Information Sharing

DHS Should Take Steps to Encourage More Widespread Use of Its Program to Protect and Share Critical Infrastructure Information Gao ID: GAO-06-383 April 17, 2006

A wide array of cyber and physical assets is critical to America's national security, economic well-being, and public health and safety. Information related to threats, vulnerabilities, incidents, and security techniques is instrumental to guarding these critical infrastructures against attacks and mitigating the impact of attacks that may occur. The ability to share security-related information can unify the efforts of federal, state, and local government as well as the private sector, as appropriate, in preventing and minimizing terrorist attacks. The Critical Infrastructure Information Act of 2002 was enacted to encourage nonfederal entities to voluntarily share critical infrastructure information and established protections for it. The Department of Homeland Security (DHS) has a lead role in implementing the act. GAO was asked to determine (1) the status of DHS's efforts to implement the act and (2) the challenges it faces in carrying out the act.

DHS has issued interim operating procedures and created a Program Office to administer the critical infrastructure protection program called for by the Critical Infrastructure Information Act. The interim procedures designate the responsibilities and authority of the Program Manager, and establish requirements related to accepting, protecting, sharing, and using critical infrastructure information as required by the act. The Program Office has begun to accept and safeguard critical infrastructure information submitted voluntarily by infrastructure owners and is sharing it with other DHS entities and, on a limited basis, with other government entities. For example, as of January 2006, the Program Office had received about 290 submissions of critical infrastructure information from various sectors. The Program Office also has initiated outreach efforts to publicize the program to the public and private sectors. In addition, it has trained approximately 750 potential users in DHS and other federal, state, and local government entities how to handle protected critical infrastructure information. This training is a prerequisite to being allowed to view the information. The Program Office has also trained at least 16 federal and state officials how to establish programs in their own entities so they can receive protected critical infrastructure information from DHS and then be authorized to store and share it. DHS faces challenges that impede the private sector's willingness to share sensitive information. Key challenges include defining specific government needs for critical infrastructure information, determining how the information will be used, assuring the private sector that the information will be protected and who will be authorized to have access to the information, and demonstrating to critical infrastructure owners the benefits of sharing the information. If DHS were able to surmount these challenges, it and other government users may begin to overcome the lack of trust that critical infrastructure owners have in the government's ability to use and protect their sensitive information.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-06-383, Information Sharing: DHS Should Take Steps to Encourage More Widespread Use of Its Program to Protect and Share Critical Infrastructure Information This is the accessible text file for GAO report number GAO-06-383 entitled 'Information Sharing: DHS Should Take Steps to Encourage More Widespread Use of Its Program to Protect Share Critical Infrastructure Information' which was released on May 17, 2006. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Requesters: April 2006: Information Sharing: DHS Should Take Steps to Encourage More Widespread Use of Its Program to Protect and Share Critical Infrastructure Information: GAO-06-383: GAO Highlights: Highlights of GAO-06-383, a report to congressional requesters. Why GAO Did This Study: A wide array of cyber and physical assets is critical to America‘s national security, economic well-being, and public health and safety. Information related to threats, vulnerabilities, incidents, and security techniques is instrumental to guarding these critical infrastructures against attacks and mitigating the impact of attacks that may occur. The ability to share security-related information can unify the efforts of federal, state, and local government as well as the private sector, as appropriate, in preventing and minimizing terrorist attacks. The Critical Infrastructure Information Act of 2002 was enacted to encourage nonfederal entities to voluntarily share critical infrastructure information and established protections for it. The Department of Homeland Security (DHS) has a lead role in implementing the act. GAO was asked to determine (1) the status of DHS‘s efforts to implement the act and (2) the challenges it faces in carrying out the act. What GAO Found: DHS has issued interim operating procedures and created a Program Office to administer the critical infrastructure protection program called for by the Critical Infrastructure Information Act. The interim procedures designate the responsibilities and authority of the Program Manager, and establish requirements related to accepting, protecting, sharing, and using critical infrastructure information as required by the act. The Program Office has begun to accept and safeguard critical infrastructure information submitted voluntarily by infrastructure owners and is sharing it with other DHS entities and, on a limited basis, with other government entities. For example, as of January 2006, the Program Office had received about 290 submissions of critical infrastructure information from various sectors. The Program Office also has initiated outreach efforts to publicize the program to the public and private sectors. In addition, it has trained approximately 750 potential users in DHS and other federal, state, and local government entities how to handle protected critical infrastructure information. This training is a prerequisite to being allowed to view the information. The Program Office has also trained at least 16 federal and state officials how to establish programs in their own entities so they can receive protected critical infrastructure information from DHS and then be authorized to store and share it. DHS faces challenges that impede the private sector‘s willingness to share sensitive information. Key challenges include: * defining specific government needs for critical infrastructure information, * determining how the information will be used, * assuring the private sector that the information will be protected and who will be authorized to have access to the information, and * demonstrating to critical infrastructure owners the benefits of sharing the information. If DHS were able to surmount these challenges, it and other government users may begin to overcome the lack of trust that critical infrastructure owners have in the government‘s ability to use and protect their sensitive information. What GAO Recommends: GAO is recommending that the Secretary of Homeland Security, among other things, better define DHS‘s and other federal agencies‘ critical infrastructure information needs, and explain how DHS and the other agencies will use the information received from the private sector. In oral comments on a draft of this report, DHS concurred with our findings and recommendations. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-06-383]. To view the full product, including the scope and methodology, click on the link above. For more information, contact Dave Powner at 202-512- 9286, Pownerd@gao.gov or Eileen Larence at 202-512-6510, Larencee@gao.gov. [End of Section] Contents: Letter: Results in Brief: Background: As Required by the CII Act, DHS Has Established Procedures, Organized a Program Office, and Received and Shared Information: DHS Faces Challenges in Implementing the CII Act: Conclusions: Recommendations for Executive Action: Agency Comments: Appendixes: Appendix I: Objectives, Scope, and Methodology: Appendix II: Procedures for Processing CII and Accrediting Entities: Processing CII: Accrediting Entities to Receive PCII: Appendix III: GAO Contacts and Staff Acknowledgments: Figures Figures: Figure 1: Efforts Related to CII Act Implementation: Figure 2: Diagram of the PCII Submission, Validation, and Sharing Process: Figure 3: Accreditation Program: Abbreviations: CII: critical infrastructure information: DHS: Department of Homeland Security: FEMA: Federal Emergency Management Agency: ISAO: Information Sharing and Analysis Organization: MOA: memorandum of agreement: NCSD: National Cyber Security Division: NIPP: National Infrastructure Protection Plan: NSA: National Security Agency: OMB: Office of Management and Budget: PCII: protected critical infrastructure information: PCIIMS: protected critical infrastructure information management system: Letter: April 17, 2006: The Honorable Tom Davis: Chairman, Committee on Government Reform: House of Representatives: The Honorable Todd Platts: Chairman, Subcommittee on Government Management, Finance, and Accountability: Committee on Government Reform House of Representatives: The Honorable Robert Bennett: United States Senate: Information about threats, vulnerabilities, and incidents is a crucial tool in fighting terrorism and protecting the nation's critical infrastructures--those cyber and physical assets essential to national security, national economic security, and national public health and safety. Because the private sector owns a large percentage of the nation's critical infrastructure--such as banking and financial institutions, telecommunications networks, and energy production and transmission facilities--public/private partnerships are crucial for successful critical infrastructure protection. The ability to share security-related information can unify the efforts of federal, state, and local governments as well as the private sector, as appropriate, to prevent and minimize terrorist attacks. We have reported previously on critical success factors and challenges in the information-sharing relationships between public and private entities for critical infrastructure protection.[Footnote 1] In addition, in January 2005, we designated information sharing to improve homeland security, including critical infrastructure protection, as a governmentwide high-risk area because, while receiving increased attention, the issue still poses significant challenges.[Footnote 2] The Homeland Security Act of 2002 created the Department of Homeland Security (DHS) and gave it wide-ranging responsibilities for critical infrastructure protection. Among other things, the Homeland Security Act required DHS to develop a comprehensive national plan for securing the nation's critical infrastructures; recommend measures to protect key infrastructures; and access, receive, analyze, and disseminate, as appropriate, information on terrorist threats to these assets. The Critical Infrastructure Information (CII) Act of 2002 was enacted into law as part of the Homeland Security Act. The CII Act required that DHS establish procedures for the receipt, care, and storage of CII voluntarily submitted to the government.[Footnote 3] The act was intended to encourage infrastructure owners to voluntarily share sensitive information, including vulnerability assessments and security methods, by providing rigorous protection mechanisms to ensure that the information would not be inappropriately released and used. The act authorized the federal government to use the information to issue advisories, alerts, and warnings regarding threats to critical infrastructures that the private sector and others could use to enhance protection measures. In response to your request, our objectives were to determine (1) the status of DHS's efforts to implement the CII Act and (2) the challenges it faces in carrying out the act. To determine the status of DHS's efforts, we analyzed the relevant laws and interim procedures[Footnote 4] that DHS issued in 2004 laying out the structure and processes for the program, and public comments on the interim procedures. We also reviewed related strategies, policies, procedures, controls, and tools used for the receipt, care, and storage of CII, and interviewed key DHS officials such as the Protected CII Program Manager. We compared what was expected under the CII Act with what had been accomplished by DHS. To determine the challenges in implementing the act, we analyzed and reviewed reports by private sector advisory councils and critical infrastructure protection experts and held interviews with representatives from DHS, federal agencies, state and local governments, private sector entities, and public interest groups. We also relied on prior GAO work on information sharing between federal and nonfederal entities. Appendix I provides additional details on our objectives, scope, and methodology. Our work was conducted from May 2005 to February 2006 in accordance with generally accepted government auditing standards. Results in Brief: DHS has issued interim operating procedures and created a Program Office to administer the critical infrastructure protection program called for by the CII Act. The interim procedures designate the responsibilities and authority of the Program Manager and establish requirements related to accepting, protecting, sharing, and using CII as required by the act. The Program Office has begun to accept and safeguard information submitted voluntarily by infrastructure owners and is sharing it with other DHS entities and, on a limited basis, with other government entities. The Program Office has been designating information that it determines to meet the act's requirements as "protected CII." For example, as of January 2006, the Program Office had received about 290 submissions of CII from various sectors. The Program Office has also initiated outreach efforts to publicize the program to the public and private sectors. In addition, it has trained approximately 750 potential users in DHS and other federal, state, and local government entities how to handle protected critical infrastructure information (PCII). This training is a prerequisite to being allowed to view the information. The Program Office has also trained at least 16 federal and state officials how to establish programs in their own entities so they can receive PCII from DHS and then be authorized to store and share it. DHS faces a number of challenges that impede the private sector's willingness to share sensitive information. These challenges include defining specific government needs for CII, determining how the information will be used, assuring the private sector that the information will be protected and who will be authorized to have access to it, and demonstrating to critical infrastructure owners the benefits of sharing the information. For example, DHS has not defined its specific needs nor has it determined how it will use information submitted under the program. In addition, DHS has not yet used the information to issue any advisories, alerts, or warnings. This lack of specificity and use has impeded the willingness of potential submitters to provide their sensitive information to DHS. If DHS were able to surmount these challenges, it and other government users may begin to overcome the lack of trust that critical infrastructure owners have in the government's ability to use and protect their sensitive information. To encourage more individuals, private sector entities, and state and local governments that own the critical infrastructure to submit information under the program so that more entities will have access to the information they may need to protect these assets, we are recommending that the Secretary of Homeland Security take a number of actions, including better defining the CII needs of the department and other federal agencies with critical infrastructure responsibilities, defining how DHS and the other agencies will use the information received from the private sector, and expanding efforts to use incentives to encourage more users. In oral comments on a draft of this report, an audit liaison official from the DHS Departmental GAO/OIG Liaison Office stated that DHS concurred with our findings and recommendations. DHS officials (as well as others who were cited in this report) also provided technical corrections that we have incorporated in this report as appropriate. Background: Information sharing is an important part of activities that enhance the security of our nation's cyber and physical public and private infrastructures. Federal law and policy related to critical infrastructure protection activities recognize the importance of sharing information about threats, vulnerabilities, and incidents and call for related initiatives. Federal agencies and the private sector have jointly attempted to implement these initiatives for a number of years. The CII Act provides a mechanism to encourage nonfederal entities to voluntarily share sensitive information pertaining to the security and vulnerabilities of their critical infrastructure assets with the federal government, and for that information to be shared with the appropriate federal, state, and local governments for the purposes of analyzing threats and vulnerabilities and issuing alerts and warnings. Federal Law and Policy Call for Improved Information Sharing: Since 2002, legislation, national strategies, and executive directives have specified actions to improve information sharing for homeland security: * The Homeland Security Act of 2002[Footnote 5] created DHS and assigned it critical infrastructure protection responsibilities, including (1) developing a comprehensive national plan for securing the key resources and critical infrastructures of the United States; (2) recommending measures to protect the key resources and critical infrastructures of the United States in coordination with other groups; (3) accessing, receiving, and analyzing law enforcement, intelligence, and other threat and incident information to identify and assess the nature and scope of terrorist threats; and (4) disseminating, as appropriate, information to assist in the deterrence, prevention, and preemption of or response to terrorist attacks. In addition, it included specific mechanisms intended to improve information sharing, including the CII Act (discussed in the next section) and the Homeland Security Information Sharing Act.[Footnote 6] * In 2002 and 2003, the White House's National Strategy for Homeland Security and its implementing strategies, the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets, also highlighted federal actions to promote two-way information-sharing mechanisms.[Footnote 7] * Issued in December 2003, Homeland Security Presidential Directive 7 established a national policy for federal departments and agencies to identify and prioritize U.S. critical infrastructure and key resources and to protect them from terrorist attack. It defined roles and responsibilities for DHS and agencies with critical infrastructure protection responsibilities to coordinate activities and to encourage the development of information sharing and analysis mechanisms and to support coordinating mechanisms. It required that DHS (1) produce a national infrastructure protection plan (NIPP) summarizing initiatives for sharing information, including providing threat warning data to state and local governments and the private sector, and (2) establish the appropriate systems, mechanisms, and procedures to share homeland security information with other federal departments and agencies, state and local governments, and the private sector in a timely manner. * In January 2006, the draft NIPP recognized the importance of an information-sharing network and policies and protocols for vetting and disseminating information among both government and private sector partners.[Footnote 8] It identified 17 critical infrastructure sectors, with sector-specific agencies for each--agriculture and food; public health and healthcare; drinking water and wastewater treatment systems; energy (except nuclear power facilities); banking and finance; national monuments and icons; defense industrial base; chemical; commercial facilities; dams; emergency services; commercial nuclear reactors, materials, and waste; information technology; telecommunications; postal and shipping; transportation systems; and government facilities. In addition, the draft NIPP stated that a final PCII rule is expected in 2006. It also required that, upon signing the letter of agreement with DHS regarding critical infrastructure protection responsibilities, sector-specific agencies would commit to protecting critical infrastructure data according to the Protected Critical Infrastructure Information Program and to sharing NIPP-related information as appropriate. However, at the time of our review, DHS was uncertain when the final NIPP would be released. CII Act Establishes Protection for Voluntarily Submitted Critical Infrastructure Information to Encourage Sharing: The CII Act was enacted into law as Title II, Subtitle B, of the Homeland Security Act. According to the act, CII is information that is related to the security of critical infrastructure or protected systems and that is not customarily in the public domain. Such information includes (1) actual, potential, or threatened interference with, attack on, or incapacitation of critical infrastructure or protected systems by either physical or computer-based attack; (2) the ability of any critical infrastructure or protected system to resist such interference, compromise, or incapacitation; or (3) any planned or past operational problem or solution regarding critical infrastructure or protected systems. To qualify for protections under the act, CII must be voluntarily[Footnote 9] submitted to DHS by an individual, entity, or information sharing and analysis organization.[Footnote 10] In addition, CII submissions must be accompanied by a written or oral "Express Statement" that states the information is voluntarily submitted in expectation that it will be protected from disclosure under the act. Voluntary submissions under the act cannot be an alternative for compliance with other laws, such as the requirement to submit data on a facility's emissions under the Clean Air Act. The CII Act does not apply to information obtained independently through such other laws or regulations. Under the CII Act, voluntarily shared CII that meets the above requirements receives protections that include: * exemption from public disclosure under the Freedom of Information Act;[Footnote 11] * exemption from disclosure under state and local laws requiring release of information or records; and: * restrictions on sharing and use, such as restricting state officials from sharing with other state officials or using the information in civil actions. The CII Act also imposes penalties for any federal employee who knowingly and inappropriately discloses CII submissions. The possible penalties include fines, imprisonment for not more than 1 year, or both, and the loss of office or employment. Key responsibilities assigned to DHS under the act are as follows: 1. A requirement for the Secretary of DHS to establish, in consultation with appropriate representatives of the National Security Council and the Office of Science and Technology Policy, uniform procedures for the receipt, care, and storage of voluntary CII submissions to the government. The act also specifies that the procedures include mechanisms for: * acknowledging the receipt of the voluntarily submitted CII; * maintaining the identification of this information as voluntarily submitted to the government under the act; * caring for and storing such information; and: * protecting and maintaining the confidentiality of the identity of the person or entity that submitted information, or the information itself if it is proprietary, is business-sensitive, relates specifically to the submitting person or entity, or is otherwise not appropriately in the public domain. 2. An authorization for either the President or the Secretary of Homeland Security to designate a critical infrastructure protection program within DHS to receive CII. 3. An authorization for DHS to share the information within the federal government and with state and local governments, and that the federal government may use the information to issue advisories, alerts, and warnings using PCII as long as the identity of the source of the information and proprietary, business-sensitive, or information related specifically to a submitting entity is protected from disclosure. As Required by the CII Act, DHS Has Established Procedures, Organized a Program Office, and Received and Shared Information: In February 2004, DHS issued an interim rule that established procedures, as required by the CII Act, and created a Program Office to administer the program. The office has developed and maintained processes for accepting, protecting, and sharing CII; received about 290 submissions from critical infrastructure owners; begun some outreach with potential submitters to increase information flow; shared PCII on a limited basis with users in DHS and several other federal entities; and trained approximately 750 potential users at DHS, other federal, state, and local government entities and, at least 16 state and local officials how to establish their own programs. DHS Has Established Procedures as Required by the CII Act: DHS has issued procedures for the receipt, care, and storage of CII, as required by the CII Act. In doing so, DHS first issued a proposed rule on April 15, 2003, and solicited public comment on its provisions. After consideration of the comments received on the proposed rule, DHS issued an interim rule that was effective at the time of release on February 20, 2004.[Footnote 12] In the interim rule, DHS invited additional comments, stating that it would consider issuing supplemental regulations. DHS received 32 sets of comments on the interim rule from a wide variety of organizations and individuals that raised concerns and offered suggestions and recommendations about various aspects of the program. Currently, the Program Office is operating under the interim rule. The interim rule includes mechanisms specified by the act regarding: * acknowledging to the submitter that the Program Office has received the voluntarily submitted CII; * maintaining the identification of this information as voluntarily submitted to the government under the act; * receiving, handling, storing, and properly marking information as PCII, including reviewing submitted information, determining that it meets the requirements for protection (a process known as validation), and protecting it; * safeguarding and maintaining the confidentiality of the submitter of the information, but permitting the sharing of the information, as determined by the Program Manager; and: * protecting and maintaining the confidentiality of the information, so as to permit (1) the sharing of it within the federal government and with state and local governments and (2) the issuance of notices and warnings related to the protection of critical infrastructure and protected systems, in such a manner as to protect from public disclosure the identity of the submitting person or entity or information that is proprietary, is business-sensitive, relates specifically to the submitting person or entity, and is otherwise not appropriately in the public domain. To accomplish these requirements, the interim rule established authorities regarding the sharing of protected information with federal, state, and local governments. Under the rule, the Program Manager has the authority to decide what protected information to provide to trained federal, state, or local government employees for purposes that include analysis, warning, asset recovery, reconstitution, and studies of the interdependence of critical infrastructure sectors. For example, the information might be provided if it is needed to study how the banking and finance sector depends on the security of the telecommunications sector so that backup systems can be developed in advance of an incident. In addition, the interim rule states that the Program Manager can share information for other purposes, including the identification, analysis, prevention, preemption, or disruption of terrorist threats to the homeland. Under the rule, the Program Manager is responsible for administering the program, including (1) reviewing submissions to determine if they meet the requirements for protection--referred to as validation, (2) promulgating directives to operate the program, and (3) preparing training materials as appropriate for the proper treatment of PCII. The Program Manager is also required to establish procedures to ensure that any federal, state, or local entity that wants to use the information appoints one or more employees fully familiar with the procedures as PCII officers. These officers are required to oversee the handling, use, secure sharing, and storage of the information within their respective entity; prevent unauthorized access to the information; and coordinate with the Program Manager. DHS Has Organized a Program Office, as Authorized by the CII Act: In February 2004, DHS established a Program Office to receive CII. During the course of our review, DHS reorganized and this office is now under the Preparedness Directorate, Office of Infrastructure Protection, and Infrastructure Partnership Division. The Program Office is led by the Program Manager and includes a combination of full-time federal and contractor employees. It is organized into four branches that, among other things, (1) develop and maintain applicable processes for information systems and networks, (2) receive submissions, (3) communicate with submitters about the status of their submission, (4) train users and entities that want to establish their own programs for handling the information, and (5) share PCII. At the Program Office's establishment, it published an initial, internal procedures manual describing the activities to implement the provisions of the act and the interim rule and providing guidance for administration of the program. The manual describes the process that (1) the submitters from the private sector and others are to use to send the information to DHS and (2) the Program Office is to use to validate that submitted CII meets the act's requirements for protection. The manual also describes the process for sharing PCII with authorized users within DHS, other federal entities, and state and local governments. The Program Office Has Received and Validated Submissions and Initiated Efforts to Increase Submissions: The CII Act specifies that DHS receive all submissions of CII. Once received by the Program Office, the CII submission enters a validation process for determining whether it qualifies for protection under the act. If the qualifications are met, the submission is marked PCII and is to be provided the protections in the act. If the qualifications are not met, the submission is rejected and destroyed. Appendix II discusses these processes in more detail. As of January 2006, the Program Office had received 289 submissions, of which 266 were validated as PCII, 8 were in the process of being validated, 14 were rejected, and 1 was withdrawn. The validated submissions include risk and vulnerability assessments about individual infrastructure assets from a variety of critical infrastructure sectors, such as the energy, agriculture and food, banking and finance, and chemical sectors. In addition, entities have submitted data on their operations and on security methods used to protect their assets. According to program officials, submissions were rejected or withdrawn generally because they did not meet the program's requirements, such as not being submitted with an Express Statement or not being CII as defined in the law, even after the Program Office contacted the submitters for additional information to try to resolve this problem. To manage the submissions, the Program Office developed, as directed in the interim rule, and is using the Protected Critical Infrastructure Information Management System (PCIIMS)--an electronic database that tracks the receipt and storage of CII submissions, according to program officials. For each submission, the system allows reviewing officials to record the date of receipt, name of the submitter, description of the information received, manner of acknowledgment, tracking number, and validation status. Once a submission is validated as PCII, the information is placed on a secured electronic storage device within the Program Office. Staff in the Program Office reported that they are also working on an updated version of the management system that is expected to streamline and automate the validation process, reducing the time needed to determine if submissions qualify for protection. To increase submissions, the Program Office has initiated outreach efforts to publicize the PCII program to the public and private sectors. As part of its outreach efforts, the Program Office launched a public Web site in March 2004, presenting program facts and answers to frequently asked questions. In addition, the Program Office prepared over 2,300 fact sheets and about 4,000 brochures that it distributed to public and private stakeholders. It also activated e-mail and telephone help lines to respond to inquiries or comments. To promote the PCII program to private industry, the Program Office has discussed the program in over 30 articles in trade publications, briefed infrastructure sector representatives and participated in industry conferences and seminars, and provided presentation kits that DHS analysts use to explain the program to potential submitters. In addition, the Program Office implemented an e-submissions process in August 2005 to make submissions easier. According to the Program Office, the benefits to e-submissions include increased transaction speed, improved record-keeping efficiency, increased participation, and improved security. Submitted files are encrypted in transit to prevent access by anyone except Program Office staff and are stored in a stand- alone database maintained at a secure location. The Program Office is also collaborating with other information sharing and collection efforts to make submission of CII easier. For example, the Program Office gave DHS's National Cyber Security Division (NCSD) limited authority to receive recurring submissions. At the time of our review, NCSD had not used the authority; however, according to NCSD officials, the validation authority is a positive step because it provides a private sector entity with an additional method to share information with them. In addition, the Center for Food Safety and Applied Nutrition within the Department of Health and Human Service's Food and Drug Administration, is partnering with the Program Office. The center plans to ask a number of dairy facilities to share CII on the safety of the nation's milk supply. The information will be submitted to the Program Office to be validated and will then be made available to the Food and Drug Administration for safety analyses. In New York, the Risk Analysis and Management for Critical Asset Protection program--developed in a public/private sector partnership for DHS by the American Society of Mechanical Engineers as a methodology for performing risk assessments--is offering a method to electronically submit CII to the Program Office for protection. Using the program, infrastructure asset owners will be able to submit results about the security of their facilities to DHS. The Program Office Has Begun to Share PCII, Trained about 750 Users, and Established a Mechanism to Initiate PCII Programs at Other Entities: As the CII Act authorizes, DHS has begun to share PCII with users. For example, according to NCSD officials, the Program Office received information that it later shared with them. They said that this information was important to investigating a cyber-related incident, but it would not have been provided by the infrastructure owners without CII Act protections. In addition, the Federal Emergency Management Agency (FEMA) received one piece of information from the Program Office. Agency officials said they learned about the information while in discussions with officials from a state who told them that they would not share the information unless it could be protected. On the basis of this requirement, FEMA requested the state to submit the information to the Program Office and had FEMA officials trained in the use and handling of PCII. According to a FEMA official, this information led to the development of generic best practices related to dam security that were presented at a workshop. Also, a few other federal agencies have used the information. For example, in February 2005, at the request of NCSD, the National Security Agency (NSA) became the first non-DHS federal agency to receive PCII. This information was used to assist in the research of a cyber-related incident and did not result in any public alerts. In addition, officials from the Nuclear Regulatory Commission reported that they had reviewed one PCII report. Prior to allowing federal, state, or local government users access to the information, the Program Office trains them to ensure that users have a clear understanding of how to handle and safeguard PCII and how to access the information on an as-needed basis, according to program officials. The Program Office began user training sessions in February 2004 and established a Web-based training program in November 2004. At the time of our review, approximately 650 individuals from within DHS, including contract personnel, had been trained, along with 110 individuals from other federal, state, and local agencies. The Program Office also accredits federal, state, and local agency PCII programs. Only accredited entities can receive and store this information. Accreditation ensures that an entity is qualified to manage its own program for handling, using, sharing, and safeguarding PCII, including applicable databases and systems. After determining its need for PCII, an entity must complete the following steps to earn accreditation: (1) appoint a program officer and at least one deputy program officer, both of whom must complete a 3-day course about the use and handling of PCII and pass a certification examination; (2) provide a senior official with the authority to represent the entity and enter into a memorandum of agreement (MOA) with the Program Office; and (3) pass an accreditation review by the Program Office. Since July 2005, when the PCII Accreditation Program began, the Program Office has trained at least 16 federal and state officials who serve or will serve as program officers or deputy program officers for their respective agencies, according to program officials. Not all of the federal and state entities represented by the 16 officers and deputies have completed the accreditation process. According to program officials, as of January 2006, two entities were fully accredited-- Maryland and the Food and Drug Administration's Center for Food Safety and Applied Nutrition. In addition, Arizona, California, and Massachusetts were in the process of being accredited, and other federal entities and states had initiated discussions with the Program Office about becoming accredited. Regarding additional federal agencies, the Nuclear Regulatory Commission is participating in the accreditation process. In addition, according to the Department of Agriculture's Director of Homeland Security and information technology staff, the Department of Agriculture will establish a PCII program, which will require them to become accredited. (See app. II for a more detailed description of the accreditation process.) According to the Program Manager, the Program Office is most interested in accrediting entities that have lead roles in critical infrastructure protection--such as the Departments of Agriculture, Energy, and the Treasury. However, the Program Manager noted that accreditation is voluntary and some of these agencies may not be interested. In addition, according to the Program Manager, the Program Office will continue to accredit other entities, such as states and other federal agencies, that express an interest in PCII. Figure 1 summarizes the efforts related to implementation of the CII Act. Figure 1: Efforts Related to CII Act Implementation: [See PDF for image] [End of figure] DHS Faces Challenges in Implementing the CII Act: DHS faces challenges in implementing the CII Act through the PCII program. These challenges include better defining specific government needs for CII, determining how the information will be used, assuring the private sector that the information will be protected and who will be authorized to have access to it, and demonstrating to critical infrastructure owners the benefits of sharing the information. By overcoming these challenges, DHS and other users may make strides toward reducing critical infrastructure owners' lack of trust in the government's ability to use and protect their sensitive information. Defining specific government needs: The act broadly defines what CII can be voluntarily submitted to the government for protection, and the interim rule reiterates the same broad definitions for use by the Program Office in its implementation of the act. However, DHS has not defined the specific information--such as industry-specific vulnerabilities and interdependencies--needed under the program, nor has it comprehensively worked with other federal agencies with critical infrastructure responsibilities to find out what they need. The lack of specificity on the part of DHS in clearly communicating to the private sector what information is needed has impeded the willingness of potential submitters to provide their sensitive information to DHS. The Program Manager and other program officials said that until the potential users of PCII within DHS and other federal agencies with critical infrastructure responsibilities have fully identified their information needs, the private sector will not know what to submit. An official representing the chemical infrastructure sector agreed that infrastructure owners need to know what kind of information is required so they can provide meaningful submissions. In October 2005, the National Infrastructure Advisory Council also made the point that when requesting information, the government must clarify why they need the information. In addition, defining the needs for information requiring protection is what drives potential users to participate in the program. For example, Maryland and California initiated the accreditation process because, according to responsible officials, they had defined specific information needs that required protection. Determining how information will be used: The act broadly defines how PCII may be shared with other government entities and used to issue advisories, alerts, and warnings. The interim rule provides procedures on how information will be shared with other entities for the same broad uses. However, potential users within DHS have not specified how they will use the information. In addition, DHS has not yet used the information to issue any advisories, alerts, or warnings, according to DHS officials. An Infrastructure Partnership Division official also said that until more information is submitted under the program, it will be difficult for DHS to determine how it will use the information. In October 2005, the National Infrastructure Advisory Council stated that the private sector might be more willing to share information if "when requesting information, the government clarified how they will use it." In addition, an official representing the chemical infrastructure sector agreed that entities would be more likely to submit CII if they knew how it would be used. We have also reported in the past that uncertainty about how the information would be used and who it would be shared with posed a barrier to critical infrastructure sectors sharing information with the government.[Footnote 13] The Program Office faces the challenge of building a demand for PCII among potential users of the information by demonstrating how it will help users achieve their critical infrastructure missions. Without identifying a specific use for PCII, entities are often reluctant to commit the necessary effort toward accreditation. For example, according to an NSA official who used PCII once, while there was value to having the information his office had already used, its use did not impact his office's final conclusions on the investigation they were conducting or result in any analytical or warning products being issued. Because the use for the information was considered an isolated case, NSA does not plan to establish an accredited PCII program. In addition, FEMA officials who also used PCII once, noted that PCII they had received was valuable in developing security-related best practices that FEMA presented at a workshop. However, they have no current plans to establish a formally accredited program because they are uncertain how they will use the information in the future. Also, as previously discussed, user participation in the PCII program is completely voluntary, even for agencies that have particular responsibilities for a critical infrastructure sector. Nonetheless, the Program Office is attempting to train enough users and help other government entities establish programs so that there is a critical mass of users to help make the program viable. Other DHS officials stated that their own use of PCII had been purely incidental. For example, DHS's Office of Intelligence and Analysis has not found PCII to be essential for its operations largely because its emphasis is on analyzing and responding to immediate threats, while PCII is information relating to vulnerabilities. At this early stage of the program's maturity, an official said PCII is not viewed by the Intelligence and Analysis analysts as providing better or more relevant information than that which they receive on a daily basis from the intelligence community and the many other sources used to identify threats. On the other hand, the Deputy Director of the Infrastructure Partnership Division stated that analysts within the division could find PCII very useful to their mission. In addition, DHS officials believe that as more PCII becomes available, they will use it in their new Homeland Infrastructure Threat and Risk Analysis Center--a national center for the integration, analysis, and sharing of information related to the threat of terrorist attacks on critical infrastructure. Assuring the private sector that the information will be protected and who will be authorized to have access to it: To implement the protection requirements in the act, the interim rule establishes procedures for marking, safeguarding, and sharing the information. In addition, the Program Office has established (1) the training program to equip authorized users with knowledge of how to safeguard the information and (2) the PCII Accreditation Program to ensure that other organizations have processes and policies to promote the safeguarding of the information. However, potential submitters often continue to be reluctant to provide their sensitive information because they are not certain that their information will be fully protected. They fear that the information could be inadequately protected, used for future legal or regulatory action, or inadvertently released. For example, as follows, specific provisions in the law and rule impact perceptions that the submitted information will not be protected, according to DHS, other federal agencies, and the private sector: * Originator control: Under the rule, the Program Manager has the authority to decide what PCII to provide to federal, state, or local government employees for approved purposes; the originator of the critical information cannot control how the submission is shared at the federal level. According to an official representing a multisector organization, infrastructure sector entities are hesitant to share information because of its sensitivity, without having control over who has access to it. According to the Program Manager, the Program Office is considering a method that they believe would meet the act's intent- -that is, submitters would identify at the time of submission what users they believe should or should not be able to receive the information. Under this method, the Program Office would contact the submitter if a need arose for another entity to use the information. According to DHS, this method has been used for some PCII submissions. However, this method has not yet been instituted. * Direct submissions: To receive protection, all submissions must be received by DHS directly from the original submitter. For example, the Department of Defense cannot receive information from members of the defense industrial base and protect it as PCII or forward it to DHS to be labeled and protected. However, in commenting on the interim rule, one federal agency, as well as four infrastructure sector organizations, expressed interest in being able to directly receive or submit this information because of existing relationships. For example, an official representing a multisector organization stated that private and public critical infrastructure entities have already built relationships with each other over many years and have sufficient trust to share information with each other. According to the Program Manager, the issue of direct submission will have to be addressed at some point; however, at this early stage in the program, it is not worth the risk of having PCII inappropriately released by an agency, because any mistake would undermine the entire effort to build trust. * Legal precedents: According to the Program Manager, there have been no court cases addressing the CII Act. According to the Program Office and the Homeland Security Advisory Council report, until the courts uphold the protections, the private sector will frequently be hesitant to use the program. In addition, potential submitters of CII have been hesitant to provide their sensitive information because they are not certain how information would be protected under the final rule. As of January 2006, DHS had not issued a final rule, as planned. DHS had established April 2005, June 2005, and August 2005 as deadlines for the rule to be issued, but it missed these time frames. The Program Manager and other program officials reported that the draft final rule had been undergoing legal review within DHS since the summer of 2005 and would go to the Office of Management and Budget (OMB) for interagency review before becoming final. However, they could not predict when this would occur and did not have any target deadlines established. In addition, the Program Manager and other program officials were uncertain what changes, if any, would be made to the rule during legal and interagency review. We have reported in the past that the uncertainty about how information would be protected by federal agencies was a barrier to critical infrastructure sectors sharing information with the federal government. For example, in May 2005, we reported that critical infrastructure entities did not openly share cybersecurity information with DHS, in large part, because they were concerned that the potential release of sensitive information could increase the threat to the respective entity.[Footnote 14] Also, in April 2004, we testified that the reluctance by information-sharing organizations to share information had focused on concerns over potential government release of that information, among other things.[Footnote 15] In addition, the Program Office has been challenged to implement a program that will provide protection to CII consistently across federal, state, and local government entities while adhering to the scope of the act and the interim rule. Some of the challenges that DHS, states, and private sector entities identified were as follows: * Sharing PCII with and among the state and local governments: Under the act, state officials are not allowed to directly share PCII with officials in other states, unless the Program Office gets written consent from the person or entity submitting the information. This is a challenge that limits sharing when state officials meet and when a state official knows that information could be useful to another state official to address a vulnerability or threat. The Program Office is considering resolving this issue by having submitters grant written approval for this type of sharing when they submit CII--similar to how the issue of originator control could be handled. * Penalties for inappropriate disclosure are limited to federal employees: The act imposes criminal and administrative penalties for federal employees that disclose PCII; however, those penalties do not apply to contractors or state and local officials, who could face significantly less penalty for disclosure. The variation of penalties could impact the level of protection. For example, contractors are not subject to criminal penalties and contract termination serves as a deterrent to mishandling the information. For states, the Program Office has suggested that these issues can be resolved through a MOA between the state entity and the Program Office that would stipulate state laws are to be used to prosecute violators. According to the Program Office, this arrangement was made under the memorandum signed with Maryland and California. Demonstrating benefits to critical infrastructure owners of sharing the information: DHS and other interested federal agencies have not clearly demonstrated to the potential CII submitters the benefit of sharing their sensitive information; therefore, potential submitters may not be willing to take the risk of inappropriate use and release. Federal, state, and private sector officials stated that some of the benefits that potential submitters expect to receive include improved reaction by first responders; improved intelligence and strategic analyses of threat information; and improved performance of services, such as vulnerability analyses for small entities unable to afford their own efforts. However, at the time of our review, DHS's emphasis was on analyzing and responding to immediate threats, rather than on combining threat and vulnerability information into strategic analyses. Our prior work has shown that the federal government lacks the analytical processes that would provide the sorts of benefits sought by infrastructure owners.[Footnote 16] We reported that further efforts are needed to address the critical challenges of improving the federal government's capabilities to analyze incident, threat, and vulnerability information obtained from numerous sources. We also reported that improvements are needed in the federal sharing of appropriate, timely, and useful warnings and other information concerning cyber and physical threats to federal entities, state and local governments, and the private sector. Our prior work has also identified demonstrating benefits as a challenge to the federal government. In April 2004, we testified that in white papers, the Information Sharing and Analysis Center Council emphasized that perhaps the greatest barriers to information sharing stem from practical and business considerations, and that the benefits of sharing information are often difficult to discern, while the risks and costs of sharing are direct and foreseeable.[Footnote 17] In addition, in May 2005, we reported that even when organizations within infrastructure sectors shared information with DHS, the entities did not consistently receive useful information in return.[Footnote 18] Overcoming these challenges could help to encourage more submissions, which in turn would provide the opportunity for the government to provide benefits back to the private sector submitters, thereby creating a virtuous cycle that builds on itself until a critical mass of users and submitters is reached and the program becomes self- sustaining. This would help to address the lack of trust in the government that the private sector has consistently identified as a reason to limit information sharing. The Program Manager and other DHS officials acknowledged the need to establish trusted relationships between the CII submitters and the information users in federal, state, and local governments. Conclusions: DHS has made progress in implementing the CII Act by establishing procedures and creating a Program Office to administer the program. However, DHS is still in the early stages of its efforts to expand the submission and use of PCII and will have to overcome major challenges for its program to be viable. This effort includes issuing a final rule, as DHS has planned to do, so that potential submitters will know how the program will operate. Further, although DHS has a lead responsibility for federal critical infrastructure protection efforts, its planning efforts to date have not articulated what specific information it and other federal agencies with critical infrastructure responsibilities need and how the information will be used. Without this knowledge, the private sector will continue to be hesitant to provide information to DHS. The Program Office is aware of changes it could make to the program that might increase submissions of CII and provide incentives to users, such as providing clarity regarding how the information will be protected, establishing some level of originator control, allowing direct submissions, and providing a mechanism for state-to-state sharing. However, to date, these options and initiatives have not been aggressively pursued. If DHS were able to surmount these challenges, it and other government users may begin to overcome the lack of trust critical infrastructure owners have in the government's ability to use and protect their sensitive information. Recommendations for Executive Action: In order for DHS to address the challenges to the PCII program-- defining specific needs, determining how and who uses the information, assuring submitters that the information will be protected, and demonstrating benefits to critical infrastructure owners--we recommend that the Secretary of Homeland Security take the following four actions: * In the short term, establish a specific deadline in the near future for releasing the final rule to OMB and for interagency review so that potential submitters have more assurance about how their sensitive information will be protected. * Concurrently, consistent with other infrastructure planning efforts such as the NIPP, * define and communicate to the private sector what CII DHS and federal entities need to fulfill their critical infrastructure responsibilities and how federal, state, and local entities are expected to use the information submitted under the program; * determine whether creating mechanisms, such as providing originator control and direct submissions to federal agencies other than DHS, would increase submissions; and: * expand efforts to use incentives to encourage more users, such as mechanisms for state-to-state sharing. We are not making new recommendations regarding improving the effectiveness of DHS's information-sharing efforts at this time because our previous recommendations, including performance of a national threat assessment and establishment of a strategic analysis capability for computer-based threats, have not yet been fully implemented. Agency Comments: We received oral comments on a draft of this report. An audit liaison official from the DHS Departmental GAO/OIG Liaison Office stated that DHS concurred with our findings and recommendations, based on the comments received from officials from the Preparedness Directorate, including the Program Office; the Transportation Security Administration; DHS's General Counsel; and others. In addition, the DHS Departmental GAO/OIG Liaison Office provided technical corrections that it received from the Preparedness Directorate, including the Program Office; DHS's General Counsel; and others. We also received technical corrections from other officials who were cited in our report. We have incorporated the DHS and other technical corrections in this report as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the date of this letter. At that time, we will send copies of this report to interested congressional committees, the Secretary of Homeland Security, and other interested parties. We will also make copies available to others upon request. In addition, this report will be available at no charge on the GAO Web site at [Hyperlink, http://www.gao.gov]. If you or your staffs have any questions concerning this report, please contact either Dave Powner at 202-512-9286 or pownerd@gao.gov, or Eileen Larence at 202-512-6510 or larencee@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Other GAO staff who contributed to this report are listed in appendix III. Signed by: David A. Powner: Director, Information Technology Management Issues: Signed by: Eileen Regen Larence: Director, Homeland Security and Justice Issues: [End of section] Appendix I: Objectives, Scope, and Methodology: In response to your request that we review the implementation of the Critical Infrastructure Information (CII) Act of 2002, we determined (1) the status of the Department of Homeland Security's (DHS) implementation efforts and (2) the challenges DHS faces in implementing the act. To assess the current state of CII Act implementation, we analyzed the CII Act and the Procedures for Handling Critical Infrastructure Information: Interim Rule, the procedures that DHS issued in February 2004, and related public comments.[Footnote 19] In order to understand DHS's efforts to establish a Protected Critical Infrastructure Information (PCII) Program to accept and protect CII, we gathered and analyzed relevant strategies, policies, and procedures, including the PCII Information Program Management Directive (draft); the PCII Program Procedures Manual, Configuration Management Plan, Mission Needs Statement, Concept of Operations for Management (draft), and Systems Risk Assessment. We held interviews with key officials from DHS's Preparedness Directorate and Intelligence and Analysis Office (formerly, the Information Analysis and Infrastructure Protection Directorate, which included the Disclosure Office, the Infrastructure Coordination Division, and the Information Analysis Division). We observed controls and tools used for the receipt, care, and storage of PCII, as outlined in the Program Office's manuals. In addition, we interviewed officials from the Program Office, including the Program Manager and representatives from each of the office's four branches (Management, Communications, Operations, and Systems). We compared what was expected under the CII Act with what had been accomplished by DHS. Further, we interviewed key officials from DHS units in the Federal Emergency Management Agency and the Transportation Security Administration. We also held interviews with representatives from entities that could potentially submit CII, including infrastructure sector entities and public interest groups, such as the Partnership for Critical Infrastructure Security, the American Chemistry Council, the American Petroleum Institute, and the Edison Electric Institute. We also held interviews with representatives from entities that had used PCII, including federal, state, and local organizations, such as the Department of Defense, National Security Agency, Department of Agriculture, Federal Reserve System, Nuclear Regulatory Commission, Maryland Emergency Management Agency, and California Office of Homeland Security. To determine the challenges to implementing the CII Act, we analyzed reports by private sector advisory councils and critical infrastructure protection experts that have identified related challenges. We also interviewed officials knowledgeable about public/private information sharing and about the act from DHS, federal agencies, state and local governments, private sector entities, and public interest groups. In addition, we relied on prior GAO work on information sharing between federal and nonfederal entities. Our work was conducted from May 2005 to February 2006 in accordance with generally accepted government auditing standards. [End of section] Appendix II: Procedures for Processing CII and Accrediting Entities: Processing CII: The CII Act requires DHS to establish uniform procedures for the receipt, care, and storage of CII that is voluntarily submitted to DHS. In February 2004, the Program Office implemented a process to review CII and began accepting voluntarily submitted information to determine if it qualifies for protection. For this explanation, the process is divided into three steps: submission, validation, and sharing. Figure 2 summarizes the Program Office's process. Figure 2: Diagram of the PCII Submission, Validation, and Sharing Process: [See PDF for image] [End of figure] Step 1: Submission: The CII Act requires all submissions of CII to be submitted to DHS for protection under the act. Submission to DHS means any voluntary transmittal of CII to the DHS PCII Program Office. CII that is not submitted to DHS does not qualify for protection. Based on the Program Office's process, the submission requirements include the following: * Sources expected to submit CII to DHS for consideration for protection, or validation, are those with direct knowledge about the security of a critical infrastructure element, and include, but are not limited to, Information Sharing and Analysis Organizations (ISAO),[Footnote 20] private sector entities, state and local governments, and foreign governments and companies. * Federal agencies may not independently submit private sector information for PCII protection, unless they are working together in partnership with a private sector entity or the agency is part of an ISAO. * Submissions must be accompanied by an Express Statement and a Certification Statement before they can be validated as PCII. According to the CII Act, only those submissions that are accompanied by an Express Statement will have the presumption of protection under the act. * An Express Statement indicates that the information is voluntarily submitted to the federal government with the expectation that it will be protected under the CII Act. A Certification Statement states that the information is voluntarily submitted, is required or is not required to be submitted to the federal government, and is not customarily in the public domain. * The Program Office accepts submissions electronically through a secure Internet portal or through physical materials, such as floppy disks, video tapes, audio tapes, facsimiles, or letters. Step 2: Validation: Validation is the process for determining whether a submission with an Express Statement qualifies for protection under the CII Act and, therefore, will be protected as provided by the act. The Program Manager will establish time frames for completing the validation process to ensure effective, efficient, and timely validation determinations. On the basis of a review of the information submitted, the Program Manager or designated representative makes an initial determination regarding whether the information qualifies for protection. Program Office procedures require that submissions be acknowledged and tracked throughout the validation process. If the submission is received with both an Express Statement and a Certification Statement, it will be processed without delay. Information received without an Express Statement will be destroyed immediately, and the submitter will be asked to resubmit. Submissions received with an Express Statement, but without a complete Certification Statement, will be presumed to be CII and will be processed. However, the submitter will be contacted to provide a Certification Statement. When information is submitted with an Express Statement, the Protected Critical Infrastructure Information Management System (PCIIMS) will assign it a unique tracking number, which will be used in all future communications with the submitter and for recording the current status of submitted information. The Program Office must acknowledge receipt of submitted information in writing within 30 calendar days of its receipt. Acknowledgment of receipt means only that the information has been received by the Program Office and is accompanied by an Express Statement. If the submission is accompanied by both an Express Statement and a Certification Statement, and the Program Office determines that the information meets the definition of CII, then: * the information will be validated as PCII; * the PCIIMS will be updated to indicate that the information qualifies for protection under the CII Act; * the submitter will be notified of the decision, and: * the validated PCII will be made available to authorized users. If the initial review determines that the information submitted does not meet the requirements for protection under the CII Act, the Program Office must: * inform the submitter that the initial determination is that the submission does not meet the requirements to be PCII; * request the submitter to provide a complete Certification Statement and/or provide additional information within 30 days of the submitter's receipt of the Program Office's request; * give the submitter the opportunity to withdraw the submission before reevaluation; and: * consider any additional information provided in making the final validation determination; whenever possible, the final review will be performed by the same staff member who performed the initial review. Newly validated PCII is added to the PCII Submissions Catalog, which is a list of all available PCII information prepared in a non-PCII format so that it can be easily shared. For each submission, the PCII Submissions Catalog contains its tracking number, date of submission, description of submission, and number of pages. Step 3: Sharing: A copy of the PCII Submission Catalog is provided to all PCII officers for distribution at their discretion to users and analysts for their review. If after reviewing the catalog the users want to request PCII, they may do so through their entity's PCII officer. The Program Office is authorized to provide access to PCII when it determines that this access supports a lawful and authorized government purpose as specified in the CII Act. The Program Office may provide PCII to federal government departments and agencies and to state and local government entities that have executed the standard memorandum of agreement (MOA) with the Program Manager and have met the requirements of the PCII Accreditation Program. Before accessing and storing PCII, organizations or entities must be accredited and have a PCII officer to supervise strict compliance with procedures. Before individual users can access PCII, they must be trained in the proper use, handling, and safeguarding of PCII. Authorized users can request access to PCII on a need-to-know basis. However, users outside of DHS do not have the authority to store PCII until their agency is accredited. In cases where the user is from an entity that is not accredited, the Program Office and the user make arrangements for the user to access the information at the Program Office. If access is granted, the information is downloaded from the Program Office's secure storage to a paper copy or compact disk. It is then either hand delivered to the user or loaded to another secure system and accessed by the user through a controlled folder on the secure system. The Program Office is responsible for tracking PCII to the state or local government entity to which it was initially provided. The officially designated PCII officer of each government entity is responsible for sharing and tracking PCII under their control. Federal government entities may share PCII in their possession provided they verify that the recipient entity has been accredited by the Program Office to receive PCII and will maintain a tracking mechanism that provides a record of what PCII they provided to whom and when they provided it. State and local governments receiving PCII are not authorized to share PCII with entities external to their governmental entity, unless they obtain the express approval of Program Manager and the explicit written consent of the submitter. Authorized recipients may use PCII for: * securing the critical infrastructure and protected systems; * analysis of potential threats and vulnerabilities; * warning of imminent attack; * studying the interdependency between critical infrastructure sectors; * recovery and reconstitution of damaged infrastructures; or: * another information purpose, including, without limitation, the identification, analysis, prevention, preemption, and/or disruption of terrorist threats to our homeland. Accrediting Entities to Receive PCII: Before federal, state, or local government entities can access and store PCII, they must have executed a MOA with the Program Office and have met the requirements of the PCII Accreditation Program. At the time of our review, the Program Office was updating its February 2004 procedures manual with guidance on its accreditation process. The accreditation process was established to ensure that each entity and user has a clear understanding of how to initiate and manage their entities' program and adequate policies, procedures, secure systems, and databases for handling, using, sharing, and safeguarding PCII. The Program Office's Operations Branch is responsible for managing the process, and the Communications Branch is responsible for outreach and training activities in support of the process. Figure 3 outlines the key steps in the accreditation process. Figure 3: Accreditation Program: [See PDF for image] [End of figure] The following are key steps in the accreditation process. * After a government entity or other accreditation candidate determines its need for PCII, the entity requests an application from the Program Office and nominates a PCII officer and deputy. Any nonfederal government employee who is nominated to be a PCII officer or deputy must sign a nondisclosure agreement concerning PCII. * The Program Office appoints the nominated PCII officer and deputy for the candidate entity after they complete a 3-day training course and pass a certification examination. * A senior official with the authority to represent the candidate entity enters into a MOA with DHS. The MOA (1) constitutes an entitywide obligation and an executive-level commitment to achieving and maintaining PCII accreditation and (2) sets forth the responsibilities and obligations of the PCII officer and deputy as well as the requirements for handling, using, sharing, and safeguarding PCII throughout the federal, state, or local entity. * The PCII officer completes a self-assessment of how well the entity's policies, procedures, and oversight measures comply with the minimum requirements and procedures set forth in the accreditation guide. The Program Office reviews the self-assessment and works with the accreditation candidate's PCII officer to address any needs for further development activities. * Once the PCII officer has submitted a self-assessment and addresses any immediate issue, a site assessment team visits the offices and facilities of the accreditation candidate to determine its ability to comply with the requirements set forth in the PCII procedures manual. * The Program Office accredits the government entity after all needs identified by the assessments are addressed. The PCII officer must submit an annual report to the Program Office to keep the office appraised of any developments in the participant's PCII program. A fully accredited entity must be reaccredited every 3 years. In addition, the Program Office may also elect to conduct a site visit of an accredited entity at any time to ensure that the minimum requirements are continually being met or to respond to requests for consultation or guidance from the entity. [End of section] Appendix III: GAO Contacts and Staff Acknowledgments: GAO Contacts: David Powner, (202) 512-9286 or pownerd@gao.gov Eileen Larence (202) 512-6510 or larencee@gao.gov: Staff Acknowledgments: In addition to the persons named above, R. Rochelle Burns, Neil Doherty, Michael Gilmore, Steve Gosewehr, Barbarol James, Victoria Miller, Susan Quinlan, Nik Rapelje, and Amos Tevelow made key contributions to this report. (310493): FOOTNOTES [1] GAO, Critical Infrastructure Protection: Improving Information Sharing with Infrastructure Sectors, GAO-04-780 (Washington, D.C.: July 9, 2004); and Information Sharing: Practices That Can Benefit Critical Infrastructure Protection, GAO-02-24 (Washington, D.C.: Oct. 15, 2001). [2] GAO, High-Risk Series: An Update, GAO-05-207 (Washington, D.C.: January 2005). GAO uses the high-risk designation to draw attention to the challenges associated with the economy, efficiency, and effectiveness of government programs and operations in need of broad- based transformation. [3] CII is information that is related to the security of critical infrastructure or protected systems and that is not customarily in the public domain. Once the information is received by DHS and determined to meet the requirements of the act, it is designated as "protected CII." [4] DHS published a notice of proposed rulemaking in the Federal Register in April 2003, and an interim rule that established procedures that were immediately effective on February 20, 2004. In the interim rule, DHS also stated that it would continue to consider public comments for 3 months and would determine whether supplemental regulations were needed. The act required the procedures to be established not later than 90 days after the date of enactment or on or about February 25, 2003. [5] Pub. L. No. 107-296 (Nov. 25, 2002). [6] The Homeland Security Information Sharing Act requires procedures for facilitating homeland security information sharing and establishes authorities to share different types of information, such as grand jury information; electronic, wire, and oral interception information; and foreign intelligence information (Subtitle I, Title VIII, Homeland Security Act). [7] The White House, National Strategy for Homeland Security (July 2002); National Strategy to Secure Cyberspace (February 2003); and National Strategy for the Physical Protection of Critical Infrastructures and Key Assets (February 2003). [8] Department of Homeland Security, National Infrastructure Protection Plan: Base Plan (Washington, D.C.: January 2006). [9] The CII Act defines "voluntary" as the submittal of CII in the absence of DHS's exercise of legal authority to compel access to or submission of such information (Sec. 212 (7)(A)). [10] The CII Act defines an "information sharing and analysis organization" as any entity or collaboration created or employed by public or private sector organizations for the purposes of, among other things, (1) gathering and analyzing CII; (2) communicating or disclosing CII to help protect critical infrastructure; and (3) voluntarily disseminating CII to its members; state, local, and federal governments; or other entities (Sec. 212 (5)). [11] The Freedom of Information Act (5 U.S.C. § 552) establishes the public's legal right of access to government information but also enables the government to withhold certain information from public release. [12] Department of Homeland Security, Procedures for Handling Critical Infrastructure Information: Interim Rule (69 FR 8074) (Feb. 20, 2004). [13] GAO, Critical Infrastructure Protection: Department of Homeland Security Faces Challenges in Fulfilling Cybersecurity Responsibilities, GAO-05-434 (Washington, D.C.: May 26, 2005). [14] GAO-05-434. [15] GAO, Critical Infrastructure Protection: Establishing Effective Information Sharing with Infrastructure Sectors, GAO-04-669T (Washington, D.C.: Apr. 21, 2004). [16] GAO-04-780. [17] GAO-04-699T. [18] GAO-05-434. [19] The Procedures for Handling Critical Infrastructure Information: Interim Rule requires the PCII Program Manager to develop and use an electronic database, to be known as the Protected Critical Infrastructure Information Management System, to record the receipt, acknowledgment, validation, storage, dissemination, and destruction of PCII. [20] An ISAO is any formal or informal entity or collaboration created or employed by public or private sector organizations for the purposes of, among other things, (1) gathering and analyzing CII to protect against or mitigate an attack; (2) communicating or disclosing CII for such purposes; and (3) voluntarily disseminating CII to its members, federal, state, or local governments; or any other appropriate entities. GAO's Mission: The Government Accountability Office, the investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through the Internet. GAO's Web site ( www.gao.gov ) contains abstracts and full-text files of current reports and testimony and an expanding archive of older products. The Web site features a search engine to help you locate documents using key words and phrases. You can print these documents in their entirety, including charts and other graphics. Each day, GAO issues a list of newly released reports, testimony, and correspondence. GAO posts this list, known as "Today's Reports," on its Web site daily. The list contains links to the full-text document files. To have GAO e-mail this list to you every afternoon, go to www.gao.gov and select "Subscribe to e-mail alerts" under the "Order GAO Products" heading. Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Public Affairs: Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.