Homeland Security
Progress Has Been Made to Address the Vulnerabilities Exposed by 9/11, but Continued Federal Action Is Needed to Further Mitigate Security Risks
Gao ID: GAO-07-375 January 24, 2007
Five years after the terrorist attacks of September 11, 2001, GAO is taking stock of key efforts by the President, Congress, federal agencies, and the 9/11 Commission to strengthen or enhance critical layers of defense in aviation and border security that were directly exploited by the 19 terrorist hijackers. Specifically, the report discusses how: (1) commercial aviation security has been enhanced; (2) visa-related policies and programs have evolved to help screen out potential terrorists; (3) federal border security initiatives have evolved to reduce the likelihood of terrorists entering the country through legal checkpoints; and (4) the Department of Homeland Security (DHS) and other agencies are addressing several major post-9/11 strategic challenges. The report reflects conclusions and recommendations from a body of work issued before and after 9/11 by GAO, the Inspectors General of DHS, State, and Justice, the 9/11 Commission, and others. It is not a comprehensive assessment of all federal initiatives taken or planned in response to 9/11. GAO is not making any new recommendations at this time since over 75 prior recommendations on aviation security, the Visa Waiver Program, and U.S. Visitor and Immigrant Status Indicator Technology (US-VISIT), among others, are in the process of being implemented. Continued monitoring by GAO will determine whether further recommendations are warranted.
While the nation cannot expect to eliminate all risks of terrorist attack upon commercial aviation, agencies have made progress since 9/11 to reduce aviation-related vulnerabilities and enhance the layers of defense directly exploited by the terrorist hijackers. In general, these efforts have resulted in better airline passenger screening procedures designed to identify and prevent known or suspected terrorists, weapons, and explosives from being allowed onto aircraft. Nevertheless, the nation's commercial aviation system remains a highly visible target for terrorism, as evidenced by recent alleged efforts to bring liquid explosives aboard aircraft. DHS and others need to follow through on outstanding congressional requirements and recommendations by GAO and others to enhance security and coordination of passengers and checked baggage, and improve screening procedures for domestic flights, among other needed improvements. GAO's work indicates that the government has strengthened the nonimmigrant visa process as an antiterrorism tool. New measures added rigor to the process by expanding the name-check system used to screen applicants, requiring in-person interviews for nearly all applicants, and revamping consular officials' training to focus on counterterrorism. Nevertheless, the immigrant visa process may pose potential security risks and we are reviewing this issue. To enhance security and screening at legal checkpoints (air, land, and sea ports) at the nation's borders, agencies are using technology to verify foreign travelers' identities and detect fraudulent travel documents such as passports. However, DHS needs to better manage risks posed by the Visa Waiver Program, whereby travelers from 27 countries need not obtain visas for U.S. travel. For example, GAO recommended that DHS require visa-waiver countries to provide information on lost or stolen passports that terrorists could use to gain entry. We also recommended that DHS provide more information to Congress on how it plans to fully implement US-VISIT--a system for tracking the entry, exit, and length of stay of foreign travelers. While much attention has been focused on mitigating the specific risks of 9/11, other critical assets ranging from passenger rail stations to power plants are also at risk of terrorist attack. Deciding how to address these risks--setting priorities, making trade-offs, allocating resources, and assessing social and economic costs--is essential. Thus, it remains vitally important for DHS to continue to develop and implement a risk-based framework to help target where and how the nation's resources should be invested to strengthen security. The government also faces strategic challenges that potentially affect oversight and execution of new and ongoing homeland security initiatives, and GAO has deemed three challenges in particular--information sharing, risk management, and transforming DHS as a department--as areas needing urgent attention. DHS and the Department of State reviewed a draft of this report and both agencies generally agreed with the information. Both agencies provided technical comments that were incorporated as appropriate.
GAO-07-375, Homeland Security: Progress Has Been Made to Address the Vulnerabilities Exposed by 9/11, but Continued Federal Action Is Needed to Further Mitigate Security Risks
This is the accessible text file for GAO report number GAO-07-375
entitled 'Homeland Security: Progress Has Been Made to Address the
Vulnerabilities Exposed by 9/11, but Continued Federal Action Is Needed
to Further Mitigate Security Risks' which was released on January 24,
2007.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to Congressional Requesters, House of Representatives:
United States Government Accountability Office:
GAO:
January 2007:
Homeland Security:
Progress Has Been Made to Address the Vulnerabilities Exposed by 9/11,
but Continued Federal Action Is Needed to Further Mitigate Security
Risks:
GAO-07-375:
GAO Highlights:
Highlights of GAO-07-375, a report to the Chairman, Committee on the
Judiciary, House of Representatives
Why GAO Did This Study:
Five years after the terrorist attacks of September 11, 2001, GAO is
taking stock of key efforts by the President, Congress, federal
agencies, and the 9/11 Commission to strengthen or enhance critical
layers of defense in aviation and border security that were directly
exploited by the 19 terrorist hijackers. Specifically, the report
discusses how: (1) commercial aviation security has been enhanced; (2)
visa-related policies and programs have evolved to help screen out
potential terrorists; (3) federal border security initiatives have
evolved to reduce the likelihood of terrorists entering the country
through legal checkpoints; and (4) the Department of Homeland Security
(DHS) and other agencies are addressing several major post-9/11
strategic challenges. The report reflects conclusions and
recommendations from a body of work issued before and after 9/11 by
GAO, the Inspectors General of DHS, State, and Justice, the 9/11
Commission, and others. It is not a comprehensive assessment of all
federal initiatives taken or planned in response to 9/11. GAO is not
making any new recommendations at this time since over 75 prior
recommendations on aviation security, the Visa Waiver Program, and US-
VISIT, among others, are in the process of being implemented. Continued
monitoring by GAO will determine whether further recommendations are
warranted.
What GAO Found:
While the nation cannot expect to eliminate all risks of terrorist
attack upon commercial aviation, agencies have made progress since 9/11
to reduce aviation-related vulnerabilities and enhance the layers of
defense directly exploited by the terrorist hijackers. In general,
these efforts have resulted in better airline passenger screening
procedures designed to identify and prevent known or suspected
terrorists, weapons, and explosives from being allowed onto aircraft.
Nevertheless, the nation‘s commercial aviation system remains a highly
visible target for terrorism, as evidenced by recent alleged efforts to
bring liquid explosives aboard aircraft. DHS and others need to follow
through on outstanding congressional requirements and recommendations
by GAO and others to enhance security and coordination of passengers
and checked baggage, and improve screening procedures for domestic
flights, among other needed improvements. GAO‘s work indicates that the
government has strengthened the nonimmigrant visa process as an
antiterrorism tool. New measures added rigor to the process by
expanding the name-check system used to screen applicants, requiring in-
person interviews for nearly all applicants, and revamping consular
officials‘ training to focus on counterterrorism. Nevertheless, the
immigrant visa process may pose potential security risks and we are
reviewing this issue. To enhance security and screening at legal
checkpoints (air, land, and sea ports) at the nation‘s borders,
agencies are using technology to verify foreign travelers‘ identities
and detect fraudulent travel documents such as passports. However, DHS
needs to better manage risks posed by the Visa Waiver Program, whereby
travelers from 27 countries need not obtain visas for U.S. travel. For
example, GAO recommended that DHS require visa-waiver countries to
provide information on lost or stolen passports that terrorists could
use to gain entry. We also recommended that DHS provide more
information to Congress on how it plans to fully implement US-VISIT”a
system for tracking the entry, exit, and length of stay of foreign
travelers. While much attention has been focused on mitigating the
specific risks of 9/11, other critical assets ranging from passenger
rail stations to power plants are also at risk of terrorist attack.
Deciding how to address these risks”setting priorities, making trade-
offs, allocating resources, and assessing social and economic costs”is
essential. Thus, it remains vitally important for DHS to continue to
develop and implement a risk-based framework to help target where and
how the nation‘s resources should be invested to strengthen security.
The government also faces strategic challenges that potentially affect
oversight and execution of new and ongoing homeland security
initiatives, and GAO has deemed three challenges in
particular”information sharing, risk management, and transforming DHS
as a department”as areas needing urgent attention. DHS and the
Department of State reviewed a draft of this report and both agencies
generally agreed with the information. Both agencies provided technical
comments that were incorporated as appropriate.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-375].
To view the full product, including the scope and methodology, click on
the link above. For more information, contact Eileen Larence, (202) 512-
8777, or larencee@gao.gov.
[End of Section]
Contents:
Letter:
Results in Brief:
Background:
Stronger Layered Defenses for Aviation Security in Place, Though We
Reported More Needs to Be Done to Enhance Passenger Screening
Operations and Security of Other Transportation Modes:
GAO Concluding Observations--Passenger Prescreening:
GAO Concluding Observations--Passenger Checkpoint Screening:
GAO Concluding Observations--In-flight Security and Ground-Based
Response Efforts:
GAO Concluding Observations--Enhancing Security of Layers of Aviation
Defense Not Implicated on 9/11:
GAO Concluding Observations--Enhancing Security of Other Transportation
Modes:
Measures to Improve Visa Applicant Screening, Consular Counterterrorism
Training, and Fraud Detection Have Strengthened the Visa Process as an
Antiterrorism Tool:
GAO Concluding Observations--Visa Process:
Efforts to Screen and Verify Travelers and Detect Fraudulent Travel
Documents Have Enhanced Border Security, but We Have Reported More Work
Is Needed to Ensure That Risks Posed by Certain Travelers and Cargo Are
Mitigated:
GAO Concluding Observations--Visa Waiver Program:
GAO Concluding Observations--US-VISIT:
GAO Concluding Observations--Border Security:
Federal Government Must Address Strategic Challenges of Sharing
Terrorism-Related Information, Managing Risk, and Structuring DHS to
Meet Its Mission:
GAO Concluding Observations--Strategic Challenges:
Appendix I: Visas Issued to the September 11, 2001, Terrorist
Hijackers:
Appendix II: Map of Visa Waiver Program Countries:
Appendix III: Related GAO and Inspectors General Products:
Appendix IV: Comments from the Department of Homeland Security:
Appendix V: GAO Contacts and Staff Acknowledgements:
Figures:
Figure 1: Selected Federal Departments and Agencies with Security
Responsibilities:
Figure 2: Passenger Checkpoint Screening Functions:
Figure 3: In-line Checked Baggage Screening System:
Figure 4: Air Cargo Being Loaded and Inspected Using an Explosive
Detection System:
Figure 5: Traveler Screening Process: U.S. Visa Holders versus Visa
Waiver Program Travelers:
Figure 6: Timeline of Visas issued to Hijackers at Overseas Posts,
November 1997 through June 2001:
Abbreviations:
ATSA: Aviation and Transportation Security Act:
CBP: Customs and Border Protection:
DHS: Department of Homeland Security:
DOT: Department of Transportation:
EDS: explosive detection systems:
ETD: explosive trace detection systems:
FAA: Federal Aviation Administration:
FRA: Federal Railroad Administration:
FTA: Federal Transit Administration:
HSPD: Homeland Security Presidential Directive:
ICE: Immigration and Customs Enforcement:
IED: improvised explosive device:
Interpol: International Criminal Police Organization:
NORAD: North American Aerospace Defense Command:
OGT: Office of Grants and Training:
OIG: Office of Inspector General:
POE: ports of entry:
TSA: Transportation Security Administration:
TSO: transportation security officers:
TSOC: Transportation Security Operations Center:
TWIC: Transportation Workers Identification Credential:
US-VISIT: U.S. Visitor and Immigrant Status Indicator Technology:
WHTI: Western Hemisphere Travel Initiative:
United States Government Accountability Office:
Washington, DC 20548:
January 24, 2007:
The Honorable Lamar Smith,
Ranking Minority Member:
Committee on the Judiciary:
House of Representatives:
The Honorable F. James Sensenbrenner, Jr.
House of Representatives:
The terrorist attacks on September 11, 2001, significantly altered the
nation's views on how to secure and protect the people, borders, and
assets of the United States, and dramatically highlighted the need to
take immediate actions to reduce the likelihood of future attacks of
this magnitude taking place on U.S. soil. With the benefit of
hindsight, it is apparent that on 9/11, several areas in particular--
the U.S. commercial aviation system, the federal government's approach
to compiling and managing terrorist watch lists, the nonimmigrant visa
process,[Footnote 1] and mechanisms for screening and recording foreign
travelers entering and exiting the United States--were all shown to be
vulnerable to exploitation by terrorists intent on gaining entry to the
country and wreaking havoc. Clearly, federal action was needed to
address these and other weaknesses in our defenses. The federal
government simply was not prepared for, and did not anticipate, the
ways in which the security measures in place prior to 9/11 would be
defeated. As the National Commission on Terrorist Attacks Upon the
United States (the 9/11 Commission) noted in its 2004 report,[Footnote
2] none of the security measures adopted by the U.S. government prior
to the attacks disturbed or even delayed the progress of the al Qaeda
plot.
In the 5 years since 19 hijackers commandeered four commercial aircraft
and succeeded in destroying the World Trade Center, damaging the
Pentagon, and killing almost 3,000 people, Congress and the
administration have taken a number of actions to realign homeland
security policies, priorities, and resources to help ensure that the 9/
11 scenario could never be repeated. To this end, our government has in
part reorganized by combining vital federal security, immigration, and
investigative capabilities within a new Department of Homeland Security
(DHS). Parallel efforts also were undertaken to transform the
intelligence community in order to provide better information on, and
analysis of, terrorist threats--information that could have serious
implications for aviation, the visa process, and the border screening
and inspection processes undertaken as part of border security.
Since 9/11, Congress and the administration, including many federal
agencies, have increasingly sought to take a longer-term view of
homeland security, recognizing, among other things, that a variety of
transportation and border security initiatives are needed, such as
improving the mechanisms for screening foreign travelers before they
enter the country legally by air, land, or sea ports, and tracking
their entry and exit. More recent efforts by terrorists to disrupt
society--notably, the alleged attempt by terrorists to bring liquid
explosives on board aircraft bound for the United States and terrorist
attacks on passenger rail systems in Madrid and London--have further
highlighted the need for effective information sharing, proactive
planning, and effective risk analysis, in order to identify and
mitigate risks to people, national assets, and economic sectors and
prioritize resources to address them.
In recognition of the fifth anniversary of the 2001 terrorist attacks,
you expressed interest in taking stock of some of the efforts by
Congress, the administration, and many federal agencies--in concert
with state and local governments and the private sector--to identify
the nation's security vulnerabilities in key areas and find ways to
mitigate them to the fullest extent possible. You asked us to draw upon
the growing body of work by us and the Inspectors General that examine
many of the key laws, policies, and practices related to homeland
security in the post-9/11 period to assess how these security policies
and procedures have evolved in response to the actions of the
terrorists. While we recognize that it will never be possible to
anticipate or mitigate every potential security threat, or to close
every gap in our defenses, it is nonetheless important to acknowledge
the critical work that has been done to make the country safer--and,
looking ahead, to discuss how the government intends to identify,
manage, and mitigate risks to domestic security in general, while
continuing to protect privacy and the flow of people and commerce. It
is also important to review security efforts made to date, in light of
Congress' interest in revisiting the recommendations of the 9/11
Commission, including those addressing aviation and border security
challenges, as well as challenges related to sharing homeland security
information. The information contained in this report is derived from a
security sensitive report that we issued in December 2006 on progress
made to address vulnerabilities exposed by 9/11.[Footnote 3] That
report contained detailed information on specific security
vulnerabilities.
This report does not undertake a comprehensive assessment of all
federal initiatives taken or planned in response to 9/11. Rather, we
focus on the progress the nation has made in strengthening or enhancing
the critical layers of defense that either were penetrated by the
terrorist hijackers of 9/11, or which our work or that of the
Inspectors General shows are vulnerable to terrorist exploitation. This
critical layered system of defense identifies points of vulnerability
wherever they exist, and turns them into targets of opportunity for
interdiction. These layers provide a series of independent, overlapping
and reinforcing redundancies--domestically, for example, at airports as
well as land and sea ports of entry, or outside the country, at
consular offices--designed to raise the odds that terrorist activity
can be identified and intercepted. This report focuses primarily on
three main layers of defense--aviation security, visa security, and
border security[Footnote 4]--and to the extent that our body of work
allows, this report also addresses the role that information sharing
has played in keeping federal officials and key stakeholders informed
as these layers of defense are strengthened.
In particular, this report discusses the following: (1) In what ways
has the security of the nation's commercial aviation system been
enhanced since 9/11 to reduce the likelihood that terrorists may carry
out new attacks using aircraft? (2) How have visa-related policies and
programs evolved since 9/11 to help screen out potential terrorists
seeking entry into the United States? (3) How have federal border
security efforts evolved since 9/11 to reduce the likelihood that
terrorists could enter the United States through legal checkpoints? (4)
What are the major strategic challenges facing Congress, DHS, and other
federal agencies as the post-9/11 era progresses and decisions are made
about prioritizing efforts and allocating finite resources to further
enhance homeland security?
The overall scope of our review reflects the national layers of defense
in place on 9/11, which the terrorists exploited, and other areas with
recognized vulnerabilities and security weaknesses where federal
actions have been taken and for which we have a body of work.
Specifically, the scope of our work encompassed an extensive review of
work published by us and others on the conditions leading up to and the
actions taken after 9/11 by Congress and federal departments--the
departments of Homeland Security, State, and Justice--which now have
primary responsibility for establishing and maintaining key layers of
national defense (aviation, the visa process, and our borders)
exploited by the 9/11 hijackers. To perform our analyses for all the
research questions, we reviewed the findings, conclusions, and
recommendations from GAO reports, testimonies, and other issued
products on security policies and procedures prior to and after 9/11.
This review included GAO's work on aviation security, the visa issuance
process, and border security initiatives, as well as information on the
development and consolidation of federal terrorist watch lists and how
this and other sensitive information has been shared among federal
agencies, including the Department of Homeland Security, and
appropriate state and local personnel, such as law enforcement agencies
and private air carriers. We also analyzed our preliminary results from
ongoing work related to homeland security that was being conducted at
the time of this review (i.e., work that we had under way but had not
yet issued) on international aviation passenger prescreening, the U.S.
Visitor and Immigrant Status Indicator Technology (US-VISIT) border
security program, and more. In addition to GAO's work, we analyzed
reports and testimonies issued after 9/11 by the Inspectors General for
the departments of State, Justice, and Homeland Security and the
findings of reports and testimonies issued by the 9/11 Commission.
We reviewed key legislation enacted after 9/11, including (but not
limited to) the Aviation and Transportation Security Act,[Footnote 5]
the Homeland Security Act of 2002,[Footnote 6] the Enhanced Border
Security and Visa Entry Reform Act of 2002,[Footnote 7] and the
Intelligence Reform and Terrorism Prevention Act of 2004;[Footnote 8]
presidential directives, including (but not limited to) Homeland
Security Presidential Directive 6 (HSPD-6) on terrorist identification,
screening, and tracking and HSPD-7 on critical infrastructure
protection responsibilities; and executive orders. In addition to our
documentary analysis, we interviewed senior officials at the
departments of State and Homeland Security to obtain current
information on progress made to implement selected recommendations we
had made, and other actions under way by the departments at the time of
our review to enhance security in the areas we were addressing--
aviation, visa, and border security.
We recognize that there are significant factors that contributed to the
terrorists' ability to complete their acts that Congress and the
administration have been addressing since 9/11, which we do not discuss
in depth in this report. These include vulnerabilities in available
intelligence, terrorist financing mechanisms, and the domestic
counterterrorism infrastructure in place to address threats within U.S.
borders, among others. Nor does our review reflect activities or
initiatives not directly related either to strengthening homeland
security or to the 9/11 response; thus our review excludes
consideration of initiatives aimed at facilitating travel convenience,
such as "trusted traveler" programs[Footnote 9] and implementation of a
redress process to remedy the problem associated with passengers
misidentified on terrorist watch lists. See appendix III for a list of
products issued by GAO and the office of Inspectors General within the
departments of Homeland Security, State, and Justice related to the
events of 9/11 and homeland security; many of these products are
referred to in this report.
Our work was conducted from September 2005 through October 2006 in
accordance with generally accepted government auditing standards.
Results in Brief:
While the nation cannot expect to eliminate all future risks of
terrorist attacks upon commercial aviation, in the 5 years since the
attacks of September 11, 2001, progress has been made toward reducing
the aviation-related vulnerabilities and enhancing the layers of
defense directly exploited by the terrorist hijackers. Nevertheless,
federal agencies continue to face the challenge of identifying and
addressing the security risks inherent in the nation's commercial
aviation system, which plays a vital role in the nation's economy,
ferries millions of passengers around the world on a daily basis, and
remains a highly visible target for terrorism. DHS and other federal
departments are still working to implement congressional requirements
and recommendations by us, the 9/11 Commission, and others to address
known security weaknesses in commercial aviation and bolster security-
related policies and programs already in place. On the positive side,
at the direction of the President and the Congress, DHS and other
federal departments have taken actions resulting in better airline
passenger screening procedures that help to identify and prevent known
or suspected terrorists, weapons, and explosives from being allowed
onto aircraft. For example, since 9/11, domestic airline passenger
prescreening procedures--whereby passengers who may pose a security
risk are identified before boarding aircraft--have been enhanced
through an identity-matching process that compares prospective
passengers' names against an expanded list of terrorist suspects
extracted from a consolidated terrorist watch list. This presecreening
process has also been enhanced by requiring certain passengers to
undergo greater scrutiny prior to boarding. But TSA has not yet met a
congressional requirement that it take over responsibility for the
passenger identity-matching process from domestic air carriers, in part
to improve accuracy in the matching process and to end disclosure of
sensitive information on possible terrorists to air carriers. We have
recommended that TSA take numerous steps to help meet this requirement
and we are monitoring their efforts. Passengers on international
flights departing from or traveling to the United States undergo
prescreening by DHS's U.S. Customs and Border Protection (CBP).
However, this process poses challenges because these flights are
allowed to take off before the passenger identity-matching process has
been completed by CBP. Such flights therefore remain vulnerable to a
terrorist take-over and other risks. CBP is working to address the
problem, but a solution has not yet been implemented. We have recently
recommended that DHS make key policy and technical decisions necessary
to more fully coordinate CBP's international prescreening program with
TSA's prospective domestic prescreening program. With respect to
passenger checkpoint screening--the physical screening of passengers
and their carry-on bags--we have reported that TSA has met
congressional mandates related to deploying its federal aviation
security workforce and establishing passenger screening operations at
over 400 commercial airports. Moreover, passenger checkpoint screening
operations have been enhanced with the aid of technology and more
rigorous hands-on screening practices, among other things, in order to
aid in detecting prohibited items. But as we have also reported, it is
important that TSA continue to invest in and develop technologies for
better detecting existing and emerging threats involving explosives.
This is especially important in light of the alleged August 2006 plot
to detonate liquid explosives on board multiple commercial aircraft
bound for the United States from the United Kingdom. DHS and TSA have
also taken actions to improve the layers of aviation defense not
directly implicated in the 9/11 attacks. For instance, 100 percent of
airline passengers' checked baggage is now screened, compared to just a
fraction before 9/11, and TSA is seeking more cost-effective ways to
deploy baggage screening systems at airports for detecting explosives.
It is important to note that in light of the nature of the 9/11
attacks, priority federal attention was initially given to aviation
security. Therefore, efforts to improve the security of other
transportation modes--without losing sight of ongoing needs in
aviation--have not progressed to the same extent. TSA and other federal
agencies, including the Department of Transportation and the U.S. Coast
Guard, have begun to conduct risk assessments within specific
transportation modes, including aviation, passenger rail, maritime, and
surface transportation in order to better identify critical assets and
to prioritize and allocate finite security resources for protecting
these assets. However, as we have reported, these efforts are not
complete. DHS and other federal agencies have also recognized the
importance of coordinating security-related priorities and activities
with domestic and international stakeholders and are taking steps to
enhance such cooperation. For example, in response to our
recommendation to evaluate foreign passenger rail security practices
not currently in use in the United States, TSA is working with foreign
counterparts in order to share and glean best practices.
While it is generally acknowledged that the visa process can never be
entirely failsafe, the government has done a creditable job overall
since 9/11 in strengthening the visa process as a first line of defense
to prevent entry into the country by terrorists. Because citizens of
other countries seeking to enter the United States on a temporary basis
generally must apply for and obtain a nonimmigrant visa, the visa
process is important to homeland security. Before 9/11, U.S. visa
operations focused primarily on illegal immigration concerns--whether
applicants sought to reside and work illegally in the country. Since
the attacks, Congress, the State Department, and DHS have implemented
several measures to strengthen the entire visa process as a tool to
combat terrorism. New policies and programs have since been implemented
based, in part, on our recommendations to enhance visa security,
improve applicant screening, provide counterterrorism training to
consular officials who administer the visa process overseas, and help
prevent the fraudulent use of visas for those seeking to gain entry to
the country. For example, the number of records available to check the
identities of visa applicants against the consolidated terrorist watch
list and criminal records was expanded fivefold by the State Department
and other agencies between 2001 and 2005. The State Department also has
taken steps to mitigate the potential for visa fraud at consular posts
by deploying visa fraud investigators to U.S. embassies and consulates
and conducting more in-depth analysis of the visa information collected
by consulates to identify patterns that may indicate fraud, among other
things. (Notably, 2 of the 19 terrorist hijackers on 9/11 used
passports that were manipulated in a fraudulent manner to obtain
visas.) State Department and DHS officials acknowledge that, while such
actions have been beneficial, another type of visa process--
specifically, immigrant visas issued to those seeking to reside
permanently in the United States--may pose security risks, and we have
recently begun a review to identify and analyze these potential
security risks.
Enhancing security and screening at legal checkpoints at the nation's
borders has been and remains a daunting task, and our work and that of
others indicates that DHS and other agencies continue to need to
identify and address security risks at air, land, and sea ports--
critical layers of defense that came under heightened scrutiny after
9/11. One area where security risks remain a challenge is the Visa
Waiver Program, which enables citizens from 27 countries to travel to
the United States without a visa for business or tourism for 90 days or
less. This program carries inherent security, law enforcement, and
illegal immigration risks. For example, by design, visa waiver
travelers are not subject to the same degree of screening as travelers
who must first obtain visas. Convicted 9/11 terrorist Zacarias
Moussaoui is among those who carried a passport issued by a visa waiver
country. Moreover, lost and stolen passports from visa waiver countries
are valuable travel documents for terrorists, criminals, and others who
are seeking to hide their true identities to gain entry into the
country. Congress, DHS's Office of Inspector General, and we have
played a role in DHS's efforts to address these challenges in the
context of strengthening border security. Since 2003, DHS has
intensified its oversight of visa waiver countries to ensure they
comply with the program's statutory requirements, but we have reported
that because of staffing challenges, such oversight may not be
performed consistently to ensure compliance, and we recently
recommended that additional resources be provided for such oversight.
To mitigate the misuse of lost or stolen passports--which experts
consider the greatest security problem posed by the Visa Waiver
Program--DHS provides additional training for CBP officers in
fraudulent document detection, and starting on October 26, 2005,
passports of visa waiver travelers issued on or after that date, and
until October 25, 2006 have to contain a digital photograph as an
antifraud measure. Passports issued to visa waiver travelers after
October 25, 2006, must be electronic (e-passports). We have recently
recommended that DHS take additional steps to mitigate the risks from
lost or stolen passports, including requiring all visa waiver countries
to provide the United States and Interpol[Footnote 10] (an
international police organization) with data on lost or stolen issued
passports as well as blank passports; some visa waiver countries have
been reluctant to provide this information. Finding ways to address
these and other challenges will be important, given that many countries
are actively seeking admission into the program.
Separately, a border security initiative known as US-VISIT is intended
to serve as a comprehensive system for integrating data on the entry
and exit, and verifying the identity, of most foreign travelers coming
through the nation's air, land, and sea ports, to mitigate the
likelihood that terrorists or criminals can enter or exit at will, or
that persons stay longer than authorized. Our work indicates that US-
VISIT faces operational and strategic challenges. DHS has made
considerable progress installing the entry portion of this system,
which allows CBP border officers to verify travelers' identities by,
among other things, scanning and comparing digital fingerprints and
photographs, and checking biographic information against various
federal databases, including the consolidated terrorist watch list. But
Congress' goal for US-VISIT--to record the entry, reentry, and exit of
travelers, including those who overstay their authorized stay--has not
been fully achieved. According to DHS, an exit capability using
comparable biometric scanning tools is not yet technologically
feasible, would be very costly, and is not likely to be developed or
deployed for up to 10 years. Without such a capability, the government
cannot provide certainty that persons exiting the country are the same
as those entering--and thus cannot determine which visitors have
overstayed their authorized stay. We recently recommended that, among
other things, DHS should finalize a mandated report to Congress
describing how a comprehensive biometrically based entry and exit
system would work in order to achieve US-VISIT's intended goals.
Agencies need to address other border-related vulnerabilities as well.
For example, CBP, along with the departments of Energy, Defense, and
State, have taken steps to combat the smuggling of hazardous materials
and cargo at ports of entry through use of better radiation detection
equipment and inter-agency coordination, among other things. But our
undercover investigators were nonetheless able within the last year to
purchase and bring radioactive material across the border due to
weaknesses in federal regulations governing the suppliers of such
materials and the failure of CBP officers to detect counterfeit
documentation presented during the border inspection process. In
response to our work, officials with the Nuclear Regulatory Commission
told us that they are aware of the potential problems with counterfeit
documentation and are working to resolve these issues. While it may
never be possible to ensure that terrorists, criminals, or those
violating immigration laws are prevented from entering the country, DHS
and other agencies must remain vigilant in developing and implementing
programs and policies designed to reduce breaches in national borders
and ensure that potential terrorists, as well as hazardous cargo, are
interdicted.
The aviation and border security vulnerabilities exploited by the 9/11
terrorists--and terrorist threats that have come to light since--
underscore the need for continued vigilance and for ensuring that
federal agencies, the private sector, and other stakeholders coordinate
their efforts, and deploy their resources, as strategically and cost
effectively as possible. While much has been accomplished to mitigate
specific risks from terrorism, Congress, DHS, and other federal
agencies nevertheless continue to face an array of strategic challenges
that potentially affect oversight and execution of the efforts that are
under way or planned to enhance homeland security in the wake of 9/11
and new terrorist threats. Choosing an appropriate course of action
going forward--setting priorities and making trade-offs, allocating
resources, and assessing the social and economic costs of the measures
that may be taken governmentwide--is not easy, but is nonetheless
essential. One of the most important of these strategic challenges
involves improving the sharing of information related to terrorism--a
major acknowledged weakness at the time of 9/11. As a member of the 9/
11 Commission noted, for example, information collected about terrorist
suspects by the CIA and FBI at the time of the attacks was not shared
with the Federal Aviation Administration (FAA). We designated
information sharing for homeland security as a governmentwide high-risk
area in 2005--meaning an area that needs urgent attention and
transformation to ensure that our national government functions in the
most economical, efficient, and effective manner possible. Responding
to the lessons of 9/11, Congress and federal departments have taken
steps to improve information sharing across the federal government and
in conjunction with state and local governments and law enforcement
agencies. For example, as we have reported, a consolidated terrorism
watch list has been created and more broadly shared among key federal
agencies to provide information that can be used to identify terrorists
traveling to and within the United States. In addition, the FBI has
increased its field-based joint terrorism task forces that bring
together personnel from all levels of government to combat terrorism by
sharing information and resources. And DHS has implemented homeland
security information networks to share relevant information with states
and localities. But the government continues to face significant
information-sharing challenges. For example, Congress has required
establishing an information sharing environment that would combine
policies, procedures, and technologies that link people, systems, and
information among all appropriate federal, state, local, and tribal
entities and the private sector. We have recommended that in planning
for this environment, responsible officials identify and address
barriers posed by resource needs, among other things.
A second strategic challenge facing the nation involves the application
of a risk management framework that requires, at the highest level, the
balancing of security concerns against other needs, given finite
resource levels. Such a framework is needed as a way to consider how
much the nation can afford to spend for security improvements in light
of other, competing demands for limited funds, such as increasing costs
of health care, Social Security, and other domestic problems. In our
January 2005 report on high-risk areas in the federal government,we
noted the importance of completing comprehensive national threat and
risk assessments to guide and prioritize investment decisions--and
noted risk management as an emerging area of concern. Much is also at
stake when decisions are made about how to allocate limited resources
across a large number of programs in multiple agencies. DHS is still in
the early stages of adopting a risk-based strategic framework for
making important resource decisions involving billions of dollars
annually. In part, this is because the process is difficult and
complex; requires comprehensive information on risks and
vulnerabilities; and employs sophisticated assessment methodologies.
The process also requires careful trade-offs that balance security
concerns against other needs. With its fiscal year 2007 budget of about
$35 billion, DHS has begun conducting risk assessments at individual
infrastructure facilities and allocating grants based on risk criteria.
But the agency has not completed all of the necessary risk assessments
mandated by the Homeland Security Act to set priorities to help focus
its resources where most needed. We have made numerous recommendations
in these areas, which DHS is in the process of implementing.
Finally, DHS faces significant management and organizational
transformation challenges as it works to protect the nation from
terrorism and implement effective risk management policies. As we have
noted, DHS must continue to integrate approximately 180,000 employees
from 22 originating agencies, consolidate multiple management systems
and processes, and transform into a more effective organization with
robust planning, management, and operations. For these reasons, we
continue to designate the implementation and transformation of the
department as high risk (meaning an area requiring urgent attention),
and will continue to monitor and report on its progress. While national
needs to reduce vulnerabilities suggest a rapid organization of
homeland security functions, we recognize that such dramatic
transitions of agencies and programs, as well as the breadth and scope
of management support functions that need to be incorporated into the
new department, are likely to take time to achieve. We should not
expect this effort to be easy or the path forward to be smooth. These
activities will require sustained management commitment--and continued
involvement, support, and oversight by Congress.
Because DHS and other federal agencies are continuing to improve their
processes and practices based on many past recommendations by us, the
Inspectors General, and others, we are not making new recommendations
in this report. For example, we have made over 75 recommendations on
aviation security, including actions to enhance the security and
improve coordination of airline passenger and checked baggage screening
procedures for domestic flights; the Visa Waiver Program, including
actions to improve program oversight and mitigate program risks through
additional resources and enhanced inter-governmental cooperation; and
border screening and inspection processes, including actions need to
complete the US-VISIT entry and exit system for foreign travelers, and
more. Continued monitoring of these and related areas by us will
determine whether further recommendations are warranted.
We provided DHS and State with a draft of this report for review and
comment. Both agencies generally agreed with the information in the
report, and both provided technical comments, which we incorporated as
appropriate. In addition, DHS provided clarification in two areas. In
response to our assertion that the department has not completed all of
the necessary risk assessments mandated by the Homeland Security Act of
2002, DHS stated that the act did not specify how many of such
assessments were to be completed. DHS also noted that it believes it
has made considerable progress by working on vulnerability assessment
methodologies across different economic sectors and by providing tools
to public and private sector partners to help identify and mitigate
vulnerabilities that had been identified. In response to our reference
to a DHS Office of Inspector General report that found that DHS had not
yet created a comprehensive national inventory of critical
infrastructure assets, DHS stated that it remains committed to
developing this tool as an evolving, comprehensive catalog of assets
that comprise the nation's infrastructure and that support risk
analysis. DHS's comments appear in appendix IV. The State Department
did not provide formal written comments.
Background:
Overview of Key Legislation Enacted After 9/11 Related to Aviation and
Border Security:
After the attacks of September 11, 2001, Congress and the President
enacted several new laws intended to address many of the
vulnerabilities exploited by the terrorists by strengthening layers of
defense related to aviation and border security. A summary of key
legislative efforts follows.
To strengthen transportation security, the Aviation and Transportation
Security Act (ATSA)[Footnote 11] was signed into law on November 19,
2001, with the primary goal of strengthening the security of the
nation's aviation system. To this end, ATSA created the Transportation
Security Administration (TSA) as an agency within the Department of
Transportation (DOT) with responsibility for securing all modes of
transportation, including aviation.[Footnote 12] ATSA included numerous
requirements with deadlines for TSA to implement that were designed to
strengthen the various aviation layers of defense. For example, ATSA
required TSA to create a federal workforce to assume the job of
conducting passenger and checked baggage screening from air carriers at
commercial airports.[Footnote 13] The act also gave TSA regulatory
authority over all transportation modes.
After ATSA was enacted, the Homeland Security Act of 2002 consolidated
most federal agencies charged with providing homeland security,
including securing our nation's borders, into the newly formed
Department of Homeland Security (DHS), which was created to improve,
among other things, coordination, communication, and information
sharing among the multiple federal agencies responsible for protecting
the homeland.
Legislation also was enacted to enhance various aspects of border
security. The Homeland Security Act, for example, generally grants DHS
exclusive authority to issue regulations on, administer, and enforce
the Immigration and Nationality Act and all other immigration and
nationality laws relating to the functions of U.S. consular officers in
connection with the granting or denial of visas. The Homeland Security
Act authorized DHS, among other things, to assign employees to U.S.
embassies and consulates to provide expert advice and training to
consular officers regarding specific threats related to the visa
process.[Footnote 14]
New legislation also was enacted that contained provisions affecting a
major border security initiative that had begun prior to 9/11--a system
for integrating data on the entry and exit of certain foreign nationals
into and out of the United States, now known as US-VISIT (U.S. Visitor
and Immigrant Status Indicator Technology). In 2001, the USA PATRIOT
Act provided that, in developing this integrated entry and exit data
system, the Attorney General (now Secretary of Homeland Security) and
Secretary of State were to focus particularly on the utilization of
biometric technology (such as digital fingerprints) and the development
of tamper-resistant documents readable at ports of entry (either a
land, air, or sea border crossing associated with inspection and
admission of certain foreign nationals).[Footnote 15] It also required
that the system be able to interface with law enforcement databases for
use by federal law enforcement to identify and detain individuals who
pose a threat to the national security of the United States. In
addition, the Enhanced Border Security and Visa Entry Reform Act of
2002[Footnote 16] required that, in developing the integrated entry and
exit data system for ports of entry, the Attorney General (now
Secretary of Homeland Security) and Secretary of State implement, fund,
and use the technology standard that was required to be developed under
the USA PATRIOT Act at U.S. ports of entry and at consular posts
abroad. The act also required the establishment of a database
containing the arrival and departure data from machine-readable visas,
passports, and other travel and entry documents possessed by aliens and
the interoperability of all security databases relevant to making
determinations of admissibility under section 212 of the Immigration
and Nationality Act. (For additional information on legislative
requirements related to US-VISIT, see GAO, Border Security: US-VISIT
Faces Strategic, Technological, and Operational Challenges at Land
Ports of Entry, GAO-07-248 [Washington, D.C.: December 2006]).
In December 2004, the Intelligence Reform and Terrorism Prevention Act
of 2004[Footnote 17] was enacted, containing provisions designed to
address many of the transportation and border security vulnerabilities
identified, and recommendations made by the 9/11 Commission. It
included provisions designed to strengthen aviation security,
information sharing, visa issuance, border security, and other areas.
For example, the act mandated that TSA develop a passenger prescreening
system that would compare passenger information for domestic flights to
government watch list information, a function that was at the time, and
still is, being performed by air carriers. The act also required the
development of risk-based priorities across all transportation modes
and a strategic plan describing roles and missions related to
transportation security for encouraging private sector cooperation and
participation in the implementation of such a plan. In addition, the
act required DHS to develop and submit to Congress a plan for full
implementation of US-VISIT as an automated biometric entry and exit
data system and required the collection of biometric exit data for all
individuals required to provide biometric entry data.
Overview of Key Presidential Policy Directives Issued After 9/11
Related to Aviation and Border Security:
In an effort to increase homeland security following the terrorist
attacks on the United States, President Bush issued the National
Strategy for Homeland Security in July 2002. The strategy sets forth
overall objectives to prevent terrorist attacks within the United
States, reduce America's vulnerability to terrorism, minimize the
damage and assist in the recovery from attacks that may occur. The
strategy is organized into six critical mission areas, including (for
purposes of this report) one on border and transportation security. For
this mission area, in particular, the strategy specified several
objectives, including ensuring the integrity of our borders and
preventing the entry of unwanted persons into our country. To
accomplish this, the strategy provides for, among other things, reform
of immigration services, large-scale modernization of border crossings,
and consolidation of federal watch lists. It also acknowledges that
accomplishing these goals will require overhauling the border security
process.
The President has also issued 16 homeland security presidential
directives (HSPD), in addition to the strategy that was issued in 2002,
providing additional guidance related to the mission areas outlined in
the National Strategy. For example, HSPD-6 sets forth policy related to
the consolidation of the government's approach to terrorism screening
and provides for the appropriate and lawful use of terrorist
information in screening processes. HSPD-11 builds upon this directive
by setting forth the nation's policy with regard to comprehensive
terrorist-related screening procedures through detecting, identifying,
tracking, and interdicting people and cargo that pose a threat to
homeland security, among other things. Additionally, HSPD-7 establishes
a national policy for federal departments and agencies to identify and
prioritize critical infrastructure and key resources and to protect
them from terrorist attacks. (For additional information on the
National Strategy for Homeland Security and related presidential
directives, see GAO, Homeland Security: Agency Plans, Implementation,
and Challenges Regarding the National Strategy for Homeland Security,
GAO-05-33 [Washington, D.C.: January 2005]).
Overview of Key Federal Security-Related Roles and Responsibilities in
Post-9/11 Era:
The federal departments with primary security-related responsibilities
for aviation and border security after 9/11--the frontline departments
providing key layers of defense--which are included in this report are
shown in figure 1.
Figure 1: Selected Federal Departments and Agencies with Security
Responsibilities:
[See PDF for image]
Source: GAO.
[End of figure]
Aviation Security: TSA Has Operational Responsibility for Passenger and
Baggage Screening, and Regulatory Responsibility for Air Cargo and
Airport Security:
The terrorist attacks of September 11, 2001, became the impetus for
change in both the way in which airline passengers are screened and the
entities responsible for conducting the screening. With the passage of
ATSA, TSA assumed responsibility for civil aviation security from the
Federal Aviation Administration (FAA), and for passenger and baggage
screening from the air carriers.[Footnote 18] As part of this
responsibility, TSA oversees security operations at the nation's more
than 400 commercial airports, including passenger and checked baggage
screening operations. One of the most significant changes mandated by
ATSA was the shift from the use of private-sector screeners to perform
airport screening operations to the use of federal screeners. Prior to
ATSA, passenger and checked baggage screening had been performed by
private screening companies under contract to airlines. ATSA required
TSA to create a federal workforce to assume the job of conducting
passenger and checked baggage screening at commercial airports. The
federal workforce was in place, as required, by November 2002. While
TSA took over responsibility for passenger checkpoint and baggage
screening, air carriers have continued to conduct passenger
prescreening (the process of checking passengers' names against federal
watch list data at the time after an airline reservation is made). As
noted above, the Intelligence Reform and Terrorism Prevention Act
requires that TSA take over this responsibility from air carriers.
In addition to establishing requirements for passenger and checked
baggage screening, ATSA charged TSA with the responsibility for
ensuring the security of air cargo. TSA's responsibilities include,
among other things, establishing security rules and regulations
covering domestic and foreign passenger carriers that transport cargo,
domestic and foreign all-cargo carriers, and domestic indirect air
carriers--carriers that consolidate air cargo from multiple shippers
and deliver it to air carriers to be transported; and overseeing
implementation of air cargo security requirements by air carriers and
indirect air carriers through compliance inspections. In general, TSA
inspections are designed to ensure air carrier compliance with air
cargo security requirements, while air carrier inspections focus on
ensuring that cargo does not contain weapons, explosives, or stowaways.
ATSA also granted TSA the responsibility for overseeing U.S. airport
operators' efforts to maintain and improve the security of airport
perimeters, the adequacy of controls restricting unauthorized access to
secured areas, and security measures pertaining to individuals who work
at airports. While airport operators, not TSA, have direct day-to-day
operational responsibilities for these areas of security, ATSA directs
TSA to improve the security of airport perimeters and the access
controls leading to secured airport areas, as well as take measures to
reduce the security risks posed by airport workers.
Border Security: State Department and DHS's Customs and Border
Protection Have Primary Responsibility for Visa Management and Border
Inspection:
Our nation's current border security process is intended to control the
entry and exit of foreign nationals seeking to enter or remain in the
United States as well as prevent hazardous cargo or materials from
being transported into the country. The primary federal agencies
involved in this effort are the Department of State's Bureau of
Consular Affairs and DHS's Customs and Border Protection (CBP) and U.S.
Immigration and Customs Enforcement (ICE).
Managing and Administering the Visa Process:
The first layer of border security begins at the State Department's
overseas consular posts, where State's consular officers are to
adjudicate visa applications for foreign nationals who wish to enter
the United States. In deciding to approve or deny a visa, consular
officers are on the front line of defense in protecting the United
States against potential terrorists and others whose entry would likely
be harmful to U.S. national interests. Consular officers must balance
this security responsibility against the need to facilitate legitimate
travel. The process for determining who will be issued or refused a
visa contains several steps, including documentation reviews, in-person
interviews, collection of biometrics (fingerprints), and cross-
referencing an applicant's name against a name-check database that
includes the names of visa applicants to identify terrorists and other
aliens who are potentially ineligible for visas based on criminal
histories or other reasons specified by federal statute. In addition,
State provides guidance, in consultation with DHS, to consular officers
regarding visa policies and procedures and has the lead role with
respect to foreign policy-related visa issues. While State manages the
visa process, DHS is responsible for establishing visa policy,
reviewing implementation of the policy, and providing additional
direction. In addition, DHS had designated ICE to oversee efforts to
review applications and provide expert advice and training to consular
officers regarding specific threats related to the visa process at
certain overseas posts.
Border Screening and Inspection Processes for Ports of Entry:
CBP is responsible for conducting immigration and customs inspections
for aliens entering the United States at official border crossings
(air, land, and sea ports of entry). CBP enforces immigration laws by
screening and inspecting international travelers who enter the country
through ports of entry. As part of this process, CBP officers verify
travelers' identities through inspection of travel documents, screen
travelers against terrorist watch lists, and scan or enter passport
data into databases to verify travelers' identities. CBP also is
responsible for conducting customs-related inspections of cargo at
ports of entry and for ensuring that all goods entering the United
States do so legally. In addition, CBP conducts prescreening of
passengers on international flights bound for or departing from the
United States. Specifically, CBP reviews biographical data and passport
numbers provided by air carriers and conducts queries against terrorist
watch lists and law enforcement and immigration databases to determine
whether any passengers are to be referred to secondary inspection
(whereby passengers are selected for more in-depth review of their
identity and documentation) prior to the arrival of the aircraft at a
U.S. port of entry.
Federal Use of the Terrorist Watch List to Enhance Aviation and Border
Security:
The consolidated terrorist watch list is an important tool used by
federal agencies to help secure our nation's borders. This list
provides decision makers with information about individuals who are
known or suspected terrorists, so that these individuals can either be
prevented from entering the country, apprehended while in the country,
or apprehended as they attempt to exit the country. After 9/11, various
government watch lists were consolidated into one watch list, which is
maintained by the FBI's Terrorist Screening Center (an entity that has
been operational since December 2003 under the administration of the
FBI).[Footnote 19] The consolidated watch list maintained by the center
is the U.S. government's master repository for all known and suspected
international and domestic terrorist records used for watch list-
related screening. The consolidated watch list is an important homeland
security tool used by federal frontline screening agencies, including
the departments of State, Justice, and Homeland Security. Based upon
agency-specific policies and criteria, relevant portions of the
consolidated watch list can be used in a wide range of security-related
screening procedures. For instance, air carriers and CBP use subsets of
the consolidated watch list to prescreen passengers; State Department
consular officers use the information in the visa application process;
CBP officers use watch list data as part of the visitor inspection
process at ports of entry, and state and local law enforcement officers
use watch list data to screen apprehended individuals during traffic
stops and for other purposes.
Assessing and Managing Homeland Security Risks Using a Risk Management
Approach:
In recent years, we, along with Congress (most recently through the
Intelligence Reform and Terrorism Prevention Act of 2004); the
executive branch (e.g., in presidential directives); and the 9/11
Commission have required or advocated that federal agencies with
homeland security responsibilities utilize a risk management approach
to help ensure that finite national resources are dedicated to assets
or activities considered to have the highest security priority. We have
concluded that without a risk management approach, there is limited
assurance that programs designed to combat terrorism are properly
prioritized and focused. Thus, risk management, as applied in the
homeland security context, can help to more effectively and efficiently
prepare defenses against acts of terrorism and other threats. A risk
management approach entails a continuous process of managing risk
through a series of actions, including setting strategic goals and
objectives, performing risk assessments, evaluating alternative actions
to reduce identified risks by preventing or mitigating their impact,
selecting actions to undertake by management, and implementing and
monitoring those actions.
Stronger Layered Defenses for Aviation Security in Place, Though We
Reported More Needs to Be Done to Enhance Passenger Screening
Operations and Security of Other Transportation Modes:
TSA and other agencies have taken steps to strengthen the various
layers of commercial aviation defense--including passenger prescreening
(conducted after a reservation is made), passenger checkpoint screening
(conducted once passengers are at the airport and proceeding to the
gate with any carry-on bags), and in-flight security-
-that were exploited by the hijackers on 9/11. Many of the
vulnerabilities related to these areas have been addressed through new
legislation passed by Congress and policies and procedures taken by
various federal agencies, though opportunities exist for additional
improvements. For example, passengers selected for additional screening
after they make their airline reservations receive greater scrutiny
prior to boarding, but we have reported that more work is needed to
help ensure the process for identifying passengers who are selected
results in accurate identification, and TSA has yet to take full
responsibility for this process, as mandated. In other areas, passenger
checkpoint screening procedures and technologies have been enhanced to
aid in detecting prohibited items, and security measures for preparing
or responding to in-flight on-board threats, and coordinating responses
from the ground, have been strengthened. In addition, other layers of
defense in our aviation system have been strengthened, such as checked
baggage and air cargo screening, though challenges remain. In baggage
screening, for example, while TSA now screens 100 percent of checked
baggage using explosive detection systems, enhancing the effectiveness
of current baggage screening technologies--and finding the most cost-
effective approaches for deploying baggage screening systems to detect
explosives--remains challenging. Finally, because we cannot afford to
protect everything against all threats in the post-9/11 era, choices
must be made about targeting security priorities. Thus, great care
needs to be taken to assign available resources to address the greatest
risks, along with selecting those strategies that make the most
efficient and effective use of resources--within aviation as well as
among other transportation security modes, such as passenger rail and
maritime industries. TSA and other federal agencies have begun focusing
on identifying and prioritizing security needs in these and other areas
using a risk-based approach to guide security-related decision making.
In addition, efforts are under way to enhance cooperation with domestic
and international partners on a broad array of security concerns.
While Many of the Aviation Vulnerabilities of 9/11 Have Been Addressed,
TSA and Other Agencies Continue Efforts to Further Strengthen Aviation
Security:
At the time of the 9/11 attacks, federal and airline industry rules for
commercial airline travel reflected a system that sought to balance
security concerns with the need to facilitate consumer travel and
manage growing demand. The events of that day revealed many ways in
which more stringent security measures were needed for a commercial
aviation system that was evidently vulnerable to terrorism. In
particular, the nation's layered system of defense for aviation--
including passenger prescreening, passenger checkpoint screening, and
in-flight security measures--were not designed to stop the terrorist
hijackers from boarding and taking control of the aircraft. A review of
aviation security conditions in place prior to 9/11, and the many
federal actions taken since then to mitigate the known vulnerabilities,
suggest that we have come a long way toward making air travel safer.
That said, our work, and that of others, has identified additional
actions that are needed to resolve strategic and operational barriers
to further enhance the layers of defense for the nation's aviation
system.
Domestic Airline Passenger Prescreening Procedures Have Been Enhanced
but We Have Reported That More Work Is Needed to Help Ensure Accuracy
in Matching Passengers' Identities against Terrorist Watch Lists:
The prescreening of passengers--the process of identifying passengers
who may pose a security risk before they board an aircraft--is an
important first layer of defense that is intended to help officials
focus security efforts on those passengers representing the greatest
potential threat. At the time of the attacks, the passenger
prescreening process was made up of two components performed by air
carriers in conjunction with FAA: (1) a process to compare passenger
names with names on a government-supplied terrorist watch list (i.e.,
the identity-matching process); and (2) a computer-assisted
prescreening system that was used to select passengers requiring
additional scrutiny. With respect to the first of these passenger
prescreening components, after passengers made their airline
reservations, the air carriers used the information passengers had
provided (such as name and address) to check them against a no-fly
list--a government watch list of persons who were considered by the FBI
to be a direct threat to U.S. civil aviation, and which was distributed
to the U.S. air carriers by FAA. None of the 19 hijackers who purchased
their airline tickets for the four 9/11 flights in a short period at
the end of August 2001 using credit cards, debit cards, or cash, was on
the no-fly list. This list contained the names of just 12 terrorist
suspects; the information for the no-fly list came from one source, the
FBI. Other government lists in place at the time contained the names of
many thousands of known and suspected terrorists--but were not used to
prescreen airline passengers.
In the aftermath of the terrorist attacks, the federal government
recognized that effective prescreening of airline passengers largely
depended on obtaining accurate, reliable, and timely information on
potential terrorists and gave priority attention to, among other
things, developing more comprehensive and consolidated terrorist watch
lists. In response, in part, to recommendations by us,[Footnote 20]
government watch lists were subsequently consolidated into a terrorist
screening database--also known as the consolidated watch list--
maintained by the FBI's Terrorist Screening Center.[Footnote 21] The
consolidated watch list maintained by the center is the U.S.
government's master repository for all known and suspected
international and domestic terrorist records used for watch list-
related screening. This watch list database contains records from
several sources, including the FBI's list of terrorist organizations
and information from the intelligence community on the identity of any
known terrorists with international ties.[Footnote 22] For aviation
security purposes, a portion of this consolidated watch list is
exported by the Terrorist Screening Center and incorporated into TSA's
no-fly and selectee lists.[Footnote 23] (While according to TSA,
persons on the no-fly list should be precluded from boarding an
aircraft bound for, or departing from, the United States, any person on
the selectee list is to receive additional screening before being
allowed to board.) TSA provides updated lists to air carriers for use
in prescreening passengers and provides assistance to air carriers in
determining whether passengers are a match with persons on the lists.
As of June 2006, the number of records in the consolidated watch list
that had been extracted for the no-fly and selectee lists had been
increased significantly (up from 12 records available on 9/
11).[Footnote 24]
With respect to the second component of passenger prescreening, a
computer-assisted prescreening system was in place on 9/11, in which
data related to a passenger's reservation and travel itinerary were
compared by the air carriers against behavioral characteristics used to
identify passengers who appeared to pose a higher than normal risk, and
who therefore would be selected for additional security attention prior
to their flights.[Footnote 25] While nine of the 9/11 terrorists were
selected for additional scrutiny by the air carriers' computer-assisted
prescreening process, there was little consequence to their selection
because, at the time, selection only entailed having one's checked
baggage screened for explosives or held off the airplane until one had
boarded; it was not geared toward identifying the weapons and tactics
used by the hijackers.[Footnote 26] The consequences of selection
reflected the view that non-suicide bombing was the most substantial
risk to domestic aircraft and were designed to identify individuals who
might try to bomb a passenger jet using methods similar to those
employed in the 1988 bombing of Pan Am Flight 103 over Lockerbie,
Scotland, in which a bomb was placed in checked luggage.
After the passage of ATSA in November 2001, which created TSA as the
agency responsible for ensuring the security of aviation and other
transportation modes, TSA took over responsibility for the secondary
screening process from the air carriers. TSA subsequently changed the
consequences for passengers selected by the prescreening process.
Currently, passengers who are selected for secondary prescreening
either because they are on TSA's selectee list or because they are
selected by an air carrier's computer-assisted passenger prescreening
system now receive more comprehensive secondary screening.
Specifically, all these selectees not only receive greater passenger-
checked baggage screening than nonselectees, as was the case at the
time of terrorist attacks, but also receive additional physical
screening, such as a hand-search of their luggage and a more thorough
physical inspection of their person at the checkpoint.
All of these efforts have helped to transform the prescreening process
into a more robust layer of defense than existed prior to 9/11.
Nevertheless, the federal government still faces challenges related to
improving the identity-matching portion of the prescreening process to
help ensure that known or suspected terrorists are identified before
they can board aircraft. For example, while the process of developing
and maintaining terrorist watch lists to be used in the identity-
matching process requires continuous effort, and no watch list can ever
promise to contain a match for every potential traveler, ensuring the
quality of watch list data nevertheless remains a key challenge.
Concerns have been raised about the overall quality of the consolidated
watch list--in particular, that the quality of data in the watch lists
varies, and that the underlying accuracy of the data in the
consolidated watch list has not been fully determined. The Department
of Justice Inspector General reported in June 2005[Footnote 27] that
the Terrorist Screening Center could not ensure the information in the
consolidated watch list database maintained by the center was complete
and accurate. For example, the database did not contain names that
should be included in watch lists, according to the Inspector General,
and it contained inaccurate information about some persons who were on
the lists. According to the Inspector General's report, the Terrorist
Screening Center is working on completing a record-by-record quality
assurance review of the watch lists to ensure that each record contains
the required data to improve watch list quality. In addition, screening
center officials have recently stated that all records on the no-fly
list are being re-vetted using newly developed no-fly list inclusion
guidance to determine if each individual truly belongs on the list. We
have work under way addressing the law enforcement response agencies
take when an individual on the watch list is encountered.
A second challenge that affects the accuracy of the current identity-
matching process relates to the nature of the information available to
air carriers and the procedures used to match passenger identities
against the no-fly and selectee lists that are part of the consolidated
terrorist watch list. Although air carriers are required to compare the
information supplied by passengers against the names that appear on the
no-fly and selectee lists, there is no uniform identity matching
process or common software that all air carriers are required to use to
conduct their identity matching procedures. In addition, the technical
sophistication of air carrier identity matching techniques also varies.
Some identity matching technologies might correctly discriminate
between "John Smith" and "John Smythe" when comparing these names
against the consolidated terrorist watch list, while others may not.
Different identity matching results can lead to a passenger being
boarded on one carrier's flight while being denied boarding on another
air carrier's flight, including a connecting flight. Although we did
not assess the relative accuracy of the various name-matching
procedures used to prescreen passengers, inconsistency in these
procedures can be problematic for passengers and creates security
concerns.[Footnote 28]
A third challenge relates to concerns about the disclosure of watch
list information outside the federal government. Sharing of watch list
data with air carriers, or organizations with whom they contract,
creates an opportunity for watch lists to be viewed by parties who may
use this information in ways that are detrimental to U.S. interests.
For example, if a terrorist group could view the no-fly and selectee
lists they would learn which--if any--of their operatives would be able
to travel on commercial aircraft to or from the United States
unhampered. In addition, the 9/11 Commission stated that there are
security concerns with sharing U.S. government watch lists with private
firms and foreign countries.[Footnote 29]
In an effort to address these security challenges, the commission
recommended that TSA take over the domestic watch list identify-
matching process from air carriers, and in December 2004, Congress
required that the responsibility for the domestic watch list identity-
matching process be assumed by TSA.[Footnote 30] While shifting control
over the watch list identity-matching process from the airline industry
to the federal government should help address some of the limitations
of the current process, for over 3 years, TSA has faced significant
challenges in developing and implementing a new and more reliable
identity-matching process, and has not yet taken this function over
from air carriers. TSA's Secure Flight[Footnote 31] program--which is
to perform the functions associated with determining whether passengers
on domestic flights are on government watch lists--is intended to
remedy some of the problems in the current identity-matching process.
For example, unlike the current system that operates as part of each
air carrier's reservation system, Secure Flight would be operated by
TSA--and TSA, rather than the air carriers, would be responsible for
matching passengers' names against the no-fly and selectee information
maintained in the consolidated watch list (this information is
currently transmitted to air carriers) as well as information from
other watch lists. This approach would, among other benefits, eliminate
the need to distribute terrorist watch list information outside the
federal government as part of passenger prescreening. In addition,
Secure Flight is intended to address the problem related to the lack of
standard procedures among air carriers for obtaining passenger-supplied
data by defining what type of passenger information is required. Secure
Flight also plans, among other things, to use research analysts to
resolve discrepancies in the matching of passenger data to data
contained in the database.
However, we have reported that, taken as a whole, the development of
Secure Flight has not been effectively managed--has not, in fact, been
implemented--and is at risk of failure. We have reported on multiple
occasions that the Secure Flight program has not met key milestones, or
finalized its goals, objectives, and requirements and have recommended
that TSA take numerous steps to help to develop the program. For
example, to help manage risk associated with Secure Flight's continued
development and implementation, we recommended in March 2005 that TSA
finalize the system requirements and develop detailed test plans to
help ensure that all Secure Flight system functionality is properly
tested and evaluated. We also recommended that TSA develop a plan for
establishing connectivity among the air carriers, CBP, and TSA to help
ensure the secure, effective, and timely transmission of data for use
in Secure Flight operations. In early 2006, TSA suspended development
of Secure Flight and initiated a reassessment, or rebaselining, of the
program, to be completed before moving forward. Our work reviewing air
carriers' current processes has identified two air carriers that are
enhancing their identity-matching systems, since it remains unclear
when TSA will take over the passenger identity-matching function
through Secure Flight. However, any improvements made to the accuracy
of an individual air carrier's identity-matching system will not apply
system-wide and could further exacerbate differences that currently
exist among the various air carriers' systems. These differences may
result in varying levels of effectiveness in the matching of passenger
names against the terrorist watch list. At Congress's request, we are
continuing to monitor TSA's progress to develop Secure Flight. (See
app. III for a list of GAO products related to domestic passenger
prescreening, including Secure Flight.)
CBP Faces Challenges Obtaining Data Needed To Prescreen Travelers on
International Flights before Takeoff:
The ongoing security concerns about prescreening for domestic flights,
including disclosure of watch list information outside the government
and the quality of information used for the identity-matching process,
also pertain to international flights departing from or traveling to
the United States. As with domestic passenger prescreening, air
carriers conduct an initial match of passenger names against terrorist
watch lists--the no-fly and selectee lists--before international
flights depart to or from the U.S. using information that passengers
supply when they make their reservations. Customs and Border Protection
(CBP)--the DHS agency responsible for international passenger
prescreening--supplements the identity-matching conducted by air
carriers by comparing more reliable passenger information collected
from passports against the terrorist watch lists and other government
databases for international flights.[Footnote 32] (This information is
considered more reliable because passport data is not self-reported.)
However, the current process does not require the U.S. government's
identity-matching procedures be completed prior to the departure of
international flights traveling to or from the United States.[Footnote
33] As a result, passengers thought to be a risk to commercial aviation
have successfully boarded flights. For example, in calendar year 2005,
a number of passengers previously identified by the U.S. government as
direct threats to the security of commercial aviation boarded
international flights traveling to or from the United States, according
to agency incident reports.[Footnote 34] In seven cases, the resulting
risk was deemed high enough to divert the flight from its intended U.S.
destination, resulting in costs to the air carriers, delays for
passengers, and government intervention. While none of the flights
resulted in an attempted hijacking or other security incidents, these
flights nevertheless illustrate a continuing vulnerability that high-
risk passengers could potentially board international flights and
attempt to blow up these aircraft or take control in order to use them
as weapons against U.S. interests at home or abroad.
To address this vulnerability, as part of the Intelligence Reform and
Terrorism Prevention Act of 2004, Congress mandated that DHS issue a
proposed plan by February 15, 2005, for completing the U.S.
government's identity-matching process before the departure of
international flights.[Footnote 35] While CBP did not meet this
deadline, the agency issued a proposed rule[Footnote 36] that would
eliminate the preliminary screening conducted by air carriers and
replace it instead with a process where air carriers select one of two
options for transmitting this information earlier to CBP. One option
allows air carriers to transmit passport information as each individual
passenger checks in. Under this option, CBP would analyze the
information against terrorist watch lists, make an immediate (or "real-
time") decision about whether the passenger can board the aircraft, and
convey this information electronically to the air carrier. Under this
approach air carriers could admit passengers for flights up to 15
minutes before departure. The second option allows air carriers to
provide all passengers' passport information (in a bulk data
transmission) to CBP for verification at least 60 minutes before a
flight's departure. Under either option, the government would retain
control of the watch lists, resolving this additional security concern.
Regardless of which proposed option air carriers choose to pursue, many
of CBP's efforts to improve the international prescreening process are
still largely in development, and the agency faces several challenges
in implementing its proposed solutions. One challenge, in particular,
concerns stakeholder coordination. CBP must rely on a variety of
stakeholders to provide input or to implement aspects of the
prescreening process, including air carriers, industry associations,
foreign governments, and other agencies within and outside DHS. One
coordination challenge involves aligning international aviation
passenger prescreening with TSA's development of its Secure Flight
program for prescreening passengers on domestic flights. Ensuring that
this coordination effort aligns with Secure Flight is important to air
carriers, since passengers may have both a domestic and an
international part to their itinerary. If these prescreening processes
are not coordinated, passengers may be found to be high-risk on one
flight and not high-risk on another flight, resulting in air carrier
confusion and a potential security hazard. We have recently recommended
that DHS take additional steps and make key policy and technical
decisions (in order to determine, for example, the data and identity-
matching technologies that will be used) that are necessary to more
fully coordinate CBP's international prescreening program with TSA's
prospective domestic prescreening program, Secure Flight.[Footnote 37]
(See app. III for a list of GAO products related to domestic and
international passenger prescreening.)
GAO Concluding Observations--Passenger Prescreening:
While passenger prescreening represents a more secure layer of defense
today than it did on 9/11, there is still a need for DHS, TSA, and CBP
to follow through on congressional requirements and recommendations we
have made to improve the process. Specifically, TSA must still comply
with a congressional requirement for transferring responsibility for
the passenger identity-matching process from air carriers to TSA for
domestic flights. In addition, we made a recommendation in November
2006, which DHS has taken under consideration, aimed at helping the
agency to enhance coordination between CBP's international prescreening
program and TSA's prospective domestic prescreening program, Secure
Flight. Such efforts are necessary to help ensure that the prescreening
process--as a first layer of aviation defense--is accurate and
effective in identifying potential terrorists who should be denied
boarding or receive additional screening, and in ensuring that watch
list data are not at risk of disclosure to those wishing to do harm to
U.S. interests.
Passenger Checkpoint Screening Threat Detection Capabilities Have Been
Strengthened and Efforts to Further Enhance Screener Training,
Screening Procedures, and Related Technologies Are Under Way:
The layer of aviation security most visible to the general public, as
well as to terrorists, is the physical screening of passengers and
their carry-on bags at airport checkpoints, known as passenger
checkpoint screening. The passenger checkpoint screening process
involves the inspection of passengers and their carry-on bags to deter
and prevent the carriage of any unauthorized explosive, incendiary,
weapon, or other dangerous item on board an aircraft. Checkpoint
screening is a critical component of aviation security--and one that
has long been subject to security vulnerabilities. Passenger checkpoint
screening is comprised of three elements: (1) the people responsible
for conducting the screening of airline passengers and their carry-on
items; (2) the procedures that must be followed to conduct screening;
and (3) the technology used in the screening process. TSA has made
progress in implementing security-related measures in all these areas,
but there are additional opportunities to further enhance aviation
security through the people, processes, and technologies involved in
passenger checkpoint screening.
Prior to the passage of ATSA, the screening of passengers had been
performed by private screening companies under contract to the air
carriers. The FAA was responsible for ensuring compliance with
screening regulations. As we reported in 2000, since 1978, the FAA and
the airline industry have continued to face challenges in improving the
effectiveness of airport checkpoint screeners, and we reported that
screeners were not detecting dangerous objects, including loaded
firearms and, in tests conducted by FAA, simulated explosive devices.
We attributed screening detection problems primarily to high turnover
rates among screeners, among other things. By the time the terrorist
attacks occurred, the FAA was already 2 years behind in issuing a
regulation in response to a congressional mandate requiring the
companies that employ checkpoint screeners to improve their testing and
training through a certification program.
As the 9/11 Commission report testified, the terrorist hijackers,
having escaped watch-list detection during the prescreening process,
had to beat only one layer of security--the security checkpoint
process--in order to proceed with their plan. The Commission concluded
that at the time of the attacks, while walk-through metal detectors and
X-ray machines were in use to stop prohibited items, many potentially
deadly and dangerous items--such as the box-cutters carried by the
hijackers--did not set off metal detectors or were hard to distinguish
in an X-ray machine. Moreover, FAA regulations and guidance did not
explicitly prohibit knives with blades under 4 inches long. And the
standards for what constituted a deadly or dangerous weapon were
"somewhat vague," the commission found, and were left up to the
discretion of air carriers and their screening contractors. Moreover,
secondary screening--whereby passengers coming through the checkpoint
with carry-on bags are selected for additional screening--took place,
by and large, only when passengers triggered metal detectors. Even when
such trigger events occurred, passengers often were cleared to board.
For example, of the 5 hijackers who boarded planes at Washington Dulles
International Airport on 9/11, three set off metal detectors; they (and
one carry-on bag as well) were hand-wanded, the bag swiped for
explosive trace detection, and then they were cleared to board.
TSA Has Made Progress in Training and Evaluating a Federalized
Workforce for Screening Airline Passengers:
After 9/11 and as a result of ATSA, TSA assumed responsibility for
screeners and screening operations at more than 400 commercial
airports, established a basic screener training program, and has
conducted annual proficiency reviews and operational testing of
screeners, now known as transportation security officers (TSO). TSA has
taken numerous steps to develop and evaluate its screening personnel
by, among other things, expanding training beyond the basic training
requirement through a self-guided on-line learning center, and by
providing additional training on threat information, explosives
detection, and new screening approaches. While these efforts and others
taken by the agency have helped TSA to develop and evaluate appropriate
workforce skills, we have recommended that TSA take additional steps to
ensure that this training is delivered. For example, at some airports
we have visited, TSOs encountered difficulty accessing and completing
recurrent (refresher) training because of technological and staffing
constraints. In May 2005, TSA stated that it had a plan for deploying
high speed Internet connections at airports. The President's 2007
budget request reported that approximately 220 of the nation's 400
commercial airport and field locations have full information technology
infrastructure installation. (See app. III for a list of GAO products
related to screener workforce issues.)
Passenger Checkpoint Screening Procedures Have Been Enhanced to Improve
Security and Procedures Are Regularly Modified to Reflect Current
Conditions:
In addition to TSA's efforts to train and deploy a federal screener
workforce, steps also have been taken to strengthen checkpoint
screening polices and procedures to enhance security. One of the most
important differences of the current checkpoint screening system
compared to the system in place on 9/11 is the additional physical
screening that certain passengers selected by the prescreening process,
as discussed earlier, must undergo at the checkpoint. In addition,
certain screening procedures performed by TSOs, or other authorized TSA
personnel, are now mandatory for all passengers. Prior to entering the
sterile area of an airport--the area within the terminal where
passengers wait to board departing aircraft--all passengers must be
screened by a walk-through metal detector and their carry-on items must
be X-rayed. Passengers whose carry-on baggage alarms the x-ray machine,
passengers who alarm the walk-through metal detectors, or passengers
who are selected by the air carriers' passenger prescreening
system,[Footnote 38] all receive additional screening. These passengers
may be screened by hand-wand or pat-down or have their carry-on items
screened for explosive traces or physically searched. Figure 2 shows
the functions performed as part of passenger checkpoint screening.
Figure 2: Passenger Checkpoint Screening Functions:
[See PDF for image]
Source: GAO and Nova Development Corporation.
Note: ETD refers to explosive trace detection equipment in which bags
are swabbed to test for chemical traces of explosives.
[End of figure]
Because history has shown that terrorists will adapt their tactics and
techniques in an attempt to bypass increased security procedures, and
are capable of developing increasingly sophisticated measures in an
attempt to avoid detection, TSA leadership has emphasized the need to
continually test or implement new screening procedures to further
enhance security in response to changing conditions. We have ongoing
work on how TSA modifies and implements passenger checkpoint screening
procedures and plan to issue a report in February 2007. Last year, we
testified that TSA security-related proposed changes to checkpoint
screening procedures are based on risk-based factors, including
previous terrorist incidents, threat information, vulnerabilities of
the screening system, as well as operational experience and stakeholder
concerns.
Recommended modifications to passenger checkpoint screening procedures
are also generated based on covert testing conducted by TSA officials
and the DHS Office of Inspector General (OIG). Covert tests are
designed to assess vulnerabilities in the checkpoint screening system
to specific threats, such as vulnerability to the various methods by
which terrorists may try to conceal handguns, knives, and improvised
explosive devices (IED). We have ongoing work evaluating TSA's covert
testing efforts and expect to report our results later this year.
TSA Is Exploring New Technologies to Enhance Detection of Explosives
and Other Threats:
The ever changing terrorist threat also necessitates continued research
and development of new technologies and the fielding of these
technologies to strengthen aviation security. The President's fiscal
year 2007 budget request notes that emerging checkpoint technology may
enhance the detection of prohibited items, especially firearms and
explosives, on passengers. Furthermore, the DHS OIG has reported that
significant improvements in screener performance may not be possible
without greater use of new technology, and has encouraged TSA to
expedite its technology testing programs and give priority to
technologies that will enable screeners to better detect both weapons
and explosives.[Footnote 39] TSA has recently put increased focus on
the threats posed by IEDs and is investing in technology for this
purpose. For example, since the September 11 attacks, 94 explosive-
detection-trace portal machines have been installed at 37 airports.
(These machines detect vapors and residues of explosives, including
IEDs.) In addition, as of May 2006, TSA had conducted, or planned to
conduct, evaluations of nine new types of passenger screening
technology, including, for example, technology that would screen
bottles for liquid explosives. It is important that TSA continue to
invest in and develop technologies for detecting explosives This is
especially important in light of the alleged August 2006 plot to
detonate liquid explosives on board multiple commercial aircraft bound
for the United States from the United Kingdom. We are currently
evaluating DHS's and TSA's progress in planning for, managing, and
deploying research and development programs in support of airport
checkpoint screening operations. We expect to report our results later
this year. (See app. III for a list of GAO products related to
passenger checkpoint screening.)
GAO Concluding Observations--Passenger Checkpoint Screening:
As with passenger prescreening, the checkpoint screening system in
place today is far more robust, reflects more rigorous screening
requirements, and deploys better trained staff, than in the years
leading up to the terrorist attacks. In its list of recommended actions
that the government should take to protect against and prepare for
future terrorist attacks, the 9/11 Commission suggested that improving
checkpoint screening should be a priority. TSA has largely accomplished
this goal, though as with all aspects of aviation security, efforts to
further enhance and strengthen procedures are ongoing. For example, new
and emerging technologies for detecting threat objects are likely to
help enhance the checkpoint screening process.
In-flight Security Measures in Preparing For or Responding To On-board
Threats, and Coordinating Responses from the Ground, Have Been
Strengthened:
Security protocols and policies for preparing for or responding to
threats that occur on board flights already in progress, and
coordinating responses to such security events from the ground, have
changed significantly since 9/11. With respect to on-board security
measures, the airline cabin and flight crews on duty on 9/11 were
neither trained for nor prepared to deal with the events that unfolded
once the hijackers were on board. Though in-flight security was
regarded as a layer of defense in the commercial aviation system, FAA's
security training guidelines at the time did not contemplate suicide
hijackers, with aircraft used as guided missiles, as a likely scenario.
Flight crews had been taught to cooperate, rather than resist, during
an emergency. As with the prescreening and checkpoint screening
processes, the ability of the hijackers to manipulate flight crews and
penetrate the captain's cockpit revealed serious weaknesses of in-
flight security.
In-flight security has since been strengthened in several ways to help
mitigate the likelihood of terrorists being able take over an aircraft.
For example, TSA established the Federal Flight Deck Officer program in
2002. The program trains eligible flight crew members in the use of
force to defend against an act of criminal violence or air piracy.
These flight deck officers are deputized as federal law enforcement
officers, and may transport and carry a TSA-issued firearm, in a manner
approved by TSA. In addition, FAA directed air carriers to harden their
cockpit doors[Footnote 40] and Congress expanded the decades-old
Federal Air Marshal Service by mandating in ATSA the deployment of air
marshals, on board all high-security risk flights. Before 9/11, there
were 33 air marshals altogether; now there are thousands.[Footnote 41]
A key aspect of air marshals' operating procedures is the discreet
(semicovert) movement through airports as they check in for their
flight, transit screening checkpoints, and board the aircraft.
TSA has also taken steps to ensure that flight and cabin crew members-
-among the last lines of defense--are prepared to handle potential
threat conditions on board commercial aircraft. The revised guidance
and standards TSA developed for air carriers to follow in developing
and delivering their flight and cabin crew member security training is
a positive step forward in strengthening the security on board
commercial aircraft. This training includes, among other things,
teaching crew members how to search a cabin for explosive devices.
Congress also mandated TSA to implement an advanced voluntary crew
member self-defense training program for flight and cabin crew members;
this training is ongoing.
With respect to coordinating responses to on-board threats from the
ground, the events of 9/11 revealed the importance of prompt
interagency communication to allow for a unified, coordinated response
to airborne threats. Once an in-flight security threat is identified,
rapid and effective information sharing among agencies on the ground is
critical to ensure that each agency can respond according to its
mission and that the security threat is handled in the safe manner. The
9/11 Commission Report stated that a weakness in aviation security
exploited by the terrorists included a lack of protocols and
capabilities in executing a coordinated FAA and military response to
multiple hijackings and suicidal hijackers. According to the
commission, the response on 9/11 of the Department of Defense's North
American Aerospace Defense Command (NORAD), which is responsible for
securing U.S. airspace, was hindered in part by lack of real-time
communications with FAA and defense and intelligence agencies. For
instance, a shootdown authorization was not communicated to the NORAD
air defense sector until 28 minutes after United 93 had crashed in
Pennsylvania.[Footnote 42] Moreover, the commission noted, planes did
not know where to go or what targets they were to intercept. And once
the shootdown order was given, it was not communicated to the pilots.
To address the communications and coordination problems that were
highlighted by 9/11, many federal agencies, including the FAA, DOD, and
TSA, have taken action. For example, the FAA--which is responsible for
managing aircraft traffic entering into or operating in U.S. airspace-
-established an unclassified teleconference system, called the Domestic
Events Network, designed to gather and disseminate information for all
types of security threats. The network is monitored by approximately 60
users from a variety of federal agencies as well as state and local
entities. This network was originally established as a conference call
on the morning of 9/11 to coordinate the federal response to the
hijacked aircraft and it has remained in existence since then, serving
as a basis for interagency cooperation. Any Domestic Events Network
user can broadcast information, allowing other agencies on the Network
to communicate and monitor a situation in real-time.[Footnote 43]
According to FAA officials, domestic air carriers have recently been
given the capability to link into the Domestic Events Network, allowing
for the air carrier to provide real-time situational updates as they
are received from the flight crew onboard the aircraft in question
without relying on an intermediary party. Another important interagency
communications tool is the Defense Red Switch Network which is a
secure, classified network administered by the DOD that allows multiple
agencies to discuss intelligence information over a secure
line.[Footnote 44]
In addition, TSA has established the Transportation Security Operations
Center (TSOC), a national center that operates around the clock and
coordinates the multi-agency response to in-flight security threats.
Air carriers are required to report to TSOC all incidents and
suspicious activity that could affect the security of U.S. civil
aviation, including any incidents of interference with a flight crew,
specific or non-specific bomb threats, and any correspondence received
by an aircraft operator that could indicate a potential threat to civil
aviation. We have ongoing work analyzing the processes that federal
agencies follow to identify, assess, and respond to in-flight security
threats and the extent to which interagency coordination problems
occurred, if at all, and the steps agencies took to address identified
problems. The results of this work, which will be issued in early 2007,
will be classified. (See app. III for a list of GAO products related to
in-flight security.)
GAO Concluding Observations--In-flight Security and Ground-Based
Response Efforts:
Several actions taken in the months after 9/11--notably, hardened
cockpit doors, better emergency response training for airborne flight
crews, and the presence of federal air marshals on certain flights--
have helped to ensure that aircraft are both physically safer and
better protected from the actions of on-board hijackers or terrorists.
Federal actions also have been taken in response to the communications
and coordination failures that occurred on 9/11 in order to enhance
coordinated responses to onboard security threats from the ground. Our
ongoing work will discuss, among other things, the process federal
agencies follow to identify, assess, and respond to security threats,
and the challenges, if any, that have arisen in agencies' coordination
efforts and steps taken to deal with them.
Areas of Aviation System Not Exploited by 9/11 Terrorists Also Have
Been Strengthened, though Implementation and Resource Challenges
Remain:
Two aspects of commercial aviation that were not directly implicated in
the 9/11 scenario--checked baggage screening and air cargo screening--
are nonetheless recognized as important components of a layered system
of aviation defense. Congress and TSA have taken steps to enhance the
security of both in the years since 9/11, though resource and
technology challenges remain. The infrastructure of commercial airport
properties, which can pose risks to security by enabling criminals or
terrorists to penetrate sensitive areas (such as boarding areas or
baggage facilities), also has received congressional and federal
attention. In addition, Congress and federal agencies have taken
actions to enhance security in the noncommercial aviation sector,
specifically, at the nation's general aviation airports--small airports
that are home to flight training schools as well as privately owned
aircraft.
TSA Has Installed Baggage Screening Explosive Detection Equipment at
Most Airports and Has Begun to Identify Costs, Benefits, and
Technologies for Further Optimizing Baggage Screening:
With respect to checked baggage screening, at the time of the attacks,
there was no federal requirement to screen all checked baggage on
domestic flights. In some cases, air carriers screened checked baggage
on commercial flights for bulk quantities of explosives using X-ray
screening equipment similar to that used for medical CAT scans. As the
Congressional Research Service reported a month after the attacks, the
availability and cost of baggage screening X-ray equipment, along with
the time it took to screen a bag, did not permit its use in all
airports, on all flights at airports where it was used, or even on all
bags on any given flight. In addition, passengers selected by the
passenger prescreening process for additional pre-flight scrutiny were
either to have their checked bags scanned for explosives or held until
they boarded the aircraft. As noted earlier, 5 of the 8 hijackers
selected by the passenger prescreening system in place on 9/11 had
their checked bags held prior to boarding and three had their bags
scanned for explosives.
After the attacks, Congress, through ATSA, mandated that all checked
baggage at commercial airports be screened using explosive detection
systems.[Footnote 45] TSA has worked to overcome equipment challenges,
and other challenges, in order to fulfill this mandate, and now reports
having the capability to screen 100 percent of checked baggage using
two types of screening equipment--explosive detection systems (EDS),
which use X-rays to scan bags for explosives, and explosive trace
detection systems (ETD), in which bags are swabbed to test for chemical
traces of explosives. TSA considers screening with EDS to be superior
to screening with ETD because EDS machines process more bags per hour
and automatically detect explosives without direct human
involvement.[Footnote 46] As of June 2006, in order to screen all
checked baggage for explosives at over 400 airports, TSA had procured
and installed about 1,600 EDS and 7,200 ETD machines.
TSA has begun shifting its focus away from placing these systems
primarily in airport lobbies, as had been done initially, because of
problems that arose from this configuration. For instance, TSA's
placement of stand-alone EDS and ETD machines in airport lobbies
resulted in passenger crowding, which presented unsafe conditions and
may have added security risks for passengers and airport workers. TSA
has begun to focus instead on systematically deploying the
configuration of baggage screening equipment that is considered by TSA
to be the most efficient, least labor-intensive, and most cost-
effective at many airports--in-line EDS. These systems are integrated
with airports' baggage conveyor and sorting systems (see fig. 3 for an
illustration of the checked-baggage screening system using an in-line
EDS machine). TSA has also developed smaller and less expensive stand-
alone EDS equipment that may be effective at smaller airports or closer
to airline check-in counters.
Figure 3: In-line Checked Baggage Screening System:
[See PDF for image]
Source: GAO and Nova Development Corporation.
[End of figure]
A TSA cost-benefit analysis of in-line EDS machines being installed at
nine airports conducted in May 2004 showed that they could yield
significant savings for the federal government and achieve other
benefits--including reduced screener staffing requirements and
increased baggage throughput (the rate at which bags are processed).
Specifically, TSA estimated that in-line baggage screening systems at
these nine airports could save the federal government about $1 billion
over 7 years.
The Intelligence Reform and Terrorism Prevention Act of 2004 mandated
and the conference report accompanying the fiscal year 2005 DHS
Appropriations Act directed TSA to, among other things, develop a
comprehensive plan for expediting the installation of in-line explosive
detection systems. To assist TSA in planning for the optimal deployment
of checked baggage screening systems, we recommended in March 2005 that
TSA systematically evaluate baggage screening needs at airports,
including the costs and benefits of installing in-line EDS systems at
airports that did not yet have such systems installed. We suggested
that such planning should include analyzing which airports should
receive federal support for in-line EDS systems based on cost savings
that could be achieved from more effective and efficient baggage
screening operations and on other factors, including enhanced security.
And we recommended that TSA identify and prioritize the airports where
the benefits of replacing stand-alone baggage screening systems with in-
line systems are likely to exceed the costs of the systems, or where
the systems are needed to address security risks or related factors.
In February 2006, in response to our recommendation and a legislative
requirement to submit a schedule for expediting the installation and
use of in-line systems and replacement of ETD equipment with EDS
machines,[Footnote 47] TSA provided to Congress its strategic planning
framework for its checked baggage screening program. This framework
introduced a strategy intended to increase efficiency through deploying
EDS to as many airports as practicable, lowering lifecycle costs for
the program, minimizing impacts to TSA and airport/ airline operations,
and providing a flexible security infrastructure for accommodating
growing airline traffic and potential new threats. The framework is an
initial step toward: (1) finding the ideal mix of higher-performance
and lower-cost alternative screening solutions for the 250 airports
with the highest checked baggage volumes, and (2) funding
prioritization schedules by airport, by identifying the top 25 airports
that should first receive federal funding for projects related to the
installation of EDS based on quantitative modeling of security and
economic factors, and other factors.[Footnote 48]
In addition, partly in response to other recommendations we made, TSA
is collaborating with airport operators, air carriers, and other key
stakeholders to identify funding and cost sharing strategies (in order
to determine how to allocate investments in baggage equipment between
the federal government and air carriers) and is focusing its research
and development efforts on the next generation of EDS technology. For
airports where in-line systems may not be economically justified
because of high investment costs, we suggested that a cost-
effectiveness analysis be used to determine the benefits of additional
stand-alone EDS machines to screen checked baggage in place of the more
labor-intensive ETD machines. According to TSA, the agency is
conducting an analysis of the airports that rely heavily on ETD
machines and determined if they would benefit from also having stand-
alone EDS equipment. (See app. III for a list of GAO products related
to checked baggage screening.)
TSA Has Strengthened Oversight and Inspection of Air Cargo but We Have
Reported That More Work Is Needed to Ensure Shippers Comply with
Security Requirements and Address Potential Resource Challenges:
In the aftermath of the 9/11 terrorist attacks, the security of cargo
carried on both passenger and all-cargo aircraft became a growing
concern both to the public and to members of Congress. Since the
attacks, several instances of human stowaways in the cargo holds of all-
cargo aircraft have further heightened the concern over air cargo
security by revealing vulnerabilities that could potentially threaten
the entire air transportation system.
TSA has the responsibility for ensuring the security of air cargo,
including, among other things, establishing security rules and
regulations covering domestic and foreign passenger carriers that
transport cargo, domestic and foreign all-cargo carriers, and domestic
indirect air carriers (companies that consolidate air cargo from
multiple shippers and deliver it to air carriers to be transported);
and has responsibility for overseeing implementation of air cargo
security requirements by air carriers and indirect air carriers through
compliance inspections. In general, TSA inspections are designed to
ensure that air carriers comply with air cargo security requirements,
while air carrier inspections focus on ensuring that cargo does not
contain weapons, explosives, or stowaways (see fig. 4).
Figure 4: Air Cargo Being Loaded and Inspected Using an Explosive
Detection System:
[See PDF for image]
Source: GAO(picture on the left) and TSA(picture on the right).
[End of figure]
Because safeguarding the nation's air cargo transportation system is a
shared public and private sector responsibility, air carriers are
generally responsible for meeting TSA's air cargo security
requirements, including how employees are to handle and physically
inspect cargo.
As we reported in October 2005, TSA has implemented a variety of
actions intended to strengthen oversight for domestic air cargo
security operations conducted by air carriers.[Footnote 49] For air
cargo, TSA has increased the number of dedicated air cargo inspectors
used to assess air carrier and indirect air carrier compliance with
security requirements, issued a regulation in May 2006 to enhance and
improve the security of air cargo transportation, and has taken other
actions. However, our work identified factors that may limit the
effectiveness of these measures. For example:
* TSA has primarily relied on its Known Shipper program[Footnote 50]
(allowing individuals or businesses with established histories to ship
cargo on passenger carriers) to ensure that cargo transported on
passenger air carriers is screened in accordance with ATSA, and that
unknown shipments are not placed on passenger aircraft. However, at the
time of our review, we reported that the Known Shipper program had
weaknesses and may not provide adequate assurance that shippers are
trustworthy and that air cargo transported on passenger air carriers
was secure. For example, the information in TSA's database on known
shippers was incomplete because participation was voluntary, and the
information in the database may not have been reliable. TSA has
addressed this issue through its May 2006 regulation on air cargo
security requirements, making it mandatory for air carriers and
indirect air carriers to provide information to this database by
requiring them to submit data on their known shippers.
* TSA established a requirement for random inspection of air cargo
reflecting the agency's position that inspecting 100 percent of air
cargo was not technologically feasible and would be potentially
disruptive to the flow of air commerce. However, this requirement
contained exemptions based on the nature and size of cargo that may
leave the air cargo system vulnerable to terrorist attack. We
recommended in 2005 that TSA reexamine the rationale for existing air
cargo inspection exemptions, determine whether such exemptions leave
the air cargo system unacceptably vulnerable to terrorist attack, and
make any needed adjustments to the exemptions. In September 2006, TSA
revised the criteria for exemptions for cargo transported within or
from the United States on passenger aircraft. TSA is reviewing the
remaining inspection exemptions to determine whether or not they pose
an unacceptable vulnerability to the air cargo transportation system.
* TSA conducts audits of air carriers and indirect air carriers to
ensure that they are complying with existing air cargo security
requirements. But TSA has not developed performance measures to
determine to what extent air carriers and others are complying with air
cargo security requirements. Without performance measures to gauge air
carrier and indirect air carrier compliance with air cargo security
requirements, TSA cannot effectively focus its inspection resources on
those entities posing the greatest risk. In addition, without measures
to determine an acceptable level of compliance with air cargo security
requirements, TSA cannot assess the performance of individual air
carriers or indirect air carriers against national performance averages
or goals that would allow TSA to target inspections and other actions
on those that fall below acceptable levels of compliance. We
recommended that TSA assess the effectiveness of enforcement actions,
including the use of civil penalties, in ensuring air carrier and
indirect air carrier compliance with air cargo security requirements.
We also recommended that TSA develop measures to gauge air carrier and
indirect air carrier compliance with air cargo security requirements to
assess and address potential security weaknesses and vulnerabilities.
* TSA had not analyzed the results of air cargo security inspections to
systematically target future inspections on those entities that pose a
higher security risk to the domestic air cargo system, or assessed the
effectiveness of its enforcement actions in ensuring air carrier
compliance with air cargo security requirements. Such targeting is
important because TSA may not have adequate resources to inspect all
air carriers and indirect air carriers on a regular basis. We
recommended that TSA develop a plan for systematically analyzing the
results of air cargo compliance inspections and use the results to
target future inspections and identify systemwide corrective actions.
According to TSA officials, the agency has been working on developing
short-term and long-term outcome measures for air cargo security and
has begun to analyze inspection results to target future inspections.
Finally, with respect to TSA's regulation on air cargo security
requirements, in May 2006, TSA estimated that implementing all the
provisions in the regulation (including actions already ongoing, such
as requiring air carriers to randomly inspect a percentage of air
cargo) will cost approximately $2 billion over a 10-year period (2005-
2014). Before the regulation was finalized, industry stakeholders
representing air carriers and airport authorities had stated that
several of the provisions, such as securing air cargo facilities,
screening all individual persons boarding all-cargo aircraft, and
conducting security checks on air cargo workers, would be costly to
implement.
We have not assessed how this regulation, or its costs, may affect TSA
or stakeholders. Nor have we undertaken additional work to determine
the extent to which TSA's subsequent actions have addressed the
weaknesses identified above and our related recommendations. In our
work, we concluded that while the cost of enhancing air cargo security
can be significant, the potential costs of a terrorist attack, in terms
of both the loss of life and property and long-term economic impacts,
would also be significant although difficult to predict and quantify.
TSA's regulation also covers inbound air cargo security requirements
(for cargo originating outside the United States). We currently have an
ongoing review assessing the security of inbound air cargo, including
the regulation's relevant requirements, and expect to issue this work
early this year.
Security of Commercial Airport Perimeters and Other Secure Areas Are
Being Addressed:
Like most other aspects of the aviation system, the security of
commercial airport facilities also came under heightened scrutiny after
9/11. Congress included provisions in ATSA to address this aspect of
airport security. In particular, ATSA granted TSA the authority to
oversee U.S. airport operators' efforts to maintain and improve the
security of airport perimeters (such as airfield fencing and access
gates), the adequacy of controls restricting unauthorized access to
secured areas (such as building entry ways leading to aircraft), and
security measures pertaining to individuals who work at airports. Apart
from ongoing concerns about the potential for terrorists to gain access
to these areas, in 2004, concerns also were raised about security
breaches and other illegal activities, such as drug smuggling, taking
place at some airports. These events highlighted the importance of
strengthening security in these areas. Taken as a whole, airport
perimeter security and related areas, along with passenger and baggage
screening, comprise key elements of the aviation security environment
at commercial airports.
We reported in 2004 that TSA had begun evaluating commercial airport
security by conducting compliance inspections, among other things, but
needed a better approach for assessing how the results of these efforts
would be used to make improvements to the entire commercial airport
system.[Footnote 51] We also reported that TSA had helped some airport
operators to enhance perimeter and access control security by providing
funds for security equipment, such as electronic surveillance systems.
However, TSA had not, at the time of our review, set priorities for
these and other efforts or determined how they were to be funded. We
also found that while TSA had taken some steps to reduce the potential
security risks posed by airport workers, the agency did not require
fingerprint-based criminal history checks for all workers, as ATSA
required. To help ensure that TSA is able to articulate and justify
future decisions on how best to proceed with security evaluations, fund
and implement security improvements (including new security
technologies), and implement additional measures to reduce the
potential security risks posed by airport workers, we recommended that
TSA develop a plan for Congress describing how it would meet the
applicable requirements of ATSA.
Since our report was issued, TSA made several improvements in these
areas, through the issuance of a series of security directives that
required enhanced background checks and improved access controls for
airport employees who work in restricted airport areas. We have new
work planned in this area that will, among other things, examine TSA's
further progress in meeting ATSA requirements for reducing the
potential security risks posed by airport workers, such as requiring
fingerprint-based criminal history checks and security awareness
training for all airport workers. We have also recently issued work
examining progress toward establishing the Transportation Workers
Identification Credential (TWIC) Program.[Footnote 52] TWIC is intended
to establish a uniform identification credential for 6 million workers
who require unescorted physical or cyber access to secured areas of
transportation facilities, including airports. While TWIC was initially
intended to meet an ATSA recommendation that TSA consider using
biometric access control systems to verify the identity of individuals
who seek to enter a secure airport, as of September 2006, TSA had
determined that TWIC would be implemented first for workers requiring
unescorted access to secure areas at commercial seaports[Footnote 53]
and that there were no immediate plans to implement the program in the
airport environment.
Federal Regulations Issued After 9/11 Requiring Background Checks for
Airline Pilots, and Other Measures, Have Enhanced Security at General
Aviation Airports:
General aviation, as distinguished from commercial aviation,
encompasses a wide variety of activities, aircraft types, and
airports.[Footnote 54] Federal intelligence agencies have reported in
the past that terrorists have considered using general aviation
aircraft for terrorist acts--and that the 9/11 terrorists learned to
fly at flight schools based at general aviation airports in Florida,
Arizona, and Minnesota. We have noted in our work that the extent of
general aviation's vulnerability to terrorist attack is difficult to
determine. Nevertheless, as we reported in November 2004, TSA and the
FAA have taken steps to address security risks to general aviation
through regulation and guidance.[Footnote 55] For example, TSA has
promulgated regulations requiring background checks of foreign
candidates for U.S. flight training schools and has issued security
guidelines for general aviation airports. Prior to the September 11
attacks, FAA did not require background checks of anyone seeking a
pilot's license. Other measures taken to enhance general aviation
security since then include actions by nonfederal general aviation
stakeholders who have partnered with the federal government and have
individually taken steps to enhance general aviation security. For
example, industry associations developed best practices and
recommendations for securing general aviation, and have worked with TSA
to develop other security initiatives.
While these actions represent progress toward enhancing general
aviation security, at the time we reported on these efforts, TSA
continued to face challenges. Although TSA has issued a limited
assessment of threats associated with general aviation, a systematic
assessment of threats to, or vulnerabilities of general aviation to
determine how to better prepare against terrorist threats, had not been
conducted at the time of our November 2004 review because the
assessments were considered costly and impractical to conduct at the
nearly 19,000 general aviation airports. We recommended that TSA
develop and implement a plan to identify threats and vulnerabilities
and include, among other things, estimates of funding requirements.
Should TSA establish new security requirements for general aviation
airports, competing funding needs could challenge the ability of
general aviation airport operators to meet these requirements. General
aviation airports have received some federal funding for implementing
security upgrades since September 11, but have funded most security
enhancements on their own. General aviation stakeholders we contacted
expressed concern that they may not be able to pay for any future
security requirements that TSA may establish. In addition, TSA and FAA
are unlikely to be able to allocate significant levels of funding for
general aviation security enhancements, given competing priorities of
commercial aviation and other modes of transportation. (We made no
recommendations related to funding challenges.) We have not undertaken
additional work to determine the extent to which subsequent actions
taken by DHS or TSA have enhanced general aviation security or have
addressed our recommendations.
GAO Concluding Observations--Enhancing Security of Layers of Aviation
Defense Not Implicated on 9/11:
TSA's efforts to address aspects of aviation security other than those
directly implicated in the 9/11 attacks have been mixed. On the one
hand, TSA has made significant progress in an area where it has direct
operational authority--enhancing detection of threat objects in
passengers' checked baggage. Thanks to the increased use of technology
(explosive detection systems), today's checked baggage undergoes far
more scrutiny than before the terrorist attacks. In other areas of
aviation, however, where TSA has regulatory and oversight
responsibility, but does not take the operational lead, our past work
indicates that TSA faced challenges. With respect to air cargo, for
example, TSA has implemented a variety of actions intended to
strengthen oversight for domestic air cargo security operations
conducted by air carriers, including increasing the number of
inspectors used to assess air carriers' compliance with air cargo
security requirements, but opportunities exist to better ensure that
this compliance process is working. Because we do not have recent work
on progress made to enhance the security at general aviation airports,
we cannot comment further on the extent of progress made in this area.
Our ongoing work on airport perimeter security and access controls will
allow us to provide an updated assessment of progress later in 2007.
Congress and Federal Agencies Are Addressing Security Needs of
Transportation Modes in the Post-9/11 Era through Legislation, Risk
Management, and Enhanced Cooperation with Domestic and International
Partners:
In the aftermath of the attacks on 9/11, Congress and the
administration focused their energies first on shoring up our national
layers of defense--particularly in the aviation sector, which had
proven to be vulnerable to terrorist attacks. As of November 2006, TSA
had substantially implemented the major aviation security mandates
issued by Congress following the 9/11 attacks, particularly those ATSA
mandates designed to address specific vulnerabilities exploited by the
terrorists, such as the requirement to deploy federal personnel to
screen passengers and baggage at airports. Congress, the 9/11
Commission, federal agencies, and we have recognized the need to
develop strategies and take actions to protect against and prepare for
terrorist attacks on critical parts of our transportation system other
than aviation, which also are considered vulnerable to attack. These
areas include passenger rail and the maritime industry--both considered
vital components of the U.S. economy.[Footnote 56] In addition, other
modes of transportation also remain vulnerable to attack, such as the
nation's highway infrastructure and commercial vehicles.
Multiple Federal Agencies Have Taken Actions to Enhance Passenger Rail
Security:
The passenger rail sector is one critical area of transportation where
a number of federal departments and their component agencies have begun
taking actions to enhance security. The U.S. passenger rail sector is a
vital component of the nation's transportation infrastructure, with
subway and commuter rail systems, among others, carrying more than 11
million passengers each week day.[Footnote 57] Characteristics of some
passenger rail systems--high ridership, expensive infrastructure,
economic importance, and location (e.g., large metropolitan areas or
tourist destinations)--make them attractive targets for terrorists
because of the potential for mass casualties and economic damage and
disruption. Indeed, public transportation in general, and passenger
rail in particular have continued to be attractive targets for
terrorist attack as evidenced by the March 2004 terrorist bomb attacks
on commuter trains in Madrid, Spain in which 191 people were killed and
600 injured, and the July 2005 bomb attacks on the London's subway
system, which resulted in over 50 fatalities and more than 700
injuries.
Prior to the creation of TSA in 2002, the Federal Transit
Administration (FTA) and Federal Railroad Administration (FRA) were the
primary federal agencies involved in passenger rail security matters,
and both undertook numerous initiatives both before and after 9/11 to
enhance security. For example, FTA conducted security readiness
assessments of rail transit systems, sponsored security training, and
developed security guidance for transit agencies. FRA has assisted
commuter railroads and Amtrak in developing security plans, conducted
security inspections of commuter railroads, and researched various
security technologies, among other things. Since taking over as the
lead federal agency responsible for transportation security, TSA has
also taken a number of actions intended to enhance passenger rail
security. For example, in response to the commuter rail attacks in
Madrid, and federal intelligence on potential threats against U.S.
passenger rail systems, TSA issued security directives for rail
operators in May 2004. The directives required rail operators to
implement a number of general security measures, such as conducting
frequent inspections of stations, terminals, and other assets, or
utilizing canine explosive detection teams, if available. The issuance
of these directives was an effort to take swift action in response to a
current threat. However, as we reported in September 2005, because
these directives were issued with limited input and review by rail
industry and federal stakeholders, they may not provide the industry
with baseline security standards based on industry best
practices.[Footnote 58] Furthermore, no permanent rail security
standards had been promulgated and clear guidance for rail operators
was lacking. To ensure that future rail security directives are
enforceable, transparent, and feasible, we recommended that TSA
collaborate with the Department of Transportation and the passenger
rail industry to develop rail security standards that reflect industry
best practices and that can be measured, monitored, and enforced. Among
other actions taken, TSA has also tested emergency rail security
technologies for screening passenger baggage and has enlarged its
national explosives detection canine program to train and place canine
teams in the nation's mass transit and commuter rail systems. (See app.
III for information on GAO products related to passenger rail
security.)
TSA Has Identified the Nation's Highway Infrastructure and Commercial
Vehicles as Vulnerable to Terrorist Attack:
In addition to the U.S. passenger rail system, concerns have been
raised about the nation's highway infrastructure, which facilitates
transportation for a vast network of interstate and intrastate trucking
companies and others. Vehicles and highway infrastructure play an
essential role in the movement of goods, services, and people, yet more
work needs to be done to assess or address vulnerabilities to acts of
terrorism that may exist in these systems. Surface transportation
provides terrorists with thousands of points from which to attack and
easy escape routes, potentially causing significant loss of life and
economic harm. Indeed, threat information and TSA assessments have
identified that specific components of the commercial vehicle sector
are potential targets--and are vulnerable--to terrorist attacks. Among
other targets, attackers can target bridges, tunnels, and trucks,
including using hazardous material trucks as weapons. Further, the
diversity of the trucking industry poses additional challenges in
effectively integrating security in both large, complex trucking
operations and smaller owner/operator businesses. We have work under
way to analyze federal efforts to strengthen the security of commercial
vehicles, including vehicles carrying hazardous materials, and how
federal agencies coordinate their efforts to secure the commercial
vehicle sector. We expect to report on this work later this year.
Federal Agencies and Stakeholders Have Taken Steps to Identify and
Reduce Vulnerabilities and Enhance Security at Seaports:
The maritime sector is another critical area of transportation where a
number of federal agencies and local stakeholders have taken many
actions to secure seaports. Since the terrorist attacks of September
11, the nation's 361 seaports have been increasingly viewed as
potential targets for future terrorist attacks. These ports are
vulnerable because they are sprawling, interwoven with complex
transportation networks, close to crowded metropolitan areas, and are
easily accessible. Ports contain a number of specific facilities that
could be targeted by terrorists, including military vessels and bases,
cruise ships, passenger ferries, terminals, locks and dams, factories,
office buildings, power plants, refineries, sports complexes, and other
critical infrastructure. The large cargo volumes passing through
seaports, such as containers destined for further shipment by other
modes of transportation such as rail or truck, also represent a
potential conduit for terrorists to smuggle weapons of mass destruction
or other dangerous materials into the United States. The potential
consequences of the risks created by these vulnerabilities are
significant as the nation's economy relies on an expeditious flow of
goods through seaports. Although no port-related terrorist attacks have
occurred in the United States, terrorists overseas have demonstrated
their ability to access and destroy infrastructure, assets, and lives
in and around seaports. A successful attack on a seaport could result
in a dramatic slowdown in the supply system, with consequences in the
billions of dollars.
Much was set in motion to address these risks in the wake of the 9/11
terrorist attacks. We have reported that a number of actions have been
taken or are under way to address seaport security by a diverse mix of
agencies and seaport stakeholders. Federal agencies, such as the Coast
Guard, CBP, and TSA, have been tasked with responsibilities and
functions intended to make seaports more secure, such as monitoring
vessel traffic or inspecting cargo and containers, and procuring new
assets such as aircraft and cutters to conduct patrols and respond to
threats. In addition to these federal agencies, seaport stakeholders in
the private sector and at the state and local levels of government have
taken actions to enhance the security of seaports, such as conducting
security assessments of infrastructure and vessels operated within the
seaports and developing security plans to protect against a terrorist
attack. The actions taken by these agencies and stakeholders are
primarily aimed at three types of protections: (1) identifying and
reducing vulnerabilities of the facilities, infrastructure, and vessels
operating in seaports; (2) securing the cargo and commerce flowing
through seaports; and (3) developing greater maritime domain awareness
through enhanced intelligence, information- sharing capabilities, and
assets and technologies.
Our work indicated that assessments of potential targets have been
completed at 55 of the nation's most economically and militarily
strategic seaports, and more than 9,000 vessels and over 3,000
facilities have developed security plans that have been reviewed by the
Coast Guard. New assets are budgeted and are coming on line, including
new Coast Guard boats and cutters and communication systems. Finally,
new information-sharing networks and command structures have been
created to allow more coordinated responses and increased awareness of
activities going on in the maritime domain. Some of these efforts have
been completed and others are ongoing; overall, the amount of effort
has been considerable. (Federal efforts to secure container cargo
crossing U.S. borders by land or sea are discussed later in this
report.) (See app. III for information on our products related to
maritime security.)
TSA and Other Agencies Have Begun Using a Risk-Management Approach to
Identify and Prioritize Transportation Security Needs and Investments:
Even with all the actions taken since 9/11 by Congress and federal
agencies to strengthen our transportation-related layers of defense, we
have reported that it seems improbable that all risk can be eliminated,
or that any security framework can successfully anticipate and thwart
every type of potential terrorist threat that highly motivated, well
skilled, and adequately funded terrorist groups could devise. This is
not to suggest that security efforts do not matter-- they clearly do.
However, it is important to keep in mind that total security cannot be
bought no matter how much is spent on it. We cannot afford to protect
everything against all threats--choices must be made about security
priorities. Thus, great care needs to be taken to assign available
resources to address the greatest risks, along with selecting those
strategies that make the most efficient and effective use of resources.
One approach we have advocated to help ensure that resources are
assigned and appropriate strategies are selected to address the
greatest risks is through risk management--that is, defining and
reducing risk. To help federal decision makers determine how to best
allocate limited resources, we have advocated, the National Commission
on Terrorist Attacks Upon the United States (the 9/11 Commission) has
recommended, and the subsequent Intelligence Reform and Terrorism
Prevention Act of 2004 requires that a risk management approach be
employed to guide security decision making.[Footnote 59] We have
concluded that without a risk management approach, there is limited
assurance that programs designed to combat terrorism are properly
prioritized and focused. A risk management approach is a systematic
process for analyzing threats and vulnerabilities, together with the
criticality (that is, the relative importance) of the assets involved.
This process consists of a series of analytical and managerial steps,
basically sequential, that can be used to assess vulnerabilities,
determine the criticality (that is, the relative importance) of the
assets being considered, determine the threats to the assets, and
assess alternatives for reducing the risks. Once these are assessed and
identified, actions to improve security and reduce the risks can be
chosen from the alternatives for implementation. To be effective, this
process must be repeated when threats or conditions change to
incorporate any new information to adjust and revise the assessments
and actions.
In July 2005, in announcing his proposal for the reorganization of DHS,
the Secretary of the Department of Homeland Security declared that as a
core principle of the reorganization, the department must base its work
on priorities driven by risk. DHS has also taken steps to implement a
risk-based approach to assessing risks in various transportation modes.
For example, TSA completed an air cargo strategic plan 3 years ago that
outlined a threat-based, risk management approach to secure the air
cargo system by, among other things, targeting elevated risk cargo for
inspection. TSA also completed an updated cargo threat assessment in
April 2005. However, we reported in November 2005 that TSA had not yet
established a methodology and schedule for completing assessments of
air cargo vulnerabilities and critical assets--two crucial elements of
a risk- based management approach without which TSA may not be able to
appropriately focus its resources on the most critical security needs.
We recommended that TSA, among other things, complete its assessments
of air cargo vulnerabilities and critical assets. (TSA has not provided
any documentation to indicate that either the methodology or the
schedule has since been completed.) By not yet fully evaluating the
risks posed by terrorists to the air cargo transportation system
through assessments of systemwide vulnerabilities and critical assets,
including analyzing information on air cargo security breaches, TSA is
limited in its ability to focus its resources on those air cargo
vulnerabilities that represent the most critical security needs and
assure Congress that existing funds are being spent in the most
efficient and effective manner.
With respect to passenger rail, DHS's Office of Grants and Training
(OGT) has developed and implemented a risk assessment methodology that
it has used to complete risk assessments at rail facilities around the
country. As we reported in September 2005, rail operators we
interviewed stated that OGT's risk management approach has helped them
to allocate and prioritize resources to protect their systems. OGT has
provided over $320 million in grants to rail transit agencies for
certain security activities since fiscal year 2003. OGT has also
leveraged its grant-making authority to promote risk-based funding
decisions for passenger rail by requiring, for example, that operators
complete a risk assessment to be eligible for a transit security grant.
TSA has also recently begun to conduct risk assessments of the rail
sector as part of a broader effort to assess risk to all transportation
modes, but has not completed these efforts or determined how to analyze
and characterize risks that are identified. Until these efforts are
completed, TSA will not be able to prioritize passenger rail assets
based on risk and help guide investment decisions about protecting
them. We recommended in 2005 that TSA establish a plan and time line
for completing its methodology for conducting risk assessments and
evaluate whether the risk assessments used by OGT should be leveraged
to facilitate the completion of risk assessments for rail and other
transportation modes.
Progress also has been made to analyze risks to other transportation
sectors. For example, with respect to seaports, Coast Guard has been
using a port security risk assessment tool for determining the risk
associated with specific attack scenarios against key infrastructure or
vessels in local ports. Under this approach, seaport infrastructure
that is determined to be both a critical asset and a likely and
vulnerable target would be a high priority for security enhancements or
funding. In general, we have reported that the most progress has been
made on fundamental steps, such as conducting risk assessments of
individual assets, and that the least amount of progress has been made
on developing ways to translate this information into comparisons and
priorities across ports or across infrastructure sectors.[Footnote 60]
Federal Agencies Have Recognized the Need to Enhance Cooperation with
Domestic and International Stakeholders in Order to Strengthen
Transportation Security:
Federal agencies with transportation security responsibilities should
not expect to develop or implement enhanced security goals and
standards for transportation without participation and input from other
federal partners, as well as key state, local, private-sector, and
international stakeholders. These stakeholders include, for example,
federal transportation modal administrations such as FTA and FRA, local
governments, air carriers and airports, rail and seaport operators,
private industry trade associations, and foreign governments. It is
important that all these stakeholders be involved, as applicable and
appropriate, in coordinating security-related priorities and
activities, and reviewing and sharing best practices on security-
related programs and policies as a means of developing common security
frameworks. Such efforts are important in part because we are
increasingly interdependent when it comes to addressing security gaps.
For example, we place Federal Air Marshals on international flights,
and we match information from passengers on international flights bound
for the United States against terrorist watch lists. This
interdependence requires close coordination and opportunities to
harmonize security standards and practices with critical stakeholders,
such as foreign governments.
Federal partnerships with various domestic stakeholders are under way
throughout the transportation sector. In aviation, for example, TSA has
been developing partnerships with private air carriers to conduct
passenger prescreening, but continues to face challenges both
identifying and supporting the roles it expects air carriers to play in
the prescreening process, especially with regard to Secure Flight. In
making recommendations to TSA on passenger prescreening, we have
emphasized the need for TSA to continue to strengthen federal
partnerships, and its partnerships with air carriers, in order to
coordinate passenger screening programs, such as Secure Flight. For
passenger rail, as mentioned previously, we have also recommended that
TSA collaborate with the Department of Transportation and private
industry rail operators on developing security standards that reflect
industry best practices. In response, TSA is taking action to
strengthen its partnerships with these stakeholders and is currently
working with the American Public Transportation Association on
developing passenger rail security standards based upon best practices.
Establishing federal partnerships with foreign governments and industry
associations tackling similar transportation security challenges can
provide important strategic opportunities to learn about security
practices and programs that have worked elsewhere. As European Union
countries and others throughout the world become more focused on
aviation and transportation security, and with the establishment of
international aviation security standards, TSA officials have
acknowledged the importance of coordinating and collaborating with
foreign countries on security matters. We have ongoing work examining
TSA's efforts to coordinate with foreign governments on aviation
security and expect to report on our results in the first quarter of
2007.
In our work on passenger rail security, we identified some practices
that are utilized abroad that U.S. rail operators or the federal
government had not studied in terms of the feasibility, costs, and
benefits. For example, covert testing to determine whether security
personnel comply with established security standards, which has been
conducted at rail stations in the United Kingdom and elsewhere, is one
approach TSA and rail industry stakeholders could consider. We
recommended, among other things, that TSA evaluate the potential
benefits and applicability--as risk analyses warrant and as
opportunities permit--of implementing covert testing processes and
other security practices that were not currently in use in the United
States at the time our September 2005 report. In response, TSA, through
DHS, stated that it had been working with foreign counterparts on rail
and transit security issues in order to share and glean best practices
and intended to continue to do so.
GAO Concluding Observations--Enhancing Security of Other Transportation
Modes:
It is understandable that in the months and years following the 9/11
attacks, Congress and federal departments focused primarily on meeting
the aviation security deadlines contained in ATSA and, in general,
addressing the aviation-related vulnerabilities exploited by the
terrorists. Over time, recognizing the threats and vulnerabilities
facing other transportation modes, TSA and other agencies have begun to
address other transportation security needs that were not the focal
point of 9/11, including passenger rail, the maritime sector, and
surface transportation modes. In these areas, TSA and other agencies
have begun to identify and set priorities, based on risk and other
factors, in order to allocate finite resources to enhance protection of
the nation's passenger rail systems, seaports, highways, and other
critical transportation assets. Agencies have made some progress but
have a long way to go toward working with domestic and international
partners to identify critical transportation assets, develop strategies
for protecting them, and use a risk-based approach to prioritize and
allocate resources across competing transportation security
requirements.
Measures to Improve Visa Applicant Screening, Consular Counterterrorism
Training, and Fraud Detection Have Strengthened the Visa Process as an
Antiterrorism Tool:
The visa process is a first layer of border security to prevent
terrorists or criminals from gaining entry into the United States.
Citizens of other countries seeking to enter the country temporarily
for business and other reasons generally must apply for and obtain a
visa. Before 9/11, U.S. visa operations focused primarily on illegal
immigration concerns; after the attacks, greater emphasis was placed on
using the visa process as a counterterrorism tool. Congress, DHS, and
State have taken numerous actions to help strengthen the visa process
by, among other things, expanding the name-check system used to screen
applicants (including portions of the consolidated watch list),
requiring in-person interviews for nearly all applicants, revamping
consular training to focus on counterterrorism, and augmenting staff at
consular posts. Steps also have been taken to help detect and prevent
visa fraud. In addition, State and DHS officials have acknowledged that
immigrant visa processes--whereby immigrants seeking permanent
residency in the United States must obtain a certain type of visa--may
warrant further review because these visa types could also pose
potential security risks.
Visa Process Prior to 9/11 Did Not Focus on Counterterrorism:
Citizens of other countries seeking to enter the United States
temporarily for business and other reasons generally must apply for and
obtain a U.S. travel document, called a visa, at U.S. embassies or
consulates abroad before arriving at U.S. ports of entry. The main
steps required to obtain a visa are generally the same before and after
9/11: visa applicants must submit an application to a consulate or
embassy; consular officials review the applicant's documentation; the
applicant's information is checked against a name-check system
maintained by State; officials then issue, or decline to issue, a visa,
which the applicant may then present to CBP officials (formerly
Immigration and Naturalization Service inspectors) for inspection prior
to entering the United States.[Footnote 61]
While the general visa process has remained intact, the focus before
9/11 was primarily on screening applicants to determine whether they
intended to work or reside illegally in the United States, though
screening for terrorists was also part of this process. The 9/11
Commission staff reported that no U.S. agency at the time of the
attacks thought of the visa process as an antiterrorism tool, and noted
that consular officers were not trained to screen for
terrorists.[Footnote 62] Overseas consular posts, which administer the
visa process, were encouraged to promote international travel, and were
given substantial discretion in determining the level of scrutiny
applied to visa applications. For example, posts had latitude to
routinely waive in-person interviews as part of their overall visa
applicant screening process. In making decisions about who should
receive a visa, consular officials relied on a State Department name-
check database[Footnote 63] that incorporated information from many
agencies on individuals who had been refused visas in the past, had
other immigration violations, and had raised terrorism concerns. This
name-check database was the primary basis for identifying potential
terrorists and other ineligible applicants.
With these policies and State's name-check system in place, the 19
hijackers exploited this process and were able to obtain visas. (See
app. I for details on the hijackers' visa applications and a time line
of visas issued to hijackers during this period.) Specifically, the
hijackers were issued a total of 23 visas at five different consular
posts from April 1997 through June 2001 (multiple visas were issued
over this period, for different stays). These visas were issued based
on the belief that the applicants were "good cases," that is, they were
not perceived as security risks and were thought likely to return to
their country at the end of their allotted time in the United States.
For citizens of either Saudi Arabia or United Arab Emirates, for
example, post policies were to consider all of these citizens as "good
cases" for visas. Thus, it was policy for consular officers in these
countries to issue visas to most Saudi and Emirati applicants without
interviewing them unless their names showed up in the name- check
database or they had indicated on their applications that they had a
criminal history. In addition, consular managers at these posts said
that the posts had accepted applications from Saudi and Emirati
nationals that weren't completely filled out and lacked supporting
documentation.
As it turned out, 17 of the 19 hijackers were citizens of either Saudi
Arabia or United Arab Emirates. None of the visa applications for which
we were able to obtain documentation[Footnote 64] was completely filled
out and consular officers granted visas to all but 2 of the 15
hijackers for whom records were available, without conducting an
interview. Moreover, while consular officers who issued visas to the
hijackers followed established procedures for checking to see if these
individuals were included in the name-check database when they applied
for visas, the database did not contain information on any of them.
While the intelligence community notified State a few weeks prior to
9/11 that it had identified two of them as possible terrorists who
should not receive visas, the visas had already been issued--and
although they were subsequently revoked, by that time the hijackers had
entered the country.
New Visa-Related Policies and Programs Have Been Implemented to Enhance
Visa Security, Improve Applicant Screening, Prevent Fraud, and More:
As we reported in September 2005, State, DHS, and other agencies have
taken many steps since the 9/11 attacks to strengthen the visa process
as an antiterrorism tool.[Footnote 65] For example, the consular name-
check database has been expanded--the information in this database now
draws upon a subset of the Terrorist Screening Center's consolidated
watch list as well as other information. Specifically, State, in
cooperation with other federal agencies, has increased the amount of
information available to consular officers in the name-check database
by fivefold--from 48,000 records in September 2001 to approximately
260,000 records in June 2005. An additional 8 million records on
criminal history from the FBI also are now available for the name-check
process. In addition, under the leadership of the Assistant Secretary
of State for Consular Affairs, our work shows that consular officers
are receiving clear guidance on the importance of security as the first
priority of the visa process. Our observations of consular sections at
eight posts in 2005 confirmed, for instance, that consular officers
overseas regard security as their top priority, while also recognizing
the importance of facilitating legitimate travel to the United States.
New Operating Procedures and Requirements Strengthen the Visa Issuance
Process:
Many new policies have been introduced, and existing policies revised,
both to strengthen the visa process as a terrorist screening tool and
to build in more structure for posts that have traditionally had
discretionary latitude in handling visa matters. One key policy change,
mandated in the Intelligence Reform and Terrorism Prevention Act of
2004[Footnote 66] and which we had previously recommended,[Footnote 67]
requires that consular posts conduct in- person interviews with most
applicants for nonimmigrant visas with certain exceptions. Generally,
applicants between the ages of 14 and 79 must submit to an in-person
interview though under certain circumstances such interviews can be
waived. To ensure that these and other new policies for strengthening
the visa process as an antiterrorism tool would be understood and
implemented by all consular officers at all posts, State, in
consultation with DHS, has issued more than 80 new standard operating
procedures related to security and other matters. For example, State
has issued procedures implementing the legislative provision that
places restrictions on the issuance of nonimmigrant visas to persons
coming from countries that sponsor terrorism.[Footnote 68] Another new
procedure informs consular offices about fingerprint requirements for
visa applicants.[Footnote 69]
State has also established management controls to ensure that visa
applications are processed in a consistent manner at each post, in part
to reinforce security-related policies and procedures. For example, the
department created Consular Management Assistance Teams to conduct
management reviews and field visits of consular sections worldwide,
providing guidance to posts on standard operating procedures. Over 90
of these reviews have been conducted, in which the teams evaluate
operations and make recommendations to mitigate a range of potential
vulnerabilities they identify in their visits.
In addition, as a means of adding a layer of security review prior to
issuing new visas, DHS has, as directed by Congress,[Footnote 70]
assigned visa security officers in Saudi Arabia to review all visa
applications prior to adjudication by State's consular officers, and to
provide expert advice and training to consular officers on visa
security at selected U.S. embassies and consulates. This effort, known
as the Visa Security Program, is being expanded to other posts.
According to State's consular officers, the deputy chief of mission,
and DHS officials in Saudi Arabia, the visa security officers deployed
in Riyadh and Jeddah, Saudi Arabia, strengthen visa security because of
their law enforcement and immigration experience, as well as their
ability to access and use information from law enforcement databases
not immediately available, by law, to consular officers. Based on
recommendations we made in 2005, DHS has developed performance data to
assess the results of this program at each post.
Consular Training on Counterterrorism and Security Supports State
Department Efforts to Use Visa Application Process as Antiterrorism
Tool:
Consular officers' training has been revamped and expanded to emphasize
counterterrorism. For example, the basic consular training course has
been lengthened from 26 days to 31 days to provide added emphasis on
visa security, counterterrorism awareness, and interviewing techniques.
And last year, State initiated training to enhance interviewing
techniques, specifically designed to help consular officers spot
inconsistencies in a visa applicant's story or in the applicant's
demeanor; such observations may form a sufficient basis for denying a
visa. State Department officials believe this training is important to
help consular officers determine, during the interview period, whether
applicants whose documents do not indicate any terrorist ties show
signs of deception.
Visa Fraud-prevention Measures Implemented to Complement Other Counter-
Terrorism Efforts:
To complement efforts taken to implement new guidance, policies and
procedures, and management controls, State also has taken actions to
address the potential for visa fraud at consular posts. As the 9/11
Commission staff noted, 2 of the 19 terrorist hijackers used passports
that had been manipulated in a fraudulent manner to obtain visas needed
to enter the country. State has since deployed 25 visa fraud
investigators to U.S. embassies and consulates and developed ways for
consular officers in the field to learn about fraud prevention
including, for example, an on-line discussion group, comprised of more
than 500 members, where information on, and lessons learned from, prior
fraud cases may be shared. Training on fraud prevention also has been
bolstered. For example, State expanded fraud prevention course
offerings for managers from 2 to 10 times annually; DHS's ICE provides
training to State's fraud prevention managers; and ICE's Forensic
Document Laboratory provides training on forensic documentation and
analysis to combat travel and identity document fraud.
Acting on a recommendation we made in 2005 on fraud prevention, State's
Vulnerability Assessment Unit[Footnote 71] has begun to conduct more in-
depth analyses of the visa information that is collected as a means of
detecting patterns and trends that may indicate the potential for fraud
and determining whether additional investigation may be needed. Using
data-mining techniques (searching large volumes of data for patterns),
this unit can, for example, use its internal databases to trigger
alerts when specific keywords or activities arise, such as visas issued
to individuals associated with certain organizations with terrorist
ties, or sudden increases in visas issued to individuals residing in
countries where they are not citizens. This proactive analysis may
result in investigations and further mitigates potential fraud risks in
the visa process.
In addition, the Intelligence Reform and Terrorist Prevention Act of
2004 required State in coordination with DHS to conduct a survey of
each diplomatic and consular post to assess the extent to which
fraudulent documents are presented by visa applicants.[Footnote 72] The
act mandates that State in coordination with DHS identify the posts
experiencing the greatest frequency of fraudulent documents being
presented by visa applicants and place in those posts at least one full-
time antifraud specialist. The presence of full-time fraud officers at
high-fraud posts is particularly important given that entry-level
officers may serve as fraud prevention managers on a part-time basis,
in addition to their other responsibilities.[Footnote 73] According to
State officials, as of July 2006, State had completed its review of
fraud levels at posts, and is continuing to refine its methodology for
determining which posts have the highest levels of fraud in the visa
process.
State Is Addressing Consular Staffing and Language- Proficiency
Challenges:
In addition to implementing new policies, procedures, and antifraud
measures, State also has taken some steps to address staffing and
language proficiency issues at consular posts. Though State added
hundreds of Foreign Service consular positions after 9/11, and an
additional 150 consular officer positions have been authorized annually
from fiscal year 2006 through fiscal year 2009, State has reported that
a staffing shortage at consular posts persists, and we have reported on
multiple occasions that State has a shortage of mid-level, supervisory,
consular officers at key overseas posts, and that the department has
not assessed its overall consular staffing needs. Staff shortages have
also led to extensive wait times for visa interview appointments at
some posts. We are currently reviewing this issue and expect to report
on our findings early this year. Moreover, in our earlier work, we
found that not all consular officers were proficient in languages at
their posts in order to hold interviews with visa applicants.[Footnote
74] To remedy a shortage of consular officers able to speak critical
languages, State has made efforts to focus recruitment of consular
officers to include more who are proficient in languages it deems
critical. (See app. III for a list of our products related to the visa
process.)
Potential Security Risks of Visa Programs for Immigrants Seeking
Permanent Residency Status Warrant Review:
While State and other agencies have enhanced and strengthened policies
and procedures for screening applicants for nonimmigrant visas, State
and DHS have acknowledged that the visa process for immigrants seeking
to reside in the United States on a permanent basis may warrant further
review because these visa types could also pose potential security
risks. Immigrant visas are issued on the basis of certain family
relationships or types of employment, refugee status, or other
circumstances adjudicated by officials at several federal agencies,
including the departments of Homeland Security, Labor, and Justice. We
have recently begun a review to identify the security risks associated
with various immigrant visa programs, and plan to issue a report later
this year.
One immigrant visa program singled out by the State OIG 3 years ago as
potentially risky was the Diversity Visa program, established by
Congress in 1995. It authorizes the issuance of up to 50,000 immigrant
visas annually to persons from countries that are underrepresented
among the 400,000 to 500,000 immigrants coming to the United States
each year, and who qualify for a visa on the basis of their education
level and/or work experience.[Footnote 75] This program is commonly
referred to as the visa lottery because "winners" are selected through
a computer-generated random drawing.[Footnote 76] The applicants who
receive a visa under this program are authorized to live and work
permanently in the United States. The State OIG reported as a concern
in 2003 that the Diversity Visa program did not generally prohibit the
issuance of visas to aliens from countries that sponsor terrorism. (The
nonimmigrant visa process, by contrast, places restrictions on the
issuance of visas to persons from countries sponsoring terrorism.)
Steps have since been taken by the State Department to address this
concern. In 2005, the OIG reported that revised consular procedures and
heightened awareness generally provided greater safeguards against
terrorists entering through the Diversity Visa process than in the
past. For example, the OIG noted that consular officers interview all
Diversity Visa winners and check applicants' police and medical
records. In addition, all immigrant visa applicants (as well as
nonimmigrant applicants) are required to be fingerprinted; the
fingerprint system helps to identify fraudulent applicants using false
names. Despite these actions, the OIG continues to believe that the
program still poses significant risks to national security from hostile
intelligence officers, criminals, and terrorists attempting to use the
program for entry into the United States as permanent residents. We are
also reviewing the potential security risks of the Diversity Visa
program as part of our ongoing review of immigrant visa programs.
GAO Concluding Observations--Visa Process:
The range of actions that State and DHS have undertaken to strengthen
the nonimmigrant visa process as an antiterrorism tool--in part in
response to our past recommendations---have, when considered
altogether, gone a long way toward reducing the likelihood that
terrorists can obtain the visas needed to enter the United States and
wreak havoc. While it is generally acknowledged that the visa process
can never be entirely failsafe--and that it will never be possible to
entirely eliminate the risk of terrorists obtaining nonimmigrant visas
issued by the United States government--the federal government has done
a creditable job overall of strengthening the visa process as a first
line of defense. Separate concerns have been raised about potential
risks associated with certain immigrant visa programs, and we have
initiated a review to identify and analyze these potential security
risks.
Efforts to Screen and Verify Travelers and Detect Fraudulent Travel
Documents Have Enhanced Border Security, but We Have Reported More Work
Is Needed to Ensure That Risks Posed by Certain Travelers and Cargo Are
Mitigated:
The processes for screening and inspecting travelers arriving at the
nation's air, land, and sea ports represent a key layer of border
security defense. Many measures have been put in place to enhance
security in these and related areas, but policies and programs can
still be strengthened. For example, the Visa Waiver Program, which
enables travelers from certain countries to seek entry into the United
States without visas, carries inherent security, law enforcement, and
illegal immigration risks because, among other things, visa waiver
travelers are not subject to the same degree of screening as those
travelers required to obtain visas. In addition, the potential misuse
of lost or stolen passports from visa waiver countries is a serious
security problem that terrorists and others can potentially exploit.
Since 9/11, in response to congressional requirements, DHS has begun
taking steps designed to mitigate the risks posed by visa waiver
travelers; however, we have reported that additional actions are needed
to further mitigate the risks posed by the use of fraudulent identity
documentation, including actions to ensure that foreign governments
report information on lost or stolen passports. Separately, a border
security initiative designed to verify travelers' identities--US-
VISIT--has helped to process and authenticate travelers seeking entry
(or reentry) to the country. A key goal of US-VISIT--tracking those who
overstay their authorized stay--cannot be fully implemented, however,
because, among other things, the exit portion of the initiative has not
been developed. Steps also have been taken by various federal agencies
to enhance detection of hazardous cargo shipped over land and to
identify oceangoing cargo containers that also may contain hazardous
materials or weapons, but more work is needed in both areas.
The Government Faces Challenges in Assessing and Mitigating the
Inherent Security Risks of the Visa Waiver Program:
While significant progress has been made to ensure that terrorists do
not obtain visas as a prelude to gaining entry to the United States,
visa holders are by no means the only foreign travelers coming to the
United States. Under the Visa Waiver Program, millions of travelers
seek entry into the United States each year without visas. The Visa
Waiver Program is intended to facilitate international travel and
commerce, and ease consular workload at overseas posts, by enabling
citizens of 27 participating countries to travel to the United States
for tourism or business for 90 days or less without first obtaining a
nonimmigrant visa from U.S. embassies and consulates.[Footnote 77] (See
app. II for a map of Visa Waiver Program member countries.) While the
Visa Waiver Program provides many benefits to the United States, there
are inherent security, law enforcement, and illegal immigration risks
in the program because some foreign citizens may exploit the program to
enter the United States. In particular, visa waiver travelers are not
subject to the same degree of screening as those travelers who must
first obtain a visa before arriving in the United States. Furthermore,
lost and stolen passports from visa waiver countries could be used by
terrorists, criminals, and immigration law violators to gain entry into
the United States. While DHS established a unit in 2004 to oversee the
program and conduct mandated assessments of program risks, we reported
in July 2006 that the assessment process has weaknesses and the unit
was unable to effectively monitor risks on a continuing basis because
of insufficient resources.[Footnote 78] Furthermore, while DHS has
taken some actions to mitigate program risks, the department has faced
difficulties in further mitigating the risks of the program,
particularly regarding lost and stolen passports--a key vulnerability.
Visa Waiver Travelers and Visa Applicants Face Different Levels of
Screening, by Design:
In fiscal year 2005, nearly 16 million travelers entered the United
States under the Visa Waiver Program, and visa waiver travelers have
represented roughly one-half of all nonimmigrant admissions to the
United States in recent years. The program is beneficial, according to
federal officials, because it facilitates international travel for
millions of foreign citizens seeking to visit the United States each
year, provides reciprocal visa-free travel for Americans visiting visa
waiver member countries, and creates substantial economic benefits for
the United States. Moreover, the program allows State to allocate its
limited resources to visa-issuing posts in countries with higher-risk
applicant pools.
By design, visa waiver travelers are not subject to the same degree of
screening as those travelers who must first obtain a visa before
arriving in the United States. Travelers who must apply for visas
receive two levels of screening as they are first screened by consular
officers overseas and then by CBP officers before entering the country.
However, visa waiver travelers are first screened in person by a CBP
inspector upon arrival at a U.S. port of entry.[Footnote 79]
For all travelers, CBP primary officers observe the applicant, examine
that person's passport, collect the applicant's fingerprints as part of
the U.S. Visitor and Immigrant Status Indicator Technology program (US-
VISIT), and check the person's name against automated databases and
watch lists, which contain information regarding the admissibility of
aliens, including known terrorists, criminals, and immigration law
violators. However, according to the DHS Office of Inspector General,
CBP's primary border officers are disadvantaged when screening visa
waiver travelers because they may not know the alien's language or
local fraud trends in the alien's home country, nor have the time to
conduct an extensive interview. In contrast, non-visa waiver travelers,
who must obtain a visa from a U.S. embassy or consulate, undergo an
interview by consular officials overseas, who conduct a rigorous
screening process when deciding to approve or deny a visa. Moreover,
consular officers have more time to interview applicants and examine
the authenticity of their passports, and may speak the visa applicant's
native language, according to consular officials. Fig. 5 provides a
comparison of the process for visa waiver travelers and visa
applicants.
Figure 5: Traveler Screening Process: U.S. Visa Holders versus Visa
Waiver Program Travelers:
[See PDF for image]
Source: GAO; Nova Development (clip art).
[End of figure]
DHS Has Taken Steps to Enhance Oversight of Visa Waiver Program
Countries' Participation but There Are Weaknesses in Program Oversight:
The Visa Waiver Program, while valuable, can pose risks to U.S.
security, law enforcement, and immigration interests because some
foreign citizens may try to exploit the program to enter the United
States. Indeed, convicted 9/11 terrorist Zacarias Moussaoui and "shoe-
bomber" Richard Reid both boarded flights to the United States with
passports issued by Visa Waiver Program countries. Moreover, as we have
reported,[Footnote 80] inadmissible travelers who need visas to enter
the United States may attempt to acquire a passport from a Visa Waiver
Program country to avoid the additional scrutiny that takes place in
non-visa waiver countries. Since the terrorist attacks, the government
has taken several actions intended to enhance the security of the Visa
Waiver Program by improving program management, oversight, and efforts
to assess and mitigate program risks, among other things. For example,
shortly after 9/11, Congress required DHS to increase the frequency of
mandated assessments to determine the effect of each country's
continued participation in the Visa Waiver Program on U.S. security,
law enforcement, and immigration interests, from once every 5 years to
once every 2 years (biennially).[Footnote 81] These assessments are
important because they enable the United States to analyze individual
participating countries' border controls, security over passports and
national identity documents, and other matters relevant to law
enforcement, immigration, and national security. In April 2004, the DHS
OIG reported that a lack of funding, training and other issues left DHS
unable to comply with the congressionally mandated biennial country
assessments.[Footnote 82] In response to the OIG's findings, DHS
established a Visa Waiver Program Oversight Unit[Footnote 83] to
oversee Visa Waiver Program activities and monitor countries' adherence
to the program's statutory requirements to help ensure that the United
States is protected from those who wish to do it harm or violate its
laws, including immigration laws. Actions taken by this unit include
completing comprehensive assessments for 25 of the 27 visa waiver
countries (with the remaining two under way); identifying risks through
these assessments, which were brought to the attention of host country
governments for five countries; working with countries seeking to join
the program; and briefing foreign government representatives from
participating countries on issues of interest and concern such as new
passport requirements for visa waiver travelers.
While the move to a biennial review process and establishment of the
Visa Waiver Program Oversight Unit represents a good first step to
better assess the inherent risks of the program, our recent work
indicates that DHS could improve its administration of this effort and
raises concerns about the agency's ability to effectively monitor the
law enforcement and security risks due to staffing and resource
constraints. For example, in our July 2006 report, we identified
several problems with DHS's first biennially based review cycle
conducted in 2004, including the lack of clear criteria when assessing
each country's participation in the program to determine at what point
security concerns in a particular country would trigger discussions
with foreign governments to resolve them. Moreover, DHS did not issue
the mandated summary report to Congress in a timely manner, describing
the findings from its 25 country assessments. DHS, State, and Justice
officials acknowledged that the report--consisting of a six-page
summary lacking detailed descriptions of the law enforcement and
security risks identified during the review process and which was
delivered more than a year after the site visits were made--took too
long to complete. As a result of this lengthy process, the final report
delivered to Congress did not necessarily reflect the current law
enforcement and security risks posed by each country, and did not
capture recent developments. For example, the large-scale theft of
blank passports in a visa waiver country that took place while the
report was being processed was not reflected in the country's report.
Thus, there were missed opportunities to report timely information to
Congress. In our July 2006 report, we recommended that DHS finalize
clear, consistent, and transparent protocols for biennial country
assessments and provide these protocols to stakeholders at relevant
agencies at headquarters and overseas. These protocols should provide
time lines for the entire assessment process, including the role of a
site visit, an explanation of the clearance process, and deadlines for
completion. In addition, we recommended to Congress that it establish a
biennial deadline by which DHS must complete its assessments and report
to Congress. In its formal comments to our report, DHS did not appear
to support the establishment of a deadline. Instead, DHS suggested that
Congress require continuous and ongoing evaluations of the risks of
each country's program.
With respect to staffing and resources to carry out these assessment
efforts and other program oversight responsibilities, we reported that
DHS cannot effectively monitor the law enforcement and security risks
posed by 27 visa waiver countries on a consistent, ongoing basis
because it has not provided the oversight unit with adequate staffing
and funding resources. Without adequate resources, the unit may be
unable to monitor and assess participating countries' compliance with
the program. We recommended that additional resources be provided to
strengthen the program oversight unit's monitoring activities. Until
this is achieved, staffing and resource constraints may hamper the
effectiveness of the Visa Waiver Program and could jeopardize U.S.
security interests.[Footnote 84] DHS has stated that it expects the
administration to seek resources appropriate for the oversight unit's
tasks.
Federal Agencies Have Begun to Address Security Risks Arising from Lost
or Stolen Passports, but We Have Reported That Additional Actions are
Needed to Further Mitigate These Risks:
In addition to efforts to improve administration and oversight and
assess the overall risks of the Visa Waiver Program, federal actions
also have been taken to mitigate one specific risk: the potential
misuse of lost or stolen passports. DHS intelligence analysts, law
enforcement officials, and forensic document experts all acknowledge
that the greatest security problem posed by the program is the
potential exploitation by terrorists, immigration law violators, and
other criminals of a country's lost or stolen passports--whether
they've been issued (used) or are blank (unused). Lost and stolen
passports from visa waiver countries are highly prized among those
travelers seeking to conceal their true identities or nationalities. In
2004, the DHS OIG reported that aliens applying for admission to the
United States using lost or stolen passports had little reason to fear
being caught. DHS has acknowledged that an undetermined number of
inadmissible aliens may have entered the United States using a stolen
or lost passport from a visa waiver country, and, in fact, passports
from Visa Waiver Program countries have been used illegally by
travelers attempting to enter the United States. For example, in a 6-
month period in 2005, DHS confiscated 298 fraudulent or altered
passports at U.S. ports of entry, which had been issued by visa waiver
countries. Visa waiver countries that do not consistently report the
losses or thefts of their citizens' passports, or of blank passports,
put the United States at greater risk of allowing inadmissible
travelers to enter the county.
DHS has begun taking steps intended to help mitigate the risks related
to lost and stolen passports. For example, in 2004, the DHS OIG
reported that a lack of training hampered CBP border inspectors'
ability to detect passport fraud among visa waiver travelers and
recommended that CBP officers receive additional training in fraudulent
document detection.[Footnote 85] In response, DHS has doubled the time
devoted to fraudulent document detection training for new officers from
1 day to 2 days, and provides additional courses for officers
throughout their assignments at ports of entry.
Nevertheless, training officials said that fraudulent and counterfeit
passports are extremely difficult to detect, even for the most
experienced border officers. Congress and DHS have taken additional
actions designed to mitigate this risk. For example, all passports
issued to visa waiver travelers between October 26, 2005 and October
25, 2006, must contain a digital photograph printed in the document,
and DHS is enforcing this requirement. For example, when Italy and
France failed to meet the deadline for issuing new passports encoded
with digital photographs, DHS began requiring citizens with
noncompliant passports to obtain a visa before visiting the United
States. In addition, passports issued to visa waiver travelers after
October 25, 2006, must be electronic (e-passports).[Footnote 86] E-
passports aim to enhance the security of travel documents, making it
more difficult for imposters or inadmissible aliens to misuse the
passport to gain entry into the United States. Travelers with passports
issued after the deadlines that do not meet these requirements are
required to obtain a visa from a U.S. embassy or consulate overseas
before departing for the United States. On October 26, 2006, DHS
announced that 24 of the 27 Visa Waiver Program countries had met the
deadline to begin issuing e-passports.[Footnote 87]
While e-passports may help officers to identify fraudulent and
counterfeit passports, because many passports issued from a visa waiver
country before the October 2006 deadline are not electronic--and remain
valid for years to come--it remains imperative that lost and stolen
passports from visa waiver countries be reported to the United States
on a timely basis. In 2002, Congress made the timely reporting of
stolen blank passports, in particular, a condition for continued
participation in the program and required that a country must be
terminated from the Visa Waiver Program if the Secretary of Homeland
Security and the Secretary of State jointly determine that this
information was not reported on a timely basis. According to DHS,
detecting stolen blank passports at U.S. ports of entry is extremely
difficult and some thefts of blank passports have not been reported to
the United States until years after the fact. For example, in 2004, a
visa waiver country reported to the United States the theft of nearly
300 blank passports more than 9 years after the theft occurred. DHS and
State have chosen not to terminate from the program countries that
failed to report these incidents. DHS officials told us that the
inherent political, economic, and diplomatic implications associated
with removing a country from the Visa Waiver Program make it difficult
to enforce the statutory requirement. Nevertheless, recognizing the
importance of timely reporting of this information, DHS has taken steps
to address this issue. For example, in 2004, during its assessment of
Germany's participation in the Visa Waiver Program, DHS determined that
several thousand blank German temporary passports[Footnote 88] had been
lost or stolen, and that Germany had not reported some of this
information to the United States. In response, after a series of
diplomatic discussions, temporary passport holders from Germany were no
longer allowed to travel to the United States without a visa. In
addition, because lost or stolen issued passports can be altered, DHS
issued guidance in 2005 to visa waiver countries requiring that they
certify their intent to report lost or stolen passport data on issued
passports. Some visa waiver countries do not provide this information
to the United States, due in part to concerns over the privacy of their
citizens' biographical information.
While we acknowledge the complexities and challenges of enforcing the
statutory requirement and collecting information on both blank and
issued stolen and lost passports aside, our recent work has identified
areas where DHS could do more to help ensure that countries report this
information--and do so in a timely manner. For example, as of June
2006, DHS had not yet issued guidance or standard operating procedures
on what information must be shared, with whom, and within what time
frame. In July 2006, we recommended that DHS require all visa waiver
countries to provide the United States with nonbiographical data from
lost or stolen issued passports, as well as from blank passports, and
develop and communicate clear standard operating procedures for the
reporting of these data, including a definition of timely reporting and
a designee to receive the information.[Footnote 89]
In a separate effort to mitigate risks from lost and stolen passports,
the U.S. government announced in 2005 its intention to require visa
waiver countries to certify their intent to report information on lost
and stolen blank and issued passports to the International Criminal
Police Organization (Interpol)[Footnote 90]-- the world's largest
international police organization. State reported to Congress in 2005
that it had instructed all U.S. embassies and consulates to take every
opportunity to persuade host governments to share this data with
Interpol. Interpol already has a database of lost and stolen travel
documents to which its member countries may contribute on a voluntary
basis. As of June 2006, this database contained more than 11 million
records of lost and stolen passports. However, the way visa member
countries and the United States interact with and utilize the Interpol
database system could be improved. While most of the 27 visa waiver
countries use and contribute to Interpol's database, 4 do not.
Moreover, some countries that do contribute do not do so on a regular
basis, according to Interpol officials. In addition, Interpol's data on
lost and stolen travel documents are not automatically accessible to
U.S. border officers at primary inspection-
-which is one reason why it is not an effective border screening tool,
according to DHS, State, and Justice officials. According to the
Secretary General of Interpol, until DHS can automatically query
Interpol's data, the United States will not have an effective screening
tool for checking passports. However, DHS has not yet finalized a plan
to acquire this systematic access to Interpol's data. We recently
recommended that DHS require all visa waiver countries to provide
Interpol with nonbiographical data from lost or stolen issued or blank
passports, and implement a plan to make Interpol's database
automatically available during primary inspection at U.S. ports of
entry.
GAO Concluding Observations--Visa Waiver Program:
The Visa Waiver Program aims to facilitate international travel for
millions of people each year and promote the effective use of
government resources. Effective oversight of the program entails
balancing these benefits against the program's potential risks. To find
this balance, as we have reported, the U.S. government needs to fully
identify the vulnerabilities posed by visa waiver travelers, and be in
a position to mitigate them. However, we found weaknesses in the
process by which the U.S. government assesses these risks, and DHS's
Visa Waiver Program oversight unit is not able to manage the program
with its current resource levels. While actions are under way to
address these issues, they have not all been resolved. Specifically, in
response to our recommendation that additional resources be provided to
strengthen the program oversight unit's monitoring activities, DHS
stated that it expected the administration to seek resources
appropriate for the unit's tasks. Until this is achieved, as we have
reported, staffing and resource constraints may hamper the
effectiveness of the Visa Waiver Program and could jeopardize U.S.
security interests. Moreover, DHS has not communicated clear reporting
requirements for lost and stolen passports--a key risk--nor can it
automatically access all stolen passport information when it is most
needed--namely, at the primary inspection point at U.S. points of
entry. We recently recommended that DHS require all visa waiver
countries provide the United States and Interpol with nonbiographical
data from lost or stolen issued passports, as well as from blank
passports, and implement a plan to make Interpol's lost and stolen
passport database automatically available during the primary inspection
process at U.S. ports of entry. DHS is in the process of implementing
these recommendations. Finding ways to address these and other
challenges, including those related to program staffing and managing
the visa waiver country review process, are especially important, given
that, while it does not appear there will be any expansion of the Visa
Waiver Program in the short term, many countries are actively seeking
admission into the program, and the President has announced his support
for the program's expansion.
US-VISIT Border Security Initiative Helps to Process and Authenticate
Travelers Entering the Country, but Identifying Overstays and Detecting
Fraudulent Travel Documents Remain Challenges:
Over the last decade, the United States has, at the direction of
Congress, been developing a border security initiative intended to
serve as a comprehensive system for recording the entry and exit of
most foreign travelers. Prior to 9/11, this system, now known as US-
VISIT, was the responsibility of the INS and focused primarily on
trying to ensure that nonimmigrant travelers (including those from visa
waiver countries) who arrived at U.S. ports of entry (POE)[Footnote 91]
did not overstay their authorized visitation periods in order to work
illegally in the country. Our work in the years leading up to the 9/11
attacks, and work by the Justice Department OIG, found weaknesses in
overstay processes, in part because the INS did not collect and
maintain records that would enable officials to identify all of the
foreign nationals who either left the country or who remained past the
expiration date of their authorized stay. US-VISIT was initially
conceived as one means of addressing this problem. After the terrorist
attacks, while immigration enforcement remained an important priority,
the ability to track overstays through an entry/exit border inspection
system, and to authenticate the identity of travelers arriving at ports
of entry, took on added importance, given that three of the six
terrorist pilots had managed to remain in the U.S. after their visas
had expired. In prior reports on US-VISIT, we have identified numerous
challenges that DHS faces in delivering program capabilities and
benefits on time and within budget. We have reported, for example, that
the US-VISIT program is a risky endeavor, in part because it is large,
complex, and potentially costly. (See app. III for a list of our
products related to overstay tracking and US-VISIT.)
US-VISIT is designed to use biographic information (e.g., name,
nationality, and date of birth) and biometric information (e.g.,
digital fingerprint scans) to verify the identity of those covered by
the program, which is being rolled out over a 5-year period, from 2002
to 2007. The program applies to certain visitors whether they hold a
nonimmigrant visa, or are traveling from a country that has a visa
waiver agreement with the United States under the Visa Waiver Program.
Foreign nationals subject to US-VISIT who intend to enter the country
encounter different inspection processes at different types of ports of
entry (POEs) depending on their mode of travel. Foreign nationals
subject to US-VISIT who enter the United States at an air or sea POE
are to be processed, for purposes of US-VISIT, in the primary
inspection area upon arrival. Generally, these visitors are subject to
prescreening before they arrive via passenger manifests, which are
forwarded to CBP by commercial air or sea carrier in advance of
arrival.[Footnote 92] By contrast, foreign nationals intending to enter
the United States at a land POE are generally not subject to
prescreening because they arrive in private vehicles or on foot and
there is no manifest to record their pending arrival. Thus, when
foreign nationals subject to US-VISIT arrive at a land POE, they are
directed by CBP officers from the primary inspection area to the
secondary inspection area for further processing.
As we have recently reported,[Footnote 93] DHS has deployed an entry
capability for US-VISIT at over 300 air, sea, and land POEs, including
154 land ports along the northern and southwestern borders where
hundreds of millions of legitimate border crossings take place
annually. Biographic and biometric information, including digital
fingerprint scans and digital photographs, are used at these ports to
verify the identity of visitors. With respect to land ports
specifically (the subject of our most recent US-VISIT work), CBP
officials at 21 land POE sites we visited where US-VISIT entry
capability had been deployed reported that the program had enhanced
their ability to verify travelers' identities, among other things.
However, many land POE facilities, which are small and aging, face
ongoing operational challenges, including space constraints and traffic
congestion, as they continue to operate the entry capability of US-
VISIT while also processing other travelers entering the United States.
Moreover, Congress's goal for US-VISIT--to record entry, reentry, and
exit--has not been fully achieved because a biometric exit capability
has not been developed or deployed. According to DHS officials,
implementing a biometrically-based exit program like that used to
record those entering or re-entering the country is potentially costly
(an estimated $3 billion), would require new infrastructure, and would
produce major traffic congestion because travelers would have to stop
their vehicles upon exit to be processed--an option officials consider
unacceptable. Officials stated that they expect a viable technology for
developing a biometric exit capability for US-VISIT that would not
require travelers to stop at a facility will become available within
the next 5 to 10 years. Without some type of biometric exit capability,
however, the government cannot provide certainty that the person
exiting the country is the person who entered--and thus cannot
determine which visitors have remained in the U.S. past the expiration
date of their authorized stay. In November 2006, we recommended, among
other things, that DHS finalize a mandated report to Congress
describing how a comprehensive biometrically based entry and exit
system would work and how an interim nonbiometric exit solution--one is
currently being tested--is to be developed or deployed.[Footnote 94]
DHS agreed with our recommendation.
While the goal of US-VISIT is in part to ensure that lawful travelers
enter and exit the country using valid identity documents, the program
is not intended to verify the identities of all travelers. In
particular, U.S. citizens, lawful permanent residents, and most
Canadian and Mexican citizens are exempt from being processed under US-
VISIT upon entering and exiting the country. It is still possible for
travelers such as these to use fraudulent documents as a basis for
entering the country. For example, U.S. citizens and citizens of Canada
and Bermuda are not generally required to present a passport when they
enter the United States via land ports of entry. Instead, as we have
reported, they may use other forms of identifying documentation, such
as a driver's license or birth certificates, which can be easily
counterfeited and used by terrorists to travel into and out of the
country. In 2003, 2004, and again in 2006 our undercover investigators
were able to successfully enter the United States from Canada and
Mexico using fictitious names and counterfeit driver's licenses and
birth certificates.
CBP officials have acknowledged that its officers are not able to
identify all forms of counterfeit documentation of identity and
citizenship presented at land ports of entry and the agency fully
supports a new statutory initiative designed to address this
vulnerability. This requires DHS and State to develop and implement a
plan by no later than June 2009 whereby U.S. citizens and foreign
nationals of Canada, Bermuda, and Mexico must present a passport or
other document or combination of documents deemed sufficient to show
identity and citizenship to enter or reenter the United States; such
documentation is not currently needed by many of these travelers. While
this effort, known as the Western Hemisphere Travel Initiative
(WHTI),[Footnote 95] may address concerns about counterfeit documents,
it still faces hurdles. For example, key decisions have yet to be made
about what documents other than a passport would be acceptable when
U.S. and Canadian citizens enter or return to the United States via
land ports of entry--a decision critical to making decisions about how
DHS is to inspect individuals entering the country. Nor has DHS decided
what types of security features should be utilized to protect personal
information contained in travel documents that may be required, such as
an alternative type of passport containing an electronic tag encoded
with information to identify each traveler.[Footnote 96] DHS also has
not determined whether, or how, WHTI border inspection processes would
fit strategically or operationally with other current and emerging
border security initiatives.
The emergence of fraud-prevention efforts such as WHTI pose additional
challenges for DHS's oversight of US-VISIT. For example, DHS has not
yet determined how US-VISIT is to align with emerging land border
security initiatives and mandates like WHTI, and thus cannot ensure
that these programs work in harmony to meet mission goals and operate
cost effectively. As we reported 3 years ago, agency programs need to
properly fit within a common strategic context governing key aspects of
program operations, such as what functions are to be performed and
rules and standards governing the use of technology. Although a
strategic plan defining an overall immigration and border management
strategy has been drafted, DHS has not approved it, raising questions
about DHS's overall strategy for effectively integrating border
security programs and systems at land POEs. Until decisions about WHTI
and other initiatives are made, it remains unclear how US- VISIT will
be integrated with emerging border security initiatives, if at all--
raising the possibility that CBP would be faced with managing differing
technology platforms and border inspection processes at each land POE.
Knowing how US-VISIT is to work in concert with other border security
and homeland security initiatives could help Congress, DHS, and others
better understand what resources and tools are needed to ensure their
success. We recommended in November 2006 that DHS direct the US-VISIT
Program Director to finalize in its required report to Congress (as
noted earlier) a description of how DHS plans to align US- VISIT with
other emerging land border security initiatives. DHS agreed with our
recommendation. We have ongoing work looking at many aspects of US-
VISIT.
GAO Concluding Observations--US-VISIT:
Developing and deploying complex technology that records the entry and
exit of millions of visitors to the United States, verifies their
identities to mitigate the likelihood that terrorists or criminals can
enter or exit at will, and tracks persons who remain in the country
longer than authorized is a worthy goal in our nation's effort to
enhance border security in a post-9/11 era. But doing so also poses
significant challenges; foremost among them is striking a reasonable
balance between US-VISIT's goals of providing security to U.S. citizens
and visitors while facilitating legitimate trade and travel. DHS has
made considerable progress making the entry portion of the US-VISIT
program at land ports of entry operational, and border officials have
clearly expressed the benefits that US-VISIT technology and biometric
identification tools have afforded them. With respect to DHS's effort
to create an exit verification capability, developing and deploying
this capability for US-VISIT at land POEs has posed a set of challenges
that are distinct from those associated with entry. US-VISIT has not
determined whether it can achieve, in a realistic time frame, or at an
acceptable cost, the legislatively mandated capability to record the
exit of travelers at land POEs using biometric technology. Finally, DHS
has not articulated how US-VISIT fits strategically and operationally
with other land-border security initiatives, such as the Western
Hemisphere Travel Initiative and Secure Border Initiative. As we have
recently reported, without knowing how US-VISIT is to be integrated
within the larger strategic context governing DHS operations, DHS faces
substantial risk that US-VISIT will not align or operate with other
initiatives at land POEs and thus not cost- effectively meet mission
needs. We recently recommended that DHS finalize a mandated report to
Congress on US-VISIT that would include a description of how a
comprehensive biometrically based entry and exit system would work and
how DHS plans to align US-VISIT with other emerging land border
security initiatives. DHS agreed with these recommendations.
DHS Has Made Progress in Detecting Hazardous Materials and Cargo at
Ports of Entry, but Security Challenges Remain:
In addition to the challenges posed by travelers at U.S. ports of
entry, various types of cargo also pose security challenges. Preventing
radioactive material from being smuggled into the United States--
perhaps to be used by terrorists in a nuclear weapon or in a
radiological dispersal device (a so-called dirty bomb)--has become a
key national security objective. DHS is responsible for providing
radiation detection capabilities at U.S. ports of entry and
implementing programs to combat nuclear smuggling. The departments of
Energy, Defense, and State, are also implementing programs to combat
nuclear smuggling in other countries by providing radiation detection
equipment and training to foreign border security personnel. Our work
in this area suggests that while the nation may always be vulnerable to
some extent to this type of threat, DHS has improved its use of
radiation detection equipment at U.S. ports of entry and is
coordinating with other agencies to conduct radiation detection
programs. DHS has, for example, improved in its use of radiation
detection equipment and in following the agency's inspection procedures
implemented since 2003.
We have nevertheless identified potential weaknesses in procedures for
ensuring both that radioactive material is being obtained and used
legitimately in the United States and that appropriate documentation,
such as bills of lading, are provided when this material is transported
across our borders. For example, we have conducted covert testing to
determine whether it was possible to make several purchases of small
quantities of radioactive material and used counterfeit documents to
cross the border even if radiation monitors detected the radioactive
sources we carried.[Footnote 97] Our purchase of the radioactive
substance was not challenged because suppliers are not required to
determine whether a buyer has a legitimate use for the material. Nor
are purchasers required to produce a document from the Nuclear
Regulatory Commission when making purchases of small quantities. During
our testing, the radiation monitors properly signaled the presence of
radioactive material when our two teams conducted simultaneous border
crossings and the vehicles were inspected. However, our investigators
were able to enter the United States with the material because they
used counterfeit documents. Specifically, the investigators were able
to successfully represent themselves as employees of a fictitious
company and present a counterfeit bill of lading and a counterfeit
Nuclear Regulatory Commission document during inspections. CBP officers
never questioned the authenticity of our investigators' counterfeit
documents. In response to our work, officials with the Nuclear
Regulatory Commission told us that they are aware of the potential
problems with counterfeit documentation and are working to resolve
these issues.
In other work,[Footnote 98] we have identified other potential
weaknesses related to the regulation and inspection of radioactive
materials being shipped to the United States. We found, for example,
that while radiological materials being transported into the United
States are generally required to have a Nuclear Regulatory Commission
license, regulations do not require that the license accompany the
shipment. Further, CBP officers do not have access to data that could
be used to verify that shippers have acquired the necessary
documentation. And CBP inspection procedures do not require officers to
open containers and inspect them after an initial alarm is triggered,
although under some circumstances, doing so could improve security. DHS
has sponsored research, development, and testing activities to address
the inherent limitations of currently fielded detection equipment.
However, much work remains to achieve consistently better detection
capabilities. We have recently recommended to DHS and CBP that, among
other things, CBP's inspection procedures be revised to include
physically opening cargo containers in certain circumstances where
external inspections prove inconclusive and that federal officials find
ways to authenticate licenses that accompany radiological shipments.
DHS agreed with our recommendations and has committed to implementing
them. (See app. III for a list of our products related to hazardous
materials crossing our borders.)
In addition to the hazards posed by certain types of land- based cargo,
government officials recognize that terrorism also poses risks to
oceangoing cargo traveling to and from commercial U.S. seaports. Ocean
cargo containers play a vital role in the movement of cargo between
global trading partners. In 2004 alone, nearly 9 million ocean cargo
containers arrived and were offloaded at U.S. seaports. Responding to
heightened concern about national security since 9/11, several U.S.
government agencies have focused efforts on preventing terrorists from
smuggling weapons of mass destruction in cargo containers from overseas
locations to attack the United States and disrupt international trade.
To help address its responsibility to ensure the security of this
cargo, CBP has in place a program known as the Container Security
Initiative. The program aims to target and inspect high-risk cargo
shipments at foreign seaports before they leave for destinations in the
United States. Under the program, foreign governments agree to allow
CBP personnel to be stationed at foreign seaports to use intelligence
and risk assessments to target shipments to identify those at risk of
containing weapons of mass destruction or other terrorist contraband.
As of February 2005 (the date of our most recent work),[Footnote 99]
the Container Security Initiative program was operational at 34 foreign
seaports, with plans to expand to an additional 11 ports by the end of
fiscal year 2005. We have advocated in recent testimony[Footnote 100]
that CBP's targeting system should, among other things, take steps to
assess the risks posed by oceangoing cargo. (See app. III for a list of
our products related to other cargo security initiatives.)
GAO Concluding Observations--Border Security:
Whether the security challenge facing federal authorities at ports of
entry involves persons or cargo, the job of securing the nation's
borders is daunting. The task involves the oversight and management of
nearly 7,500 miles of land borders with Canada and Mexico, and hundreds
of legal ports of entry through which millions of travelers are
inspected annually. After 9/11, the government took immediate steps to
tackle some of the major border-related vulnerabilities and challenges
that we and others had identified, such as those related to passport
and document fraud and tracking overstays. While it may never be
possible to ensure that all terrorists, criminals, or those violating
immigration laws are prevented from entering the country, DHS and other
agencies must remain vigilant in developing and implementing programs
and policies designed to reduce breaches in our borders and ensure that
hazardous cargoes are interdicted.
Federal Government Must Address Strategic Challenges of Sharing
Terrorism-Related Information, Managing Risk, and Structuring DHS to
Meet Its Mission:
Five years after 9/11 and in the wake of new terrorist threats and
tactics, Congress, DHS, and other federal agencies face an array of
strategic challenges that potentially affect the ability of each to
effectively oversee or execute the ambitious goals and programs that
are under way or planned to enhance homeland security. U.S. leaders and
policy makers continue to face the need to choose an appropriate course
of action going forward--setting priorities, allocating resources, and
assessing the social and economic costs of the measures that may be
taken governmentwide to further strengthen domestic security. Balancing
the trade-offs inherent in these choices--and aligning policies to
support them--will not be easy, but is nonetheless essential.
Accomplishing this critical task will be further challenged by (1) the
federal government's continued struggle to share information needed to
combat terrorism across federal departments and with state and local
governments; (2) having to implement a system that assesses the
relative risks reduced by investing scarce dollars among varied and
competing security alternatives; and (3) a DHS that continues to
struggle in becoming a fully integrated and effectively functioning
organization that is prepared and positioned to successfully protect
the homeland from future terrorist threats.
Efforts to Share Critical Information on Terrorism Have Improved Since
9/11, but a Governmentwide Framework for Information Sharing Has Still
Not Been Implemented:
There are numerous challenges that cut across branches of the federal
government that must be addressed broadly and in a coordinated fashion
at the highest levels. One of the most important and conspicuous of
these cross-cutting challenges involves the sharing of information
related to terrorism. The former vice chairman of the 9/ 11 Commission
identified the inability of federal agencies to effectively share
information about suspected terrorists and their activities as the
government's single greatest failure in the lead-up to the 9/11
attacks. As discussed earlier in this report, FAA's no-fly list only
contained 12 names of potential terrorists on 9/11 because information
collected by other agencies, such as the CIA and FBI about terrorist
suspects was not shared with FAA at the time. According to the 9/11
report, this undistributed information would have helped identify some
of the terrorists, but such information was shared only on a need-to-
know rather than a need-to-share basis. The commission recommended,
among other things, that terrorism-related information contained in
agency databases should be shared across agency lines. Because of the
significance of this issue, we designated information sharing for
homeland security as a governmentwide high-risk area in 2005.
Responding to the lessons of 9/11, Congress and federal departments
have taken steps to improve information sharing across the federal
government and in conjunction with state and local governments and law
enforcement agencies, as well, but these efforts are not without
challenges. The FBI has increased its field Joint Terrorism Task
Forces, bringing together personnel from all levels of government in
their counterterrorism missions.[Footnote 101] DHS implemented the
homeland security information network to share homeland security
information with states, localities, and the private sector. States and
localities are creating their own information "fusion" centers, some
with FBI and DHS support, to provide state and local leaders with
information on threats to their communities, a topic on which we have
ongoing work. And DHS has implemented a program to encourage the
private sector to provide information on the vulnerabilities and
security in place at critical infrastructure assets, such as nuclear
and chemical facilities by guaranteeing to protect that information
from public disclosure. But, the DHS Inspector General found that users
of the homeland security information network were confused and
frustrated with this system, in part because the system does not
provide them with useful situational awareness and classified
information and as a result users do not regularly use the system; how
well fusion centers will be integrated into the federal information
sharing efforts remains to be seen. And DHS has still not won all of
the private sector's trust that the agency can adequately protect and
effectively use the information that sector provides. These challenges
will require longer-term actions to resolve.
These challenges also require policies, procedures, and plans that
integrate these individual initiatives and establish a clear,
governmentwide framework for sharing terrorism-related information. But
as we reported in March 2006, the nation still has not implemented the
governmentwide policies and processes that the 9/11 commission
recommended and that Congress mandated.[Footnote 102] Responsibility
for creating these policies has shifted over time--from the White House
to the Office of Management and Budget, to the Department of Homeland
Security, and then to the Office of the Director of National
Intelligence. Nevertheless, the Intelligence Reform and Terrorism
Prevention Act required that action be taken to facilitate the sharing
of terrorism information by establishing an "information sharing
environment" that would combine policies, procedures, and technologies
that link people, systems, and information among all appropriate
federal, state, local, and tribal entities and the private sector. One
purpose of this information sharing environment is to represent a
partnership between all levels of government, the private sector, and
our foreign partners. While this environment was to be established by
December 2006, program managers told us that a 3-year road map is to be
released in November 2006. According to these officials, the plan will
define key tasks and milestones for developing the information sharing
environment, including identifying barriers and ways to resolve them,
as GAO recommended. Completing the information sharing environment is a
complex task that will take multiple years and long-term administration
and congressional support and oversight, and will pose cultural,
operational, and technical challenges that will require a collaborated
response.
Developing and Implementing a Risk-Based Framework to Balance Trade-
offs between Security and Other Priorities Remains a Critical Strategic
Federal Challenge:
Addressing the diffuse nature of terrorist threats--and protecting the
vast array of assets and infrastructure potentially vulnerable to
attack--requires trade-offs that balance security needs with competing
priorities for limited resources. Shortly after 9/11, new federal
policies sought to acknowledge the importance of determining these
trade-offs. For example, as reflected in the National Strategy for
Homeland Security of 2002, the United States is to "carefully weigh the
benefit of each homeland security endeavor and only allocate resources
where the benefit of reducing risk is worth the amount of additional
cost." The strategy recognizes that the need for homeland security is
not tied solely to the current terrorist threat but to enduring
vulnerability from a range of potential threats that could include
weapons of mass destruction and bioterrorism. In addition, Homeland
Security Presidential Directive-7, issued in December 2003, charged DHS
with integrating the use of risk management into homeland security
activities related to the protection of critical infrastructure. The
directive called for the department to develop policies, guidelines,
criteria, and metrics for this effort.
Federal officials are also well aware of the need for taking a risk-
based approach to allocating scarce resources for homeland security.
The Secretary of DHS testified in June 2005 on the need for managing
risk by developing plans and allocating resources in a way that
balances security and freedom. He noted the importance of assessing the
full spectrum of threats and vulnerabilities, conducting risk
assessments, setting realistic priorities, and guiding decisions about
how to best organize to prevent, respond to, and recover from an
attack.
In our January 2005 report on high-risk areas in the federal
government,[Footnote 103] we noted the importance of completing
comprehensive national threat and risk assessments--and noted risk
management as an emerging area. At that time, we noted that DHS was in
the early stages of adopting a risk-based strategic framework for
making important resource decisions involving billions of dollars
annually. In part, this is because the process is difficult and
complex; requires comprehensive information on risks and
vulnerabilities; and employs sophisticated assessment methodologies.
The process also requires careful trade-offs that balance security
concerns with economic interests and other competing interests. DHS,
with a fiscal year 2007 budget of about $35 billion, has begun
allocating grants based on risk criteria, and has begun risk
assessments at individual infrastructure facilities. But, it has not
completed all of the necessary risk assessments mandated by the
Homeland Security Act of 2002 to set priorities to help focus its
resources where most needed. In addition, when applying risk management
to critical infrastructure protection, DHS's risk management framework,
which requires the support of a comprehensive, national inventory of
critical infrastructure assets that DHS refers to as the National Asset
Database, remains incomplete. And, according to the DHS OIG, the agency
is still identifying and collecting critical infrastructure data for
this tool and this database is not yet comprehensive enough to support
the management and resource allocation decisionmaking needed to meet
the requirements of HSPD-7.[Footnote 104]
Nonetheless, agencies are making progress in using risk as a basis for
decision making. We found, for example, that the Coast Guard had made
the greatest progress among three DHS agencies we reviewed in
conducting risk assessments--that is, evaluating individual threats,
the degree of vulnerability to attack, and the consequences of a
successful attack.[Footnote 105] Also, we found that TSA has begun to
assess risks within other transportation modes, such as rail in an
effort to begin allocating scarce resources toward the greatest risks
and vulnerabilities.[Footnote 106] Nevertheless, DHS is still faced
with the formidable task of developing a more formal and disciplined
approach to risk management, and answering questions such as what is an
acceptable level of risk to guide homeland security strategies and
investments and what criteria should be used to target federal funding
for homeland security to maximize results and mitigate risks within
available resource levels. Doing so will not be easy. However, as we
noted in our analysis of homeland security challenges for the 21st
century, defining an acceptable, achievable level of risk, within
constrained budgets is imperative to addressing current and future
threats.[Footnote 107]
In the longer term, progress in implementing a risk-based approach will
rest heavily on how well DHS coordinates homeland security risk
management efforts with other federal departments, as well as state,
local, and private-sector partners that oversee or operate critical
infrastructure and assets. Currently, our work shows that while various
risk assessment approaches are being used within DHS, they are neither
consistent nor comparable--that is, there is no common basis, or
framework, used to evaluate risk assessments within sectors (such as
transportation) or across sectors (such as transportation, energy, and
agriculture). DHS faces challenges related to establishing uniform
assessment policies, approaches, guidelines, and methodologies so that
a common risk framework can be developed and implemented within and
across sectors. Overall, DHS has much more to do to effectively manage
risk as part of its homeland security responsibilities within current
and expected resource levels.
DHS Faces Challenges in Managing Its Organizational Transformation:
DHS faces significant management and organizational transformation
challenges as it works to protect the nation from terrorism and
simultaneously establish itself. It must continue to integrate
approximately 180,000 employees from 22 originating agencies,
consolidate multiple management systems and processes, and transform
into a more effective organization with robust planning, management,
and operations. For these reasons, in January 2005, we continued to
designate the implementation and transformation of the department as
high risk. DHS's Inspector General also reported, in December 2004,
that integrating DHS's many separate components into a single
effective, efficient and economical department remains one of its
biggest challenges. Failure to effectively address these management
challenges could have serious consequences for our national security.
This task of transforming 22 agencies--several with major management
challenges--into one department with the critical, core mission of
protecting the country against another terrorist attack has presented
many challenges to the Department's managers and employees. While DHS
has made progress, it still has much to do to establish a cohesive,
efficient and effective organization. Successful transformations of
large organizations, even those faced with less strenuous
reorganizations and pressure for immediate results than DHS, can take
from 5 to 7 years to take hold on a sustainable basis. For DHS to
successfully address its daunting management challenges and transform
itself into a more effective organization, we have stated that it needs
to take the following actions:
* develop a department wide implementation and transformation strategy
that adopts risk management and strategic management principles and
establishes key milestones and performance measures;
* improve management systems including financial systems, information
management, human capital, and acquisitions; and:
* implement corrective actions to address programmatic and partnering
challenges.
The DHS OIG, in its report on the major management challenges facing
DHS, identified consolidating the department's components as a
challenge, but noted that the 2005 departmental restructuring has
resulted in changes to the DHS organizational structure that refocused
it on risk and consequence management and further involved its partners
in other federal agencies, state and local governments, and private
sector organizations.[Footnote 108] However, the IG concluded that much
more remains to be done.
GAO Concluding Observations--Strategic Challenges:
After spending billions of dollars on people, policies, procedures, and
technology to improve security, we have improved preparedness compared
to the time of the attacks, but much more needs to be done as
terrorists change tactics and introduce new vulnerabilities.
Consequently, we must remain ever vigilant. Today, we are more alert to
the possibility of threats. DHS is engaged in a number of individual
efforts and initiatives as it works to implement its vision of an
integrated, unified department. The momentum generated by the attacks
of 9/11 to create a successful homeland security function could be lost
if DHS does not continue to work quickly to put in place key merger and
transformation practices that would enable it to be more effective in
taking a comprehensive and sustained approach to its management
integration. Moreover, it remains vitally important for DHS to continue
to develop and implement a risk-based framework to help target where
the nation's resources should be invested to strengthen security, and
determine how these investments should be directed--toward people,
processes, or technology. And we must continue to improve the sharing
of terrorism-related information across organizational and
intergovernmental cultures and "stovepipes." Finally, Congress
continues to play an important role in overseeing the nation's homeland
security efforts, and has asked GAO to assist in this oversight. Our
work, the work of the Inspectors General, and the work of other
accountability organizations has helped identify where Congress can
provide solutions and enhance our homeland security investments.
We will send copies of this report to the Secretary of Homeland
Security, the Secretary of the Department of State, and interested
congressional committees. We will make copies available to others upon
request. In addition, this report will be available at no charge on
GAO's Web site at [Hyperlink, http://www.gao.gov].
If you have any questions about this report, please contact me at
larencee@gao.gov or (202) 512-8777. Contact points for our Offices of
Congressional Relations and Public Affairs may be found on the last
page of this report. GAO staff who made major contributions to this
report are listed in appendix V.
Sincerely,
Signed by:
Eileen Larence:
Director, Homeland Security and Justice Issues:
[End of section]
Appendix I: Visas Issued to the September 11, 2001, Terrorist
Hijackers:
The 19 hijackers who participated in the September 11 terrorist attacks
received a total of 23 visas at five different consular posts from
April 1997 through June 2001 (see fig. 6). Fifteen of them were
citizens of Saudi Arabia. They obtained their visas in their home
country, at the U.S. consulate in Jeddah (11 hijackers) and the U.S.
embassy in Riyadh (4 hijackers). Two others, citizens of the United
Arab Emirates, also received their visas in their home country, at the
U.S. embassy in Abu Dhabi and at the U.S. consulate in Dubai. The
remaining 2 hijackers obtained their visas at the U.S. embassy in
Berlin. They were considered third-country national applicants because
they were not German citizens: one was a citizen of Egypt, the other of
Lebanon. Of the 19 hijackers, 18 received visas for temporary visits
for business and pleasure, and 1 received 2 student visas. These visas
allowed the holders to enter the United State multiple times during the
visas' validity period, subject to the approval of the immigration
officer at the port of entry. Of the 23 issued visas, 4 were valid for
a period of 1 year; 15 were valid for 2 years; 2 for 5 years; and 2 for
10 years.
Figure 6: Timeline of Visas issued to Hijackers at Overseas Posts,
November 1997 through June 2001:
[See PDF for image]
Source: State Department.
[End of figure]
[End of section]
Appendix II: Map of Visa Waiver Program Countries:
[See PDF for Image]
Sources: GAO; MapArt(image).
[End of Figure]
[End of section]
Appendix III: Related GAO and Inspectors General Products:
Transportation Security:
Aviation Security:
Passenger Prescreening and Checkpoint Screening:
Aviation Security: Efforts to Strengthen International Passenger
Prescreening are Under Way, but Planning and Implementation Issues
Remain. GAO-07-55SU. Washington, D.C.: Nov. 20, 2006.
Transportation Security Administration's Office of Intelligence:
Responses to Post Hearing Questions on Secure Flight. GAO-06-1051R.
Washington D.C.: August 4, 2006.
Aviation Security: Management Challenges Remain for the Transportation
Security Administration's Secure Flight Program. GAO-06-864T.
Washington D.C.: June 14, 2006.
Aviation Security: Enhancements Made in Passenger and Checked Baggage
Screening, but Challenges Remain. GAO-06-371T. Washington, D.C.: April
4, 2006.
Aviation Security: Transportation Security Administration Has Made
Progress in Managing a Federal Security Workforce and Ensuring Security
at U.S. Airports, but Challenges Remain. GAO-06-597T. Washington, D.C.:
April 4, 2006.
Aviation Security: Significant Management Challenges May Adversely
Affect Implementation of the Transportation Security Administration's
Secure Flight Program. GAO-06-374T. Washington, D.C.: Feb. 9, 2006.
Aviation Security: Transportation Security Administration Did Not Fully
Disclose Uses of Personal Information During Secure Flight Program
Testing in Initial Privacy Notes, but Has Recently Taken Steps to More
Fully Inform the Public. GAO-05-864R. Washington, D.C.: July 22, 2005.
Aviation Security: Screener Training and Performance Measurement
Strengthened, but More Work Remains. GAO-05-457. Washington, D.C.: May
2, 2005.
Aviation Security: Secure Flight Development and Testing Under Way, but
Risks Should Be Managed as System Is Further Developed. GAO-05-356.
Washington, D.C.: March 28, 2005.
Follow-Up Audit of Passenger and Baggage Screening Procedures at
Domestic Airports (Unclassified Summary). Department of Homeland
Security Office of Inspector General, OIG-05-16. Washington, D.C.:
March 2005.
Aviation Security: Measures for Testing the Effect of Using Commercial
Data for the Secure Flight Program. GAO-05-324. Washington, D.C.: Feb.
23, 2005.
Aviation Security: Challenges Delay Implementation of Computer-
Assisted Passenger Prescreening System. GAO-04-504T. Washington, D.C.:
March 17, 2004.
Aviation Security: Computer-Assisted Passenger Prescreening System
Faces Significant Implementation Challenges. GAO-04-385. Washington,
D.C.: Feb. 13, 2004.
Aviation Security: Challenges Exist in Stabilizing and Enhancing
Passenger and Baggage Screening Operations. GAO-04-440T. Washington,
D.C.: Feb. 12, 2004.
Airport Passenger Screening: Preliminary Observations on Progress Made
and Challenges Remaining. GAO-03-1173. Washington, D.C.: Sept. 24,
2003.
In-Flight Security:
Aviation Security: Further Study of Safety and Effectiveness and Better
Management Controls Needed If Air Carriers Resume Interest in Deploying
Less-than-Lethal Weapons. GAO-06-475. Washington, D.C.: May 26, 2006.
Aviation Security: Federal Air Marshal Service Could Benefit from
Improved Planning and Controls, GAO-06-203. Washington, D.C.: Nov. 28,
2005.
Aviation Security: Flight and Cabin Crew Member Security Training
Strengthened, but Better Planning and Internal Controls Needed. GAO-05-
781. Washington, D.C.: Sept. 6, 2005.
Aviation Security: Federal Air Marshal Service Is Addressing Challenges
of Its Expanded Mission and Workforce, but Additional Actions Needed.
GAO-04-242. Washington, D.C.: Nov. 19, 2003.
Aviation Security: Information Concerning the Arming of Commercial
Pilots. GAO-02-822R. Washington, D.C.: June 28, 2002.
Checked Baggage Screening:
Aviation Security: TSA Oversight of Checked Baggage Screening
Procedures Could Be Strengthened. GAO-06-869. Washington, D.C.: July
28, 2006.
Aviation Security: TSA Has Strengthened Efforts to Plan for the Optimal
Deployment of Checked Baggage Screening Systems but Funding
Uncertainties Remain. GAO-06-875T. Washington, D.C.: June 29, 2006:
Aviation Security: Better Planning Needed to Optimize Deployment of
Checked Baggage Screening Systems. GAO-05-896T. Washington, D.C.: July
13, 2005.
Aviation Security: Systematic Planning Needed to Optimize the
Deployment of Checked Baggage Screening Systems. GAO-05-365.
Washington, D.C.: March 15, 2005.
Air Cargo:
Aviation Security: Federal Action Needed to Strengthen Domestic Air
Cargo Security. GAO-06-76. Washington, D.C.: Oct. 17, 2005.
Aviation Security: Federal Action Needed to Strengthen Domestic Air
Cargo Security. GAO-05-446SU. Washington, D.C.: July 29, 2005.
Aviation Safety: Undeclared Air Shipments of Dangerous Goods and DOT's
Enforcement Approach. GAO-03-22. Washington, D.C.: Jan. 10, 2003.
Aviation Security: Vulnerabilities and Potential Improvements for the
Air Cargo System. GAO-03-344. Washington, D.C.: Dec. 20, 2002.
Perimeter Security, Access Controls, and General Aviation:
Homeland Security: Agency Resources Address Violations of Restricted
Airspace, but Management Improvements Are Needed. GAO-05-928T.
Washington, D.C.: July 21, 2005.
General Aviation Security: Increased Federal Oversight Is Needed, but
Continued Partnership with the Private Sector Is Critical to Long-Term
Success. GAO-05-144. Washington, D.C.: Nov. 10, 2004.
Aviation Security: Further Steps Needed to Strengthen the Security of
Commercial Airport Perimeters and Access Controls. GAO-04-728.
Washington, D.C.: June 4, 2004.
Aviation Security: Challenges in Using Biometric Technologies. GAO-04-
785T. Washington, D.C.: May 19, 2004.
Nonproliferation: Further Improvements Needed in U.S. Efforts to
Counter Threats from Man-Portable Air Defense Systems. GAO-04-519.
Washington, D.C.: May 13, 2004.
Aviation Security: Factors Could Limit the Effectiveness of the
Transportation Security Administration's Efforts to Secure Aerial
Advertising Operations. GAO-04-499R. Washington, D.C.: March 5, 2004.
The Department of Homeland Security Needs to Fully Adopt a Knowledge-
based Approach to Its Counter-MANPADS Development Program. GAO-04-341R.
Washington, D.C.: Jan. 30, 2004.
Other Aviation Security:
Transportation Security Administration: More Clarity on the Authority
of Federal Security Directors Is Needed. GAO-05-935. Washington, D.C.:
Sept. 23, 2005.
Aviation Security: Improvement Still Needed in Federal Aviation
Security Efforts. GAO-04-592T. Washington, D.C.: March 30, 2004.
Aviation Security: Efforts to Measure Effectiveness and Strengthen
Security Programs. GAO-04-285T. Washington, D.C.: Nov. 20, 2003.
Aviation Security: Efforts to Measure Effectiveness and Address
Challenges. GAO-04-232T. Washington, D.C.: Nov. 5, 2003.
Aviation Security: Progress Since September 11, 2001, and the
Challenges Ahead. GAO-03-1150T. Washington, D.C.: Sept. 9, 2003.
Airport Finance: Past Funding Levels May Not Be Sufficient to Cover
Airports' Planned Capital Development. GAO-03-497T. Washington, D.C.:
Feb. 25, 2003.
Aviation Security Costs, Transportation Security Agency. Department of
Homeland Security Office of Inspector General, CC-003-066. Washington,
D.C.: Feb 5, 2003.
Airport Finance: Using Airport Grant Funds for Security Projects Has
Affected Some Development Projects. GAO-03-27. Washington, D.C.: Oct.
15, 2002.
Commercial Aviation: Financial Condition and Industry Responses Affect
Competition. GAO-03-171T. Washington, D.C.: Oct. 2, 2002.
Aviation Security: Transportation Security Administration Faces
Immediate and Long-Term Challenges. GAO-02-971T. Washington, D.C.: July
25, 2002.
Challenges Facing TSA in Implementing the Aviation and Transportation
Security Act. Department of Homeland Security Office of Inspector
General, CC-2002-88. Washington, D.C.: Jan. 23, 2002.
Aviation Security: Vulnerabilities in, and Alternatives for, Preboard
Screening Security Operations. GAO-01-1171T. Washington, D.C.: Sept.
25, 2001.
Actions Needed to Improve Aviation Security. Department of Homeland
Security Office of Inspector General, CC-2001-313. Washington, D.C.:
Sept. 25, 2001.
Aviation Security: Weaknesses in Airport Security and Options for
Assigning Screening Responsibilities. GAO-01-1165T. Washington, D.C.:
Sept. 21, 2001.
Aviation Security: Terrorist Acts Demonstrate Urgent Need to Improve
Security at the Nation's Airports. GAO-01-1162T. Washington, D.C.:
Sept. 20, 2001.
Aviation Security: Terrorist Acts Illustrate Severe Weaknesses in
Aviation Security. GAO-01-1166T. Washington, D.C.: Sept. 20, 2001.
Aviation Security in the United States. Department of Homeland Security
Office of Inspector General, CC-2001-308. Washington, D.C.: Sept. 20,
2001.
Surface and Maritime Security:
Rail Transit: Additional Federal Leadership Would Enhance FTA's State
Safety Oversight Program. GAO-06-821. Washington, D.C.: July 26, 2006.
Maritime Security: Information-Sharing Efforts Are Improving. GAO-06-
933T. Washington, D.C.: July 10, 2006.
Information Technology: Customs Has Made Progress on Automated
Commercial Environment System, but It Faces Long-Standing Management
Challenges and New Risks. GAO-06-580. Washington, D.C.: May 31, 2006.
Passenger Rail Security: Evaluating Foreign Security Practices and Risk
Can Help Guide Security Efforts. GAO-06-557T. Washington, D.C.: March
29, 2006.
Passenger Rail Security: Enhanced Federal Leadership Needed to
Prioritize and Guide Security Efforts. GAO-06-181T. Washington, D.C.:
Oct. 20, 2005.
Passenger Rail Security: Enhanced Federal Leadership Needed to
Prioritize and Guide Security Efforts. GAO-05-851. Washington, D.C.:
Sept. 9, 2005.
Maritime Security: Enhancements Made, But Implementation and
Sustainability Remain Key Challenges. GAO-05-448T. Washington, D.C.:
May 17, 2005.
Maritime Security: New Structures Have Improved Information Sharing,
but Security Clearance Processing Requires Further Attention. GAO-05-
394. Washington, D.C.: April 15, 2005.
Information Technology: Customs Automated Commercial Environment
Program Progressing, but Need for Management Improvements Continues.
GAO-05-267. Washington, D.C.: March 14, 2005.
Maritime Security: Better Planning Needed to Help Ensure an Effective
Port Security Assessment Program. GAO-04-1062. Washington, D.C.: Sept.
30, 2004.
Mass Transit: Federal Action Could Help Transit Agencies Address
Security Challenges. GAO-03-263. Washington, D.C.: Dec. 13, 2002.
General Transportation Security:
Transportation Security: DHS Should Address Key Challenges Before
Implementing the Transportation Worker Identification Program. GAO-06-
982. Washington, D.C.: September 2006.
Transportation Security: Systematic Planning Needed to Optimize
Resources. GAO-05-357T. Washington, D.C.: Feb. 15, 2005.
Transportation Security R&D: TSA and DHS Are Researching and Developing
Technologies, but Need to Improve R&D Management. GAO-04-890.
Washington, D.C.: Sept. 30, 2004.
Transportation Security: Federal Action Needed to Enhance Security
Efforts. GAO-03-1154T. Washington, D.C.: Sept. 9, 2003.
Transportation Security: Federal Action Needed to Help Address Security
Challenges. GAO-03-843. Washington, D.C.: June 30, 2003.
Federal Aviation Administration: Reauthorization Provides Opportunities
to Address Key Agency Challenges. GAO-03-653T. Washington, D.C.: April
10, 2003.
Transportation Security: Post-September 11th Initiatives and Long-Term
Challenges. GAO-03-616T. Washington, D.C.: April 1, 2003.
Transportation Security Administration: Actions and Plans to Build a
Results-Oriented Culture. GAO-03-190. Washington, D.C.: Jan. 17, 2003.
Border Security:
Visa Process and Visa Waiver Program:
Border Security: Stronger Actions Needed to Assess and Mitigate Risks
of the Visa Waiver Program. GAO-06-1090T. Washington, D.C.: Sept. 7,
2006.
Border Security: Stronger Actions Needed to Assess and Mitigate Risks
of the Visa Waiver Program. GAO-06-854. Washington, D.C.: July 28,
2006.
Process for Admitting Additional Countries into the Visa Waiver
Program. GAO-06-835R. Washington, D.C.: July 28, 2006.
Border Security: More Emphasis on State's Consular Safeguards Could
Mitigate Visa Malfeasance Risks. GAO-06-115. Washington, D.C.: Oct. 6,
2005.
Border Security: Strengthened Visa Process Would Benefit From
Improvements in Staffing and Information Sharing. GAO-05-859.
Washington, D.C.: Sept. 13, 2005.
Border Security: Actions Needed to Strengthen Management of Department
of Homeland Security's Visa Security Program. GAO-05-801. Washington,
D.C.: July 29, 2005.
Border Security: Reassessment of Consular Security Resource
Requirements Could Help Address Visa Delays. GAO-06-542T. Washington,
D.C.: April 4, 2005.
Border Security: Streamlined Visas Mantis Program Has Lowered Burden on
Foreign Science Students and Scholars, but Further Refinements Needed.
GAO-05-198. Washington, D.C.: Feb. 18, 2005.
Implementation of the United States Visitor and Immigrant Status
Indicator Technology Program at Land Border Ports of Entry. Department
of Homeland Security Office of Inspector General, OIG-05-11.
Washington, D.C.: Feb. 2005.
A Review of the Use of Stolen Passports from Visa Waiver Countries to
Enter the United States. Department of Homeland Security Office of
Inspector General, OIG-05-07. Washington, D.C.: Dec. 2004.
Border Security: State Department Rollout of Biometric Visas on
Schedule, but Guidance Is Lagging. GAO-04-1001. Washington, D.C.: Sept.
9, 2004.
An Evaluation of DHS Activities to Implement Section 428 of the
Homeland Security Act of 2002. Department of Homeland Security Office
of Inspector General, OIG-04-33. Washington, D.C.: August 2004.
Border Security: Additional Actions Needed to Eliminate Weaknesses in
the Visa Revocation Process. GAO-04-795. Washington, D.C.: July 13,
2004.
An Evaluation of the Security Implications of the Visa Waiver Program.
Department of Homeland Security Office of Inspector General, OIG-04-26.
Washington, D.C.: April 2004.
Border Security: Improvements Needed to Reduce Time Taken to Adjudicate
Visas for Science Students and Scholars. GAO-04-371. Washington, D.C.:
Feb. 25, 2004.
Border Security: New Policies and Increased Interagency Coordination
Needed to Improve Visa Process. GAO-03-1013T. Washington, D.C.: July
15, 2003.
Border Security: New Policies and Procedures Are Needed to Fill Gaps in
the Visa Revocation Process. GAO-03-798. Washington, D.C.: June 18,
2003.
Review of Nonimmigrant Visa Policy and Procedures, memorandum report.
Department of State Office of Inspector General, ISP-I-03-26.
Washington, D.C.: Dec. 2002.
Border Security: Implications of Eliminating the Visa Waiver Program.
GAO-03-38. Washington, D.C.: Nov. 22, 2002.
Border Security: Visa Process Should Be Strengthened as an
Antiterrorism Tool. GAO-03-132NI. Washington, D.C.: Oct. 21, 2002.
US-VISIT and Other Border Security Issues:
Border Security: US-VISIT Faces Strategic, Technological, and
Operational Challenges at Land Ports of Entry. GAO-07-248. Washington,
D.C.: Dec. 06, 2006.
Border Security: Continued Weaknesses in Screening Entrants into the
United States. GAO-06-976T. Washington, D.C.: August 2, 2006.
Information Technology: Immigration and Customs Enforcement Is
Beginning to Address Infrastructure Modernization Program Weaknesses
but Key Improvements Still Needed. GAO-06-823. Washington, D.C.: July
27, 2006.
Homeland Security: Contract Management and Oversight for Visitor and
Immigrant Status Program Need to Be Strengthened. GAO-06-404.
Washington, D.C.: June 9, 2006.
Observations on Efforts to Implement Western Hemisphere Travel
Initiative on the U.S. Border with Canada. GAO-06-741. Washington,
D.C.: May 25, 2006.
Cargo Container Inspections: Preliminary Observations on the Status of
Efforts to Improve the Automated Targeting System. GAO-06-591T.
Washington, D.C.: March 30, 2006.
Border Security: Investigators Successfully Transported Radioactive
Sources Across Our Nation's Borders at Selected Locations. GAO-06-545R.
Washington, D.C.: March 28, 2006.
Combating Nuclear Smuggling: DHS Has Made Progress Deploying Radiation
Detection Equipment at U.S. Ports-of-Entry, but Concerns Remain. GAO-
06-389. Washington, D.C.: March 22, 2006.
Combating Nuclear Smuggling: Corruption, Maintenance, and Coordination
Problems Challenge U.S. Efforts to Provide Radiation Detection
Equipment to Other Countries. GAO-06-311. Washington, D.C.: March 14,
2006.
Homeland Security: Visitor and Immigrant Status Program Operating, but
Management Improvements Are Still Needed. GAO-06-318T. Washington,
D.C.: Jan. 25, 2006.
Cargo Security: Partnership Program Grants Importers Reduced Scrutiny
With Limited Assurance of Improved Security. GAO-05-404. Washington,
D.C.: March 11, 2005.
US-VISIT System Security Management Needs Strengthening (Redacted).
Department of Homeland Security Office of Inspector General. OIG-06-16.
Washington, D.C.: Dec. 2005.
Information Technology: Management Improvements Needed on Immigration
and Customs Enforcement's Infrastructure Modernization Program. GAO- 05-
805. Washington, D.C.: Sept. 7, 2005.
Review of the Immigration and Customs Enforcement Compliance
Enforcement Unit. Department of Homeland Security Office of Inspector
General, OIG-05-50. Washington, D.C.: Sept. 2005.
Border Security: Opportunities to Increase Coordination of Air and
Marine Assets. GAO-05-543. Washington, D.C.: August 12, 2005.
Homeland Security: Key Cargo Security Programs Can Be Improved. GAO-05-
466T. Washington, D.C.: May 26, 2005.
Container Security: A Flexible Staffing Model and Minimum Equipment
Requirements Would Improve Overseas Targeting and Inspection Efforts.
GAO-05-557. Washington, D.C.: April 26, 2005.
Homeland Security: Some Progress Made, but Many Challenges Remain on
U.S. Visitor and Immigrant Status Indicator Technology Program. GAO-05-
202. Washington, D.C.: Feb. 23, 2005.
Implementation of the United States Visitor and Immigrant Status
Indicator Technology Program at Land Border Ports of Entry. Department
of Homeland Security Office of Inspector General, OIG-05-11.
Washington, D.C.: Feb. 2005.
Homeland Security: Management Challenges Remain in Transforming
Immigration Programs. GAO-05-81. Washington, D.C.: Oct. 14, 2004.
Immigration Enforcement: DHS Has Incorporated Immigration Enforcement
Objectives and Is Addressing Future Planning Requirements. GAO-05-66.
Washington, D.C.: Oct. 8, 2004.
Overstay Tracking: A Key Component of Homeland Security and a Layered
Defense. GAO-04-82. Washington, D.C.: May 21, 2004.
Homeland Security: First Phase of Visitor and Immigration Status
Program Operating, but Improvements Needed. GAO-04-586. Washington,
D.C.: May 11, 2004.
Security: Counterfeit Identification Raises Homeland Security Concerns.
GAO-04-133T. Washington, D.C.: Oct. 1, 2003.
Homeland Security: Risks Facing Key Border and Transportation Security
Program Needs to Be Addressed. GAO-03-1083. Washington, D.C.: Sept. 19,
2003.
Security: Counterfeit Identification and Identification Fraud Raise
Security Concerns. GAO-03-1147T. Washington, D.C.: Sept. 9, 2003.
Land Border Ports of Entry: Vulnerabilities and Inefficiencies in the
Inspections Process. GAO-03-1084R. Washington, D.C.: Aug. 18, 2003.
Counterfeit Documents Used to Enter the Country from Certain Western
Hemisphere Countries Not Detected. GAO-03-713T. Washington, D.C.: May
13, 2003.
Weaknesses in Screening Entrants into the United States. GAO-03-438T.
Washington, D.C.: Jan. 30, 2003.
Technology Assessment: Using Biometrics for Border Security. GAO-03-
174. Washington, D.C.: Nov. 15, 2002.
Watch List and Information Sharing:
Critical Infrastructure Protection: Progress Coordinating Government
and Private Sector Efforts Varies by Sectors' Characteristics. GAO-07-
39. Washington, D.C.: Oct. 2006.
Terrorist Watch List Screening: Efforts to Help Reduce Adverse Effects
on the Public. GAO-06-1031. Washington, D.C.: Sept. 29, 2006.
Critical Infrastructure Protection: DHS Leadership Needed to Enhance
Cybersecurity. GAO-06-1087T. Washington, D.C.: Sept. 13, 2006.
Information Sharing: DHS Should Take Steps to Encourage More Widespread
Use of Its Program to Protect and Share Critical Infrastructure
Information. GAO-06-383. Washington, D.C.: April 17, 2006.
Information Sharing: The Federal Government Needs to Establish Policies
and Processes for Sharing Terrorism-Related and Sensitive but
Unclassified Information. GAO-06-385. Washington, D.C.: March 17, 2006.
Review of the Terrorist Screening Center. Department of Homeland
Security Office of Inspector General, Audit Report 05-27. Washington,
D.C.: June 2005.
DHS Challenges in Consolidating Terrorist Watch List Information.
Department of Homeland Security Office of Inspector General, OIG-04-31.
Washington, D.C.: Aug. 2004.
Critical Infrastructure Protection: Improving Information Sharing with
Infrastructure Sectors. GAO-04-780. Washington, D.C.: July 9, 2004.
Homeland Security: Communication Protocols and Risk Communication
Principles Can Assist in Refining the Advisory System. GAO-04-682.
Washington, D.C.: June 25, 2004:
Homeland Security: Efforts to Improve Information Sharing Need to be
Strengthened. GAO-03-760. Washington, D.C.: August 27, 2003:
Information Technology: Terrorist Watch Lists Should Be Consolidated to
Promote Better Integration and Sharing. GAO-03-322. Washington, D.C.:
April 15, 2003.
Homeland Security, Risk Management, and High Risk List:
GAO's High Risk Program. GAO-06-497T. Washington, D.C.: March 15, 2006.
Progress in Developing the National Asset Database. Department of
Homeland Security Office of Inspector General, OIG-06-40. Washington,
D.C.: June 10, 2006.
Risk Management: Further Refinements Needed to Assess Risks and
Prioritize Protective Measures at Ports and Other Critical
Infrastructure. GAO-06-91. Washington, D.C.: Dec. 15, 2005.
Major Management Challenges Facing the Department of Homeland Security.
Department of Homeland Security Office of Inspector General, OIG-06-14.
Washington, D.C.: Dec. 2005.
Department of Homeland Security: Strategic Management of Training
Important for Successful Transformation. GAO-05-888. Washington, D.C:
Sept. 23, 2005.
Strategic Budgeting: Risk Management Principles Can Help DHS Allocate
Resources to Highest Priorities. GAO-05-824T. Washington, D.C.: June
29, 2005.
Homeland Security: Overview of Department of Homeland Security
Management Challenges. GAO-05-573T. Washington, D.C.: April 20, 2005.
Department of Homeland Security: A Comprehensive and Sustained Approach
Needed to Achieve Management Integration. GAO-05-139. Washington, D.C.:
March 16, 2005.
21st Century Challenges: Reexamining the Base of the Federal
Government. GAO-05-325SP. Washington, D.C.: Feb. 2005.
High-Risk Series: An Update. GAO-05-207. Washington, D.C.: Jan. 2005.
Homeland Security: Agency Plans, Implementation, and Challenges
Regarding the National Strategy for Homeland Security. GAO-05-33.
Washington, D.C.: Jan. 14, 2005.
9/11 Commission Report: Reorganization, Transformation, and Information
Sharing. GAO-04-1033T. Washington, D.C.: Aug. 3, 2004.
Status of Key Recommendations GAO Has Made to DHS and Its Legacy
Agencies. GAO-04-865R. Washington, D.C.: July 2, 2004.
Homeland Security: Selected Recommendations from Congressionally
Chartered Commissions and GAO. GAO-04-591. Washington, D.C.: March 31,
2004.
Major Management Challenges and Program Risks: Department of State. GAO-
03-107. Washington, D.C.: Jan. 1, 2003.
Homeland Security: A Framework for Addressing the Nation's Efforts. GAO-
01-1158T. Washington, D.C.: Sept. 21, 2001.
[End of section]
Appendix IV: Comments from the Department of Homeland Security:
U.S. Department of Homeland Security:
Washington, DC 20528:
December 1, 2006:
Ms. Eileen Larence:
Director:
Homeland Security and Justice Issues:
U.S. Government Accountability Office:
441 G Street, NW:
Washington, DC 20548:
Dear Ms. Larence:
RE: Draft Report GAO-07-110SU Homeland Security: Progress Has Been Made
to Address the Vulnerabilities Exposed by 9/11, but Continued Federal
Action Is Needed to Further Mitigate Security Risks (GAO Job Code
440458):
The Department of Homeland Security (DHS) appreciates the opportunity
to review and comment on the draft report referenced above. The
Government Accountability Office (GAO) makes no new recommendations
since prior recommendations on aviation security, the Visa Waiver
Program, US-VISIT and other DHS related activities generally are in the
process of being implemented.
We appreciate the recognition of actions taken by the Department to
address vulnerabilities exposed by the terrorists' attacks of September
11, 2001. The GAO also recognizes Departmental efforts to strengthen or
otherwise improve systems, equipment and oversight not directly
associated with the attacks that are designed to enhance security. We
realize that challenges remain and are moving forward to address them.
While the draft report is generally accurate, several statements are
not currently correct or otherwise require clarification. GAO comments
that the Federal government must address strategic challenges of
sharing terrorism related information, managing risk, and structuring
DHS to meet its mission. Specifically, GAO asserts that DHS has not
completed all of the necessary risk assessments mandated by the
Homeland Security Act (HLSA) of 2002 to set priorities to help focus
resources where most needed. While the Department has not completed
comprehensive vulnerability assessments for every asset in every
sector, it has made considerable progress by both working on cross-
sector vulnerability assessment methodologies and providing tools to
public and private sector partners to help identify and mitigate those
vulnerabilities. Furthermore, although the HLSA states that DHS is to
carry out comprehensive assessments of the vulnerabilities of the key
resources and critical infrastructure of the United States it does not
provide the number of assessments to be performed, sectors to be
targeted, or which of the designated seventeen sectors should have
priority attention. Therefore, GAO's assertion that "all" necessary
risk assessments outlined in the legislation have not been completed by
the Department is not specific enough to address without more
information.
GAO also asserts that DHS's risk management framework, which requires
the support of a comprehensive, national inventory of critical
infrastructure assets known as the National Asset Database (NADB),
remains incomplete. GAO references a June 2005 Office of Inspector
General report that mentions that DHS is still identifying and
collecting critical infrastructure data and that this database is not
yet comprehensive enough to support the management and resource
allocation decision making needed to meet the requirements of HSPD-7,
Critical Infrastructure Identification, Prioritization, and Protection.
We take issue with statements critical of the National Asset Database
comprehensiveness and its role in supporting decision making associated
with HSPD-7 requirements.
The NADB is a continually evolving and comprehensive catalog of the
assets that comprise the Nation's infrastructure that contains
descriptive information regarding approximately 77,000 of those assets.
Since DHS uses the NADB as a "universe" from which various lists of
assets can be produced, it must be viewed as an evolving resource that
will change over time, reflecting the ever-changing threat environment
and national protective posture. As DHS continues to query states for
new assets, strengthens information gathering relationships with public
and private partners, and performs database updates and upgrades over
time, the NADB will fluctuate in content and breadth. The NADB
catalogues infrastructure information regarding assets/systems across
all 17 infrastructure sectors. It serves as a tool that supports a wide-
ranging robust risk analysis process that ties together asset
information, analyses concerning consequences of loss/attack, and
vulnerability of an asset, system or network to the threat to those
assets, systems, or networks. DHS remains committed to implementing
effective risk management practices.
Technical comments are being provided under separate cover.
Sincerely,
Signed by:
Steven J. Pecinovsky:
Director:
Departmental GAO/OIG Liaison Office:
[End of section]
Appendix V: GAO Contacts and Staff Acknowledgements:
GAO Contacts:
Eileen Larence, Director, Homeland Security and Justice Issues, (202)
512-9286:
Staff Acknowledgements: ]
In addition to the individual named above, key contributors to the
report include Katie Bernet, Amy Bernstein, Cathleen Berrick, John
Brummet, Sally Gilley, David Hooper, Kirk Kiester, Sarah Lynch, Octavia
Parks, Susan Quinlan, Brian Sklar, Richard Stana, and Maria Strudwick.
[End of section]
(440458):
FOOTNOTES
[1] A nonimmigrant visa is a U.S. travel document that foreign citizens
from many countries must obtain before arriving at U.S. ports of entry
to enter the country temporarily for business, tourism, or other
reasons. The United States also grants visas to people who intend to
immigrate to the United States. In this report, unless otherwise noted,
we use the term "visa" to refer to nonimmigrant visas only.
[2] The 9/11 Commission, The 9/11 Commission Report: Final Report of
the National Commission on Terrorist Attacks Upon the United States
(Washington, D.C.: July 2004).
[3] GAO, Homeland Security: Progress Has Been Made to Address the
Vulnerabilities Exposed by 9/11, but Continued Federal Action is Needed
to Further Mitigate Security Risks, GAO-07-110SU (Washington D.C.:
December 2006).
[4] Our discussion of "border security" in this report refers primarily
to the border screening and inspection processes undertaken as part of
homeland security. It does not include efforts by the U.S. Border
Patrol to enforce U.S. immigration law and other federal laws along the
8,000 miles of our international borders with Mexico and Canada and
elsewhere.
[5] Pub. L. No. 107-71, 115 Stat. 597 (2001).
[6] Pub. L. No. 107-296, 116 Stat. 2135 (2002).
[7] Pub L. No. 107-173, 116 Stat. 543 (2002).
[8] Pub. L. No. 108-458, 118 Stat. 3638 (2004).
[9] "Trusted traveler" programs refer to programs under the purview of
DHS or U.S. Customs and Border Protection at designated border ports of
entry to expedite the processing of pre-approved, international, and
low-risk commercial and commuter travelers crossing the borders.
[10] Interpol is the world's largest international police organization,
with 184 member countries. In July 2002, Interpol established a
database on lost and stolen travel documents. As of June 2006, the
database contained about 11.6 million records of lost and stolen
passports.
[11] Pub. L. No. 107-71, 115 Stat. 597 (2001).
[12] The Homeland Security Act of 2002, signed into law on Nov. 25,
2002, transferred TSA from the DOT to the new Department of Homeland
Security. Pub. L. No. 107-296, § 403, 116 Stat. 2135, 2178.
[13] Prior to the passage of ATSA, the screening of passengers and
checked baggage had been performed by private companies under contract
to the airlines. The Federal Aviation Administration (FAA) was
responsible for ensuring compliance with screening regulations.
[14] The Department of State consular officers overseas maintain
responsibility for the visa process and consular officials are part of
State, not DHS.
[15] Pub. L. No. 107-56, 115 Stat. 272 (2001).
[16] Pub. L. No. 107-173 116 Stat. 543 (2002).
[17] Pub. L. No. 108-458, 118 Stat. 3638.
[18] Prior to the passage of ATSA, the screening of passengers and
checked baggage had been performed by private companies under contract
to the airlines. The Federal Aviation Administration was responsible
for ensuring compliance with screening regulations.
[19] Pursuant to Homeland Security Presidential Directive 6, dated
Sept. 16, 2003, the FBI's Terrorist Screening Center was established to
consolidate the government's approach to terrorism screening and
provide for the appropriate and lawful use of terrorist information in
screening processes. The center began "24/7" operations on Dec. 1,
2003, and about 3 months later, announced that watch list consolidation
was completed on Mar. 12, 2004--with the establishment of the terrorist
screening database.
[20] In April 2003, we reported that terrorist and criminal watch lists
were maintained by numerous federal agencies and that the agencies did
not have a consistent and uniform approach to sharing information on
individuals with possible links to terrorism [GAO, Information
Technology: Terrorist Watch Lists Should Be Consolidated to Promote
Better Integration and Sharing, GAO-03-322 (Washington, D.C.: Apr. 15,
2003)]. Our report recommended that DHS lead an effort to consolidate
and standardize the federal government's watch list structures and
policies.
[21] Pursuant to Homeland Security Presidential Directive 6, dated
Sept. 16, 2003, the FBI's Terrorist Screening Center was established to
consolidate the government's approach to terrorism screening and
provide for the appropriate and lawful use of terrorist information in
screening processes. The center began "24/7" operations on Dec. 1,
2003, and about 3 months later, announced that watch list consolidation
was completed on Mar. 12, 2004--with the establishment of the terrorist
screening database.
[22] The number of records contained in the watch list database is
sensitive security information.
[23] FAA assumed administration of the no-fly list from the FBI in
November, 2001. The no-fly list was subsequently split into the no-fly
and selectee list when TSA took over administration of the list.
[24] The number of records contained in the no-fly and selectee lists
is sensitive security information.
[25] At the time of 9/11 attacks, individuals who could not produce an
approved form of identification as well as those unable to answer
standard security questions asked by air carrier employees, such as,
"Did you pack your own bags?", would also receive additional screening.
[26] Three of the nine hijackers selected had their checked bags
scanned for explosives before being loaded on the plane. Five of the
nine hijackers selected had their checked bags held until they had
boarded the aircraft. The remaining hijacker did not check any bags.
[27] U.S. Department of Justice Office of the Inspector General, Review
of the Terrorist Screening Center, Audit Report 05-27 (June 2005).
[28] We have ongoing work assessing air carriers' current identity
matching procedures for prescreening passengers on domestic flights.
[29] The 9/11 Commission noted that under current practices, air
carriers enforce government orders to stop certain known and suspected
terrorists from boarding commercial flights and to apply secondary
screening procedures to others. Because air carriers implement this
prescreening program, concerns about sharing intelligence with private
firms and foreign countries keep the U.S. government from listing all
terrorist and terrorist suspects who should be included in the watch
lists.
[30] Intelligence Reform and Terrorism Prevention Act of 2004, Pub. L.
No. 108-458.
[31] Following the events of September 11, and in accordance with the
Aviation and Transportation Security Act's requirement that a computer-
assisted passenger prescreening system be used to evaluate all
passengers, TSA subsequently began an effort in March 2003 to develop a
new computer-assisted passenger prescreening system, known as CAPPS II.
Because of a variety of delays and challenges, in August 2004, DHS
cancelled the development of CAPPS II. In its place, TSA announced that
it would develop a new prescreening program, called Secure Flight.
[32] CBP performs a second name match of passenger names using more
reliable data from passenger passports, as well as additional databases
to identify other passengers--who may not have been included on the
watch lists used by the air carriers--but who nonetheless may be of
interest or represent a risk for other reasons, such as past criminal
activity, or a prior visa overstay.
[33] The government's identity matching process check is often not
completed until after a flight departs because air carriers are not
required to provide passenger passport data to CBP until 15 minutes
before the flight departs for an international flight originating in
the United States or 15 minutes after the flight departs for
international flights bound for the United States.
[34] The specific number of passengers identified by the U.S.
government as direct threats to commercial aviation who boarded
international flights is sensitive security information.
[35] Intelligence Reform and Terrorism Prevention Act of 2004, Pub. L.
No. 108-458, §4012, 118 Stat.3638.
[36] CBP published a Notice of Proposed Rulemaking in July 2006.
[37] GAO, Aviation Security: Efforts to Strengthen International
Passenger Prescreening are Under Way, But Planning and Implementation
Issues Remain, GAO-07-55SU (Washington, D.C.: November 2006). We expect
to issue a public version of this report in the first quarter of 2007.
[38] Passengers also may be selected for additional scrutiny randomly
or by other TSA-approved processes.
[39] Follow-Up Audit of Passenger and Baggage Screening Procedures at
Domestic Airports (Unclassified Summary). Department of Homeland
Security Office of Inspector General, OIG-05-16. Washington, D.C.:
March 2005.
[40] The Intelligence Reform and Terrorism Prevention Act of 2004
included a provision to study the use of secondary flight deck barriers
as a means of protecting the airline cockpit when the door is opened
during in-flight meal service, or when a pilot needs to leave the
cockpit. No airline has yet implemented such barriers but United
Airlines is considering such a measure.
[41] The U. S. Federal Air Marshal Service has undergone a number of
organizational changes since its creation, including moving from FAA to
TSA in November 2001 and from DOT to DHS in March 2003. Several months
later, the air marshals were transferred from TSA to U.S. Immigration
and Customs Enforcement and in 2005 were transferred back to TSA. The
exact number of air marshals is considered classified information.
[42] NORAD has since increased its level of air patrols and use of
early warning aircraft.
[43] Events broadcast over the Domestic Events Network may include
incidents that occur in an airport terminal as well as situations that
arise onboard an airplane.
[44] Noble Eagle is one example of a classified teleconference that
occurs on the Defense Red Switch Network. Noble Eagle conferences are
initiated by DOD, though other agencies can request that a Noble Eagle
conference be convened.
[45] Checked baggage screening primarily involves the inspection of
checked baggage to deter, detect, and prevent the carriage of any
unauthorized explosive, incendiary, or weapon on board an aircraft.
[46] TSA also uses alternative screening procedures to screen checked
baggage for explosives for certain short-term circumstances that
involve some form of explosives detection as well as other methods that
do not use either EDS or ETD, such as canine screening.
[47] Intelligence Reform and Terrorism Prevention Act of 2004, Pub. L.
No. 108-458, § 4019, 118 Stat/ 3638, 3721-22.
[48] A congressionally established Aviation Security Capital Fund for
baggage screening investments has a mandatory funding level of $250
million annually and there is an additional authorization for up to
$400 million per year, through fiscal year 2007. Congress also gives
TSA the authority to issue letters of intent to airports, committing
future funding toward in-line EDS integration projects.
[49] GAO, Aviation Security: Federal Action Needed to Strengthen
Domestic Air Cargo Security, GAO-06-76 (Washington, D.C.: October
2005).
[50] The Known Shipper program was created prior to the events of
September 11 to establish procedures for differentiating between
shippers that are known and unknown to an indirect air carrier or air
carrier.
[51] GAO, Aviation Security: Further Steps Needed to Strengthen the
Security of Commercial Airport Perimeters and Access Controls, GAO-04-
728 (Washington, D.C.: June 2004).
[52] GAO, Transportation Security: DHS Should Address Key Challenges
Before Implementing the Transportation Worker Identification Program,
GAO-06-982 (Washington, D.C.: September 2006).
[53] The Maritime Transportation Security Act of 2002 required the
Secretary of DHS to issue a maritime worker identification card that
uses biometrics, such as fingerprints, to control access to secure
areas of seaports and vessels.
[54] There are approximately 14,000 private-use and 4,800 public-use
general aviation airports in the United States, and about 550,000
active general aviation pilots and instructors.
[55] General Aviation Security: Increased Federal Oversight Is Needed,
but Continued Partnership with the Private Sector Is Critical to Long-
Term Success, GAO-05-144 (Washington, D.C.: November 2004).
[56] We have work under way on another nonaviation transportation mode-
-surface transportation--focusing on the security of the motor carrier
industry.
[57] The U.S. passenger rail system consists of heavy rail (such as
subways), commuter rail (such as regional commuter lines), light rail,
and intercity rail (Amtrak).
[58] Passenger Rail Security: Enhanced Federal Leadership Needed to
Prioritize and Guide Security Efforts, GAO-05-851 (Washington, D.C.:
September 2005).
[59] Pub. L. No. 108-458, 118 Stat. 3638.
[60] GAO, Risk Management: Further Refinements Needed to Assess Risks
and Prioritize Protective Measures at Ports and Other Critical
Infrastructure, GAO-06-91 (Washington, D.C.: Dec. 15, 2005).
[61] Since 2004, in-person interviews are also required for applicants
with certain exceptions.
[62] 9-11 Commission, 9/11 and Terrorist Travel: Staff Report of the
National Commission on Terrorist Attacks Upon the United States
(Washington, D.C; Aug. 21, 2004).
[63] This name-check database is known as the Consular Lookout and
Support System--a State Department database used by posts to access
critical information for visa adjudication.
[64] We could not review the visa applications for 2 of 17 Saudi and
Emirati hijackers because the posts had destroyed them in accordance
with State's document destruction policies in effect at that time.
[65] GAO, Border Security: Strengthened Visa Process Would Benefit from
Improvements in Staffing and Information Sharing, GAO-05-859
(Washington, D.C.: Sept. 13, 2005).
[66] Intelligence Reform and Terrorism Prevention Act of 2004, Pub. L.
No, 108-458, 118 Stat. 3638, § 5301.
[67] We recommended to State in 2002 that more comprehensive risk-based
guidelines on standards for how consular officers use the visa process
to screen against potential terrorists, including the degree of
discretion for waived interviews, among other things.
[68] Section 306 of the Enhanced Border Security and Visa Entry Reform
Act of 2002 restricts the issuance of nonimmigrant visas to any alien
from a country that is a state sponsor of international terrorism
unless the Secretary of State determines the alien does not pose a
safety or security threat. Currently, citizens from Cuba, Iran, Libya,
North Korea, Sudan, and Syria must, under this provision, undergo
security clearances from agencies in Washington, D.C., prior to
adjudication by a consular officer.
[69] Consular officers are required to use biometric information to
confirm the identity of most foreign nationals by scanning the right
and left index fingers. Fingerprint scans must be cleared through DHS's
Automated Biometric Identification System before an applicant can
receive a visa.
[70] Pub. L. No. 107-296, §428(e) and 428(i).
[71] The Vulnerability Assessment Unit, staffed with personnel from the
Bureau of Consular Affairs and Diplomatic Security, is responsible for
analyzing consular data to identify anomalies related to internal
fraud, such as visa issuances occurring during non-work hours. In
response to our recommendation, the unit has expanded its work to
encompass external fraud prevention.
[72] Pub. L. No. 108-458, §7203, 118 Stat. 3638.
[73] Consular officers who serve as fraud prevention managers are in
charge of investigating cases of fraud, conducting fraud training for
the consular section, and providing information on fraud relevant to
the consular section at post.
[74] See GAO-03-132NI.
[75] Most immigrants entering the United States who do not participate
in this program enter on the basis of family relationships or
employment.
[76] Those selected are, like other visa applicants, subject to all
grounds of ineligibility related to adverse medical conditions,
criminal behavior, and other factors. If deemed eligible on those
grounds, they need only to demonstrate that they have the equivalent of
a U.S. high school education or possess 2 years of work experience in
an occupation that requires at least 2 years of training or experience.
[77] The participating countries are Andorra, Australia, Austria,
Belgium, Brunei, Denmark, Finland, France, Germany, Iceland, Ireland,
Italy, Japan, Liechtenstein, Luxembourg, Monaco, the Netherlands, New
Zealand, Norway, Portugal, San Marino, Singapore, Slovenia, Spain,
Sweden, Switzerland, and United Kingdom. Participating countries were
selected because, among other things, their citizens demonstrated a
pattern of compliance with U.S. immigrant laws. Under certain
circumstances, citizens of Canada and Bermuda may also travel to the
United States without obtaining a visa, though they are not Visa Waiver
Program members.
[78] GAO, Border Security: Stronger Actions Needed to Assess and
Mitigate Risks of the Visa Waiver Program, GAO-06-854 (Washington,
D.C.: July 28, 2006).
[79] All foreign visitors, whether they have visas or are seeking to
enter the United States under the Visa Waiver Program, undergo
inspections by CBP officers at U.S. air, sea, and land ports of entry
to ensure that only admissible persons enter the United States.
[80] See GAO-06-854.
[81] The Enhanced Border Security and Visa Entry Reform Act of 2002,
Pub. L. No. 107-173.
[82] Prior to the establishment of DHS in 2003, Justice's Office of the
Inspector General also examined visa waiver operations in 1999 and
2001, when the then-Immigration and Naturalization Service managed the
program. Justice's Inspector General identified several chronic and
recurring problems and made a series of recommendations to strengthen
the implementation of the program.
[83] The unit is within the Office of International Enforcement,
located in the Office of Policy Development under the direction of the
Assistant Secretary of Homeland Security for Policy.
[84] See GAO-06-854.
[85] GAO has also reported on inspections at land ports of entry. GAO,
Land Border Ports of Entry: Vulnerabilities and Inefficiencies in the
Inspections Process, GAO-03-1084R (Washington, D.C.: Aug. 18, 2003).
[86] In general, e-passports contain a chip, which is embedded in the
passport. The chip stores the same information that is printed in the
data page of the passport: the name, date of birth, gender, place of
birth, dates of passport issuance and expiration, place of issuance,
passport number, and photo image of the bearer. In addition, it holds
the unique chip identification number and a digital signature to
protect the stored data from alteration.
[87] According to DHS, the United States continues to work with the
three countries--Andorra, Brunei, and Liechtenstein--that did not meet
the deadline to ensure that they meet the requirement as soon as
possible.
[88] German temporary passports are valid for one year, and are less
expensive than standard German passports. In addition, they are issued
at more than 6,000 locations in Germany, whereas the Ministry of
Interior issues the standard passports centrally.
[89] See GAO-06-854.
[90] Interpol is the world's largest international police organization,
with 184 member countries. Created in 1923, it facilities cross-border
police cooperation, and supports and assists all organizations,
authorities, and services whose mission is to prevent or combat
international crime. In July 2002, Interpol established a database on
lost and stolen travel documents. As of June 2006, the database
contained about 11.6 million records of lost and stolen passports.
[91] A port of entry is generally a physical location, such as a
pedestrian walkway and/or a vehicle plaza with booths, and associated
inspection and administration buildings, at a land border crossing
point, or a restricted area inside an airport or seaport, where entry
into the country by persons and cargo arriving by air, land, or sea is
controlled by CBP.
[92] Under the Enhanced Border Security and Visa Entry Reform Act of
2002 (Pub. L. No. 107-173, § 402(a), 116 Stat. 543, 557-59), commercial
air and sea carriers are to transmit crew and passenger manifests to
appropriate immigration officials before arrival of an aircraft or
vessel in the United States.
[93] GAO, Homeland Security: Recommendations to Improve Management of
Key Border Security Program Need to Be Implemented, GAO-06-296
(Washington, D.C.: February 2006).
[94] GAO, Border Security: US-VISIT Program Faces Strategic,
Operational and Technological Challenges at Land Ports of Entry, GAO-07-
56SU (Washington, D.C.: November 2006).
[95] See GAO-06-741R, Observations on Efforts to Implement Western
Hemisphere Travel Initiative on the U.S. Border with Canada
(Washington, D.C.: May 25, 2006).
[96] Since we reported our observations on efforts to implement WHTI,
DHS and State have published Federal Register notices with proposed
decisions in these areas, but final regulations have not been
published.
[97] GAO, Border Security: Investigators Successfully Transported
Radioactive Sources Across Our Nation's Borders at Selected Locations,
GAO-06-545R (Washington, D.C.: March 2006).
[98] GAO, Combating Nuclear Smuggling: DHS Has Made Progress Deploying
Radiation Detection Equipment at U.S. Ports-of-Entry, but Concerns
Remain, GAO-06-389 (Washington, D.C.: March 2006).
[99] See Container Security: A Flexible Staffing Model and Minimum
Equipment Requirements Would Improve Overseas Targeting and Inspection
Efforts, GAO-05-557 (Washington, D.C.: April 26, 2005).
[100] Cargo Container Inspections: Preliminary Observations on the
Status of Efforts to Improve Automated Targeting Systems, GAO-06-591T
(Washington, D.C.: March 30, 2006).
[101] GAO, Information Sharing: The Federal Government Needs to
Establish Policies and Processes for Sharing Terrorism-Related and
Sensitive but Unclassified Information, GAO-06-385 (Washington, D.C.:
Mar. 17, 2006).
[102] See GAO-06-385.
[103] GAO, High-Risk Series: An Update, GAO-05-207 (Washington, D.C.:
January 2005); GAO, Strategic Budgeting: Risk Management Principles Can
Help DHS Allocate Resources to Highest Priorities, GAO-05-824T
(Washington, D.C: June 29, 2005).
[104] Department of Homeland Security Office of Inspector General,
Progress in Developing the National Asset Database, OIG-06-40
(Washington, D.C.: June 10, 2006).
[105] GAO, Risk Management: Further Refinements Needed to Assess Risks
and Prioritize Protective Measures at Ports and Other Critical
Infrastructure, GAO-06-91 (Washington, D.C.: Dec. 15, 2005).
[106] GAO, Passenger Rail Security: Enhanced Federal Leadership Needed
to Prioritize and Guide Security Efforts, GAO-06-181T (Washington,
D.C.: Oct. 20, 2005).
[107] GAO, 21st Century Challenges: Reexamining the Base of the Federal
Government, GAO-05-325SP (Washington, D.C.: February 2005).
[108] Department of Homeland Security Office of Inspector General,
Major Management Challenges Facing the Department of Homeland Security,
OIG-06-14 (Washington, D.C.: December 2005).
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site (www.gao.gov). Each weekday, GAO posts
newly released reports, testimony, and correspondence on its Web site.
To have GAO e-mail you a list of newly posted products every afternoon,
go to www.gao.gov and select "Subscribe to Updates."
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office 441 G Street NW, Room LM
Washington, D.C. 20548:
To order by Phone: Voice: (202) 512-6000 TDD: (202) 512-2537 Fax: (202)
512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Gloria Jarmon, Managing Director, JarmonG@gao.gov (202) 512-4400 U.S.
Government Accountability Office, 441 G Street NW, Room 7125
Washington, D.C. 20548:
Public Affairs:
Paul Anderson, Managing Director, AndersonP1@gao.gov (202) 512-4800
U.S. Government Accountability Office, 441 G Street NW, Room 7149
Washington, D.C. 20548: