Transportation Security Administration

Clear Policies and Oversight Needed for Designation of Sensitive Security Information Gao ID: GAO-05-677 June 29, 2005

Concerns have arisen about whether the Transportation Security Administration (TSA) is applying the Sensitive Security Information (SSI) designation consistently and appropriately. SSI is one category of "sensitive but unclassified" information--information generally restricted from public disclosure but that is not classified. GAO determined (1) TSA's SSI designation and removal procedures, (2) TSA's internal control procedures in place to ensure that it consistently complies with laws and regulations governing the SSI process and oversight thereof, and (3) TSA's training to its staff that designate SSI.

TSA does not have guidance and procedures, beyond its SSI regulations, providing criteria for determining what constitutes SSI or who can make the designation. Such guidance is required under GAO's standards for internal controls. In addition, TSA has no policies on accounting for or tracking documents designated as SSI. As a result, TSA was unable to determine either the number of TSA employees actually designating information as SSI or the number of documents designated SSI. Further, apart from Freedom of Information Act (FOIA) requests or other requests for disclosure outside of TSA, there are no written policies and procedures or systematic reviews for determining if and when an SSI designation should be removed. TSA also lacks adequate internal controls to provide reasonable assurance that its SSI designation process is being consistently applied across TSA. Specifically, TSA has not established and documented policies and internal control procedures for monitoring compliance with the regulations, policies, and procedures governing its SSI designation process, including ongoing monitoring of the process. TSA officials told us that its new SSI Program Office will ultimately be responsible for ensuring that staff are consistently applying SSI designations. This office, which was established in February 2005, will also develop and implement all TSA policy concerning SSI handling, training, and protection. More detailed information on how this office's activities will be operationalized was not yet available. Specifically, TSA officials provided no written policies formalizing the office's role, responsibilities, and authority. TSA has not developed policies and procedures for providing specialized training for all of its employees making SSI designations on how information is identified and evaluated for protected status. Development of such training for SSI designations is needed to help ensure consistent implementation of the designation authority across TSA. While TSA has provided a training briefing on SSI regulations to certain staff, such as the FOIA staff, it does not have specialized training in place to instruct employees on how to consistently designate information as SSI. In addition, TSA has no written policies identifying who is responsible for ensuring that employees comply with SSI training requirements.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-05-677, Transportation Security Administration: Clear Policies and Oversight Needed for Designation of Sensitive Security Information This is the accessible text file for GAO report number GAO-05-677 entitled 'Transportation Security Administration: Clear Policies and Oversight Needed for Designation of Sensitive Security Information' which was released on July 29, 2005. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Requesters: United States Government Accountability Office: GAO: June 2005: Transportation Security Administration: Clear Policies and Oversight Needed for Designation of Sensitive Security Information: GAO-05-677: GAO Highlights: Highlights of GAO-GAO-05-677, a report to congressional requesters: Why GAO Did This Study: Concerns have arisen about whether the Transportation Security Administration (TSA) is applying the Sensitive Security Information (SSI) designation consistently and appropriately. SSI is one category of ’sensitive but unclassified“ information”information generally restricted from public disclosure but that is not classified. GAO determined (1) TSA‘s SSI designation and removal procedures, (2) TSA‘s internal control procedures in place to ensure that it consistently complies with laws and regulations governing the SSI process and oversight thereof, and (3) TSA‘s training to its staff that designate SSI. What GAO Found: TSA does not have guidance and procedures, beyond its SSI regulations, providing criteria for determining what constitutes SSI or who can make the designation. Such guidance is required under GAO‘s standards for internal controls. In addition, TSA has no policies on accounting for or tracking documents designated as SSI. As a result, TSA was unable to determine either the number of TSA employees actually designating information as SSI or the number of documents designated SSI. Further, apart from Freedom of Information Act (FOIA) requests or other requests for disclosure outside of TSA, there are no written policies and procedures or systematic reviews for determining if and when an SSI designation should be removed. TSA also lacks adequate internal controls to provide reasonable assurance that its SSI designation process is being consistently applied across TSA. Specifically, TSA has not established and documented policies and internal control procedures for monitoring compliance with the regulations, policies, and procedures governing its SSI designation process, including ongoing monitoring of the process. TSA officials told us that its new SSI Program Office will ultimately be responsible for ensuring that staff are consistently applying SSI designations. This office, which was established in February 2005, will also develop and implement all TSA policy concerning SSI handling, training, and protection. More detailed information on how this office‘s activities will be operationalized was not yet available. Specifically, TSA officials provided no written policies formalizing the office‘s role, responsibilities, and authority. TSA has not developed policies and procedures for providing specialized training for all of its employees making SSI designations on how information is identified and evaluated for protected status. Development of such training for SSI designations is needed to help ensure consistent implementation of the designation authority across TSA. While TSA has provided a training briefing on SSI regulations to certain staff, such as the FOIA staff, it does not have specialized training in place to instruct employees on how to consistently designate information as SSI. In addition, TSA has no written policies identifying who is responsible for ensuring that employees comply with SSI training requirements. What GAO Recommends: GAO recommends that the Secretary of Homeland Security direct TSA to establish clear guidance and procedures for using the TSA regulations to determine what constitutes SSI; establish clear responsibility for the identification and designation of SSI information; establish internal controls monitoring compliance with its SSI regulations, policies, and procedures, and communicate that responsibility for implementing the controls throughout TSA; and provide specialized training to those making SSI designations on how information is to be identified and evaluated for SSI status. The Department of Homeland Security generally concurred with our recommendations. www.gao.gov/cgi-bin/getrpt?GAO-05-677. To view the full product, including the scope and methodology, click on the link above. For more information, contact Laurie E. Ekstrand at (202) 512-8777 or ekstrandl@gao.gov. [End of section] Contents: Letter: Background: Results: Conclusions: Recommendations: Agency Comments and Our Evaluation: Appendix I: Briefing Slides: Appendix II: Comments from the Department of Homeland Security: Abbreviations: ATSA: Aviation and Transportation Security Act: DHS: Department of Homeland Security: DOT: Department of Transportation: FAA: Federal Aviation Administration: FOIA: Freedom of Information Act: SBU: Sensitive But Unclassified: SSI: Sensitive Security Information: TSA: Transportation Security Administration: United States Government Accountability Office: Washington, DC 20548: June 29, 2005: The Honorable David Obey: Ranking Minority Member: Committee on Appropriations: House of Representatives: The Honorable Martin Olav Sabo: Ranking Minority Member: Subcommittee on Homeland Security: Committee on Appropriations: House of Representatives: The security of our transportation system is of vital importance to the nation. In line with keeping our transportation safe, some information that is related to threats to or protection of the transportation system must be held out of the public domain. On the other hand, the government must always be mindful of the public's legitimate interest in, and need to know, information related to threats to the transportation system and associated vulnerabilities. Sensitive Security Information (SSI) is a specific category of information related to transportation security that is deemed to require protection against public disclosure. Although it is not classified national security information, SSI is a category of sensitive but unclassified information that, along with protected critical infrastructure information, is specifically exempted by statute from release under the Freedom of Information Act (FOIA), and that it is to be disclosed only to covered persons on a need to know basis. While the Transportation Security Administration (TSA), through its SSI authority, may share SSI with regulated entities, it generally prohibits the public disclosure of information obtained or developed in the conduct of security activities, which would constitute an unwarranted invasion of privacy, reveal trade secrets or privileged or confidential commercial or financial information, or be detrimental to the security of transportation. Questions have been raised about TSA's practices and procedures for determining whether information should be protected as SSI. For example, certain written responses to questions submitted by TSA to the House Appropriations Homeland Security Subcommittee were designated as SSI. However, 1 month earlier, the agency had not treated this same information as sensitive. Further, in an October 2004 memorandum, TSA itself recognized that the handling and identification of SSI had become problematic. In response to your request concerning TSA's handling of SSI, we are reporting on (1) TSA's procedures for determining whether information should be protected under the SSI designation, as well as procedures for determining if and when the designation should be removed, (2) internal control procedures in place to ensure that TSA consistently complies with laws and regulations governing the designation of information as SSI and how TSA oversees the procedures to ensure that they are consistently applied, and (3) TSA's training to its staff who designate SSI. To address our objectives, we reviewed applicable federal laws and regulations, Department of Homeland Security (DHS) and TSA policies and procedures, and other documents related to the SSI designation, and oversight and training processes. We also interviewed TSA and DHS officials involved in the SSI designation, oversight and training processes. GAO's Standards for Internal Control in the Federal Government provided benchmarks and standards against which we assessed TSA's SSI designation policies and procedures.[Footnote 1] Our work was conducted from January 2005 through April 2005 in accordance with generally accepted government auditing standards. On April 29, 2005, we provided your offices a briefing on the results of our work. The briefing slides are included in appendix I. Background: In the aftermath of the terrorist attacks of September 11, 2001, TSA was created to take responsibility for the security of all modes of public transportation. Included in the responsibilities of this new agency was the authority to designate information as SSI. Originally housed in the Department of Transportation, TSA was transferred to DHS as a result of the Homeland Security Act of 2002.[Footnote 2] According to TSA officials, SSI designated information is created by TSA and by airports, aircraft operators, and other regulated parties when they are establishing or implementing security programs or documentation to address security requirements. Information that is designated SSI can be shared with those who have a need to know in order to participate in or oversee the protection of the nation's transportation system. Those with a need to know can include persons outside of TSA, such as airport operators, aircraft operators, foreign vessel owners, and other persons. SSI cannot be shared with the general public, and it is exempt from disclosure under FOIA. There are 16 categories of SSI. TSA has distinguished these 16 categories into 3 types of SSI. Four categories are termed "categorical" and automatically designated SSI. Eleven categories require a judgment or analysis to determine if the SSI designation is warranted. One category requires a written determination by an office with determination authority to be deemed SSI. This category is "other information," which is a catchall exemption for information that TSA may wish to designate SSI that does not fit into the other 15 categories[Footnote 3].: Additional background information on the SSI regulatory authority, including a list of the 16 categories, is included in appendix I. Results: TSA does not have written policies and procedures, beyond its SSI regulations, providing criteria for determining what constitutes SSI. Written guidance for decision making such as this is a key element included in GAO's Standards for Internal Control in the Federal Government. Lack of such guidance could result in errors and inconsistencies in determining the SSI designation. Indeed, in October 2004, TSA's Internal Security Policy Board concluded that TSA must establish a framework to identify, control, and protect SSI. The board concluded that essential elements of the framework should include, among other things, ". . . exacting specificity with respect to what information is covered and what is not covered. This specificity could be documented in a classification guide type format because imprecision in this area causes a significant impediment to determining SSI. Experience has shown that employees unsure as to what constitutes SSI may err on the side of caution and improperly and unnecessarily restrict information, or may err inappropriately and potentially disastrously on the side of public disclosure." In addition to lacking written guidance concerning SSI designation, TSA has no policies and procedures specifying clear responsibilities for officials who can designate SSI.[Footnote 4] TSA's regulations allow anyone within TSA to designate information SSI. Further, TSA has no policies on accounting for or tracking documents designated as SSI. While TSA officials told us that only a limited number of employees routinely make SSI designations, they were unable to provide documentation to confirm this. One consequence of a lack of control of personnel able to designate documents as SSI is that TSA is unable to determine the number of employees designating information as SSI or the volume of documents designated SSI. Once a document is designated SSI, it can remain designated as SSI in perpetuity unless a FOIA request or other request for disclosure outside of TSA results in removal of its SSI status. If a FOIA request is received for an SSI designated document, or a document that contains some SSI designated material, the SSI Program Office works in conjunction with the FOIA Office to review its initial designation. If TSA officials determine that the document should no longer be considered SSI, it can be released to the FOIA requester. If TSA officials feel that the SSI designation should remain but some portions of the document are not SSI, the FOIA Office can determine whether it is appropriate to release the document without the SSI material, or not to release the document at all.[Footnote 5] Other than the FOIA process, no procedures exist for the review of allegations that a document has been erroneously designated as SSI. If there is no FOIA request for a particular document, according to TSA, documents marked as SSI are reviewed for continued applicability upon any request for disclosure outside of TSA. However, TSA officials provided us with no information on the number of documents released as a result of these requests for public disclosure. TSA's SSI regulations indicate that TSA may determine in writing that information should no longer be designated as SSI because it no longer meets SSI criteria, but TSA has not done this to date. TSA lacks adequate internal controls to provide reasonable assurance that its SSI designation process is being consistently applied across TSA and for monitoring compliance with the regulations governing the SSI designation process, including ongoing monitoring of the process. GAO's Standards for Internal Control call for (1) areas of authority and responsibility to be clearly defined and appropriate lines of reporting established, (2) transactions and other significant events to be documented clearly and documentation to be readily available for examination, and (3) controls generally to be designed to ensure that ongoing monitoring occurs in the course of normal operations. In addition, the standards also require that information be communicated within an organization to enable individuals to carry out their internal control responsibilities. However, our review of TSA's oversight activities noted weaknesses in each of these areas. First, TSA has not clearly defined responsibility for monitoring compliance with regulations, policies and procedures governing the SSI designation process and communicated that responsibility throughout TSA. Without clearly identifying the responsibility for monitoring compliance with regulations governing its SSI designation, this function may not receive adequate attention, leaving TSA unable to provide reasonable assurance that those making SSI designations within TSA are designating documents properly. In an October 14, 2004, memorandum designed to centralize the administration of SSI within the agency, TSA's Internal Security Policy Board recognized that the handling and identification of SSI had become problematic: "Lacking a central policy program office for SSI has led to confusion and unnecessary classification of some materials as SSI. Adherence to handling requirements within TSA has been inconsistent, and there have been instances where SSI has been mishandled outside of TSA. Identification of SSI has often appeared to be ad-hoc, marked by confusion and disagreement depending on the viewpoint, experience, and training of the identifier. Strictures on the release of SSI and other SSI policy or handling-related problems have occasionally frustrated industry stakeholders, Congress, the media, and our own employees trying to work within the confines of the restrictions. Significant time and effort has been devoted to SSI issues, and it is not likely that the current approach to addressing such issues can be sustained." TSA officials told us that its new SSI Program Office will ultimately be responsible for ensuring that staff are consistently applying SSI designations. This office, which was established in February 2005, will also develop and implement all TSA policies concerning SSI handling, training, and protection. Officials said that TSA is also currently drafting a summary that provides a definition and brief overview of the SSI authority and is designing materials that will further educate all TSA employees on policies, procedures, responsibilities, and guidance for identifying and designating SSI. More detailed information on how this office's activities will be operationalized was not yet available. Specifically, TSA currently does not have written policies formalizing the office's role, responsibilities, and authority. Second, TSA has not yet established policies and procedures for how it will monitor compliance with the regulations governing the SSI designation process. Without written policies and procedures documenting how it plans to monitor compliance with the regulations governing the SSI designation process, TSA is unable to demonstrate evidence of its monitoring activities. Third, TSA has no formally defined policies or procedures for ongoing monitoring reviews to assess compliance with the laws and regulations governing the process for designating information as SSI. Without clearly defined policies and procedures for conducting periodic internal monitoring to assess compliance with the regulations governing the SSI designation process, TSA lacks structure to support continuous assurance that those employees making SSI designations within TSA are designating documents properly. TSA has not developed policies and procedures for providing specialized training for all of its employees making SSI designations on how information is to be identified and evaluated for protected status. Development of specialized training for SSI designations must be preceded by the establishment of guidance and associated policies and procedures so that an adequate training curriculum can be developed. It should also include written policies defining who is responsible for ensuring that employees comply with SSI training requirements. While TSA has provided a training briefing on SSI regulations to certain staff such as the FOIA staff and other units within TSA, it does not have specialized training in place to instruct employees on how to consistently designate information as SSI. Conclusions: In order for TSA's SSI designation process to work effectively, there must be clarity, structure, and accountability to help ensure that information is not improperly and unnecessarily restricted or inappropriately disclosed, and that the SSI designation process is being applied consistently across TSA. The lack of clear and documented policies and procedures for determining what constitutes SSI and specifying who may make the designation could cause confusion and uncertainty for staff who must administer the SSI designation process without written guidance. Further, internal control policies and procedures for monitoring the compliance with regulations governing the SSI designation process, including internal controls for ongoing monitoring, communicated to all staff, would help ensure accountability and consistency in the implementation of TSA's SSI regulations. Specialized training designed to familiarize those who are making SSI designations on how information is to be identified and evaluated would reduce the likelihood that employees improperly exempt information from public disclosure or inappropriately disclose sensitive security information. Recommendations: To help bring clarity, structure, and accountability to TSA's SSI designation process, we recommend that the Secretary of the Department of Homeland Security direct the Administrator of the Transportation Security Administration to take the following four actions: * establish clear guidance and procedures for using the TSA regulations to determine what constitutes SSI, * establish clear responsibility for the identification and designation of information that warrants SSI protection, * establish internal controls that clearly define responsibility for monitoring compliance with regulations, policies, and procedures governing the SSI designation process and communicate that responsibility throughout TSA, and: * establish policies and procedures within TSA for providing specialized training to those making SSI designations on how information is to be identified and evaluated for protected status. Agency Comments and Our Evaluation: We obtained written comments on a draft of this report from the Department of Homeland Security. We have included a copy of the comments in their entirety in appendix II. In addition, DHS provided technical comments, which we incorporated as appropriate. In its June 14, 2005, comments, DHS generally concurred with our recommendations and stated that they are consistent with ongoing TSA efforts to improve sensitive security information program processes. In its comments, DHS discussed the actions it has already taken and will implement in response to the recommendations, including developing internal controls and audit functions, which will define responsibility for monitoring compliance with regulations, policies, and procedures governing the SSI designation process, and which will be communicated throughout TSA. However, as discussed below, DHS took exception to the report's analyses and conclusions. While we disagree with the thrust of DHS's comments, we believe we fairly and accurately characterize the implementation and monitoring of SSI at DHS. We made clarifying changes where appropriate. DHS said that our report mischaracterized the nature of SSI by incorrectly applying concepts associated with classified information management to SSI information, which falls within a sensitive but unclassified information category. DHS said that this construct may lead the reader to fundamental misunderstandings regarding the issues surrounding SSI. Although mentioned as a basis for comparison, neither the GAO review nor its report was intended to apply concepts associated with classified information management to SSI. Rather, our analyses were intended to provide a factual summary of the key similarities and differences in the classified information and SSI processes. We compare the two processes only to help clarify the distinctions that exist and thereby avoid any misunderstandings by readers who are familiar with the processes for classified information. We included additional language in the report clarifying that SSI is a form of sensitive but unclassified information, rather than classified national security information. DHS also stated that SSI is the only practical means for sharing security information with regulated parties and that the absence of a robust SSI program would degrade both the prompt distribution of security information to persons with a need to know and the free exchange of ideas. We agree that SSI is a practical means for sharing security information with regulated parties. In fact, the findings and recommendations in this report should help DHS improve the SSI process. That is, providing specific procedures and guidelines on how individual employees are to identify and evaluate information for SSI protected status is an intrinsic part of DHS's responsibility for effectively managing its SSI process and should provide both DHS and the regulated parties with confidence that information is given the proper protective status. DHS said that if a TSA employee incorrectly designates a document as SSI while it remains within TSA, there is no impact on the public's right to access because the FOIA review process will always result in an independent determination regarding the SSI designation and that TSA and DHS are committed to releasing as much information as possible. We view the management improvements discussed in this report as helping to ensure that information that should be withheld from the public is protected as well as helping to ensure that other information is available to the public. In addition, the fact that an incorrectly designated SSI document remains within TSA does not obviate the fact it is wrongfully exempted from disclosure. The potential lack of visibility to the public that SSI documents exist and the time and expense to the public and TSA involved in seeking disclosure of an SSI document through FOIA could inhibit the release of information that could and possibly should have been in the public domain but for an incorrect application of SSI. DHS also states that we make no distinction between the obligation to "mark" information as SSI, held by all TSA employees, and the authority to "designate," held by only a very few high-level employees. It explains that all employees can "mark" documents that fall within 15 categories as SSI but only the high-level employees can "designate" the 16TH category of "other information" by documenting the designation as SSI. As we point out in this report, the responsibility of all TSA employees goes beyond just marking a document as SSI and includes making judgments about what information should be marked as SSI. As we state on page 3, while TSA requires a written determination by an office with determination authority for information deemed SSI for 1 of its 16 SSI categories, according to TSA, only 4 of the remaining 15 categories automatically becomes SSI because of the type of document. The other 11 require a judgment or analysis to be made to determine if the SSI designation is warranted by any TSA employee. Therefore, we continue to believe that appropriate guidance and controls are needed to effectively manage the process. In addition, DHS said that its SSI designation processes are consistent with every sensitive but unclassified system in the federal government. While we did not review these other systems, we believe that the management principles and controls discussed in this report are appropriate for the TSA system and would be appropriate for similar systems elsewhere. DHS said that we made an implied suggestion to quantify and identify all documents that have been marked as SSI, and to identify all personnel who have marked such documents. We did note in our discussion of internal controls that TSA has no policies on accounting for or tracking documents designated as SSI. As DHS notes, we did not recommend that TSA provide an inventory of the titles or numbers of SSI documents. In terms of identifying staff that designate documents as SSI, since we are recommending training for all those who designate SSI, identification of all personnel who are going to be applying this designation would be needed to ensure that all are trained. Further, DHS states that we obliquely criticize TSA's ability to protect SSI without a date by which the document automatically loses its SSI status based on time duration requirements similar to those applicable to classified information. We did not recommend that TSA should implement time limits for SSI information. Our review showed that TSA has no written policies and procedures or systematic reviews for determining if and when an SSI designation should be removed. Moreover, other than the FOIA request process and other requests for disclosure outside of TSA, no procedures exist for a review to determine whether a document has been appropriately designated as SSI. Such procedures would allow TSA to periodically review SSI designations and identify and correct erroneously marked SSI documents while still protecting those with valid reasons. In commenting on our recommendation that DHS establish clear guidance and procedures for using the TSA regulations to determine what constitutes SSI, DHS said that TSA's SSI Program Office has already taken some steps in line with our recommendation by developing internal guidance that expands on the SSI regulation structure to provide examples of the types of information that should fall within each SSI category. It expects to publish the guidance for general use by TSA employees and regulated parties in identifying and handling SSI. In commenting on our recommendation that DHS establish clear responsibility for the identification and designation of information that warrants SSI protection, DHS stated that limiting the number of individuals who may designate a document as SSI would lead to operational bottlenecks, could lead to inappropriate release of security information, and would not be operationally feasible. If it is properly done, we do not see how establishing clear responsibility for performing a governmental task would lead to these effects. We wish to make a distinction between a set of personnel who would have responsibility for SSI and a potentially much larger set of employees who would be able to designate documents SSI. Those responsible for SSI would be accountable for ensuring that those in their domain of responsibility have appropriate training and are applying SSI appropriately. DHS would then be in a much better position to ensure that those responsible for SSI are held accountable, have appropriate training, and are applying SSI appropriately. DHS agreed with our recommendation for DHS to establish internal controls that clearly define responsibility for monitoring compliance with regulations, policies, and procedures governing the SSI designation process and communicate that responsibility throughout TSA. DHS said it had already undertaken action to develop internal controls, including audit functions, which will define responsibility for monitoring compliance with regulations, policies, and procedures governing the SSI designation process and will communicate that responsibility throughout TSA. In commenting on our recommendation that DHS establish policies and procedures within TSA for providing specialized training to those making SSI designations on how information is to be identified and evaluated for protected status, DHS said that it conducts specialized SSI training for the SSI Program Office and FOIA staff, and other TSA offices making SSI designations. In addition, it is expanding specialized training to those offices within the agency that create the majority of SSI. This is a good first step in addressing our recommendation, but falls short of its overall intent because SSI regulations extend the SSI designation authority to all TSA employees and does so without giving them specific procedures and guidance, beyond the regulations, upon which to base their judgments. Thus, policies and procedures for providing specialized training to all TSA employees authorized to make an SSI designation will still be needed. In this regard, in our report, we quote an October 14, 2004, TSA memorandum that says in part, "identification of SSI has often appeared to be ad-hoc, marked by confusion and disagreement depending on the viewpoint, experience, and training of the identifier." We believe this statement speaks to the need for specialized training for all those who designate materials as SSI. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to other interested congressional committees and to the Secretary of the Department of Homeland Security and the Administrator of the Transportation Security Administration. We will also make copies available to others upon request. In addition, the report will be available at no charge on GAO's Web site at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8777 or EkstrandL@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report were Glenn G. Davis, Vickie Miller, R. Rochelle Burns, Julian King, Thomas Lombardi, David Hooper, David Plocher, Dolores McGhee, Nikki Clowers, Kim Gianopoulos, Davi D'Agostino, Ann Borseth, William Cawood, Casey Keplinger, David Alexander, Katherine Davis, and Larry Harrell. Signed by: Laurie E. Ekstrand, Director: Homeland Security and Justice Issues: [End of section] Appendix I: Briefing Slides: [See PDF for images] [End of slide presentation] [End of section] Appendix II: Comments from the Department of Homeland Security: U.S. Department of Homeland Security: Washington, DC 20528: June 14, 2005: Ms. Laurie E. Ekstrand: Director, Homeland Security and Justice Issues: U.S. Government Accountability Office: 441 G Street, N.W.: Washington, D.C. 20548: Dear Ms. Ekstrand: RE: Draft Report GAO 05-677, Transportation Security Administration: Clear Policies and Oversight Needed for Designation of Sensitive Security Information: (Job Code 440363): Thank you for the opportunity to review and comment on the subject draft report. The Department of Homeland Security (DHS) generally concurs with the GAO recommendations, which are consistent with on- going Transportation Security Administration (TSA) efforts to improve Sensitive Security Information (SSI) program processes. However, we take strong exception with the analyses and conclusions. Specifically, the report mischaracterizes the nature of SSI by incorrectly applying concepts associated with classified information management to SSI information, which falls within a Sensitive But Unclassified (SBU) information category. SBU information includes such broadly used categories as For Official Use Only (FOLIO) and Law Enforcement Sensitive (LES). This construct colors the entire report and may lead the reader to fundamental misunderstandings regarding the issues surrounding SSI. The SSI designation covers such information as airport and seaport security plans, screening procedures, operating parameters of screening equipment, vulnerability assessments, and other information that could be exploited by terrorists to harm the public and the nation's transportation systems. The following discussion supports our position that GAO's analyses and conclusions are not valid because of how GAO evaluated the SSI program. SSI is the Only Practical Means for Sharing Security Information with Regulated Parties. SSI is primarily an information management tool that allows TSA to share information regarding transportation security with industry and foreign entities that have a need to know the information, but might not possess security clearances necessary for them to receive classified information. Sensitive information regarding transportation security can be shared with regulated parties without the limitations that would be imposed if the information were treated as a form of classified information. For example, TSA can distribute essential Security Directives and screening procedures in a timely manner to the multitude of airport and aircraft operators, both domestic and foreign, that transport the public. Detailed screening procedures can be provided to 45,000 TSA screeners without classified materials security clearances and without onerous handling limitations required for classified information including specifically approved safes and security logs. The absence of a robust SSI program would degrade both the prompt distribution of security information to persons with a need to know the information, and the free exchange of ideas among regulated parties to further transportation security. SSI is also a mechanism for protecting transportation security information from indiscriminate release to those individuals who may seek to use government transparency as a means for obtaining information to harm the general public and the nation's transportation infrastructure. It has been widely reported that public source information has been specifically identified as an Al-Qaeda information resource.[NOTE 1] Congress recognized the tension between this demonstrated need to protect certain information, and the mandate to support transparency in government operations, and concluded that SSI must be exempt from the Freedom of Information Act (FOIA), 5 U.S.C. §552. [NOTE 2] While the ability to protect SSI from release under FOIA is a critical component of SSI, it is ultimately a small part of the SSI system and subsumed within the overall purpose of sharing information with regulated parties that TSA would otherwise not be able to readily provide. It is through this protection under a statutory FOIA exemption that such information as Airport Security Plans, Security Directives, screening equipment limitations, vulnerability assessments, Federal Air Marshal deployment information, and other security information are protected from release to any person who files a request for documents under FOIA. Accordingly, TSA conducts a three-part SSI review of every document requested by the public to determine the appropriateness of any redaction that results in the withholding of SSI from the public. Through this process, TSA ensures that the public's right to access information about TSA operations is fully implemented. It is also through this process that TSA validates its identification of SSI documents, because it is only at this point that SSI restrictions most impact the public. If a TSA employee incorrectly marks a document as SSI while it remains within TSA, there is no impact on the public's right to access because the FOIA review process will always result in an independent determination regarding the SSI marking. Similar procedures exist for other avenues through which the public receives information, including Congressional, media, or litigation-related requests. In every case, TSA and DHS are committed to releasing as much information as possible. SSI Designation Processes are Appropriate and Consistent with Every SBU Management System in Federal Government: Like all SBU programs across the government, it is the obligation of every regulated person, whether TSA employee or employee of an entity covered by the SSI regulation, to mark as SSI those documents that clearly fall within defined SSI categories set out in the SSI regulation at 49 C.F.R. Part 1520, Protection of Sensitive Security Information. Thus, if an employee creates a vulnerability assessment of a transportation facility, there is no requirement for that employee to obtain permission from the equivalent of an original classification authority to mark and protect that document as SSI, because TSA has already designated vulnerability assessments as SSI in its published regulation. This marking obligation is no different from the obligation of any Federal employee in any Federal agency to mark as "FOUO" a sensitive document intended to be distributed for official use within the government. TSA is not aware of any examples of more effective or tightly tracked SBU systems within the Government. The power to designate documents that may not clearly fall within the defined categories at 49 C.F.R. §§1520.5(b)(1)-(15), however, is limited to only seven TSA senior-level employees. That designation must be accompanied by a formal memorandum explaining the basis for designating the document as SSI. That form of designation, beyond the fifteen categories established by regulation, is used by TSA for only four items of information. GAO's report makes no distinction between the obligation to mark information as SSI, held by all employees, and the authority to designate, held by only a very few high level employees. [NOTE 3] It is for this reason that GAO's implied suggestion to quantify and identify (to GAO standards) all documents that have been marked as SSI, and all personnel who have marked such documents, is unworkable. The Government requires that agencies report the numbers and classification levels (Top Secret, Secret, or Confidential) of classified documents, but does not require reporting the titles of classified documents at any level, including Top Secret. We note that GAO did not recommend that TSA provide an inventory of the titles or numbers of SSI documents. Performing such inventories would impose enormous, administrative burdens that would require a vastly enlarged bureaucracy to implement. So long as the document falls within an SSI category established by regulation, it is the obligation of anyone who creates a document falling within that category to mark the document as SSI. In addition, SSI documents are created by non-TSA individuals including industry, Coast Guard, and the Federal Aviation Administration (FAA) personnel. Given that all documents that contain SSI created by any of these individuals must be marked and protected, developing a system to identify and track each potential and actual user, document, and title is not viable. Similarly, limiting the number of personnel who mark a document SSI would also be unworkable. In a classified information system, an original classification authority uses a classification guide to determine whether a document should be classified. Within the SSI system, the SSI regulation serves a function similar to a classification guide by providing a framework for what should or should not be SSI. Since security information pervades TSA's mission and daily operations, limiting the ability to mark documents as SSI to a few individuals would create an information bottleneck without appreciably reducing the number of documents ultimately marked as SSI. Furthermore, it would risk the potentially inappropriate release of security information that should remain protected, as unmarked SSI documents are more difficult to protect and handle appropriately. The GAO report does not contest the substance of the SSI regulation covering the categories under which TSA appropriately marks SSI documents. Finally, while the report does not recommend that TSA implement time limits for SSI information, GAO obliquely criticizes TSA's ability to protect SSI without a date by which the document automatically loses its SSI status. The reasons for designating information as SSI often remain valid for an indefinite period of time. While much classified information is time sensitive because it exists to protect sources of intelligence as much as the intelligence itself, SSI-designated operating procedures or screening equipment capabilities, for example, will remain sensitive so long as those procedures or that equipment remains in use, and do not become "stale" simply through the passage of time. Conversely, the SSI information may become obsolete much more rapidly than classified information if the procedures change substantially and could be de-designated before it would under a set schedule. As the GAO report acknowledges, the SSI regulation provides a mechanism for determining that a document should no longer be SSI. (49 C.F.R. § 1520.5(c)). GAO Recommendations and TSA Response: GAO Recommendation: Establish clear guidance and procedures for using the TSA regulations to determine what constitutes SSI. TSA Response: TSA SSI regulations already provide a framework for determining what constitutes SSI. The TSA SSI Program office, created in February of this year within the Office of the Chief of Staff and assigned SSI policy and training functions, has also developed internal guidance that expands on the SSI regulation structure to provide examples of the types of information that should fall within each category. That guidance is an on-going effort that reflects the continued experience of the office with FOIA review, litigation support efforts, and general outreach with regulated parties. The SSI Program office expects to publish the guidance for general use by TSA employees and regulated parties in identifying and handling SSI. GAO Recommendation: Establish clear responsibility for the identification and designation of information that warrants SSI protection. TSA Response: Currently, only seven senior-level TSA employees have the authority to designate as SSI a document that does not fall within one of the fifteen categories specified in 49 C.F.R. §1520.5(b). Each covered person, including TSA employees, has an obligation to appropriately mark documents that fall within the fifteen categories. Those obligations are spelled out in the regulation, and in mandatory SSI training provided to every TSA employee. Furthermore, limiting the number of individuals that may mark a document as SSI would lead to operational bottlenecks and to the potentially inappropriate release of security information that should remain protected. There would be no increase in the number of documents released to the public, since documents falling within the SSI regulation would ultimately still be marked SSI. Such a limitation impairs the utility of SSI as a system of shared, secure information, and would not be operationally feasible. As noted earlier, GAO did not recommend that TSA provide an inventory of the titles or numbers of SSI documents. To reiterate, performing such inventories would impose enormous administrative burdens requiring a vastly enlarged bureaucracy. So long as the document falls within an SSI category established by regulation, it is the obligation of anyone who creates a document falling within that category to mark the document as SSI. In addition, SSI documents are created by non-TSA individuals including industry, Coast Guard, and FAA personnel. Because all documents that contain SSI created by any of these individuals must be marked and protected, developing a system to identify and track each potential and actual user, document, and title is not viable. The TSA SSI Program Office is currently designing materials that will further educate all TSA employees and other covered persons through clear policies, procedures, responsibilities, and guidance for identifying and marking SSI. GAO Recommendation: Establish internal controls that clearly define responsibility for monitoring compliance with regulations, policies, and procedures governing the SSI designation process and communicate that responsibility throughout TSA. TSA Response: TSA recognized shortcomings in SSI practices in the beginning of 2004 and charged the Internal Security Policy Board to make recommendations to improve TSA SSI practices. That Board recommended on October 14, 2004 that a central SSI Program Office be created and staffed, which has been accomplished. The SSI Program Office is currently developing internal controls, including audit functions, which will define responsibility for monitoring compliance with regulations, policies, and procedures governing the SSI designation process and will communicate that responsibility throughout TSA. GAO Recommendation: Establish policies and procedures within TSA for providing specialized training to those making SSI designations on how information is to be identified and evaluated for protected status. TSA Response: TSA already conducts specialized SSI training for SSI Program Office and FOIA staff, who review all FOIA requests prior to release to the public, and other TSA offices. TSA also has provided and is expanding specialized training to those offices within the agency that create the majority of SSI. TSA will continue to develop and provide more substantive training throughout TSA, including dramatically expanded guidance on identification and marking. Thank you again for the opportunity to comment on this draft report. We are providing technical comments to your office under separate cover and trust that they will be considered for inclusion in the final report. We believe that most of the comments provide added context, background, and support for our position. 4: Sincerely, Signed by: Steven J. Pecinovsky: Director, Departmental GAO/OIG Liaison Office: Office of the Chief Financial Officer: MMCP: NOTES: [1] On January 14, 2003, the Department of Defense reported that an Al Qaeda training manual recovered in Afghanistan stated that "Using public sources openly and without resorting to illegal means, it is possible to gather at least 80% of information about the enemy." http://www.ioss.gov/docs/rumsfeld_14jan03.html. [2] 49 U.S.C. §114(s). [3] Designation authority is currently limited to the Assistant Secretary for Transportation Security (TSA Administrator), Deputy Assistant Secretary, SSI Program Office Director, Chief Technology Officer, Assistant Administrator for Transportation Security Intelligence Service, Assistant Administrator for Intermodal Programs, and Assistant Administrator for Aviation Programs. [4] In its technical comments, TSA addresses one incident that left a negative perception of TSA SSI practices. The GAO draft report noted an incident in which TSA prepared responses to questions submitted to the House Appropriations Homeland Security Subcommittee that were marked SSI, but that one month earlier had not been so marked. The incident was the result of an expedited review to accommodate a House Appropriations Committee schedule under which the normal SSI review process could not be accommodated. The result was that certain responses out of 373 questions were marked SSI because the materials fell within certain categories of the SSI regulation and there was no time to undertake a public source review that would have shown that the material was in the public domain. Once a review was undertaken, it was determined that 7 of the responses should not have been marked SSI. Given the unique circumstances of this particular request, where judgment had to be exercised quickly, favoring the preservation of security seemed the most appropriate course. [End of section] FOOTNOTES [1] GAO, Standards for Internal Control in the Federal Government, GAO/AIMD-00-21.3.1 (Washington, D.C.: November 1999). [2] The Homeland Security Act of 2002 established 49 U.S.C. § 114(s) as TSA's SSI authority. TSA codified its SSI regulations at 49 C.F.R. part 1520. [3] A subset of one of the judgment categories, 49 C.F.R. § 1520.5(9)(iii), also falls within this determination category. [4] TSA identified two categories of information--§§ 1520.5(b)(9)(iii) and 1520.5(b)(16)--that require a written determination by an office with determination authority to be designated SSI. [5] According to a TSA official, TSA processed 99 FOIA requests involving or related to SSI in 2003 and 129 requests in 2004. The TSA official said that, of the total requests processed in 2003, no requests were granted in whole, 63 requests were granted in part, and 36 requests were denied in full. The official also said that, of those 129 requests processed in 2004, no requests were granted in whole, 92 requests were granted in part, and 37 requests were denied in full. GAO's Mission: The Government Accountability Office, the investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through the Internet. GAO's Web site ( www.gao.gov ) contains abstracts and full-text files of current reports and testimony and an expanding archive of older products. The Web site features a search engine to help you locate documents using key words and phrases. You can print these documents in their entirety, including charts and other graphics. Each day, GAO issues a list of newly released reports, testimony, and correspondence. GAO posts this list, known as "Today's Reports," on its Web site daily. The list contains links to the full-text document files. To have GAO e-mail this list to you every afternoon, go to www.gao.gov and select "Subscribe to e-mail alerts" under the "Order GAO Products" heading. Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Public Affairs: Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.