Homeland Security

DHS Is Taking Steps to Enhance Security at Chemical Facilities, but Additional Authority Is Needed Gao ID: GAO-06-150 January 27, 2006

Terrorist attacks on U.S. chemical facilities could damage public health and the economy. While the Environmental Protection Agency (EPA) formerly led federal efforts to ensure chemical facility security, the Department of Homeland Security (DHS) is now the lead federal agency coordinating efforts to protect these facilities from terrorist attacks. GAO reviewed (1) DHS's actions to develop a strategy to protect the chemical industry, (2) DHS's actions to assist in the industry's security efforts and coordinate with EPA, (3) industry security initiatives and challenges, and (4) DHS's authorities and whether additional legislation is needed to ensure chemical plant security. GAO interviewed DHS, EPA, and industry officials, among others.

As part of a national framework for protecting the chemical sector, DHS is developing a Chemical Sector-Specific Plan. The plan is intended to, among other things, describe DHS's ongoing efforts and future plans to coordinate with federal, state, and local agencies and the private sector; identify chemical facilities to include in the sector, assess their vulnerabilities, and prioritize them; and develop programs to prevent, deter, mitigate, and recover from attacks on chemical facilities. DHS did not estimate when the plan will be completed. To date, DHS has taken a number of actions aimed at protecting the chemical sector from terrorist attacks. DHS has identified 3,400 facilities that, if attacked, could pose the greatest hazard to human life and health and has initiated programs to assist the industry and local communities in protecting chemical facilities. For example, the Buffer Zone Protection Program assists facility owners and local law enforcement with improving the security of areas surrounding plants. DHS also coordinates with the Chemical Sector Coordinating Council, an industry-led group that acts as a liaison for the chemical sector, and with EPA and other federal agencies. The chemical industry is voluntarily addressing plant security, but faces challenges in preparing against terrorism. Some industry associations require member companies to assess plants' vulnerabilities, develop and implement plans to mitigate vulnerabilities, and have a third party verify that security measures were implemented. Other associations have developed security guidelines and other tools to encourage their members to address security. While voluntary efforts are under way, industry officials said that they face challenges in preparing facilities against terrorism, including high costs and limited guidance on how much security is adequate. Because existing laws provide DHS with only limited authority to address security at chemical facilities, it has relied primarily on the industry's voluntary security efforts. However, the extent to which companies are addressing security is unclear. Unlike EPA, for example, which requires drinking water facilities to improve their security, DHS does not have the authority to require chemical facilities to assess their vulnerabilities and implement security measures. Therefore, DHS cannot ensure that facilities are taking these actions. DHS has stated that its existing authorities do not permit it to effectively regulate the chemical industry, and that the Congress should enact federal requirements for chemical facilities. Many stakeholders agreed--as GAO concluded in 2003--that additional legislation placing federal security requirements on chemical facilities is needed. However, stakeholders had mixed views on the contents of any legislation, such as requirements that plants substitute safer chemicals and processes that potentially could reduce the risks present at these facilities.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-06-150, Homeland Security: DHS Is Taking Steps to Enhance Security at Chemical Facilities, but Additional Authority Is Needed This is the accessible text file for GAO report number GAO-06-150 entitled 'Homeland Security: DHS Is Taking Steps to Enhance Security at Chemical Facilities, but Additional Authority Is Needed' which was released on February 27, 2006. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Requesters: January 2006: Homeland Security: DHS Is Taking Steps to Enhance Security at Chemical Facilities, but Additional Authority Is Needed: [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-06-150]: GAO Highlights: Highlights of GAO-06-150, a report to congressional requesters: Why GAO Did This Study: Terrorist attacks on U.S. chemical facilities could damage public health and the economy. While the Environmental Protection Agency (EPA) formerly led federal efforts to ensure chemical facility security, the Department of Homeland Security (DHS) is now the lead federal agency coordinating efforts to protect these facilities from terrorist attacks. GAO reviewed (1) DHS‘s actions to develop a strategy to protect the chemical industry, (2) DHS‘s actions to assist in the industry‘s security efforts and coordinate with EPA, (3) industry security initiatives and challenges, and (4) DHS‘s authorities and whether additional legislation is needed to ensure chemical plant security. GAO interviewed DHS, EPA, and industry officials, among others. What GAO Found: As part of a national framework for protecting the chemical sector, DHS is developing a Chemical Sector-Specific Plan. The plan is intended to, among other things, describe DHS‘s ongoing efforts and future plans to coordinate with federal, state, and local agencies and the private sector; identify chemical facilities to include in the sector, assess their vulnerabilities, and prioritize them; and develop programs to prevent, deter, mitigate, and recover from attacks on chemical facilities. DHS did not estimate when the plan will be completed. To date, DHS has taken a number of actions aimed at protecting the chemical sector from terrorist attacks. DHS has identified 3,400 facilities that, if attacked, could pose the greatest hazard to human life and health and has initiated programs to assist the industry and local communities in protecting chemical facilities. For example, the Buffer Zone Protection Program assists facility owners and local law enforcement with improving the security of areas surrounding plants. DHS also coordinates with the Chemical Sector Coordinating Council, an industry-led group that acts as a liaison for the chemical sector, and with EPA and other federal agencies. The chemical industry is voluntarily addressing plant security, but faces challenges in preparing against terrorism. Some industry associations require member companies to assess plants‘ vulnerabilities, develop and implement plans to mitigate vulnerabilities, and have a third party verify that security measures were implemented. Other associations have developed security guidelines and other tools to encourage their members to address security. While voluntary efforts are under way, industry officials said that they face challenges in preparing facilities against terrorism, including high costs and limited guidance on how much security is adequate. Because existing laws provide DHS with only limited authority to address security at chemical facilities, it has relied primarily on the industry‘s voluntary security efforts. However, the extent to which companies are addressing security is unclear. Unlike EPA, for example, which requires drinking water facilities to improve their security, DHS does not have the authority to require chemical facilities to assess their vulnerabilities and implement security measures. Therefore, DHS cannot ensure that facilities are taking these actions. DHS has stated that its existing authorities do not permit it to effectively regulate the chemical industry, and that the Congress should enact federal requirements for chemical facilities. Many stakeholders agreed”as GAO concluded in 2003”that additional legislation placing federal security requirements on chemical facilities is needed. However, stakeholders had mixed views on the contents of any legislation, such as requirements that plants substitute safer chemicals and processes that potentially could reduce the risks present at these facilities. What GAO Recommends: GAO recommends that (1) the Congress consider giving DHS the authority to require the chemical industry to address plant security, (2) DHS complete the chemical sector-specific plan in a timely manner, and (3) DHS work with EPA to study the security benefits to plants of using safer technologies. After reviewing a draft of this report, DHS agreed in substance with GAO‘s first two recommendations but expressed concerns about studying safer technologies. GAO continues to see merit in such a study. EPA had no comments on the draft report. www.gao.gov/cgi-bin/getrpt?GAO-06-150. To view the full product, including the scope and methodology, click on the link above. For more information, contact John Stephenson at (202) 512-3841 or stephensonj@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: DHS Is Developing a Plan for Protecting the Chemical Sector: DHS Has Taken Actions to Assess Facilities' Vulnerabilities and Interact with the Industry and Other Federal Agencies: The Chemical Industry Continues Voluntary Efforts to Address Security, but Faces Challenges in Safeguarding Facilities: DHS Needs Additional Authority to Ensure That Chemical Facilities Are Addressing Security Issues: Conclusions: Matters for Congressional Consideration: Recommendations for Executive Action: Agency Comments and Our Evaluation: Appendixes: Appendix I: Objectives, Scope, and Methodology: Appendix II: Summary of the Chemical Industry's Voluntary Security Initiatives: Appendix III: Comments from the Department of Homeland Security: GAO Comments: Appendix IV: GAO Contact and Staff Acknowledgments: Tables: Table 1: Number and Percentage of Processes That Involve More Than Threshold Amounts of Hazardous Chemicals under the RMP, by Industry Sector: Table 2: Overview of Key Chemical Security Legislative Proposals in the 109th Congress: Table 3: Examples of Federal Security Requirements for Other Critical Infrastructure Sectors: Abbreviations: ACC: American Chemistry Council: ASC: Adhesive and Sealant Council: CGA: Compressed Gas Association: CSISSFRRA: Chemical Safety Information, Site Security and Fuels Regulatory Relief Act: DHS: Department of Homeland Security: EPA: Environmental Protection Agency: FACA: Federal Advisory Committee Act: FDA: Food and Drug Administration: FOIA: Freedom of Information Act: IAIP: Information Analysis and Infrastructure Protection: IME: Institute of Makers of Explosives: ISAC: Information Sharing and Analysis Center: MTSA: Maritime Transportation Security Act: NACD: National Association of Chemical Distributors: NPCA: National Paint and Coatings Association: NPRA: National Petrochemical and Refiners Association: NIPP: National Infrastructure Protection Plan: NISAC: National Infrastructure Simulation and Analysis Center: OMB: Office of Management and Budget: PCII: Protected Critical Infrastructure Information Program: RAMCAP: Risk Analysis Management for Critical Asset Protection: RMP: Risk Management Plan: SOCMA: Synthetic Organic Chemical Manufacturers Association: TFI: The Fertilizer Institute: Letter January 27, 2006: The Honorable Susan M. Collins: Chairman, Committee on Homeland Security and Governmental Affairs: United States Senate: The Honorable James M. Inhofe: Chairman, Committee on Environment and Public Works: United States Senate: The Honorable Christopher Shays: Chairman, Subcommittee on National Security, Emerging Threats, and International Relations: Committee on Government Reform: House of Representatives: Across the nation, approximately 15,000 facilities produce, use, or store more than threshold amounts of chemicals identified by the Environmental Protection Agency (EPA) as posing the greatest risk to human health and the environment if accidentally released into the air. These facilities include chemical manufacturers, storage and distribution facilities, fertilizer and pesticide facilities, pulp and paper manufacturers, water and wastewater treatment facilities, and refineries, among others. Since the events of September 11, 2001, government and other experts have recognized the potential threat that chemical facilities pose because many house toxic chemicals that could become airborne and drift to surrounding areas or be used to create a weapon capable of causing harm. In this regard, in 2003, the Department of Justice (Justice) reported that industrial chemical plants remain viable targets and warned that al Qaeda operatives may attempt to launch conventional attacks against U.S. chemical facilities to cause contamination, disruption, and terror. While these facilities potentially put large numbers of Americans at risk of injury or death in the event of a chemical release, the chemicals they produce, use, store, and distribute are critical to the nation's economy. The Homeland Security Act of 2002 established the Department of Homeland Security (DHS) and set forth its mission to, among other things, prevent terrorist attacks in the United States and reduce the vulnerability of the nation to terrorism.[Footnote 1] The President's February 2003 National Strategy for the Physical Protection of Critical Infrastructures and Key Assets sets forth the federal government's roles, objectives, and responsibilities in protecting the nation's critical infrastructure, including the chemical industry. In addition, consistent with the Homeland Security Act, a December 2003 presidential directive instructed DHS to produce a comprehensive integrated plan outlining national goals, objectives, milestones, and key initiatives for protecting critical infrastructure and key resources. The directive also names DHS as the lead agency for the chemical sector, a change from earlier national strategies that named EPA as the lead.[Footnote 2] Under an interim national plan released in February 2005, DHS is to identify and prioritize critical chemical facilities, evaluate the chemical sector's vulnerabilities and risks, develop and implement protective programs for high-priority chemical facilities, identify regulatory options for protective measures, and maintain a relationship with all stakeholders. The federal government's role in protecting chemical facilities from terrorist attacks has been much debated since September 11, 2001. Public debate has centered on whether the federal government should impose security requirements on chemical facilities or continue to work with the chemical industry to voluntarily address security concerns. Legislative proposals that would grant DHS or EPA, or one of these agencies in consultation with the other, the authority to require chemical facilities to take security steps were introduced in every Congress from 2001 to 2005. In this context, you asked us to examine federal and industry efforts to address security concerns at chemical facilities. Specifically, this report discusses (1) DHS's actions to develop an overall strategy for protecting the chemical industry; (2) DHS's efforts to identify high- risk chemical facilities, assess their vulnerabilities, ensure that facilities are addressing security, and coordinate with EPA in these efforts; (3) chemical industry security initiatives and challenges; and (4) DHS's existing authorities and whether additional legislative authority is needed to ensure that chemical facilities take action to address vulnerabilities. In conducting our work, we interviewed officials from DHS's Information Analysis and Infrastructure Protection Directorate (IAIP), and EPA's Office of Emergency Management. We also reviewed pertinent federal legislation; EPA data; and DHS documents, including the Interim National Infrastructure Protection Plan, an early draft of the Chemical Sector-Specific Plan; and other available reports. We interviewed representatives of all 16 associations participating on the Chemical Sector Coordinating Council, a group of chemical sector associations that facilitate the sharing of industry views with DHS.[Footnote 3] To obtain a broad range of industry views, we also spoke with at least one member company belonging to 13 of the key chemical industry associations.[Footnote 4] These companies included large chemical manufacturers; small-and medium-sized chemical distributors; companies that manufacture, distribute, and sell agricultural and specialty chemicals; and plastics manufacturers, among others. We also interviewed other organizations with chemical industry expertise, including the American Society of Mechanical Engineers, the Center for Chemical Process Safety, Sandia National Laboratories, and the Working Group on Community Right-to-Know, among others. We conducted our work from December 2004 through December 2005 in accordance with generally accepted government auditing standards. A more detailed description of our objectives, scope, and methodology is contained in appendix I. Results in Brief: As part of a national framework for reducing the overall vulnerability of the chemical sector in partnership with the industry and state and local authorities, DHS is developing a Chemical Sector-Specific Plan. Our review of a July 2004 draft of this plan--the most recent version available, according to DHS officials--and discussions with these officials on the contents of the final plan indicate that the plan will, among other things, describe: * the chemical industry, including providing background information and a detailed profile of the sector; * the regulatory authority of key federal agencies relative to the chemical industry; * DHS's coordination with federal, state, and local agencies, such as law enforcement and emergency management departments, and with the private sector on efforts that include sharing intelligence and security information; * DHS's efforts to identify chemical facilities that should be included in the sector, assess their vulnerabilities, and prioritize these facilities on the basis of risk; * DHS's development of protective programs in coordination with private and government entities to prevent, deter, mitigate, and recover from attacks on chemical facilities; * how DHS will measure DHS and the industry's performance in addressing security issues, and research and develop new protective security measures; and: * challenges in improving security, including collecting information about facilities from a large number of owners, communicating with chemical facility owners who do not belong to industry associations, coordinating the roles of sector stakeholders, and working without federal regulatory authority. DHS did not estimate when the plan will be completed. In developing its plan for the chemical industry, DHS initiated several actions to identify the sector's critical assets, prioritize facilities, develop and implement protective programs, exchange information with the private sector, and coordinate efforts with EPA and other federal agencies. DHS has determined the chemical sector's critical assets and identified about 3,400 high-priority facilities. In the future, however, the agency plans to use a new risk assessment methodology to compare and prioritize all critical infrastructure assets according to their level of threat, vulnerability to attack, and the consequences of an attack on the facility. To conduct this analysis, it will be necessary for chemical facility owners and operators to voluntarily assess and provide DHS with information on their vulnerabilities and potential consequences of an attack. DHS also has implemented a number of programs to assist the private sector and local communities in protecting chemical facilities. For example, DHS has conducted vulnerability assessments at 38 chemical facilities and shared suggestions for improvement with the facility owners and operators. In addition, DHS has worked with facility owners and local law enforcement to improve the security of areas surrounding a few high- risk chemical facilities in order to make launching an attack more difficult. DHS also shares threat information with the industry and coordinates sector activities with the Chemical Sector Coordinating Council, an industry-led working group that acts as a liaison for the chemical sector. Finally, DHS coordinates its chemical security efforts with EPA and other federal agencies through a government coordinating council. The chemical industry, led by its industry associations, has undertaken voluntary efforts to address plant security, but faces challenges in preparing facilities against terrorism. As we reported in March 2005, some industry associations require member companies to assess their facilities' vulnerabilities and make security enhancements.[Footnote 5] Three industry associations--the American Chemistry Council, the National Association of Chemical Distributors, and the Synthetic Organic Chemical Manufacturers Association--require as a condition of membership that companies conduct vulnerability assessments, develop and implement plans to mitigate vulnerabilities, and have a third party verify that the security enhancements were implemented. Other industry associations have encouraged their members to address security by developing security guidelines, best practices, and other tools. For example, a number of associations, including CropLife America, the Fertilizer Institute, and the National Petrochemical and Refiners Association, have developed guidelines and vulnerability assessment methodologies tailored specifically to their member companies' unique security concerns. While efforts are under way to address security, industry officials told us that they face a number of challenges in preparing facilities against a terrorist attack. They reported that the cost of security improvements can be a burden, particularly for smaller companies that may lack the resources larger chemical companies have to devote to security. Industry officials stated that federal assistance via grants or tax incentives to offset security costs could help them enhance security at facilities. Industry officials also cited the need for guidance on what level of security is adequate, noting that determining the appropriate level of security for different facilities is difficult. Existing laws provide DHS with only limited authority to address security concerns at U.S. chemical facilities. Because chemical facilities pose significant risks to millions of Americans, additional legislation is needed to give DHS the authority to require security improvements at these facilities. In this regard, DHS lacks the specific authority to require chemical facilities to assess their vulnerabilities and implement security measures. In addition, DHS currently lacks the authority to enter most chemical facilities without their permission for the purposes of assessing security or to enforce the implementation of any needed security improvements. Because, in contrast to some other critical infrastructure facilities--such as nuclear and drinking water facilities--chemical plants generally are not subject to federal security requirements, DHS has relied primarily on the voluntary participation of the private sector to address facility security. As a result, DHS cannot ensure that all high-risk facilities are assessing their vulnerability to terrorist attacks and taking corrective actions, where necessary. On this basis, we concluded in 2003 that additional legislation is needed to place federal security requirements on chemical facilities. Similarly, many of the stakeholders we contacted--including representatives from industry, research centers, and government--agreed on the need for additional legislation that would establish federal security requirements. These stakeholders had mixed views, however, on the specific contents of any legislation, such as requirements that facilities substitute safer chemicals and processes--referred to as "inherently safer technologies"--that could lessen the potential consequences of an attack by reducing the risks present at these facilities, but could be costly or infeasible for some plants. Finally, DHS also has concluded that its existing authorities do not permit it to effectively regulate the industry, and that the Congress should enact federal requirements for chemical facilities. Given that the nation's chemical facilities pose significant risks and the extent of their security preparedness is largely unknown, legislation giving DHS the authority to require the chemical industry to address security at their plants could help to better protect these facilities against a potential terrorist attack. We are recommending that the Congress consider providing DHS with the authority to require high-risk chemical facilities to assess their vulnerability to terrorist attacks and, where necessary, require these facilities to take corrective action. We are also recommending that DHS complete the Chemical Sector-Specific Plan in a timely manner and work with EPA to study the advantages and disadvantages of substituting safer chemicals and processes at some chemical facilities. In commenting on a draft of this report, DHS agreed that the Congress should consider granting DHS the authority to require the chemical industry to address plant security and that completing and implementing the sector-specific plan is a priority. However, DHS disagreed with our recommendation that the department work with EPA to study the security benefits to chemical plants of using safer technologies. DHS believes that the use of safer technologies would not generally result in more secure chemical facilities and would tend to shift risks rather than eliminate them. DHS also stated that it is unclear what role EPA would play in a study of the benefits of using safer technologies or how DHS's interaction with EPA might be perceived among DHS's private sector partners. Background: Experts agree that chemical facilities present an attractive target for terrorists intent on causing massive damage. Terrorist attacks involving the theft or release of certain chemicals could significantly impact the health and safety of millions of Americans; disrupt local or regional economies; or impact other critical infrastructures that rely on chemicals, such as drinking water and wastewater treatment systems. The disaster in Bhopal, India, in 1984, when methyl isocyanate--a highly toxic chemical--leaked from a tank, reportedly killing about 3,800 people and injuring anywhere from 150,000 to 600,000 others, illustrates the potential threat to public health from a chemical release. As we reported in 2003, Justice has been warning of the terrorist threat to chemical facilities for a number of years and has concluded that the risk of an attempt in the foreseeable future to cause an industrial chemical release is both real and credible.[Footnote 6] On the basis of analysis of trends in international and domestic terrorism and the burgeoning interest in weapons of mass destruction among criminals and terrorists, Justice warned of potential targeting of chemical facilities by terrorists even before the events of September 11, 2001. In fact, according to Justice, domestic terrorists plotted to use a destructive device against a U.S. facility that housed millions of gallons of propane in the late 1990s. According to news reports, terrorists also have targeted chemical facilities in Europe. Furthermore, on May 15, 2005, bombs were detonated in Spain by suspected Basque separatists at two chemical plants, a paint factory, and a metal works facility, leading to minor injuries from toxic fume inhalation. No one has yet comprehensively assessed security at the nation's chemical facilities. In April 2005 testimony before the Senate Committee on Homeland Security and Governmental Affairs on chemical facility security, experts from the Council on Foreign Relations and the Brookings Institute underscored the threat that U.S. chemical facilities pose and expressed concern about the adequacy of security at these facilities. While federal and state governments and the chemical industry have taken steps to address security at chemical facilities, recent studies and media exposés have raised doubts about security at some plants. According to media accounts, every year from 2001 to 2005, reporters and environmental activists gained access to chemical tanks and computer centers that control manufacturing processes at a number of facilities, including American Chemistry Council (ACC) member company facilities. In addition, a 2004 survey of employees at 189 chemical facilities conducted for the Paper, Allied-Industrial, Chemical, and Energy Workers International Union found that employees had doubts about the effectiveness of facilities' efforts to prevent a terrorist attack. Less than half of the respondents (44 percent) indicated that their companies' preventative actions, including security efforts, were effective in reducing facility vulnerabilities to terrorist attack. The U.S. Chemical Safety and Hazard Investigation Board also testified in April 2005 that gaps in safety and emergency response preparedness at chemical facilities leave Americans vulnerable. Furthermore, some environmental and advocacy groups believe reducing safety risks should be an integral part of facilities' efforts to reduce the potential consequences of a terrorist attack. These groups advocate reducing the inherent risks that toxic chemicals present by substituting safer chemicals or switching to inherently safer technologies. Universe of Chemical Facilities: EPA regulates about 15,000 facilities under the Clean Air Act because they produce, use, or store more than certain threshold amounts of specific chemicals that would pose the greatest risk to human health and the environment if they were accidentally released into the air. These facilities must take a number of steps, including preparing a risk management plan (RMP), to prevent and prepare for an accidental release and, therefore, are referred to as RMP facilities. These facilities fall within a variety of industries and produce, use, or store a host of products, including (1) basic chemicals used to manufacture other products, such as fertilizers, plastics, and synthetic fibers; (2) specialty chemicals used for a specific purpose, such as a functional ingredient or a processing aid in the manufacture of a range of products, including adhesives and solvents, coatings, industrial gases and cleaners, and water management chemicals; (3) life science chemicals consisting of pharmaceuticals and pesticides; and (4) consumer products, such as hair and skin products and cosmetics. Some of these facilities are part of critical infrastructure sectors other than the chemical sector. For example, about 2,000 of these facilities are community water systems that are part of the water infrastructure sector. In addition, other facilities that house hazardous chemicals that are listed under the RMP regulations are not subject to RMP requirements because the quantities stored or used are below threshold amounts. However, these facilities could also potentially be at risk of terrorist attacks. Table 1 outlines the number and percentage of processes in different industry sectors that involve more than threshold amounts of hazardous chemicals. Table 1: Number and Percentage of Processes That Involve More Than Threshold Amounts of Hazardous Chemicals under the RMP, by Industry Sector: Industry sector: Agriculture and farming, farm supply, fertilizer production, and pesticides; Number of processes: 5,767; Percentage of processes: 29%. Industry sector: Water supply and wastewater treatment; Number of processes: 3,456; Percentage of processes: 17%. Industry sector: Chemical manufacturing; Number of processes: 3,758; Percentage of processes: 19%. Industry sector: Energy production, transmission, transport, and sale; Number of processes: 3,045; Percentage of processes: 15%. Industry sector: Food and beverage manufacturing and storage (including refrigerated warehousing); Number of processes: 2,531; Percentage of processes: 13%. Industry sector: Chemical warehousing (not including refrigerated warehousing); Number of processes: 238; Percentage of processes: 1%. Industry sector: Other[A]; Number of processes: 1,033; Percentage of processes: 5%. Industry sector: Total[B]; Number of processes: 19,828; Percentage of processes: 100%[C]. Source: EPA. [A] "Other" represents a large variety of industry sectors, including pulp mills, iron and steel mills, cement manufacturing, and computer manufacturing. [B] The total number of covered processes is not equal to the 15,000 RMP facilities because some RMP facilities have more than one covered process (i.e., multiple processes containing more than a threshold amount of a covered hazardous chemical). [C] Percentages do not total 100 percent due to rounding. [End of table] The Federal Government's Roles and Responsibilities in Protecting the Chemical Sector: The Homeland Security Act established DHS and set forth its mission to, among other things, prevent terrorist attacks within the United States, reduce the nation's vulnerability to terrorism, and minimize the damage from and assist in the recovery from terrorist attacks that occur within the United States. The act also established DHS's IAIP and made it responsible for critical infrastructure protection and information analysis functions.[Footnote 7] As part of its statutory responsibilities, IAIP must develop a comprehensive national plan for securing the key resources and critical infrastructure of the United States. IAIP's other responsibilities include identifying threats, conducting comprehensive assessments of the vulnerabilities of key resources, conducting risk assessments to determine the risks posed by certain types of terrorist attacks, identifying priorities for protective measures, and recommending measures to protect critical infrastructure and key resources. The Secretary of the Department of Homeland Security has given IAIP responsibility for creating and managing private sector advisory councils composed of representatives of industries and associations designated by the Secretary to advise the Secretary on various matters, including private sector products, applications, and solutions, as they relate to homeland security challenges.[Footnote 8] This act and the December 2003 presidential directive established the framework under which IAIP carries out its responsibilities for coordinating the overall national critical infrastructure protection effort. The directive designates a lead federal agency for each critical infrastructure sector, such as agriculture, banking and finance, and chemical. DHS is now the lead, or sector-specific agency, for the chemical infrastructure, which is a change from national strategies issued in July 2002 and February 2003 that named EPA as the lead agency. IAIP is responsible for infrastructure protection activities for the chemical sector, including developing a plan for protecting the chemical sector by July 2004. Other IAIP chemical sector responsibilities include: * collaborating with relevant federal agencies, state and local governments, and the private sector; * conducting or facilitating vulnerability assessments of the chemical sector; * encouraging risk management strategies to protect against and mitigate the effects of attacks against chemical sector assets; and: * collaborating with the appropriate private sector entities and continuing to encourage the development of information-sharing and analysis mechanisms and to support sector coordinating mechanisms. In February 2005, DHS released an Interim National Infrastructure Protection Plan that also outlines the responsibilities of sector- specific agencies. As the lead agency for the chemical sector, the national plan calls for DHS to identify and prioritize critical chemical facilities, evaluate the chemical sector's vulnerabilities and risks, develop and implement protective programs for high-priority chemical facilities, identify regulatory options for protective measures, and maintain a relationship with all stakeholders. Currently, federal requirements address security at some U.S. chemical facilities. A small number of chemical facilities must comply with the Maritime Transportation Security Act of 2002 (MTSA). MTSA and its implementing regulations require maritime facility owners and operators to conduct assessments of certain at-risk facilities to identify vulnerabilities, develop security plans to mitigate these vulnerabilities, and implement the measures discussed in the security plans. MTSA and implementing regulations also require that the United States Coast Guard conduct inspections at these facilities and prohibit operation of facilities that do not have required security plans approved by the Secretary or that are not operating in compliance with these plans. According to July 27, 2005, testimony before the Senate Homeland Security and Governmental Affairs Committee, the Coast Guard has reviewed and approved facility security plans for 300 chemical facilities. Some states and localities have also created security requirements at chemical facilities. For example, Maryland's Hazardous Material Security Act requires RMP facilities in the state to perform vulnerability assessments, develop and implement security measures, and report to the state Department of the Environment. Under New York's Anti-Terrorism Preparedness Act of 2004, the state Office of Homeland Security, subject to available appropriations, must require certain chemical facilities to conduct vulnerability assessments. Under the Domestic Security Preparedness Task Force established by New Jersey law, New Jersey Department of Environmental Protection officials work with the state's chemical facilities to adopt security best practices. In addition, Baltimore, Maryland, requires chemical manufacturers to follow a set of safety and security regulations devised by its fire and police commissioners; noncompliance can result in penalties, such as the withholding or suspension of facility operating permits. Separate from its responsibilities for enhancing the protection of the chemical sector from terrorist attacks, the federal government imposes safety and emergency response requirements on chemical facilities that may incidentally reduce the likelihood and consequences of terrorist attacks. For example, the Emergency Planning and Community Right to Know Act requires owners and operators of facilities that maintain specified quantities of certain extremely hazardous chemicals to annually submit information on their chemical inventory to state and local emergency response officials. This information is used to help prepare community response plans in the event of a chemical incident. Furthermore, under the Clean Air Act, EPA requires owners and operators of RMP facilities to prepare and implement a plan to detect and prevent or minimize accidental releases. In addition to evaluating "worst-case" accidental release scenarios, facility owners and operators must implement a program to prevent accidental releases that includes safety precautions and maintenance, and monitoring and training measures, and they must have an emergency response plan. The Department of Labor's Occupational Safety and Health Administration's process safety management standard also requires facilities to assess and address the hazards of their chemical processes. All of these requirements could potentially mitigate a terrorist attack by (1) providing an incentive to facilities to reduce or eliminate chemicals below regulated threshold levels, (2) requiring facilities to implement measures to improve the safety of areas that are vulnerable to a chemical release, and (3) facilitating emergency response planning that increases preparedness for a chemical release--whether intentional or unintentional. Legislative Proposals: Since 2001, the Congress has considered a number of legislative proposals that would give the federal government a greater role in ensuring the protection of the nation's chemical facilities. These legislative proposals would have granted DHS or EPA, or one of these agencies in consultation with the other, the authority to require chemical facilities to conduct vulnerability assessments and implement security measures to address their vulnerabilities. In the 109th Congress, three bills have been introduced but have not yet been acted upon: H.R. 1562, H.R. 2237, and S. 2145. Table 2 provides an overview of the major provisions of these legislative proposals. Table 2: Overview of Key Chemical Security Legislative Proposals in the 109th Congress: Major provisions: General requirements; H.R. 1562: High-priority facilities would be required to submit vulnerability assessments and security plans to DHS; other chemical sources would be required to self-certify completion of assessments and plans and provide DHS copies upon request; H.R. 2237: High-priority facilities would be required to submit vulnerability assessments and to certify that they have prepared prevention, preparedness, and response plans to EPA; S. 2145: Designated chemical sources would be required to submit vulnerability assessments, security plans, and emergency response plans to DHS. The assessment and security plan would be required to address security performance standards established by DHS for each risk-based tier. Chemical sources would be required to self-certify completion of assessments and plans. Major provisions: Role of DHS and EPA; H.R. 1562: DHS, in consultation with EPA, would identify high-priority categories of facilities; DHS would receive and review assessments and plans; H.R. 2237: EPA, in consultation with DHS and state and local agencies, would identify high-priority categories of facilities; EPA would receive assessments and certifications; S. 2145: DHS would designate facilities as chemical sources and assign each chemical source to a risk-based tier. DHS would receive and review assessments, plans, and certifications. EPA would have no role. Major provisions: Compliance enforcement; H.R. 1562: DHS would, when and where it deems appropriate, conduct or require the conduct of vulnerability assessments and other activities to ensure and evaluate compliance; DHS could disapprove a vulnerability assessment or site security plan; following written notification and consultation with the owner or operator, DHS could issue a compliance order; H.R. 2237: Not later than 3 years after the deadline for submission of vulnerability assessments and response plans, EPA, in consultation with DHS, would review and certify compliance of each assessment and plan; following consultation with DHS, and 30 days after providing notification to the facility and providing advice and technical assistance to bring the assessment or plan into compliance and address threats, EPA could issue a compliance order; S. 2145: DHS would review and approve or disapprove all vulnerability assessments, security plans, and emergency response plans for facilities in higher risk tiers within 1 year, and within 5 years for all other facilities. DHS would be required to disapprove of any vulnerability assessment, site security plan, or emergency response plan not in compliance with the vulnerability assessment, site security plan, and emergency response plan requirements. For higher risk facilities, if DHS disapproves the assessment or plans, the Secretary could issue an order to a chemical source to cease operation. For other facilities, the Secretary could issue an order to a chemical source to cease operation, but only after a process of written notification, consultation, and time for compliance. Major provisions: Penalties for noncompliance; H.R. 1562: Would provide for court awarded civil penalties up to $50,000 per day for failure to comply with an order, site security plan, or other recognized procedures, protocols, or standards, and administrative penalties up to $250,000 for failure to comply with an order; H.R. 2237: Would provide for court awarded civil penalties up to $25,000 per day, criminal penalties, and administrative penalties (if the total civil penalties do not exceed $125,000) for failure to comply with an order; S. 2145: Would provide for court awarded civil penalties up to $50,000 per day, and administrative penalties of not more than $25,000 per day (not to exceed $1 million per year) for failure to comply with a DHS order or directive issued under the act. Also calls for criminal penalties of up to $50,000 in fines per day, imprisonment for not more than 2 years, or both for knowingly violating an order or failing to comply with a site security plan. Major provisions: Inherently safer technologies requirements; H.R. 1562: None; H.R. 2237: Response plans would be required to include a description of safer design and maintenance options considered and reasons those options were not implemented; EPA would be required to establish a clearinghouse for information on inherently safer technologies and would be authorized to provide grants to assist chemical facilities demonstrating financial hardship in implementing inherently safer technologies; S. 2145: None. Major provisions: Information protections; H.R. 1562: Would exempt information obtained from disclosure under the Freedom of Information Act (FOIA) or otherwise, or from disclosure under state or local laws; information would also not be subject to discovery or admitted into evidence in any federal or state civil judicial or administrative procedure other than in civil compliance action brought by DHS. Calls for DHS, in consultation with others, to establish confidentiality protocols; H.R. 2237: Would exempt information obtained from disclosure under FOIA; calls for EPA, in consultation with DHS, to establish information protection protocols; S. 2145: Would exempt information obtained from disclosure under FOIA, or from disclosure under state or local laws. Certifications submitted by the chemical sources, orders for failure to comply, and certificates of compliance and other orders would generally be made available to the public. Calls for DHS, in consultation with the Director of the Office of Management and Budget and appropriate federal law enforcement officials, to create confidentiality protocols for the maintenance and use of records; would establish penalties for the unlawful disclosure of protected information. Major provisions: Equivalence of industry codes; H.R. 1562: Upon petition, DHS would be required to endorse other industry, state, or federal protocols or standards that the Secretary of DHS determines to be substantially equivalent; H.R. 2237: None; S. 2145: Would allow the Secretary to determine that vulnerability assessments, security plans, and emergency response plans prepared under alternative security programs meet the act's requirements and to permit submissions or modifications to the assessments or plans. Major provisions: Other; H.R. 1562: Would grant DHS right of entry; would exempt facilities that are subject to MTSA (port facilities) or the Bioterrorism Act (community water systems). Except with respect to protection of information, would not affect requirements imposed under state law; H.R. 2237: Would grant EPA right of entry; would authorize EPA to provide grants for training of first responders and employees at chemical facilities; would not affect requirements imposed under state law; S. 2145: Would grant DHS right of entry; would exempt facilities that are subject to MTSA from certain area security requirements but these facilities would otherwise comply with the act's requirements. Would preserve the right of states to adopt chemical security requirements that are more stringent than the federal standard, as long as the state standard does not conflict with the federal standard. Source: GAO analysis of proposed legislation. [End of table] Also in the 109th Congress, the conference committee for H.R. 2360, making appropriations for DHS for fiscal year 2006, directed DHS to: * submit a report to the Senate and House Committees on Appropriations by February 10, 2006, describing (1) the resources needed to implement mandatory security requirements for the chemical sector and to create a system for auditing and ensuring compliance with the security standards and (2) the security requirements and any reasons why the requirements should differ from those already in place for chemical facilities that operate in a port zone; * complete vulnerability assessments of the highest risk U.S. chemical facilities by December 2006, giving preference to facilities that, if attacked, pose the greatest threat to human life and the economy; and: * complete a national security strategy for the chemical sector by February 10, 2006.[Footnote 9] DHS Is Developing a Plan for Protecting the Chemical Sector: As part of an overall National Infrastructure Protection Plan (NIPP), DHS is developing a plan for protecting the chemical sector that will establish a framework for reducing the overall vulnerability of the sector in partnership with the industry and state and local authorities. The NIPP will outline how DHS and relevant stakeholders will develop and implement the national effort to protect infrastructures across all sectors. In February 2005, DHS released an interim NIPP that provides a strategy for critical infrastructure protection and a means for discussion with critical stakeholders. The NIPP states that each sector-specific agency is responsible for developing, implementing, and maintaining a sector-specific plan for their sector. Each plan is supposed to outline strategies for (1) collaborating with all relevant federal departments and agencies, state and local governments, and the private sector; (2) identifying assets; (3) conducting or facilitating vulnerability assessments; and (4) encouraging risk management strategies to protect against and mitigate the effects of an attack. The Chemical Sector-Specific Plan will be an appendix to the NIPP. While DHS did not provide an estimated completion date for either the Chemical Sector-Specific Plan or the NIPP, DHS stated that the plan and the plans for the other critical infrastructure and key resource sectors will be completed within 6 months of approval of the NIPP. As the agency with lead responsibility for the chemical sector, DHS is responsible for developing the chemical sector-specific plan. DHS completed a draft of the plan in July 2004. Since that time, DHS has worked to revise the plan to accommodate changes to DHS's risk management strategy, comments from stakeholders' review of the NIPP, and consultation with chemical sector stakeholders. While DHS officials told us that the structure of the final plan will differ from the July 2004 version, they said that the basic principles and content described in that draft will still be included in the final plan. On the basis of our review of the draft plan and discussions with DHS officials, the final plan will: * present background information on the sector, including a description of (1) the types of assets that are considered part of the chemical sector; (2) the regulatory authority of key federal agencies relative to the chemical industry and the key stakeholders in the sector; (3) the roles and responsibilities of each stakeholder; and (4) DHS's coordination with federal, state, and local agencies, such as law enforcement and emergency management departments, and with the private sector on efforts that include sharing intelligence and security information; * describe the process DHS will use to develop a comprehensive inventory of assets in the chemical sector, including plans for working with the private sector to develop this inventory, since the critical infrastructure in the chemical sector is predominantly privately owned and operated; * describe DHS's efforts to identify and assess the vulnerabilities of chemical facilities and how DHS plans to prioritize these efforts on the basis of the vulnerability assessments; * outline the protective programs that will be created to prevent, deter, mitigate, and recover from attacks on chemical facilities, and describe how DHS will work with private sector and government entities to implement these programs; * explain the performance metrics DHS will use to measure the effectiveness of DHS and industry security efforts and ensure that DHS meets its overall critical infrastructure goals, including (1) identifying and assessing the vulnerability of the nation's critical infrastructure and key resources; (2) ensuring the protection of the nation's critical infrastructure and key resources from terrorist attack; (3) establishing a collaborative environment across all levels of government and with the private sector to better protect the nation's critical infrastructure and key resources; and (4) coordinating and integrating, as appropriate, with other federal emergency management and preparedness activities, including the National Response Plan;[Footnote 10] * document DHS's plans to work with stakeholders to review current federal research and development initiatives for prioritization and to identify gaps between the chemical sector's requirements and current projects in order to identify research and development needs; and: * outline challenges the department faces in coordinating the efforts of the chemical sector, such as collecting information about facilities from a large number of owners; communicating with chemical facility owners who do not belong to industry associations; coordinating the roles of sector stakeholders; and working without federal regulatory authority. Furthermore, in September 2005, the conference committee, in the conference report for the Department of Homeland Security Appropriations Act, 2006, directed DHS to complete a national security strategy for the chemical sector by February 10, 2006.[Footnote 11] According to DHS, the department is preparing a high-level strategic document--the National Strategy for Securing the Chemical Sector--that is separate but complementary to the Chemical Sector-Specific Plan. Our March 2003 report on chemical security recommended that DHS develop a comprehensive national chemical security strategy that is both practical and cost-effective.[Footnote 12] We recommended that the strategy identify high-risk facilities, collect information on industry security preparedness, specify the roles and responsibilities of each federal agency partnering with the chemical industry, and develop appropriate information-sharing mechanisms. If the final Chemical Sector-Specific Plan includes the elements DHS has described, it should meet the criteria set out in this recommendation. DHS Has Taken Actions to Assess Facilities' Vulnerabilities and Interact with the Industry and Other Federal Agencies: DHS has taken initial action to identify the chemical sector's critical assets, prioritize facilities, develop and implement protective programs, exchange information with the private sector, and coordinate efforts with EPA and other federal agencies. In this regard, DHS has identified about 3,400 chemical facilities as posing the greatest hazard to human life and health, and it is developing a new risk assessment methodology to compare and prioritize all critical infrastructure assets according to their level of threat, their vulnerability to attack, and the consequences of an attack on the facility. Furthermore, DHS has implemented a number of programs to assist the private sector and local communities in protecting chemical facilities, conducted site vulnerability assessments at 38 facilities, and installed cameras at some high-consequence facilities. DHS is also distributing threat information to the industry and coordinating sector activities with the Chemical Sector Coordinating Council, an industry- led working group that acts as a liaison for the chemical sector. Finally, DHS is coordinating with EPA and other federal agencies through a government coordinating council. DHS Is Conducting Efforts to Identify and Prioritize Facilities: As the chemical sector-specific agency, one of DHS's key responsibilities under the interim NIPP is to identify the assets of the chemical sector and prioritize them according to risk. DHS's ongoing efforts in this regard, once completed, should produce a methodology for identifying critical assets in the chemical sector and comparing assets across sectors. DHS Is Identifying High-Priority Sites: DHS has identified approximately 3,400 chemical facilities that it believes pose the greatest hazard to human life and health in the event of a terrorist attack. To develop an inventory of the chemical sector's critical assets, DHS first had to define what the sector includes. According to DHS officials, in general, they consider the chemical sector to include facilities that manufacture, distribute, and store chemicals, but not retail facilities. The chemical sector also includes facilities that overlap with other critical infrastructure sectors. For example, refineries, while considered part of the energy sector, use large amounts of chemicals and are often colocated with chemical manufacturing facilities. In addition, water purification and sanitation facilities are part of the water sector, but they store large amounts of chemicals on-site. Similarly, agricultural facilities house toxic chemicals, such as fertilizers and pesticides. While the chemical sector includes a large number of facilities, DHS is focusing its efforts for the sector by identifying high-priority facilities. As a starting point, DHS has adapted EPA's RMP database of facilities with more than threshold amounts of certain chemicals to develop an interim inventory of chemical facilities of concern in the event of a terrorist attack. DHS officials told us that, to prioritize facilities, they reduced the list of RMP facilities in the database by eliminating entries that were redundant and 3,000 facilities that were no longer in business or were no longer RMP facilities (e.g., they had reduced the volume of chemicals on-site below the RMP threshold).[Footnote 13] Furthermore, DHS determined that 8,000 of the remaining sites were the responsibility of another critical infrastructure sector. For example, DHS removed water treatment and distribution facilities because they fall under the water critical infrastructure sector, which is the responsibility of EPA. In addition, DHS removed agricultural facilities, such as fertilizer and pesticide distributors. DHS's analysis resulted in approximately 4,000 facilities. According to DHS officials, DHS then conducted a consequence analysis of these remaining facilities to identify those that, if attacked, would endanger the largest number of lives. According to DHS, the analysis included the following: * Reviewing the amount and toxicity of RMP materials stored at sites. For example, DHS eliminated some facilities with flammable chemicals because they would not create catastrophic effects when released. DHS focused on toxic chemicals that pose inhalation hazards and very high- order flammables and explosives. * Reviewing the population density in the vicinity of facilities with large amounts of toxic chemicals. DHS modeled potential toxic plumes from facilities and revised the population estimates of the RMP worst- case scenarios to develop what they believe is a more realistic estimate of the population that a terrorist attack would harm.[Footnote 14] * Evaluating possible impacts of an intentional attack, instead of using the accidental release model used in the RMP program. For example, DHS evaluated the daytime versus the nighttime population surrounding facilities and the possible impact resulting from the release of the entire volume of chemicals at a facility during an attack. By contrast, the RMP analysis considers the impacts of the release of the chemical volume in the single largest container. * Consulting with industry experts to identify facilities that, if attacked, could cause serious economic harm or the shortage of critical materials. On the basis of this analysis, DHS identified approximately 3,400 chemical facilities where a worst-case scenario release potentially could affect over 1,000 people. According to DHS, 272 of these facilities could potentially affect more than 50,000 people. These 272 facilities include chemical manufacturing plants as well as some refineries located with petrochemical facilities, wastewater treatment facilities, and other types of chemical facilities. In commenting on our report, DHS noted that it did not intend wastewater treatment facilities to be incorporated in the list of top facilities. DHS Is Piloting a Risk Analysis Tool to Prioritize Facilities: DHS is developing a new process known as Risk Analysis Management for Critical Asset Protection (RAMCAP) that will allow the department to apply a risk management approach to prioritize assets in all critical infrastructure sectors. According to DHS, RAMCAP will provide a common methodology, terminology, and framework for homeland security risk analysis and decision making that is intended to allow consistent risk management across all sectors. According to DHS, RAMCAP will improve DHS's ability to collect information on critical infrastructure assets, compare risks across assets, and increase owners' and operators' awareness of the vulnerabilities and consequences at their sites. DHS contracted with the American Society of Mechanical Engineers to assist it in creating the RAMCAP methodology. In 2004, the society presented the methodology to academic and industry officials and incorporated their comments. The feedback from many industry officials conveyed that the methodology was complex, and that industry officials completing the methodology would need assessment tools with terminology specific to their sector. As a result, the society hired subcontractors with industry expertise to develop sector-specific vulnerability assessment methodologies for five sectors: (1) chemical, (2) nuclear power, (3) nuclear fuel storage, (4) petroleum refining, and (5) liquefied natural gas storage/terminals. According to a society official, the subcontractor developing the chemical sector methodology studied and incorporated elements from existing methodologies, such as those developed by Sandia National Laboratories and the American Institute for Chemical Engineers' Center for Chemical Process Safety. The RAMCAP chemical sector methodology differs from these methodologies in that it uses terminology and processes that will be consistent with other sector methodologies and will allow comparisons to be made from the results of facility assessments across sectors. To assist in the development of the chemical sector tools, the subcontractor created a committee composed of representatives from chemical companies, such as Dow, DuPont, and Air Products; trade associations; national laboratories; and other entities with expertise, such as the Center for Chemical Process Safety. In the first step in the RAMCAP process, chemical facility owners/operators will voluntarily complete a screening tool (top screen) through a secure Web site. The top screen helps identify the consequences of an attack at a facility, including the human, economic, and psychological impacts. It would also identify such things as whether a facility produces a product that is essential to the military or pharmaceutical industry, or that is critical to the delivery of water or energy. On the basis of the results of the screening tool, DHS will identify facilities of highest concern and ask them to voluntarily complete a security vulnerability assessment, the second step in the RAMCAP process. Facility owners/operators will be able to use the results of previous vulnerability assessments they may have conducted to assist them in completing the RAMCAP process. The security vulnerability assessment will include the following steps: * assessment of facility characteristics, such as potential target areas and facility attractiveness to attack; * threat characterization of specific scenarios of concern--these "benchmark threats" of concern to the government will allow cross- sector comparison; * consequence analysis of the impacts that could be produced by an attack; and: * vulnerability assessment of a facility's existing security measures in place, including mitigation, detection, and response capability. According to DHS officials, DHS will work with industry associations to distribute the RAMCAP screening tool to the highest consequence chemical facilities. DHS officials expect that between 5 and 10 percent of those chemical facility owners/operators will be asked to complete the self-vulnerability assessment. DHS has tested both the screening tool and the vulnerability assessment, and several private sector companies have also volunteered to pilot test the vulnerability assessment. In 2005, New York's Office of Homeland Security, working with DHS, requested all chemical facilities in the state to complete the RAMCAP screening tool. According to industry officials, however, the companies that pretested the vulnerability assessment found the exercise valuable but difficult to complete. They said that DHS officials assisted their companies in completing the assessment and expressed concern that some owners/operators may have difficulty completing the assessment without DHS's help. Some chemical company officials who had not participated in the pilot told us that they would be reluctant to complete the RAMCAP assessment, citing concerns about the work involved, the need for DHS to collect the information, and the ability of DHS to safeguard information on the facilities' security vulnerabilities. In addition, DHS recognizes that it will have difficulty in collecting information about chemical facilities and verifying these data due to the large number of facilities in the sector. While DHS plans to work with industry associations to encourage owners/operators to share information, private sector participation will be voluntary, and some companies do not belong to industry associations and, therefore, may not be easily contacted. According to DHS's draft Chemical Sector- Specific Plan, DHS does not have the resources to verify asset data for all chemical facilities and will have to rely in large part on the accuracy of information submitted by the owners/operators and federal, state, and local agencies. However, DHS plans to verify submitted information relating to high-consequence facilities. DHS Has a Number of Programs to Assist the Private Sector in Reducing Vulnerabilities: DHS has implemented a number of programs designed to assist the department in assessing chemical industry vulnerabilities, develop best practices, and assist the private sector and law enforcement in improving the security of high-risk chemical facilities. These programs will help DHS gather needed information on facilities and the level of security preparedness of the industry. Buffer Zone Protection Program: Through this program, DHS works with local law enforcement officials and facility owners to improve the security of the area surrounding the facility or "outside of the fence." Improving the security of this buffer zone makes it more difficult for a terrorist to conduct surveillance or launch an attack. In general, a DHS team will visit a chemical plant and consider the facility's vulnerabilities and the community's capability to prevent and respond to an attack. Then, DHS brings together the appropriate local emergency response officials and provides training on how to assess buffer zone security and identify specific measures to reduce or eliminate vulnerabilities. Local officials conduct an assessment and summarize their work and the protective measures needed in a Buffer Zone Protection Plan. DHS reviews the plan and provides funding assistance to the community for some of the protective measures. According to DHS officials, the process helps facilitate relationships between owners/operators and the various response and law enforcement entities in the community. Several company officials we contacted who had participated in buffer zone assessments agreed with DHS's assessment of the process. For example, one company told us that the process helped them develop a relationship with the local police, who are not always involved in emergency response planning at facilities. After the buffer zone assessment, the local police now patrols the company's fence on every shift. Prior to March 2005, the Buffer Zone Protection Program was a loan program. DHS purchased equipment directly for loan to the states for a 1-year period prior to formal transfer of ownership. DHS received buffer zone plans for 10 chemical facilities and loaned over $260,000 in equipment to these jurisdictions. DHS also has conducted 63 technical assistance visits to assist chemical facility owners/operators and local law enforcement in assessing their buffer zone security. In March 2005, DHS announced a targeted grant program for states to purchase equipment that will enhance security measures around facilities.[Footnote 15] DHS identified 259 chemical manufacturing plants and storage and stockpile supply areas that are eligible under program guidelines for $12.95 million from the Buffer Zone Protection Plan grant program. According to DHS officials, these are sites with 50,000 people living in close enough proximity that, if attacked, some portion of this population would be at risk of death or serious injury.[Footnote 16] States may apply for these grants on the behalf of local jurisdictions that plan to implement protective measures.[Footnote 17] The local jurisdictions must conduct a buffer zone assessment and prepare a plan requesting funds for equipment on an approved list. Before the state can allocate funds, the guidelines state that DHS must approve the buffer zone plan and spending plan. States have until April 30, 2006, to apply for these funds. Site assistance visits: To assess and identify vulnerabilities at chemical facilities, DHS deploys teams of experts from both government and industry to facilities to conduct a site assistance visit. The teams conducting the visits have subject matter expertise in various areas, including physical security measures, system interdependencies, and terrorist attack planning. The teams have a field template to guide their efforts, and a typical visit lasts 1 to 2 days. Officials at participating facilities receive assistance in addressing security issues at their sites and obtain current threat information. At the conclusion of the visit, DHS suggests mitigation measures for the company to consider. As a result of these visits, DHS learns valuable information about chemical facility vulnerabilities and obtains information to assist in developing reports and identifying training for industry. As of June 15, 2005, DHS had conducted 38 site assistance visits at chemical facilities. These visits included trips to water/wastewater treatment facilities that store and use chemicals, major refineries, and chemical manufacturing facilities. DHS selected facilities to visit on the basis of a variety of factors, including whether the facility (1) would have significant economic or public health effects if attacked, (2) is near a special event of national significance, or (3) is in the vicinity where another site assistance visit is planned and whether the visit was requested by the owner/operator. DHS plans to conduct additional site assistance visits to chemical facilities in fiscal year 2006 on the basis of need. Maritime Transportation Security Act: The Coast Guard, now under DHS, is responsible for the MTSA program at facilities located along waterways, including 238 chemical sites. Program regulations established a process and deadlines for maritime facilities to follow in assessing their security risks and preparing related plans to include actions to mitigate any identified vulnerabilities. The Coast Guard has approved plans for all of these facilities and completed on- site compliance inspections. The Coast Guard has stated that it will continue to visit annually these and all facilities subject to MTSA to ensure compliance. The Coast Guard has awarded Port Security Grants to a number of chemical facilities to provide assistance for physical security enhancements.[Footnote 18] Other protective measure programs: DHS will place 68 protective security advisors in metropolitan areas across the country. The advisors have experience related to vulnerability reduction and physical security and many have law enforcement or military backgrounds. The advisors serve as a liaison between federal efforts and those by the state, local, and private sector. The advisors have responsibility for assisting in identifying high-priority facilities, providing the local community with information on threats and best practices, and coordinating training and facility visits. In addition, DHS has installed cameras for security monitoring at 10 high-consequence chemical facilities. These are facilities that could have a significant effect on public health or the national or regional economy if attacked. The cameras provide local law enforcement authorities with the ability to conduct remote surveillance of the areas surrounding the facility during elevated threat levels. State homeland security offices and DHS also have access and may monitor the facilities. Prior to the installation of cameras, Buffer Zone Protection Plans were completed at the sites that determined the need for additional surveillance. According to DHS officials, they are considering equipping additional sites with Webcams. DHS also is planning a series of Comprehensive Reviews in areas with a large number of chemical facilities, focusing on facilities' security as well as emergency response capabilities in the local area. A team of federal officials from multiple agencies will plan and conduct the work in coordination with state and local officials.[Footnote 19] The goal of these reviews is to assess the current security and response capabilities of individual facilities, local law enforcement, and emergency response organizations. The results of the review should help reduce disconnects between emergency response, law enforcement, and facilities and identify training, processes, and resources needed for the community. For these reviews, DHS will rely heavily on cooperation with facility owners/operators. DHS plans to conduct one visit to a cluster of facilities and then determine if it needs to improve the processes. DHS hopes to complete six visits to clusters of facilities during 2006. DHS Shares Information with the Industry by Various Means: DHS is responsible for collaborating with the private sector in protecting critical infrastructure.[Footnote 20] DHS's two main vehicles for coordinating and sharing information on threats, vulnerabilities, and best practices are the chemical sector Information Sharing and Analysis Center (ISAC) and an industry-led Chemical Sector Coordinating Council. DHS also is creating a new secure computer system to share information, provide best practice reports, and conduct training and drills. In 2002, the federal government and ACC created the chemical sector ISAC to collect and share threat information for the chemical industry.[Footnote 21] Through ISAC, DHS provides the private sector with threat information by means of daily electronic mail and a secure Web site. While ISAC was initially designed to allow companies to report unexplained or suspicious incidents involving chemical facilities, the system can no longer provide this function because of technical constraints. To operate the center, ACC uses its existing 24- hour communication network for sharing information about chemical emergencies. Any company engaged in the production, storage, transportation, sale, or delivery of chemicals may participate in ISAC's activities. ISAC has almost 600 participants representing more than 430 chemical companies that receive daily intelligence reports as well as episodic alerts and warnings. Some industry officials have complained about the lack of specific threat information they receive from DHS, and, in recent testimony, ACC called for more frequent and more detailed threat briefings that are specific to the chemical sector. DHS also is developing the Homeland Security Information Network- Chemical, a secure network for sharing information among DHS, state and local governments, law enforcement, and private sector critical infrastructure, including the chemical industry. Through the network, the chemical industry will receive immediate reports of threats to the sector directly from the Homeland Security Operations Center and DHS chemical sector specialists. The system also will allow owners/operators to report information to the government and each other. The network will allow for collaboration and coordination among chemical sector stakeholders, a shared document repository for best practices and planning activities, and forums for discussion. The chemical sector is one of the first sectors to pilot test the new system--approximately 25 industry officials have access to it. DHS plans to eventually enroll in the system all chemical company employees with a need for access to sensitive security information. According to ACC, legal concerns, such as who will operate the system and how DHS will protect the information provided by industry from release under the Freedom of Information Act, have delayed the use of the system. DHS is working with the industry on drafting agreements on the use of the network and information protection. The Chemical Sector Coordinating Council was formed voluntarily by trade associations within the chemical sector in June 2004, and it currently comprises representatives from 16 key industry stakeholder associations. The council is a single point of contact to facilitate organizing and coordinating sector policy developments, infrastructure protection planning, and plan implementation activities. In addition to serving as a routine information-sharing mechanism, the council has helped DHS develop an emergency response exercise and industry guidance and is working closely with DHS to develop, refine, and disseminate the RAMCAP methodology. Furthermore, DHS provided the council with a draft of its Chemical Sector-Specific Plan for comments in September 2005. According to DHS, the council represents the majority of chemical facility owners/operators through its broad membership. The council defines the chemical sector as "entities engaged in the production of chemicals, as well as those engaged in the storage, transportation, delivery, and use of chemicals not adequately addressed by other critical infrastructure sectors." The council does not include water treatment facilities or chemical transportation modes (rail, truck, and barge) since both have separate sector coordination mechanisms. DuPont's Director of Global Operations Security currently serves as the chair of the council to provide a specific, frontline perspective and guidance. The industry associations participating on the council include the following: * The Adhesive and Sealant Council: * American Chemistry Council: * American Forest & Paper Association: * Chemical Producers and Distributors Association: * Chlorine Chemistry Council: * The Chlorine Institute: * Compressed Gas Association: * CropLife America: * The Fertilizer Institute: * Institute of Makers of Explosives: * International Institute of Ammonia Refrigeration: * National Association of Chemical Distributors: * National Paint and Coatings Association: * National Petrochemical and Refiners Association: * The Society of the Plastics Industry, Inc. * Synthetic Organic Chemical Manufacturers Association: According to ACC, the interchange between DHS and the council has been hampered by DHS's slow progress in determining whether the Federal Advisory Committee Act (FACA) applies to the council.[Footnote 22] Among other things, under FACA, federal advisory committee meetings must generally be open to the public, and agencies are required to prepare meeting minutes and make them available to interested parties.[Footnote 23] The Homeland Security Act allows the Secretary of DHS to establish and use the services of advisory committees and to exempt such committees from FACA.[Footnote 24] In June 2005, the Homeland Security Advisory Council recommended that the Secretary exempt both Sector Coordinating Councils and ISACs from FACA because of the critical value of this information-sharing relationship.[Footnote 25] To share industry best practices, DHS has prepared three guidance documents that highlight common issues across the chemical sector and identify measures for protecting chemical facilities. These reports are (1) the Common Characteristics and Vulnerabilities report, (2) the Potential Indicators of Terrorist Activity report, and (3) the Protective Measures report. DHS has provided copies of these reports to state Homeland Security Offices and the Chemical Sector Coordinating Council for distribution to owners/operators of chemical facilities and the law enforcement community. DHS also hosts training and tabletop exercises for facility owners/operators; state, local, and tribal governments; and local law enforcement agencies. DHS has developed a number of courses on such topics as surveillance detection, terrorism awareness, and buffer zone protection. DHS has hosted tabletop exercises at six high-risk chemical facilities and invited industry officials to participate in TopOff3, the third in a series of congressionally mandated emergency response exercises. These extensively planned exercises simulate a terrorist attack and test federal, state, local, and private sector responses. Industry officials we spoke with said both government and private sector participants learned valuable lessons from the exercises. Both DHS and the Homeland Security Advisory Council recognize the challenges in sharing information with the industry. According to department officials, DHS has difficulty reaching all members of the chemical sector. To address this issue, DHS plans to utilize ISAC as well as the Chemical Sector Council, other federal agencies, and state and local authorities to assist in identifying and communicating with chemical facilities. The Homeland Security Advisory Council recently recommended ways to improve information sharing between DHS and the industry. DHS Coordinates with EPA and Other Federal Agencies: Homeland Security Presidential Directive Number 7 directs DHS to work closely with other federal departments and agencies, state and local governments, and the private sector to identify and prioritize the nation's critical infrastructure and key resources and to protect them from terrorist attacks. DHS coordinates its chemical security efforts with EPA and other federal agencies through a government coordinating council. As outlined in DHS's Interim National Infrastructure Protection Plan, government coordinating councils are intended to include representatives from DHS and the appropriate federal agencies to work with the Sector Coordinating Council in supporting the nation's homeland security mission. According to DHS's 2004 draft Chemical Sector-Specific Plan, DHS views government coordinating councils as the future of sector coordination and communications activities. Participants in the chemical sector government coordinating council include officials from the Department of Commerce's Bureau of Industry and Security; Justice's Bureau of Alcohol, Tobacco, Firearms, and Explosives and the Federal Bureau of Investigation; the Department of Transportation's Federal Railroad Administration, Federal Motor Carrier Safety Administration, and Pipeline and Hazardous Materials Safety Administration; and EPA's Office of Emergency Management and Water Security Division. DHS also recently invited officials from the Department of Energy, the Department of Labor's Occupational Safety and Health Administration, and the Department of Defense to participate on the council. As of October 2005, the council had met four times to discuss issues related to chemical sector security. DHS officials told us that recent meetings included discussions of such topics as comparing the work of different government agencies on modeling chlorine incidents. In addition to interactions through the coordinating council, EPA has provided DHS with a copy of the RMP database and participates on a RAMCAP committee to develop chemical sector tools. According to EPA officials, however, EPA has not played a major role in analyzing these or other data on chemical risks to identify or prioritize chemical facilities. EPA officials believe that the agency could further assist DHS by providing analytical support in identifying high-risk facilities that should be targeted in DHS's chemical sector efforts. These officials also believe that the agency has expertise in a number of other areas that has not been tapped and could support DHS's activities. In addition to EPA's expertise on RMP data and its familiarity with RMP facilities, EPA maintains information on hazardous chemicals and related facilities. For example, EPA collects some information under the Toxic Substances Control Act on industrial chemicals that may pose environmental or human health hazards and collects information about oil and pesticides facilities under other authorities. Furthermore, as the lead federal agency for hazardous materials emergency response, EPA has infrastructure in place around the country with designated on-site coordinators for hazardous materials incidents. These officials, as well as field inspectors who visit chemical facilities under a variety of environmental programs, are familiar with chemical facilities across the country and have general knowledge of process safety issues and expertise on hazardous material releases. EPA officials also told us that EPA staff have garnered extensive knowledge about the chemical sector through informal information sharing about facility practices. For example, EPA officials explained that before the RMP program, EPA collected and shared general information about facility safety problems as well as strategies facilities have used to address these problems. Finally, as the lead agency for the water sector, EPA has developed knowledge on security issues related to drinking water facilities. In this regard, under the Public Health Security and Bioterrorism Preparedness and Response Act of 2002, EPA is responsible for receiving vulnerability assessments from community water systems serving more than 3,300 people. DHS officials believe that their coordination with EPA has been sufficient; they told us that they do not see a need for additional coordination with EPA on data analysis or other efforts because EPA has no expertise relating to chemical industry security matters, as does DHS. Furthermore, the DHS officials stated that EPA is a safety agency and can add little to modeling or analysis of RMP data from a security perspective. DHS officials also told us that the department has not involved EPA in site assistance or Buffer Zone Protection Plan visits at chemical facilities because the owners/operators would strongly oppose EPA's involvement, given its role in regulating other aspects of the chemical industry. These officials explained that, while EPA will be involved in the planning and preparation aspects of DHS's chemical sector Comprehensive Reviews--which will bring together groups of government officials to visit clusters of chemical facilities in specific geographic areas--EPA will not participate in the site visits for the same reason. The Chemical Industry Continues Voluntary Efforts to Address Security, but Faces Challenges in Safeguarding Facilities: The chemical industry, led by its industry associations, has undertaken voluntary efforts to address plant security, but faces challenges in preparing facilities against terrorism. Some industry associations require member companies to assess their facilities' vulnerabilities and make security enhancements. For example, ACC requires, as a condition of membership, that companies conduct vulnerability assessments, develop and implement plans to mitigate vulnerabilities, and have a third party verify that the security enhancements identified in the plans were implemented. Other industry associations have encouraged their members to address security by developing security guidelines, best practices, and other tools. Although the chemical industry has taken these actions, industry officials told us that they face a number of challenges in preparing facilities against a terrorist attack. For example, they reported that the cost of security improvements can be a burden, particularly for smaller companies that may lack the resources larger chemical companies have to devote to security. Some Industry Associations Require Members to Assess Vulnerabilities and Enhance Security: With few federal security requirements, industry associations have been active in promoting security among member companies. As we reported in March 2005, some industry associations require member companies to assess their facilities' vulnerabilities and make security enhancements, requiring as a condition of membership that they conduct security activities and verify that these actions have been taken.[Footnote 26] Appendix II includes a description of security efforts that individual industry associations are undertaking. ACC, representing 135 chemical manufacturing companies with approximately 2,000 facilities, has led the industry's efforts to improve security at their facilities. In 1988, ACC initiated its Responsible Care® Management System, which is a comprehensive management system for its members to follow to continuously improve safety performance; increase communication; and protect employees, communities, and the environment. In June 2002, as part of its Responsible Care® Management System, ACC adopted a security code requiring its members to adhere to a set of security management principles. For physical site security, member companies are to perform vulnerability assessments using an approved methodology. Companies also must develop plans to mitigate vulnerabilities, take actions to implement the plans, and have an independent party verify that the facilities implemented the identified physical security enhancements. Third-party reviewers can include insurance representatives, local emergency responders, or local law enforcement officials. These reviewers do not verify that a vulnerability assessment was conducted appropriately or that actions taken by a facility adequately address security risks. However, the Responsible Care® Management System requires member companies to periodically conduct independent third- party audits that include an assessment of their security programs and processes and their implementation of corrective actions. According to ACC, all members have completed their physical security vulnerability assessments and almost all have had their physical security enhancements verified. The Responsible Care® Security Code also established requirements for cyber assets, such as computer systems that control chemical facility operations, and the distribution chain, which covers the complete "value chain" for chemicals, from suppliers to customers, including transportation. ACC member companies must perform vulnerability assessments of cyber assets and the distribution chain and implement plans to mitigate any vulnerabilities. Examples of security improvements in distribution include measures such as additional screening of transportation providers. ACC asked each member company to provide a signed statement from a company executive that the company had management systems in place for the entire security code by June 30, 2005. According to ACC, as of October 1, 2005, 95 percent of its member companies affirmed that they had implemented a security management system for physical security, cyber security, and the distribution chain. The Coast Guard recognized the Responsible Care® Security Code as an alternative security program for purposes of fulfilling security requirements under MTSA. The Synthetic Organic Chemical Manufacturers Association (SOCMA), which includes 160 specialty chemical manufacturers that operate about 300 small-to medium-sized facilities in the United States, also adopted the Responsible Care® Security Code in December 2002.[Footnote 27] SOCMA developed its own vulnerability assessment methodology that is designed to address the unique needs of its members, which are primarily small businesses. According to SOCMA officials, all of its member companies have reported completing vulnerability assessments, and 98 percent of these companies reported that they had implemented security enhancements and obtained third-party verification, as of September 2005. However, beginning in October 2005, SOCMA no longer required its members to adhere to the Responsible Care® Management System because it has developed its own environmental, health, safety, and security performance program. SOCMA's new program, called ChemStewardsSM, still requires members to conduct vulnerability assessments for physical security and implement appropriate countermeasures. In addition, facilities that are subject to RMP must have third parties verify implementation of security measures. Furthermore, the National Association of Chemical Distributors (NACD)- -which represents 253 companies with approximately 1,380 facilities in the United States and Canada that package, distribute, and blend chemicals, typically in warehouse facilities--has developed an environment, health, safety, and security management protocol called the Responsible Distribution Process. Created in 1991, adherence to the Responsible Distribution Process is a condition of NACD membership. Since January 1998, NACD members have been required to undergo and successfully complete on-site third-party verification of the company's implementation of all required membership practices once every 3 years. NACD contracted with an internal auditing company to be the third-party reviewer for its members. The first 3-year cycle of Responsible Distribution Process verification ended in December 2001. In April 2002, NACD added security measures to the process that require its members to develop security programs, scrutinize security measures taken by for-hire motor carriers, check that customers are purchasing chemicals for the appropriate use (as prescribed by government regulations), and verify implementation of security measures by an independent firm designated by NACD. The second 3-year cycle for process verification began in January 2003 and will end in December 2005. NACD has terminated the membership of 20 companies that failed to comply with Responsible Distribution Process requirements and to complete and pass third-party verification. Beginning in January 2006, NACD's Responsible Distribution Process includes a requirement that members conduct security vulnerability assessments. Members will be expected to have completed their assessment by June 2006. NACD also developed its own vulnerability assessment methodology specific to its members. Other Industry Associations Have Developed Security Guidelines, Best Practices, and Other Tools: Other industry associations have encouraged their members to address security by a variety of means, rather than only by establishing security requirements that include steps to verify compliance. Most of the associations we spoke with have taken steps to educate their members about security by developing security guidelines and best practices. For example, the Compressed Gas Association, representing 138 companies that manufacture or distribute gases and related products, developed guidance for its members on site security, transportation security, and security steps to check that customers are purchasing gas products for the appropriate uses. The Institute of Makers of Explosives, representing 40 companies of which 30 are explosives manufacturers and distributors, also provided recommended guidelines for security to its members. The guidelines recommend security practices specific to the manufacture, transportation, storage, and use of explosives products and also recommend that facilities conduct vulnerability assessments and develop security plans.[Footnote 28] In addition, the International Institute of Ammonia Refrigeration, representing facilities such as food storage warehouses, developed site security guidelines tailored to ammonia refrigeration facilities and provides information about security resources to members. All 16 associations we met with told us they keep members apprised of security issues and discuss security at meetings, training courses, and conferences. In addition to these efforts, several industry associations have developed vulnerability assessment methodologies to assist their member companies in evaluating security needs. For example, the National Petrochemical and Refiners Association, in partnership with the American Petroleum Institute, developed a vulnerability assessment methodology tailored to refineries and petrochemical facilities. The methodology was developed in cooperation with the Department of Energy and DHS and has been approved by the Center for Chemical Process Safety. In addition, an agribusiness working group comprising members of the Agricultural Retailers Association, CropLife America, and the Fertilizer Institute, developed a Web-based security vulnerability assessment tool for agricultural facilities that has also been approved by the Center for Chemical Process Safety. According to the Fertilizer Institute, approximately 2,000 retail agricultural facilities have used the tool to date.[Footnote 29] Furthermore, the Chlorine Institute, which represents approximately 220 companies involved in the production, distribution, and use of chlorine, developed a seven-step process that smaller chlorine manufacturing and distribution companies can use to assess their vulnerabilities. The process takes companies through a series of steps that score facilities in different areas to identify vulnerabilities. Security experts have reviewed and approved the institute's process. Some associations also recommend or require that member companies follow security programs, but they do not require steps to verify compliance. The National Paint and Coatings Association, which represents over 300 paint and coatings manufacturing and supply companies, worked with its members to develop a safety and environmental management system called Coatings Care. This system includes security steps such as analyzing threats, vulnerabilities, and consequences and implementing security measures. Member companies have 1 year from the time they join the association to agree to follow Coatings Care principles. However, the association does not require third-party verification of security steps. Similarly, the Chlorine Institute requires executives at all member companies to sign an agreement stating that they will meet nine safety and security requirements, including complying with the Responsible Care® Management System, NACD's Responsible Distribution Process, or another industry security program. While companies that do not sign the agreement are not eligible for Chlorine Institute membership, the institute does not require that companies take steps to verify compliance with security programs. In addition, the Fertilizer Institute, which represents approximately 190 companies that make, sell, or transport fertilizer products, recommends but does not require that members follow a Security Code of Management Practices that involves screening facilities into priority tiers on the basis of potential security hazards and conducting a vulnerability assessment, following a timeline that is based on their tier level. Despite industry associations' efforts to encourage or require members to voluntarily address security, the extent of participation in the industry's voluntary initiatives is unclear. DHS has not estimated the extent of participation in voluntary initiatives across the chemical sector. Furthermore, not all chemical companies belong to the associations that represent their industry sectors. DHS does not have data on the number of RMP facilities that belong to these associations. The Chemical Industry Faces Challenges in Securing Facilities against Terrorism: Chemical industry officials told us they face a number of challenges in preparing facilities against a terrorist attack. Most of the chemical associations we contacted stated that the cost of security improvements is a challenge for some chemical companies. Industry officials we spoke with said that some companies have already made significant investments to improve security. For example, ACC reports that its members have spent an estimated $2 billion on security improvements since September 11, 2001. However, industry associations told us that while some companies have implemented security enhancements, others may not be implementing security measures because of cost concerns. Representatives of the American Forest & Paper Association and the National Paint and Coatings Association told us that small companies, in particular, may struggle with the cost of security improvements or the cost of complying with any potential government security programs because they may lack the resources larger companies have to devote to security. Many industry officials suggested that federal assistance via grants or tax incentives to offset security costs could help companies enhance facility security. According to these officials, financial incentives to companies to support both vulnerability assessments and security improvements would be helpful. Representatives from two industry associations stated that financial assistance from the government to support the cost of compliance with voluntary programs such as the Responsible Care® Management System would be helpful, noting that complying with voluntary programs is very costly. Other industry officials suggested that DHS direct funding to high-risk facilities it views as vulnerable. A number of officials also told us that financial incentives for security improvements will make chemical security legislation, if enacted, more palatable to industry. In this regard, H.R. 713, introduced in the 109th Congress, would create a tax credit for 50 percent of the cost incurred by eligible agricultural businesses for protecting hazardous chemicals or pesticides from unauthorized access. Industry stakeholders also cited the need for guidance on what level of security is adequate. While DHS has issued guidance to state Homeland Security Offices and the Chemical Sector Coordinating Council on vulnerabilities and protective measures that are common to most chemical facilities, several stakeholders expressed a desire for guidance on specific security improvements. For example, representatives of the National Petrochemical and Refiners Association stated that one reason the association holds workshops and best practices sessions is to meet the challenge of determining the types of security measures that constitute a reasonable amount of security. Another association stated that standardized security criteria would be useful in helping companies determine adequate levels of security. In addition, a number of associations told us that companies are operating on tight profit margins and want to feel certain that the benefits of security improvements justify the cost. According to these associations, while companies are addressing security since the events of September 11, 2001, they have to make cost-effective decisions about allocating their resources. Because it is unlikely that sufficient resources will be available for companies to address all risks, adopting a risk management framework can aid facilities in prioritizing risks and the actions taken to reduce those risks, taking cost into consideration.[Footnote 30] In addition, industry officials told us that the lack of threat information makes it difficult for companies to know how to protect facilities. Two associations told us that ISAC has not been very useful to members because the information shared is not new or is very broad. Some officials have attended classified briefings with DHS but reported that very little specific information was provided. Other industry association officials told us that DHS has withheld some threat information because it was classified. Providing both classified and declassified or sanitized information to associations would allow them to understand specific threats and pass on unclassified information to members. An official with an agricultural chemical company told us that many companies do not have access to threat information applicable to rural areas that may have different threats than companies located in urban areas. While companies would like to receive very specific threat information, some officials acknowledged that such information may not exist. Officials with one association hoped that DHS's Homeland Security Information Network will improve the quality of the threat information that DHS shares with industry. A few industry officials also mentioned limited guidance on conducting vulnerability assessments and difficulty in conducting employee background checks as challenges. One industry association stated that it would like its members to receive guidance from DHS on how to conduct vulnerability assessments. Another association expressed frustration because none of the current vulnerability assessment tools address issues specific to its members' facilities, which package and distribute chemicals, and it would like DHS to help develop or approve a methodology for this type of facility. Furthermore, representatives of forest and paper products companies reported that the inaccessibility of government records has made conducting background checks on employees difficult. Officials told us that in addition to regular facility employees, the number of contractors continuously moving through facilities could pose security risks without the appropriate background checks. Access to employment and criminal records would allow facility officials to conduct a more thorough check on employees, thereby reducing the risk of hiring someone who could threaten a facility. Finally, a number of stakeholders we contacted told us that emergency response preparedness is a challenge for chemical companies. An official with an industry-affiliated research center asserted that emergency responders and communities in the United States are prepared to respond to a toxic release. However, other stakeholders we spoke with stated that many facilities have conducted security vulnerability assessments but may not have done enough emergency response planning and outreach to the responders and communities that would be involved in a release. A 2004 survey by a chemical workers union of workers at 189 RMP facilities found that only 38 percent of respondents indicated that their companies' actions in preparing to respond to a terrorist attack were effective, and 28 percent reported that no employees at their facilities had received training about responding to a terrorist attack since September 11, 2001.[Footnote 31] While environmental laws require emergency response planning for accidental chemical releases, several stakeholders told us facilities need to consider very different scenarios with consequences on different orders of magnitude when planning the emergency response for a terrorist incident. An expert with Texas A&M University's National Emergency Response and Rescue Training Center echoed this view, noting that chemical facility employees are well-trained for an accidental release but may not be trained in the emergency response for a terrorist release. According to this expert, both facility employees and local emergency responders need to prepare for terrorist-caused chemical releases that are less predictable and harder to prepare for than accidental releases. Facilities should be aware of the types of aid located within a 50-mile radius of the facility, such as welders, neutralizing chemicals, and back-up protection equipment, according to this expert. While some companies have formed mutual-aid groups in a given geographic area, the expert cautioned that these groups may not prove effective if facilities lock down and focus on protecting themselves when terrorists attack. DHS Needs Additional Authority to Ensure That Chemical Facilities Are Addressing Security Issues: Existing laws provide DHS with only limited authority to address security concerns at U.S. chemical facilities, and additional legislation is needed to place federal security requirements on these facilities. DHS lacks the authority to require all high-risk chemical facilities to assess their vulnerabilities and implement security measures and, consequently, has relied largely on the industry's voluntary participation to address facility security. As a result, DHS cannot ensure that facilities are assessing their vulnerability to terrorist attacks and taking corrective actions, where necessary. DHS has acknowledged that its existing authorities do not permit it to effectively regulate the industry, and that the Congress should enact federal security requirements for chemical facilities. Furthermore, we concluded in 2003, and continue to believe, that additional legislation is needed. Although many stakeholders agreed on the need for federal requirements, they had mixed views on the content and structure of such requirements. They also identified a number of challenges the federal government will face in implementing chemical security requirements. Existing Laws Give DHS Limited Authority to Address Chemical Sector Security, but Specific Authority Is Needed to Require All High-Risk Facilities to Act: A number of existing laws outline DHS's responsibilities for coordinating with the private sector and obtaining information on and protecting critical infrastructure. While the chemical industry is included in the nation's critical infrastructure, these laws provide DHS with only limited authority to address security concerns at U.S. chemical facilities. The Homeland Security Act assigns DHS responsibility for coordinating and collaborating with the private sector on certain homeland security issues. Under the Homeland Security Act, the Secretary of DHS is responsible for coordinating homeland security issues with the private sector to ensure adequate planning, equipment, training, and exercise activities. The Homeland Security Act also makes the Special Assistant to the Secretary (Private Sector) responsible for (1) promoting and developing public-private partnerships for collaboration and mutual support to address homeland security challenges, (2) assisting in promoting and developing private sector best practices to secure critical infrastructure, and (3) coordinating industry efforts to identify private sector resources and capabilities that could effectively supplement government efforts to prevent or respond to a terrorist attack.[Footnote 32] Existing laws also assign DHS responsibilities specifically related to the protection of critical infrastructure, including chemical facilities. The Patriot Act called for the establishment of the National Infrastructure Simulation and Analysis Center (NISAC)--a partnership between Los Alamos and Sandia National Laboratories--under DHS to help protect critical infrastructure by supporting counterterrorism, threat assessment, and risk mitigation activities.[Footnote 33] NISAC is to provide support--such as modeling, simulation, and analysis of critical infrastructure systems--to facilitate modifying these systems to mitigate threats to them and to critical infrastructure in general. In addition, the Homeland Security Act gives DHS's Under Secretary for Information Analysis and Infrastructure Protection (IAIP) responsibilities related to protecting critical infrastructure, including: * accessing, receiving, analyzing, and integrating information from federal, state, and local governments and private sector entities to identify, detect, and assess the nature and scope of terrorist threats to the United States, and to understand these threats in light of actual and potential vulnerabilities; * carrying out comprehensive assessments of the vulnerabilities of the nation's key resources and critical infrastructure, including assessing the risks posed by particular types of terrorist attacks within the United States, the probability of success of such attacks, and the feasibility and potential efficacy of various countermeasures to such attacks; * developing a comprehensive national plan for securing the nation's key resources and critical infrastructure; and: * recommending the necessary measures to protect these key resources and critical infrastructure. While DHS's existing legal authorities provide it with access to some information about critical infrastructure threats and vulnerabilities, DHS does not have the authority to require all chemical facilities to conduct vulnerability assessments.[Footnote 34] The Homeland Security Act provides DHS with access to all information that may be collected, prepared, or possessed by any federal agency concerning infrastructure or other vulnerabilities of the United States to terrorism. Under the Homeland Security Act, DHS may request information from the private sector through cooperative agreements. In addition, the Chemical Safety Information, Site Security and Fuels Regulatory Relief Act (CSISSFRRA) required the Attorney General to review and report on the vulnerability of certain chemical facilities to criminal and terrorist activity and current industry practices regarding site security.[Footnote 35] In 2003, $3 million was transferred from Justice's general administration appropriation to DHS as part of the Consolidated Appropriations Resolution, 2003, and the conferees stated that they expected DHS to use the transferred funds to conduct the vulnerability assessments under CSISSFRRA.[Footnote 36] However, CSISSFRRA does not give DHS the authority to require facilities to conduct vulnerability assessments. Similarly, the October 2004 conference report on DHS's fiscal year 2005 appropriations act directed IAIP--within DHS--to analyze whether DHS should require private sector entities to provide IAIP with existing information about their security measures and vulnerabilities in order to improve its ability to evaluate critical infrastructure protection nationwide. The conference report stated that the analysis should include all critical infrastructure, including chemical plants, and evaluate the benefits of securing the information and the costs to both the private sector and IAIP for implementing this requirement.[Footnote 37] However, neither the appropriations act nor any other legislation would require chemical facilities to provide information about their security and vulnerabilities. Furthermore, DHS currently lacks the authority to enter all chemical facilities without their permission to assess security or to require and enforce security improvements. In this regard, except with respect to certain chemical facilities covered under federal security requirements for other critical infrastructures, existing laws do not give DHS the right to enter a chemical facility to assess its vulnerability to a terrorist attack or the authority to require and enforce the implementation of any needed security improvements at these facilities. The Homeland Security Act, with some limited exceptions, does not provide any new regulatory authority to DHS and only transferred the existing regulatory authority of any agency, program, or function transferred to DHS, thereby limiting actions DHS might otherwise be able to take under the Homeland Security Act.[Footnote 38] Therefore, DHS has relied solely on the voluntary participation of the private sector to address facility security. As a result, DHS cannot ensure that all high-risk facilities are assessing their vulnerability to terrorist attacks and taking corrective action, where necessary. In contrast, some other critical infrastructure sectors are subject to federal security requirements. For example, all commercial nuclear power plants licensed by the Nuclear Regulatory Commission are required to take security steps, including placing physical barriers outside of the operating reactor area, limiting access to vital areas, and maintaining a trained security force. In addition, community water systems that serve more than 3,300 people are required to conduct and submit a vulnerability assessment to EPA and prepare an emergency response plan that incorporates the results of the assessment. Table 3 provides examples of federal security requirements that are in place for these and some other critical infrastructure sectors. Table 3: Examples of Federal Security Requirements for Other Critical Infrastructure Sectors: Sector: Aviation; Public law or other requirement: Aviation and Transportation Security Act of 2002; Major provisions: This act created the Transportation Security Administration, now within DHS, to assume responsibility for aviation security, including the screening of passengers and their baggage. Sector: Drinking water; Public law or other requirement: Public Health Security and Bioterrorism Preparedness and Response Act of 2002; Major provisions: Community water systems serving more than 3,300 people are required to assess the system's vulnerability to terrorist attacks, prepare an emergency response plan that incorporates the results of this assessment, certify to EPA that the assessment and response plan have been completed, and provide a copy of the assessment to EPA. According to EPA, 1,928 drinking water facilities that are also subject to EPA's RMP program must comply with this act. Sector: Food; Public law or other requirement: Public Health Security and Bioterrorism Preparedness and Response Act of 2002; Major provisions: This act requires all domestic and foreign facilities that manufacture, process, pack, or hold food for human or animal consumption in the United States to register with the Food and Drug Administration (FDA) by December 12, 2003. Restaurants, certain retail stores, nonprofit feeding establishments, fishing vessels, and farms are exempt from these registration requirements. FDA is also to give high priority in increasing the number of inspections of food offered for import at ports of entry into the United States, with the greatest priority given to inspections to detect the intentional adulteration of food. Sector: Nuclear; Public law or other requirement: Nuclear Regulatory Commission advisories and orders; Major provisions: Commercial nuclear plants licensed by the Nuclear Regulatory Commission are required to take security steps such as placing physical barriers outside reactor areas, limiting access to vital areas, maintaining a trained security force, and conducting simulated terrorist attack exercises. Sector: Ports; Public law or other requirement: Maritime Transportation Security Act of 2002; Major provisions: Maritime facility owners and operators must conduct vulnerability assessments, develop security plans, and implement the measures discussed in security plans. The Coast Guard conducts inspections at these facilities, and MTSA prohibits operation of facilities that do not have the required security plans or that are not operating in compliance with these plans. The Coast Guard has reviewed and approved facility security plans for 238 chemical facilities. Source: GAO. [End of table] DHS Has Concluded That It Needs Additional Authority to Address Chemical Facility Security: DHS has concluded that its existing patchwork of authorities does not permit it to regulate the chemical industry effectively, and that the Congress should enact federal requirements for chemical facilities. While DHS reports that most chemical companies have been eager to voluntarily cooperate with agency efforts to address security issues at their facilities, DHS determined that voluntary efforts alone will not sufficiently address security for the entire sector. Echoing public statements by the Secretary of DHS and the Administrator of EPA in 2002 that voluntary efforts alone are not sufficient to assure the public of the industry's preparedness, in June 2005, both DHS and EPA called for legislation to give the federal government greater authority over chemical facility security.[Footnote 39] Similarly, we concluded in 2003, and continue to believe, that additional federal legislation is needed because of the significant risks posed by thousands of chemical facilities across the country to millions of Americans and because the extent of security preparedness at these facilities is unknown.[Footnote 40] In testimony before the Congress in June 2005, the Acting Undersecretary for IAIP stated that any proposed regulatory structure (1) must recognize that not all facilities within the chemical sector present the same level of risk, and that the most scrutiny should be focused on those facilities that, if attacked, could endanger the greatest number of lives, have the greatest impact on the economy, or present other significant risks; (2) should be based on reasonable, clear, equitable, and measurable performance standards; and (3) should recognize the progress that responsible companies have made to date. He also stated that the performance standards should be enforceable and based on the types and severity of potential risks posed by terrorists, and that facilities should have the flexibility to select among appropriate site-specific security measures that will effectively address those risks. In addition, he said that DHS would need the ability to audit vulnerability assessment activities and a mechanism to ensure compliance with requirements. Beyond these general principles, DHS officials were reluctant to share with us their views on the specific content and structure of chemical security legislation. These officials explained that DHS provides its views on proposed legislation to the Office of Management and Budget (OMB) as part of the executive branch coordination process, and that OMB--after considering the points of view of all departments, agencies, and independent operating entities--establishes the unified executive branch position on proposed legislation. Because the administration's unified position had not yet been determined at the time of our discussion, DHS officials believed that it was inappropriate to discuss their views on the specific provisions of any legislation. Stakeholders' Views on Chemical Security Legislation Are Mixed: While many stakeholders--including representatives from industry, research centers, and government--agreed on the need for additional legislation that would place federal security requirements on chemical facilities, they had mixed views on the content and structure of such requirements. Representatives of three research organizations and three environmental groups told us that DHS needs more authority to adequately ensure that chemical facilities are taking action, based on the potential harm that an attack on chemical facilities may cause. One expert stated that chemical facility security is a public safety issue that warrants federal oversight, while others said the number of facilities with potential off-site consequences in proximity to population centers justifies federal involvement in security. Furthermore, testifying in support of legislation before the Congress in July 2005, a representative of a chemical workers union underscored that workers and communities should not be placed at risk because some companies choose not to prioritize security and that, in the same vein, responsible companies should not be placed at an economic disadvantage because they allocate resources to security. Half of the industry associations we contacted also favor additional legislative authority. ACC has publicly stated that they support chemical security legislation for a number of reasons, including the belief that all of the nation's chemical facilities should be required to take the security steps that its members are taking under the Responsible Care® Management System. One association supported federal legislation because its members are encountering various state efforts to oversee facility security. Concerned that member companies will be subject to different security requirements in different states, officials with three associations would rather the federal government take the lead on chemical facility security. Other stakeholders preferred that DHS continue to work with the industry to voluntarily address security or were undecided about the need for federal requirements. Two industry associations stated that the partnership DHS has forged with the chemical industry has proven effective in working to address security concerns. In July 2005 testimony before the Congress, the National Petrochemical and Refiners Association expressed concern that legislation giving DHS authority over chemical facility security will negatively impact the cooperative relationship the industry and DHS have established, noting that the level of information sharing could be diminished if DHS becomes an industry regulator. Similarly, two research centers affiliated with the industry did not advocate chemical security legislation. One expressed concern that the goodwill that the industry has shown to DHS will wane if DHS becomes a regulatory agency, while another noted that the threat of new security regulations provides an adequate incentive for facilities to take security steps. Notwithstanding ACC's position, most of the individual chemical companies we contacted also believed that legislation is not needed, or they were undecided about whether DHS needed additional authority. Company officials generally told us that industry self-regulation is preferable to federal oversight of facility security. One company official also told us that states are better suited to regulating facility security because they have greater knowledge about facilities in their state. Stakeholders expressed a range of views about which facilities should be covered if legislation is enacted; about whether legislation should address inherently safer technologies; about EPA's role, if any; and about voluntary industry programs. Stakeholders favoring legislation generally agreed that legislation should target high-risk facilities, rather than applying the same requirements to all facilities regardless of the different risks they pose. These stakeholders told us that chemical facilities should be prioritized on the basis of their potential impacts if attacked, with the highest-risk facilities subject to stricter requirements than lower-risk facilities that do not warrant the same degree of federal oversight. For example, in testimony before the Senate Committee on Homeland Security and Governmental Affairs in July 2005, ACC explained that any regulatory system must reflect the different risks posed by different facilities and require security measures commensurate with those risks. At the same hearing, a representative of SOCMA, which represents specialty chemical manufacturers, recommended that legislation require facilities to perform a risk screen on the basis of the potential consequences of an attack and the attractiveness as a target. Facilities screened as high risk would then perform a detailed vulnerability analysis. Representatives from two research centers and two companies believed that RMP facilities provide a good starting point for the universe of facilities that legislation should cover because these facilities exceed a risk threshold on the basis of the type and amount of chemicals they house. One company suggested that chemical security legislation should require an analysis of RMP facilities that ranks facilities on the basis of risk. Stakeholders expressed strongly divergent views on whether legislation should require the substitution of safer chemicals and processes, referred to as "inherently safer technologies." Implementing inherently safer technologies could potentially lessen the consequences of an attack by reducing the chemical risks present at facilities. Justice, in introducing a methodology to assess chemical facilities' vulnerabilities, recognized that reducing the quantity of hazardous material may make facilities less attractive to terrorist attack and reduce the severity of an attack. Furthermore, DHS's July 2004 draft Chemical Sector-Specific Plan states that inherently safer chemistry and engineering practices can prevent or delay a terrorist incident, noting that it is important to make sure that facility owners/operators consider alternate ways to reduce risk, such as inherently safer design, implementing just-in-time manufacturing, or replacing high- risk chemicals with safer alternatives. However, DHS told us that the use of inherently safer technologies tends to shift risks rather than eliminate risks, often with unintended consequences. Some previous chemical security legislative proposals have included a requirement that facility security plans include safer design and maintenance actions, or that facility security plans include "consideration" of alternative approaches regarding safer design. Representatives from three environmental groups told us that facilities have defined security too narrowly as guns, gates, and guards, without focusing on reducing facility risks through safer technologies. Noting that no existing laws require facilities to analyze inherently safer options, these representatives believe legislation should require such an analysis and give DHS or EPA the authority to require the implementation of technologies if high-risk facilities are not doing so. Process safety experts at one research organization recognized that reducing facility hazards and the potential consequences of chemical releases makes facilities less vulnerable to attack. However, these experts also explained that inherently safer technologies can be prohibitively expensive and can shift risks onto other facilities or the transportation sector. For example, reducing the amount of chemicals stored at a facility may increase reliance on rail or truck shipments of chemicals. These experts support legislative provisions requiring analysis or consideration of technology options but do not support giving the federal government the authority to require specific technology changes because of the complexity of these decisions. Representatives of two research centers affiliated with the industry told us that while facilities should look at inherently safer technologies when assessing their vulnerability to terrorist attack, safer technologies are not a substitute for security. Industry associations and company officials voiced strong opposition to any inherently safer technologies requirements. The majority of the industry officials we contacted opposed an inherently safer technologies requirement, with many stating that inherently safer technologies involve a safety issue that is unrelated to facility security. Industry officials voiced concerns about the federal government's second-guessing complex safety decisions made by facility process safety engineers. Representatives from four associations and two companies told us that, in many cases, it is not feasible to substitute safer chemicals or change to safer processes. Certain hazardous chemicals may be essential to necessary chemical processes, while changing chemical processes may require new chemicals that carry different risks. In July 2005 testimony before the Congress, a SOCMA representative explained that while inherently safer technologies are intended to reduce the overall risks at a facility, this could be achieved only if a chemical hazard was not displaced to another time or location or did not magnify another hazard. Furthermore, process safety experts and representatives from associations and companies report that some safer alternatives are extremely expensive. For example, reducing facility chemical inventories by moving to on-site manufacturing when chemicals are needed can cost millions of dollars, according to a stakeholder. One company also voiced opposition even to a legislative requirement that facilities "consider" safer options. The official explained that the company opposed such a provision--even if legislation does not explicitly give the government the authority to require implementation of safer technologies--because it might leave companies liable for an accident that might have been prevented by a technology option that was considered but not implemented. Stakeholder views also varied on whether EPA should play a role in developing or enforcing security requirements. Many of the stakeholders we contacted acknowledged that EPA has considerable expertise on chemical facilities, although some noted that DHS lacks expertise specific to the risks related to the chemicals and processes used at facilities. Some of the experts we spoke with stated that EPA should be involved in enforcing any security requirements because of the agency's expertise and because it has an established field presence. Process safety experts also suggested that DHS should work with EPA in identifying the chemicals of concern that would determine which facilities are subject to chemical security requirements. In contrast, all of the industry stakeholders we spoke with about this issue believed that EPA should not have a prominent role, if any, in chemical security legislation because of EPA's regulatory function and because it lacks security expertise. One association said it would be extremely difficult for its members to work with EPA on security issues because the agency's focus on enforcement of environmental regulations would undermine security discussions. Another association was concerned that EPA would approach facility security as an opportunity for further environmental regulation. Finally, a number of stakeholders believed that any legislation should include provisions recognizing compliance with industry initiatives, such as ACC's Responsible Care® Security Code, equivalent to federal security requirements. Representatives from ACC, SOCMA, the National Association of Chemical Distributors, and other associations underscored that legislation, if enacted, should recognize voluntary industry security programs so facilities that have acted to address security do not have to duplicate efforts they have made to date. In testimony before the Senate Homeland Security and Governmental Affairs Committee in July 2005, an ACC official emphasized the need for legislation to give credit for the substantial voluntary expenditures ACC members have made implementing the Responsible Care® Security Code. Representatives of three environmental groups were not opposed to a provision making compliance with the industry's currently voluntary security programs equivalent to federal requirements, but they emphasized that these facilities should be required to submit documentation of security steps for review by the federal government. The Coast Guard, in implementing MTSA, approved ACC's Responsible Care® Security Code and others as accepted alternative security programs for the purposes of fulfilling security requirements under MTSA.[Footnote 41] A number of the industry officials we interviewed praised MTSA as a model for chemical security legislation because it allows participation in industry security programs to meet security requirements, and because MTSA's requirements are performance-based rather than prescribing specific actions that all facilities must take. Some industry officials have suggested that legislation should also exempt MTSA-covered chemical facilities from security requirements. Stakeholders Identified Challenges DHS Will Face in Implementing Chemical Security Requirements: Stakeholders identified a number of challenges DHS will face in implementing chemical security requirements. First, some stakeholders told us that identifying the appropriate universe of facilities to be covered by requirements will be difficult, given the diversity of facilities that handle hazardous materials. While the RMP program identifies facilities with amounts of chemicals deemed hazardous to human health, stakeholders told us non-RMP facilities may also need to be considered. For example, process safety experts mentioned that some chemicals not on the RMP list may need to be considered when identifying facilities, such as reactive chemicals that are currently not included under RMP. New Jersey officials noted that the state's chemical security efforts use criteria to identify facilities that exceed RMP criteria, including facilities with RMP chemicals below RMP threshold quantities and non-RMP chemicals that the state deemed hazardous. Representatives from two agricultural chemical companies stated that DHS will have a hard time identifying agricultural facilities that house chemicals of concern, since these facilities range from large plants to small rural facilities. Other stakeholders stated that some RMP facilities should be excluded from security requirements. Representatives of the ammonia refrigeration and forest products industries stated that many of these facilities are not high risk in terms of the possible terrorist threat they pose, even though they are subject to RMP. Officials with two industry associations said that RMP data are not the best indicator of terrorism risks, and that DHS will need to look beyond RMP data to understand the complexities of the chemical sector and identify those facilities with the greatest off- site consequences under terrorist scenarios. Second, because some states have established their own chemical security requirements, some stakeholders also were concerned about potentially overlapping state and federal requirements. Representatives from two industry associations stressed that the federal government needs to assert its leadership over the chemical sector because states are stepping in where they see a void. At least two states have passed chemical security legislation. Maryland's Hazardous Material Security Act requires RMP facilities in the state to perform vulnerability assessments, develop and implement security measures, and report to the state Department of the Environment. Under New York's Anti-Terrorism Preparedness Act of 2004, the state Office of Homeland Security, subject to available appropriations, must require certain chemical facilities to conduct vulnerability assessments. Stakeholders report that other states have created chemical security offices or are developing chemical security initiatives. Officials with one industry association told us that state homeland security agencies are getting involved in chemical facility security, even though they may lack the resources to fully understand the issues these facilities face. Furthermore, officials with three associations told us that many companies have operations in multiple states and that cooperating with numerous potentially conflicting state efforts would be a burden. Industry officials also said that federal legislation would need to clearly preempt state requirements in order for companies to avoid being subjected to both federal and state laws. State officials from New Jersey and Texas also voiced concern about duplicating efforts with the federal government. State officials from New Jersey, which has used existing state environmental authorities and a state homeland security task force to work with chemical facilities on security issues, suggested that federal legislation would provide industry with a reasonable and predictable set of standards, rather than a patchwork of state requirements. New Jersey officials also told us that although states have done their best to address security concerns, many states, including New Jersey, lack specific enforcement authority that could be provided for in federal legislation. Third, some stakeholders told us that enforcing chemical security requirements, if enacted, will be a challenge for DHS. While legislation may include enforcement provisions, stakeholders believe DHS may face challenges in implementing any such provisions. Several stakeholders questioned whether DHS has the expertise and resources to enforce security requirements at chemical facilities. New Jersey state officials believe that because DHS lacks experience in dealing with chemical facilities, it should delegate implementation and enforcement authority to states, allowing states to review facility activities and report back to DHS. Unlike the Coast Guard, which conducts facility inspections under MTSA, DHS currently does not have significant staff resources located throughout the country.[Footnote 42] Some stakeholders suggested that DHS will need staff in the field or will need contract support to enforce requirements. Representatives from two industry associations suggested that allocating federal resources to support chemical facility security preparedness will be a challenge. Finally, some stakeholders were concerned about the federal government's ability to protect information on facility vulnerabilities and security. Most of the industry associations and company officials we spoke with raised concerns about this issue, noting that information about facility vulnerabilities and security measures could provide a roadmap for terrorists. While the industry wants to cooperate with DHS on its chemical security efforts, businesses are concerned that sensitive information could be released. This concern arises from the conflict between the public's "right-to-know" such information and security concerns about releasing facility data. As an example, while federal regulations authorized the posting of some RMP data on the Internet and in government reading rooms, some industry officials opposed making this information available. Following the events of September 11, 2001, various media reports published RMP data on some facilities. Industry officials are willing to share information with DHS about the vulnerability assessment process and procedures, but they would prefer that vulnerability and security information remain at the facility, where government officials can view such information if needed. Reporting concerns about DHS's Protected Critical Infrastructure Information (PCII) Program, officials with four associations said companies need additional information about DHS's information protection procedures. Officials with one association added that companies may not be comfortable with the PCII program until it is tested in court. Officials with three industry associations also told us that sharing information at the state level is a concern. In this regard, New Jersey officials noted that they have faced a challenge in allaying industry fears about sharing security information. These officials told us that while some states do not have the ability to protect critical infrastructure information, New Jersey state law exempts private sector information provided for domestic security purposes from open records requirements. In contrast to these views, representatives of three environmental groups believe that some information about high-risk facilities should be publicly available. Specifically, these representatives stated that communities need to understand the risks posed by facilities in the area, and should have access to information on the potential impacts of high-risk facilities' worst-case terrorist scenarios. These representatives told us that details about specific facility vulnerabilities need not be released, but that the public should have access to information about facilities that present the greatest concern. Conclusions: Across the nation, thousands of facilities produce, use, or store hazardous chemicals in quantities that could potentially put large numbers of Americans at risk. DHS, Justice, and other experts have warned that these facilities present an attractive target for terrorists. A terrorist attack could threaten human health and safety, cause economic disruptions, and impact other critical infrastructures that rely on chemicals. However, the extent of security preparedness at these facilities remains largely unknown. Chemical industry associations have undertaken numerous initiatives to raise awareness about security and to encourage--and in some cases require--member companies to assess their vulnerabilities and act to address them. While these efforts are laudable, participation in these initiatives is voluntary and the extent to which individual companies across the industry are addressing security issues is unclear. Furthermore, voluntary efforts cannot ensure widespread participation and, unless chemical facilities' vulnerabilities are identified and addressed on a widespread basis across the sector, the security of the chemical industry as a critical national infrastructure remains at risk. As the lead federal agency for the chemical sector, DHS has developed a number of programs to assist companies in protecting their chemical facilities. However, unlike other federal agencies--such as EPA and the Nuclear Regulatory Commission, which require drinking water and nuclear facilities, respectively, to take actions to improve their security-- DHS does not currently have the authority to require the chemical industry to take such actions. On this basis, DHS has concluded--as we did in 2003--that its existing patchwork of authorities does not allow it to effectively regulate chemical sector security. Since 2002, both DHS and EPA have called for legislation creating security requirements at chemical facilities, and legislation has been introduced in every Congress since the events of September 11, 2001. Our work demonstrates the need to enhance DHS's ability to collect information about industry preparedness and to ensure that facilities evaluate and mitigate their vulnerability to terrorist attack. By granting DHS the authority to require high-risk chemical facilities to take security actions, policy makers can better ensure the preparedness of the chemical sector. Among its activities to enhance chemical sector security, DHS has developed methods for identifying high-priority facilities, assessing facility vulnerabilities, and suggesting improvements to address these vulnerabilities. In this process, DHS should take full advantage of EPA's expertise on toxic chemical data sources, U.S. hazardous materials facilities, and process safety issues, among other things, that the agency has developed through its oversight of a number of chemical safety programs. For example, EPA maintains data on RMP facilities' inventories of toxic and flammable chemicals and facility worst-case release scenarios and enforces compliance with a variety of environmental programs through inspections of facilities located throughout the country. By tapping EPA's expertise on chemical facilities and general facility safety issues, DHS can enhance its efforts to identify high-priority facilities and assess facility vulnerabilities as well as better target government resources to those facilities posing the greatest risk. Implementing inherently safer technologies potentially could lessen the consequences of a terrorist attack by reducing the chemical risks present at facilities, thereby making facilities less attractive targets. However, substituting safer technologies can be prohibitively expensive for some companies and can shift risks onto other facilities or the transportation sector. Also, in many cases, it may not be feasible to substitute safer chemicals or change to safer processes. Therefore, given the possible security and safety benefits as well as the potential costs to some companies of substituting safer technologies, a collaborative study employing DHS's security expertise and EPA's chemical expertise could help policy makers determine the appropriate role of safer technologies in facility security efforts. Matters for Congressional Consideration: To enhance DHS's ability to collect comprehensive information on industry preparedness and better ensure the security of the chemical sector, we recommend that the Congress consider the following two actions: * granting DHS the authority to require high-risk chemical facilities to assess their vulnerability to terrorist attacks and, where necessary, to take corrective action and: * providing DHS with the enforcement capability to ensure that facilities are following these practices. Recommendations for Executive Action: Because completion of the Chemical Sector-Specific Plan is critical to DHS's efforts to enhance chemical facility security, we recommend that the Secretary of the Department of Homeland Security direct DHS to take the following two actions: * ensure that the Chemical Sector-Specific Plan is completed in a timely manner and: * recognizing EPA's expertise in managing chemical risks, jointly study with EPA whether chemical facilities' efforts to reduce vulnerabilities would benefit from the use of technologies that substitute safer chemicals and processes, referred to as "inherently safer technologies." Agency Comments and Our Evaluation: We provided a draft of this report to DHS and EPA for their review and comment. EPA provided no comments on the draft report. DHS agreed in substance with two of the report's recommendations, but disagreed with the third. DHS agreed that the Congress should consider granting DHS the authority to require the chemical industry to address plant security. DHS also agreed that completing and implementing the sector- specific plan is a priority and stated that it is making progress toward developing this plan. However, DHS disagreed with our recommendation that the department work with EPA to study the security benefits to chemical plants of using safer technologies. In this regard, DHS believes that the use of safer technologies would not generally result in more secure chemical facilities and would tend to shift risks rather than eliminate them. DHS stated that it is unclear what role EPA would play in a study of the benefits of using safer technologies or how DHS's interaction with EPA might be perceived among DHS's private sector partners. We continue to believe, however, that the use of safer technologies may have the potential to reduce security risks for at least some chemical facilities by making them less attractive to a terrorist attack and reducing the severity of the potential consequences of an attack. While we recognize in our report that inherently safer technologies can shift risks onto other facilities or the transportation sector, there may also be instances where implementing safer technologies could reduce the likelihood and severity of a terrorist attack. In fact, DHS's July 2004 draft of the Chemical Sector-Specific Plan states that inherently safer chemistry and engineering practices can prevent or delay a terrorist incident. The draft also notes that it is important to make sure that facility owners/operators consider alternate ways to reduce risk, such as inherently safer design, implementing just-in-time manufacturing, or replacing high-risk chemicals with safer alternatives. Therefore, we continue to believe that studying the costs and security benefits of using safer technologies would be a worthwhile effort. While DHS, as the federal agency primarily responsible for chemical facility security, should have the lead role in conducting such a study, EPA--charged with ensuring environmental and human health and safety and having the key expertise needed to analyze the potential environmental and health effects of a variety of alternative technologies--can provide valuable support. We acknowledge DHS's concern that its working relationship with the chemical industry might be constrained by too close association with EPA, which regulates the industry. However, we do not believe that a DHS-EPA partnership to study the potential security benefits of using safer chemicals and technologies would necessarily bring the department into conflict with the industry, if the appropriate informational safeguards and assurances are built into the process. Through additional study, DHS-- in conjunction with EPA--can help to determine the appropriate role of inherently safer technologies in government and industry efforts to bolster chemical facility security. Through such an effort, DHS and EPA could also identify alternative ways to reduce both security and environmental and health risks and share these practices with private industry. DHS also provided a number of technical comments and clarifications, which we have incorporated into the report as appropriate. Appendix III contains the full text of DHS's comments in a letter dated December 8, 2005. As arranged with your offices, unless you publicly announce its contents earlier, we plan no further distribution of this report until 30 days after the date of this report. At that time, we will send copies to other interested congressional committees and to the Secretary of the Department of Homeland Security and the Administrator of the Environmental Protection Agency. We will also make copies available to others upon request. In addition, the report will be available at no charge on the GAO Web site at [Hyperlink, http://www.gao.gov]. If you or your staff have any questions on this report, please contact me at (202) 512-3841 or at [Hyperlink, stephensonj@gao.gov]. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Other GAO staff who contributed to this report are listed in appendix IV. Signed by: John B. Stephenson: Director, Natural Resources and Environment: [End of section] Appendixes: Appendix I: Objectives, Scope, and Methodology: Our objectives were to describe (1) the Department of Homeland Security's (DHS) actions to develop an overall strategy for protecting the chemical industry; (2) DHS's efforts to identify high-risk chemical facilities, assess their vulnerabilities, ensure that facilities are addressing security, and coordinate with the Environmental Protection Agency (EPA) in these efforts; (3) chemical industry security initiatives and challenges; and (4) DHS's existing authorities, and whether additional legislative authority is needed to ensure that chemical facilities take action to address vulnerabilities. To discuss DHS's actions to develop an overall strategy for protecting the chemical industry, we reviewed DHS's February 2005 Interim National Infrastructure Protection Plan, its April 2004 guidance to sector- specific agencies on drafting sector plans, and a July 2004 draft of its Chemical Sector-Specific Plan. To discuss the actions DHS has taken to identify high-risk chemical facilities, assess their vulnerabilities, ensure that facilities are addressing security, and coordinate with EPA, we interviewed officials from DHS's Information Analysis and Infrastructure Protection Directorate and EPA's Office of Emergency Management and gathered and reviewed available documents and reports from both agencies. Specifically, in addition to the documents previously mentioned, we reviewed DHS reports on chemical facilities' and chemical storage facilities' characteristics and their common vulnerabilities and potential indicators of terrorist activity, one-page summaries of DHS programs provided by department officials, and other available reports and information on DHS efforts. We also attended two industry-sponsored conferences, which included detailed presentations from DHS officials on the department's chemical security efforts. In addition, we interviewed contractors for DHS's Risk Analysis Management for Critical Asset Protection (RAMCAP) initiative; representatives from the American Society of Mechanical Engineers; and the subcontractor developing chemical sector RAMCAP tools, the AcuTech Consulting Group. In addition, we reviewed EPA Risk Management Plan (RMP) data and obtained EPA officials' views on DHS's analysis of these data to identify high- risk chemical facilities. We also discussed current interagency coordination and opportunities for additional coordination between DHS and EPA with officials from both agencies. To discuss chemical industry voluntary initiatives and challenges, we met with representatives of all 16 associations participating on the Chemical Sector Coordinating Council.[Footnote 43] Using structured interview questions, we gathered representatives' views on threats, DHS's chemical security efforts, and industry security initiatives. We also reviewed documents from industry associations, such as vulnerability assessment tools, descriptions of voluntary security programs, security guidelines, and best practices. We used this information to assess the various initiatives undertaken by associations and their members. To obtain a broad range of industry views, we also talked to representatives of 20 chemical companies belonging to 13 of the 16 associations on the Chemical Sector Coordinating Council. Officials of some of these companies were present at our meetings with associations, while others were contacted by industry associations and agreed to speak with us separately. Three associations--the Adhesive and Sealant Council, the International Institute of Ammonia Refrigeration, and the National Paint and Coatings Association--were not able to identify a member company willing to speak with us. We also gathered information from both industry associations and chemical company officials about challenges companies face in improving security. To avoid unintentionally disclosing any security-related information, we are not disclosing the names or other identifying information relating to the individual chemical companies we contacted. The comments from industry officials discussed in this report are illustrative, are not statistically representative of the chemical sector, and should not be considered to represent the views of the chemical sector as a whole. To discuss DHS's existing authorities and whether additional legislative authority is needed to ensure that chemical facilities take action to address vulnerabilities, we analyzed DHS's current authorities and gathered a range of views on the need for additional authority. Specifically, we analyzed DHS's current authorities under the Homeland Security Act of 2002, the Patriot Act, and other laws. DHS officials would not comment directly to us on the department's need for additional authority because the executive branch has not yet established a unified position on this issue. However, we were able to obtain DHS's views on legislation by reviewing DHS statements and comments at hearings on chemical facility security in July 2005. We also gathered views on the need for legislation and the content and structure of legislation during interviews with EPA, industry associations, chemical companies, state homeland security officials in New Jersey and Texas, and other organizations with chemical industry expertise. These organizations included the American Institute of Chemical Engineers' Center for Chemical Process Safety; Sandia National Laboratories; the U.S. Chemical Safety and Hazard Investigation Board; the American Society of Mechanical Engineers; the University of Pennsylvania Wharton School's Risk Management and Decision Processes Center; Texas A&M University's Mary K. O'Connor Process Safety Center and National Emergency Response and Rescue Training Center; OMB Watch; the Working Group on Community Right-to-Know; U.S. Public Interest Research Group; and the Paper, Allied-Industrial, Chemical, and Energy Workers International Union. We also asked representatives of these organizations and industry officials about challenges the federal government faces in securing the nation's chemical facilities from a terrorist attack. In addition, we reviewed the testimony of industry officials and other experts on legislation at hearings before the Senate Homeland Security and Governmental Affairs Committee and the House Homeland Security Committee, Subcommittee on Economic Security, Infrastructure Protection and Cybersecurity, in April, June, and July 2005. We limited our review of security issues to stationary chemical facilities and did not address security concerns surrounding the transportation of hazardous chemicals. We conducted our work from December 2004 through December 2005 in accordance with generally accepted government auditing standards. [End of section] Appendix II: Summary of the Chemical Industry's Voluntary Security Initiatives: Sixteen chemical industry associations participate in the Chemical Sector Coordinating Council and have initiated a variety of security efforts. These efforts range from developing security guidance and best practices to establishing security requirements that member facilities must follow to remain eligible for association membership. The following is a brief description of these 16 associations and a summary of security efforts under way at the facilities owned and/or operated by their member companies. American Chemistry Council: The American Chemistry Council (ACC) has 135 members that represent the leading companies in the U.S. chemical manufacturing sector. According to ACC, its members are responsible for nearly 90 percent of basic industrial chemical production. ACC's member companies operate about 2,000 facilities, approximately 1,000 of which are RMP facilities. Approximately 270 of ACC's member facilities are also subject to the Maritime Transportation Security Act of 2002 (MTSA). ACC adopted a Responsible Care® Security Code that outlines 13 management practices that company security management systems must include. These practices require companies to perform security vulnerability assessments of their facilities, develop and implement plans to mitigate the vulnerabilities, and obtain third-party verification that the planned physical security enhancements were completed. ACC members assigned its facilities into "tiers" on the basis of the potential impact a chemical release at a facility would have on surrounding communities, and these facilities must follow milestone dates for completing security requirements that are based on tier level. ACC reported that as of May 2004, all of its 2,000 facilities have completed security vulnerability assessments at their sites using the Sandia National Laboratories vulnerability assessment methodology, the Center for Chemical Process Safety methodology, or an equivalent methodology approved by the center. The Responsible Care® Security Code also requires that companies apply security management practices to facility cyber assets and the chemical industry distribution chain, which covers the complete "value chain" for chemicals, from suppliers to customers, including transportation. Member companies must perform vulnerability assessments of their cyber assets and distribution value chain and implement plans to mitigate these vulnerabilities. ACC asked that a company executive from each member provide a signed statement declaring that the company had management systems in place for the entire security code by June 30, 2005. As of October 3, 2005, 95 percent of member companies have signed this statement. ACC officials told us that a number of companies have left ACC over the last few years because of the cost of complying with Responsible Care® requirements. Recognizing the degree of rigor associated with the Responsible Care® Security Code, the United States Coast Guard recognized the code as an alternative security program for purposes of fulfilling facility security requirements under MTSA. American Forest & Paper Association: The American Forest & Paper Association has 116 members, including companies that manufacture pulp, paper, paperboard, wood, or related products in the United States. According to the association, its member companies operate over 1,000 facilities, of which 80 to 90 are RMP facilities. The association has established no specific security requirements for its members, but has provided them with guidance on facility site security principles and distributed pamphlets on common steps for protecting forest products industry infrastructure. Chemical Producers and Distributors Association: The Chemical Producers and Distributors Association represents 86 member companies engaged in (1) the manufacture, formulation, distribution, and sale of crop protection chemicals, fertilizers, feed, fiber crops, and ingredients used in food; (2) the care and maintenance of lawns, gardens, and turf; and (3) various forestry and vegetation management markets. The association has established no specific security requirements for its members, but shares information about security issues with members at meetings and conferences. Chlorine Chemistry Council: The Chlorine Chemistry Council is a business council of ACC representing the manufacturers and users of chlorine and chlorine- related products. The council has seven voting members, who must be members of ACC and comply with ACC's Responsible Care® security requirements. Most facilities of voting member companies are also RMP facilities. The council also has nonvoting members who are not ACC members. Some of these members voluntarily follow the general approach of Responsible Care®. Compressed Gas Association: The Compressed Gas Association (CGA) has 138 member companies that represent manufacturers, distributors, suppliers, and transporters of gases and cryogenic liquids (i.e., liquefied gases kept in a liquid state at extremely low temperatures). The association's members have gases, such as oxygen, nitrogen, argon, and helium, that are used in most industries, including food and metal processing, semiconductor manufacturing, healthcare, and chemical production. According to CGA, member companies include approximately 15 to 20 industrial gas manufacturing companies. CGA does not collect information on the number of facilities member companies have that must meet RMP requirements. Some member companies that make gas products used in foods must comply with aspects of the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 to protect the nation's food, according to CGA. CGA has established no specific security requirements for members, but has developed and distributed guidance to the compressed gas industry on assessing security risks and identifying and implementing preventive security measures. Guidelines address site security, transportation security, and steps facilities should take to "qualify" customers, (i.e., ensure that they are purchasing products for the appropriate uses). CGA relied heavily on site security guidelines developed by ACC, the Chlorine Institute, and the Synthetic Organic Chemical Manufacturers Association in 2001 and on information from the Center for Chemical Process Safety in developing these guidelines. CropLife America: CropLife America represents the developers, manufacturers, formulators, and distributors of chemicals for agriculture and pest management in the United States. CropLife America member companies produce, sell, and distribute virtually all of the crop protection and biotechnology products used by American farmers. CropLife America's membership includes 18 pesticides manufacturing companies with about 30 facilities and 5 integrated distribution companies with 1,100 of the nation's 5,500 bulk pesticide retail agricultural facilities, which typically store both fertilizer chemicals and pesticides. All of the manufacturing facilities are subject to RMP. Most of the retail facilities also are subject to RMP because they house ammonia. CropLife America also has about 10 member facilities that formulate pesticides. CropLife America also participates in the Food and Agriculture Sector Coordinating Council. Six of CropLife America's basic research and manufacturing members are ACC members and their facilities adhere to the Responsible Care® Security Code. In addition, working with the Agricultural Retailers Association, CropLife America created a not-for-profit organization called the American Agronomic Stewardship Alliance to develop a stewardship inspection and accreditation program for its agricultural retail and distribution facilities that includes some security steps. The alliance requires facilities to develop security plans and undergo inspection by third-party vendors that includes checking to see that security plans were prepared. However, the inspectors do not look at whether the security plan has been implemented. As of April 2005, third parties had completed about 2,000 inspections and 98 percent of inspected facilities had a security plan on file. CropLife America also published security guidelines shortly after the events of September 11, 2001, and has distributed these guidelines extensively. Institute of Makers of Explosives: The 40 member companies of the Institute of Makers of Explosives (IME) include explosives manufacturers and distributors, and companies that are contracted by mining companies to conduct explosions. According to IME, about 30 of IME's member companies manufacture or distribute explosives at about 300 facilities. Six of these companies operate 23 RMP facilities. IME member companies are subject to a number of safety and security requirements regulated by the Department of Justice's Bureau of Alcohol, Tobacco, Firearms, and Explosives. IME has no specific security requirements for its members, but has provided recommended security guidelines to its members that include conducting a vulnerability assessment but does not audit members for compliance. IME also has work under way on a risk assessment modeling tool for accident risk planning that will include a terrorist threat scenario. The model is based on Department of Energy work and is intended for manufacturers and drill blast companies. International Institute of Ammonia Refrigeration: The International Institute of Ammonia Refrigeration is an international association serving companies that use ammonia refrigeration technology, including end users such as food refrigeration companies, contractors, engineers, equipment manufacturers, and others in the industry. While the institute was unable to provide the number of RMP facilities in its membership, about 2,000 RMP facilities use ammonia refrigeration. According to the institute, these ammonia refrigeration facilities include approximately 600 refrigerated warehouses and storage facilities, such as regional food distribution centers, and about 400 facilities that house meat from slaughterhouses. Almost all of the food facilities belonging to the institute are covered by the Bioterrorism Act. The institute also participates in DHS's Agriculture Sector Coordinating Council. The institute has established no specific security requirements for its members, but shares information about security issues with its members at annual meetings. National Association of Chemical Distributors: Member companies of the National Association of Chemical Distributors (NACD) package, distribute, and blend chemicals. Its members typically work with chemicals that do not react in unstable ways and store large quantities of chemicals in warehouses. NACD represents 253 chemical distribution companies that own, lease, or manage approximately 1,380 facilities in the United States and Canada. NACD estimates that at least 350 member facilities are RMP facilities. In 1991, NACD developed an environment, health, safety, and security management protocol called the Responsible Distribution Process. Adherence to this process is a condition of NACD membership. Since January 1999, NACD members have been required to have their successful implementation of all required membership practices verified by third parties once every 3 years. NACD contracted with an internal auditing company to be the third-party reviewer for its members. The first 3- year cycle of Responsible Distribution Process verification ended in December 2001. In April 2002, NACD added security measures to the process, which require its members to develop security programs, scrutinize security measures taken by for-hire motor carriers, ensure that customers are purchasing chemicals for the appropriate use (as prescribed by government regulations), and verify implementation of security measures by an independent firm designated by NACD. The second 3-year cycle for process verification began in January 2003 and ended in December 2005. Beginning in January 2006, NACD's Responsible Distribution Process includes a requirement that members conduct security vulnerability assessments. NACD developed its own vulnerability assessment methodology, and members will be expected to have completed their assessment by June 2006. NACD has terminated the membership of 20 companies that failed to comply with the Responsible Distribution Process requirements and to complete and pass the verification step. National Paint and Coatings Association: The National Paint and Coatings Association (NPCA) represents manufacturers and suppliers of paints and coatings, including lacquers, stains, varnishes, and concrete. NPCA has over 350 associate and full- member companies, representing an estimated 700 paint manufacturing facilities that range from mom-and-pop stores to chain stores. Approximately 50 of these facilities are RMP facilities. NPCA worked with its members to develop Coatings Care, a safety and environmental management system that includes security steps such as analyzing threats, vulnerabilities, and consequences and the implementation of security measures. Coatings Care also includes a vulnerability assessment methodology developed by a member company specifically for paint and coatings facilities that companies may elect to use, as well as examples of security checklists and best practices. Member companies have 1 year from the time they become NPCA members to agree to follow the Coatings Care principles. However, NPCA does not require that members take steps to verify their compliance with Coatings Care security requirements. National Petrochemical and Refiners Association: The National Petrochemical and Refiners Association (NPRA) has about 450 member companies that include refiners and petrochemical manufacturers, suppliers, and vendors. Almost all U.S. refiners are NPRA members, which represent about 98 percent of the total refining capacity in the United States. Petrochemical manufacturing facilities use processes similar to those used in refineries and are often colocated at refineries. According to NPRA, a majority of the almost 150 refineries and 200 petrochemical manufacturing facilities in the United States are subject to MTSA. Because refineries are currently considered to be part of the energy critical infrastructure sector, NPRA also participates in the Oil and Natural Gas Sector Homeland Security Coordinating Council, which meets regularly with a sector government coordinating council that includes DHS and the Department of Energy. NPRA has established no specific security requirements for its members, but it holds security conferences and workshops for its members that address security issues. In addition, NPRA and the American Petroleum Institute developed a vulnerability assessment methodology for petrochemical manufacturing and refining facilities that was issued in 2003 and updated in 2004. The Center for Chemical Process Safety has approved the methodology. DHS formally acknowledged that the methodology can be used to satisfy MTSA requirements. Synthetic Organic Chemical Manufacturers Association: The Synthetic Organic Chemical Manufacturers Association (SOCMA) includes 160 member companies that operate about 300 small-to medium- sized specialty chemical manufacturing facilities in the United States, or "batch" facilities, that produce a diverse number of chemicals. Specialty chemicals are formulated to meet the detailed specifications of various end users, and usually have unique purposes, such as making nylon fibers stronger or serving as the active ingredient in medicine. In December 2002, SOCMA adopted ACC's Responsible Care® Security Code. SOCMA also developed a vulnerability assessment methodology reflecting the variable risks at smaller facilities. According to SOCMA officials, as of September 2005, all of its member companies had reported completing vulnerability assessments and 98 percent of these companies reported that they had implemented security enhancements and obtained third-party verification. However, beginning in October 2005, SOCMA no longer required its members to adhere to Responsible Care® because it has developed its own environmental, health, safety, and security performance program. SOCMA's new program, called ChemStewardsSM, will still require members to conduct vulnerability assessments and implement enhancements for physical security but will not include specific security requirements for cyber assets and facilities' distribution chain, which covers the complete value chain for chemicals, from suppliers to customers, including transportation. According to SOCMA, they have taken this step because cybersecurity issues are far less significant for small companies, most of whom do not use process control systems that can be disrupted via cyber attack. Members will have to obtain third-party verification of security improvements if a facility is an RMP facility. The Adhesive and Sealant Council: The Adhesive and Sealant Council (ASC) represents adhesive and sealant manufacturers and supplier companies. The council has about 126 member companies with approximately 250 facilities. According to ASC, most of these facilities are RMP facilities. About 75 or 80 member companies are raw materials suppliers, some of which also belong to ACC and, therefore, comply with Responsible Care®. About 55 member companies are adhesives or sealant manufacturers, some of which also belong to NPCA. ASC has no specific security requirements for members. The Chlorine Institute: The Chlorine Institute represents approximately 220 member companies that produce, distribute, and use chlorine, sodium, and potassium hydroxides and sodium hypochlorite, and that distribute and use hydrogen chloride. The institute's North American producer members account for 98 percent of the total chlorine production capacity of the United States and Canada; its packager member companies represent 100 percent of the total U.S. market. Most of the facilities of the institute's member companies are RMP facilities. A few of the institute's members are large water treatment facilities that are covered by the Bioterrorism Act, and many of their members also have facilities covered by MTSA, according to the institute. The Chlorine Institute encourages, but does not require, its members to conduct vulnerability assessments and develop security plans. Member companies that are also ACC members conduct vulnerability assessments and develop security plans in accordance with the Responsible Care® Security Code. The institute has developed a seven-step process that smaller chlorine manufacturing and distribution companies can use to assess their vulnerabilities. In addition, the institute requires executives of all member companies to sign an agreement stating that they will meet nine safety and security requirements, including complying with Responsible Care® or another industry security program. Companies whose executives do not sign the agreement are not eligible for institute membership. The institute does not require that companies take steps to verify that vulnerability assessments and security plans are completed and security measures are implemented. The Fertilizer Institute: The Fertilizer Institute (TFI) represents companies that make, sell, and transport fertilizer products. Its approximately 190 member companies operate retail spaces, warehouses, terminal, and production facilities. Approximately 20 companies in the United States manufacture fertilizer. TFI has established no specific security requirements for its members. In 2002, however, TFI developed a Security Code of Management Practices that it recommends, but does not require, that members follow. The security code involves screening facilities into priority tiers that are based on potential security hazards and, following a timeline on the basis of tier level, conducting a vulnerability assessment using a methodology developed by the Center for Chemical Process Safety, SOCMA, or other equivalent methods. Also in 2002, a working group comprising members of TFI, CropLife America, and the Agriculture Retailers Association, developed a Web-based vulnerability assessment tool for agribusiness retail facilities. The Center for Chemical Process Safety approved the tool as meeting its criteria for security vulnerability assessments. According to TFI, approximately 2,000 of its member retail facilities have used the tool to date. The Society of the Plastics Industry, Inc. The Society of the Plastics Industry, Inc., represents the entire plastics industry, including processors, machinery and equipment manufacturers, and raw materials suppliers. The society has about 1,100 member companies--about half of these companies supply machinery (auxiliary components, dryers, and heavy equipment, among others); about 250 to 300 companies process and recycle plastics; less than 100 companies make resins; and the remaining companies make molds. The bulk of the society's member companies do not handle large quantities of hazardous chemicals. The society has established no specific security requirements for its members. Some of the society's members are also members of ACC or the Synthetic Organic Chemical Manufacturers Association and, therefore, comply with these associations' security programs. [End of section] Appendix III: Comments from the Department of Homeland Security: U.S. Department of Homeland Security: Washington, DC 20528: December 8, 2005: Mr. John Stephenson: Director: Natural Resources and Environment: U.S. Government Accountability Office: Washington, D. C. 20548: Dear Mr. Stephenson: RE: Draft Report GAO-05-150 DHS is Taking Steps to Enhance Security at Chemical Facilities, but Additional Authority is Needed (GAO Job Code 360538): Thank you for the opportunity to review the draft report. In addition to responses to the two recommendations contained in the report, we are providing general comments that are more than technical in nature and are responsive to content in the text of the report. Recommendation: The Congress considers giving the Department of Homeland Security (DHS) authority to require the chemical industry to address plant security. Response: Concur in Part. DHS agrees the Congress should consider giving DHS authority to require the chemical industry to address plant security in the interest of enhancing security at these facilities. Recommendation: DHS complete the chemical sector-specific plan in a timely manner and work with the Environmental Protection Agency (EPA) to study the security benefits to chemical plants of using safer technologies. Response: Non-concur. DHS does not concur with the recommendation as stated. The Office of Infrastructure Protection (IP) agrees that completing and implementing the sector-specific plan is a priority and is making significant progress toward developing a final plan. However, IP recommends GAO strike the mention of DHS working with EPA to study safer technologies. DHS believes that safer technologies would not generally result in more secure chemical facilities. The use of inherently safer technologies tends to shift risks rather than eliminate risks, often with unintended consequences. It is also unclear what EPA's role would be in this context, or how DHS interaction with EPA in this regard might be perceived among our private sector partners. General Item 1: Page: 3, 15: Issue summary: DHS is developing a national strategy for protecting the chemical sector, which department officials expect to complete in 2006. This strategy-to be included in a Chemical Sector-Specific Plan-is intended to outline a framework for reducing the overall vulnerability of the chemical sector in partnership with industry, state and local authorities, according to DHS officials.. As a part of the National Infrastructure Protection Plan (NIPP), DHS is developing a national strategy for protecting the chemical sector that will establish a framework for reducing the overall vulnerability of the sector in partnership with the industry and state and local authorities.: DHS/IP Statement The National Strategy being developed for the Chemical Sector is separate but complimentary to the Chemical Sector Specific Plan. The National Strategy for Securing the Chemical Sector, which was requested by Congress in the committee report for the FY06 Homeland Security appropriations bill, is a high-level strategic document being prepared solely by DHS. The Chemical Sector Specific Plan (SSP), which will be an appendix to the National Infrastructure Protection Plan (NIPP), is a strategic & operational document being prepared by DHS in conjunction with other Federal agencies, State and local governments, and the private sector. The Chemical SSP, like SSPs for all 17 critical infrastructure and key resource sectors, cannot be completed until the NIPP Base Plan is completed, and is scheduled to be completed within six months of the signing out of the NIPP Base Plan. General Item: 2: Page: 4: Issue: "Conducting this analysis will require that chemical facility owners and operators voluntary assess their own risks and provide DHS with this information." DHS/IP Statement: DHS would like owners and operators to assess and provide information on their vulnerabilities and potential consequences of an attack. An accurate assessment of risk requires specific threat information, which may not be available in all cases. General Item 3: Page: 19, FN 12: Issue: EPA has expressed concern about DHS' analysis of the Risk Management Plan (RMP) database. According to EPA officials, the results of DHS analysis appear to indicate that the data may have been manipulated incorrectly. For example, EPA does not agree that the database contains 3,000 facilities that are no longer in business or no longer RMP facilities. EPA officials offered to assist DHS with implementation of the RMP database. DHS/IP Statement: Please note in the GAO Report that DHS is open to working with EPA to clarify the Department's methodology for interpreting the RMP database as it relates to risk. General Item 4: Page: 21: Issue: According to DHS, 272 of these facilities could potentially affect more than 50,000 people. These 272 facilities include chemical manufacturing plants as well as refineries, wastewater treatment facilities, and other types of chemical facilities. DHS/IP Statement: This states that the 272 facilities include refineries and wastewater treatment facilities. However, in regard to refineries, the list mainly includes petro-chemical companies. In addition, it should be noted that wastewater treatment facilities were not intended to be incorporated in the list of top facilities. General Item: 5: Page: 22: Issue: According to DHS officials, DHS plans to ask 20,000 chemical facility owners/operators to complete the Risk Analysis Management for Critical Asset Protection (RAMCAP) top screen. DHS will work with industry associations to distribute the RAMCAP screening tool to chemical facilities. DHS officials said that they expect that less than 1,000 chemical facility owners/operators will be asked to complete the vulnerability assessment. DHS/IP Statement: This states that DHS plans to ask 20K facilities to do the Top Screen and 1K to do the Site Vulnerability Assessment (SVA). DHS recommends that GAO strike the mention of 20,000 facilities as this number is subject to change. IP Proposed Replacement Language: According to DHS officials, DHS will work with industry associations to distribute the RAMCAP screening tool to the highest consequence chemical facilities DHS officials expect that between 5-10 percent of those chemical facility owners/operators will be asked to complete the self vulnerability assessment. General Item: 6: Page: 23: Issue: According to industry officials, however, the companies who pre- tested the security vulnerability assessment found the exercise valuable and difficult to complete. DHS/IP Statement: The GAO Report says companies pre-tested the SVA, but they actually tested the Top Screen, not the SVA. General Item: 7: Page: 27: Issue: DHS is also planning a series of Comprehensive Reviews in areas with large number of chemical facilities, focusing on facilities' security as well as emergency response capabilities in the local area. A team of federal officials from multiple agencies along with state and local officials will plan and conduct the work.. DHS hopes to complete 5 visits to clusters of facilities during 2006. DHS/IP Statement: DHS expects to visit 6 Comprehensive Review (CR) clusters in 2006, not 2005. Also, the description says that state and local officials will plan and conduct the work. Actually, the planning and conduct of the actual work is all going to be done by the various federal agencies involved in the CR effort in coordination with State and local officials: IP Suggested Language: The Comprehensive Review is a DHS-led cooperative government and private sector analysis of Critical Infrastructure/Key Resource (CI/KR) that will enhance public safety by helping the nation prevent and prepare for a potential terrorist attack, identify and reduce the possible consequences of such an attack, and enhance the integrated prevention and response capabilities of the ownerloperator, local law enforcement, and emergency response organizations. The results will be used to enhance the nation's security posture by implementing short-term protective measures and making longer-term risk-based investments in training, processes, procedures, and resources for the community. The Comprehensive Review process also provides an opportunity for all affected stakeholders to identify and implement best practices for readiness and preparedness for any catastrophic event affecting critical infrastructure. General Item 8: Page: 48: Issue: Set of principles proposed for chemical security legislation: * Require a common set of standards and practices to level the playing field across the chemical sector; * Implement core security measures consistently and fairly, based on risk; * Give DHS the authority to decide which facilities will be subjected to any new rules, based on the risk of a terrorist attack; * Give DHS the flexibility to address security issues for individuals facilities on a case-specific basis; Provide DHS the authority, with sufficient flexibility, to address specific threats to high-risk facilities, or under extraordinary circumstances; * Recognize and build upon public-and private-sector work and investment to date, and avoid penalizing companies already operating under existing Federal security authorities (for example MTSA), where appropriate; * Do not halt or deter ongoing capital investment by companies that are taking responsible security measures currently; * Balance the need for appropriate security measures with the ability to effectively and efficiently maintain business operations; * Institute market-based incentives to the highest degree possible to secure the chemical sector; * Include an objective verification and validation process for ensuring that adequate security measures implanted, and allow the Security of DHS to issue civil penalties for non-compliance; and: * Protect confidential, proprietary, and business sensitive information: DHS/IP Statement: This list differs from the current list of principles for proposed chemical legislation. The following text represents the current list of principles, which were outlined during testimony that DHS believes should be incorporated into any potential legislation: "First, we must recognize that not alt facilities present the same level of risk, and that the most scrutiny should be focused on those that, if attacked, could endanger the greatest number of lives, have the greatest economic impact or present other very significant risks Second, facility security should be based on reasonable, clear, and equitable performance standards. The Department should develop enforceable performance standards based on the types and severity of potential risks posed by terrorists, and facilities should have the flexibility to select among appropriate site-specific security measures that will effectively address those risks. Third, we should recognize the progress many responsible companies have made to date." General Item 9: Page: 52: Issue: Furthermore, DHS' July 2004 draft Chemical Sector-Specific Plan states that inherently safer chemistry and engineering practices can prevent or delay a terrorist incident, noting that it is important to make sure that facility owners/operators consider alternative ways to reduce risk such as inherently safer design, implementing just-in-time manufacturing, or replacing high-risk chemicals with safer alternatives. DHS/IP Statement: Inherently Safer Technology (IST) does not "prevent or deny" incidents. The use of inherently safer technologies tends to shift risks rather than eliminate risks, often with unintended consequences. It is also unclear what EPA's role would be in this context. We thank you again for the opportunity to review the report and provide comments. Sincerely, Signed by: Steven J. Pecinovsky: Director: Departmental GAO/OIG Liaison Office: The following are GAO's comments on the Department of Homeland Security's letter dated December 8, 2005. GAO Comments: 1. We revised the report to include a description of the National Strategy for Securing the Chemical Sector. 2. We revised the report to include the language suggested by DHS. 3. We revised the report to include DHS's statement that it is open to working with EPA on interpreting the RMP database. In addition, we encourage DHS to share its analysis of the database with EPA to ensure that all high-risk facilities are identified. 4. We revised the report to state that the 272 facilities that could potentially affect more than 50,000 people included some refineries located with petrochemical companies. We also added DHS's comment that it did not intend to incorporate wastewater treatment facilities into the list of top facilities. 5. We revised the report to indicate that DHS is uncertain how many facilities it will ask to complete the RAMCAP top screen. 6. Contrary to DHS's statement, industry officials told us that the companies that pretested the security vulnerability assessments--not the top screen, as DHS indicates--found the exercise valuable, but difficult to complete. As of early November 2005, four chemical companies had tested the security vulnerability assessment at one of its facilities. 7. We revised the report to state that DHS expects to conduct six Comprehensive Reviews, and that they will coordinate these reviews with state and local officials. 8. As DHS suggested, we deleted the list of principles for proposed chemical security legislation that DHS officials provided us in October 2005 and substituted the language suggested by DHS, which was, in part, already included in the draft report. 9. As we state in our response to DHS's views on our recommendation, we continue to believe that the use of safer technologies may potentially reduce both security and environmental and health risks at some chemical facilities. We retained the draft report's existing discussion of the issue, including DHS's and the industry's views, but added DHS's specific statement from its comment letter that "the use of inherently safer technologies tends to shift risks rather than eliminate risks, often with unintended consequences." We also included information from DHS's draft Chemical Sector-Specific Plan, which states that inherently safer chemistry and engineering practices can prevent or delay a terrorist incident, and that it is important to make sure that facility owners/operators consider alternate ways to reduce risk, such as inherently safer design, implementing just-in-time manufacturing, or replacing high-risk chemicals with safer alternatives. [End of section] Appendix IV: GAO Contact and Staff Acknowledgments: GAO Contact: John B. Stephenson (202) 512-3841: Staff Acknowledgments: In addition, Vincent P. Price, Assistant Director; Leigh White; Joanna Owusu; and Jill Edelson made key contributions to this report. Important contributions were also made by John W. Delicath and Amy Webbink. (360538): FOOTNOTES [1] Pub. L. No. 107-296, 116 Stat. 2145 (2002). [2] Homeland Security Presidential Directive Number 7 (Washington, D.C.: Dec. 17, 2003). [3] As of November 2005, Chemical Sector Coordinating Council members included the Adhesive and Sealant Council; the American Chemistry Council; the American Forest & Paper Association; the Chemical Producers and Distributors Association; the Chlorine Chemistry Council; the Chlorine Institute; the Compressed Gas Association; CropLife America; the Fertilizer Institute; the Institute of Makers of Explosives; the International Institute of Ammonia Refrigeration; the National Association of Chemical Distributors; the National Paint and Coatings Association; the National Petrochemical and Refiners Association; the Society of the Plastics Industry, Inc; and the Synthetic Organic Chemical Manufacturers Association. [4] Three associations--the Adhesive and Sealant Council, the International Institute of Ammonia Refrigeration, and the National Paint and Coatings Association--were not able to identify a member company willing to speak with us. [5] GAO, Protection of Chemical and Water Infrastructure: Federal Requirements, Actions of Selected Facilities, and Remaining Challenges, GAO-05-327 (Washington, D.C.: Mar. 28, 2005). [6] GAO, Homeland Security: Voluntary Initiatives Are Under Way at Chemical Facilities, but the Extent of Security Preparedness Is Unknown, GAO-03-439 (Washington, D.C.: Mar. 14, 2003). [7] In November 2005, DHS reorganized the department. DHS divided the responsibilities of IAIP between DHS's Preparedness Directorate and a new Office of Intelligence and Analysis. [8] The Homeland Security Act called upon the Secretary of DHS to appoint a special assistant to be responsible for these functions. See 6 U.S.C. § 112(f)(4). [9] H.R. Conf. Rep. No. 109-24 (2005). [10] DHS plans to use a metrics-based system of performance evaluation that will conform to the Government Performance and Results Act of 1993. DHS will have core metrics, which will be common across all sectors, and specific metrics for the chemical sector. [11] H.R. Conf. Rep. No. 109-241 (2005). [12] GAO-03-439. [13] EPA has expressed concern about DHS's analysis of the RMP database. According to EPA officials, the results of DHS's analysis appear to indicate that the data may have been manipulated incorrectly. For example, EPA does not agree that the database contains 3,000 facilities that are no longer in business or no longer RMP facilities. EPA officials offered to assist DHS with interpretation of the RMP database. In commenting on our report, DHS stated that the department is open to working with EPA to clarify DHS's methodology for interpreting the RMP database as it relates to risk. [14] According to EPA officials, RMP worst-case scenario population estimates are not intended to represent the number of people that could be harmed by a toxic worst-case accident. EPA regulations require facilities to estimate the distance that a toxic gas cloud would travel before its concentration is diluted below a specified level and to report the entire population within that distance of the facility. EPA officials stated that in an actual release event, even one where worst- case conditions existed, the toxic chemical plume would generally impact a fraction of the reported population, since a toxic plume would only cover areas downwind of the facility. However, since it is impossible to predict the exact wind conditions that will be present during an accidental release, EPA regulations require facilities to report the entire population within a full 360-degree circle surrounding the facility, even though this population number will almost always significantly overestimate the number of people that could be harmed by the scenario. EPA officials refer to the population within the 360-degree circle around the facility as the "vulnerable zone" population. DHS determined that the maximum width of a toxic chemical plume is 60 degrees, not the full 360-degree circle surrounding a facility. Thus, DHS adjusted the RMP worst-case scenarios estimates to develop what they believe is a more realistic estimate of the potential impact of a worst-case, terrorist-caused chemical release. [15] The Department of Homeland Security Appropriations Act, 2005, made appropriations for DHS grant programs. DHS allocated $92 million for buffer zone protection grants for all sectors, including the chemical sector. [16] According to DHS's Buffer Zone Grant Guidance, these are sites that, if attacked, could cause death or serious injury to 50,000 or more people. [17] The governor of each state has designated a state administrative agency that is responsible for preparing and submitting all grant application materials on behalf of the state. The administrative agency is the grantee--that is, it administers the funds for the state and allocates funds to responsible jurisdictions. [18] The Coast Guard provided 287 grants, including some to chemical facilities, totaling over $100 million. [19] DHS stakeholders include the Office of Infrastructure Protection, Office for Domestic Preparedness, Federal Emergency Management Agency, United States Coast Guard, and Transportation Security Administration. Other federal stakeholders include the Environmental Protection Agency and the Federal Bureau of Investigation. [20] The Homeland Security Act and Homeland Security Presidential Directive 7 require DHS to collaborate with the private sector. [21] The Federal Bureau of Investigation's National Infrastructure Protection Center created ISAC with ACC. The Homeland Security Act transferred these functions to DHS, which now supports ISAC. [22] Pub. L. No. 92-463, 86 Stat. 770 (1972) (classified at 5 U.S.C. app. 2). [23] The President or head of an agency may determine that a meeting be closed if, for example, the meeting will include discussions of classified information, reviews of proprietary data submitted in support of federal grant applications, or deliberations involving considerations of personal privacy. [24] If the Secretary exempts a committee from FACA, the Secretary must publish a notice in the Federal Register announcing the establishment of an advisory committee and identifying its purpose and membership. See 6 U.S.C. § 451. [25] The Homeland Security Advisory Council provides advice and recommendations to the Secretary on matters related to homeland security. The council is comprised of leaders from state and local governments, first responder communities, the private sector, and academia. [26] GAO-05-327. [27] Specialty chemicals are formulated to meet the detailed specifications of various end users and usually have unique purposes, such as making nylon fibers stronger or serving as the active ingredient in medicine. [28] Explosives companies are regulated by Justice's Bureau of Alcohol, Tobacco, Firearms, and Explosives. [29] The security vulnerability assessment is owned and operated by the Agricultural Retailers Association. [30] A risk management framework represents a series of analytical and managerial steps, basically sequential, that can be used to assess risk, assess alternatives for reducing risks, choose among those alternatives, implement the alternatives, monitor their implementation, and continually use new information to adjust and revise the assessments and actions, as needed. [31] Paper, Allied-Industrial, Chemical, and Energy Workers International Union, PACE International Union Survey: Workplace Incident Prevention and Response Since 9/11 (October 2004). [32] All standards activities are to be conducted in conformance with section 12(d) of the National Technology Transfer Act of 1995, which states that federal agencies generally must use technical standards-- performance-based or design-specific technical specifications and related management systems practices--developed or adopted by voluntary consensus standards bodies as a means to carry out policy objectives or activities, consulting and participating with such bodies in the development of technical standards when such participation is in the public interest and compatible with the agency's authorities and budget resources. See 6 U.S.C. §112(g) and 15 U.S.C. § 272 note. [33] Pub. L. No. 107-56, § 1016, 115 Stat. 400 (2001) (codified at 42 U.S.C. § 5195c(d)). [34] Under MTSA, DHS's Coast Guard requires maritime facility owners/operators to conduct assessments of vulnerabilities, develop security plans, and implement security measures. The Coast Guard also has the authority to enter facilities. However, the Coast Guard reports that these requirements currently apply to only 300 chemical facilities. [35] Pub. L. No. 106-40, § 3(a) (1999). Justice partially fulfilled this requirement by submitting an interim report on the vulnerability of chemical facilities in May 2002. Neither Justice nor DHS has submitted a final report to the Congress, which was due on August 5, 2002. [36] H.R. Conf. Rep. No. 108-10 (2003). [37] H.R. Conf. Rep. No. 108-774, at 75 (2004). [38] The Secretary may issue regulations for antiterrorism technology and may issue necessary regulations with respect to research; development; demonstration; testing; and evaluation activities of the department, including the conducting, reviewing, and funding of such activities. [39] Testimony before the House Homeland Security Subcommittee on Economic Security, Infrastructure Protection and Cybersecurity and the Senate Committee on Homeland Security and Governmental Affairs on June 15, 2005. [40] GAO-03-439. [41] These facilities are subject to Coast Guard inspections. [42] DHS has begun to establish a field presence through the hiring and placement of 63 protective security advisors in metropolitan areas across the country. [43] As of November 2005, Chemical Sector Coordinating Council members included the Adhesive and Sealant Council; the American Chemistry Council; the American Forest and Paper Association; the Chemical Producers and Distributors Association; the Chlorine Chemistry Council; the Chlorine Institute; the Compressed Gas Association; CropLife America; the Fertilizer Institute; the Institute of Makers of Explosives; the International Institute of Ammonia Refrigeration; the National Association of Chemical Distributors; the National Paint and Coatings Association; the National Petrochemical and Refiners Association; the Society of the Plastics Industry, Inc; and the Synthetic Organic Chemical Manufacturers Association. GAO's Mission: The Government Accountability Office, the investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through the Internet. GAO's Web site ( www.gao.gov ) contains abstracts and full-text files of current reports and testimony and an expanding archive of older products. The Web site features a search engine to help you locate documents using key words and phrases. You can print these documents in their entirety, including charts and other graphics. Each day, GAO issues a list of newly released reports, testimony, and correspondence. GAO posts this list, known as "Today's Reports," on its Web site daily. The list contains links to the full-text document files. To have GAO e-mail this list to you every afternoon, go to www.gao.gov and select "Subscribe to e-mail alerts" under the "Order GAO Products" heading. Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Public Affairs: Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.