Maritime Security

Information-Sharing Efforts Are Improving Gao ID: GAO-06-933T July 10, 2006

Sharing information with nonfederal officials is an important tool in federal efforts to secure the nation's ports against a potential terrorist attack. The Coast Guard has lead responsibility in coordinating maritime information sharing efforts. The Coast Guard has established area maritime security committees--forums that involve federal and nonfederal officials who identify and address risks in a port. The Coast Guard and other agencies have sought to further enhance information sharing and port security operations by establishing interagency operational centers--command centers that tie together the efforts of federal and nonfederal participants. This testimony is a summary and update to our April 2005 report, Maritime Security: New Structures Have Improved Information Sharing, but Security Clearance Processing Requires Further Attention, GAO-05-394. It discusses the impact the committees and interagency operational centers have had on improving information sharing and identifies any barriers that have hindered information sharing.

Area maritime security committees provide a structure that has improved information sharing among port security stakeholders. At the four port locations GAO visited, federal and nonfederal stakeholders said that the newly formed committees were an improvement over previous information-sharing efforts. The types of information shared included assessments of vulnerabilities at port locations and strategies the Coast Guard intends to use in protecting key infrastructure. GAO's ongoing work indicates that these committees continue to be useful forums for information sharing. Interagency operational centers also allow for even greater information sharing because the centers operate on a 24-hour-a-day basis, and they receive real-time information from data sources such as radars and sensors. The Coast Guard has developed its own centers--called sector command centers--at 35 port locations to monitor information and to support its operations planned for the future. As of today, the relationship between the interagency operational centers and the sector command centers remains to be determined. In April 2005 the major barrier hindering information sharing was the lack of federal security clearances for nonfederal members of committees or centers. In April 2005, Coast Guard issued guidance to field offices that clarified their role in obtaining clearances for nonfederal members of committees or centers. In addition, the Coast Guard did not have formal procedures that called for the use of data to monitor application trends. As of June 2006, guidance was put in place and according to the Coast Guard, was responsible for an increase in security clearance applications under consideration by the Coast Guard. Specifically, as of June 2006, 188 out of 467 nonfederal members of area maritime security committees with a need to know received some type of security clearance. This is an improvement from February 2005, when no security clearances were issued to 359 nonfederal members of area maritime security committees members with a need to know security information.



GAO-06-933T, Maritime Security: Information-Sharing Efforts Are Improving This is the accessible text file for GAO report number GAO-06-933T entitled 'Maritime Security: Information-Sharing Efforts are Improving' which was released on July 10, 2006. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Testimony before the Subcommittee on Government Management, Finance, and Accountability, Committee on Government Reform, House of Representatives: United States Government Accountability Office: GAO: For Release on Delivery Expected at 1:00 p.m. EDT: Monday, July 10, 2006: Maritime Security: Information-Sharing Efforts Are Improving: Statement of Stephen L. Caldwell, Acting Director Homeland Security and Justice Issues: Maritime Security: GAO-06-933T: GAO Highlights: Highlights of GAO-06-933T, a testimony before the Subcommittee on Government Management, Finance, and Accountability of the Committee on Government Reform, U.S. House of Representatives Why GAO Did This Study: Sharing information with nonfederal officials is an important tool in federal efforts to secure the nation‘s ports against a potential terrorist attack. The Coast Guard has lead responsibility in coordinating maritime information sharing efforts. The Coast Guard has established area maritime security committees”forums that involve federal and nonfederal officials who identify and address risks in a port. The Coast Guard and other agencies have sought to further enhance information sharing and port security operations by establishing interagency operational centers”command centers that tie together the efforts of federal and nonfederal participants. This testimony is a summary and update to our April 2005 report, Maritime Security: New Structures Have Improved Information Sharing, but Security Clearance Processing Requires Further Attention, GAO-05- 394. It discusses the impact the committees and interagency operational centers have had on improving information sharing and identifies any barriers that have hindered information sharing. What GAO Found: Area maritime security committees provide a structure that has improved information sharing among port security stakeholders. At the four port locations GAO visited, federal and nonfederal stakeholders said that the newly formed committees were an improvement over previous information-sharing efforts. The types of information shared included assessments of vulnerabilities at port locations and strategies the Coast Guard intends to use in protecting key infrastructure. GAO‘s ongoing work indicates that these committees continue to be useful forums for information sharing. Interagency operational centers also allow for even greater information sharing because the centers operate on a 24-hour-a-day basis, and they receive real-time information from data sources such as radars and sensors. The Coast Guard has developed its own centers”called sector command centers”at 35 port locations to monitor information and to support its operations planned for the future. As of today, the relationship between the interagency operational centers and the sector command centers remains to be determined. In April 2005 the major barrier hindering information sharing was the lack of federal security clearances for nonfederal members of committees or centers. In April 2005, Coast Guard issued guidance to field offices that clarified their role in obtaining clearances for nonfederal members of committees or centers. In addition, the Coast Guard did not have formal procedures that called for the use of data to monitor application trends. As of June 2006, guidance was put in place and according to the Coast Guard, was responsible for an increase in security clearance applications under consideration by the Coast Guard. Specifically, as of June 2006, 188 out of 467 nonfederal members of area maritime security committees with a need to know received some type of security clearance. This is an improvement from February 2005, when no security clearances were issued to 359 nonfederal members of area maritime security committees members with a need to know security information. Figure: Harbor Patrols Coordinated by Interagency Operational Centers: [See PDF for Image] Source: GAO> [End of Figure] [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-06-933T]. To view the full product, including the scope and methodology, click on the link above. For more information, contact Stephen L. Caldwell at (202) 512-9610 or CaldwellS@gao.gov. [End of Section] Mr. Chairman and Members of the Subcommittee: I am pleased to be here today to discuss the improvements made in the practice of sharing maritime-related security information. Securing the nation's ports against a potential terrorist attack has become one of the nation's security priorities since the terrorist attacks of September 11, 2001. Factors that make ports vulnerable to a terrorist attack include their location near major urban centers, their inclusion of critical infrastructures such as oil refineries and terminals, and their importance to the nation's economy and trade. Although no port- related terrorist attacks have occurred in the United States, terrorists overseas have demonstrated their ability to access and destroy infrastructure, assets, and lives in and around seaports. Ports are sprawling enterprises that often cross jurisdictional boundaries; therefore, the need to share information among federal, state, and local agencies is central to effective prevention and response. Since the September 11 terrorist attacks, the federal government has taken a number of approaches designed to enhance information sharing.[Footnote 1] One of these approaches provides the Coast Guard with the authority to create area maritime security committees at the port level.[Footnote 2] These committees--with representatives from the federal, state, local, and private sectors-- offer a venue to identify and deal with vulnerabilities in and around ports, as well as a forum for sharing information on issues related to port security. Another approach developed to share information is the creation of interagency operational centers at certain port locations.[Footnote 3] These centers are command posts that tie together intelligence and operational efforts of various federal and nonfederal participants. Often information regarding port security is classified, and requires security clearances for those who need access to this information. Lacking access to such information through a security clearance can disadvantage officials in their efforts to respond to or combat a terrorist threat. My testimony today is a summary of and update to our April 2005 report, Maritime Security: New Structures Have Improved Information Sharing, but Security Clearance Processing Requires Further Attention, GAO-05- 394. That report provides additional background and examples related to our findings. Specifically, my testimony provides an examination of the efforts that the Coast Guard and other federal agencies have made in improving information sharing among federal, state, local, and industry stakeholders, including (1) the impact of area maritime security committees on information sharing, (2) the impact of interagency operational centers on information sharing, and (3) the barriers, if any, that have hindered improvements in information sharing among port security stakeholders. To obtain this information, we reviewed the activities of area maritime security committees at four ports, selected to provide a diverse sample of security environments and perspectives. The ports were Baltimore, Maryland; Charleston, South Carolina; Houston, Texas; and Seattle, Washington. To review the activities of the interagency operational centers, we visited and interviewed participants at the three centers in operation at the time of our published report. We also discussed information-sharing issues with nonfederal stakeholders, including private sector officials, officials from port authorities, and local law enforcement. We examined the Coast Guard's procedures for processing security clearances for members of area maritime security committees. We reviewed legislation and congressional committee reports related to information sharing, interviewed agency officials, and reviewed numerous other documents and reports on the issue. We interviewed Coast Guard officials involved in sharing information and received updated information about their efforts in 2006. All of our work has been conducted in accordance with generally accepted government auditing standards. Summary: Judging from the four ports we visited for our 2005 report, area maritime security committees have provided a structure to improve the timeliness, completeness, and usefulness of information sharing between federal and nonfederal stakeholders. Stakeholders said the newly formed committees were an improvement over previous information-sharing efforts because they established a formal structure for communicating information and established new procedures for sharing information. Stakeholders stated that, among other things, the committees have been used as a forum for sharing assessments of vulnerabilities, providing information on illegal or suspicious activities, and providing input on portwide security plans--called area maritime security plans--that describe the joint strategies of the Coast Guard and its partner agencies for protecting key infrastructure against terrorist activities. Nonfederal stakeholders, including state officials, local port authority operators, and representatives of private companies, said the information sharing had increased their awareness of security issues around the port and allowed them to identify and address security issues at their facilities. Likewise, Coast Guard officials said the information they received from nonfederal participants had helped in mitigating and reducing risks. While committees at each of the locations we visited had the same guidance, they varied in such ways as the size of the membership and the types of stakeholders represented. The three interagency operational centers we visited for our 2005 report allow for even greater information sharing because the centers operate 24 hours a day and receive real-time operational information from radars, sensors, and cameras, as well as classified data on personnel, vessels, and cargo, according to center participants. In contrast, the area maritime security committees, while they have a broader membership, primarily provide information through meetings, documents, and other means that are often used for long-term planning purposes rather than day-to-day operations. The three operational interagency centers and two additional centers under construction should fulfill varying missions and operations, and thus share different types of information. For example, the center in Charleston, South Carolina, focuses on port security alone and is led by the Department of Justice (DOJ). In contrast, the center in San Diego supports the Coast Guard's missions beyond port security, including drug interdiction, alien migrant interdiction, and search and rescue activities, and is led by the Coast Guard. The Coast Guard also has developed its own operational centers--called sector command centers-- at 35 port locations, including four sector command centers with enhanced surveillance and collaboration capabilities,[Footnote 4] to monitor maritime information and to support Coast Guard operations. One barrier to sharing information--the lack of security clearances among nonfederal officials--is being addressed by the Coast Guard. In our April 2005 report, we noted that while information sharing has generally improved, a major barrier mentioned most frequently by stakeholders as hindering information sharing was the lack of federal security clearances among port security stakeholders. This lack of security clearances may limit the ability of state, local, and industry officials, such as those involved in area maritime security committees or interagency operational centers, to deter, prevent, and respond to a potential terrorist attack. By February 2005--or over 4 months after the Coast Guard had developed a list of 359 nonfederal area maritime security committee participants as having a need for a security clearance--only 28 had submitted the necessary paperwork for the background check. As of June 2006, Coast Guard identified 467 nonfederal area maritime security committee participants with a need to know security information. Of the 467 nonfederal participants, 197 security clearance applications were received--20 received interim clearances, and 168 received final security clearances. Therefore, according to the Coast Guard, 188 out of 467 area maritime security committee participants with a need to know have received some type of clearance. Although we reported in 2005 that progress in moving these officials through the application process had been slow, it appears that as of June 2006, the Coast Guard's efforts have improved considerably. However, continued management attention and guidance about the security clearance process would strengthen the program, and it would reduce the risk that nonfederal officials may have incomplete information as they carry out their law enforcement activities. Background: Ports Are Important and Vulnerable: Ports play an important role in the nation's economy and security. Ports are used to import and export cargo worth hundreds of billions of dollars; generating jobs, both directly and indirectly, for Americans and our trading partners. Ports, which include inland waterways, are used to move cargo containers, and bulk agricultural, mineral, petroleum, and paper products. Ports are also important to national security by hosting naval bases and vessels and facilitating the movement of military equipment and supplying troops deployed overseas. Since the terrorist attacks of September 11, the nation's 361 seaports have been increasingly viewed as potential targets for future terrorist attacks. Ports are vulnerable because they are sprawling, interwoven with complex transportation networks, close to crowded metropolitan areas, and easily accessible. Ports contain a number of specific facilities that could be targeted by terrorists, including military vessels and bases, cruise ships, passenger ferries, terminals, dams and locks, factories, office buildings, power plants, refineries, sports complexes, and other critical infrastructure. Multiple Jurisdictions Are Involved: The responsibility for protecting ports from a terrorist attack is a shared responsibility that crosses jurisdictional boundaries, with federal, state, and local organizations involved. For example, at the federal level, the Department of Homeland Security (DHS) has overall homeland security responsibility, and the Coast Guard, an agency of the department, has lead responsibility for maritime security. Port authorities provide protection through designated port police forces, private security companies, and coordination with local law enforcement agencies. Private sector stakeholders play a major role in identifying and addressing the vulnerabilities in and around their facilities, which may include oil refineries, cargo facilities, and other property adjacent to navigable waterways. Information Sharing Is Important: Information sharing among federal, state, and local officials is central to port security activities. The Homeland Security Act of 2002 recognizes that the federal government relies on state and local personnel to help protect against terrorist attacks, and these officials need homeland security information to prevent and prepare for such attacks.[Footnote 5] Information sharing between federal officials and nonfederal officials can involve information collected by federal intelligence agencies. In order to gain access to classified information, state and local law enforcement officials generally need to apply for and receive approval to have a federal security clearance. As implemented by the Coast Guard, the primary criterion for granting access to classified information is an individual's need to know, which is defined as the determination made by an authorized holder of classified information that a prospective recipient requires access to specific classified information in order to perform or assist in a lawful and authorized governmental function.[Footnote 6] To obtain a security clearance, an applicant must complete a detailed questionnaire that asks for information on all previous employment, residences, and foreign travel and contacts that reach back 7 years. After submitting the questionnaire, the applicant then undergoes a variety of screenings and checks. Area Maritime Security Committees: The Maritime Transportation Security Act, passed in the aftermath of the September 11 attacks and with the recognition that ports contain many potential security targets, provided for area maritime security committees--composed of federal, state, local, and industry members--to be established by the Coast Guard at ports across the country.[Footnote 7] A primary goal of these committees is to assist the local Captain of the Port--the senior Coast Guard officer who leads the committee--to develop a security plan--called an area maritime security plan--to address the vulnerabilities and risks in that port zone.[Footnote 8] The committees also serve as a link for communicating threats and disseminating security information to port stakeholders. As of June 2006, the Coast Guard organized 46 area maritime security committees, covering the nation's 361 ports.[Footnote 9] Interagency Operational Centers: Another approach at improving information sharing and port security operations involves interagency operational centers--command centers that bring together the intelligence and operational efforts of various federal and nonfederal participants. These centers are to provide intelligence information and real-time operational data from sensors, radars, and cameras at one location to federal and nonfederal participants 24 hours a day. These interagency operational centers represent an effort to improve awareness of incoming vessels, port facilities, and port operations. In general, these centers are jointly operated by federal and nonfederal law enforcement officials. The centers can have command and control capabilities that can be used to communicate information to vessels, aircraft, and other vehicles and stations involved in port security operations. Port-Level Information Sharing Supported by National-Level Intelligence: While area maritime security committees and interagency operational centers are port-level organizations, they are supported by, and provide support to, a national-level intelligence infrastructure. National-level departments and agencies in the intelligence and law enforcement communities may offer information that ultimately could be useful to members of area maritime security committees or interagency operational centers at the port level. These intelligence and law enforcement agencies conduct maritime threat identification and dissemination efforts in support of tactical and operational maritime and port security efforts, but most have missions broader than maritime activities as well. In addition, some agencies also have regional or field offices involved in information gathering and sharing.[Footnote 10] Area Maritime Security Committees Have Improved Information Sharing: Ports Reviewed Showed Improvements in Timeliness, Completeness, and Usefulness of Shared Information: Area maritime security committees have provided a structure to improve the timeliness, completeness, and usefulness of information sharing. A primary function served by the committees was to develop security plans for port areas--called area maritime security plans. The goal of these plans was to identify vulnerabilities to a terrorist attack in and around a port location and to develop strategies for protecting a wide range of facilities and infrastructure. In doing so, the committees established new procedures for sharing information by holding meetings on a regular basis, issuing electronic bulletins on suspicious activities around port facilities, and sharing key documents, including vulnerability assessments and the portwide security plan itself, according to committee participants. Also, participants noted that these committees allowed for both formal and informal stakeholder networking, which contributes to improvements in information sharing. Our continuing work on the Coast Guard and maritime security, while not specifically focused on information sharing, has continued to indicate that area maritime security committees are a useful tool for exchanging information. For example, we have done work at eight additional ports and found that stakeholders were still using the committees as a structured means to regularly share information about threat conditions and operational issues. In addition, Coast Guard personnel and port stakeholders are using the area maritime security committees to coordinate security and response training and exercises. Also, in the wake of Hurricane Katrina, Coast Guard officials shared information collaboratively through their area maritime security committees to determine when it was appropriate to close and then reopen a port for commerce. Committees Have Flexibility in Their Structure and in the Way in Which They Share Information: While the committees are required to follow the same guidance regarding their structure, purpose, and processes, each of the committees is allowed the flexibility to assemble and operate in a way that reflects the needs of its port area. Each port is unique in many ways, including the geographic area covered and the type of operations that take place there. These port-specific differences influence the number of members that participate, the types of state and local organizations that members represent, and the way in which information is shared. Interagency Operational Centers Have Also Improved Information Sharing: Centers Process and Share Information on Operations: Information sharing at interagency operational centers represents a step toward further improving information sharing, according to participants at the centers we visited. They said maritime security committees have improved information sharing primarily through a planning process that identifies vulnerabilities and mitigation strategies, as well as through development of two-way communication mechanisms to share threat information on an as-needed basis. In contrast, interagency operational centers can provide a continuous flow of information about maritime activities and involve various agencies directly in operational decisions using this information. Radar, sensors, and cameras offer representations of vessels and facilities. Other data are available from intelligence sources and include data on vessels, cargo, and crew. Greater information sharing among participants at these centers has also enhanced operational collaboration, according to participants. Unlike the area maritime security committees, these centers are operational in nature--that is, they have a unified or joint command structure designed to receive information and act on it. At the centers we visited, representatives from the various agencies work side by side, each having access to databases and other sources of information from their respective agencies. Officials said such centers help leverage the resources and authorities of the respective agencies. For example, if the Coast Guard determines that a vessel should be boarded and inspected, other federal and nonfederal agencies might join in the boarding to assess the vessel or its cargo, crew, or passengers for violations relating to their areas of jurisdiction or responsibility. Variations across Centers Affect Information Sharing: The types of information and the way information is shared vary at the centers we visited, depending on their purpose and mission, leadership and organization, membership, technology, and resources, according to officials at the centers. In our report of April 2005, we detailed three interagency operational centers at Charleston, South Carolina; Norfolk, Virginia; and San Diego, California. As of June 2006, the Coast Guard has two additional interagency command centers under construction in Jacksonville, Florida, and Seattle, Washington. Both are being established as Sector Command Centers--joint with the U.S. Navy--and are expected to be operational in 2006. Of the interagency centers we visited, the Charleston center had a port security purpose, so its missions were all security related. It was led by DOJ, and its membership included 4 federal agencies and 16 state and local agencies. The San Diego center had a more general purpose, so it had multiple missions to include not just port security, but search and rescue, environmental response, drug interdiction, and other law enforcement activities. It was led by the Coast Guard, and its membership included 2 federal agencies and 1 local agency. The Norfolk center had a port security purpose, but its mission was focused primarily on force protection for the Navy. It was led by the Coast Guard, and its membership included 2 federal agencies and no state or local agencies. As a result, the Charleston center shared information that focused on law enforcement and intelligence related to port security among a very broad group of federal, state, and local agency officials. The San Diego center shared information on a broader scope of activities (beyond security) among a smaller group of federal and local agency officials. The Norfolk center shared the most focused information (security information related to force protection) among two federal agencies. The centers also shared different information because of their technologies and resources. The San Diego and Norfolk centers had an array of standard and new Coast Guard technology systems and access to Coast Guard and various national databases, while the Charleston center had these as well as additional systems and databases. For example, the Charleston center had access to and shared information on Customs and Border Protection's databases on incoming cargo containers from the National Targeting Center. In addition, Charleston had a pilot project with the Department of Energy to test radiation detection technology that provided additional information to share. The Charleston center was funded by a special appropriation that allowed it to use federal funds to pay for state and local agency salaries. This arrangement boosted the participation of state and local agencies, and thus information sharing beyond the federal government, according to port stakeholders in Charleston. While the San Diego center also had 24-hour participation by the local harbor patrol, that agency was paying its own salaries. Coast Guard Continues to Develop Sector Command Centers at Ports: In April 2005, we reported that the Coast Guard planned to develop up to 40 of its own operational centers--called sector command centers--at additional ports. These command centers would provide local port activities with a unified command and improve awareness of the maritime domain through a variety of technologies. As of June 2006, the Coast Guard reported to us that 35 sector command centers have been created, and that these centers are the primary conduit for daily collaboration and coordination between the Coast Guard and its port partner agencies. The Coast Guard also reported that it has implemented a maritime monitoring system--known as the Common Operating Picture system--that fuses data from different sources.[Footnote 11] According to the Coast Guard, this system is the primary tool for Coast Guard commanders in the field to attain maritime domain awareness. In April 2005, we also reported that the Coast Guard requested in fiscal year 2006 over $5 million in funding to improve awareness of the maritime domain by continuing to evaluate the potential expansion of sector command centers to other port locations, and requested additional funding to train personnel in Common Operating Picture deployment at command centers and to modify facilities to implement the picture in command centers.[Footnote 12] In June 2006, the Coast Guard reported to us that no additional funding for this program was requested for fiscal year 2007. Coast Guard Report on Interagency Operational Centers: Congress directed the Coast Guard to report on the existing interagency operational centers, covering such matters as the composition and operational characteristics of existing centers and the number, location, and cost of such new centers as may be required to implement maritime transportation security plans and maritime intelligence activities.[Footnote 13] This report, called for by February 2005, was issued by the Coast Guard in April 2005. While the report addresses the information sought by Congress, the report did not define the relationship between interagency operational centers and the Coast Guard's own sector command centers. Port stakeholders reported to us the following issues as important factors to consider in any expansion of interagency operational centers: (1) purpose and mission--the centers could serve a variety of overall purposes, as well as support a wide number of specific missions; (2) leadership and organization--the centers could be led by several potential departments or agencies and be organized a variety of ways; (3) membership--the centers could vary in membership in terms of federal, state, local, or private sector participants and their level of involvement; (4) technology deployed--the centers could deploy a variety of technologies in terms of networks, computers, communications, sensors, and databases; and (5) resource requirements- -the centers could also vary in terms of resource requirements, which agency funds the resources, and how resources are prioritized. Other Ad Hoc Arrangements for Interagency Information-Sharing: Our work identified other interagency arrangements that facilitate information sharing and interagency operations in the maritime environment. One example is a predesignated single-mission task force, which becomes operational when needed. DHS established the Homeland Security Task Force, South-East--a working group consisting of federal and nonfederal agencies with appropriate geographic and jurisdictional responsibilities that have the mission to respond to any mass migration of immigrants affecting southeast Florida. When a mass migration event occurs, the task force is activated and becomes a full-time interagency effort to share information and coordinate operations to implement a contingency plan. Another example of an interagency arrangement for information sharing can occur in single-agency operational centers that become interagency to respond to specific events. For example, the Coast Guard has its own command centers for both District Seven and Sector Miami, located in Miami, Florida. While these centers normally focus on a variety of Coast Guard missions and are not normally interagency in structure, they have established protocols with other federal agencies, such as the U.S. Customs and Border Protection and U.S. Immigration and Customs Enforcement, to activate a unified or incident command structure should it be needed. These Coast Guard centers make it possible to host interagency operations because they have extra space and equipment that allow for surge capabilities and virtual connectivity with each partner agency. Interagency Information-Sharing Concerns Go Beyond Maritime Area: While our findings on maritime information sharing are generally positive, we have some concerns regarding interagency information sharing that go far beyond the maritime issue area. In January 2005, we designated information sharing for homeland security as a high-risk area because the federal government still faces formidable challenges in gathering, identifying, analyzing, and disseminating key information within and among federal and nonfederal entities.[Footnote 14] While we recognize the efforts that some agencies have undertaken to break out of information "silos" and better share information, we reported in 2006 that more than 4 years after September 11, the nation still lacks comprehensive policies and processes to improve the sharing of information that is critical to protecting our homeland.[Footnote 15] We made several recommendations to the Director of National Intelligence, who is now primarily responsible for this effort, to ensure effective implementation of congressional information sharing mandates. We continue to review agencies and programs that have the goal of improving information sharing among federal, state, and local partners. For example, we have ongoing work assessing DHS' efforts to enhance coordination and collaboration among interagency operations centers that operate around the clock to provide situational awareness. We plan to report on this later this year. Also, we have just begun work on state fusion centers--which are locations where homeland security- related information can be collected and analyzed--and their links to their relevant federal counterparts, which we plan to report on in 2007. Coast Guard Making Progress Granting Security Clearances: Lack of Security Clearances May Limit Ability to Confront Terrorist Threats: According to the Coast Guard and state and local officials we contacted for our 2005 report, the shared partnership between the federal government and state and local entities may fall short of its potential to fight terrorism because of the lack of security clearances. If state and local officials lack security clearances, the information they possess may be incomplete. According to Coast Guard and nonfederal officials, the lack of access to classified information may limit these officials' ability to deter, prevent, and respond to a potential terrorist attack. While security clearances for nonfederal officials who participate in interagency operational centers are sponsored by DOJ and DHS, the Coast Guard sponsors security clearances for members of area maritime security committees. For the purposes of our 2005 report, we examined in more detail the Coast Guard's efforts to address the lack of security clearances among members of area maritime security committees. Coast Guard Continues to Take Steps to Grant Additional Clearances to State, Local, and Industry Officials: In April 2005, we reported that as part of its effort to improve information sharing at ports, the Coast Guard initiated a program in July 2004 to sponsor security clearances for members of area maritime security committees, but nonfederal officials have been slow in submitting their applications for a security clearance. We also reported that as of February 2005, only 28 of 359 nonfederal committee members who had a need to know had submitted the application forms for a security clearance. As shown in table 1, as of June 2006, of the 467 nonfederal committee members who had a need to know, 197 had submitted security clearance applications--20 received interim clearances, and 168 were granted a final clearance, which allows access to classified material. Table 1: Comparison of February 2005 Coast Guard Data Regarding Security Clearances and June 2006 Coast Guard Data Regarding Security Clearances: Security clearance totals: Nonfederal committee members verified as needing clearances; February 2005: 359; June 2006: 467. Security clearance totals: Members who had submitted security clearance case paperwork; February 2005: 28 (8 percent of 359); June 2006: 197 (42 percent of 467). Security clearance totals: Members granted interim clearances pending final investigations from Office of Personnel Management; February 2005: 24 (7 percent of 359); June 2006: 20 (4 percent of 467). Security clearance totals: Members with final clearances at Secret level; February 2005: 0 (0 percent of 359); June 2006: 168 (36 percent of 467). Source: Coast Guard. [End of table] Data Are Being Used to More Effectively Manage the Security Clearance Program: A key component of a good management system is to have relevant, reliable, and timely information available to assess performance over time and to correct deficiencies as they occur. The Coast Guard has two databases that contain information on the status of security clearances for state, local, and industry officials. The first database is a commercial off-the-shelf system that contains information on the status of all applications that have been submitted to the Coast Guard Security Center, such as whether a security clearance has been issued or whether personnel security investigations have been conducted. We reported in April 2005 that the Coast Guard was testing the database for use by field staff, but had not granted field staff access to the database. As of June 2006, the Coast Guard granted access to this database--named Checkmate--to field staff. The second database--an internally developed spreadsheet on the area maritime committee participants--summarizes information on the status of the security clearance program, such as whether officials have submitted their application forms and whether they have received their clearances. We reported in 2005 that these Coast Guard has databases could be used to manage the state, local, and industry security clearance program, but that formal procedures for using the data as a management tool to follow up on possible problems at the national or local level to verify the status of clearances had not been developed by the Coast Guard. While it is unclear that the Coast Guard developed formal procedures, as of June 2006, the Coast Guard reported that it has developed guidance for using its data on committee participants. According to the Coast Guard, the guidance released to field commands regarding the state, local, and industry security clearance program clarified the process for nonfederal area maritime security committee members to receive clearances and specifically outlined responsibilities for working with applicants on completing required paperwork, including the application packages. The Coast Guard reported that as a result of this guidance, the number of received and processed security clearance packages for area maritime security committee members has increased. Concluding Observations: As we reported in April 2005, and reaffirm today, effective information sharing among members of area maritime security committees and participants in interagency operational centers can enhance the partnership between federal and nonfederal officials, and it can improve the leveraging of resources across jurisdictional boundaries for deterring, preventing, or responding to a possible terrorist attack at the nation's ports. The Coast Guard has recognized the importance of granting security clearances to nonfederal officials as a means to improve information sharing, and although we reported in 2005 that progress in moving these officials through the application process had been slow, it appears that as of June 2006 the Coast Guard's efforts to process security clearances to nonfederal officials has improved considerably. However, continued management attention and guidance about the security clearance process would strengthen the program, and it would reduce the risk that nonfederal officials may have incomplete information as they carry out their law enforcement activities. Mr. Chairman and members of the subcommittee, this completes my prepared statement. I would be happy to respond to any questions that you or other members of the subcommittee may have at this time. GAO Contacts and Staff Acknowledgments: For information about this testimony, please contact Stephen L. Caldwell Acting Director, Homeland Security and Justice Issues, at (202) 512-9610, or at caldwells@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found at the last page of this statement. Individuals making key contributions to this testimony include Susan Quinlan, David Alexander, Neil Asaba, Juliana Bahus, Christine Davis, Kevin Heinz, Lori Kmetz, Emily Pickrell, Albert Schmidt, Amy Sheller, Stan Stenersen, and April Thompson. [End of section] Related GAO Products: Coast Guard: Observations on Agency Performance, Operations, and Future Challenges. GAO-06-448T. Washington, D.C.: June 15, 2006. Maritime Security: Enhancements Made, but Implementation and Sustainability Remain Key Challenges. GAO-05-448T. Washington, D.C.: May 17, 2005. Maritime Security: New Structures Have Improved Information Sharing, but Security Clearance Processing Requires Further Attention. GAO-05- 394. Washington, D.C.: April 15, 2005. Coast Guard: Observations on Agency Priorities in Fiscal Year 2006 Budget Request. GAO-05-364T. Washington, D.C.: March 17, 2005. Coast Guard: Station Readiness Improving, but Resource Challenges and Management Concerns Remain. GAO-05-161. Washington, D.C.: January 31, 2005. Homeland Security: Process for Reporting Lessons Learned from Seaport Exercises Needs Further Attention. GAO-05-170. Washington, D.C.: January 14, 2005. Port Security: Better Planning Needed to Develop and Operate Maritime Worker Identification Card Program. GAO-05-106. Washington, D.C.: December 10, 2004. Maritime Security: Better Planning Needed to Help Ensure an Effective Port Security Assessment Program. GAO-04-1062. Washington, D.C.: September 30, 2004. Maritime Security: Partnering Could Reduce Federal Costs and Facilitate Implementation of Automatic Vessel Identification System. GAO-04-868. Washington, D.C.: July 23, 2004. Maritime Security: Substantial Work Remains to Translate New Planning Requirements into Effective Port Security. GAO-04-838. Washington, D.C.: June 30, 2004. Coast Guard: Key Management and Budget Challenges for Fiscal Year 2005 and Beyond. GAO-04-636T. Washington, D.C.: April 7, 2004. Homeland Security: Summary of Challenges Faced in Targeting Oceangoing Cargo Containers for Inspection. GAO-04-557T. Washington, D.C.: March 31, 2004. Homeland Security: Preliminary Observations on Efforts to Target Security Inspections of Cargo Containers. GAO-04-325T. Washington, D.C.: December 16, 2003. Posthearing Questions Related to Aviation and Port Security. GAO-04- 315R. Washington, D.C.: December 12, 2003. Maritime Security: Progress Made in Implementing Maritime Transportation Security Act, but Concerns Remain. GAO-03-1155T. Washington, D.C.: September 9, 2003. Homeland Security: Efforts to Improve Information Sharing Need to Be Strengthened. GAO-03-760. Washington D.C.: August 27, 2003. Container Security: Expansion of Key Customs Programs Will Require Greater Attention to Critical Success Factors. GAO-03-770. Washington, D.C.: July 25, 2003. Homeland Security: Challenges Facing the Department of Homeland Security in Balancing its Border Security and Trade Facilitation Missions. GAO-03-902T. Washington, D.C.: June 16, 2003. Transportation Security: Post-September 11th Initiatives and Long-Term Challenges. GAO-03-616T. Washington, D.C.: April 1, 2003. Port Security: Nation Faces Formidable Challenges in Making New Initiatives Successful. GAO-02-993T. Washington, D.C.: August 5, 2002. Combating Terrorism: Preliminary Observations on Weaknesses in Force Protection for DOD Deployments through Domestic Seaports. GAO-02- 955TNI. Washington, D.C.: July 23, 2002. FOOTNOTES [1] For the purposes of this testimony, "homeland security information sharing" is defined as an exchange of information, including intelligence, critical infrastructure, and law enforcement information, among federal, state, and local governments, and the private sector (industry) to establish timely, effective, and useful communications to detect, prevent, and mitigate potential terrorist attacks. [2] The Maritime Transportation Security Act of 2002 (MTSA), P.L.107- 295, contains many of the homeland security requirements related specifically to port security. The area maritime security committees are authorized by section 102 of MTSA, as codified at 46 U.S. C. § 70112(a)(2) and implemented at 33 C.F.R. Part 103. [3] We use the term "interagency operational centers" to refer to centers where multiple federal (and in some cases, state and local) agencies are involved in monitoring maritime security and planning related operations. Members of these interagency operational centers include the Department of Homeland Security (through the U.S. Coast Guard), the Department of the Navy, and the Department of Justice. [4] The four sector command centers with enhanced surveillance and collaboration capabilities are Miami, Florida; San Diego, California; Charleston, South Carolina; and Hampton Roads, Virginia. The Coast Guard told us that the long-term goal is to provide all sector command centers with enhanced surveillance and collaboration capabilities. [5] P.L. 107-296, § 891 (Nov. 25, 2002). [6] Executive Order 12968, Access to Classified Information, Section 1.1(h). [7] See 46 U.S.C. § 70112(a)(2). Prior to MTSA, some port locations had harbor safety committees that had representatives from federal, state, and local organizations. In addition, port security committees had been organized and still exist at ports where substantial out-load and in- load of military equipment occurs. [8] See 33 C.F.R. § 103.500. [9] Because some ports are located close to one another, some committees cover several ports. For example, the Puget Sound area maritime security committee includes the ports of Seattle, Tacoma, Bremerton, Port Angeles, and Everett. [10] For a more detailed description of the departments and agencies/ components involved in maritime information sharing at the national and port levels, see appendix II of Maritime Security: New Structures Have Improved Information Sharing, but Security Clearance Processing Requires Further Attention. GAO-05-394, (Washington, D.C.: Apr. 15, 2005). [11] The Coast Guard reported to us that some of the data systems included in its maritime monitoring system include data from the Department of Defense, Shipboard Command and Control System; data from Integrated Deepwater Systems; imagery from aircraft; data from Vessel Traffic Service, Ports and Waterways Safety Stems, Joint Harbor Operations Commands, Automated Identification Systems, Inland Rivers Vessel Movement Center, and the Vessel Monitoring System. However, according to the Coast Guard, not all of these data are available to all units; full integration is a future goal of the Coast Guard. [12] The Common Operational Picture is primarily a computer software package that fuses data from different sources, such as radar, sensors on aircraft, and existing information systems. [13] See the Coast Guard and Maritime Transportation Act of 2004, P.L. 108-293, § 807 (August 9, 2004). While the statute uses the term "joint operational centers," we are using the term "interagency operational centers" to denote centers where multiple agencies participate. According to Coast Guard officials, the term "joint" refers to command centers where the Coast Guard and Navy are involved in carrying out the responsibilities of the center. [14] GAO, High-Risk Series: An Update, GAO-05-207 (Washington D.C.: January 2005). [15] GAO, Information Sharing: The Federal Government Needs to Establish Policies and Processes for Sharing Terrorism-Related and Sensitive but Unclassified Information, GAO-06-385 (Washington, D.C.: March 2006). GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site (www.gao.gov). Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to www.gao.gov and select "Subscribe to Updates." Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000 TDD: (202) 512-2537 Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Gloria Jarmon, Managing Director, JarmonG@gao.gov (202) 512-4400 U.S. Government Accountability Office, 441 G Street NW, Room 7125 Washington, D.C. 20548: Public Affairs: Paul Anderson, Managing Director, AndersonP1@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.