Defense Critical Infrastructure

Actions Needed to Improve the Identification and Management of Electrical Power Risks and Vulnerabilities to DOD Critical Assets Gao ID: GAO-10-147 October 23, 2009

The Department of Defense (DOD) relies on a global network of defense critical infrastructure so essential that the incapacitation, exploitation, or destruction of an asset within this network could severely affect DOD's ability to deploy, support, and sustain its forces and operations worldwide and to implement its core missions, including those in Iraq and Afghanistan as well as its homeland defense and strategic missions. In October 2008, DOD identified its 34 most critical assets in this network--assets of such extraordinary importance to DOD operations that according to DOD, their incapacitation or destruction would have a very serious, debilitating effect on the ability of the department to fulfill its missions. Located both within the United States and abroad, DOD's most critical assets include both DOD- and non-DOD-owned assets. DOD relies overwhelmingly on commercial electrical power grids for secure, uninterrupted electrical power supplies to support its critical assets. DOD is the single largest consumer of energy in the United States, as we have noted in previous work. According to a 2008 report by the Defense Science Board Task Force on DOD's Energy Strategy, DOD has traditionally assumed that commercial electrical power grids are highly reliable and subject to only infrequent (generally weather-related), short-term disruptions. For backup supplies of electricity, DOD has depended primarily on diesel generators with short-term fuel supplies. In 2008, however, the Defense Science Board reported that "[c]ritical national security and homeland defense missions are at an unacceptably high risk of extended outage from failure of the [commercial electrical power] grid" upon which DOD overwhelmingly relies for its electrical power supplies. Specifically, the reliability and security of commercial electrical power grids are increasingly threatened by a convergence of challenges, including increased user demand, an aging electrical power infrastructure, increased reliance on automated control systems that are susceptible to cyberattack, the attractiveness of electrical power infrastructure for terrorist attacks, long lead times for replacing key electrical power equipment, and more frequent interruptions in fuel supplies to electricity-generating plants. As a result, commercial electrical power grids have become increasingly fragile and vulnerable to extended disruptions that could severely impact DOD's most critical assets, their supporting infrastructure, and ultimately the missions they support.

DOD's most critical assets are vulnerable to disruptions in electrical power supplies, but DOD lacks sufficient information to determine the full extent of the risks and vulnerabilities these assets face. All 34 of these most critical assets require electricity continuously to support their military missions, and 31 of them rely on commercial power grids--which the Defense Science Board Task Force on DOD Energy Strategy has characterized as increasingly fragile and vulnerable--as their primary source of electricity. DOD Instruction 3020.45 requires DOD to conduct vulnerability assessments on all its most critical assets at least once every 3 years. Also, the Office of the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs ASD(HD&ASA) has requested the U.S. Army Corps of Engineers--which serves as the Defense Critical Infrastructure Program's Defense Infrastructure Sector Lead Agent for Public Works--to conduct preliminary technical analyses of DOD installation infrastructure (including electrical power infrastructure) to support the teams conducting Defense Critical Infrastructure Program vulnerability assessments on the most critical assets. (1) As of June 2009, and according to ASD(HD&ASA) and the Joint Staff, DOD had conducted Defense Critical Infrastructure Program vulnerability assessments on 14 of the 34 most critical assets.18 DOD has not conducted the remaining assessments because it did not identify the most critical assets until October 2008. To comply with the instruction, DOD would have to complete Defense Critical Infrastructure Program vulnerability assessments on all most critical assets by October 2011. (2) DOD has neither conducted, nor developed additional guidelines and time frames for conducting, these vulnerability assessments on any of the five non-DOD-owned most critical assets located in the United States or foreign countries, citing security concerns and political sensitivities. (3) The U.S. Army Corps of Engineers has not completed the preliminary technical analyses requested because it has not yet received infrastructure-related information regarding the networks, assets, points of service, and inter- and intradependencies related to electrical power systems that it requires from the military services. (4) Although DOD is in the process of developing guidelines, it does not systematically coordinate Defense Critical Infrastructure Program vulnerability assessment processes and guidelines with those of other, complementary DOD mission assurance programs--including force protection; antiterrorism; information assurance; continuity of operations; chemical, biological, radiological, nuclear, and high-explosive defense; readiness; and installation preparedness--that also examine electrical power vulnerabilities of the most critical assets, because DOD has not established specific guidelines for such systematic coordination. (5) The 10 Defense Critical Infrastructure Program vulnerability assessments we reviewed did not explicitly consider assets' vulnerabilities to longer-term (i.e., of up to several weeks' duration) electrical power disruptions19 on a mission-specific basis, as DOD has not developed explicit Defense Critical Infrastructure Program benchmarks for assessing electrical power vulnerabilities associated with longer-term electrical power disruptions. With more comprehensive knowledge of the most critical assets' risks and vulnerabilities to electrical power disruptions, DOD can better avoid compromising crucial DOD-wide missions during electrical power disruptions. This additional information may also improve DOD's ability to effectively prioritize funding needed to address identified risks and vulnerabilities of its most critical assets to electrical power disruptions.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-10-147, Defense Critical Infrastructure: Actions Needed to Improve the Identification and Management of Electrical Power Risks and Vulnerabilities to DOD Critical Assets This is the accessible text file for GAO report number GAO-10-147 entitled 'Defense Critical Infrastructure: Actions Needed to Improve the Identification and Management of Electrical Power Risks and Vulnerabilities to DOD Critical Assets' which was released on October 23, 2009. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Committees: United States Government Accountability Office: GAO: October 2009: Defense Critical Infrastructure: Actions Needed to Improve the Identification and Management of Electrical Power Risks and Vulnerabilities to DOD Critical Assets: Defense Critical Infrastructure: GAO-10-147: Contents: Letter: Results in Brief: Background: DOD's Most Critical Assets Are Vulnerable to Electrical Power Disruptions, but DOD Lacks Sufficient Information to Determine the Full Extent of Their Vulnerability: DOD Has Taken Steps to Assure Availability of Electrical Power to Critical Assets, but It Lacks a Mechanism for Tracking Implementation, and Its Coordination with Electricity Providers Remains Limited: Conclusions: Recommendations for Executive Action: Agency Comments and Our Evaluation: Appendix I: Scope and Methodology: Appendix II: Typical Electrical Power Vulnerabilities and Remediation Measures: Appendix III: Survey of DOD Critical Assets: Appendix IV: Survey of DOD Critical Asset Missions: Appendix V: Survey of Coordination Efforts for DOD Critical Assets: Appendix VI: Comments from the Department of Defense: Appendix VII: GAO Contact and Staff Acknowledgments: Related GAO Products: Obtaining Copies of GAO Reports and Testimony: Table: Table 1: Summary of Selected DOD Mission Assurance Programs: Figures: Figure 1: The U.S. Commercial Electrical Power Grid Interconnects: Figure 2: Overview of the Electric Power System and Control Communications: Figure 3: Key Elements of DCIP Risk Management: Abbreviations: ASD(HD&ASA): Office of the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs: DCIP: Defense Critical Infrastructure Program: DHS: Department of Homeland Security: DISLA: Defense Infrastructure Sector Lead Agent: DOD: Department of Defense: DOE: Department of Energy: [End of section] United States Government Accountability Office: Washington, DC 20548: October 23, 2009: Congressional Committees: The Department of Defense (DOD) relies on a global network of defense critical infrastructure so essential that the incapacitation, exploitation, or destruction of an asset within this network could severely affect DOD's ability to deploy, support, and sustain its forces and operations worldwide and to implement its core missions, including those in Iraq and Afghanistan as well as its homeland defense and strategic missions. In October 2008, DOD identified its 34[Footnote 1] most critical assets in this network--assets of such extraordinary importance to DOD operations that according to DOD, their incapacitation or destruction would have a very serious, debilitating effect on the ability of the department to fulfill its missions. Located both within the United States and abroad, DOD's most critical assets include both DOD-and non-DOD-owned assets. DOD relies overwhelmingly on commercial electrical power grids[Footnote 2] for secure, uninterrupted electrical power supplies to support its critical assets. DOD is the single largest consumer of energy in the United States, as we have noted in previous work.[Footnote 3] According to a 2008 report by the Defense Science Board Task Force on DOD's Energy Strategy,[Footnote 4] DOD has traditionally assumed that commercial electrical power grids are highly reliable and subject to only infrequent (generally weather-related), short-term disruptions. For backup supplies of electricity, DOD has depended primarily on diesel generators with short-term fuel supplies. In 2008, however, the Defense Science Board reported that "[c]ritical national security and homeland defense missions are at an unacceptably high risk of extended outage from failure of the [commercial electrical power] grid" upon which DOD overwhelmingly relies for its electrical power supplies. Specifically, the reliability and security of commercial electrical power grids are increasingly threatened by a convergence of challenges, including increased user demand, an aging electrical power infrastructure, increased reliance on automated control systems that are susceptible to cyberattack, the attractiveness of electrical power infrastructure for terrorist attacks, long lead times for replacing key electrical power equipment, and more frequent interruptions in fuel supplies to electricity-generating plants. As a result, commercial electrical power grids have become increasingly fragile and vulnerable to extended disruptions that could severely impact DOD's most critical assets, their supporting infrastructure, and ultimately the missions they support. DOD addresses risk and vulnerabilities[Footnote 5]--including those associated with electrical power--to its critical assets and installations through a variety of mission assurance-related programs.[Footnote 6] In particular, as we have previously reported,[Footnote 7] DOD has been responsible since September 2003 for developing and ensuring implementation of defense critical infrastructure protection policy and program guidance. To identify and help assure the availability of this mission-critical infrastructure, in August 2005 DOD established the Defense Critical Infrastructure Program (DCIP), assigning overall responsibility for the program to the Office of the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs (ASD(HD&ASA)).[Footnote 8] Since then, ASD(HD&ASA) has issued formal DCIP program guidance, including a directive articulating the roles and responsibilities of relevant DOD organizations;[Footnote 9] an instruction on program management;[Footnote 10] and several program manuals, including ones on identifying critical assets and remediating asset risks and vulnerabilities.[Footnote 11] Under DCIP, DOD also established 10 functionally based defense sectors--including one for public works, which encompasses electrical power infrastructure--and designated a Defense Infrastructure Sector Lead Agent (DISLA) for each sector.[Footnote 12] In addition to using DCIP, DOD can also assess risks and vulnerabilities to its critical assets and installations (at the departmental, combatant command, military service, and installation levels) through other mission assurance programs and efforts, including those related to force protection; antiterrorism; defense continuity; information assurance; continuity of operations; chemical, biological, radiological, nuclear, and high-explosive defense; readiness; and installation preparedness. In addition, within the framework of the National Infrastructure Protection Plan of 2009,[Footnote 13] DOD also collaborates with the Department of Homeland Security (DHS) and the Department of Energy (DOE) to address risks and vulnerabilities associated with electrical power infrastructure. In its May 2008 report on H.R. 5658,[Footnote 14] the House Committee on Armed Services noted the risks of electrical power disruptions to critical DOD missions and, among other things, directed that GAO continue its review of DCIP.[Footnote 15] In response to this mandate, we have examined (1) the extent to which DOD's most critical assets are vulnerable to disruptions in electrical power supplies and (2) the extent to which DOD--both within and outside of the Defense Critical Infrastructure Program--has attempted to assure the availability of electrical power supplies to its most critical assets. We have previously conducted an extensive body of work on DOD's efforts to assure the availability of defense critical infrastructure, reporting on DOD's progress in addressing the evolving management framework for DCIP; coordination among DCIP stakeholders; implementation of key program elements; availability of public works infrastructure; and reliability issues in DOD's lists of critical assets, among other issues. We have also issued reports concerning federal critical infrastructure protection, cybersecurity, and electrical power. A list of these reports by category can be found at the end of this report in the Related GAO Products section. To address our objectives in this report, we conducted three structured written surveys regarding the electrical power vulnerabilities of DOD's 34 most critical assets, which DOD identified through DCIP as of October 2008. We pretested the survey with U.S. Army, U.S. Navy, and U.S. Air Force officials representing three most critical asset sites as well as officials from the Joint Staff (J-34) and ASD(HD&ASA) to ensure that the questions were relevant, clearly stated, and easy to understand. We then administered one survey to the military services and DOD agencies that own or have program responsibility for the assets[Footnote 16] through DCIP to obtain information about the assets' reliance on electrical power; the assets' primary and backup sources of electrical power supplies; the number and type of unplanned electrical power disruptions to the assets; DCIP and non-DCIP assessments of the assets' risks and vulnerabilities to electrical power disruptions from January 2006 through December 2008; and measures recommended, implemented, or planned to address or manage such risks and vulnerabilities.[Footnote 17] We administered another survey to the Joint Staff to obtain information about the missions supported by the assets. Finally, we administered the third survey to ASD(HD&ASA) regarding coordination efforts with relevant DOD and non-DOD stakeholders. (These surveys are reproduced in full in apps. III, IV, and V.) We also conducted six follow-up site visits to a nonprobability sample of critical assets to verify and validate the surveys' results and evaluate in-depth issues identified in the surveys' responses, including vulnerability assessments. We also interviewed and obtained information from officials representing ASD(HD&ASA)/DCIP Office, the Joint Staff's Directorate for Antiterrorism and Homeland Defense, the U.S. Air Force, the U.S. Army, the U.S. Navy, the U.S. Marine Corps, the U.S. Army Corps of Engineers, the Defense Threat Reduction Agency, the Mission Assurance Division of the Naval Surface Warfare Center, the Defense Science Board's Task Force on DOD Energy Security, selected DOD installations, DHS, DOE, the Federal Energy Regulatory Commission, the North American Electric Reliability Corporation, the Edison Electrical Institute, and other private-sector energy organizations. As agreed with staff of the House Committee on Armed Services, in addition to issuing this unclassified report, we are issuing a separate classified product. We conducted this performance audit from October 2008 through October 2009 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. A more thorough description of our scope and methodology is provided in appendix I. Results in Brief: DOD's most critical assets are vulnerable to disruptions in electrical power supplies, but DOD lacks sufficient information to determine the full extent of the risks and vulnerabilities these assets face. All 34 of these most critical assets require electricity continuously to support their military missions, and 31 of them rely on commercial power grids--which the Defense Science Board Task Force on DOD Energy Strategy has characterized as increasingly fragile and vulnerable--as their primary source of electricity. DOD Instruction 3020.45 requires DOD to conduct vulnerability assessments on all its most critical assets at least once every 3 years. Also, ASD(HD&ASA) has requested the U.S. Army Corps of Engineers--which serves as the Defense Critical Infrastructure Program's Defense Infrastructure Sector Lead Agent for Public Works--to conduct preliminary technical analyses of DOD installation infrastructure (including electrical power infrastructure) to support the teams conducting Defense Critical Infrastructure Program vulnerability assessments on the most critical assets. * As of June 2009, and according to ASD(HD&ASA) and the Joint Staff, DOD had conducted Defense Critical Infrastructure Program vulnerability assessments on 14 of the 34 most critical assets.[Footnote 18] DOD has not conducted the remaining assessments because it did not identify the most critical assets until October 2008. To comply with the instruction, DOD would have to complete Defense Critical Infrastructure Program vulnerability assessments on all most critical assets by October 2011. * DOD has neither conducted, nor developed additional guidelines and time frames for conducting, these vulnerability assessments on any of the five non-DOD-owned most critical assets located in the United States or foreign countries, citing security concerns and political sensitivities. * The U.S. Army Corps of Engineers has not completed the preliminary technical analyses requested because it has not yet received infrastructure-related information regarding the networks, assets, points of service, and inter-and intradependencies related to electrical power systems that it requires from the military services. * Although DOD is in the process of developing guidelines, it does not systematically coordinate Defense Critical Infrastructure Program vulnerability assessment processes and guidelines with those of other, complementary DOD mission assurance programs--including force protection; antiterrorism; information assurance; continuity of operations; chemical, biological, radiological, nuclear, and high- explosive defense; readiness; and installation preparedness--that also examine electrical power vulnerabilities of the most critical assets, because DOD has not established specific guidelines for such systematic coordination. * The 10 Defense Critical Infrastructure Program vulnerability assessments we reviewed did not explicitly consider assets' vulnerabilities to longer-term (i.e., of up to several weeks' duration) electrical power disruptions[Footnote 19] on a mission-specific basis, as DOD has not developed explicit Defense Critical Infrastructure Program benchmarks for assessing electrical power vulnerabilities associated with longer-term electrical power disruptions. With more comprehensive knowledge of the most critical assets' risks and vulnerabilities to electrical power disruptions, DOD can better avoid compromising crucial DOD-wide missions during electrical power disruptions. This additional information may also improve DOD's ability to effectively prioritize funding needed to address identified risks and vulnerabilities of its most critical assets to electrical power disruptions. While DOD has taken some steps toward assuring the availability of its electrical power supplies to its most critical assets, it lacks a mechanism for tracking the implementation of future Defense Critical Infrastructure Program risk management decisions and responses, and its coordination with local electricity providers has been limited. From August 2005 through October 2008, DOD issued Defense Critical Infrastructure Program guidance for identifying critical assets, assessing their vulnerabilities, and making risk management decisions about those vulnerabilities. In addition, DOD has conducted various types of vulnerability assessments--including Defense Critical Infrastructure Program vulnerability assessments, Joint Staff Integrated Vulnerability Assessments, and other mission assurance- related assessments--on 24 of the most critical assets, including multiple assessments on some of the same assets. According to the survey, these Defense Critical Infrastructure Program and other DOD vulnerability assessments have identified various electrical power vulnerabilities for 10 of the assets. DOD has also coordinated with other federal agencies--including DHS, DOE, and the Federal Energy Regulatory Commission--and industry organizations in an effort intended to assure the availability of electrical power supplies to the most critical assets. However, ASD(HD&ASA)--which has responsibility for overseeing the implementation of actions for the remediation, mitigation, or acceptance of risks to DOD critical assets--has not yet developed a mechanism to track the implementation of future Defense Critical Infrastructure Program risk management decisions, along with responses intended to address risks and vulnerabilities identified for the most critical assets. Without such information, DOD cannot comprehensively determine whether asset owners are taking the necessary steps to address identified risks and vulnerabilities of all of the most critical assets to electrical power disruptions. In addition, Defense Critical Infrastructure Program guidance encourages coordination between DOD installations with critical assets and their respective public utilities, including electricity providers, in order to remediate risks involving those utilities--for example, by discussing potential changes in service agreements with those utilities. However, according to our survey results, such coordination with local electricity providers has occurred for only 7 of DOD's 34 most critical assets. As a result, DOD may not be taking advantage of available expertise on electrical power issues from such providers. Without increased coordination between more DOD installations with critical assets and their respective local electricity providers, DOD potentially limits the risk mitigation or remediation options available to it for addressing the vulnerabilities of its most critical assets to electrical power disruptions. We are recommending that DOD complete Defense Critical Infrastructure Program vulnerability assessments on all DOD-owned most critical assets; develop additional guidelines, an implementation plan, and a schedule for conducting such assessments on all non-DOD-owned most critical assets; establish a time frame for the military services to provide the infrastructure data required to complete preliminary technical analysis of public works (including electrical system) infrastructure at DOD installations that support DOD's most critical assets; finalize guidelines to coordinate Defense Critical Infrastructure Program assessment criteria and processes more systematically with those of other DOD mission assurance programs; develop Defense Critical Infrastructure Program guidelines for assessing the most critical assets' vulnerabilities to longer-term electrical power disruptions; develop a mechanism to track the implementation of future Defense Critical Infrastructure Program risk management decisions; and ensure or facilitate that asset owners and host installations of the most critical assets reach out to local electricity providers to coordinate and help remediate or mitigate risks and vulnerabilities to electrical power disruptions. DOD concurred with all of our recommendations. Based on DOD's comments, we modified our original recommendation that the department establish a time frame for the military services to provide infrastructure data required by the Public Works Defense Infrastructure Sector Lead Agent (the U.S. Army Corps of Engineers) to conduct preliminary technical analysis of public works (including electrical system) infrastructure at DOD installations that support DOD's most critical assets. According to DOD, the U.S. Army Corps of Engineers has already completed this technical analysis for public works infrastructure located outside of the installations, but is still waiting for the military services to provide data required to complete the analysis on infrastructure located within the installations. As a result, our final recommendation indicates that these data are required for completing, rather than conducting, the preliminary technical analysis. Background: DOD's Vulnerability to Electrical Power Disruptions: DOD depends overwhelmingly on the U.S. commercial electrical power grid for electricity to support its operations and missions.[Footnote 20] As illustrated in figures 1 and 2, the grid is a vast, complex network of interconnected regional systems and infrastructure (e.g., power plants, electricity lines, and control centers) used to generate, transmit, distribute, and manage electrical power supplies across the United States. According to the Defense Science Board Task Force on DOD Energy Strategy, approximately 99 percent of the electrical power DOD installations consume originates from outside installation boundaries, while approximately 85 percent of the energy infrastructure that DOD relies on for electrical power is commercially owned and outside of DOD's control[Footnote 21].: Figure 1: The U.S. Commercial Electrical Power Grid Interconnects: [Refer to PDF for image: illustration] Maps: Western Interconnect: Eastern Interconnect: Texas Interconnect: Source: GAO-04-204 and North American Electric Reliability Corporation. [End of figure] Figure 2: Overview of the Electric Power System and Control Communications: [Refer to PDF for image: illustration] Source: DOE, Energy Sector Specific Plan (May 2007). [End of figure] There are currently a variety of mechanisms in place that may help to mitigate the risk of losing electricity service due to electrical power disruptions, including mandatory reliability standards for the electrical power industry approved by the Federal Energy Regulatory Commission. In addition, other risk mitigation measures are being considered, such as islanding.[Footnote 22] However, while the U.S. commercial electrical power grid is generally a reliable source of electricity and is subject to some reliability standards that typically assure its availability over 99 percent of the time, concerns have been raised about the increasing vulnerability of the grid to more frequent or longer electrical power disturbances. For example, the Defense Science Board Task Force reported that the commercial power grid is "brittle, increasingly centralized, capacity-strained, and largely unprotected from physical attack, with little stockpiling of critical hardware." Similarly, according to the May 2007 Infrastructure Resiliency Guide for DOD's Defense Critical Infrastructure Program, "the electric power network is a complex system of interconnected components that can fail and cause massive service disruptions." Factors that contribute to the grid's vulnerability include (1) increasing national demand for electricity; (2) an aging electrical power infrastructure; (3) increased reliance on automated control systems that are susceptible to cyberattacks; (4) the attractiveness of electrical power infrastructure as targets for physical or terrorist attacks; (5) long lead times (of several months to several years) for replacing high-voltage transformers--which cost several millions of dollars and are manufactured only in foreign countries--if attacked or destroyed; and (6) more frequent interruptions in fuel supplies to electricity-generating plants.[Footnote 23] The National Science and Technology Council's Committee on Homeland and National Security also established a task force in January 2009 to identify research and development needs for electric grid vulnerabilities and to coordinate with other federal agencies to address those needs.[Footnote 24] In addition, government and industry efforts are under way to examine cybersecurity threats, develop potential "Smart Grid"[Footnote 25] solutions to address some of the grid's vulnerabilities, and develop and enforce electricity reliability standards for the industry.[Footnote 26] DOD assets are vulnerable to electrical power disruptions in various ways. For example, according to the DCIP Infrastructure Resiliency Guide,[Footnote 27] vulnerabilities may involve the co-location of both primary and secondary electrical power equipment, single points of failure in an electrical power network, lack of security access controls to critical electrical power equipment, electrical power lines sharing rights-of-way with other utilities, and insufficient backup sources of electrical power generation. To address such vulnerabilities, the guide suggests that owners or operators of DOD assets consider diversifying the locations of primary and secondary electrical power equipment, establishing independent transmission paths for commercial and backup electrical power, increasing security and monitoring access to critical electrical power equipment, establishing mitigation options based on potential loss of rights-of- way, and developing additional backup sources of electrical power. For more detailed information regarding typical electrical power vulnerabilities that could affect DOD assets and potential measures to address them, see appendix II. DCIP: DOD identifies the vulnerabilities and manages the risks of its most critical assets to electrical power disruptions primarily through DCIP. On October 14, 2008, DOD designated 34[Footnote 28] assets through DCIP as its most critical assets--assets of such extraordinary importance to DOD operations that according to DOD, their incapacitation or destruction would have a very serious, debilitating effect on the ability of the department to fulfill its missions. While most (29 of 34) of these critical assets--which may be located in the United States, U.S. territories, or foreign countries--are owned by DOD, 5 are owned by other entities, including both domestic and foreign commercial and other governmental entities. To ensure the availability of these and other networked assets critical to DOD missions, DCIP uses a risk management model that helps decision makers (1) identify the department's critical assets based on the criticality of their missions; (2) conduct "threat and hazard assessments;" (3) conduct "vulnerability assessments" (that include detailed reviews of electrical power vulnerabilities); (4) conduct "risk assessments" to determine the consequences of the assets' loss, evaluate the importance and urgency of proposed actions, and develop alternate courses of action; (5) reach "risk management decisions" to accept risks or reduce risks to acceptable levels; and (6) formulate "risk responses" to implement the risk management decisions.[Footnote 29] Key stakeholders involved in these DCIP processes include ASD(HD&ASA), which serves as the principal civilian advisor to the Secretary of Defense on the identification, prioritization, and protection of defense critical infrastructure; the Chairman of the Joint Chiefs of Staff, who serves as DOD's principal military advisor for the program; and the combatant commands, the military services, and other DOD agencies and organizations, which may serve as asset owners or mission owners for specific critical assets.[Footnote 30] In addition, as the DISLA for the DCIP Public Works Defense Sector--which includes both DOD- owned and non-DOD assets used to support, generate, produce, or transport electrical power for and to DOD users--the U.S. Army Corps of Engineers is responsible for identifying asset interdependencies in its sector, including those related to electrical power, as appropriate. Figure 3 illustrates the key elements of the DCIP risk management model. Figure 3: Key Elements of DCIP Risk Management: [See PDF for image: illustration] Flowchart of key elemebts of DCIP risk management. Note: The DCIP Risk Management process begins with the combatant commands, military services, and Defense Infrastructure Sector Lead Agents decomposing (i.e., identifying and analyzing) their missions and functions to identify defense critical infrastructure (DCI). Source: DOD Instruction 3020.45. [End of figure] Other Risk Management Programs and Activities in DOD: In addition to using DCIP, DOD also identifies vulnerabilities and manages the risks of its most critical assets, including those related to electrical power, through other DOD mission assurance programs or activities, including those related to force protection; antiterrorism; information assurance; continuity of operations; chemical, biological, radiological, nuclear, and high-explosive defense; readiness; and installation preparedness. These programs and activities are intended to ensure that required capabilities and supporting infrastructures are available to DOD to carry out the National Military Strategy.[Footnote 31] DOD has established several complementary programs that help protect critical assets, including those listed in table 1. In addition, the military departments have developed service-level critical infrastructure protection programs, which they coordinate with DCIP.[Footnote 32] Table 1: Summary of Selected DOD Mission Assurance Programs: Program: Antiterrorism Program; Mission assurance emphasis: Establish standards for DOD assets to protect them against acts of terrorism.[A]. Program: Department of Defense Continuity Programs[B]; Mission assurance emphasis: Ensure that DOD mission-essential functions continue under all circumstances across the spectrum of threats.[C]. Program: Information Assurance Program; Mission assurance emphasis: Ensure that essential DOD information systems maintain an appropriate level of confidentiality, integrity, authenticity, nonrepudiation, and availability.[D]. Program: Installation Emergency Management Program; Mission assurance emphasis: Prepare DOD installations for emergencies by using a comprehensive all-hazards approach to protect personnel and save lives, and recover and restore operations after an emergency.[E]. Program: Chemical, Biological, Radiological, Nuclear, and High-Yield Explosive Emergency Response Guidelines; Mission assurance emphasis: Prepare DOD installation emergency responders for the effects of a chemical, biological, radiological, nuclear, or high explosive incident to preserve life, prevent human suffering, mitigate incidents, and protect critical assets and infrastructure.[F]. Source: GAO analysis of DOD guidance. [A] DOD Directive 2000.12, DOD Antiterrorism (AT) Program (Washington, D.C., Aug. 18, 2003, certified current as of Dec. 13, 2007). [B] DOD Directive 3020.40 calls for DCIP to complement DOD's continuity of operations program, which is addressed as part of DOD's Defense Continuity Programs. [C] DOD Directive 3020.26, Department of Defense Continuity Programs (DCP) (Washington, D.C., Jan. 9, 2009). [D] DOD Directive 8500.01E, Information Assurance Program (IA) (Washington, D.C., Oct. 24, 2002; certified current as of Apr. 23, 2007). [E] DOD Instruction 6055.17, DOD Installation Emergency Management Program (IEM) (Washington, D.C., Jan. 13, 2009). [F] DOD Instruction 2000.18, Department of Defense Installation Chemical, Biological, Radiological, Nuclear, and High-Yield Explosive Emergency Response Guidelines (CBRNE) (Washington, D.C., Dec. 4, 2002). [End of table] Other Agencies and Organizations with Roles in Risk Management: Other federal agencies and industry organizations are to collaborate with DOD and play significant roles in protecting critical electrical power infrastructure within the framework of Homeland Security Presidential Directive 7. This directive, issued in December 2003, requires all federal departments and agencies to identify, prioritize, and coordinate the protection of critical infrastructure and key resources from terrorist attacks.[Footnote 33] These entities and their roles are summarized below. Department of Homeland Security. DHS is the principal federal entity responsible for leading, integrating, and coordinating the overall national effort to protect the nation's critical infrastructure and key resources. DHS led the development of the National Infrastructure Protection Plan, which provides a framework for managing risks to U.S. critical infrastructure and outlines the roles and responsibilities of DHS and other security partners--including other federal agencies; state, territorial, local, and tribal governments; and private companies.[Footnote 34] DHS is responsible for leading and coordinating a national effort to enhance protection through 18 critical infrastructure and key resource sectors,[Footnote 35] and a "sector- specific agency" has lead responsibility for coordinating the protection of each of the sectors. Department of Energy. DOE serves as the sector-specific agency for the Energy Sector, which includes critical infrastructure and key resources related to electricity. DOE is responsible for developing an Energy Sector Specific Plan, in close collaboration with other National Infrastructure Protection Plan stakeholders, that applies the plan's risk management model to critical infrastructure and key resources within that sector. Within DOE, the Office of Electricity Delivery and Energy Reliability seeks to lead national efforts to modernize the electrical grid; enhance security and reliability of energy infrastructure; and facilitate recovery from disruptions to energy supply. When requested, DOE and its national laboratories[Footnote 36] can provide energy-related expertise and assistance to DOD. According to DOE officials, DOE and several DOD combatant commands, including U.S. European Command and U.S. Africa Command, are considering utilizing DOE representatives as energy attachés to those commands. The DOE representatives can provide energy-related expertise to their respective commands, particularly with respect to the commands' energy- related planning activities and the security and reliability of the commands' energy infrastructure. Federal Energy Regulatory Commission and the North American Electric Reliability Corporation. The Energy Policy Act of 2005 provided the Federal Energy Regulatory Commission[Footnote 37] and its subsequently appointed Electric Reliability Organization--the North American Electric Reliability Corporation[Footnote 38]--new responsibilities for helping protect and improve the reliability and security of the U.S. bulk power system[Footnote 39] through the establishment, approval, and enforcement of mandatory electrical reliability standards.[Footnote 40] Both of these organizations also participate in safeguarding the nation's critical infrastructures and key resources, and they have interacted with DOD regarding electrical power vulnerabilities. Similarly, the North American Electric Reliability Corporation has collaborated with DOD and military service officials through the federal Task Force on Electric Grid Vulnerability, which is co-chaired by DOD, to identify and address electrical power vulnerabilities. The Electrical Power Industry. Electrical power industry representatives also contribute to the assurance of electrical power supplies through industry associations--such as the Edison Electric Institute, the American Public Power Association, and the National Rural Electric Cooperative Association--and through local electrical power providers to DOD installations or assets. Electrical power industry associations, for example, collaborate with the federal government to help secure the U.S. electrical power grid through coordinating mechanisms in the National Infrastructure Protection Plan. In early 2009 the institute established the Energy Security Partnership Group, which includes officials from DOD installations and focuses on improving communications between DOD and its utilities and on identifying and removing barriers to the development of comprehensive energy security programs at DOD installations. DOD's Most Critical Assets Are Vulnerable to Electrical Power Disruptions, but DOD Lacks Sufficient Information to Determine the Full Extent of Their Vulnerability: DOD's Most Critical Assets Rely on Electrical Power and Depend Overwhelmingly on Commercial Electrical Power Grids as Their Primary Supply: DOD's most critical assets and the missions they support are vulnerable to disruptions in electrical power supplies because of the extent of their reliance on electricity, particularly from the commercial electrical power grid. According to our survey of DOD's most critical assets, all of these assets require electrical power continuously in order to function and support their mission(s). Furthermore, the survey results indicate that all of the most critical assets depend on other supporting infrastructure--such as water; natural gas; and heating, ventilation, and air conditioning--that in turn also rely on electricity to function. As a result, without appropriate backup electrical power supplies or risk management measures, these critical assets may be unable to function fully and support their mission(s) in the event of an electrical power disruption. According to our survey, at least 24 of the 34 most critical assets experienced some electrical power disruptions--lasting up to 7 days--during the 3-year period from January 2006 through December 2008, and the missions supported by 3 of those critical assets were adversely impacted by electrical power disruptions. In addition, based on our survey, 31 of these 34 assets rely primarily on commercial electrical power grids for their electricity supplies. The U.S. commercial electrical power grids have become increasingly fragile and vulnerable to prolonged outages because of such factors as (1) increased user demand, (2) fewer spare parts for key electrical power equipment, (3) increased risks of deliberate physical or cyberattacks on electrical power infrastructure by terrorists, and (4) more frequent interruptions in fuel supplies to electricity-generating plants.[Footnote 41] Based on our survey, vulnerability assessments of 6 of the most critical assets reported vulnerabilities associated with the reliability of the electrical power grids of their commercial electricity providers or DOD installations. Furthermore, 8 of these critical assets attributed some of their electrical power disruptions to their commercial electrical power provider. DOD Has Not Yet Completed DCIP Vulnerability Assessments on All of Its Most Critical Assets: DOD is identifying key vulnerabilities--including those related to electrical power--of its most critical assets through DCIP vulnerability assessments, but as of June 2009, the department had conducted such assessments on only 14 of its 34 most critical assets. As part of the DCIP risk management process, DCIP vulnerability assessments are intended to systematically examine the characteristics of an installation, system, asset, application, or its dependencies that could cause it to suffer a degradation or loss--that is, incapacity to perform its designated function--as a result of having been subjected to a certain level of threat or hazard. These vulnerability assessments--most of which the Defense Threat Reduction Agency has been conducting for DOD[Footnote 42]--include specific reviews of the critical assets' supporting electrical power networks "to ensure that the distribution network at a given location and supporting offsite [electrical power] system has the capacity, redundancy, path diversity, security, survivability, and reliability to properly support a given mission."[Footnote 43] DOD Instruction 3020.45 requires DOD to conduct DCIP vulnerability assessments on all of its most critical assets at least once every 3 years. However, while DOD has conducted DCIP assessments on some of its most critical assets since March 2007, ASD(HD&ASA) and Joint Staff officials indicated that the department could not schedule or conduct these assessments systematically until its most critical assets were formally identified in October 2008.[Footnote 44] As a result, as of June 2009, DOD had conducted DCIP vulnerability assessments on 14 of the 34 most critical assets; had scheduled additional assessments for 13 other most critical assets from July 2009 through December 2010; and had not yet scheduled assessments for the remaining 7 most critical assets.[Footnote 45] According to ASD(HD&ASA) and Joint Staff officials, DCIP vulnerability assessments will be conducted on all the most critical assets by October 2011, as required by DOD Instruction 3020.45. Nevertheless, until DOD completes these DCIP vulnerability assessments, the department will not have complete information about electrical power vulnerabilities for all the most critical assets. DOD Lacks Additional Guidance for Conducting DCIP Vulnerability Assessments on Its Non-DOD-Owned Most Critical Assets: DOD has not yet conducted or scheduled DCIP vulnerability assessments, including assessments of electrical power vulnerabilities, on any of its non-DOD-owned most critical assets--both those located in the United States and in foreign countries--and has not yet developed guidance addressing the unique challenges related to conducting the assessments on such assets. While the majority of the most critical assets--which may be located in the United States, U.S. territories, or foreign countries--are owned by DOD, 5 of the 34 are not owned by DOD. Instead, such critical assets are owned by either U.S. or foreign commercial or governmental entities. DOD Instruction 3020.45 requires DOD to conduct DCIP vulnerability assessments at least once every 3 years on all of its most critical assets, regardless of the assets' ownership or location. However, DOD has not yet conducted or even scheduled DCIP vulnerability assessments for any of the non-DOD-owned most critical assets located in the United States or abroad. Furthermore, while DOD has issued extensive DCIP guidance applicable to all defense critical infrastructure (including non-DOD-owned critical infrastructure), as discussed above, DOD has not yet developed a systematic approach or guidelines addressing the unique challenges related to conducting the assessments on such non-DOD-owned critical assets. ASD(HD&ASA) and Joint Staff officials cited security concerns, political sensitivities, and lack of DOD authority over non-DOD-owned assets as key challenges in conducting the DCIP vulnerability assessments on the non-DOD-owned most critical assets in foreign countries. For example, according to these officials, notifying a U.S. or foreign commercial entity, or a foreign government, about its asset's designation as one of DOD's most critical assets could compromise DCIP security guidelines or U.S. national security. Similarly, for political reasons, foreign companies or governments may not want to have their assets identified as supporting U.S. or DOD military missions. ASD(HD&ASA) and Joint Staff officials recognize the need for developing an approach and guidelines to conduct DCIP vulnerability assessments on the five non-DOD-owned most critical assets, particularly those located abroad. According to these officials, DOD has begun to coordinate with the Department of State's Office of the Coordinator for Counterterrorism to help address some of the security concerns and political sensitivities associated with conducting such assessments. We have previously reported on DOD efforts to coordinate with the Department of State on similar sensitive matters involving foreign governments' support for DOD assets abroad. For example, we have previously reported that through the Department of State, the United States and host-nation governments have successfully established various types of agreements--including general agreements, intelligence exchange agreements, written agreements, and informal agreements--that have been used to help protect U.S. forces and facilities abroad,[Footnote 46] and nothing prohibits DOD from developing a similar approach for conducting DCIP vulnerability assessments on non- DOD-owned most critical assets in foreign countries. Until DOD completes the vulnerability assessments on such assets, which DOD is also required to complete by October 2011, DOD officials will not know the extent of those assets' vulnerabilities to electrical power disruptions. The Defense Infrastructure Sector Lead Agent for Public Works Has Not Completed Its Technical Analysis of Public Works Infrastructure (Including Electricity) Supporting DOD Critical Assets: The U.S. Army Corps of Engineers (Corps)--which serves as DCIP's DISLA for Public Works (including electricity)--has not completed preliminary technical analyses of DOD installation infrastructure. Such analyses are intended to identify public works infrastructure networks, assets, points of service, and inter-and intradependencies that support the critical assets on DOD installations.[Footnote 47] ASD(HD&ASA) requested these analyses for all the most critical assets from the Corps in order to support the teams conducting DCIP vulnerability assessments on those assets. Preliminary desktop analyses are intended to help brief DCIP vulnerability assessment teams on the most critical assets' supporting public works infrastructure--including electrical power systems--before those teams conduct the vulnerability assessments on the assets in the field.[Footnote 48] According to ASD(HD&ASA), the Corps has completed these analyses for public works infrastructure located outside of DOD installations with the most critical assets. However, as of July 2009, the Corps had not yet conducted these analyses for public works infrastructure located within DOD installations for any of the most critical assets. According to a Corps official, the Corps has been unable to begin these analyses because it has not received infrastructure-related information that it requires from the military services.[Footnote 49] According to the official, the Corps has been requesting this infrastructure-related information informally from the military services for several months and recently augmented its requests with formal written requests to the services. However, as of July 2009, the U.S. Navy is the only service that has begun to gather the requested information. In written correspondence with us, the remaining two military departments have indicated that limited funds and personnel will affect their ability to respond to the Corps' request for the infrastructure-related information, which one of the services considers to be an unfunded mandate. Without this information, however, the Corps will be unable to conduct its preliminary technical analyses of public works infrastructure, including electrical power systems, which support the most critical assets. As a result, the teams conducting DCIP vulnerability assessments will be unable to consider crucial background information about the most critical assets' public works infrastructure--including networks, assets, points of service, and inter-and intradependencies related to electrical power systems--before the teams conduct the DCIP vulnerability assessments in the field. DCIP Vulnerability Assessments Are Not Systematically Coordinated with Those from Related Mission Assurance Programs: DOD does not systematically coordinate DCIP vulnerability assessment policy, guidelines, or processes with those of other, related DOD mission-assurance programs that also examine electrical power vulnerabilities of DOD critical assets. DOD Directive 3020.40 calls for DCIP to complement other DOD mission assurance programs and efforts, including force protection; antiterrorism; information assurance; continuity of operations; chemical, biological, radiological, nuclear, and high-explosive defense; readiness; and installation preparedness. Vulnerability assessments from these other mission programs and efforts also examine electrical power vulnerabilities of DOD critical assets. For example, as part of DOD's antiterrorism and force protection efforts, the Defense Threat Reduction Agency conducts Joint Staff Integrated Vulnerability Assessments at selected DOD installations worldwide, including some that host critical assets. These assessments identify vulnerabilities related to terrorism and force protection at the selected installations, including those related to electrical power systems, and provide options to assist installation commanders in mitigating or overcoming the vulnerabilities. Similarly, as part of the critical asset protection processes, the military services also conduct vulnerability assessments related to mission assurance at installations that may also host critical assets. However, DOD Directive 3020.40 does not provide specific guidelines or requirements for systematically coordinating policy, guidelines, and processes or the results from DCIP vulnerability assessments on the critical assets with those of other DOD mission assurance programs. ASD(HD&ASA) and Joint Staff officials acknowledge the benefits of coordinating and leveraging the results of assessments from DCIP and other DOD mission assurance programs--particularly those related to antiterrorism/force protection, continuity of operations, and information assurance--and have already taken some steps to further such coordination. For example, as of June 2009, the Defense Threat Reduction Agency has conducted DCIP vulnerability assessments on 12 of the most critical assets in conjunction with Joint Staff Integrated Vulnerability Assessments being conducted on installations that host those assets,[Footnote 50] while the military services have conducted DCIP vulnerability assessments on 2 of the most critical assets. Also, according to ASD(HD&ASA) and Joint Staff officials, the results of other DOD mission assurance vulnerability assessments already conducted on critical assets are made available for DCIP vulnerability assessment teams to consider before they conduct the DCIP vulnerability assessments. In addition, the Joint Staff and the Defense Threat Reduction Agency have begun to develop a formal agreement to align more closely the standards and benchmarks used to conduct vulnerability assessments for related DOD mission assurance programs, particularly DCIP, antiterrorism/force protection, continuity of operations, and information assurance.[Footnote 51] However, until DOD finalizes the guidelines being developed in this agreement, it may be unable to systematically leverage the results of related vulnerability assessments that may be conducted on the same critical assets by multiple sources, and thus enhance DOD's ability to identify those assets' electrical power vulnerabilities. DCIP Assessments to Date Do Not Consistently Consider Vulnerabilities to Longer-Term Power Disruptions: DCIP vulnerability assessment teams do not consistently consider the vulnerabilities of the critical assets to longer-term electrical power disruptions on a mission-specific basis,[Footnote 52] which is not explicitly defined in the DCIP vulnerability assessment benchmarks for electrical power. These benchmarks serve as detailed criteria by which DCIP vulnerability assessment teams assess whether the electrical power networks[Footnote 53] that support the critical assets--at the host installation and in the supporting off-site electrical power system-- have the "capacity, redundancy, path diversity, security, survivability, and reliability to properly support a given mission."[Footnote 54] Although the benchmarks consider how long electrical power backup systems can sustain continuity of critical operations, how to define what an unacceptable loss of power is, and whether the asset owner maintains a contingency plan to ensure availability of the electrical power network to accomplish an asset's mission, they do not explicitly consider vulnerabilities related to longer-term electrical power disruptions. As a result, DOD's DCIP vulnerability assessments may only focus on vulnerabilities associated with shorter-term electrical power disruptions. According to ASD(HD&ASA) officials, DCIP vulnerability assessment teams already consider longer-term electrical power disruptions indirectly through questions in the benchmarks that ask about contingency plans and continuity of operations. However, we found that the DCIP vulnerability assessment reports that were available for 10 of the 34 most critical assets did not explicitly consider specific vulnerabilities or risk mitigation options associated with longer-term electrical power disruptions on a mission-specific basis. Consequently, such vulnerabilities or options may not be identified and DOD may not make appropriate risk management decisions. Nevertheless, several DOD sources have recognized the need for the department to more explicitly consider the effects of longer-term electrical power disruptions to DOD's critical assets. For example, the Department of Defense Energy Manager's Handbook[Footnote 55] calls for DOD components to develop strategies for both short-and long-term energy disruptions, including electricity disruptions. Also, in its February 2008 report, the Defense Science Board Task Force on DOD Energy Strategy--which concluded that DOD's critical national security and homeland defense missions were at an unacceptably high risk of failure from extended power disruptions--recommended that DOD consider the duration of electrical power disruptions, among other factors, in its risk management approach to reducing risks to critical missions from the loss of commercial electrical power. An update by the Office of the Under Secretary of Defense for Acquisition, Technology and Logistics on DOD's Energy Security Task Force also proposed a subgoal of "reduc[ing] the risk of loss of critical functions due to extended commercial grid power disruptions at fixed installations." Without explicit guidance in the DCIP vulnerability assessment benchmarks for considering longer-term electrical power disruptions, future DCIP vulnerability assessments on other critical assets may be unable to identify vulnerabilities associated specifically with such electrical power disruptions. DOD Has Taken Steps to Assure Availability of Electrical Power to Critical Assets, but It Lacks a Mechanism for Tracking Implementation, and Its Coordination with Electricity Providers Remains Limited: DOD Has Taken Some Steps to Assure the Availability of Electrical Power to Its Critical Assets: DOD has taken some steps to assure the availability of its electrical power supplies by identifying and addressing the vulnerabilities and risks of its critical assets to electrical power disruptions. For example, from August 2005 through October 2008, DOD issued Defense Critical Infrastructure Program guidance for identifying critical assets, assessing their vulnerabilities, and making risk management decisions about those vulnerabilities. Also, as previously discussed, DOD has conducted DCIP vulnerability assessments on 14 of the 34 most critical assets and has scheduled assessments for 13 of the remaining assets, but it has not yet scheduled assessments for 5 of the non-DOD- owned most critical assets.[Footnote 56] The DCIP vulnerability assessments conducted so far have identified specific electrical power- related vulnerabilities to some of the critical assets, including vulnerabilities associated with the reliability of the assets' supporting commercial electrical power grid, the availability of backup electrical power supplies, and single points of failure in electrical power systems supporting the assets.[Footnote 57] Addressing the risks associated with these vulnerabilities--by remediating, mitigating, or accepting those risks--can help DOD assure the availability of electrical power to the critical assets. For example, at all 6 most critical assets we visited, the DOD asset owners have installed diesel- based electrical power generators as backup sources of electricity during electrical power disruptions. Other (non-DCIP) DOD mission assurance programs also have the potential to help DOD assure the availability of electrical power supplies to its most critical assets. For example, we found that Joint Service Integrated Vulnerability Assessments and similar vulnerability assessments from the military services, which have been conducted on some of the installations with critical assets for antiterrorism and force protection purposes, also have identified vulnerabilities related to electrical power. Furthermore, DOD also has taken steps to coordinate with other federal agencies, including DOE and DHS, as well as electrical industry organizations, and these steps may help to assure the supply of electricity to its critical assets. For example, to represent its concerns and interests on electricity, DOD participates in the Energy Government Coordinating Council. The council provides DOD and other federal agencies with a forum for sharing their concerns, comments, and questions on energy-related matters--including critical infrastructure protection--with DOE, which chairs the group.[Footnote 58] In another effort involving DOE, several DOD combatant commands--including U.S. European Command and U.S. Africa Command--have recently agreed to accept a DOE departmental representative to serve as an energy attaché to the commands. The DOE representatives will provide energy-related expertise to their respective commands, particularly with respect to the commands' energy-related planning activities and the security and reliability of the commands' energy infrastructure. DOD has also partnered with various federal agencies and industry organizations to further increase the assurance of electrical power. For example, DOD serves as co-chair of the federal Task Force on Electric Grid Vulnerability of the National Science and Technology Council's Committee on Homeland and National Security, which was established in January 2009 to identify research and development needs for electrical grid vulnerabilities and to coordinate with other federal agencies to address those needs.[Footnote 59] In addition, DOD officials are collaborating with a working group established by the Edison Electric Institute in early 2009 called the Energy Security Partnership Group. The group focuses on improving communications between DOD and its utilities and on identifying and removing barriers to the development of comprehensive energy security programs at DOD installations. Also, in July 2009, DOD participated in an interagency exercise cosponsored by DHS, DOE, and DOD called Secure Grid 2009, Electric Grid Tabletop Exercise, for which officials from DOD, DOE, DHS, the Federal Energy Regulatory Commission, the North American Electric Reliability Corporation, and the Edison Electric Institute, among others, jointly developed recommendations and potential responses to two scenarios involving theoretical physical and cyber-related attacks on U.S. electrical power grids. Our survey results confirm that some steps are being taken at various levels within DOD to improve the assurance of electrical power supplies to its most critical assets. For example, according to the survey and reports we reviewed, DOD conducted vulnerability and risk assessments involving electrical power on 24 of the most critical assets through a variety of DOD mission assurance reviews, including DCIP assessments, Joint Staff Integrated Vulnerability Assessments, combatant command assessments, DOD agency assessments, and local installation assessments. The survey results also indicate that secondary sources of electricity--such as uninterruptible power supply systems and diesel generators--provide some backup electrical power capabilities to almost all of the critical assets. In addition, according to the survey, asset owners and host installations for some of the critical assets whose vulnerabilities have been assessed have taken specific measures to address those vulnerabilities, such as eliminating single points of failure, developing electrical power disruption contingency plans, installing emergency electrical power generators, and increasing physical security measures around electrical power facilities. DOD Lacks a Mechanism for Tracking Implementation of Future DCIP Risk Management Decisions and Responses to Vulnerabilities: DOD has not yet established a mechanism for systematically tracking the implementation of future DCIP risk management decisions, which are intended to address vulnerabilities (including those involving electrical power) that have been identified for the most critical assets. Such tracking could help DOD ensure that DCIP stakeholders are developing and implementing measures to address the most critical assets' identified vulnerabilities to electrical power disruptions and thereby help assure the availability of electrical power to those assets.[Footnote 60] As previously discussed, DCIP's risk management program involves the identification of DOD's most critical assets; the assessment of those assets' vulnerabilities through vulnerability assessments; and subsequent risk assessments, risk management decisions, and risk responses involving relevant DCIP stakeholders. DCIP guidance contained in DOD Instruction 3020.45 requires stakeholders to coordinate to make risk management decisions regarding whether and how to address identified vulnerabilities--through remediation or mitigation--or accept the risk posed by not addressing those vulnerabilities.[Footnote 61] Under DCIP, ASD(HD&ASA) has overall responsibility for overseeing the implementation of actions for the remediation, mitigation, or acceptance of risks to DOD critical assets, while owners of the critical assets are required to monitor the status and progress of the implementation of DCIP risk management decisions for their respective assets.[Footnote 62] ASD(HD&ASA) officials indicated to us that they do not systematically track the results of DCIP vulnerability assessments, asserting that they consider it more important to track the implementation of the subsequent DCIP risk management decisions and responses to be made concerning the vulnerabilities that are identified. The officials told us that these risk management decisions would reflect the consensus that would be reached by relevant DCIP stakeholders (such as asset owners, mission owners, and defense infrastructure sector lead agents) on either remediating, mitigating, or accepting specific vulnerabilities--actions that may require the stakeholders to provide funding or other resources in order to implement.[Footnote 63] However, the officials have not yet tracked any such decisions or responses, because no such decisions or responses have yet been made in response to the 14 DCIP vulnerability assessments conducted so far. According to these officials, because of the number of stakeholders and potential resources involved, risk management decisions can take several months to coordinate following a DCIP vulnerability assessment. These officials said that they plan to monitor the implementation of DCIP risk management decisions and responses, but they have not yet developed a mechanism, such as a schedule to track the implementation status of those decisions and responses, by which to do so. Without systematic tracking of risk management decisions and responses, DOD may be unable to comprehensively determine whether asset owners and host installations are taking the steps agreed to by relevant DCIP stakeholders to address the vulnerabilities of the critical assets, including vulnerabilities related to electrical power disruptions. DOD's Coordination with Local Electricity Providers Has Been Limited: DCIP guidance recognizes the importance of collaboration by encouraging coordination[Footnote 64] between DOD facilities with critical assets and their respective public utilities--including electricity providers-- in order to remediate risks involving those utilities.[Footnote 65] According to this guidance, a DOD installation "should establish good communications with public service providers [including electrical power providers] about service requirements," and "that relationship does not have to wait for the identification of a vulnerability," as "the remediation of risks posed by commercial dependency may be more complicated than that of DOD-owned infrastructure."[Footnote 66] Similarly, in recognition of the important role that local utility providers play in supporting DOD installations with critical assets, the U.S. Army Corps of Engineers is requesting funds for a pilot program that would involve extensive collaboration with the local electricity providers at selected U.S. Army installations with critical assets. The pilot program is intended to analyze the reliability of community infrastructure in meeting current and anticipated needs of the installations and the critical missions.[Footnote 67] As previously discussed, our survey indicated that 31 of the DOD's 34 most critical assets identified the commercial electrical power grid as their primary source of electrical power. Yet despite this overwhelming reliance, host installations or owners of only 7 of the surveyed critical assets reported coordinating with their local electricity providers to either identify or address their assets' vulnerabilities to electrical power disruptions.[Footnote 68] Furthermore, according to the survey and our analysis, none of the host installations or owners of the critical assets have developed any formal agreements with their local electricity providers to help manage the risks and vulnerabilities of those assets to electrical power disruptions. Survey respondents cited various reasons for not coordinating with local electricity providers, including the absence of a requirement for such coordination and the lack of a vulnerability assessment on the asset that would indicate the need to initiate such coordination. Coordinating with local electricity providers could usefully enhance DOD's efforts to identify or address the vulnerabilities of critical assets to electrical power disruptions and thereby better assure the availability of electrical power to those assets. However, few host installations or owners of critical assets have coordinated with their local electrical power providers to help identify or address the assets' vulnerabilities to electrical power disruptions. According to an electrical power industry association representative, local electricity providers may have technical expertise or be pursuing activities that could help DOD installations develop risk remediation or mitigation measures to address electrical power vulnerabilities affecting a critical asset.[Footnote 69] According to this representative, such coordination, for example, could lead to agreements in which local electricity providers would prioritize the restoration of electrical power to a DOD installation with a critical asset following an electrical power disruption. In addition, DOD installations could usefully coordinate with their respective electricity providers concerning an industry initiative called Spare Transformer Equipment Program, in which electricity providers agree to share spare electrical power transformers--which are often foreign made, expensive, and can take several years to order--in the event of an emergency.[Footnote 70] Without more extensive coordination between DOD DCIP stakeholders and local electricity providers, DOD may be limiting the risk remediation or mitigation options that it could consider for addressing the vulnerabilities of its critical assets to electrical power disruptions. Conclusions: DOD relies on commercial electrical power grids for secure, uninterrupted electrical power supplies to support its most critical assets--those whose incapacitation or destruction would have a very serious, debilitating effect on the department's ability to fulfill its missions. However, according to the Defense Science Board Task Force on DOD Energy Strategy, the commercial electrical power grids have become increasingly fragile and vulnerable to extended power disruptions that could severely impact DOD's most critical assets, their supporting infrastructure, and the missions they support, and disruptions to the electrical power grid have occurred. DOD's most critical assets are vulnerable to disruptions in electrical power supplies, but DOD would benefit from additional information to determine the full extent of the risks and vulnerabilities these assets face. By completing DCIP vulnerability assessments on all of its most critical assets, DOD would have more information to determine the full extent of these assets' risks and vulnerabilities to such disruptions. Similarly, with additional guidelines, an implementation plan, and a schedule for conducting DCIP vulnerability assessments on all non-DOD-owned most critical assets, particularly those located abroad, DOD could more accurately determine the full extent of those assets' risks and vulnerabilities to such disruptions. Further, until the U.S. Army Corps of Engineers is able to complete the preliminary technical analyses of public works (including electrical power) infrastructure in support of the DCIP vulnerability assessments of the critical assets, DOD may be unable to identify all electrical power vulnerabilities to its most critical assets. Additionally, once DOD finalizes guidelines specifying how DCIP assessment criteria and processes should be coordinated with those of other DOD mission assurance programs, DOD could more systematically determine whether these programs may also be identifying electrical power vulnerabilities and risk management options for its most critical assets. Also, explicit guidelines to assess vulnerabilities to critical assets from long-term electrical power disruptions would further enhance DOD's ability to manage the risks associated with such disruptions. While DOD has taken some steps toward assuring the availability of its electrical power supplies to its critical assets, additional DCIP measures could further enhance efforts to address these assets' risks and vulnerabilities to electrical power disturbances. DOD could also improve its ability to leverage related mission assurance assessments and respond to future disruptions by developing a mechanism to systematically track the results of future risk management decisions and responses intended to address risks and vulnerabilities identified for the most critical assets. Additionally, DOD could expand its options for addressing disruptions in the commercial electrical power grid by encouraging greater collaboration between the owners or host installations of the most critical assets and their respective local electricity providers. With more comprehensive knowledge of DOD's most critical assets' risks and vulnerabilities to electrical power disruptions and more effective coordination with electricity providers, DOD can better avoid compromising crucial DOD-wide missions during electrical power disruptions. This additional information may also improve DOD's ability to effectively prioritize funding needed to address identified risks and vulnerabilities of its most critical assets to electrical power disruptions. Recommendations for Executive Action: To ensure that DOD has sufficient information to determine the full extent of the risks and vulnerabilities to electrical power disruptions of its most critical assets, we recommend that the Secretary of Defense direct the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs, in collaboration with the Joint Staff's Directorate for Antiterrorism and Homeland Defense, combatant commands, military services, and other Defense Critical Infrastructure Program stakeholders, as appropriate, to take the following five actions: * Complete Defense Critical Infrastructure Program vulnerability assessments, as required by DOD Instruction 3020.45, on all of DOD's most critical assets by October 2011. * Develop additional guidelines, an implementation plan, and a schedule for conducting Defense Critical Infrastructure Program vulnerability assessments on all non-DOD-owned most critical assets located in the United States and abroad in conjunction with other federal agencies, as appropriate, that have a capability to implement the plan. * Establish a time frame for the military services to provide the infrastructure data required for the Public Works Defense Infrastructure Sector Lead Agent--the U.S. Army Corps of Engineers--to complete its preliminary technical analysis of public works (including electrical system) infrastructure at DOD installations that support DOD's most critical assets. * Finalize guidelines currently being developed to coordinate Defense Critical Infrastructure Program assessment criteria and processes more systematically with those of other DOD mission assurance programs. * Develop explicit Defense Critical Infrastructure Program guidelines for assessing the critical assets' vulnerabilities to long-term electrical power disruptions. To enhance DOD's efforts to mitigate these assets' risks and vulnerabilities to electrical power disruptions and leverage previous assessments and multiple asset owners' information, we recommend that the Secretary of Defense direct the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs, in collaboration with the Joint Staff's Directorate for Antiterrorism and Homeland Defense, combatant commands, military services, and other Defense Critical Infrastructure Program stakeholders, as appropriate, to take the following two actions: * Develop a mechanism to systematically track the implementation of future Defense Critical Infrastructure Program risk management decisions and responses intended to address electrical power-related risks and vulnerabilities to DOD's most critical assets. * Ensure for DOD-owned most critical assets, and facilitate for non- DOD-owned most critical assets, that asset owners or host installations of the most critical assets, where appropriate, reach out to local electricity providers in an effort to coordinate and help remediate or mitigate risks and vulnerabilities to electrical power disruptions that may be identified for DOD's most critical assets. Agency Comments and Our Evaluation: In written comments on a draft of this report, DOD concurred with all of our recommendations and provided technical comments, which we incorporated in the report where appropriate.[Footnote 71] DOD's comments are reprinted in appendix VI. Due to the sensitivity of DOD's most critical assets and its concerns about the classification and dissemination of the initial draft report, as well as the focus of the recommendations on DOD's program, we did not request agency comments on the full draft report from DOE, DHS, and the Federal Energy Regulatory Commission. However, we did seek technical comments from these entities on sections of the initial draft report that pertained to their roles and responsibilities, which we also incorporated in the report where appropriate. DOD concurred with our five recommendations to ensure that DOD has sufficient information to determine the full extent of the risks and vulnerabilities to electrical power disruptions of its most critical assets. Based on DOD's comments, we modified our original recommendation concerning the establishment of a time frame for the military services to provide the infrastructure data required for preliminary technical analysis of public works (including electrical system) infrastructure at DOD installations that support DOD's most critical assets. * First, DOD concurred with our recommendation that the department complete DCIP vulnerability assessments on all of its most critical assets by October 2011, as required by DOD Instruction 3020.45. DOD noted that the Joint Staff, in coordination with ASD(HD&ASA), has already begun to conduct these assessments using an all-hazards and mission-assurance approach. As we reported, as of June 2009, DOD had conducted DCIP assessments on 14 of the 34 most critical assets. * Second, DOD concurred with our recommendation that the department develop additional guidelines, an implementation plan, and a schedule for conducting vulnerability assessments on all non-DOD-owned most critical assets located in the United States and abroad in conjunction with other federal agencies, as appropriate, that have a capability to implement the plan. DOD acknowledged that conducting vulnerability assessments on such assets, particularly those located abroad, presents significant challenges, as they require the agreement of the assets' non-DOD owners. According to the department, the ASD(HD&ASA)/DCIP Office is coordinating with appropriate offices to examine the possibility of conducting "remote assessments" on these assets. We recognize the challenges faced by DOD in identifying the electrical power vulnerabilities of non-DOD-owned critical assets and support DOD's efforts to coordinate with appropriate federal agencies in this area. We previously have reported on DOD's efforts to coordinate with the Department of State on similar sensitive matters involving foreign governments' support for DOD assets abroad, noting that such efforts have resulted in various types of agreements to help protect U.S. forces and facilities abroad. We also note that if DOD decides to conduct "remote" DCIP vulnerability assessments on the non-DOD-owned most critical assets, such assessments should rely on the same benchmarks used for conducting DCIP vulnerability assessments on DOD- owned most critical assets. * Third, DOD concurred with our recommendation that the department establish a time frame for the military services to provide the infrastructure data required for the Public Works Infrastructure Sector Lead Agent--the U.S. Army Corps of Engineers--to complete its preliminary technical analysis of public works infrastructure at DOD installations that support DOD's most critical assets. Based on comments from DOD that the Corps has already completed the technical analysis for public works infrastructure located outside of the installations, but is still waiting for the data required to complete the analysis on infrastructure located within the installations, we modified this recommendation to indicate that these data are required for completing--rather than conducting--the preliminary technical analysis. DOD acknowledged that such information is necessary for the proper characterization of its critical assets from a public works perspective. We believe that the establishment of specific time frames for the military services to provide this important information is necessary because, as of July 2009, only one of the military services- -the U.S. Navy--had begun to gather the requested information. * Fourth, DOD concurred with our recommendation that the department finalize guidelines currently being developed to coordinate DCIP assessment criteria and processes more systematically with those of other DOD mission-assurance programs. While acknowledging the synergistic effect of complementary risk management program activities and security-related functions, DOD noted that such programs are subject to different directives and appropriations, and that critical infrastructure protection at the installation level is not yet mature. According to DOD, the Joint Staff is now overseeing a "way ahead" process to better synchronize these efforts. We encourage the Joint Staff to complete this initiative and identify specific ways for coordinating DCIP assessment criteria and processes more systematically with those of DOD's other mission assurance programs. * Fifth, DOD concurred with our recommendation that the department develop explicit DCIP guidelines for assessing the most critical assets' risks and vulnerabilities to long-term electrical power disruptions. According to DOD, the ASD(HD&ASA)/DCIP Office will review current vulnerability assessment criteria and standards and work with the Joint Staff to include considerations of long-term electrical power disruptions. DOD also concurred with our two recommendations to enhance DOD's efforts to mitigate its most critical assets' risks and vulnerabilities to electrical power disruptions and leverage previous assessments and multiple asset owners' information: * First, DOD concurred with our recommendation that the department develop a mechanism to systematically track the implementation of future DCIP risk management decisions and responses intended to address electrical power-related risks and vulnerabilities to DOD's most critical assets. According to DOD, the ASD(HD&ASA)/DCIP Office has developed draft DOD Manual 3020.45, Volume 5, Defense Critical Infrastructure Program (DCIP) Coordination Timeline, that is being coordinated within the department. DOD notes that manual's purpose is to provide uniform procedures and timelines for DCIP stakeholders--that is, ASD(HD&ASA), the Joint Staff, military departments, combatant commands, defense agencies, and DISLAs--to execute DCIP activities and responsibilities, including those related to risk management decisions and responses. We encourage DOD to finalize this draft manual and ensure that it provides explicit guidance on tracking the implementation of DCIP risk management decisions and responses resulting from DCIP vulnerability assessments of DOD's most critical assets. DOD also notes that the DCIP Office is developing an automated Critical Asset Identification Process Collaboration Tool that will document and track the status of DCIP stakeholders' progress in the DCIP risk management process. * Second, DOD also concurred with our recommendation that the department ensure for DOD-owned most critical assets, and facilitate for non-DOD-owned most critical assets, that asset owners or host installations of the most critical assets, where appropriate, reach out to local electricity providers in an effort to coordinate and help remediate or mitigate risks and vulnerabilities to electrical power disruptions that may be identified for DOD's most critical assets. DOD's comments cited existing guidance that, among other things, (1) encourages government and private-sector decision makers to work with electricity providers to identify remedies to potential single points of failure and (2) advises DOD facility managers to establish good communications with public service providers about service requirements, and to review service-level agreements, acquisition programs, contracts, and operational processes for opportunities to address and include stronger resiliency language and requirements for future remediation efforts. According to DOD, this guidance will be reinforced at DCIP forums for collaboration, such as meetings of the Defense Critical Infrastructure Integration Staff, Operational Advisory Board, and Defense Infrastructure Sector Council. We encourage DOD to reinforce such guidance concerning collaboration with local electricity providers directly with asset owners or host installations for each of the most critical assets, as appropriate, in order to help mitigate the risks and vulnerabilities to electrical power disruptions that may be identified for those assets. We are sending copies of this report to other interested congressional parties; the Secretary of Defense; the Chairman, Joint Chiefs of Staff; the Secretaries of the U.S. Army, the U.S. Navy, and the U.S. Air Force; the Commandant of the U.S. Marine Corps; and the Director, Office of Management and Budget. This report also is available at no charge on GAO's Web site at [hyperlink, http://www.gao.gov]. If you or your staff have any questions concerning this report, please contact me at (202) 512-5431 or dagostinod@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VII. Signed by: Davi M. D'Agostino: Director Defense Capabilities and Management: List of Committees: The Honorable Carl Levin: Chairman: The Honorable John McCain: Ranking Member: Committee on Armed Services: United States Senate: The Honorable Daniel K. Inouye: Chairman: The Honorable Thad Cochran: Ranking Member: Subcommittee on Defense: Committee on Appropriations: United States Senate: The Honorable Tim Johnson: Chairman: The Honorable Kay Bailey Hutchison: Ranking Member: Subcommittee on Military Construction, Veterans Affairs, and Related Agencies: Committee on Appropriations: United States Senate: The Honorable Ike Skelton: Chairman: The Honorable Howard P. McKeon: Ranking Member: Committee on Armed Services: House of Representatives: The Honorable John P. Murtha: Chairman: The Honorable C.W. Bill Young: Ranking Member: Subcommittee on Defense: Committee on Appropriations: House of Representatives: The Honorable Chet Edwards: Chair: The Honorable Zach Wamp: Ranking Member: Subcommittee on Military Construction, Veterans Affairs, and Related Agencies: Committee on Appropriations: House of Representatives: [End of section] Appendix I: Scope and Methodology: To conduct our review of the assurance of electrical power supplies to Department of Defense (DOD) critical assets, we administered three structured written surveys to the owners or those with program responsibility for 100 percent of DOD's 34 most critical assets, which DOD identified through the Defense Critical Infrastructure Program (DCIP) as its most critical assets as of October 2008. We administered one survey to the military services and DOD agencies that own or have program responsibility for the assets through DCIP to obtain information about the (1) assets' degree of reliance on electrical power; (2) assets' primary and backup sources of electrical power supplies; (3) number and type of unplanned electrical power disruptions to the assets; (4) DCIP and non-DCIP assessments of the assets' risks and vulnerabilities to electrical power disruptions from January 2006 through December 2008; and (5) measures recommended, implemented, or planned to address or manage such risks and vulnerabilities. We administered another survey to the Joint Staff to obtain information about the missions supported by the assets. Finally, we administered the third survey to the Office of the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs (ASD(HD&ASA)) regarding coordination efforts with relevant DOD and non-DOD stakeholders. (These surveys are reproduced in full in apps. III, IV, and V, respectively.) We limited our surveys to the universe of DOD's most critical assets because of concerns over the reliability of DOD's larger list of about 675 Tier 1 Task Critical Assets,[Footnote 72] which support critical DOD missions at the departmental, combatant command, and military service levels. We also conducted six follow-up site visits to a nonprobability sample of critical assets to verify and validate the surveys' results and evaluate in-depth issues identified in the surveys' responses. We selected the sites for visits judgmentally based on the survey responses regarding issues addressed in this report. We initially selected a random sample from DOD's universe of about 675 Tier 1 Task Critical Assets to survey for this review. However, based on discussions with DOD officials and our own analysis, we found significant data reliability and validity problems with DOD's Tier 1 Task Critical Asset list. We found that the use of disparate sets of guidance, including draft and nonbinding guidance, resulted in the selection and submission of assets to the Tier 1 Task Critical Asset list based on inconsistent criteria, thus limiting the usefulness of the Tier 1 Task Critical Asset list to DOD decision makers in determining DOD's most critical assets and prioritizing funding to address identified vulnerabilities. As a result, we determined that for methodological purposes, DOD's current Tier 1 Task Critical Asset list did not represent a meaningful universe from which we should select our survey sample or to which we should project our survey results. Because the universe of critical assets did not represent an accurate, comprehensive list of DOD Tier 1 Task Critical Assets, we determined that this issue in and of itself warranted further analysis. Therefore, we issued a separate report, with recommendations, on issues relating specifically to the Tier 1 Task Critical Asset list to enable DOD to take timely actions to update and improve its list of Defense Critical Assets in the fall of 2009 and prioritize funding. In addition to our survey, we obtained relevant documentation and interviewed officials from the following DOD organizations: * Office of the Deputy Under Secretary of Defense for Installations and Environment: * ASD(HD&ASA)/DCIP Office: * Joint Staff (J-34), Directorate for Antiterrorism/Homeland Defense, DCIP Resources and Assessments Branch: * Military Services: - Headquarters, Department of the Army: -- Critical Infrastructure Risk Management Branch: -- Headquarters, Installation Management Command, Anti-Terrorism/Force Protection: -- Office of the Assistant Chief of Staff for Installation Management, Energy & Utilities for Installation Office: - Headquarters, Department of the Navy: -- Critical Infrastructure Protection: - Headquarters, U.S. Marine Corps: -- Marine Corps Critical Infrastructure Program, Mission Assurance Branch: - Headquarters, Department of the Air Force: -- Assistant Deputy Chief of Staff Logistics, Installations, and Mission Support: -- Critical Infrastructure Program, Air Force Directorate of Current Operations & Training, Air Force Homeland Defense Division: * Defense Information Systems Agency: * Defense Infrastructure Sector Lead Agents: - Headquarters, U.S. Army Corps of Engineers, DCIP Public Works Defense Sector Lead: * Defense Threat Reduction Agency, Support Branch Chief, Combat Support Assessments Division: * Director of Defense Research and Engineering: * Defense Science Board, Task Force on DOD Energy Strategy: * Mission Assurance Division, Naval Surface Warfare Center at Dahlgren: * Selected DOD critical assets at U.S. military installations within the continental United States: To become more familiar with efforts currently taking place to assure the nation's electrical power grid, we met with various officials from federal agencies, electrical power industry associations, and private- sector entities and other officials to determine their roles and responsibilities, ongoing initiatives, and the extent of their coordination efforts with DOD in assuring electrical power to the nation's power grid. We obtained relevant documentation and interviewed officials from the following organizations: * Department of Homeland Security (DHS): - National Protection and Programs Directorate: - Office of Infrastructure Protection: - Infrastructure Information Collection Division: - Partnership and Outreach Division: - Protective Security Coordination Division: - Office of Cybersecurity and Communications: * Department of Energy (DOE), Office of Electricity Delivery & Energy Reliability: * Federal Energy Regulatory Commission, Office of Electric Reliability: * North American Electric Reliability Corporation: * CACI International, Inc. * Edison Electric Institute: * Pareto Energy, Inc. * Talisman International, LLC: We did not request agency comments from DOE, DHS, and the Federal Energy Regulatory Commission on the full draft report, which at the time was classified as SECRET because of (1) DOD's concerns about the classification and dissemination of the report and (2) the focus of the recommendations on DOD's program. We did seek technical comments from these entities on sections of the initial draft report that pertained to their roles and responsibilities, which we incorporated in the report where appropriate. We also shared sections of the initial draft report that discussed the 2008 Report of the Defense Science Board Task Force on DOD Energy Strategy, "More Fight--Less Fuel," and the entities either agreed or did not take issue with the conclusions of this report. To learn more about the assurance of electrical power supplies to DOD critical assets, we developed three electronic surveys for DOD critical assets, their missions, and coordination efforts regarding the assets. We asked responders about (1) missions supported by the assets; (2) assets' degree of reliance on electrical power; (3) assets' primary and backup sources of electrical power supplies; (4) number and type of unplanned electrical power disruptions to the assets; (5) DCIP and non- DCIP assessments of the assets' risks and vulnerabilities to electrical power disruptions; and (6) measures recommended, implemented, or planned to address or manage such risks and vulnerabilities, including coordination efforts with relevant DOD and non-DOD stakeholders. We conducted our surveys from May 2009 through August 2009, using self- administered electronic surveys. We sent a questionnaire on DOD critical assets to the owners and operators of DOD-owned critical assets. We sent a second questionnaire on DOD critical asset missions to the Joint Staff (J-34). We sent a third questionnaire on coordination efforts for DOD critical assets to ASD(HD&ASA)/DCIP Office. We sent the questionnaires by SIPRNet in an attached Microsoft Word form that respondents could return electronically via SIPRNet after marking check boxes or entering responses up to the SECRET classification level into open answer boxes. We also made provisions for receiving completed questionnaires at the TOP SECRET classification level, if needed, via a GAO Joint Worldwide Intelligence Communications System account, which was established for us at the DOD Office of the Inspector General. We sent the original three electronic questionnaires in May and June 2009. We sent out reminder e-mail messages at different times to all nonrespondents in order to encourage a higher response rate. In addition, we made several courtesy telephone calls to nonrespondents to encourage their completion of the surveys. All questionnaires were returned by August 2009. In the end, we achieved a 100 percent response rate. Because this was not a sample survey, but rather a survey of the universe of respondents, it has no sampling errors. However, the practical difficulties of conducting any survey may introduce errors, commonly referred to as nonsampling errors. For example, difficulties in interpreting a particular question, determining sources of information available to respondents, or entering data into a database or analyzing them can introduce unwanted variability into the survey results. We took steps in developing the questionnaire, collecting the data, and analyzing them to minimize such nonsampling error. For example, design methodologists designed the questionnaire in collaboration with GAO staff who had subject matter expertise. In addition to an internal expert technical review by GAO's Survey Coordination Group, we pretested the survey with U.S. Army, U.S. Navy, and U.S. Air Force officials representing three most critical asset sites as well as officials from the Joint Staff (J-34) and ASD(HD&ASA) to ensure that the questions were relevant, clearly stated, and easy to understand. Since there were relatively few changes based on the pretests and because we were conducting surveys with the universe of respondents, we did not find it necessary to conduct additional pretests. Instead, changes to the content and format of the questionnaire were made after the pretests based on the feedback we received. When we analyzed the data, an independent analyst checked all computer programs. All data were double keyed during the data entry process, and GAO staff traced and verified all of the resulting data to ensure accuracy. To verify and validate the survey recipients' responses and evaluate in more detail issues identified in the surveys, we conducted six follow- up site visits to a nonprobability sample of surveyed assets. We selected the sites for visits judgmentally based on the survey responses regarding issues addressed in this report. During these site visits, we spoke with installation personnel, including asset owners and operators, about their reliance on supporting electrical infrastructure and electricity providers. While findings from our site visits are not generalizable to all 34 most critical assets, we obtained follow-up survey information from installation personnel for critical assets and visited those assets to validate the survey responses, as applicable. We clarified responders' interpretation of the survey questions, discussed their responses in detail, and visited the critical assets and their supporting infrastructure to better understand each asset's unique situation. Finally, we reviewed documentation and guidance related to those critical assets, including vulnerability assessments. We conducted this performance audit from October 2008 through October 2009 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. [End of section] Appendix II: Typical Electrical Power Vulnerabilities and Remediation Measures: Common types of electrical power vulnerabilities: Co-location of primary and backup electrical power equipment; Examples of electrical power vulnerabilities: Both the primary and backup power supply systems exist in the same room for convenience of maintenance; Possible remediation measures: * Implement physical diversity in location of backup support; * Ensure fire suppression systems support continued operation of non- affected systems; * Increase security on the location during higher threat periods. Common types of electrical power vulnerabilities: Single transformer provides both commercial and backup power to a critical asset; Examples of electrical power vulnerabilities: Alternate paths that supply electrical power converge at single component (i.e., a transformer) and represent potential point of failure if common component fails; Possible remediation measures: * Have independent commercial and backup power paths; * Identify alternate location to relocate critical operations; * Use portable generations and uninterruptible power supplies to provide power in case of a single component failure; * Arrange for immediate emergency maintenance response to restore the component capability. Common types of electrical power vulnerabilities: Critical electrical power assets have no access controls; Examples of electrical power vulnerabilities: Access to buildings that house electrical power supplies to critical assets; Possible remediation measures: * Establish strict access control procedures for buildings and areas housing important system components; * Relocate important system components to secured areas; * Bury electric power lines or protect poles with anti-ram barriers. Common types of electrical power vulnerabilities: Power lines share right-of-way with other key utilities; Examples of electrical power vulnerabilities: Bridges, tunnels, and trenches often involve shared rights-of-way for electrical power that may contain other key utilities; Possible remediation measures: * Establish mitigation options, such as backup power or transferring mission to another location, based on loss of the right-of-way; * Establish agreements with local community to increase security or patrols for these locations during increased threat periods; * Be aware of maintenance or repair activities for other utilities in these locations. Common types of electrical power vulnerabilities: Backup generation is insufficient; Examples of electrical power vulnerabilities: Generators and uninterruptible power supplies are not large enough to support the critical asset in case of primary power loss or in case the location does not stockpile sufficient fuel to support the operational time frame during an electrical power loss; Possible remediation measures: * Determine critical asset needs and purchase backup generators accordingly; * Maintain at least minimum operational requirements for consumables (i.e., fuel); * Distribute critical asset operations to other backup power supplied locations. Source: DOD, Defense Critical Infrastructure Program: Infrastructure Resiliency Guide: Reduce Your Vulnerabilities and Make Your Infrastructure Stronger, Version 1.0 (May 2007). [End of table] [End of section] Appendix III: Survey of DOD Critical Assets: United States Government Accountability Office: Survey of DOD Critical Assets Accountability: Introduction: The U.S. Government Accountability Office (GAO) is an independent, non- partisan legislative branch agency that assists Congress in evaluating how the federal government spends taxpayer dollars. GAO supports the Congress in meeting its constitutional responsibilities and to help improve the performance and ensure the accountability of the federal government for the benefit of the American people. GAO provides Congress with timely information that is objective, fact-based, nonpartisan, nonideological, fair, and balanced. In response to a congressional mandate in the House Report on the National Defense Authorization Act for Fiscal Year 2009, Title XXVIII, Defense Critical Infrastructure Program, Report 110-652 (May 16, 2008), GAO is conducting a review of the Assurance of Electrical Power Supplies to DOD Critical Assets (GAO code 351266). The following critical asset was selected for this survey: Please enter asset here: Since you have been identified as a subject matter expert for this asset, we ask that you coordinate the completion of this survey with other officials as necessary and return one consolidated survey for this asset. Follow-Up: After we receive your reply, we may call you to schedule a follow-up telephone interview if we need to clarify some answers in the survey. Deadline: To assist us, we ask that you complete and return this survey by June 5, 2009, via SIPRNet to ArtadiD@gao.gov. Please return the completed survey by e-mail. Simply save this file to your classified computer desktop, hard drive, or disk and attach it to your e-mail. Instructions for Completing This Survey: You can answer most of the questions easily by checking boxes or filling in blanks. A few questions request narrative answers. Please note that the space provided will expand to accommodate your answer. You may write additional comments at the end of the survey. We request that you provide the most recent information from no earlier than January 1, 2006. * Please use your mouse to navigate throughout the survey by clicking on the field or check box you wish to fill in. Do not use the "Tab" or "Enter" keys as doing so may cause formatting problems. * To select or deselect a check box, simply click or double click on the box. * Please indicate the security classification of your narrative responses by writing (U) for "unclassified" or (S) for "SECRET" at the beginning of each entry or paragraph, as appropriate. Please limit your responses to Task Critical Asset information classified no higher than "SECRET" in accordance with the Defense Critical Infrastructure Program (DCIP) Security Classification Guide, May 2007. Contact Information: Thanks in advance for taking the time to complete this survey. If you have any questions about the survey or security classification of your responses, please contact either: David Artadi, GAO Analyst-in-Charge: Phone: (404) 679-1989: SIPRNet: ArtadiD@gao.gov: or: Lt Col Norman Worthen: Phone: (703) 693-7542: SIPRNet:: Norman.Worthen@js.pentagon.smil.mil: Thank you for your help. Contact Information: 1. Although several people may participate in the completion of this survey, we ask that you provide contact information below for the person coordinating the completion of the survey in case we need to follow-up with additional questions. Name: Rank: Title: Unit Name: Base/Organization: Commercial Phone #: ( ): E-mail: SIPRNet: Section A. Reliance on Electrical Power: Again, please enter the name of the asset for which this survey is being completed. 2. Does this asset require electrical power in order to function and support its military mission(s)? (Mark x only one response): Yes: No: Skip To Question #62: 3. To what extent does this critical asset require electrical power to function? (Mark only x one response): All of the time (continuous/constant): Most of the time: About half of the time: Less than half of the time: None of the time: No: Skip To Question #62: Please explain if necessary: 4. Does this critical asset require supporting infrastructure, such as water; natural gas; heating, ventilating, and air conditioning (HVAC); or any other supporting utility to function? (Mark x only one response): Yes: No: Skip To Question #6: 5. Does this critical asset's supporting infrastructure require electrical power to function? (Mark x only one response): Yes: No: 6. From what source does this asset generally receive its primary electrical power supply? (Mark x only one response): Non-DOD electricity provider(s) or utility(ies) (e.g., the commercial power grid): * Name of provider(s) or utility(ies): DOD-generated electricity supply based on fossil fuels (e.g., diesel- powered generators): DOD-generated electricity supply based on solar energy: DOD-generated electricity supply based on geothermal energy 1-1 DOD- generated electricity supply based on wind energy: DOD-generated electricity supply based on biomass energy: DOD-generated electricity supply based on nuclear energy: 7. Does this asset rely on an intermediate or transitional uninterruptible power supply (UPS) (i.e. a battery backup) to provide power in the event of an electrical power disruption? (Mark x only one response): Yes: How many minutes is the UPS expected to provide electrical power to the asset?: * minutes No: Why not? 8. Does this asset have a back-up power source, other than UPS, in the event of an electrical power disruption from any of the following sources? (Mark x one response for each row): Source: a. Batteries or fuel cells (other than UPS): Yes: No: b. Non-DOD electricity provider(s)/utility(ies) (e.g., the commercial power grid): Yes: No: * Name of provider(s) or utility(ies): c. DOD-generated electricity supply based on fossil fuels (e.g., diesel- powered generators): Yes: No: d. DOD-generated electricity supply based on solar energy: Yes: No: e. DOD-generated electricity supply based on geothermal energy: Yes: No: f. DOD-generated electricity supply based on wind energy: Yes: No: g. DOD-generated electricity supply based on biomass energy: Yes: No: h. DOD-generated electricity supply based on nuclear energy: Yes: No: 9. How long, collectively, can back-up electrical power sources identified in question 8 provide electricity to the critical asset? (Mark x only one response) Less than 24 hours: Between 1 and 3 days (72 hours): More than 3 days up to 1 week: Between 1 and 2 weeks: Over 2 weeks: Indefinitely (as long as fuel is available): Section B. Back-Up Generators: 10. Do the back-up electrical power sources identified in question 8 involve electrical power generators? (Mark x only one response): Yes: No: Skip To Question #25 11. Are back-up generators dedicated to the critical asset or shared with other critical assets or infrastructure? (Mark x only one response): Dedicated to the critical asset: Shared with other critical assets or infrastructure: 12. Is the back-up generator(s) sufficient to maintain the critical asset and meet its mission(s) requirements? Yes: No: Skip To Question #25: 13. How many days can these generators function before requiring replenishing energy supplies (e.g., diesel fuel, natural gas, JP-8, etc.)? days: 14. How many days would the energy supply that is currently stored at the installation or location of the critical asset be able to support these generators? days: 15. How many days can these generators function before requiring preventive maintenance? days: 16. How many days can these generators function before requiring corrective maintenance? days: 17. Do you have another back-up generator that could be utilized while performing preventive or corrective maintenance on the primary generator? Yes: No: 18. How frequently are the generators identified in question 10 above subject to inspection and preventive maintenance to ensure that they function as intended? 19. Do you conduct inspections and preventive maintenance to these generators as prescribed by schedule requirements?: Yes: No: 20. How frequently are these generators subject to routine testing to ensure that they function as intended? 21. What plans, if any, do you have to obtain additional energy supplies for these generators once currently stocked supplies run out? 22. What size (in terms of electricity production capacity, such as kilowatts) are these generators? 23. What are the electrical requirements (such as kilowatts) for the critical asset? 24. When was this electrical requirement last validated? (date): Section C. Unplanned Disruptions to Electrical Power: 25. How many unplanned disruptions, if any, to this asset's primary electrical power sources have occurred between January 1, 2006, and December 31, 2008? (Mark only one response): Zero: l to 5: 6 to 10: More than 10: Unknown: 26. When did the disruption(s) occur? (List date(s) for each disruption): 27. How long did each of these disruptions last? 28. Do you know the cause(s) for each disruption? Yes: No: Skip To Question #31: 29. What were the causes of each disruption? 30. What trends, if any, did you identify regarding causes of the disruptions? 31. How, if at all, did the disruption(s) affect the asset's mission(s)? 32. What actions, if any, did you take to mitigate the impact of the disruption(s) on the asset's mission(s)? 33. Is this asset incorporated into its electricity provider's/utility's reconstitution or restoration planning? (Mark x only one response): Yes: No: Unknown: 34. Have any cyber or computer-based attacks or probes occurred that have negatively affected the delivery of electrical power to the asset or its supporting infrastructure? (Mark x only one response): Yes: No: Skip To Question #37: Unknown 4 Skip To Question #37: 35. How did you determine that such cyber or computer-based attacks or probes occurred? (Mark m only one response) 36. Who did you inform, if anyone, about the cyber or computer-based attacks or probes? (Mark x only one response) Section D. Assessments: 37. Were any assessments conducted between January 1, 2006, and December 31, 2008, that specifically examined (1) the vulnerabilities of this asset to electrical power disruptions and/or (2) the risks of electrical power disruptions to this asset? (Mark only one response): Yes: No: Skip To Question #54: 38. What organization(s) conducted the assessment(s)? 39. What were the date(s) of the assessment(s)? 40. Did the assessment(s) consider vulnerabilities or risks up to one node (electrical power substation) nearest to the installation or location of the critical asset (i.e., "one node beyond the fence")? (Mark x only one response): Yes: No: 41. Did the assessment(s) consider vulnerabilities or risks beyond one node (electrical power substation) nearest to the installation or location of the critical asset (i.e., more than "one node beyond the fence")? (Mark x only one response): Yes: No: 42. Which of the following vulnerabilities or risks listed below were identified from the assessments? (Mark x one response for each row): Vulnerabilities or risks: a. The reliability and resiliency of a commercial or DOD installation's power grid. Yes: No: b. The physical security of commercial and DOD electrical power infrastructures. Yes: No: c. The cyber-security of commercial and DOD electrical power infrastructures. Yes: No: d. The lack of back-up electrical generation capabilities (maintenance, testing, fuel supplies, etc.). Yes: No: e. Single points of failure within commercial/DOD electrical power infrastructures. Yes: No: f. The lack of contingency plans for addressing electrical power disruptions to critical assets. Yes: No: g. Other vulnerability or risk 4 Please describe: Yes: No: 43. What detail was provided about each vulnerability or risk identified in question #42 above? Section E. Measures Taken: 44. Were measures proposed or recommended to address or manage these vulnerabilities or risks? (Mark x only one response): Yes: No: Skip To Question #54: 45. What measures were proposed or recommended to address or manage these vulnerabilities or risks? 46. At what level within DOD was the decision made to implement the recommended measure(s) or not implement the measure(s) and accept the risks? 47. What criteria, if any, were used in determining which measure(s) would be taken to address, manage, or accept vulnerabilities or risks (e.g., asset criticality, costs, staffing, technology, funding availability, time constraints, prior Base Realignment and Closure decisions, etc.)? 48. Was the decision made to implement the recommended measure(s) or not implement the measure(s) and accept the vulnerabilities or risks? Yes, implement recommended measure(s): No, decided not to implement the recommended measure(s) and accept the vulnerabilities or risks: 49. Were measures selected for implementation? Yes: No: Skip To Question #54: 50. What were the estimated costs for implementing these measures? 51. Have these measures been implemented, scheduled for implementation, or not scheduled for implementation at this time? (Mark x for all that apply). Been implemented: Please identify measure(s): Been scheduled for implementation: Please identify measure(s): Not scheduled for implementation at this time: Please identify measure(s): 52. Which DOD major budget category was (or is being) used to implement these measures? (Mark x for all that apply). Operations and Maintenance: Military Personnel: Procurement: Research and Development: Other (Please specify): Unknown: 53. What DoD organizational level implemented (or is implementing) these measures? (Mark x for all that apply). Host installation: Higher headquarters: Major command: Combatant command: Other (Please specify): Unknown: Section F. Coordination with Other Entities: 54. Is this asset located within the United States? Yes: No: Skip To Question #57: 55. To what extent, if at all, did you or the host installation of this asset coordinate with U.S. electricity provider(s) to identify or address potential vulnerabilities or risks identified in question 42 above? (Mark x only one response): Not at all: Skip To Question #62: Some extent: Moderate extent: Great extent: 56. What was the nature of the coordination with U.S. electricity providers? 57. Is this asset located outside the United States? Yes: No: Skip To Question #62: 58. Have there been any efforts to coordinate with host-nation governments and/or foreign- owned electricity providers to identify or address potential vulnerabilities or risks identified in question #40 above? Yes: No: Skip To Question #62: Unknown 4 Skip To Question #62: 59. What was the nature of the coordination with the host-nation governments and/or foreign-owned electricity provider(s)? 60. Did you or the host installation of this asset coordinate with any other organizations or entities (other than U.S. electricity providers or host-nation governments and/or foreign-owned electricity provider(s)) to identify or address potential vulnerabilities or risks? (Mark x only one response): Yes: No: Skip To Question #62: 61. With whom did you or the host installation of this asset coordinate? Section G. Additional Information: 62. Please provide any additional information about efforts to identify, assess, or address the vulnerabilities and risks associated with electrical power disruptions to this asset that may not have been addressed through the previous questions. [End of section] Appendix IV: Survey of DOD Critical Asset Missions: United States Government Accountability: Survey of DOD Critical Asset Missions: Introduction: The U.S. Government Accountability Office (GAO) is an independent, non- partisan legislative branch agency that assists Congress in evaluating how the federal government spends taxpayer dollars. GAO supports the Congress in meeting its constitutional responsibilities and to help improve the performance and ensure the accountability of the federal government for the benefit of the American people. GAO provides Congress with timely information that is objective, fact-based, nonpartisan, nonideological, fair, and balanced. In response to a congressional mandate in the House Report on the National Defense Authorization Act for Fiscal Year 2009, Title XXVIII, Defense Critical Infrastructure Program, Report 110-652 (May 16, 2008), GAO is conducting a review of the Assurance of Electrical Power Supplies to DOD Critical Assets (GAO code 351266). The following critical asset was selected for this survey: Please enter asset here: Since the Joint Staff (J-34) has agreed to respond to the mission- related questions for this asset, we ask that the Joint Staff (J-34) coordinate the completion of this survey with other officials as necessary and return one consolidated survey for this asset. Follow-Up: After we receive your reply, we may call you to schedule a follow-up telephone interview if we need to clarify some answers in the survey. Deadline: To assist us, we ask that you complete and return this survey by June 26, 2009, to David Artadi via SIPRNet at ArtadiD@gao.sgov.gov or to Mark Pross via JWICS at igproma@dodigic.gov, as appropriate. Please return the completed survey by e-mail. Simply save this file to your classified computer desktop, hard drive, or disk and attach it to your e-mail. Instructions for Completing This Survey: You can answer most of the questions easily by checking boxes or filling in blanks. A few questions request narrative answers. Please note that the space provided will expand to accommodate your answer. You may write additional comments at the end of the survey. We request that you provide the most recent information from no earlier than January 1, 2006. * Please use your mouse to navigate throughout the survey by clicking on the field or check box you wish to fill in. Do not use the "Tab" or "Enter" keys as doing so may cause formatting problems. * To select or deselect a check box, simply click or double click on the box. * Please indicate the security classification of your narrative responses by writing (U) for "unclassified," (S) for "SECRET," or (TS) for TOP SECRET at the beginning of each entry or paragraph, as appropriate. However, please try to limit your responses to Task Critical Asset information classified no higher than "SECRET" in accordance with the Defense Critical Infrastructure Program (DCIP) Security Classification Guide, May 2007. Contact Information: Thanks in advance for taking the time to complete this survey. If you have any questions about the survey, please contact: David Artadi, GAO Analyst-in-Charge: Phone: (404) 679-1989: SIPRNet: ArtadiD@gao.sgov.gov. Thank you for your help. Section A. Background: Again, please enter the name of the asset for which this survey is being completed. 1. Within which DCIP defense sector(s), as identified in DOD Directive 3020.40, Defense Critical Infrastructure Program (DCIP), is this asset? (Mark x all that apply.) Defense Industrial Base (DIB): Financial Services: Global Information Grid (GIG): Health Affairs: Intelligence, Surveillance, and Reconnaissance (ISR): Logistics: Personnel: Public Works: Space: Transportation: Unknown: 2. Where is this asset physically located? (Mark x only one response): At a military installation: please specify name of installation: At a commercial facility: please specify name of facility: At an industrial site: please specify name of industrial site: At a stand-alone facility: please specify name of facility: 3. What is the nearest city (and U.S. state or country) to this installation, facility, or site? a. City: b. State (only if in the U.S.): c. Country (only if outside the U.S.): 4. Who owns the asset? (Mark x only one response): DOD military service: please specify: DOD combatant command: please specify: Other DOD organization: please specify: Other (non-DOD) U.S. government organization (federal, state, or local): please specify: U.S. private organization: please specify: Foreign military organization: please specify: Foreign government (nonmilitary) please specify: Foreign private company: please specify: Other: please specify: 5. Who primarily operates the asset during normal operational status? (Mark x all that apply.) DOD military department: please specify: DOD combatant command: please specify: Other DOD organization: please specify: Other (non-DOD) U.S. government organization (federal, state, or local): please specify: U.S. private organization: please specify: Foreign military: please specify: Foreign government (nonmilitary): please specify: Foreign private company: please specify: Other: please specify: Section B. Mission(s), Combatant Command(s), and Military Service(s) Supported by Asset: 6. Which military mission(s) does this asset support within DOD during normal operational status other than those missions already described in the document that the Joint Staff (J-34) provided to GAO about the surveyed assets on November 19, 2008? (Please list and describe the mission(s) based on the "mission impact statements"and "mission essential tasks"”as defined in DOD Manual 3020.45, Vol. I, DOD Critical Asset Identification Process (Oct. 24, 2008)”that were used to designate this asset at its current DCIP critical asset classification.): 7. For the military missions identified in question #6, which DOD Unified Combatant Command(s) with regional responsibilities, if any, does this asset support? (Mark x all that apply): United States Africa Command (USAFRICOM): United States Central Command (USCENTCOM): United States European Command (USEUCOM): United States Northern Command (USNORTHCOM): United States Pacific Command (USPACOM): United States Southern Command (USSOUTHCOM): 8. For the military missions identified in question #6, which DOD Unified Combatant Command(s) with functional responsibilities, if any, does this asset support? (Mark x all that apply): United States Joint Forces Command (USJFCOM): United States Special Operations Command (USSOCOM): United States Strategic Command (USSTRATCOM): United States Transportation Command (USTRANSCOM): 9. For the military missions identified in question #6, which DOD military service(s), if any, does this asset support? (Mark m all that apply): United States Army: United States Air Force: United States Navy: United States Marine Corps: 10. For the military missions identified in question #6, which other DOD agencies or organizations, if any, does this asset support? 11. Which non-DOD mission(s), if any, does this asset support during normal operational status? (Please include the names of the non-DOD organizations whose missions are supported by the asset.) 12. Please provide any additional information regarding the missions, combatant commands, and military services supported by the asset that may not have been addressed through the previous questions. [End of section] Appendix V: Survey of Coordination Efforts for DOD Critical Assets: United States Government Accountability Office: Survey of Coordination Efforts for DOD Critical Assets: Introduction: The U.S. Government Accountability Office (GAO) is an independent, non- partisan legislative branch agency that assists Congress in evaluating how the federal government spends taxpayer dollars. GAO supports the Congress in meeting its constitutional responsibilities and to help improve the performance and ensure the accountability of the federal government for the benefit of the American people. GAO provides Congress with timely information that is objective, fact-based, nonpartisan, nonideological, fair, and balanced. In response to a congressional mandate in the House Report on the National Defense Authorization Act for Fiscal Year 2009, Title XXVIII, Defense Critical Infrastructure Program, Report 110-652 (May 16, 2008), GAO is conducting a review of the Assurance of Electrical Power Supplies to DOD Critical Assets (GAO code 351266). The following critical asset was selected for this survey: Please enter asset here: Since ASD(HD&ASA)/DCIP Office has agreed to respond to the coordination- related questions for this asset, we ask that ASD(HD&ASA)/DCIP Office coordinate the completion of this survey with other officials as necessary and return one consolidated survey for this asset. Follow-Up: After we receive your reply, we may call you to schedule a follow-up telephone interview if we need to clarify some answers in the survey. Deadline: To assist us, we ask that you complete and return this survey by June 26, 2009, to David Artadi via SIPRNet at ArtadiD@gao.sgov.gov or to Mark Pross via JWICS at igproma@dodig.ic.gov, as appropriate. Please return the completed survey by e-mail. Simply save this file to your classified computer desktop, hard drive, or disk and attach it to your e-mail. Instructions for Completing This Survey: You can answer most of the questions easily by checking boxes or filling in blanks. A few questions request narrative answers. Please note that the space provided will expand to accommodate your answer. You may write additional comments at the end of the survey. We request that you provide the most recent information from no earlier than January 1, 2006. * Please use your mouse to navigate throughout the survey by clicking on the field or check box you wish to fill in. Do not use the "Tab" or "Enter" keys as doing so may cause formatting problems. * To select or deselect a check box, simply click or double click on the box. * Please indicate the security classification of your narrative responses by writing (U) for "unclassified," (S) for "SECRET," or (TS) for TOP SECRET at the beginning of each entry or paragraph, as appropriate. However, please try to limit your responses to Task Critical Asset information classified no higher than "SECRET" in accordance with the Defense Critical Infrastructure Program (DCIP) Security Classification Guide, May 2007. Contact Information: Thanks in advance for taking the time to complete this survey. If you have any questions about the survey, please contact: David Artadi, GAO Analyst-in-Charge: Phone: (404) 679-1989: SIPRNet: ArtadiD@gao.sgov.gov. Thank you for your help. Section A. Coordination with DOD DCIP Stakeholders: Again, please enter the name of the asset for which this survey is being completed. 1. To what extent has coordination taken place between the owner/custodian/operator of this asset with the following DOD DCIP stakeholders to identify and/or address potential vulnerabilities or risks involving electrical power disruptions? (Mark x one response for each row) DOD DCIP stakeholders: a. Military service(s): (Specify service(s): Not at all: Some extent: Moderate extent: Great Extent: DOD DCIP stakeholders: b. Combatant command(s): (Specify command(s): Not at all: Some extent: Moderate extent: Great Extent: DOD DCIP stakeholders: c. Defense Infrastructure Sector Lead Agent(s): (Specify Agent(s): Not at all: Some extent: Moderate extent: Great Extent: DOD DCIP stakeholders: d.ASD(HD&ASA)/DCIP Office: Not at all: Some extent: Moderate extent: Great Extent: DOD DCIP stakeholders: e. Joint Staff (J-34): Not at all: Some extent: Moderate extent: Great Extent: DOD DCIP stakeholders: f.Mission Assurance Division/Dahlgren, VA: Not at all: Some extent: Moderate extent: Great Extent: DOD DCIP stakeholders: g. Defense Threat Reduction Agency (DTRA): Not at all: Some extent: Moderate extent: Great Extent: DOD DCIP stakeholders: h. Other DOD DCIP stakeholder(s) (Specify other stakeholder(s): Not at all: Some extent: Moderate extent: Great Extent: Note: If you answered "Not At All" to Question #1, skip to Question #4. Otherwise, continue to Question #2. 2. What was the nature of the coordination with these DOD DCIP stakeholders? 3. What impact, if any, did this coordination with these DOD DCIP stakeholders have on identifying and/or addressing potential vulnerabilities or risks to the asset? Section B. Coordination with Non-DOD Entities: 4. To what extent has coordination taken place between DOD stakeholders and the U.S. Department of Homeland Security to identify and/or address potential vulnerabilities or risks involving electrical power disruptions to the asset? Not at all: Skip To Question #8: Some extent: Moderate extent: Great extent: 5. Which DOD stakeholder(s) were involved in these coordination efforts with the U.S. Department of Homeland Security? 6. What was the nature of the coordination with the U.S. Department of Homeland Security? 7. What impact, if any, did this coordination with the U.S. Department of Homeland Security have on identifying and/or addressing potential vulnerabilities or risks involving electrical power disruptions to the asset? 8. To what extent has coordination taken place between DOD stakeholders and the U.S. Department of Energy to identify and/or address potential vulnerabilities or risks involving electrical power disruptions to the asset? Not at all (Skip to question #12.): Some extent: Moderate extent: Great extent: 9. Which DOD stakeholder(s) were involved in these coordination efforts with the U.S. Department of Energy? 10. What was the nature of the coordination with the U.S. Department of Energy? 11. What impact, if any, did this coordination with the U.S. Department of Energy have on identifying and/or addressing potential vulnerabilities or risks to the asset? 12. To what extent has coordination taken place between DOD stakeholders and the U.S. Federal Energy Regulatory Commission (FERC) to identify and/or address potential vulnerabilities or risks involving electrical power disruptions to the asset? Not at all: Skip To Question #16: Some extent: Moderate extent: Great extent: 13. Which DOD stakeholder(s) were involved in these coordination efforts with the FERC? 14. What was the nature of the coordination with the FERC? 15. What impact, if any, did this coordination with the FERC have on identifying and/or addressing potential vulnerabilities or risks to the asset? 16. To what extent has coordination taken place between DOD stakeholders and the North American Electric Reliability Corporation (NERC) to identify and/or address potential vulnerabilities or risks involving electrical power disruptions to the asset? Not at all: Skip To Question #20: Some extent: Moderate extent: Great extent: 17. Which DOD stakeholder(s) were involved in these coordination efforts with the NERC? 18. What was the nature of the coordination with the NERC? 19. What impact, if any, did this coordination with the NERC have on identifying and/or addressing potential vulnerabilities or risks to the asset? 20. To what extent has coordination taken place between DOD stakeholders and DOE national laboratories to identify and/or address potential vulnerabilities or risks involving electrical power disruptions to the asset? Not at all: Skip To Question #24: Some extent (Specify laboratory(ies): Moderate extent (Specify laboratory(ies): Great extent (Specify laboratory(ies): 21. Which DOD stakeholder(s) were involved in these coordination efforts with DOE national laboratories? 22. What was the nature of the coordination with DOE national laboratories? 23. What impact, if any, did this coordination with DOE national laboratories have on identifying and/or addressing potential vulnerabilities or risks to the asset? 24. To what extent has coordination taken place between DOD stakeholders and the U.S. Department of State to identify and/or address potential vulnerabilities or risks involving electrical power disruptions to the asset? Not at all: Skip To Question #28: Some extent: Moderate extent: Great extent: 25. Which DOD stakeholder(s) were involved in these coordination efforts with the U.S. Department of State? 26. What was the nature of the coordination with the U.S. Department of State? 27. What impact, if any, did this coordination with the U.S. Department of State have on identifying and/or addressing potential vulnerabilities or risks to the asset? 28. To what extent has coordination taken place between DOD stakeholders and electrical power industry associations to identify and/or address potential vulnerabilities or risks involving electrical power disruptions to the asset? Not at all: Skip To Question #32: Some extent (Specify association(s): Moderate extent (Specify association(s): Great extent (Specify association(s): 29. Which DOD stakeholder(s) were involved in these coordination efforts with electrical power industry associations? 30. What was the nature of the coordination with electrical power industry associations? 31. What impact, if any, did this coordination have on identifying and/or addressing potential vulnerabilities or risks to the asset? 32. To what extent has coordination taken place between DOD stakeholders and any other organizations not mentioned above to identify and/or address potential vulnerabilities or risks involving electrical power disruptions to the asset? Not at all: Skip To Question #26: Some extent (Specify other organization(s): Moderate extent (Specify other organization(s): Great extent (Specify other organization(s): 33. Which DOD stakeholder(s) were involved in these coordination efforts with these other organizations? 34. What was the nature of the coordination with these other organizations? 35. What impact, if any, did this coordination with these other organizations have on identifying and/or addressing potential vulnerabilities or risks to the asset? 36. Please provide any additional information regarding coordination with DOD or non- DOD organizations to identify and/or address potential vulnerabilities or risks involving electrical power disruptions to the asset that may not have been addressed through the previous questions. [End of section] Appendix VI Comments from the Department of Defense: Note: The cover letter for DOD's written comments indicates that the DOD Office of Security Review reviewed the draft report and recommended that the draft report be protected at the SECRET level. However, by deleting certain sections from the draft report, we were able to issue this unclassified report with the approval of the DOD Office of Security Review with a different report number. Assistant Secretary Of Defense: 2600 Defense Pentagon: Washington, D.C. 20301-2600: Homeland Defense & Americas' Security Affairs: October 6, 2009: Ms. Davi M. D'Agostino: Director, Defense Capabilities and Management U.S. Government Accountability Office: 441 G Street, N.W.: Washington, DC 20548: Dear Ms. D'Agostino: This is the Department of Defense (DoD) response to the GAO draft report, GAO-09-954C, "Defense Critical Infrastructure: Actions Needed to Improve the Identification and Management of Electrical Power Risks and Vulnerabilities to DoD Critical Assets," dated August 21, 2009 (GAO Code 351266). DoD concurs with the seven recommendations in the report. Our response to your recommendations is attached. The DoD Office of Security Review has reviewed the report and recommends that the report be protected at the SECRET level. Our point of contact for this action is Mr. Jamie Clark, Office of the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs (OASD (HD&ASA)), (703) 602-5730, Extension 142 or Jamie.Clark@osd.mil. Sincerely, Signed by: Paul N. Stockton: Attachment: As stated: GAO Draft Report ” Dated August 24, 2009: GAO CODE 351266/GA0-09-954C: "Defense Critical Infrastructure: Actions Needed to Improve the Identification and Management of Electrical Power Risks and Vulnerabilities to DoD Critical Assets" Department Of Defense Comments To The Recommendations: Recommendation 1: The GAO recommends that the Secretary of Defense direct the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs, in collaboration with the Joint Staffs Directorate for Antiterrorism and Homeland Defense, combatant commands, military services, and other Defense Critical Infrastructure stakeholders, as appropriate, to complete Defense Critical Infrastructure Program vulnerability assessments, as required by DoD Instruction 3020.45, on all of DoD's most critical assets by October 2011. DOD Response: Concur. The Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs (ASD (HD&ASA)) Defense Critical Infrastructure Program (DCIP) Office has been working closely with the Joint Staff, which is assigned responsibility for the implementation of vulnerability assessments in DoD Instruction 3020.45, to ensure that DCIP vulnerability assessments focus on DoD's most critical assets. The Joint Staff, in coordination with OASD (HD&ASA) has begun ensuring that these most critical assets are assessed utilizing an all-hazards and mission-assurance approach. Recommendation 2: The GAO recommends that the Secretary of Defense direct the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs, in collaboration with the Joint Staffs Directorate for Antiterrorism and Homeland Defense, combatant commands, military services, and other Defense Critical Infrastructure stakeholders, as appropriate, to develop additional guidelines, an implementation plan, and a schedule for conducting vulnerability assessments on all non-DoD-owned most critical assets located in the United States and abroad in conjunction with other federal agencies, as appropriate, that have a capability to implement the plan. DOD Response: Concur. The ASD (HD&ASA) DCIP Office has been working closely with the Joint Staff, which is assigned responsibility for the implementation of vulnerability assessments in DoD Instruction 3020.45, to ensure that DCIP vulnerability assessments focus on DoD's most critical assets. The Joint Staff, in coordination with OASD (HD&ASA) has begun ensuring that these most critical assets are assessed utilizing an all-hazards and mission- assurance approach, including the development of a self assessment capability. Non-DoD- owned assets, especially those located abroad, require agreement of owners and present significant challenges. The ASD(HD&ASA) DCIP Office is coordinating with the appropriate offices to determine if remote assessments of these assets are possible. Recommendation 3: The GAO recommends that the Secretary of Defense direct the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs, in collaboration with the Joint Staffs Directorate for Antiterrorism and Homeland Defense, combatant commands, military services, and other Defense Critical Infrastructure stakeholders, as appropriate, to establish a time frame for the military services to provide the infrastructure data required for the Public Works Infrastructure Sector Lead Agent-the U.S. Army Corps of Engineers-to conduct its preliminary technical analysis of public works (including electrical system) infrastructure at DoD installations that support DoD's most critical assets. DOD Response: Concur. The ASD(HD&ASA) DCIP Office has been working closely with the U.S. Army Corps of Engineers (USACE), which is the lead agent for the Public Works Defense Sector, to ensure that proper characterization of critical assets is taking place from a public works perspective. The effort, while time intensive, has so far been successful and is on- going. The USACE has completed its characterization of public works infrastructure "outside the fence" for all of DoD's most critical assets, and is working with the Military Services to obtain information on the public works infrastructure "inside the fence." Recommendation 4: The GAO recommends that the Secretary of Defense direct the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs, in collaboration with the Joint Staff's Directorate for Antiterrorism and Homeland Defense, combatant commands, military services, and other Defense Critical Infrastructure stakeholders, as appropriate, to finalize guidelines currently being developed to coordinate Defense Critical Infrastructure Program assessment criteria and processes more systematically with those of other DOD mission assurance programs. DOD Response: Concur. DoD Directive 3020.40 acknowledges the existence of, and the synergistic effect of various complimentary risk management program activities and security related functions in its definition of Mission Assurance. The other activities respond to their own directives and appropriations, and several have their own assessment programs, but they have not yet been brought under a common mission assurance umbrella. Critical Infrastructure Protection (CIP) at the installation level is in its early stages and is not yet mature. For example, many of the positions dealing with CIP at the installation level are additional duties. The Joint Staff is overseeing a vulnerability assessment way ahead to better synchronize these efforts. Recommendation 5: The GAO recommends that the Secretary of Defense direct the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs, in collaboration with the Joint Staff's Directorate for Antiterrorism and Homeland Defense, combatant commands, military services, and other Defense Critical Infrastructure stakeholders, as appropriate, to develop explicit Defense Critical Infrastructure Program guidelines for assessing the critical assets' vulnerabilities to long-term electrical power disruptions. DOD Response: Concur. The ASD (HD&ASA) DCIP Office will review current vulnerability assessment criteria and standards and work with the Joint Staff to include considerations of long-term electrical power disruptions. Vulnerabilities are directly related to mission and its duration and the duration of the outage. A significant number of critical assets have back up power sources available in the event that commercial power is disrupted. As GAO noted in its report, 25 of the 34 assets surveyed reported that electrical power disruptions resulted in no or minimal impact to their missions. The Department is working on providing the same protection from commercial power disruption to the remaining assets. Recommendation 6: The GAO recommends that the Secretary of Defense direct the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs, in collaboration with the Joint Staff's Directorate for Antiterrorism and Homeland Defense, combatant commands, military services, and other Defense Critical Infrastructure stakeholders, as appropriate, to develop a mechanism to systematically track the implementation of future Defense Critical Infrastructure Program risk management decisions and responses intended to address electrical power-related risks and vulnerabilities to DoD's most critical assets. DOD Response: Concur. The ASD(HD&ASA) DCIP Office has developed a draft DoD Manual 3020.45 Volume 5, Defense Critical Infrastructure Program (DCIP) Coordination Timeline, currently in coordination within the Department. The purpose of the manual is to provide uniform procedures for the execution of DCIP activities and timelines that OASD (HD&ASA), the Joint Staff, Military Departments, Combatant Commands, Defense Agencies, and the Defense Infrastructure Sector Lead Agencies will use to coordinate the execution of activities and responsibilities assigned in DoD Directive 3020.40, DoD Instruction 3020.45, DoD Manual 3020.45 Volumes 1 and 2, and the resultant risk decision packages. The DCIP Office is also developing an automated CAIP Collaboration Tool that will document and track the status of each organization's progress as they work through the risk management process. The Collaboration Tool in conjunction with the Coordination Timeline will serve as a forcing function to ensure the accomplishment of tasks and to provide feedback to the components on status of actions, including electrical power- related risks and vulnerabilities. Recommendation 7: The GAO recommends that the Secretary of Defense direct the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs, in collaboration with the Joint Staffs Directorate for Antiterrorism and Homeland Defense, combatant commands, military services, and other Defense Critical Infrastructure stakeholders, as appropriate, to ensure for DoD-owned most critical assets, and facilitate for non-DoD-owned most critical assets, that asset owners or host installations of the most critical assets, where appropriate, reach out to local electricity providers in an effort to coordinate and help remediate or mitigate risks and vulnerabilities to electrical power disruptions DOD Response: Concur. In May 2007, the ASD(HD&ASA) DCIP Office promulgated the DCIP Infrastructure Resiliency Guide that provides information for improving the resiliency of infrastructure systems, networks, and solutions for reducing risks to infrastructure networks. The Department has identified the common vulnerabilities to infrastructure as a result of numerous infrastructure vulnerability assessments conducted by multiple agencies and organizations within the Department of Defense. The guide is a compilation of these findings and the resultant corrective actions. The guide contains a section devoted to electric power and provides guidelines to government and private- sector decision makers and those responsible for electric power supply, to ensure electric power disruptions do not adversely or unexpectedly affect mission accomplishment. The guide includes such actions as: * Understand the requirements for electric power, how it is delivered, and the relative priority for restoring power; * Ensure and maintain provider awareness of critical times when power is essential to mission execution; * Work with the electric power providers to identify remedies to potential single points of failure. On October 28, 2008, the ASD(HD&ASA) DCIP Office also promulgated DoD Manual 3020.45 Volume 2, DCIP Remediation Planning which describes a process for DoD leaders, once risk has been assessed, to determine, plan, justify, and implement remediation actions to reduce risk to defense critical infrastructure. The manual acknowledges that the DoD mission depends upon public infrastructure networks and services such as transportation, electric power, and communication networks. The manual advises the DoD facility managers to establish good communications with public service providers about service requirement, and to review service level agreements, acquisition programs, contracts, and operational processes for opportunities to address and include stronger resiliency language and requirements for future remediation efforts. This guidance will be reinforced at DCIP collaboration forums such as Defense Critical Infrastructure Integration Staff, Operational Advisory Board, and Defense Infrastructure Sector Council. [End of section] Appendix VII: GAO Contact and Staff Acknowledgments: GAO Contact: Davi M. D'Agostino, (202) 512-5431 or dagostinod@gao.gov: Acknowledgments: In addition to the contact named above, Mark A. Pross, Assistant Director; David G. Artadi; James D. Ashley; Yecenia C. Camarillo; Gina M. Flacco; Brian K. Howell; Katherine S. Lenane; Greg A. Marchand; Michael S. Pose; Terry L. Richardson; John W. Van Schaik; Marc J. Schwartz; and Cheryl A. Weissman made key contributions to this report. [End of section] Related GAO Products: Defense Critical Infrastructure Protection: Defense Critical Infrastructure: Actions Needed to Improve the Consistency, Reliability, and Usefulness of DOD's Tier 1 Task Critical Asset List. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-09-740R]. Washington, D.C.: July 17, 2009. Defense Critical Infrastructure: Developing Training Standards and an Awareness of Existing Expertise Would Help DOD Assure the Availability of Critical Infrastructure. [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-09-42]. Washington, D.C.: October 30, 2008. Defense Critical Infrastructure: Adherence to Guidance Would Improve DOD's Approach to Identifying and Assuring the Availability of Critical Transportation Assets. [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-08-851]. Washington, D.C.: August 15, 2008. Defense Critical Infrastructure: DOD's Risk Analysis of Its Critical Infrastructure Omits Highly Sensitive Assets. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-373R]. Washington, D.C.: April 2, 2008. Defense Infrastructure: Management Actions Needed to Ensure Effectiveness of DOD's Risk Management Approach for the Defense Industrial Base. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07- 1077]. Washington, D.C.: August 31, 2007. Defense Infrastructure: Actions Needed to Guide DOD's Efforts to Identify, Prioritize, and Assess Its Critical Infrastructure. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-461]. Washington, D.C.: May 24, 2007. Critical Infrastructure Protection: The Department of Homeland Security's (DHS) Critical Infrastructure Protection Cost-Benefit Report. [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-09-654R]. Washington, D.C.: June 26, 2009. Influenza Pandemic: Opportunities Exist to Address Critical Infrastructure Protection Challenges That Require Federal and Private Sector Coordination. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO- 08-36]. Washington, D.C.: October 31, 2007. Critical Infrastructure: Sector Plans Complete and Sector Councils Evolving. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-1075T]. Washington, D.C.: July 12, 2007. Critical Infrastructure Protection: Sector Plans and Sector Councils Continue to Evolve. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO- 07-706R]. Washington, D.C.: July 10, 2007. Critical Infrastructure: Challenges Remain in Protecting Key Sectors. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-626T]. Washington, D.C.: March 20, 2007. Critical Infrastructure Protection: Progress Coordinating Government and Private Sector Efforts Varies by Sectors' Characteristics. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-39]. Washington, D.C.: October 16, 2006. Critical Infrastructure Protection: Challenges for Selected Agencies and Industry Sectors. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO- 03-233]. Washington, D.C.: February 28, 2003. Critical Infrastructure Protection: Commercial Satellite Security Should Be More Fully Addressed. [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-02-781]. Washington, D.C.: August 30, 2002. Electrical Power: Electricity Restructuring: FERC Could Take Additional Steps to Analyze Regional Transmission Organizations' Benefits and Performance. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-987]. Washington, D.C.: September 22, 2008. Department of Energy, Federal Energy Regulatory Commission: Mandatory Reliability Standards for Critical Infrastructure Protection. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-493R]. Washington, D.C.: February 21, 2008. Electricity Restructuring: Key Challenges Remain. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-06-237]. Washington, D.C.: November 15, 2005. Meeting Energy Demand in the 21st Century: Many Challenges and Key Questions. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-414T]. Washington, D.C.: March 16, 2005. Electricity Restructuring: Action Needed to Address Emerging Gaps in Federal Information Collection. [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-03-586]. Washington, D.C.: June 30, 2003. Restructured Electricity Markets: Three States' Experiences in Adding Generating Capacity. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO- 02-427]. Washington, D.C.: May 24, 2002. Energy Markets: Results of FERC Outage Study and Other Market Power Studies. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-1019T]. Washington, D.C.: August 2, 2001. Cybersecurity: Cybersecurity: Continued Federal Efforts Are Needed to Protect Critical Systems and Information. [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-09-835T]. Washington, D.C.: June 25, 2009. Information Security: Cyber Threats and Vulnerabilities Place Federal Systems at Risk. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-09- 661T]. Washington, D.C.: May 5, 2009. National Cybersecurity Strategy: Key Improvements Are Needed to Strengthen the Nation's Posture. [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-09-432T]. Washington, D.C.: March 10, 2009. Critical Infrastructure Protection: DHS Needs to Better Address Its Cybersecurity Responsibilities. [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-08-1157T]. Washington, D.C.: September 16, 2008. Critical Infrastructure Protection: DHS Needs to Fully Address Lessons Learned from Its First Cyber Storm Exercise. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-825]. Washington, D.C.: September 9, 2008. Cyber Analysis and Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability. [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-08-588]. Washington, D.C.: July 31, 2008. Critical Infrastructure Protection: Further Efforts Needed to Integrate Planning for and Response to Disruptions on Converged Voice and Data Networks. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-607]. Washington, D.C.: June 26, 2008. Information Security: TVA Needs to Address Weaknesses in Control Systems and Networks. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO- 08-526]. Washington, D.C.: May 21, 2008. Critical Infrastructure Protection: Sector-Specific Plans' Coverage of Key Cyber Security Elements Varies. [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-08-64T]. Washington, D.C.: October 31, 2007. Critical Infrastructure Protection: Sector-Specific Plans' Coverage of Key Cyber Security Elements Varies. [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-08-113]. Washington, D.C.: October 31, 2007. Critical Infrastructure Protection: Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-1036]. Washington, D.C.: September 10, 2007. Critical Infrastructure Protection: DHS Leadership Needed to Enhance Cybersecurity. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-06- 1087T]. Washington, D.C.: September 13, 2006. Critical Infrastructure Protection: Challenges in Addressing Cybersecurity. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05- 827T]. Washington, D.C.: July 19, 2005. Critical Infrastructure Protection: Department of Homeland Security Faces Challenges in Fulfilling Cybersecurity Responsibilities. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-434]. Washington, D.C.: May 26, 2005. Critical Infrastructure Protection: Improving Information Sharing with Infrastructure Sectors. [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-04-780]. Washington, D.C.: July 9, 2004. Technology Assessment: Cybersecurity for Critical Infrastructure Protection. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-321]. Washington, D.C.: May 28, 2004. Critical Infrastructure Protection: Establishing Effective Information Sharing with Infrastructure Sectors. [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-04-699T]. Washington, D.C.: April 21, 2004. Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04- 628T]. Washington, D.C.: March 30, 2004. Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04- 354]. Washington, D.C.: March 15, 2004. Posthearing Questions from the September 17, 2003, Hearing on "Implications of Power Blackouts for the Nation's Cybersecurity and Critical Infrastructure Protection: The Electric Grid, Critical Interdependencies, Vulnerabilities, and Readiness." [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-300R]. Washington, D.C.: December 8, 2003. Critical Infrastructure Protection: Challenges in Securing Control Systems. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-140T]. Washington, D.C.: October 1, 2003. Combating Terrorism: Observations on National Strategies Related to Terrorism. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-519T]. Washington, D.C.: March 3, 2003. Critical Infrastructure Protection: Efforts of the Financial Services Sector to Address Cyber Threats. [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-03-173]. Washington, D.C.: January 30, 2003. High-Risk Series: Protecting Information Systems Supporting the Federal Government and the Nation's Critical Infrastructures. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-121]. Washington, D.C.: January 2003. Critical Infrastructure Protection: Significant Challenges Need to Be Addressed. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-961T]. Washington, D.C.: July 24, 2002. Critical Infrastructure Protection: Federal Efforts Require a More Coordinated and Comprehensive Approach for Protecting Information Systems. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-474]. Washington, D.C.: July 15, 2002. Critical Infrastructure Protection: Significant Homeland Security Challenges Need to Be Addressed. [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-02-918T]. Washington, D.C.: July 9, 2002. Critical Infrastructure Protection: Significant Challenges in Safeguarding Government and Privately Controlled Systems from Computer- Based Attacks. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01- 1168T]. Washington, D.C.: September 26, 2001. Critical Infrastructure Protection: Significant Challenges in Protecting Federal Systems and Developing Analysis and Warning Capabilities. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01- 1132T]. Washington, D.C.: September 12, 2001. Critical Infrastructure Protection: Significant Challenges in Developing Analysis, Warning, and Response Capabilities. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-1005T]. Washington, D.C.: July 25, 2001. Critical Infrastructure Protection: Significant Challenges in Developing Analysis, Warning, and Response Capabilities. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-769T]. Washington, D.C.: May 22, 2001. Critical Infrastructure Protection: Significant Challenges in Developing National Capabilities. [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-01-323]. Washington, D.C.: April 25, 2001. Critical Infrastructure Protection: Challenges to Building a Comprehensive Strategy for Information Sharing and Coordination. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-AIMD-00-268]. Washington, D.C.: July 26, 2000. Critical Infrastructure Protection: Comments on the Proposed Cyber Security Information Act of 2000. [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO/T-AIMD-00-229]. Washington, D.C.: June 22, 2000. Critical Infrastructure Protection: "ILOVEYOU" Computer Virus Highlights Need for Improved Alert and Coordination Capabilities. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-AIMD-00-181]. Washington, D.C.: May 18, 2000. Critical Infrastructure Protection: National Plan for Information Systems Protection. [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO/AIMD-00-90R]. Washington, D.C.: February 11, 2000. Critical Infrastructure Protection: Comments on the National Plan for Information Systems Protection. [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO/T-AIMD-00-72]. Washington, D.C.: February 1, 2000. Critical Infrastructure Protection: Fundamental Improvements Needed to Assure Security of Federal Operations. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-AIMD-00-7]. Washington, D.C.: October 6, 1999. Critical Infrastructure Protection: Comprehensive Strategy Can Draw on Year 2000 Experiences. [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO/AIMD-00-1]. Washington, D.C.: October 1, 1999. [End of section] Footnotes: [1] Although DOD's validated list of its most critical assets totals 29 assets, for purposes of this report, we refer to 34 most critical assets, since 4 of them have several components. Together, these components represent a larger capability, which constitutes the most critical asset. [2] The U.S. commercial electrical power grid is a system of synchronized power providers and consumers connected by transmission and distribution lines and operated by one or more control centers. The U.S. power grid serving the contiguous 48 states is composed of three distinct power grids, or "interconnections"--the Eastern Interconnection, the Western Interconnection, and the Electric Reliability Council of Texas Interconnection. These interconnections provide power to the continental United States, Canada, and a small portion of northern Mexico. [3] GAO, Defense Management: Overarching Organizational Framework Needed to Guide and Oversee Energy Reduction Efforts for Military Operations, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-426] (Washington, D.C.: Mar. 13, 2008). [4] Defense Science Board, Report of the Defense Science Board Task Force on DOD Energy Strategy, "More Fight--Less Fuel" (Washington, D.C., February 2008). [5] For purposes of this report, we are using "risk" and "vulnerability" as defined in DOD Directive 3020.40, Defense Critical Infrastructure Program (DCIP) (Aug. 19, 2005). The directive defines "risk" as the probability and severity of loss linked to threats and hazards and defines "vulnerability" as the characteristics of an installation, system, asset, application, or its dependencies that could cause it to suffer a degradation or loss (incapacity to perform its designated function) as a result of having been subjected to a certain level of threat or hazard. [6] While DOD acknowledges that the execution of its missions depends heavily on ensuring the availability of electrical power to installations with critical assets, DOD is not responsible for improving the reliability of the commercial electrical power grid. [7] GAO, Defense Infrastructure: Actions Needed to Guide DOD's Efforts to Identify, Prioritize, and Assess Its Critical Infrastructure, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-461] (Washington, D.C.: May 24, 2007). Also, see Related GAO Products at the end of this report. [8] Earlier programs analogous to DCIP can be traced back to 1998. [9] DOD Directive 3020.40, Defense Critical Infrastructure Program (DCIP) (Aug. 19, 2005). [10] DOD Instruction 3020.45, Defense Critical Infrastructure Program (DCIP) Management (Apr. 21, 2008). [11] DOD Manual 3020.45, Volume 1, Defense Critical Infrastructure Program (DCIP) DOD Mission-Based Critical Asset Identification Process (CAIP) (Oct. 24, 2008), and DOD Manual 3020.45, Volume 2, Defense Critical Infrastructure Program (DCIP) DCIP Remediation Planning (Oct. 28, 2008). [12] The 10 defense sectors are the Defense Industrial Base; Financial Services; Global Information Grid; Health Affairs; Intelligence, Surveillance, and Reconnaissance; Logistics; Personnel; Public Works; Space; and Transportation. [13] The National Infrastructure Protection Plan is a risk management framework intended to protect the nation's critical infrastructures and key resources. This framework is composed of 18 critical infrastructure and key resource sectors, including an Energy Sector. According to the Energy Sector Specific Plan, the Energy Sector is composed of three subsectors (petroleum, natural gas, and electricity). The Department of Energy is the Sector-specific Agency tasked with implementing the framework and developing guidance tailored to the specific characteristics and risks associated with the Energy Sector. [14] H.R. Rep. No. 110-652, pp. 523-524 (May 16, 2008). [15] In this same report, the House Committee on Armed Services also directed the Secretary of Defense to complete an assessment of corrective actions required to provide assured power and secure and maintain redundancy of DOD's Tier 1 critical assets. DOD was directed to submit the report to the congressional defense committees by March 1, 2009; however, DOD notified the House Committee on Armed Services in April 2009 that because of the number of Tier 1 assets and the pace of the vulnerability assessments, the report would not be completed and delivered until September 2010. [16] For non-DOD-owned most critical assets, DOD organizations may be called asset owners because of their DCIP risk management responsibilities for those assets. [17] We planned to select a random sample of DOD Tier 1 Task Critical Assets--which support critical DOD missions at the departmental, combatant command, and military service levels--to survey for this review. These assets represent DOD's second most important group of critical assets. However, our discussions with DOD officials and our own analysis led us to determine that the DOD-identified universe of critical assets did not represent an accurate, comprehensive list of DOD Tier 1 Task Critical Assets, and that this issue in and of itself warranted further analysis. Therefore, we issued a separate report, with recommendations, on issues relating specifically to the Tier 1 Task Critical Asset list to enable DOD to take timely actions to update and improve its list of Defense Critical Assets in the fall of 2009 and prioritize funding. See GAO, Defense Critical Infrastructure: Actions Needed to Improve the Consistency, Reliability, and Usefulness of DOD's Tier 1 Task Critical Asset List, [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-09-740R] (Washington, D.C.: July 17, 2009). [18] DOD began conducting DCIP assessments in 2007 on selected DOD Task Critical Assets, some of which were subsequently designated as DOD's most critical assets in October 2008. [19] Definitions of "longer-term" or "extended" electrical power disruptions vary. For example, in the January 2008 report, The MITRE Corporation, Power Grid Security, JSR-07-125 (McLean, Va., January 2008), which was requested by DHS, the JASON Program Office of The MITRE Corporation defined a catastrophic, long-term failure of the electrical power grid as one lasting 5 days or longer. In contrast, in the Report of the Defense Science Board Task Force on DOD Energy Strategy, the Defense Science Board refers to a "long term outage" as lasting "several months." DOD officials also noted that the duration of a longer-term or extended electrical power disruption for a specific asset varies depending on the nature of the particular mission(s) supported by that asset. [20] For more information about the U.S. commercial electrical power grid, see GAO, Electricity Restructuring: 2003 Blackout Identifies Crisis and Opportunity for the Electricity Sector, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-204] (Washington, D.C.: Nov. 18, 2003). [21] Defense Science Board, Report of the Defense Science Board Task Force on DOD Energy Strategy, "More Fight--Less Fuel." [22] The concept of islanding entails the isolation of critical loads or entire installations from the grid to make them self-sufficient. [23] For example, the stresses of increased demand for electrical power contributed to the 2003 Northeast Blackout, which was an extended cascading power outage that affected about 50 million people living in a 9,300 square mile area in the United States and Canada. More than 500 generating units at 265 power plants shut down during the outage, 22 of which were nuclear. It took over 2 weeks for power plants to regain full capacity. For additional information, see [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-204]. [24] Members of the Task Force on Electric Grid Vulnerability represent DOD (co-chair), DOE (co-chair), DHS, the Director of National Intelligence, the Environmental Protection Agency, the Federal Energy Regulatory Commission, the National Aeronautics and Space Administration, the Nuclear Regulatory Commission, the Office of Science and Technology Policy, and the Office of Management and Budget. [25] Government and industry efforts to develop a "Smart Grid" are intended to modernize the aging U.S. electrical power transmission and distribution system, which uses technologies and strategies that are several decades old and include limited use of digital communication and control technologies. The Smart Grid would use advanced sensing, communication, and control technologies to generate and distribute electricity more effectively, economically, and securely. DOE's Office of Electricity Delivery and Energy Reliability calls for the Smart Grid to be more reliable, secure, economical, efficient, environmentally friendly, and safe, and expects it to enable active participation by consumers; accommodate a range of generation and storage options; enable new products, services, and markets; provide power quality for the digital economy; optimize asset utilization and operate efficiently; anticipate and respond to system disturbances; and operate resiliently against attacks and natural disasters. However, Smart Grid- related technologies may also introduce additional vulnerabilities to the U.S. electrical power grid, such as increased susceptibility to cyberattacks. [26] For example, on July 21, 2009, the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the House Committee on Homeland Security held a hearing, "Securing the Modern Electric Grid from Physical and Cyber Attacks." Similarly, on July 23, 2009, the Subcommittee on Energy and Environment of the House Committee on Science and Technology held a hearing, "Effectively Transforming Our Electric Delivery System to a Smart Grid." In addition, as discussed later in this background section, the Federal Energy Regulatory Commission has approved reliability standards for the electrical power industry, which may be enforced by either the Federal Energy Regulatory Commission or the North American Electric Reliability Corporation. [27] Office of the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs, Defense Critical Infrastructure Program Infrastructure Resiliency Guide: Reduce Your Vulnerabilities and Make Your Infrastructure Stronger, Version 1.0 (Washington, D.C., May 2007). [28] See footnote 1 regarding the number of most critical assets. [29] DCIP guidance defines a "threat" as an adversary having the intent, capability, and opportunity to cause loss or damage, and a "hazard" as a nonhostile incident, such as an accident, natural force, or technological failure, that causes loss or damage to an asset. DCIP defines a "vulnerability" as a characteristic of an installation, system, asset, application, or its dependencies that could cause it to suffer a degradation or loss (incapacity to perform its designated function) as a result of having been subjected to a certain level of threat or hazard. A "risk response" may involve DCIP stakeholders accepting an identified risk or applying funding and resources to reduce the risk (i.e., remediation); to minimize the effects of potential threats or hazards (i.e., mitigation); or to restore lost capacity in the aftermath of an event (i.e., reconstitution). A risk response is intended to ensure that limited resources are optimally allocated toward those assets that are most important to DOD's overall mission success and for which an identified level of risk is deemed unacceptable. [30] ASD(HD&ASA), within the Office of the Under Secretary of Defense for Policy, serves as the principal civilian advisor, and the Chairman of the Joint Chiefs of Staff serves as the principal military advisor to the Secretary of Defense on critical infrastructure protection. ASD(HD&ASA) has lead responsibility for developing and ensuring the implementation of DCIP policy and program guidance for the identification, prioritization, and protection of defense critical infrastructure. [31] Mission assurance links numerous risk management program activities and security-related functions to create the synergistic effect required for DOD to mobilize, deploy, support, and sustain military operations throughout the continuum of operations. [32] For example, the military departments have also conducted service- level Critical Asset Risk Assessments on some of the most critical assets. [33] Homeland Security Presidential Directive 7, Critical Infrastructure Identification, Prioritization, and Protection (Washington, D.C., Dec. 17, 2003). [34] Department of Homeland Security, National Infrastructure Protection Plan: Partnering to Enhance Protection and Resiliency, 2009 (Washington, D.C., 2009). [35] The National Infrastructure Protection Plan designates 18 sectors to focus on specific categories of critical infrastructure and key resources--including one for Energy and another one for the Defense Industrial Base--and assigns a federal agency to lead each sector. [36] DOE"s system of 17 national laboratories performs research and development that is not well-suited to university or private-sector research facilities because of its scope, infrastructure, or multidisciplinary nature, but for which there is a strong public and national need. [37] The Federal Energy Regulatory Commission is an independent federal agency that regulates the interstate transmission of electricity, natural gas, and oil, and oversees the reliability of high-voltage interstate transmission systems, among other responsibilities. [38] The North American Electric Reliability Corporation is an independent, self-regulatory, not-for-profit organization whose mission is to ensure the reliability of the bulk power system in North America. [39] The bulk power system is that part of the power grid that includes the transmission of electricity over high-voltage transmission lines to distribution companies and the generation of electricity into those transmission lines. This includes most power generation facilities and most transmission lines over 100,000 volts, but excludes all distribution facilities. [40] Reliability standards are the reliability requirements for planning and operating the North American bulk power system. The North American Electric Reliability Corporation's reliability standards for the bulk power system cover 14 areas, including critical infrastructure protection, emergency preparedness and operations, and protection and control. [41] Defense Science Board, Report of the Defense Science Board Task Force on DOD Energy Strategy, "More Fight--Less Fuel." [42] As of June 1, 2009, the Defense Threat Reduction Agency had conducted DCIP vulnerability assessments on 12 of the most critical assets as additional modules to its Joint Staff Integrated Vulnerability Assessments, which focus on antiterrorism and force protection vulnerabilities. The agency also conducted a DCIP vulnerability assessment on one most critical asset in conjunction with a Balanced Survivability Assessment. In addition, the U.S. Air Force conducted a DCIP vulnerability assessment on one other most critical asset as part of its service-level critical infrastructure protection program. [43] Department of Defense, DCIP Electrical Power Standards and Benchmarks, Version 1.1 (Apr. 15, 2007). [44] Before October 2008, the Defense Threat Reduction Agency conducted DCIP vulnerability assessments on assets that ASD(HD&ASA) and the Joint Staff considered to be likely candidates for the list of most critical assets. [45] These remaining assets include five non-DOD-owned assets located in the United States and foreign countries, which are discussed in the following section of this report, and two DOD-owned assets located in the United States. [46] GAO, Combating Terrorism: Improved Training and Guidance Needed to More Effectively Address Host Nation Support and Enhance DOD's Force Protection Efforts, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO- 07-200NI] (Washington, D.C.: Jan. 31, 2007). [47] We have previously reported on delays in the completion of important sector-specific interdependency analyses by the various DCIP Defense Infrastructure Sector Lead Agents. See GAO, Defense Infrastructure: Actions Needed to Guide DOD's Efforts to Identify, Prioritize, and Assess Its Critical Infrastructure, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-461] (Washington, D.C.: May 24, 2007). [48] ASD(HD&ASA) also has requested that the Mission Assurance Division of the Naval Surface Warfare Center at Dahlgren, Virginia, support the DCIP vulnerability assessments by conducting similar desktop technical analyses of the commercial public works infrastructure that supports DOD's most critical assets outside of DOD installations. The Mission Assurance Division has completed these assessments for all DOD's most critical assets. [49] The information requested includes Geographic Information System spatial data and imagery of installations' electrical systems, including data about the systems' size and capacity, power plants, transmission lines, substations, distribution lines, and emergency generators. [50] During these combined assessments, a DCIP vulnerability assessment module using DCIP-specific assessment benchmarks is added to the Joint Staff Integrated Vulnerability Assessment, which is conducted using different assessment standards. According to ASD(HD&ASA) officials, conducting these two assessments simultaneously also decreases the negative impacts and disruptions to the installation's commands from the assessment team's visit. [51] According to Joint Staff officials, the agreement may be finalized by calendar year 2011 but will first require the full transfer of all antiterrorism program elements from the previous DOD program of responsibility in the Office of the Assistant Secretary of Defense for Special Operations/Low Intensity Conflict and Interdependent Capabilities to the new program of responsibility in ASD(HD&ASA). [52] Definitions of "longer-term" or "extended" electrical power disruptions vary. See footnote 19 on page 7. [53] The DCIP vulnerability assessment benchmarks for electrical power define an electrical power network as consisting of substations, transmission lines, and power plants, each of which contain equipment, including transformers, circuit breakers, switches, and supervisory control and data acquisition systems. [54] The benchmarks consist of questions to determine whether the owner of a most critical asset is (1) maintaining information about the configuration of the electrical power system that directly supports the critical asset; (2) determining if the electrical power system has the ability to meet the current and identified electrical power needs of the asset; (3) identifying all system assets essential to supporting the continued and reliable delivery of electrical power to the asset; (4) maintaining security to protect against threats and hazards to all identified critical electrical power assets, including identifying the network's single points of failure, if applicable (for commercial assets, DOD may work with the owner of the electrical power equipment and installations to enhance equipment security on a case-by-case basis); (5) maintaining mitigation options and plans to eliminate or reduce the potential impact to a mission in the event of an electrical system disruption with appropriate government and commercial electrical power suppliers and on-site operators/maintainers (e.g., backup generators, uninterruptible power supplies, and redundant feeds); (6) conducting routine preventive maintenance and testing of electrical power system components; and (7) identifying dependencies on and support provided to other supporting infrastructure to the asset. [55] Office of the Deputy Under Secretary of Defense for Installations and Environment, Department of Defense Energy Manager's Handbook (Washington, D.C., Aug. 25, 2005). [56] DOD has also not yet scheduled DCIP vulnerability assessments for two DOD-owned most critical assets. [57] We observed during our site visits to six of the most critical assets that all six assets depend on unsecured, overhead electrical power lines that constitute single points of failure. According to DOD officials at one of these sites, animals caused a disruption in the electrical power lines supporting one of these assets, resulting in mission failure. [58] The Energy Government Coordinating Council is one of 18 governmental coordinating councils created within the framework of the National Infrastructure Protection Plan. Issued in June 2006, the plan serves as a road map for DHS and other relevant stakeholders, such as owners and operators of key critical infrastructure, to use risk management principles to prioritize protection activities within and across sectors in an integrated, coordinated fashion. Each sector is assigned a lead sector agent, with the Energy Sector and its Government Coordinating Council led by DOE. The purpose of this council is to create the structure through which respective groups from all levels of government and the private sector can participate in planning efforts related to the development of sector-specific plans and implement efforts to protect critical infrastructure, among other things. [59] Members of the Task Force on Electric Grid Vulnerability represent DOD (Co-Chair), DOE (Co-Chair), DHS, the Director of National Intelligence, the Environmental Protection Agency, the Federal Energy Regulatory Commission, the National Aeronautics and Space Administration, the Nuclear Regulatory Commission, the Office of Science and Technology Policy, and the Office of Management and Budget. [60] The Government Performance and Results Act encourages government agencies to establish performance indicators to be used in measuring or assessing the relevant outputs, service levels, and outcomes of each program activity. The implementation of DCIP risk management decisions could serve as one performance indicator of the extent to which DCIP activities are reducing vulnerabilities (including those related to electrical power) of DOD's most critical assets. [61] Remediation actions are those steps taken to correct known deficiencies and weaknesses once a vulnerability has been identified. Mitigation actions are those taken in response to a warning or after an incident occurs to lessen the potentially adverse effects on a given military operation or infrastructure. [62] DOD Instruction 3020.45, Defense Critical Infrastructure Program (DCIP) Management, sections 5.1 and E3.2.3.3. [63] After a DCIP vulnerability assessment on a most critical asset, the owner of that asset conducts a corresponding risk assessment for the most critical asset and shares it with other relevant DCIP stakeholders. Subsequently, relevant DCIP stakeholders review the results of each risk assessment and jointly produce a "risk decision package" to formally document the risk management decisions and responses (i.e., remediation, mitigation, and risk acceptance measures) reached for each most critical asset. [64] Coordination with local electricity providers may range from an informal working relationship with utility officials to a formal memorandum of agreement between the most critical asset's host installation and the electricity provider. [65] DOD Manual 3020.45, Volume 2, Defense Critical Infrastructure Program (DCIP): DCIP Remediation Planning (Oct. 28, 2006). [66] DOD Manual 3020.45, Volume 2. [67] The U.S. Army Corps of Engineers has named the pilot program the Community Resilience Proposal for DCIP Public Works Infrastructure. [68] DOD officials at all six of the most critical assets we visited also told us that they did not know whether their local commercial electricity providers may have conducted their own vulnerability or risk assessments of the electrical power grids supporting those assets. [69] According to the Edison Electrical Institute, for example, many electrical power utilities are implementing aggressive energy efficiency, demand response, smart grid, and renewable energy programs that may provide additional expertise and financial assistance to a local DOD installation's energy security program. [70] The Federal Energy Regulatory Commission approved the Spare Transformer Equipment Program in September 2006. The program, an initiative of the Edison Electric Institute, represents a coordinated approach to increasing the utility industry's inventory of spare transformers and streamlining the process of transferring those transformers to affected utilities in the event of a transmission outage caused by a terrorist attack. Under the program, each participating utility is required to maintain and, if necessary, acquire a specific number of transformers. The program requires each participating utility to sell its spare transformers to any other participating utility that suffers a "triggering event," defined as an act of terrorism that destroys or disables one or more substations and results in a declared state of emergency by the President. Any investor- owned, government-owned, or rural electric cooperative utility in the United States or Canada may participate in the program. [71] The cover letter for DOD's written comments indicates that the DOD Office of Security Review reviewed the draft report and recommended that the draft report be protected at the SECRET level. However, by deleting certain sections from the draft report, we were able to issue this unclassified report with the approval of the DOD Office of Security Review with a different report number. [72] A Tier 1 Task Critical Asset is an asset the loss, incapacitation, or disruption of which could result in mission (or function) failure at the DOD, military department, combatant command, subunified command, defense agency, or defense infrastructure sector level. [73] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-09-740R]. GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Phone: The price of each GAO publication reflects GAO‘s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO‘s Web site, [hyperlink, http://www.gao.gov/ordering.htm]. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.