encourages government
agencies to establish performance indicators to be used in measuring or
assessing the relevant outputs, service levels, and outcomes of each
program activity. The implementation of DCIP risk management decisions
could serve as one performance indicator of the extent to which DCIP
activities are reducing vulnerabilities (including those related to
electrical power) of DOD's most critical assets.
[61] Remediation actions are those steps taken to correct known
deficiencies and weaknesses once a vulnerability has been identified.
Mitigation actions are those taken in response to a warning or after an
incident occurs to lessen the potentially adverse effects on a given
military operation or infrastructure.
[62] DOD Instruction 3020.45, Defense Critical Infrastructure Program
(DCIP) Management, sections 5.1 and E3.2.3.3.
[63] After a DCIP vulnerability assessment on a most critical asset,
the owner of that asset conducts a corresponding risk assessment for
the most critical asset and shares it with other relevant DCIP
stakeholders. Subsequently, relevant DCIP stakeholders review the
results of each risk assessment and jointly produce a "risk decision
package" to formally document the risk management decisions and
responses (i.e., remediation, mitigation, and risk acceptance measures)
reached for each most critical asset.
[64] Coordination with local electricity providers may range from an
informal working relationship with utility officials to a formal
memorandum of agreement between the most critical asset's host
installation and the electricity provider.
[65] DOD Manual 3020.45, Volume 2, Defense Critical Infrastructure
Program (DCIP): DCIP Remediation Planning (Oct. 28, 2006).
[66] DOD Manual 3020.45, Volume 2.
[67] The U.S. Army Corps of Engineers has named the pilot program the
Community Resilience Proposal for DCIP Public Works Infrastructure.
[68] DOD officials at all six of the most critical assets we visited
also told us that they did not know whether their local commercial
electricity providers may have conducted their own vulnerability or
risk assessments of the electrical power grids supporting those assets.
[69] According to the Edison Electrical Institute, for example, many
electrical power utilities are implementing aggressive energy
efficiency, demand response, smart grid, and renewable energy programs
that may provide additional expertise and financial assistance to a
local DOD installation's energy security program.
[70] The Federal Energy Regulatory Commission approved the Spare
Transformer Equipment Program in September 2006. The program, an
initiative of the Edison Electric Institute, represents a coordinated
approach to increasing the utility industry's inventory of spare
transformers and streamlining the process of transferring those
transformers to affected utilities in the event of a transmission
outage caused by a terrorist attack. Under the program, each
participating utility is required to maintain and, if necessary,
acquire a specific number of transformers. The program requires each
participating utility to sell its spare transformers to any other
participating utility that suffers a "triggering event," defined as an
act of terrorism that destroys or disables one or more substations and
results in a declared state of emergency by the President. Any investor-
owned, government-owned, or rural electric cooperative utility in the
United States or Canada may participate in the program.
[71] The cover letter for DOD's written comments indicates that the DOD
Office of Security Review reviewed the draft report and recommended
that the draft report be protected at the SECRET level. However, by
deleting certain sections from the draft report, we were able to issue
this unclassified report with the approval of the DOD Office of
Security Review with a different report number.
[72] A Tier 1 Task Critical Asset is an asset the loss, incapacitation,
or disruption of which could result in mission (or function) failure at
the DOD, military department, combatant command, subunified command,
defense agency, or defense infrastructure sector level.
[73] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-09-740R].
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "E-mail Updates."
Order by Phone:
The price of each GAO publication reflects GAO‘s actual cost of
production and distribution and depends on the number of pages in the
publication and whether the publication is printed in color or black and
white. Pricing and ordering information is posted on GAO‘s Web site,
[hyperlink, http://www.gao.gov/ordering.htm].
Place orders by calling (202) 512-6000, toll free (866) 801-7077, or
TDD (202) 512-2537.
Orders may be paid for using American Express, Discover Card,
MasterCard, Visa, check, or money order. Call for additional
information.
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Ralph Dawn, Managing Director, dawnr@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, D.C. 20548:
Public Affairs:
Chuck Young, Managing Director, youngc1@gao.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, D.C. 20548: