General Aviation Security

Increased Federal Oversight Is Needed, but Continued Partnership with the Private Sector Is Critical to Long-Term Success Gao ID: GAO-05-144 November 10, 2004

Federal intelligence agencies have reported that in the past, terrorists have considered using general aviation aircraft (all aviation other than commercial and military) for terrorist acts, and that the September 11th terrorists learned to fly at general aviation flight schools. The questions GAO answered regarding the status of general aviation security included (1) What actions has the federal government taken to identify and assess threats to, and vulnerabilities of, general aviation; and communicate that information to stakeholders? (2) What steps has the federal government taken to strengthen general aviation security, and what, if any, challenges does the government face; and (3) What steps have non-federal stakeholders taken to enhance the security of general aviation?

The federal and state governments and general aviation industry all play a role in securing general aviation operations. While the federal government provides guidance, enforces regulatory requirements, and provides some funding, the bulk of the responsibility for assessing and enhancing security falls on airport operators. Although TSA has issued a limited threat assessment of general aviation, and the FBI identified that terrorists have considered using general aviation to conduct attacks, a systematic assessment of threats has not been conducted. In addition, to assess airport vulnerabilities, TSA plans to issue a self-assessment tool for airport operators' use, but it does not plan to conduct on-site vulnerability assessments at all general aviation airports due to the cost and vastness of the general aviation network. Instead, TSA intends to use a systematic and analytical risk management process, which is considered a best practice, to assess the threats and vulnerabilities of general aviation. However, TSA has not yet developed an implementation plan for its risk management efforts. TSA and the Federal Aviation Administration (FAA) have taken steps to address security risks to general aviation through regulation and guidance, but still face challenges in their efforts to further enhance security. For example, TSA has promulgated regulations requiring background checks of foreign candidates for U.S. flight training schools and has issued security guidelines for general aviation airports. However, we found limitations in the process used to conduct compliance inspections of flight training programs. In addition, FAA, in coordination with TSA and other federal agencies, has implemented airspace restrictions over certain landmarks and special events. However, FAA has not established written policies or procedures for reviewing and revalidating the need for flight restrictions that limit access to airspace for indefinite periods of time and could negatively affect the general aviation industry. Non-federal general aviation stakeholders have partnered with the federal government and have individually taken steps to enhance general aviation security. For example, industry associations developed best practices and recommendations for securing general aviation, and have partnered with TSA to develop security initiatives such as the Airport Watch Program, similar to a neighborhood watch program. Some state governments have also provided funding for enhancing security at general aviation airports, and many airport operators GAO surveyed took steps to enhance security such as installing fencing and increasing police patrols.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-05-144, General Aviation Security: Increased Federal Oversight Is Needed, but Continued Partnership with the Private Sector Is Critical to Long-Term Success This is the accessible text file for GAO report number GAO-05-144 entitled 'General Aviation Security: Increased Federal Oversight Is Needed, but Continued Partnership with the Private Sector Is Critical to Long-Term Success' which was released on December 10, 2004. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to the Subcommittee on Homeland Security, Committee on Appropriations, House of Representatives: United States Government Accountability Office: GAO: November 2004: General Aviation Security: Increased Federal Oversight Is Needed, but Continued Partnership with the Private Sector Is Critical to Long-Term Success: GAO-05-144: GAO Highlights: Highlights of GAO-05-144, a report to the Chairman, Subcommittee on Homeland Security, Committee on Appropriations, House of Representatives. Why GAO Did This Study: Federal intelligence agencies have reported that in the past, terrorists have considered using general aviation aircraft (all aviation other than commercial and military) for terrorist acts, and that the September 11th terrorists learned to fly at general aviation flight schools. The questions GAO answered regarding the status of general aviation security included (1) What actions has the federal government taken to identify and assess threats to, and vulnerabilities of, general aviation; and communicate that information to stakeholders? (2) What steps has the federal government taken to strengthen general aviation security, and what, if any, challenges does the government face; and (3) What steps have non-federal stakeholders taken to enhance the security of general aviation? What GAO Found: The federal and state governments and general aviation industry all play a role in securing general aviation operations. While the federal government provides guidance, enforces regulatory requirements, and provides some funding, the bulk of the responsibility for assessing and enhancing security falls on airport operators. Although TSA has issued a limited threat assessment of general aviation, and the FBI identified that terrorists have considered using general aviation to conduct attacks, a systematic assessment of threats has not been conducted. In addition, to assess airport vulnerabilities, TSA plans to issue a self- assessment tool for airport operators‘ use, but it does not plan to conduct on-site vulnerability assessments at all general aviation airports due to the cost and vastness of the general aviation network. Instead, TSA intends to use a systematic and analytical risk management process, which is considered a best practice, to assess the threats and vulnerabilities of general aviation. However, TSA has not yet developed an implementation plan for its risk management efforts. TSA and the Federal Aviation Administration (FAA) have taken steps to address security risks to general aviation through regulation and guidance, but still face challenges in their efforts to further enhance security. For example, TSA has promulgated regulations requiring background checks of foreign candidates for U.S. flight training schools and has issued security guidelines for general aviation airports. However, we found limitations in the process used to conduct compliance inspections of flight training programs. In addition, FAA, in coordination with TSA and other federal agencies, has implemented airspace restrictions over certain landmarks and special events. However, FAA has not established written policies or procedures for reviewing and revalidating the need for flight restrictions that limit access to airspace for indefinite periods of time and could negatively affect the general aviation industry. Non-federal general aviation stakeholders have partnered with the federal government and have individually taken steps to enhance general aviation security. For example, industry associations developed best practices and recommendations for securing general aviation, and have partnered with TSA to develop security initiatives such as the Airport Watch Program, similar to a neighborhood watch program. Some state governments have also provided funding for enhancing security at general aviation airports, and many airport operators GAO surveyed took steps to enhance security such as installing fencing and increasing police patrols. Examples of General Aviation Aircraft: [See PDF for image] [End of figure] What GAO Recommends: GAO recommends, among other things, that the Transportation Security Administration (TSA) develop a plan for implementing a risk management approach to strengthen general aviation security, and that the Federal Aviation Administration establish a documented process to review and revalidate flight restrictions. TSA and FAA generally concurred with GAO‘s recommendations. www.gao.gov/cgi-bin/getrpt?GAO-05-144. To view the full product, including the scope and methodology, click on the link above. For more information, contact Cathleen Berrick, 202-512-8777, Berrickc@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: Intelligence Information and Industry Characteristics Challenge TSA's Ability to Identify and Assess Threats and Vulnerabilities and Communicate with General Aviation Stakeholders: TSA and FAA Have Taken Actions to Reduce Security Risks Associated with General Aviation but Face Regulatory and Funding Challenges: Nonfederal Stakeholders Have Taken Steps to Strengthen General Aviation Security: Conclusions: Recommendations for Executive Action: Agency Comments: Appendix I: Objectives, Scope, and Methodology: Appendix II: Comments from the Transportation Security Administration: Appendix III: GAO Contacts and Staff Acknowledgments: GAO Contacts: Staff Acknowledgments: Tables: Table 1: Some Major Industry Associations Representing General Aviation: Table 2: TSA and FAA Regulatory Actions Governing the Screening and Validation of Pilot and Student Pilot Identities: Table 3: Examples of Security Measures Used by Aviation Departments of 55 Fortune 500 Corporations: Figures: Figure 1: Use Categories of General Aviation: Figure 2: Composition of the General Aviation Fleet, 2002: Figure 3: Categories and Numbers of Airports in the United States: Figure 4: Example of a Rural Turf Runway General Aviation Airport (top) and a More Complex Urban General Aviation Airport (bottom): Figure 5: Example of Security Advisory Issued by TSA: Figure 6: TSA Has Established Regulations that Expand Federal Security Requirements from Commercial Air Carriers to Include Some Private and Public Charter Aircraft: Figure 7: Temporary Flight Restriction over the Crawford Ranch in Texas when the President Is Present: Figure 8: Washington, D.C. Air Defense Identification Zone Surrounding the 15-Nautical-mile Radius Flight Restriction Zone: Figure 9: Remaining and Cancelled Security TFRs Over Military Installations: Figure 10: Violations of Temporary Flight Restrictions Have Increased: Figure 11: Sign at St. Mary's Airport in Brunswick, Georgia, Warning General Aviation Pilots to Avoid Restricted Airspace: Figure 12: Airport Watch Program Signs Distributed to General Aviation Airports Around the Country: Figure 13: Examples of Propeller Locks to Prevent Unauthorized Aircraft Use: Abbreviations: CIA: Central Intelligence Agency: FAA: Federal Aviation Administration: FBI: Federal Bureau of Investigation: TFR: temporary flight restrictions: TSA: Transportation Security Administration: United States Government Accountability Office: Washington, DC 20548: November 11, 2004: The Honorable Harold Rogers: Chairman: Subcommittee on Homeland Security: Committee on Appropriations: House of Representatives: Dear Mr. Chairman: General aviation accounts for three-quarters of all aircraft that take off and land in the United States. These aircraft encompass a wide range of flight operations at nearly 19,000 general aviation airports nationwide.[Footnote 1] According to the National Air Transportation Association, the general aviation industry contributes about $100 billion to the U.S. economy each year and accounts for about 1.3 million jobs. Federal intelligence agencies have reported in the past that terrorists have considered using general aviation aircraft for terrorist acts and that the September 11 terrorists learned to fly at flight schools in Florida, Arizona, and Minnesota. In addition, the 9/ 11 Commission identified concerns that vulnerabilities continue to exist in general aviation. The Transportation Security Administration (TSA), along with other federal agencies, state governments, and the general aviation industry, plays a role in securing general aviation operations. While the federal government provides guidance on threats and vulnerabilities, enforces regulatory requirements, and provides some funding assistance, because of competing needs of commercial aviation security funding and the vastness and diversity of the general aviation network, the bulk of the responsibility for assessing and enhancing security falls on airport operators. This public/private partnership has been strengthened following the terrorist attacks of September 11, in part, through the teaming of TSA and general aviation industry associations by means of the Aviation Security Advisory Committee, which, among other things, helped develop security guidelines for general aviation airports based on industry best practices.[Footnote 2] To assess the status of general aviation security, we answered the following questions: (1) What actions has the federal government taken to identify and assess threats to, and vulnerabilities of, general aviation, and communicate that information to stakeholders? (2) What additional steps has the federal government taken to strengthen general aviation security, and what, if any, challenges does the government face in further enhancing security? (3) What steps have non-federal stakeholders taken to enhance the security of general aviation? Due to TSA's concerns that the public release of our detailed findings could compromise aviation security, we issued a separate restricted report to you detailing the results of our review. This report is intended to summarize, in a publicly releasable form, our overall findings and confirm TSA and the Federal Aviation Administration's (FAA) agreement to take action to better assess the potential for terrorist misuse of general aviation aircraft, improve the communication of terrorist threat information to the general aviation community, help manage security risks associated with access to general aviation aircraft and airspace, and help ensure that temporary flight restrictions issued for indefinite periods of time are reviewed, revalidated, and consistently applied. Information determined to be sensitive has been removed from this report. To determine the actions taken by the federal government to assess and communicate threats and vulnerabilities associated with general aviation, we reviewed federal agency reports and studies sponsored by industry associations, and interviewed federal officials and general aviation industry representatives, including those who provided input to TSA's Aviation Security Advisory Committee Working Group on General Aviation. To identify what additional steps the federal government has taken to address national security risks from general aviation, we obtained and analyzed data from the FAA, including the number of flight restrictions that affect general aviation and information from TSA on efforts to ensure compliance with general aviation regulations and provide security guidelines for airport operators. We sought to determine the reliability of these data by, among other things, discussing methods of inputting and maintaining data with agency officials. On the basis of these discussions, we determined that the data were sufficiently reliable for the purposes of this review. To identify what steps nonfederal aviation stakeholders have taken to enhance the security of general aviation, we judgmentally selected 31 general aviation airports to observe security measures implemented since September 11, 2001, and discuss security-related issues.[Footnote 3] We selected these airports based on characteristics including size, location, and aviation activity.[Footnote 4] Because of the limited number of airports in our sample, and because the selected airports did not constitute a representative sample, the results of our case study analysis cannot be projected to the universe of general aviation airports. We also discussed security issues with selected state aviation officials. In addition, we surveyed a random sample of publicly accessible general aviation airports that are eligible for federal funding to obtain airport managers' views on changes in the security environment in general aviation since September 11.[Footnote 5] We performed our work between October 2003 and August 2004 in accordance with generally accepted government auditing standards. Appendix I provides more details about our scope and methodology of our work. Results in Brief: TSA and other federal agencies have not conducted an overall systematic assessment of threats to, or vulnerabilities of, general aviation to determine how to better prepare against terrorist threats. Although TSA issued a limited assessment of threats associated with general aviation and the Federal Bureau of Investigation (FBI) stated that terrorists have considered using general aviation to conduct attacks, a systematic assessment of threats has not been conducted. In addition, TSA has conducted vulnerability assessments at selected general aviation airports, but agency officials stated that conducting these assessments is costly and, therefore, impractical to do for the 19,000 general aviation airports nationwide. TSA intends to implement a risk management approach to better assess threats and vulnerabilities of general aviation aircraft and airports and, as part of this approach, is developing an online vulnerability self-assessment tool to be completed by individual airport managers. However, we found limitations in the use of the self-assessment tool. Further, TSA has not yet developed a plan with specific milestones for implementing these tools and assessments. Without such a plan, it will be difficult for TSA to (1) monitor the progress of its efforts, (2) hold responsible officials accountable for achieving desired results, and (3) ensure that alternative approaches are considered should the tool not provide sufficient data to provide a desired security baseline of vulnerabilities. TSA has also partnered with industry associations to develop security guidelines that enable general aviation airport managers to assess their own vulnerabilities to terrorist attack, and works through industry associations to communicate threat information. However, industry and state aviation officials we spoke with stated that security advisories distributed by TSA were general in nature and were not consistently received. In part this is understandable because, among other things, the agency relies on other federal agencies for threat information. However, we have found that applying these principles to the extent possible provides organizations like TSA with the best opportunity to achieve desired results. TSA and FAA have taken steps to address security risks to general aviation through regulation and guidance, but still face challenges in their efforts to further enhance security. For example, TSA has developed regulations governing background checks of foreign candidates for U.S. flight training schools and has issued security guidelines for general aviation airports. However, we found limitations in the process used to conduct compliance inspections of flight training programs. Further, should TSA establish new security requirements for general aviation airports, competing funding needs could challenge the ability of general aviation airport operators to meet these requirements. In addition, FAA, in coordination with TSA and other federal agencies, has implemented airspace restrictions over certain landmarks and special events to guard against potential terrorist threats. However, FAA has not established written policies or procedures for reviewing and revalidating the continuing need for extended flight restrictions that limit access to airspace for indefinite periods of time and could negatively affect the general aviation industry. In addition, we found limitations in the process used to allow pilots to fly through security-related flight restrictions. Nonfederal general aviation stakeholders have partnered with the federal government and one another to enhance general aviation security and have individually taken a number of steps to address the threat of misuse of general aviation aircraft. For example, in addition to developing their own sets of best practices and recommendations for securing general aviation aircraft and operations, industry associations have worked with TSA to develop security initiatives such as the Airport Watch program,[Footnote 6] launched jointly by the Aircraft Owners and Pilots Association and TSA, and the TSA Access Certificate program,[Footnote 7] developed by the National Business Aviation Association and currently being evaluated at selected airports by TSA. Some state governments have also provided funding for enhancing security at general aviation airports and established security regulations. For example, New Jersey requires that all aircraft stored at general aviation airports be secured with at least two locks to prevent unlawful access to the aircraft. In addition, many of the general aviation airports we visited and surveyed had taken steps to enhance security such as installing fencing and lighting, and requesting increased local police patrols. Because of the importance of securing general aviation operations and to help address associated challenges, we are making recommendations to the Department of Homeland Security to take four actions to better assess the possibility of terrorists' misuse of general aviation aircraft, better communicate terrorist threat information, and help mitigate security risks to general aviation operations. We are also making a recommendation to the Department of Transportation to take action to ensure that temporary flight restrictions issued for indefinite periods are reviewed and, if appropriate, revalidated and consistently applied. We provided a draft of this report to the Secretary of the Department of Homeland Security, the Secretary of Transportation, the Assistant Secretary of Homeland Security for the Transportation Security Administration, and the Administrator of the Federal Aviation Administration who generally concurred with our findings and recommendations. TSA's written comments are presented in appendix II. Background: General aviation encompasses a wide variety of activities, aircraft types, and airports. About 85 percent of all general aviation hours flown falls into one of five categories of flying activity, as defined by FAA and described in figure 1. The largest of these categories is recreational flying, which is defined as flying for pleasure or personal transportation and not for business purposes. In 2002, recreational flying accounted for about 41 percent of all general aviation hours flown. The remaining categories include activities such as medical services, aerial advertising, aerial mapping and photography, and aerial application of seeds or chemicals.[Footnote 8] Figure 1: Use Categories of General Aviation: [See PDF for image] [End of figure] Various types of aircraft can be used in general aviation operations, including single-engine and multi-engine piston aircraft, turboprops, turbojets, helicopters, gliders, and experimental aircraft. The general aviation fleet in the United States consists of about 211,000 active aircraft. While this fleet is diverse, certain activities are generally associated with specific types of general aviation aircraft. For example, corporate flying generally involves the use of turboprop and turbojet aircraft, while personal and instructional flying generally involves the use of single-engine propeller-driven aircraft. The largest category of general aviation aircraft is single-engine propeller, which in 2002 made up 68 percent of the general aviation fleet. Types of general aviation aircraft and their uses are described in figure 2.[Footnote 9] Figure 2: Composition of the General Aviation Fleet, 2002: [See PDF for image] [End of figure] There are approximately 14,000 private-use and 4,800 public-use general aviation airports in the United States, and about 550,000 active general aviation pilots and instructors. [Footnote 10] Non-U.S. citizens can also possess active student pilot certificates in the United States, according to FAA. Although general aviation aircraft can take off and land at almost any airport, including most of the nation's commercial service airports,[Footnote 11] there is an extensive system of general aviation airports nationwide. Figure 3 identifies the categories of airports in the United States. Figure 3: Categories and Numbers of Airports in the United States: [See PDF for image] [A] According to FAA, commercial service airports are those airports that handle regularly scheduled commercial airline traffic and have at least 2,500 annual passenger enplanements. TSA considers commercial service airports to be those subject to security requirements under 49.C.F.R. part 1542 and by that definition, there are approximately 450 commercial service airports. [End of figure] Public-use general aviation airports can range in size and complexity from the short, grass landing strip in rural areas to the very busy urban airports with multiple paved runways of differing lengths that can accommodate large jet aircraft. Figure 4 illustrates examples of a rural general aviation airport with a grass landing strip and a more complex urban general aviation airport. Figure 4: Example of a Rural Turf Runway General Aviation Airport (top) and a More Complex Urban General Aviation Airport (bottom): [See PDF for image] [End of figure] General aviation industry interests are represented by a variety of national organizations. One of the functions of these organizations is disseminating information from federal agencies to their members. These associations also provide their members with security best practices and recommendations tailored to their members' specific needs. Table 1 provides an overview of some of the largest industry associations and their role in general aviation. Table 1: Some Major Industry Associations Representing General Aviation: Association: American Association of Airport Executives; Who they represent: Airport executives at public use airports. Association: Aircraft Owners and Pilots Association; Who they represent: Pilots and aircraft owners. Association: Experimental Aircraft Association; Who they represent: Recreational aviation enthusiasts and builders. Association: General Aviation Manufacturers Association; Who they represent: Companies manufacturing general aviation aircraft, engines, and component parts. Association: Helicopter Association International; Who they represent: Helicopter operators and manufacturers. Association: National Business Aviation Association, Inc; Who they represent: Companies that own or operate general aviation aircraft as an aid to the conduct of their business or are involved with some other aspect of business aviation. Association: National Agricultural Aviation Association; Who they represent: Licensed commercial applicator-operators that use aircraft to enhance food and fiber production, protect forestry, and control health-threatening pests. Association: National Air Transportation Association; Who they represent: Companies that provide general aviation service including on-demand air charter, fuel and ground services, aircraft maintenance, and pilot training. Association: National Association of State Aviation Officials; Who they represent: Officials in state government aviation agencies. Source: Industry associations. [End of table] Prior to the passage of the Aviation and Transportation Security Act in November 2001, FAA had primary responsibility for securing all civil aviation, including general aviation. Although the act transferred much of that responsibility from FAA to TSA,[Footnote 12] FAA maintains a security role because of its regulatory authority over the imposition of temporary flight restrictions (TFR)[Footnote 13] and its disbursement of grants to fund safety and security enhancements at commercial and general aviation airports. Most of the civil aviation security regulations TSA assumed from FAA did not apply to general aviation, but rather to commercial passenger air carriers and commercial airports.[Footnote 14] Although the security of general aviation airports remains largely unregulated, the Aviation and Transportation Security Act and subsequent laws required TSA to develop additional regulations that affect specific segments of general aviation--flight training schools and certain charter flight operations.[Footnote 15] Among other things, with regard to all modes of transportation, the Aviation and Transportation Security Act also required TSA to: * receive, assess, and distribute intelligence information related to transportation security; * assess threats to transportation security and develop policies, strategies, and plans for dealing with those threats, including coordinating countermeasures with other federal organizations; * enforce security-related regulations and requirements; and: * oversee the implementation, and ensure the adequacy, of security measures at airports and other transportation facilities.[Footnote 16] Intelligence Information and Industry Characteristics Challenge TSA's Ability to Identify and Assess Threats and Vulnerabilities and Communicate with General Aviation Stakeholders: TSA and other federal agencies have not conducted an overall, systematic assessment of threats to, or vulnerabilities of, general aviation to determine how to better prepare against terrorist threats. However, in July 2003, TSA issued a limited assessment of threats associated with general aviation activities. In addition, the FBI stated that intelligence indicates that terrorists have considered using general aviation aircraft in the past to conduct attacks. To determine vulnerabilities, TSA conducted vulnerability assessments at some general aviation airports based on specific security concerns or requests by airport officials, and have conducted less intensive security surveys at selected general aviation airports. To better focus its efforts and resources, TSA intends to implement a risk management approach to assess the threats and vulnerabilities of general aviation aircraft and airports, and conduct on-site vulnerability assessments only at those airports the agency determines to be nationally critical. However, TSA has not yet developed a plan with specific milestones for implementing these tools and assessments. While TSA has partnered with industry associations to develop security guidelines for general aviation airports and communicate threat information to airport operators, we found limitations in the communication of threat information. Industry and state aviation officials we spoke with stated that security advisories distributed by TSA were general in nature and were not consistently received. Risk communication principles provide that specific information on potential threats include--to the extent possible--the nature of the threat, when and where it is likely to occur, over what time period it is likely to occur, and guidance on actions to be taken. Applying these principles presents problems for TSA because, among other things, the agency receives threat information from other federal agencies and that information is often classified. Theft of General Aviation Aircraft Has Been a Concern, but Intelligence on Threats to General Aviation Is Infrequent and Non-specific: Neither TSA nor FBI has conducted an overall systematic assessment of threats to, or vulnerabilities of, general aviation to determine how to better prepare against terrorist threats. In July 2003, TSA issued a brief summary assessment of the threats associated with general aviation. However, the assessment was not widely distributed or made available to general aviation airports or other stakeholders. In 2004, the Secretary of the Department of Homeland Security acknowledged that the department, along with the Central Intelligence Agency (CIA), FBI, and other agencies, lacked precise knowledge about the time, place, and methods of potential terrorist attacks related to general aviation. Additionally, industry and TSA officials stated that the small size, lack of fuel capacity, and minimal destructive power of most general aviation aircraft make them unattractive to terrorists and, thereby, reduce the possibility of threat associated with their misuse. Historical intelligence indicates that terrorists have expressed interest in using general aviation aircraft to conduct attacks. The following are examples of intelligence information indicating terrorist interest in general aviation: * CIA reported that terrorists associated with the September 11 attacks expressed interest in the use of crop-dusting aircraft (a type of general aviation aircraft) for large area dissemination of biological warfare agents such as anthrax. * CIA reported that one of the masterminds of the September 11 attacks originally proposed using small aircraft filled with explosives to carry out the attacks. * In May 2003, the Department of Homeland Security issued a security advisory indicating that al Qaeda was in the late stages of planning an attack, using general aviation aircraft, on the U.S. Consulate in Karachi, Pakistan, and had also planned to use general aviation aircraft to attack warships in the Persian Gulf. The Extent of General Aviation's Vulnerability to Terrorist Attack Is Difficult to Determine: TSA and industry stakeholders we spoke with stated that general aviation airports are vulnerable to terrorist attack. TSA officials stated also that it would be difficult for the agency to systematically conduct on-site assessments of the vulnerabilities of individual general aviation airports to terrorist activities because of the diversity and large number of airports. Officials cited the nearly 19,000 general aviation airports nationwide, noting that each has distinct characteristics that may make it more or less attractive to potential terrorists. TSA's efforts to assess vulnerabilities at specific general aviation airports have been limited. At the time of our review, TSA had conducted vulnerability assessments at selected general aviation airports based on specific security concerns or requests by airport officials. TSA officials stated that the resources associated with conducting vulnerability assessments, and the diverse nature of general aviation airports, makes it impractical to conduct assessments at the approximately 19,000 general aviation airports nationwide, or even the approximately 4,800 public-use general aviation airports. TSA officials said, however, that they had conducted a less intensive security survey at additional general aviation airports. TSA selected these airports, among other things, in preparation for special security events such as the G-8 summit and national Republican and Democratic political conventions. In response to industry requests for federally endorsed security protocols, TSA issued security guidelines in May 2004 meant to enable individual general aviation airport managers to assess their own facility's vulnerability to terrorist attack and suggest security enhancements.[Footnote 17] Although these guidelines were issued after we conducted our survey of general aviation airport managers, we found that the majority of airport managers surveyed stated that they would use a security review/vulnerability assessment tool if it were provided. To produce these security guidelines, TSA partnered with industry associations participating in the Aviation Security Advisory Committee's Working Group on General Aviation Airports Security. The guidelines include an airport characteristic measurement tool that allows airport operators to assess the level of risk associated with their airport to determine which security enhancements are most appropriate for their facility. The guidelines also contain security guidance based on industry best practices. TSA officials emphasized that, because security at general aviation airports is not currently regulated by TSA, the security enhancements suggested by the guidelines are voluntary and are to be implemented at the discretion of the airport manager. While TSA's and general aviation airport managers' assessments at specific general aviation airports have been limited, TSA has identified a number of factors that could make general aviation aircraft and airports vulnerable to exploitation by terrorists. Implementing a Risk Management Approach Could Improve the Assessment of Threats and Vulnerabilities, but TSA Lacks an Implementation Plan: In order to address challenges in assessing threats and vulnerabilities to all modes of transportation--including general aviation--and focusing scarce resources, TSA plans to implement a risk management approach based on assessments of criticality, threat, and vulnerability.[Footnote 18] TSA's risk management approach, as it relates to general aviation security, is summarized below. * TSA plans to use a criticality tool to provide the basis for prioritizing which transportation assets and facilities require additional or special protection. On the basis of a criticality assessment, TSA intends to provide greater security scrutiny to general aviation airports that require special protection. * TSA plans to apply threat scenarios of how terrorists might conduct attacks in specific situations in airport environments to assess threats faced by individual general aviation airports. * TSA is developing an online self-assessment toolintended to help general aviation airport managers develop a comprehensive security baseline for their facility. * TSA is developing a Transportation Risk Assessment and Vulnerability Evaluation tool for conducting on-site assessments of general aviation airports that are deemed to be nationally critical. TSA intends to compile baseline data on security vulnerabilities from these tools and use the data to conduct a systematic analysis of security vulnerabilities at general aviation airports nationwide. TSA officials stated that such an analysis will allow the agency to establish the need, if any, for minimum security standards; determine the adequacy of current security regulations; and help the agency and airports better direct limited resources. They noted that because airports will not be required to use the tool, the usefulness of the data gathered will be dependent on the number of airports voluntarily submitting assessment results to TSA. Despite these plans, however, TSA has not developed an implementation plan with specific milestones for conducting its risk management efforts. These efforts have been under development for over a year and were originally scheduled to have been completed between June and August of 2004. Without a plan that establishes specific time frames for implementation of the tools and assessments, it will be difficult for TSA to monitor the progress of its efforts and hold responsible officials accountable for achieving desired results. Similarly, without a plan that includes estimates of the resources needed to effectively implement the agency's risk management approach, TSA's ability to allocate its resources to areas of greatest need could be impaired. A plan could also address alternative approaches that could be implemented if the extent of voluntary participation of general aviation airport managers does not provide sufficient data needed to establish the desired security baseline of vulnerabilities. TSA Faces Challenges in Applying Risk Communication Principles to Improve the Quality of Threat Information Disseminated to General Aviation Stakeholders: TSA faces challenges in ensuring that threat information is effectively communicated to the general aviation community due to the generality of intelligence information given, and the lack of a current, reliable, and complete list of airport contacts. In addition, intelligence information may be classified or sensitive, thus limiting with whom it can be shared.[Footnote 19] TSA partners with industry associations that are part of a General Aviation Coalition as a primary means for communicating threat information and developing security guidelines for general aviation airport managers.[Footnote 20] Specifically, rather than notifying general aviation airport operators directly, TSA communicates threat advisories to these industry associations, which in turn are to provide it to their members. A majority of general aviation airport managers we surveyed reported that they had at least some contact with nonfederal entities such as state aviation officials or industry associations such as the American Association of Airport Executives or the National Business Aviation Association.[Footnote 21] Additionally, a majority indicated that they had established procedures for disseminating security-related information to airport employees and tenants. TSA issued threat advisories for dissemination by general aviation associations to general aviation airports. However, industry association representatives and state aviation officials we spoke with stated that these security advisories were general in nature and were not consistently received. An example of one of TSA's threat advisories is shown in figure 5 below. Figure 5: Example of Security Advisory Issued by TSA: [See PDF for image] [End of figure] Timely, specific, and actionable information are three key principles of effective risk communication. However, TSA faces inherent challenges in applying risk communication principles because of: (1) the generality of intelligence information received from the intelligence community, (2) a limited capability to identify appropriate officials and airports to receive threat information, and (3) potential restrictions placed on communicating classified or sensitive security information to general aviation stakeholders. Providing threat information to the public or those with a need to know in accordance with these principles is challenging and extends beyond threat communications related to general aviation. The first challenge TSA, along with other federal agencies, faces in applying risk communication principles is the generality of intelligence information and the difficulties the government faces in developing such information. According to TSA, gathering specific threat information is difficult because the threat posed by a particular person or group varies over time with changes in the terrorist organization's structure, objectives, methodologies, and capabilities. Targets also change depending on the security of the target in question; likelihood of success; mission complexity; and potential psychological, emotional, and financial impact of the attack. These variations in groups and targets make predicting how and when a terrorist event could occur difficult. Nonetheless, we have reported that public warning systems should, to the extent possible, include specific, consistent, accurate, and clear information on the threat at hand, including the nature of the threat, location, and threat time frames along with guidance on actions to be taken in response to the threat.[Footnote 22] According to risk communication principles, without adequate threat information, the public may ignore the threat or engage in inappropriate actions, some of which may compromise rather than promote the public's safety. A second challenge faced by TSA in communicating threat information to general aviation airports is the lack of current, reliable, and complete information about who to contact to facilitate communication. General aviation airport operators are widely spread among a diverse range of airports that have historically been subject to little or no federal regulation or contact. As a result, contact information about who the owners or operators of individual airports are may not be complete, current, or readily available. Neither FAA nor TSA maintains a current database with contact information for all general aviation airports. Thus, identifying who should receive threat information at the nearly 19,000 airports poses a significant challenge. While general aviation industry associations typically maintain contact information on their members, association officials stated that when they need contact information on general aviation airports they generally use data from the FAA. A third challenge TSA faces in providing classified threat information to general aviation airport operators is determining which airport officials have a need and clearance to receive classified or sensitive intelligence information. In general, the more detailed and specific the threat information, the more likely the information is classified and, therefore, not available to those without appropriate security clearances. TSA officials said they had sanitized threat information in order to issue the five security advisories to general aviation industry associations in an unclassified format. TSA officials said they had also granted security clearances to individuals at certain industry associations who were willing to undergo the required background check process. However, although TSA has developed the ability to communicate classified threat information to some general aviation industry representatives, the agency still faces limitations on its ability to ensure that airport operators with a need to know have access to classified threat information, and have the appropriate clearances. According to TSA officials, the agency's approach to risk management should improve its ability to communicate threat information to the general aviation community by addressing the three challenges mentioned above. Specifically, once TSA completes threat and criticality assessments and--in coordination with general aviation airport managers--vulnerability assessments, the agency will have a greater sense of the threats that individual general aviation airport managers should be aware of and therefore be able to communicate more useful and specific threat information. Conducting vulnerability and criticality assessments should also help TSA identify airports for which current and reliable contact information is needed, and identify airport officials with a need to know classified threat information. TSA and FAA Have Taken Actions to Reduce Security Risks Associated with General Aviation but Face Regulatory and Funding Challenges: TSA and FAA have taken steps to address security risks associated with general aviation through regulation, guidance, and funding. However, in response to the September 11 attacks, TSA has primarily focused on strengthening the security of commercial aviation and meeting associated congressional mandates. As a result, TSA has dedicated fewer resources to strengthening general aviation security, and both TSA and FAA continue to face challenges in their efforts to further enhance security. For example, TSA has developed a regulation governing background checks of foreign candidates for flight training at U.S. flight schools and issued security guidelines for general aviation airports.[Footnote 23] However, TSA has not yet developed a schedule for conducting inspections or determined the resources needed for monitoring compliance with new regulations. In addition, should TSA establish security requirements for general aviation airports, it may be difficult for airport operators to finance security enhancements independently and federal funding will also be a challenge since general aviation airports' needs must compete with the needs of commercial airports for security funding. FAA, in coordination with TSA and other federal agencies, has implemented airspace restrictions over certain landmarks and events, among other things, to guard against potential terrorist threats. FAA officials said that they intermittently reviewed the continuing need for flight restrictions limiting access to airspace for indefinite periods of time--those established at the request of the Department of Defense and for the defense of the national capital region. However, they had not established written procedures or criteria for revalidating the need for restrictions to ensure such reviews were consistently conducted. In addition, we found limitations in the process used by TSA to review and make recommendations regarding waivers to allow general aviation pilots to fly through security related flight restrictions. DOJ, FAA, and TSA Have Issued Requirements for Student Pilots, but Limitations Exist: Recognizing the threat posed by larger aircraft, whether carrying passengers or cargo, the Department of Justice, in February 2003, issued a requirement that all non-U.S. citizens seeking flight training in aircraft weighing 12,500 pounds or more must undergo a comprehensive background check.[Footnote 24] Both TSA and FAA subsequently issued regulations intended to limit access to aircraft for certain segments of the general aviation community by increasing requirements for background checks of pilots. As table 2 shows, TSA and FAA promulgated new regulations governing the screening and validation of pilot and student pilot identities. Table 2: TSA and FAA Regulatory Actions Governing the Screening and Validation of Pilot and Student Pilot Identities: Date: Feb. 2002; Agency: TSA[A]; New requirement: Individuals must successfully complete a fingerprint- based criminal history records check before serving as a flight crew member. Date: Feb. 2002; Agency: FAA[B]; New requirement: Flight crew operating aircraft to or from College Park Airport, Potomac Airfield, or Washington Executive/Hyde Field must successfully complete a background check by a law enforcement agency and that may include a fingerprint- based criminal history records check. (All three airports are within 15 nautical miles of key landmarks such as the Washington Monument.) Date: Oct. 2002; Agency: FAA[C]; New requirement: All pilots must carry and present picture identification along with their pilot certificates. Date: Jan. 2003; Agency: FAA and TSA[D]; New requirement: FAA may suspend, revoke, or refuse to issue an airman certificate to anyone (any citizen or noncitizen) when notified by TSA after TSA's determination that such a person is a threat to transportation security. Date: July 2003; Agency: FAA; New requirement: FAA began issuing the new certificates made of plastic and incorporating security features such as a hologram of the FAA seal to replace the old paper certificates. Date: Dec. 2003; Agency: TSA[E]; New requirement: All non-U.S. citizens or nationals seeking flight training at a U.S. flight school must undergo a comprehensive background check by TSA, regardless of aircraft weight. Source: GAO's analysis of regulations. [A] 49 C.F.R. §§ 1544.229 & 1544.230. [B] 14 C.F.R. Part 91, SFAR 94. [C] 14 C.F.R. § 61.3. [D] 14 C.F.R. § 61.18 and 49 C.F.R. §§ 1540.115 & 1540.117. [E] Pub. L. No. 108-176, § 612, 117 Stat. @ 2572-74 (TSA has yet to finalize its implementing regulation). [End of table] Prior to September 11, FAA did not require background checks of anyone seeking a pilot license, also referred to as a pilot certificate. In November 2001, the Aviation and Transportation Security Act required that foreign student pilots seeking training in aircraft weighing 12,500 pounds or more undergo a background check by the Department of Justice. Under regulations issued by the Department of Justice, flight training providers are responsible for ensuring that aliens applying for flight training in aircraft weighing 12,500 pounds or more fill out and submit a Department of Justice Flight Training Candidate Checks Program form and are fingerprinted.[Footnote 25] The Foreign Terrorist Tracking Task Force is to perform a criminal history background check of the foreign candidate and notify the flight training provider whether or not the foreign candidate is cleared to receive flight training.[Footnote 26] According to officials from the Foreign Terrorist Tracking Task Force, a number of foreign student pilot candidates have been denied from enrolling in a flight training program between March 17, 2003 and August 18, 2004.[Footnote 27] FAA officials said that in February 2002 they took additional steps to make sure that foreign student pilots who already had student pilot certificates when the new requirements went into effect were checked. In December 2003, the Vision 100--The Century of Aviation Reauthorization Act (Vision 100)[Footnote 28] transferred responsibility for conducting background checks from the Department of Justice to TSA and expanded the background check requirement to include all foreign student pilots regardless of the aircraft's size in which they train.[Footnote 29] TSA has developed a regulation implementing the mandates of Vision 100 and, at the time of our review, planned to publish the final regulation and assume the background check responsibilities from the Department of Justice by September 30, 2004. According to TSA officials, TSA's Alien Flight Student program will be similar to the Department of Justice's Flight Training Candidate Checks Program.[Footnote 30] A key challenge for TSA is fulfilling its responsibility to enforce security related regulations will be monitoring the compliance of flight training programs in the United Sates and Puerto Rico with this new requirement. We found limitations in the monitoring of these flight-training programs. In addition to the Department of Justice regulations governing foreign student pilots, FAA, in July 2002, implemented changes to the process of issuing a U.S. pilot certificate to foreign nationals already holding a pilot certificate from a foreign country.[Footnote 31] Historically, FAA issued pilot certificates to pilots who held licenses issued by nations that are members of the International Civil Aviation Organization based on their foreign license. Members of the organization, including the United States and 187 other nations, (including nations known to sponsor terrorism) agreed to issue private pilot certificates to those holding pilot licenses from other organization member nations without requiring them to undergo skills testing. Because of the destructive potential of larger aircraft, the Aviation and Transportation Security Act directed TSA to promulgate new rules governing security requirements for certain public and private charter operations. Generally, the "twelve-five rule" requires nonscheduled or on-demand charter services (for passengers or cargo) using aircraft weighing 12,500 pounds or more to implement a specific program of security procedures similar to those required of scheduled commercial airlines and public charters.[Footnote 32] Similarly, the "private charter rule" requires private charter services using aircraft weighing 100,309.3 pounds (45,500 kilograms) or more, or that have 61 or more passenger seats, to implement many of the same security procedures required of the major airlines. However, we found that TSA faces challenges in monitoring compliance with these new security regulations. Figure 6 shows that selected existing security requirements have been expanded from commercial air carriers to public and private charter aircraft. Figure 6: TSA Has Established Regulations that Expand Federal Security Requirements from Commercial Air Carriers to Include Some Private and Public Charter Aircraft: [See PDF for image] [A] The sterile area is the portion of an airport defined in the airport security program that provides passengers access to boarding aircraft through the screening of persons and property. [End of figure] Procedures for Determining Continued Need for Temporary Flight Restrictions Have Not Been Developed: Since September 11, 2001, FAA has issued temporary flight restrictions (TFR) for some Department of Defense facilities and for the protection of the national capital region for indefinite periods without a documented process to justify their continuance. FAA imposes TFRs to temporarily restrict aircraft operations within designated areas. Prior to September 11, FAA issued TFRs primarily to safely manage airspace operations during events of limited duration. Since then, however, FAA, in coordination with TSA, the Department of Defense, and the Secret Service, among others, has increasingly used TFRs for the purposes of national security over specific events and critical infrastructure.[Footnote 33] FAA has authority over the U.S. National Airspace System and is the agency responsible for implementing TFRs via the Notice to Airmen system.[Footnote 34] For security-related TFRs, FAA generally requests that TSA's Office of Operations Policy evaluate requests received from federal and nonfederal entities--such as the FBI, the Department of the Interior, and state or local government entities--associated with National Special Security Events and selected sporting events.[Footnote 35] TSA evaluates such requests using security related criteria. Based on their evaluation of requests for selected security-related TFRs, TSA officials will make recommendations to FAA regarding whether the TFR should be issued. On the basis of this information, FAA will make a determination whether to issue the TFR through the Notice to Airmen system. The Number, Size, and in Some Cases Duration of TFRs Has Increased since September 11, 2001: According to FAA officials, prior to September 11, 2001, TFRs were rarely issued for security purposes. Since then, however, FAA has issued numerous TFRs for the purpose of national security as a result of increased focus on aviation security. FAA officials stated that Notices to Airmen and other records of TFRs were historically not kept after the restrictions were removed, thus they were unable to provide accurate information on the number of TFRs issued for national security purposes prior to September 11, 2001. Since that time, however, FAA officials said the agency had issued approximately 220 Notices to Airmen and associated TFRs. The size--that is, the amount of airspace restricted both vertically and laterally--of some TFRs has increased. For example, prior to September 11, TFRs for presidential visits had a radius of 3 nautical miles with a ceiling of 3,000 feet.[Footnote 36] Since then, presidential TFRs have had a radius of 30 nautical miles, with a ceiling of 18,000 feet.[Footnote 37] The rationale for increasing the size of presidential TFRs, according to FAA, was based on the difficulty the military might have in preventing an airborne attack on the President once an aircraft was within the 3-nautical mile zone. Figure 7 illustrates the area now covered by a presidential TFR over the Crawford Ranch in Texas when the President is in residence. Figure 7: Temporary Flight Restriction over the Crawford Ranch in Texas when the President Is Present: [See PDF for image] [End of figure] In the case of the national capital region and selected military installations, the duration of TFRs implemented for national security reasons has been put in place and subsequently extended for indefinite periods of time. For example, temporary flight restrictions in and around the national capital region were established shortly after September 11 and according to FAA officials, no set date has been established for their removal. These restrictions in and around Washington, D.C., are the flight-restricted zone and the Washington, D.C. Metropolitan Air Defense Identification Zone, as shown in figure 8.[Footnote 38] Figure 8: Washington, D.C. Air Defense Identification Zone Surrounding the 15-Nautical-mile Radius Flight Restriction Zone: [See PDF for image] Note: The Air Defense Identification Zone consists of three overlapping zones centered on the regions three major airports--Baltimore- Washington International, Dulles International, and Reagan National Airport--and extends approximately 30-nautical miles in all directions. [End of figure] In addition, FAA issued 21 TFRs around various military facilities throughout the country because of security concerns at these facilities after the terrorist attacks of September 11. While 8 of these TFRs have since been canceled, 13 were still in effect as of July 27, 2004, with no scheduled date for removal or documented analysis to justify their continued need. According to FAA officials, the agency plans to convert 11 of these areas to national security areas.[Footnote 39] Once FAA publishes revised aeronautical charts reflecting the new, permanent advisories recommending that pilots avoid the airspace, FAA officials said they plan to cancel the TFRs. In January 2004, FAA issued proposals for converting the remaining two TFRs to permanently prohibited airspace (where no flights are permitted). At the time of our review, FAA was still reviewing comments on the proposal to permanently restrict the surrounding airspaces. Figure 9 shows the status of security-related TFRs FAA established over military installations since September 11. Figure 9: Remaining and Cancelled Security TFRs Over Military Installations: [See PDF for image] [End of figure] TFRs May Negatively Affect the General Aviation Industry: TSA, FAA, and general aviation industry stakeholders we spoke with stated that TFRs negatively affect primarily general aviation operators and airports. According to aviation industry representatives we contacted and FAA, the increase in the number, size, and duration of TFRs and, at times, limited notice given prior to their establishment since September 11 has resulted in numerous inadvertent violations of restricted airspace. For example, the Washington, D.C. Air Defense Identification Zone has been violated over 1,000 times, constituting over 40 percent of all TFR violations since September 11, 2001. As figure 10 shows, since September 2001, the number of violations of all TFRs has increased dramatically. General aviation has accounted for most TFR violations committed within U.S. airspace. Further, about 95 percent of all TFR violations occurred in airspace secured for either presidential security or other national security purposes. Figure 10: Violations of Temporary Flight Restrictions Have Increased: [See PDF for image] [End of figure] Although no TFR violations have been shown to be terrorist related, violators are subject to disciplinary action. According to FAA officials, violations of a TFR typically result in a suspension of the pilot's certificate ranging anywhere from 15 days to 90 days. They said that the most common reason for TFR violations is pilots not reading the Notices to Airmen for the flight area, a required preflight procedure. Other reasons for violations included weather problems, mechanical failures, and pilot in-flight disorientation (i.e., getting lost). FAA officials stated that the number and severity of disciplinary actions imposed on pilots violating TFRs have increased since September 11. However, FAA officials were unable to provide statistical information on the number and severity of disciplinary actions for pilots violating TFRs before or since September 11. The imposition of TFRs can also have an economic impact on general aviation operations.[Footnote 40] TSA, FAA, and industry associations we spoke with stated that the costs associated with restricting airspace can be significant. The National Business Aviation Association commissioned a study to estimate the economic impact TFRs have had on general aviation since September 11.[Footnote 41] While we did not independently assess the validity of the association's assumptions or calculations, the study estimated that general aviation passengers and firms lost over $1 billion because of increased costs to passengers and lost revenues and additional operating costs for general aviation firms.[Footnote 42] We visited St. Mary's Airport in Brunswick, Georgia, to discuss the economic impact of TFRs with an affected general aviation airport operator.[Footnote 43] St. Mary's is located approximately 3 miles south of the Kings Bay Naval Base, where FAA issued a security-related TFR shortly after September 11. The airport operator stated that the loss of much of the general aviation traffic through his airport resulting from the TFR had significantly reduced his ability to generate revenue to sustain operations. According to the operator, the airport's proximity to the TFR around the base significantly deters pilots from using the airport. Other airport operators we visited that were affected by TFRs also cited their negative economic impacts. A sign warning pilots to avoid restricted airspace near the St. Mary's Airport is pictured in figure 11. Figure 11: Sign at St. Mary's Airport in Brunswick, Georgia, Warning General Aviation Pilots to Avoid Restricted Airspace: [See PDF for image] [End of figure] Although TFRs may have economic and other negative impacts on the general aviation industry, FAA did not establish a systematic process for periodically reviewing the continuing need for TFRs over the national capital region and the 13 TFRs over military installation, or determine the long-term economic or other impacts on general aviation operations of these restrictions. While FAA officials said they frequently reviewed TFRs on an informal basis, they did not conduct routine assessments of the continuing need for indefinite TFRs based on a consistent, documented set of criteria or determine the impact of these restrictions on general aviation. In June 2004, FAA officials, in reporting to Congress on the Air Defense Identification Zone, did not cite specific criteria or the process used to determine the continuing need for the restrictions. Instead, FAA based its report primarily on unspecified security reasons submitted by TSA. TSA officials cited the continuing threat posed to the national capital region by organizations such as al Qaeda. While the air defense identification zone around the national capital region is unique, it is possible that future circumstances may warrant the issuance of other temporary flight restrictions of indefinite duration. Without documented procedures and criteria, FAA cannot ensure that future reviews of flight restrictions issued for indefinite periods are properly conducted, or consistently ensure that restrictions on airspace are still needed. We also found that TSA and FAA were limited in their ability to mitigate the threat of airborne attack. This is a result of limitations in airspace restrictions, and the practice of granting pilots waivers to enter temporarily restricted airspace. Enhancing Security at General Aviation Airports Is Difficult because of Funding Challenges: Enhancing general aviation security is difficult because of funding challenges faced by the federal government and general aviation airport operators. General aviation airports have received some federal funding for implementing security upgrades since September 11, but have funded most security enhancements on their own. General aviation stakeholders we contacted expressed concern that they may not be able to pay for any future security requirements that TSA may establish. In addition, TSA and FAA are unlikely to be able to allocate significant levels of funding for general aviation security enhancements, given competing priorities of commercial aviation and other modes of transportation. About 3,000 general aviation airports are eligible to receive FAA Airport Improvement Program grants.[Footnote 44] General aviation airports can use Airport Improvement Program grant funds for projects that provide safety and security benefits. For example, 6 of the 31 airport managers we interviewed, including one of the largest general aviation airports in the country, said they used Airport Improvement Program grants to pay for some of their security enhancements after September 11, 2001. In fiscal year 2002, general aviation airports received $561 million in Airport Improvement Program grants, of which $3.2 million (or about 0.6 percent) was awarded for security projects, and in fiscal year 2003, $680 million, of which $1.3 million (or about 0.2 percent) was awarded for security projects.[Footnote 45] Because general aviation airports are generally not subject to any federal regulations for security,[Footnote 46] in order to meet eligibility requirements for their grants, general aviation airport projects are generally limited to those related to safety but have security benefits, such as lighting and fencing, as well as the acquisition and use of cameras, additional lighting, and motion sensors.[Footnote 47] FAA officials stated that if new security requirements were established for general aviation airports, security-related enhancement projects related to these requirements would be eligible and receive priority for Airport Improvement Program funding. However, given the competing demands of commercial airports, the large number of general aviation airports eligible for such funding, and the limitations of the Airport Improvement Program,[Footnote 48] funding could be uncertain for general aviation airport operators to meet any new security-related requirements. The Office for Domestic Preparedness within the Department of Homeland Security administers two grant programs that could benefit general aviation airports--the State Homeland Security Grant Program and the Urban Areas Security Initiative.[Footnote 49] Under these programs, states may purchase equipment to protect critical infrastructure, including equipment for general aviation airports, if the state declares general aviation airports critical infrastructures. During the course of our review, we learned of one state that plans to spend a small amount of Department of Homeland Security grants to improve the security of general aviation airports. According to officials in Wisconsin, the state plans to use at least $1.5 million of its $41 million Homeland Security Grant in 2004 to enhance security at general aviation airports located along the Great Lakes. Vision 100 also authorized the Department of Homeland Security to establish a $250 million Aviation Security Capital Fund administered by TSA to alleviate some of the demand on the Airport Improvement Program for security enhancement grants. Of this amount, $125 million is discretionary, with priority given to the installation of baggage- screening equipment at commercial airports while the balance is allocated by formula based on airport size and other security considerations. TSA officials noted that Congress did not provide an appropriation for fiscal year 2004 for the fund. If Congress decides to make appropriations in the future for these purposes, general aviation airports will still have to compete with commercial airports for this discretionary funding. Given the extent of unmet security funding needs at commercial airports, it seems unlikely that a significant proportion of funding would be available for general aviation. For example, estimates to install explosive detection system machinery with commercial airport baggage systems range from $3 billion to $5 billion. At the time of our review, $1.2 billion had been appropriated for this effort, and according to the House Committee on Appropriations, airports will be funded, at best, for about half of their installation needs. Even if funds were available, TSA would face a challenge in establishing and prioritizing security projects eligible for Aviation Security Capital Fund grants across a wide spectrum of general aviation airports with diverse characteristics. Although funding is limited for airport improvement, someairport managers we spoke with said they had expended thousands or hundreds of thousands of dollars for security in order to attract more tenants to their facility or to retain their existing tenants. Nonfederal Stakeholders Have Taken Steps to Strengthen General Aviation Security: Nonfederal stakeholders with an interest in general aviation security- -including industry associations, state governments, general aviation airport operators (owners and managers), and users of general aviation airports and aircraft--have taken steps to strengthen the security of general aviation airports and operations. Industry associations have developed and provided recommendations on best practices for enhancing security around general aviation airports, have partnered with the federal government to develop federally endorsed security guidelines, and have sponsored and provided training for their own voluntary security programs. Some states also have suggested best practices, established regulations, and provided funding to general aviation airports to reduce security vulnerabilities. General aviation airport operators and tenants, such as air charter services, have also implemented policy and procedural measures to restrict access to airport property and aircraft. Many airports we visited and surveyed had installed physical security enhancements, such as fencing, lighting, surveillance cameras, and electronic access control gates, and had hired additional security guards. General aviation aircraft owners have also taken steps to protect their aircraft from misuse. Industry Associations Have Provided General Aviation Airport Operators Guidance on Security Practices and Made Recommendations to TSA: Many of the general aviation industry associations we contacted had developed guidance to help enhance the security of general aviation operations and airports. For example, the following are some of the recommendations or best practices designed to strengthen security at general aviation airports made by some of the members of the Aviation Security Advisory Committee's Working Group on General Aviation Airports Security:[Footnote 50] * Posting signs at general aviation airports warning against unauthorized use of aircraft. * Securing aircraft when unattended using existing mechanisms such as door locks, keyed ignitions, and locked hangars to protect aircraft from unauthorized use or tampering. * Controlling vehicle access to areas where aircraft operate by using signs, fences, or gates. * Installing effective outdoor lighting to help improve the security of aircraft parking, hangar, and fuel storage areas, as well as airport access points. * Allowing local law enforcement operational space at the airport to provide a security presence that serves as a natural deterrent to terrorism. Several general aviation industry associations, in partnership with TSA, have also initiated their own voluntary security programs to address the security of general aviation operations and airports. For example: * The Aircraft Owners and Pilots Association, working with TSA, established and operates the Airport Watch program. The program was formed in March 2002--similar in concept to a neighborhood watch program--to improve general aviation airport community awareness. Through the program, the association provides warning signs for airports, informational literature, and training videotapes to educate pilots and airport employees on how the security of their airports and aircraft can be enhanced. TSA operates a toll-free hotline (866-GA- SECURE) where airport operators, managers, and pilots can report suspicious activity to TSA. In May 2004 the hotline began receiving calls regarding a variety of airport users' concerns of suspicious activities or individuals in and around general aviation airports. Figure 12 shows an example of the posters identifying the hotline TSA provides to general aviation airports. Figure 12: Airport Watch Program Signs Distributed to General Aviation Airports Around the Country: [See PDF for image] [End of figure] * The National Business Aviation Association developed a set of security procedures that corporate aircraft operators can put into place to increase the security of their operations. In January 2003, the association, in partnership with TSA, initiated a pilot project, called the TSA Access Certificate program, at Teterboro Airport in New Jersey for operators who had established these procedures in a security program and had their security program reviewed and approved by TSA. TSA approval allows operators to operate internationally without the need of a waiver each time they enter the country.[Footnote 51] (In August 2003, TSA expanded the program to include corporate aircraft operators based at Morristown, New Jersey, and White Plains, New York.) According to association officials, the concept of a TSA-approved security program could be applied to other types of general aviation operations. Officials also stated that one operator of a single general aviation aircraft applied for and received a TSA access certificate to operate internationally.[Footnote 52] * The National Agricultural Aircraft Association created a program to educate aerial application pilots on safety and security issues (the Professional Aerial Applicators Support System).[Footnote 53] According to association officials, the training program qualifies operators in most states to meet continuing education requirements needed to maintain state agricultural aviation licenses. In addition to providing security guidance and developing security programs, 10 general aviation industry associations worked together to make security recommendations to TSA to help prevent the unauthorized use of general aviation aircraft in a terrorist attack. The group met throughout the summer of 2003 to review and discuss numerous general aviation airport security recommendations and evaluated each recommendation for its appropriateness and effect on enhancing security at general aviation airports. On the basis of this review, the group issued a report to TSA on suggested security guidelines.[Footnote 54] States We Visited Varied in Their Efforts to Address General Aviation Vulnerabilities: We visited 10 states and found that their efforts to enhance general aviation security reflected a range of activities. Some states had implemented new requirements for security, funded security enhancements, or provided guidance on best practices. Specifically, 2 of the 10 states we visited had imposed requirements for general aviation airports and aircraft owners and operators since September 11, 2001.[Footnote 55] * In July 2002, the Massachusetts Aeronautics Commission issued a requirement that all airport employees--including general aviation airport employees--wear special photo identification badges. According to state officials, the badges enable airport personnel to distinguish between those who are, and are not, authorized to be on airport property. * In March 2003, the Governor of New Jersey issued an executive order that directed aircraft owners and operators who use the state's 486 licensed general aviation facilities to take steps to limit access to aircraft. Called the "two-lock rule," the executive order requires that all aircraft parked or stored at a general aviation facility in New Jersey for more than 24 hours be protected by a minimum of two locks that secure or disable the aircraft to prevent illegal or unlawful operations. Four of the 10 states we contacted provided funding for security enhancements at general aviation airports. This funding, however, was generally limited to matching funds for federal grants used to install measures that had both a safety and a security benefit, such as airport perimeter fencing and lighting projects. Some states had grant programs that could be used strictly for security enhancements: * For fiscal years 2002 through 2004, Georgia's Department of Transportation Aviation Programs provided a total of $1,174,000 in grants to general aviation airports for fencing, lighting, and electronic card-reader gates. * In February 2002, Tennessee's Aeronautics Commission issued a policy that the state would provide 90 percent of the cost (not to exceed a total of $50 million annually) on security-related projects at general aviation airports. Eligible projects include security fencing and gates, signage, security lighting and motion sensors, and surveillance cameras and monitors. * In 2003, the State of Washington established a $2 million annual matching grant program for general aviation airport security enhancements funded by proceeds from the state's aviation fuel tax. * In 2004, Virginia appropriated $1.5 million to the state's Department of Aviation specifically for security upgrades at general aviation airports. * California's Aviation Division established a grant program for research and development projects that could fund security enhancements at general aviation airports. However, the Aviation Division's budget has not been sufficient to provide any grants from the program over the past 3 years. One of the 10 states we contacted provided guidance on security best practices, while 2 others provided guidance on preparing airport- specific security plans and self-assessments of vulnerabilities. In 3 of the 10 states, the incentive for airports to develop security plans is tied to funding eligibility. * In March 2003, Virginia's Aviation Department Director issued a set of best practices and later established a voluntary security certification program, encouraging airports to assess their vulnerabilities and develop airport-specific security plans. * In May 2002, Tennessee's Aeronautics Division issued guidance on developing an airport emergency and security plan. * In April 2003, Washington's Aviation Division issued security guidelines for general aviation airports based on recommendations from a task force of pilots, general aviation associations, airports, law enforcement, and government agencies. General Aviation Airport Managers and Aircraft Owners Are Primarily Responsible for Security Enhancements: Unlike commercial service airports, general aviation airports are not subject to current federal security regulations,[Footnote 56] and, therefore, general aviation managers and aircraft owners determine what security measures they will use to protect their assets. To determine security measures undertaken since September 11, we judgmentally selected and visited 31 general aviation airports in 10 states open to the public and part of FAA's National Plan of Integrated Airports.[Footnote 57] Airport managers we contacted reported spending as little as $10 for providing forgery-proof identification badges for airport employees to as much as $3 million on, among other voluntary measures at one airport, fencing and around-the-clock security guards. In our survey, about a third (36 percent) of managers reported that funds to pay for security improvements had come from airport revenues, while about a fifth reported receiving federal grants (21 percent) and a fifth reported receiving state grants (22 percent) to finance security improvements.[Footnote 58] According to 18 of the 31 airport managers and 3 of 5 tenants (e.g., fixed base operators)[Footnote 59] we visited, the security measures and practices they implemented following the September 11 attacks were self-initiated, common sense kinds of measures that were expected by the public and their clients to help protect property from vandalism or theft. Many of these measures were no-cost or low-cost security enhancements based primarily on procedural changes. For example, for those airports that did not have formal written security plans, airport managers said they generally discussed security issues with their tenants on a regular basis through meetings and e-mails. Other airports that had formal written security plans or procedures updated those security plans and procedures based on recommendations from industry associations. Some of the 31 airport managers we visited said they had arranged for more frequent patrols by local law enforcement officers since September 11, some for no cost to the airports. Many of the airports we visited had implemented an "airport watch" program--similar to neighborhood watch programs--and displayed signs designed and provided by the Airline Owners and Pilots Association, as discussed above. Other airports absorbed the cost of installing new signs warning against trespassing. Our survey of airport managers identified an increase in the use of security awareness training since September 11. For those aircraft owners who do not store their aircraft in a hangar, forms of securing their aircraft from unauthorized use include attaching devices to propellers, known as "prop locks," to prevent them from rotating; and devices to cover throttle levers, known as "throttle locks," to prevent someone from being able to start the aircraft. Figure 13 shows two kinds of prop locks aircraft owners use. According to airport and state aviation officials, prop locks range in cost from about $150 to about $300. Figure 13: Examples of Propeller Locks to Prevent Unauthorized Aircraft Use: [See PDF for image] [End of figure] Several of the airport managers we visited had invested in high-cost security measures to minimize access by potential criminals and terrorists to airport property and, thus, tenants' aircraft. Specifically, airport officials we visited had obtained federal or state grant assistance for purchasing additional fencing and lighting or purchasing high-tech surveillance cameras. However, several airport managers and tenants considered additional security a cost of conducting business in the post-September 11 environment. Airports officials generally said that they spent between $25,000 and $500,000 on security enhancements such as fencing, lighting, and electronic access gates. While airport officials said they would like to add more security enhancements, they were reluctant to spend much more on enhancing security until TSA issued guidance on what security measures, or combination of security measures, TSA considers appropriate. (As noted previously, TSA issued security guidelines with recommended enhancements in May 2004, after the majority of our site visits.) Officials from the National Business Aviation Association said that corporate aviation departments are more likely to take high-cost measures to protect their aircraft. For example, some of the large member corporations had provided information on the types of security measures they used before September 11, to protect their aircraft from tampering, theft, or hijacking. According to the association, these included the types of security initiatives shown in table 3. Table 3: Examples of Security Measures Used by Aviation Departments of 55 Fortune 500 Corporations: All aircraft are stored in hangars: All hangars are closed and monitored with security systems when the area is unattended. All aircraft are stored in hangars: Mechanics are all company employees or vetted contractors. All aircraft are stored in hangars: Visitors are personally escorted. All aircraft are stored in hangars: Aviation facilities are restricted by an access control system. All aircraft are stored in hangars: Aircraft doors are kept closed and locked when the aircraft is in a secure hangar. All aircraft are stored in hangars: Comprehensive background investigations are conducted for flight crew personnel. Source: National Business Aviation Association. [End of table] Conclusions: From its inception, TSA has primarily focused its efforts on enhancing commercial aviation security to prevent aircraft from again being used as weapons. The amount of TSA's resources and the vastness and diversity of the general aviation airport system mean the bulk of the responsibility for determining vulnerabilities and instituting security enhancements has fallen and will likely continue to fall on airport operators. As the 9/11 Commission concluded, homeland security and national preparedness often begins with the private sector. While the federal government can provide guidance and some amount of funding for security enhancements, long-term success in securing general aviation depends on a partnership among the federal government, state governments, and the general aviation industry. Even with such a partnership, enhancing security at general aviation airports presents TSA and the general aviation community with challenges that will not be easily or quickly resolved. For example, TSA's planned risk management approach for general aviation could assist the agency in providing guidance and prioritizing funding for security enhancements by assessing vulnerabilities and threats to better target its efforts. However, without a documented implementation plan for assessing threats and vulnerabilities that sets forth time frames and goals and the resources needed to achieve these goals, there is limited assurance that TSA will focus its resources and efforts on areas of greatest need, monitor the progress of its efforts, and hold responsible officials accountable for achieving desired results. In addition, completing vulnerability and threat assessments in partnership with general aviation airports should help TSA better communicate threat information. However, because TSA must rely on other federal agencies to provide threat information and follow federal requirements governing disclosure of classified information, it is difficult for TSA to adhere to risk communication principles, particularly in providing specific and actionable information. Nevertheless, effective communication of threat information is important because misallocation of limited resources and disruption of operations are possible effects of communicating nonspecific or incorrect threat information. While TSA and FAA have promulgated regulations to help reduce security risks associated with access to aircraft and airspace, the intended security benefit of these regulations may be limited for a variety of reasons. For example, we found limitations in TSA's process for monitoring flight training providers and operators of private charter aircraft, and in granting waivers to pilots to fly through security related flight restrictions. In addition, FAA has not documented its process for reviewing and revalidating the need for continuing security-related flight restrictions on airspace that are established for indefinite periods. Without plans for monitoring compliance or procedures to document agency processes, TSA and FAA cannot ensure that these regulations achieve their intended effect or minimize the negative impacts of the regulations on affected general aviation industry stakeholders. Recommendations for Executive Action: To better assess the threat of terrorists' misuse of general aviation aircraft and to improve the quality of communicating terrorist threat information to the general aviation community, we recommend that the Secretary of the Department of Homeland Security direct the Assistant Secretary of Homeland Security for the Transportation Security Administration to take the following two actions: * Develop an implementation plan for executing a risk management approach that will help identify threats and vulnerabilities. Such a plan should include milestones, specific time frames, and estimates of funding and staffing needed to focus its resources and efforts on identified airports. * After identifying the most critical threats and vulnerabilities, apply risk communication principles, including to the extent possible the nature of the threat, when and where it is likely to occur, over what time period, and guidance on actions to be taken--in developing and transmitting security advisories and threat notifications. To help ensure that temporary flight restrictions issued for indefinite periods are reviewed and, if appropriate, revalidated and consistently applied, we recommend that the Secretary of the Transportation direct the Administrator of the Federal Aviation Administration to establish a documented process to justify the initiation and continuance of flight restrictions for extended periods. In our restricted report, we also made two recommendations to the Secretary of the Department of Homeland Security regarding monitoring compliance with regulations governing the identification of student pilots, their training, and the operation of certain general aviation aircraft; and the process for granting pilots waivers to enter restricted airspace. Agency Comments: We provided draft copies of this report to the Department of Homeland Security, the Department of Transportation, the Transportation Security Administration, and the Federal Aviation Administration for their review and comment. TSA generally concurred with the findings and recommendations in the report and provided formal written comments that are presented in appendix II. TSA provided technical comments that we incorporated as appropriate. FAA also generally concurred with the findings and recommendations in the report and provided technical comments that we incorporated as appropriate. As agreed with your office, unless you publicly announce its contents earlier, we plan no further distribution of this report until 30 days from the date of this report. At that time, we will send copies of this report to the Secretary of the Department of Homeland Security, the Secretary of the Department of Transportation, the Assistant Secretary of Homeland Security for the Transportation Security Administration, and the Administrator of the Federal Aviation Administration and interested congressional committees. In addition, the report will be available at no charge on GAO's Web site at http://www.gao.gov. If you or your staff have any questions about this report or wish to discuss it further, please contact me at (202) 512-8777 or at berrickc@gao.gov, or Chris Keisling, Assistant Director, at (404) 679- 1917 or at keislingc@gao.gov. Key contributors to this report are listed in appendix III. Sincerely yours, Signed by: Cathleen A. Berrick: Director, Homeland Security and Justice Issues: [End of section] Appendix I: Objectives, Scope, and Methodology: To determine what steps the federal government has taken to identify and assess threats to and vulnerabilities of general aviation, and communicate that information to stakeholders, we interviewed individuals in the Transportation Security Administration's (TSA) Office of Transportation Security Policy, Office of Operations Policy, and General Aviation Operations and Inspections Office on TSA's role in enhancing general aviation security. Individuals from these offices provided documentation on TSA's threat assessment efforts as well as its past vulnerability assessment activities and future vulnerability assessment plans. We examined documentation on TSA's means of obtaining intelligence information and disseminating that information to general aviation stakeholders. We also interviewed individuals from FAA's Special Operations Division and Airspace and Rules Division on their roles in securing general aviation. We examined documentation from the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA) on intelligence regarding potential terrorist misuse of general aviation. In addition, we examined documentation from TSA and FBI on the reasons general aviation may be vulnerable to terrorist misuse. We also spoke to staff in and examined documentation from TSA's Office of Threat Assessment and Risk Management to obtain information on plans to implement a risk management approach to further assess threats and vulnerabilities and to enable the agency to implement risk communication principles to communicate threat information. To determine what steps the federal government has taken to strengthen general aviation security, and what, if any, challenges the government faces in further enhancing security, we obtained and analyzed information from Federal Aviation Administration (FAA), including data on the number of flight restrictions that affect general aviation and the amount of federal funding that has been spent on enhancing general aviation security. We sought to determine the reliability of these data by, among other things, discussing methods of inputting and maintaining data with FAA officials. We spoke to TSA officials about, and examined related documentation on, security guidelines published by TSA, including documentation on TSA's activities with the Aviation Security Advisory Committee's Working Group on General Aviation Airports Security. We interviewed general aviation industry representatives, including those who provided input to the TSA-sponsored Aviation Security Advisory Committee's Working Group on General Aviation Airports Security, to obtain their views on federal efforts to enhance general aviation security. We also interviewed individuals from TSA's Office of Compliance on the promulgation of regulations as a result of the passage of the Aviation and Transportation Security Act, as well as TSA's plans for ensuring operator compliance with these regulations. We interviewed personnel from FAA's Special Operations Division regarding FAA's issuance of temporary flight restrictions, including the criteria and internal controls FAA uses to examine requests for these restrictions from federal and nonfederal entities. As part of this analysis, we took steps to verify the reliability of data from FAA on the number of violations of temporary flight restrictions. We interviewed FAA and TSA officials on potential limitations of the effectiveness of these flight restrictions. We also contacted the Director of the Foreign Terrorist Tracking Task Force on efforts to screen foreign students applying for flight training in the United States. We examined potential sources of funding for additional security measures at general aviation airports, including challenges associated with limited funding. To determine the actions individual general aviation airport managers have taken to enhance security at their airports, we visited 31 general aviation airports in 10 states. We judgmentally selected these 31 airports to observe a cross section of general aviation airports. However, we limited our selection of general aviation airports to the 2,829 listed in FAA's National Plan of Integrated Airport Systems, because these airports are eligible for FAA funding and are open to use by the general public. The remaining 16,000 general aviation airports are generally privately owned and not open to use by the public, and/or are small landing strips with fewer than 10 based aircraft, and are not eligible for federal funding. To ensure we selected a cross section of general aviation airports listed in the National Plan, we based our selection on: 1. Size, using the number of based aircraft as an indicator--100 or more aircraft we considered large, 25 to 99 medium, and 24 or fewer small. 2. Regional location--northeast, northwest, southeast, and southwest areas of the country. 3. Proximity to potential terrorist targets such as large population centers versus sparse population areas, as well as near to and far from other critical infrastructures and symbolic landmarks. 4. Airport characteristics, including number, length, and type (turf or paved) of runways, and primary types of general aviation operations such as recreational aviation, business and corporate aviation, charter services, and flight training. Because we judgmentally selected these general aviation airports, we cannot draw generalized conclusions based on airport managers' interview responses. However, the anecdotal information provided is intended to complement the findings of our random survey of 500 general aviation airports. To obtain examples of what some states have done to enhance general aviation security, we judgmentally selected 10 states with efforts to enhance general aviation security ranging from issuing new security requirements to those in the early stages of determining how they would address general aviation security. To select this range of states, we conducted a literature search to determine which states had proposed or enacted new security laws, regulations, or requirements. We also requested recommendations from the National Association of State Aviation Officials and other industry associations such as the Aircraft Owners and Pilots Association, and noted which state aviation directors had participated in the National Association of State Aviation Officials' Task Group on General Aviation Security. We also considered whether a state participated in FAA's block grant program in which FAA provides airport improvement program grant money to a state in a lump sum and the state determines which airport projects to fund, rather than each airport applying directly to FAA for grant funds on a project-by-project basis. Finally, on the basis of our resources, we considered those states in which we also planned to visit general aviation airports. Because we did not randomly select the states in which we obtained information, we cannot draw generalized conclusions about all states. However, the information obtained from these 10 states serves to provide examples of what some states have done to enhance general aviation security. [End of section] Appendix II: Comments from the Transportation Security Administration: Office of the Assistant Secretary: U.S. Department of Homeland Security: 601 South 12th Street: Arlington, VA 22202-4220: Transportation Security Administration: OCT 26 2004: Ms. Cathleen Berrick: Director, Homeland Security & Justice Issues: U.S. Government Accountability Office: 441 G Street, N.W.: Washington, D.C. 20548: Dear Ms. Berrick: The Transportation Security Administration (TSA) would like to thank the Government Accountability Office (GAO) for the report entitled, " GENERAL AVIATION SECURITY. Increased Federal Oversight Is Needed, But Continued Partnership with Private Sector is Critical to Long-Term Success," GAO-05-144 (Job Code 440352). The report offers a welcome review of the General Aviation community and contributes to the broad understanding of the security environment for the 19,000 General Aviation airports, 211,000 active aircraft, and 550,000 active pilots and instructors. TSA generally concurs with the GAO findings. TSA would like to emphasize the vastness of the General Aviation community when contemplating proposed security initiatives. For example, there are approximately 300 sea and river ports and 453 commercial airports in contrast to the 19,000 General Aviation airports. The size and diversity of this community warrants careful consideration in any proposed Federal oversight, initiatives, and/or guidelines. TSA and General Aviation community partnerships are vital to developing appropriate security initiatives. TSA carefully considers security initiatives using a threat based, risk management approach. TSA agrees with GAO that a continued partnership with the General Aviation community is critical for mutual long-term success. Here are some highlights of our results in partnering with private stakeholders: * General Aviation Security Guidelines: The Aviation Security Advisory Committee (ASAC) partnered with TSA to develop General Aviation security recommendations. These recommendations were included in TSA's Information Publication A-001: "Security Guidelines for General Aviation Airports." * AOPA Airport Watch and GA Hotline: Development of the Airport Watch program, which includes a general aviation "hotline" in coordination with the Aircraft Owners and Pilots Association (AOPA). This program seeks to improve local awareness through public communications and promotes the hotline for reporting suspicious behavior in the General Aviation community. * NBAA Security Protocol: Partnering with National Business Aviation Association (NBAA), TSA developed guidelines based on industry best practices to standardize security procedures for corporate flight departments. These guidelines, endorsed by the International Business Aviation Council (IBAC), have applicability to corporate general aviation aircraft operating internationally. In addition to the above, TSA also works cooperatively with the Federal Aviation Administration (FAA) on requests for Temporary Flight Restrictions (TFRs) and looks forward to collaborating in the future. TSA has and will continue to coordinate and answer requests for the implementation and removal of TFRs with the FAA. These examples of voluntary, public-private partnership programs demonstrate how TSA, in a short amount of time, has enhanced the security of General Aviation by leveraging community networks and the existing communication infrastructure. Comments on the Public GAO Recommendations: GAO recommendation to TSA (1): Develop an implementation plan for executing a risk management approach that will help identify threats and vulnerabilities. Such a plan should include milestones, specific time frames, and estimates of funding and staffing needed to focus its resources and efforts on identified airports. TSA concurs. The agency is committed to a threat based, risk management approach and will continue to apply that approach to General Aviation. TSA has conducted a General Aviation threat assessment and, through TSA's Transportation Security Intelligence Service (TSIS), continuously monitors all-source intelligence and law enforcement reporting for information relative to General Aviation. TSA intelligence reporting practices and protocols are consistent throughout all modes of transportation. TSA also maintains the General Aviation hotline at the TSA Transportation Security Operations Center (TSOC) where General Aviation related suspicious activity and threats may be reported. In addition, TSA has piloted a General Aviation Self Assessment Risk Module (TSARM). TSARM is a free web-based tool designed to assist transportation asset owners/operators in developing security plans and identifying potential vulnerabilities along with security system upgrades. In addition to providing direct feedback to local operators, it concurrently provides TSA timely infrastructure data to consider in criticality assessments. GAO recommendation to TSA (2): After identifying the most critical threats and vulnerabilities, apply risk communication principles, including to the extent possible the nature of the threat, when and where it is likely to occur, over what time period, and guidance on action to be taken-in developing and transmitting security advisories and threat notifications. TSA concurs. TSA supports the communication protocol as directed by the Department of Homeland Security based on the methodology of risk communication principles (see DHS statement GAO-04-682). Currently, TSA sends out advisories to the General Aviation community that are disseminated by both national and local General Aviation stakeholders. In the few instances when there has been a specific threat, TSA has provided the General Aviation community with information that is timely, specific, and actionable. In addition, TSA has the ability to provide SSI and classified information to General Aviation industry stakeholders as appropriate. TSA does maintain extensive contact lists of key General Aviation stakeholders, including home contact information, and with its stakeholder network, TSA is able to respond to specific threats in a timely manner. In conclusion, thank you again for the GAO review to assist Congress to better understand the dynamics of providing security in conjunction with the General Aviation community. We appreciate your efforts to help define the efforts and challenges ahead. Sincerely yours, Signed by: David M. Stone: Assistant Secretary: [End of section] Appendix III: GAO Contacts and Staff Acknowledgments: GAO Contacts: Cathleen A. Berrick (202) 512-3404 Chris Keisling (404) 679-1917: Staff Acknowledgments: In addition to those named above, Leo Barbour, Grace Coleman, Chris Ferencik, Kara Finnegan-Irving, Dave Hooper, Stan Kostyla, Thomas Lombardi, Mark Ramage, Robert Rivas, Jerry Seigler, and Richard Swayze were key contributors to this report. FOOTNOTES [1] The range of general aviation flight operations encompasses personal/family transportation, power line inspection and repair, pipeline patrol, training, transporting medical supplies, emergency services, rescue operations, wildlife and land surveys, traffic reporting, agricultural aviation, firefighting, and law enforcement. [2] The Aviation Security Advisory Committee was formed following the 1988 Pan American World Airways Flight 103 tragedy (Lockerbie, Scotland) to allow all segments of the population to have input into future aviation security considerations. The committee was originally sponsored by the Federal Aviation Administration. However, when the Aviation and Transportation Security Act was signed into law, primary responsibility for civil aviation security were transferred from the Federal Aviation Administration to TSA, and accordingly, sponsorship of the Aviation Security Advisory Committee also was transferred to TSA. [3] We visited general aviation airports in Alabama, California, Georgia, Maryland, Massachusetts, New Jersey, New York, South Carolina, Tennessee, Texas, and Washington. [4] General aviation activities also take place at some commercial airports, but we did not include commercial airports in the scope of this review. [5] Because this is a probability sample, population estimates based on this sample data are subject to sampling error. All percentage estimates based on this sample have 95 percent confidence intervals that are within +/-6 percentage points of the estimate itself, unless otherwise noted. [6] Airport Watch is a program initiated by the Aircraft Owners and Pilots Association working with TSA. The program is supported by a TSA- sponsored toll free hotline (866-GA-SECURE) and warning signs for airports, informational literature, and training videotapes provided by the association. [7] The TSA Access Certificate program is based on a set of security protocols developed by the National Business Aviation Association. TSA is testing this program at three airports in the Northeast for possible use as a national security standard for corporate and business operators. [8] TSA considers general aviation aircraft to include all U.S. registered civil aircraft not (1) operated under 14 C.F.R. Part 121 (scheduled commercial airlines), (2) military operations, and (3) on- demand air carriers that operate nonscheduled commercial service under 14 C.F.R. Part 135 [9] For a more detailed discussion on the general aviation industry, see GAO, General Aviation: Status of the Industry, Related Infrastructure, and Safety Issues, GAO-01-916, (Washington, D.C.: Aug. 31, 2001). [10] According to FAA's Airmen's Registry as of July 3, 2004. [11] Airports that handle regularly scheduled commercial airline traffic and have at least 2,500 annual passenger enplanements. [12] Aviation and Transportation Security Act (ATSA), Pub. L. No. 107- 71, § 101(a), (g), 115 Stat. 597, 603 (2001). [13] FAA has sole authority to issue TFRs and other rules to restrict aircraft from operating within defined areas, on a temporary or permanent basis, in order to protect persons or property in the air or on the ground. When time permits, FAA issues security-based TFRs after consultation with TSA and other federal agencies, as appropriate. [14] 49 C.F.R. parts 1540, 1542 & 1544 (formerly codified, in part, at 14 C.F.R. parts 107 & 108). [15] Pub. L. No. 107-71, §§ 113(a) & 132, 115 Stat. at 622 & 635. [16] Pub. L. No. 107-71, § 101(a), 115 Stat. at 598. [17] Transportation Security Administration, Security Guidelines for General Aviation Airports, Information Publication A-001, (May 2004). [18] See GAO, Homeland Security: Key Elements of a Risk Management Approach,. GAO-02-150T (Washington, D.C.: Oct. 12, 2001). [19] For example, 49 C.F.R. Part 1520 limits TSA's ability to distribute sensitive security information to persons with a need to know, and Executive Order 13292--Further Amendment to Executive Order 12958, as Amended, Classified National Security Information, March 25, 2003, limits the distribution of classified information. [20] The General Aviation Coalition consists of the major general aviation organizations and focuses on addressing aviation issues of common interest and concern. The coalition meets every 6 months with the FAA Administrator and senior FAA managers to present and update issues. The industry associations that make up the coalition consists of the Aircraft Electronics Association, the Aircraft Owners and Pilots Association, the Experimental Aircraft Association, the General Aviation Manufacturers Association, the Helicopter Association International, the International Council of Air Shows, the National Aeronautics Association, the National Agricultural Aviation Association, the National Air Transportation Association, the National Aircraft Resale Association, the National Association of State Aviation Officials, the National Business Aviation Association, the Professional Aviation Maintenance Association, the Small Aircraft Manufacturers Association, the Soaring Society of America, the U.S. Parachute Association, and the University Aviation Association. [21] TSA officials said they also conducted outreach programs before national events requiring special aviation security to educate the general aviation community on flight restrictions and other planned security measures and that TSA planned to assign a lead federal security director in each state as a point of contact for states' general aviation communities. [22] GAO, Homeland Security: Risk Communication Principles May Assist in Refinement of the Homeland Security Advisory System, GAO-04-538T (Washington, D.C.: Mar. 16, 2004). [23] TSA has proposed a regulation pursuant to section 612 of the Vision 100ęCentury of Aviation Reauthorization Act, Pub. L. No. 108- 176, 117 Stat. 2490, 2572-74 (2003), to codify TSA's authority in light of the transfer of responsibilities from the Department of Justice. The Department of Justice issued and enforced regulations that require background checks of foreign candidates for flight training pursuant to section 113 of ATSA, Pub. L. No. 107-71, 115 Stat. at 622-23. [24] 28 C.F.R. Part 105. Vision 100 subsequently amended this requirement, transferring responsibility for conducting the background checks to TSA and applying this requirement to all non-U.S. citizens seeking flight training in aircraft weighing more than 12,500 pounds. TSA has developed, but not yet implemented, regulations to this effect. [25] 28 C.F.R.Part 105. [26] The Foreign Terrorist Tracking Task Force was created in response to Homeland Security Presidential Directive 2, Oct. 29, 2001. The purpose of the task force is to (1) deny entry into the United States of aliens associated with, suspected of being engaged in, or supporting terrorist activity; and (2) locate, detain, prosecute, or deport any such aliens already present in the United States. The directive required that the task force be staffed by personnel from the Department of State, the Immigration and Naturalization Service, the Federal Bureau of Investigation, the Secret Service, the Customs Service, the intelligence community, military support components, and other federal agencies as appropriate. The Department of Justice delegated authority for establishing and administering the Flight Training Candidate Checks Program to the Foreign Terrorist Tracking Task Force. [27] The regulations establishing the Flight Training Candidate Checks Program became effective on March 17, 2003. 68 Fed. Reg. 7,313 (Feb. 13, 2003) (codified at 28 C.F.R. Part 105). [28] Pub. L. No. 108-176, § 612, 117 Stat. at 2572-74. [29] As of July 2004, FAA reported that 3,742 foreign student pilots had active student certificates and TSA officials estimated that over 200,000 pilots currently licensed by FAA are non-U.S. citizens. [30] According to TSA officials, most foreign candidates must receive a U.S. student or work visa to receive flight training in the United.States. Under the Department of Justice's Flight Training Candidate Checks Program, the Department of State would not issue such visas to foreign candidates unless they had received preliminary approval from the Department of Justice. TSA officials said that TSA intends to work with the Department of State to continue this process when the TSA regulation is finalized. [31] According to TSA officials, responsibility for conducting these checks will transfer from Department of Justice to TSA in October 2004. [32] Prior to the Aviation and Transportation Security Act, certain aviation charter services were already subject to security requirements. For example, charter services using aircraft with 31 seats or more were required to meet security requirements similar to those in place for scheduled commercial air carriers. [33] FAA may issue TFRs related to security including TFRs issued for sporting events and significant national landmarks (14 C.F.R. § 99.7.) In addition, FAA may issue security-related TFRs by working directly with the Secret Service for the security of the President and other dignitaries (14 C.F.R. § 91.141) and the Department of Defense for protection of certain military facilities (14 C.F.R. § 99.7). [34] Notices to Airmen are a method by which FAA communicates to pilots information that is time-critical and is either of a temporary nature or is not known far enough in advance to permit publication on aeronautical charts or other operation publications. This can include the establishment, condition, or change in any facility, service, procedure, or hazard in the national airspace system. They may be regulatory (restrictive) or advisory in nature, or both. [35] The Secretary of Homeland Security, after consultation with the Homeland Security Council, is responsible for designating events as National Special Security Events. A recent example was the 2004 G-8 Summit in Sea Island, Georgia. [36] Presidential TFRs are issued to address security with respect to airspace over presidential and other parties. No person may operate an aircraft in the vicinity of an area to be visited or traveled by the President, Vice President, or other public figures for which this type of restriction is issued. According to TSA officials, the size of TFRs issued for dignitaries other than the President did not increase after September 11, 2001. [37] The first 10 nautical miles from the center of the TFR constitute a no-fly zone. The area from 10 to 30 nautical miles of the TFR constitute an air defense identification zone (ADIZ) where operators must obtain a unique beacon code to identify themselves and maintain constant radio contact with air traffic controllers. [38] 14 C.F.R. § 99.3 defines an air defense identification zone as an area of airspace over land or water in which the ready identification, location, and control of civil aircraft is required in the interest of national security. General aviation aircraft must meet certain operational requirements; that is, pilots must have an approved flight plan by FAA, maintain two-way radio communications with air traffic control, and have a transponder that transmits a unique code. According to TSA officials, smaller general aviation aircraft are limited in their ability to access the flight restricted zone because of limited operational capabilities needed to operate in the air defense identification zone. FAA officials noted that additional airspace, extending in places as much as 45 nautical miles from the Washington Monument, is also included in the zone. [39] In commenting on the draft report, FAA officials noted that one of the 11 remaining military TFRs--Anniston, Alabama--was canceled and established as a national security area after completed we completed our review. National security areas are established at locations where there is a requirement for increased security and safety of ground facilities. For example, FAA designated a national security area over Rocky Flats Environmental Technology Site, located in Colorado. Pilots are advised to avoid flying over these designated areas. During times of heightened alert levels, FAA may increase the national security area advisories to TFRs. [40] These costs may be expected to increase with the number of TFRs, and with their size and duration. A TFR that encompasses a large area and is in effect for a long period of time is more likely to cause flights to be cancelled, delayed, or diverted than is a TFR that covers a smaller area or is in effect for only a short while. [41] Key assumptions underlying the study's estimates were that the typical TFR lasts about 4 hours and affects approximately 15 flights per hour. Of the affected flights, about 40 percent were assumed to be delayed, with about 50 percent assumed to be diverted, imposing costs on passengers and aircraft operators. [42] HLB Decision Economics INC (HLB Reference 6795) March 2004, "The Economic Costs of Restricting General Aviation Access to Ronald Reagan Washington National Airport and TFRs (Temporary Flight Restrictions) Since September 11, 2001." The study estimated that, from September 11, 2001, through March 2004, 2,898 TFRs affected general aviation in the following ways: approximately 11,101 general aviation flight cancelations, 74,334 general aviation flight postponements, and 103,162 general aviation flight diversions to more circuitous routes. [43] St. Mary's would be directly affected by FAA proposals to permanently prohibit flight operations within airspace under temporary flight restrictions at the time of our review. [44] These airports are eligible to receive Airport Improvement grants because they have submitted applications to be included in and have been accepted in FAA's National Plan of Integrated Airport Systems. These grant funds are usually limited to planning, designing, and constructing projects such as runways, taxiways, aprons, and land purchases. However, they may also be used for security and safety purposes. Eligible safety and security projects include improvements or equipment that is required by federal regulation or, according to FAA officials, if TSA makes an airport-specific determination that security enhancements are needed. [45] The amounts of 2002 and 2003 Airport Improvement Program funds do not include grants provided to general aviation airports in states that receive FAA block grants since detailed information about the total amounts given to general aviation airports or the amounts of those funds that went for general aviation security are not readily available, according to FAA officials. Airport Improvement Program block grant states are Illinois, Michigan, New Jersey, North Carolina, Pennsylvania, Tennessee Texas, and Wisconsin. [46] The Potomac, Washington Executive/Hyde Park, and Montgomery County general aviation airports in Maryland are subject to federal security regulations. [47] The Aviation and Transportation Security Act had extended eligibility for Airport Improvement Program funding to any additional security-related facilities and equipment required by law or the Secretary of Transportation after September 11, 2001, and before October 1, 2002. [48] GAO, Airport Finance: Past Funding Levels May Not Be Sufficient to Meet Airports' Planned Developments, GAO-03-497T (Washington, D.C.: Feb. 25, 2003). [49] The Office of Domestic Preparedness allocated nearly $1.7 billion in State Homeland Security grants among the 50 states, the District of Columbia, and five territories for fiscal year 2004, and an additional $671 million in Urban Area Security Initiative grants among 50 metropolitan areas. [50] The members of the Aviation Security Advisory Committee Working Group on General Aviation Airports Security are the Aircraft Owners and Pilots Association, the Airports Consultants Council, the American Association of Airport Executives, the Experimental Aircraft Association, the General Aviation Manufacturers Association, the Helicopter Association International, the National Air Transportation Association, the National Association of State Aviation Officials, the National Business Aviation Association, and the U.S. Parachute Association. [51] According to general aviation industry association officials, general aviation aircraft operators wishing to fly to the United States from other countries must stop in one of seven portal countries before entering the country. [52] TSA officials noted that all certificate holders are corporations. [53] According to the association, the majority of its members are licensed as commercial applicator-operators who use aircraft to enhance food and fiber production, protect forestry, and control health- threatening pests. [54] Report of the Aviation Security Advisory Committee Working Group on General Aviation Airports Security, October 1, 2003, Transportation Security Administration, Washington, D.C. [55] In addition, TSA officials said that New York had mandated that all general aviation airports in the state apply TSA's security guidelines. [56] 49 C.F.R. Part 1542. [57] A primary purpose of the National Plan of Integrated Airports (NPIAS) is to identify the airports that are important to national transportation and, therefore, eligible to receive grants under the Airport Improvement Program. The NPIAS is composed of all commercial service airports, all reliever airports, and selected general aviation airports. The word "airport" includes landing areas developed specifically for helicopters and seaplanes as well as conventional fixed wing aircraft landing areas. [58] We conducted a probability sample consisting of 499 or the 2,829 general aviation airports that are open to the public and part of FAA's National Plan of Integrated Airports (NPIAS). We conducted this survey between March and May 2004, and obtained 344 eligible responses. From this sample, estimates are produced for a target population defined as managers of service level general aviation airports that were included in the FAA National Plan of Integrated Airports database as of January 2004. Because we used a probability sample, the estimates could be different for a different random sample. For estimated percentages in this report, we are 95 percent confident that the actual value is within +/-6 percentage points of the survey estimate. [59] Fixed-base operators provide a variety of services to pilots, such as flight training, aircraft rental, fueling, maintenance, parking, and the sale of pilot supplies. GAO's Mission: The Government Accountability Office, the investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through the Internet. GAO's Web site ( www.gao.gov ) contains abstracts and full-text files of current reports and testimony and an expanding archive of older products. The Web site features a search engine to help you locate documents using key words and phrases. You can print these documents in their entirety, including charts and other graphics. Each day, GAO issues a list of newly released reports, testimony, and correspondence. GAO posts this list, known as "Today's Reports," on its Web site daily. The list contains links to the full-text document files. To have GAO e-mail this list to you every afternoon, go to www.gao.gov and select "Subscribe to e-mail alerts" under the "Order GAO Products" heading. Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Public Affairs: Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.