Aviation Security

Progress Made in Systematic Planning to Guide Key Investment Decisions, but More Work Remains Gao ID: GAO-07-448T February 13, 2007

The Transportation Security Administration (TSA), established in November 2001, has developed and implemented a variety of programs to secure the commercial aviation system. To implement these efforts, TSA funding related to aviation security has totaled about $20 billion since fiscal year 2004. Other Department of Homeland Security (DHS) components, such as the U.S. Customs and Border Protection (CBP) and the Science and Technology Directorate (S&T), also play roles in securing commercial aviation. In this testimony, we address the efforts TSA has taken or planned to strengthen aviation security, and the challenges that remain, in three key areas: airline passenger prescreening, airline passenger and checked baggage screening, and air cargo screening. GAO's comments are based on issued GAO reports and testimonies and our preliminary observations from ongoing work on TSA's passenger checkpoint screening procedures and technologies, and staffing standards for Transportation Security Officers (TSO).

DHS and TSA have undertaken numerous initiatives to strengthen the security of the nation's aviation system, and should be commended for these efforts. However, more work remains. Meeting the congressional mandates to screen airline passengers and checked baggage alone was a tremendous challenge. Since that time, TSA has turned its attention to, among other things, strengthening passenger prescreening; more efficiently allocating, deploying, and managing the TSO workforce; strengthening screening procedures; developing and deploying more effective and efficient screening technologies; and improving domestic air cargo security. Some of the actions taken by TSA in these areas were in response to GAO recommendations. For example, consistent with GAO's recommendation to strengthen checked baggage screening, TSA has developed a strategic planning framework and identified several funding and financing strategies for installing optimal checked baggage screening systems. While TSA has undertaken numerous efforts to strengthen aviation security, GAO found that DHS and TSA could strengthen their risk-based decision-making efforts and collaboration with stakeholders. For example, as TSA moves forward with Secure Flight--TSA's prospective domestic passenger prescreening program--it will need to employ a range of program management disciplines, which we previously found missing, to control program cost, schedule, performance, and privacy risks. TSA has put in place a new management team, but it is too early to know how this change will affect the program's development. In addition, while TSA has tested some proposed modifications to passenger screening procedures at airports to help determine whether to implement the changes, GAO identified that TSA's data collection and analyses could be improved. GAO also found that limited progress has been made in developing and deploying technologies due to planning and funding challenges. For example, limited progress has been made in fielding explosives detection technology at passenger screening checkpoints, and while TSA has begun to systematically plan for the optimal deployment of checked baggage screening systems and to identify funding and financing strategies for installing these systems, the agency has identified that under current investment levels, installation of optimal checked baggage screening systems will not be completed until approximately 2024. Additionally, the federal government and the air cargo industry face several challenges that must be overcome to effectively implement technologies to inspect air cargo, such as ensuring that air cargo can be inspected in a timely manner to meet the delivery time frames of air carriers. GAO also found that more work is needed to fully implement a risk-based approach to securing air cargo, including finalizing a methodology and schedule for completing assessments of air cargo vulnerabilities and critical assets. TSA stated that the agency intends to perform a vulnerability assessment of U.S. air cargo operations and activities, as recommended by GAO, and plans to complete this assessment in 2007.



GAO-07-448T, Aviation Security: Progress Made in Systematic Planning to Guide Key Investment Decisions, but More Work Remains This is the accessible text file for GAO report number GAO-07-448T entitled 'Aviation Security: Progress Made in Systematic Planning to Guide Key Investment Decisions, but More Work Remains' which was released on February 13, 2007. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Testimony before the Subcommittee on Homeland Security, Committee on Appropriations, House of Representatives: United States Government Accountability Office: GAO: For Release on Delivery Expected at 10:00 a.m. EST: Tuesday, February 13, 2007: Aviation Security: Progress Made in Systematic Planning to Guide Key Investment Decisions, but More Work Remains: Statement of Cathleen A. Berrick, Director: Homeland Security and Justice Issues: GAO-07-448T: GAO Highlights: Highlights of GAO-07-448T, a testimony before the Subcommittee on Homeland Security, Committee on Appropriations, House of Representatives Why GAO Did This Study: The Transportation Security Administration (TSA), established in November 2001, has developed and implemented a variety of programs to secure the commercial aviation system. To implement these efforts, TSA funding related to aviation security has totaled about $20 billion since fiscal year 2004. Other Department of Homeland Security (DHS) components, such as the U.S. Customs and Border Protection (CBP) and the Science and Technology Directorate (S&T), also play roles in securing commercial aviation. In this testimony, we address the efforts TSA has taken or planned to strengthen aviation security, and the challenges that remain, in three key areas: airline passenger prescreening, airline passenger and checked baggage screening, and air cargo screening. My comments are based on issued GAO reports and testimonies and our preliminary observations from ongoing work on TSA‘s passenger checkpoint screening procedures and technologies, and staffing standards for Transportation Security Officers (TSO). What GAO Found: DHS and TSA have undertaken numerous initiatives to strengthen the security of the nation‘s aviation system, and should be commended for these efforts. However, more work remains. Meeting the congressional mandates to screen airline passengers and checked baggage alone was a tremendous challenge. Since that time, TSA has turned its attention to, among other things, strengthening passenger prescreening; more efficiently allocating, deploying, and managing the TSO workforce; strengthening screening procedures; developing and deploying more effective and efficient screening technologies; and improving domestic air cargo security. Some of the actions taken by TSA in these areas were in response to GAO recommendations. For example, consistent with GAO‘s recommendation to strengthen checked baggage screening, TSA has developed a strategic planning framework and identified several funding and financing strategies for installing optimal checked baggage screening systems. While TSA has undertaken numerous efforts to strengthen aviation security, GAO found that DHS and TSA could strengthen their risk-based decision-making efforts and collaboration with stakeholders. For example, as TSA moves forward with Secure Flight”TSA‘s prospective domestic passenger prescreening program”it will need to employ a range of program management disciplines, which we previously found missing, to control program cost, schedule, performance, and privacy risks. TSA has put in place a new management team, but it is too early to know how this change will affect the program‘s development. In addition, while TSA has tested some proposed modifications to passenger screening procedures at airports to help determine whether to implement the changes, GAO identified that TSA‘s data collection and analyses could be improved. GAO also found that limited progress has been made in developing and deploying technologies due to planning and funding challenges. For example, limited progress has been made in fielding explosives detection technology at passenger screening checkpoints, and while TSA has begun to systematically plan for the optimal deployment of checked baggage screening systems and to identify funding and financing strategies for installing these systems, the agency has identified that under current investment levels, installation of optimal checked baggage screening systems will not be completed until approximately 2024. Additionally, the federal government and the air cargo industry face several challenges that must be overcome to effectively implement technologies to inspect air cargo, such as ensuring that air cargo can be inspected in a timely manner to meet the delivery time frames of air carriers. GAO also found that more work is needed to fully implement a risk-based approach to securing air cargo, including finalizing a methodology and schedule for completing assessments of air cargo vulnerabilities and critical assets. TSA stated that the agency intends to perform a vulnerability assessment of U.S. air cargo operations and activities, as recommended by GAO, and plans to complete this assessment in 2007. What GAO Recommends: In prior reports, GAO has made numerous recommendations designed to strengthen aviation security, including recommendations related to passenger prescreening, passenger and checked baggage screening, and air cargo security. TSA has generally agreed with our recommendations. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-448T]. To view the full product, including the scope and methodology, click on the link above. For more information, contact Cathleen Berrick at (202) 512-3404 or berrickc@gao.gov. [End of section] Mr. Chairman and Members of the Committee: I appreciate the opportunity to participate in today's hearing to discuss the security of our nation's aviation system. The Transportation Security Administration (TSA) was established in 2001 with the mission to protect the transportation network while also ensuring the free movement of people and commerce. Since its inception, TSA has focused much of its efforts on aviation security, and has developed and implemented a variety of programs and procedures to secure commercial aviation. To implement these efforts, TSA funding for aviation security has totaled about $20 billion since fiscal year 2004. The U.S. Customs and Border Protection (CBP) also plays a role in securing commercial aviation. In particular, CBP has responsibility for conducting passenger prescreening--or the matching of passenger information against terrorist watch lists--for international flights operating to or from the United States, as well as inspecting inbound air cargo upon its arrival in the United States.[Footnote 1] In addition, the Department of Homeland Security's (DHS) Science and Technology Directorate (S&T) is responsible for the research and development of aviation security technologies. In carrying out its broader homeland security responsibilities, DHS faces the daunting challenge of determining how to allocate its finite resources within the aviation system and across all sectors to address threats and strengthen security. My testimony today focuses on three key areas of the aviation security system: airline passenger prescreening, airline passenger and checked baggage screening, and air cargo security. In particular, I will address the numerous efforts TSA has taken or has planned to strengthen aviation security in these three key areas, and the challenges that remain. My comments are based on issued GAO reports and testimonies addressing the security of the U.S. commercial aviation system; and our preliminary observations from ongoing work on TSA's passenger checkpoint screening procedures and technologies, air carriers' domestic passenger prescreening systems, and staffing standards for Transportation Security Officers (TSO). We plan to report on the results of this work later this year. We conducted our work in accordance with generally accepted government auditing standards. A list of our related reports on aviation security is included at the end of this testimony. Summary: DHS and TSA have undertaken numerous initiatives to strengthen the security of the nation's aviation system. Meeting the congressional mandates to screen airline passengers and 100 percent of checked baggage alone was a tremendous challenge. To do this, TSA hired and deployed a federal workforce of over 40,000 passenger and checked baggage screeners, and installed equipment at most of the nation's more than 400 commercial airports to provide the capability to screen all checked baggage using explosive detection systems, as mandated by Congress. TSA has since turned its attention to, among other things, strengthening passenger prescreening; more efficiently allocating, deploying, and managing the TSO--formerly known as screener--workforce; strengthening screening procedures; developing and deploying more effective and efficient screening technologies; and improving domestic air cargo security. More specifically, based on our past work and preliminary observations from our ongoing work, DHS and TSA have: * Taken numerous steps to strengthen the management and performance of the TSO workforce by, for example, developing and implementing a Staffing Allocation Model to determine TSO staffing levels at airports that reflect current operating conditions; implementing a variety of human capital initiatives to help recruit, hire, and retain TSOs (both full-time and part-time); and providing TSOs with additional training intended to enhance the detection of threat objects, particularly improvised explosive devices. * Proposed and implemented modifications to passenger checkpoint screening procedures based on risk (threat and vulnerability) information, and pursued several mitigating actions to reduce the need to use alternative screening procedures for screening checked baggage that have involved trade-offs in security effectiveness. * Explored new passenger checkpoint screening technologies to enhance the detection of explosives and other threats; and developed a strategic planning framework and identified several funding and financing strategies, in collaboration with key stakeholders, for installing optimal checked baggage screening systems. * Implemented measures to strengthen air cargo security, such as conducting threat assessments that identified general and specific threats related to domestic air cargo; enhancing requirements for air carriers to randomly inspect air cargo; conducting compliance inspections of air carriers to ensure that they are complying with existing air cargo security requirements; and working with DHS's Science and Technology Directorate to enhance air cargo screening technologies. While these efforts should be commended, we also found that DHS and TSA could strengthen their risk-based decision making efforts, including planning and program evaluations, and collaboration with stakeholders. For example, for over 4 years, TSA has been unable to develop Secure Flight--a government-operated domestic passenger prescreening system-- to the point of implementation on the schedule it had established for the program due, in part, to not employing a range of management disciplines to effectively manage program cost, schedule, performance, and privacy risks. While TSA officials stated that they will be able to manage these risks--based on putting in place a new management team; rebaselining the program's goals, capabilities, costs, and schedule; and establishing more structured and controlled processes to guide future development--it is too early to know how these changes will affect the program's development. Further, TSA and CBP, although now coordinating efforts, have not yet aligned their respective domestic and international passenger prescreening programs to minimize duplication and provide a single, integrated interface to the aviation industry, and key decisions about how the international and domestic prescreening programs will be integrated have not yet been finalized. In addition, our ongoing review of TSA's process for modifying passenger checkpoint screening procedures identified that TSA's efforts to evaluate the effectiveness of proposed changes to passenger screening procedures could be improved. For example, while in some cases TSA has tested proposed modifications to passenger checkpoint screening procedures at selected airports to help determine whether the changes would achieve their intended purposes, our preliminary observations indicate that TSA's data collection and analyses could be strengthened. In addition, with respect to air cargo, while TSA conducted a variety of compliance inspections to determine whether air carriers or indirect air carriers[Footnote 2] were complying with TSA security requirements, and had begun to analyze the results of these inspections, it had not developed measures to assess the adequacy of air carrier compliance with air cargo security requirements, or systematically assessed the results of its compliance inspections to target higher-risk air carriers or indirect air carriers for future reviews. We also found that limited progress has been made in developing and deploying technologies due to planning and funding challenges. For example, our preliminary work has identified that limited progress has been made in fielding explosives detection technology at passenger screening checkpoints in part due to challenges DHS S&T and TSA face in coordinating research and development efforts, and TSA does not yet have a strategic plan in place to assist in guiding its efforts to acquire and deploy screening technologies. The lack of such a plan could limit TSA's ability to deploy emerging technologies at those airport locations deemed at higher risk. In addition, while TSA has begun to systematically plan for the optimal deployment of checked baggage screening systems--as we recommended in March 2005--and to identify funding and financing strategies for installing optimal checked baggage screening systems, TSA has identified that under current investment levels, installation of optimal checked baggage screening systems would not be completed until approximately 2024. Moreover, although TSA is working to enhance air cargo screening technologies, the federal government and the air cargo industry face several challenges that must be overcome to effectively implement technologies to inspect air cargo. These challenges include ensuring that air cargo can be inspected in a timely manner to meet the delivery time frames of air carriers, and that individuals who inspect cargo are properly trained to operate the inspection technology. Another challenge is the funding of inspection technologies, which can range in the millions of dollars. We also reported that additional work is needed to fully implement a risk-based management approach to securing air cargo. We recommended that TSA develop a methodology and schedule for finalizing assessments of air cargo vulnerabilities and critical assets that need to be protected. TSA stated that the agency intends to perform a vulnerability assessment of U.S. air cargo operations and activities, and plans to complete this assessment in 2007. Background: With the passage of the Aviation and Transportation Security Act (ATSA) in November 2001, TSA assumed responsibility for civil aviation security from the Federal Aviation Administration and for passenger and checked baggage screening from air carriers.[Footnote 3] As part of this responsibility, TSA oversees security operations at the nation's more than 400 commercial airports, including establishing requirements for passenger and checked baggage screening, and ensuring the security of air cargo transported to, from, and within the United States.[Footnote 4] While TSA has operational responsibility for conducting passenger and checked baggage screening, TSA has regulatory, or oversight, responsibility for air carriers who conduct air cargo screening. While TSA took over responsibility for passenger checkpoint and baggage screening, as directed by ATSA, air carriers have continued to conduct passenger prescreening, which includes the process of checking passenger information against federal watch list data before flights depart. In accordance with the Intelligence Reform and Terrorism Prevention Act of 2004, TSA is developing a program to take over this responsibility from air carriers for passengers on domestic flights, and CBP has issued a proposed rule that would enable it to perform its identity-matching function for passengers on international flights traveling to or from the United States prior to flight departure.[Footnote 5] Airline Passenger Prescreening: The prescreening of airline passengers--the process of identifying passengers who may pose a security risk before they board an aircraft- -is one of many important layers of security that is intended to help officials focus security efforts on those passengers representing the greatest potential threat to civil aviation. Within DHS, TSA is responsible for ensuring that passenger prescreening is conducted before domestic flights--flights operating entirely within the United States--take off, while CBP has responsibility for conducting passenger prescreening for international flights operating to or from the United States.[Footnote 6] TSA is developing a program, in accordance with ATSA and the Intelligence Reform and Terrorism Prevention Act of 2004, through which TSA would assume the watch list matching function currently conducted by air carriers prior to domestic flight departures.[Footnote 7] TSA has named this prospective prescreening program Secure Flight.[Footnote 8] In accordance with security directives issued by TSA, air carriers- -and not the U.S. government--currently match passenger-supplied reservation information (referred to as passenger name record (PNR) data), against the No Fly and Selectee Lists to prescreen passengers before domestic flights depart. According to TSA, the No Fly List includes the names of individuals considered to be known or suspected threats to civil aviation and are therefore precluded from boarding an aircraft traveling to, from, or within the United States, while the Selectee List includes the names of individuals who require additional security screening--which includes physical inspection of the person and a hand search of their luggage--prior to being permitted to board an aircraft. These lists are extracted from the Terrorist Screening Center's (TSC) consolidated terrorist screening database (TSDB) and are exported to the air carriers through TSA. The current domestic prescreening process also requires that air carriers operate the Computer-Assisted Passenger Prescreening System (CAPPS), which identifies passengers for additional screening based on certain behavioral characteristics.[Footnote 9] The existing identity-matching component of DHS's international aviation passenger prescreening process involves separate matching activities conducted by air carriers (prior to a flight's departure and pursuant to TSA requirements) and by CBP (generally after a flight's departure).[Footnote 10] As with domestic passenger prescreening, air carriers conduct an initial match of self-reported PNR data against the No Fly and Selectee Lists before international flight departures. CBP's process, in effect, supplements the air carrier identity matching for international flights by comparing additional passenger information collected from passports (this information becomes part of Advanced Passenger Information System (APIS) data), against the No Fly and Selectee Lists and other government databases.[Footnote 11] Under current federal regulations for CBP's prescreening of passengers on international flights, air carriers are required to provide the U.S. government with PNR data as well as APIS data to allow the government to conduct, among other things, identity matching procedures against the No Fly and Selectee Lists--which typically occur just after or at times just before the departure of international flights traveling to or from the United States, respectively.[Footnote 12] To address a concern that the federal government's identity matching may not be conducted in a timely manner, in 2004, Congress mandated that DHS issue a proposed rule requiring that the U.S. government's identity-matching process occur before the departure of international flights. CBP published this proposed rule in July 2006,[Footnote 13] and, if implemented, it will allow the U.S. government to conduct passenger prescreening in advance of flight departure, and will eliminate the need for air carriers to continue performing an identity-matching function for international flights. Airline Passenger and Checked Baggage Screening: One of the most significant changes mandated by ATSA was the shift from the use of private-sector screeners to perform airport screening operations to the use of federal screeners (now referred to as TSOs). Prior to ATSA, passenger and checked baggage screening had been performed by private screening companies under contract to airlines. ATSA required TSA to create a federal workforce to assume the job of conducting passenger and checked baggage screening at commercial airports. The federal screener workforce was put into place, as required, by November 2002.[Footnote 14] Passenger screening is a process by which personnel authorized by TSA inspect individuals and property to deter and prevent the carriage of any unauthorized explosive, incendiary, weapon, or other dangerous item onboard an aircraft or into a sterile area.[Footnote 15] Passenger screening personnel must inspect individuals for prohibited items at designated screening locations.[Footnote 16] As shown in figure 1, the four passenger screening functions are: * X-ray screening of property, * walk-through metal detector screening of individuals, * hand-wand or pat-down screening of individuals, and: * physical search of property and trace detection for explosives. Typically, passengers are only subjected to X-ray screening of their carry-on items and screening by the walk-through metal detector. Passengers whose carry-on baggage alarms the X-ray machine, who alarm the walk-through metal detector, or who are designated as selectees-- that is, passengers selected by the CAPPS or other TSA-approved processes to designate passengers for additional screening--are screened by hand-wand or pat-down and have their carry-on items screened for explosives traces or physically searched[Footnote 17]. Figure 1: Passenger Checkpoint Screening Operation: [See PDF for image] Source: GAO and Nova Development Corporation. Note: Explosive trace detection (ETD) works by detecting vapors and residues of explosives. Human operators collect samples by rubbing swabs along the interior and exterior of an object that TSOs determine to be suspicious, and place the swabs in the ETD machine, which then chemically analyzes the swabs to identify any traces of explosive materials. [A] BDOs are TSOs specially trained to detect suspicious behavior in individuals approaching the checkpoint. Should the BDO observe such behavior, he or she may refer the individual for additional screening or to a law enforcement officer. [B] The hand-wand or pat-down is conducted if a passenger is identified or randomly selected for additional screening because he or she met certain criteria or alarmed the walk-through metal detector. [C] Manual or ETD searches of accessible property occur if the passenger is identified or randomly selected for additional screening or if the TSO identified a potential prohibited item on X-ray. [End of figure] Checked baggage screening is a process by which authorized security screening personnel inspect checked baggage to deter, detect, and prevent the carriage of any unauthorized explosive, incendiary, or weapon onboard an aircraft. As shown in figure 2, checked baggage screening is accomplished through the use of explosive detection systems[Footnote 18] or explosive trace detection systems,[Footnote 19] and through the use of alternative means, such as manual searches, canine teams, and positive passenger bag match,[Footnote 20] when the explosive detection or explosive trace detection systems are unavailable. Figure 2: Checked Baggage Screening Operation: [See PDF for image] Source: GAO and Nova Development Corporation. [End of figure] The passenger and checked baggage screening systems are composed of three elements: the people (TSOs) responsible for conducting the screening of airline passengers and their carry-on items and checked baggage, the technology used during the screening process, and the procedures TSOs are to follow to conduct screening. Collectively, these elements help to determine the effectiveness and efficiency of passenger and checked baggage screening. Air Cargo Security: TSA's responsibilities for securing air cargo include, among other things, establishing security rules and regulations covering domestic and foreign passenger air carriers that transport cargo, domestic and foreign all-cargo carriers that transport cargo, and domestic indirect air carriers. TSA is also responsible for overseeing the implementation of air cargo security requirements by air carriers and indirect air carriers through compliance inspections, while air carriers are required to inspect air cargo for weapons, explosives, or stowaways. Air carriers (passenger and all-cargo) are responsible for implementing TSA security requirements, predominantly through a TSA-approved security program that describes the security policies, procedures, and systems air carriers are required to implement.[Footnote 21] These requirements include measures related to the acceptance, handling, and inspection of cargo; training of employees in security and cargo inspection procedures; testing employee proficiency in cargo inspection; and access to cargo areas and aircraft. If threat information or events indicate that additional security measures are needed to secure the aviation sector, TSA may issue revised or new security requirements in the form of security directives or emergency amendments applicable to domestic or foreign air carriers. The air carriers must implement the requirements set forth in the security directives or emergency amendments in addition to those requirements already imposed and enforced by TSA. Air cargo ranges in size from one pound to several tons, and in type from perishables to machinery, and can include items such as electronic equipment, automobile parts, clothing, medical supplies, other dry goods, fresh cut flowers, fresh seafood, fresh produce, tropical fish, and human remains. Cargo can be shipped in various forms, including large containers known as unit loading devices that allow many packages to be consolidated into one container that can be loaded on an aircraft, wooden crates, assembled pallets, or individually wrapped/ boxed pieces, known as break bulk cargo. Participants in the international air cargo shipping process include shippers, such as individuals and manufacturers; freight forwarders or regulated agents, who consolidate shipments and deliver them to air carriers; air cargo handling agents, who process and load cargo onto aircraft on behalf of air carriers; and passenger and all-cargo carriers that store, load, and transport air cargo.[Footnote 22] International air cargo may have been transported via ship, train, or truck prior to its loading onboard an aircraft. Figure 3 identifies cargo being loaded onto an aircraft for transport. Figure 3: Air Cargo Being Loaded Onto an Aircraft: [See PDF for image] Source: GAO and TSA. [End of figure] Fiscal Years 2004 Through 2007 Aviation Security Funding and Fiscal Year 2008 Budget Request for Aviation Security: According to DHS's budget execution reports,[Footnote 23] TSA's appropriations for aviation security have totaled about $20 billion since fiscal year 2004.[Footnote 24] In fiscal year 2004--the first year for which data was available--TSA received about $3.9 billion for aviation security programs. In fiscal year 2007, TSA received about $5.7 billion. The President's budget request for fiscal year 2008 includes about $5.7 billion to continue TSA's aviation security efforts. This total includes about $5.0 billion specifically designated for aviation security and about $0.79 billion for aviation-security related programs. Figure 4 identifies reported aviation security funding for fiscal years 2004 through 2007. Figure 4: DHS's Reported Aviation Security Funding For TSA For Fiscal Years 2004 through 2007: [See PDF for image] Source: GAO analysis of TSA budget execution reports for fiscal years 2004 to 2007. Note: Figures for fiscal years 2004 to 2007 are those reported by DHS in monthly budget execution reports for TSA. We used the September 30th budget execution reports for our analysis of TSA funding for fiscal years 2004 through 2006. For fiscal year 2007, we used the October 31 report. According to the reports, figures presented include all rescissions and supplemental funding for the fiscal years. [A] Fiscal years 2004 and 2005 include approximately $330 million in research and development funding for aviation security. For fiscal years 2006 and 2007, research and development funding was consolidated within the DHS S&T; therefore, this funding, as reflected in TSA's budget documentation, is not included as part of TSA's appropriations for these two fiscal years. [B] Fiscal years 2006 and 2007 include approximately $680 million and $710 million, respectively, in funding for Federal Air Marshals, which was transferred back to TSA from U.S. Immigration and Customs Enforcement in October 2005. Federal Air Marshals funding is included within totals for related aviation security PPAs for fiscal years 2006 and 2007. [C] Funding for aviation security-related programs, projects, and activities, as reported by TSA, which were not included in budget documentation subtotals for aviation security funding. [End of figure] Of the approximately $5.7 billion requested for aviation security in the President's fiscal year 2008 budget request, almost $4.4 billion, or about 77 percent, is for passenger and checked baggage screening. This includes approximately $4 billion to support passenger and checked baggage screening operations, such as TSO salaries and training, and $176 million for the procurement and $259 million for the installation of checked baggage explosive detection systems. Additional information on the President's budget request for fiscal year 2008 as it relates to airline passenger prescreening, airline passenger and checked baggage screening, and air cargo security is provided later in this statement. TSA and CBP Are Working to Strengthen Domestic and International Passenger Prescreening, but Management and Technical Challenges Remain: TSA and CBP have separate efforts under way to strengthen domestic and international passenger prescreening, respectively. However, these programs are in development and face management and technical challenges. Further, while TSA and CBP have been developing their respective identity-matching programs separately, the two agencies are now taking steps to align their prescreening programs to minimize duplication and provide a single set of requirements for air carrier participation. However, key policy and technical decisions have not yet been made to clarify how these two programs will be aligned. TSA Has Reported Addressing Challenges That Have Hindered Secure Flight's Implementation, but It Is Not Yet Known Whether These Efforts Will Address Past Problems: For over 4 years, TSA has faced significant challenges in developing and implementing its advanced passenger prescreening program, now known as Secure Flight, and has not yet taken the identity-matching function over from air carriers as mandated by Congress. According to TSA, the Secure Flight program--which is to perform the functions associated with determining whether passengers on domestic flights are on the No Fly and Selectee Lists--is intended to (1) decrease the chance of compromising watch list data by centralizing its use within the federal government; (2) provide earlier identification of potential threats, allowing for the expedited notification of law enforcement and other organizations responsible for threat management; (3) provide a fair, equitable, and consistent matching process across all air carriers; and (4) offer consistent application of an expedited and integrated redress process for passengers misidentified as a threat. However, during the past 3 years, we reported on multiple occasions that the Secure Flight program (and its predecessor, CAPPS II) had not met key milestones or finalized its goals, objectives, and requirements. Further, in February 2006, we reported that, taken as a whole, the development of Secure Flight had not been effectively managed and the program was at risk of failure. We found that TSA had not conducted critical activities in accordance with best practices for large-scale information technology programs, and had not followed its own systems development life cycle guidance in managing the program's development. Former program officials stated that TSA had instead used a rapid development method that was intended to enable it to develop the program more quickly. However, as a result of this approach, the development process had been ad hoc, with project activities conducted out of sequence. For example, program officials declared the design phase complete before requirements needed to guide the design of Secure Flight had been detailed. In addition, TSA had not maintained up-to-date program schedules or developed cost estimates for the program. In March 2005, we recommended that TSA take numerous steps to strengthen the program's development, such as finalizing system requirements and developing detailed test plans to help ensure that all Secure Flight system functionality is properly tested and evaluated. We also recommended that TSA develop a plan for establishing connectivity among the air carriers and other stakeholders to help ensure the secure, effective, and timely transmission of data for use in Secure Flight operations.[Footnote 25] In early 2006, acknowledging the challenges it faced with the program, TSA suspended the development of Secure Flight and initiated a reassessment, or rebaselining, of the program, to be completed before moving forward. In January 2007, TSA announced that it had completed its rebaselining efforts, which included reassessing program goals and capabilities, and developing a new schedule and cost estimates--actions that we recommended in March 2005.[Footnote 26] The Assistant Secretary of Homeland Security for TSA stated that TSA had made significant progress in upgrading the design and development of the Secure Flight program, and that program documentation had been revised to reflect TSA's plans for reliably delivering Secure Flight capabilities. In December 2006, the DHS Investment Review Board--a group of DHS senior executives charged with reviewing certain programs at key phases of development to help ensure they meet mission needs at expected levels of costs and risks--completed its review of Secure Flight and approved the program to proceed into capability development and demonstration phases. According to the Investment Review Board, this approval was based on rescoping Secure Flight using a new business model better focused on mission; putting a new team in place with appropriate technical and management skills; and improving its management approach to privacy, security, and quality assurance. However, the board also noted that this important screening capability was needed sooner than its planned mid-2009 implementation time frame, and requested that TSA determine the feasibility of accelerating the program schedule to deliver initial capability by mid-2008. As we have reported, earlier attempts to accelerate the Secure Flight program have led to developmental problems and program delays. Accordingly, as TSA moves forward, it will need to employ a range of program management disciplines, which we previously found missing, to control program cost, schedule, performance, and privacy risks. As part of our ongoing work assessing the Secure Flight program, we will be reviewing DHS's and TSA's efforts to develop and implement the program, including progress made during its rebaselining efforts.[Footnote 27] Regarding TSA's communications with air carriers about Secure Flight system requirements, we reported in March 2005 that air carriers had expressed concerns regarding the uncertainty of Secure Flight system and data requirements, and the impact that these requirements may have on the airline industry and traveling public. Further, based on preliminary results for our ongoing work, officials from 9 of the 15 air carriers we interviewed from February 2006 to January 2007,[Footnote 28] reported that they were enhancing their respective identity-matching systems or planned to do so. While these efforts may improve the accuracy of each air carrier's individual identity-matching system, the improvements will only apply to their respective systems and could further exacerbate differences that currently exist among the air carriers' various identity-matching systems. These differences may result in varying levels of effectiveness in the matching of passenger information against the No Fly and Selectee Lists, which was a key factor that led to the government's effort to take over the identity- matching function through Secure Flight. Also, officials from 7 of 15 air carriers stated that TSA had not communicated with them about Secure Flight requirements within the past 6 months while the program was being rebaselined. TSA officials stated that in October 2006 they had resumed discussions with air carriers regarding Secure Flight requirements, and as of January 2007, had discussed plans for Secure Flight with officials from 8 air carriers and the Air Transport Association. TSA officials stated that they also plan to take into account current air carrier capabilities and programs as they proceed with Secure Flight development, and to update guidance previously provided to air carriers to reflect the current concept of operations for the rebaselined Secure Flight program. In February 2006, we also reported that TSA was in the early stages of coordinating with TSC and CBP on broader issues of integration and interoperability related to other people-screening programs used by the government to combat terrorism. However, TSA needed to provide these stakeholders with detailed information about its concept of operations for Secure Flight to enable them to plan for and provide the support necessary for the program. For example, a TSC official stated that without specific information on Secure Flight requirements, TSC could not make decisions about needed resources, such as personnel needed to operate its call center that would be used to help resolve potential matches against the No Fly and Selectee Lists. In January 2007, TSC officials stated that while they had been participating in meetings with Secure Flight officials, they had not yet received the specific operational and technical information needed to plan for supporting Secure Flight operations. During Secure Flight rebaselining efforts, TSA officials also stated that they were coordinating with CBP to more closely align their respective identity-matching programs. However, this collaboration is ongoing and key policy and technical decisions regarding how the programs will be coordinated have not been announced. We discuss TSA and CBP's coordination of their domestic and international prescreening programs later in this statement. We have also previously reported that TSA, as part of its requirements development process, had not clearly identified the privacy impacts of the envisioned system or the full actions it planned to take to mitigate them. Specifically, because TSA had not made final determinations about its requirements for passenger data, and Secure Flight's system development documentation did not fully address how passenger privacy protections were to be met, it was not possible to assess potential system impacts on individual privacy protections at that time. We have also previously reported that TSA violated provisions of the Privacy Act[Footnote 29] by not fully disclosing its use of personal information during systems testing.[Footnote 30] In March 2005, we recommended that TSA specify how Secure Flight will protect personal privacy.[Footnote 31] TSA officials stated that they are aware of, and plan to address, the potential for Secure Flight to adversely affect passenger privacy protections, and the need to provide a redress process whereby aviation passengers adversely affected by the identity matching process may express their concerns, seek correction of any inaccurate data, and request other actions to reduce or eliminate future inconveniences. Concurrent with its rebaselining efforts, TSA reported that it has developed a Secure Flight privacy program that is rooted in the Fair Information Practices--a set of internationally recognized privacy principles that underlie the Privacy Act. TSA officials further stated that the rebaselined Secure Flight program will result in a more transparent and privacy-enhanced program by addressing concerns identified by us and others in the following areas: program oversight, program scope, data collection activities, redress requirements, relationships with other TSA credentialing programs, and technical requirements. TSA officials also stated that they have embedded privacy contractor experts in the program teams to address privacy issues as they arise. In addition, in January 2007, officials from Secure Flight and TSA's Office of Transportation Security Redress stated that Secure Flight will use the TSA redress process that is currently available for individuals affected by the air carrier identity-matching processes, but the details of how this process will be integrated with other Secure Flight requirements have not yet been completed. We will continue to assess TSA's efforts to manage system privacy protections and establish a redress process for resolving misidentified passengers as part of our ongoing review of the program. We believe that TSA's efforts to reassess Secure Flight's development and progress was an appropriate step given the problems that faced the program in early 2006. However, since TSA only recently announced that it has completed its rebaselining efforts, and just recently provided more details of its rebaselined program, it is too early to determine the extent to which TSA has addressed the long-standing issues that have affected the program. According to DHS's budget execution reports, TSA received about $126 million for fiscal years 2004 through 2006-- including funds spent on the CAPPS II predecessor program--and $15 million for fiscal year 2007 for Secure Flight. For fiscal year 2008, the President's budget request includes $53 million for TSA to continue this program. According to the TSA's budget justification, the increase of $38 million is requested to provide for the development and the authority to operate the Secure Flight system. Additionally, the funding request would provide for procuring hardware, starting operations and training, and developing a network interface between Secure Flight and CBP. We will continue to monitor Secure Flight's development as part of our ongoing review of the program. DHS Intends to Align Domestic and International Prescreening Programs, but Key Policy and Technical Decisions Have Not Yet Been Made: As originally envisioned, once Secure Flight became operational, TSA would be operating a domestic passenger prescreening system, while CBP would be operating an international passenger prescreening system. However, air carriers raised concerns regarding having to support different data requirements for two separate government prescreening programs. Further, we reported that both programs could result in potentially different results for passengers flying on domestic and international flights, results that could cause additional costs to air carriers, and confusion and inconvenience to passengers. For example, if the programs are not aligned, air carriers might have to implement different information connections, communications, and programming for each prescreening program, resulting in added costs and inefficiencies. Also, if the two separate programs use different passenger data elements or identity-matching technologies, air carriers may receive conflicting notifications to handle a passenger differently for an international than for a domestic flight. Passengers may also be inconvenienced since a passenger may be delayed on one leg of a multileg trip, which includes both a domestic and an international flight segment, and possibly miss a flight. The air carrier community has asked CBP and TSA to coordinate their efforts to ensure that the programs are compatible and are developed as a single approach to avoid the need for air carriers to implement two separate screening systems to meet CBP and TSA requirements. In a joint letter to the Secretary of DHS dated October 27, 2005, the Air Transport Association of America and the Association of European Airlines urged DHS to coordinate international and domestic airline passenger prescreening programs so that air carriers are not unduly burdened by the costs and inefficiencies posed by working with two different prescreening programs. The letter also stated that the Air Transport Association of America and the Association of European Airlines believed that there had been a lack of coordination between CBP and TSA in aligning their respective passenger prescreening programs. Air carrier industry groups reiterated this concern in comments they provided in response to CBP's proposed rule for conducting passenger prescreening on international flights. We have also previously reported that since both agencies are developing and implementing passenger prescreening programs, CBP and TSA could mutually benefit from the sharing of technical testing results and the coordination of other developmental efforts.[Footnote 32] Coordination and planning in the development of these two programs would also enhance program integration and interoperability, potentially limit redundancies, and increase program effectiveness. We have recently recommended that DHS take additional steps and make key policy and technical decisions that are necessary to more fully coordinate these programs.[Footnote 33] Recognizing these concerns, DHS has directed TSA and CBP to coordinate their prescreening activities so that they provide "One DHS Solution" to the commercial aviation industry consistent with applicable authorities and statutes. CBP and TSA officials stated that they are taking steps to coordinate their prescreening efforts, including meeting routinely with DHS's Office of Screening Coordination and with aviation and travel industry stakeholders to develop joint data requirements, processes, and methods for disseminating information to other government and law enforcement organizations in the event of a positive identity match against the No Fly and Selectee Lists. DHS officials told us that they envision a joint approach that will allow for standardization between the two programs to the extent possible, reduce unnecessary programming by aircraft operators, and provide consistent treatment for passengers across all aircraft operators. However, despite this coordination, key policy and technical decisions have not yet been made regarding how these programs will be aligned, including determining how differences in the data used to conduct identity matching and the identity matching techniques used will be resolved. Further, it is unclear how the different implementation schedules for the two programs--CBP has already issued a proposed rule to implement a new passenger prescreening program for passengers on international flights, while TSA's schedule shows that Secure Flight will not begin operations until 2009--will affect coordination efforts. Given DHS's commitment to align the two prescreening programs, and the security and efficiency benefits of doing so, it will be important for CBP and TSA to take the steps necessary to successfully coordinate these programs. Until international and domestic prescreening efforts are more fully aligned, the extent to which potential problems of duplication and conflicting results in international and domestic passenger prescreening will be addressed remains unclear. TSA Has Taken Steps to Enhance Security at Passenger Screening Checkpoints and Checked Baggage Screening Stations, but Continues to Face Challenges: TSA has taken steps to strengthen the three key elements of the passenger and checked baggage screening systems--people (TSOs), screening procedures, and technology--but continues to face management, planning, and funding challenges. For example, TSA developed a Staffing Allocation Model to determine TSO staffing levels at airports that reflect current operating conditions, and provided TSOs with additional training intended to enhance the detection of threat objects, particularly improvised explosives. TSA also proposed modifications to passenger checkpoint screening procedures based on risk (threat and vulnerability information), among other factors, but could do more evaluation of proposed procedures before they are implemented to ensure they achieve their intended results. Additionally, TSA is exploring new technologies to enhance the detection of explosives and other threats, but continues to face management and funding challenges. For example, in May 2006, TSA reported that under current investment levels, the installation of optimal checked baggage screening systems would not be completed until approximately 2024. TSA, in collaboration with key stakeholders, has identified several funding and financing strategies for installing optimal checked baggage screening systems, such as continued appropriations for the procurement and installation of EDS machines. TSA Has Efforts Under Way to Strengthen the Management and Performance of Its TSO Workforce: TSA has implemented several efforts intended to strengthen the management and performance of its TSO workforce, which TSA has identified as its most important asset in accomplishing its mission. We reported in February 2004 that staffing shortages and TSA's hiring process had hindered the ability of some Federal Security Directors (FSD)--the ranking authority responsible for leading and coordinating security activities at airports--to provide sufficient resources to staff screening checkpoints and oversee screening operations at their checkpoints without using additional measures such as overtime.[Footnote 34] Since that time, TSA has developed a Staffing Allocation Model to determine TSO staffing levels at airports. In determining staffing allocations, the model takes into account the workload demands unique to each airport based on an estimate of each airport's peak passenger volume. This input is then processed against certain TSA assumptions about screening passengers and checked baggage- -including expected processing rates, required staffing for passenger lanes and baggage equipment based on standard operating procedures, and historical equipment alarm rates. In August 2005, TSA determined that the staffing model contained complete and accurate information on each airport from which to estimate staffing needs, and the agency used the model to identify TSO allocations for each airport. At that time, the staffing model identified a total TSO full-time equivalent allocation need of 42,303--a level within the congressionally mandated limit of 45,000 full-time equivalent TSOs. According to TSA, when TSA runs the model, it does so without imposing a limitation on the maximum number of full-time equivalent TSOs, either the 45,000 congressional limit or any budgetary limits that affect the number of TSOs that can be hired. In addition to the levels identified by the staffing model, TSA sets aside TSO full-time equivalents for needs outside of those considered by the staffing model in the annual allocation run for airports. For example, in order to handle short-term extraordinary needs at airports, TSA established a National Screening Force of 615 TSOs who can be sent to airports to augment local TSO staff during periods of unusually high passenger volume, such as the Super Bowl. Additionally, certain airports may, during the course of the year, experience significant changes to their screening operations, such as the arrival of a new airline or opening of a new terminal. TSA established a reserve of 329 TSO full-time equivalents during fiscal year 2006 that can be used to augment the existing force. The President's fiscal year 2008 budget request includes $35 million for operational expenses for a National Deployment Office--an office that would be responsible for deploying the National Screening Force and other TSOs to those airports experiencing significant staffing shortfalls. According to TSA, TSA's approach to allocating TSOs has allowed the agency to stay within the 43,000 full-time equivalent TSO budgetary limit for fiscal year 2006--a staffing level that TSA's Assistant Secretary stated is sufficient to provide passenger and checked baggage screening services.[Footnote 35] According to the President's fiscal year 2008 budget request, the $2.6 billion requested for the federal TSO workforce represents an increase of about $131 million over fiscal year 2007 for cost of living adjustments and a travel document checker initiative. Under this initiative, about 1,330 full-time equivalent TSOs would be placed at the 40 highest risk category X and I airports to conduct document checking for passengers approaching the passenger screening checkpoint.[Footnote 36] According to the budget request, the $2.6 billion is to fund the personnel, compensation, and benefits of approximately 43,688 full-time equivalent TSOs and about 1,045 full- time equivalent Screening Managers. Table 1 shows the total TSO and Screening Manager full-time equivalents and the funding levels for fiscal years 2004 through 2007, as reported by TSA. Table 1: Passenger and Checked Baggage TSO and Screening Manager Full- time Equivalents and Actual Spending for TSO Personnel, Compensation, & Benefits, by Fiscal Year: Total TSOs and Screening Managers at airports nationwide; FY 2004: 45,252; FY 2005: 45,690; FY 2006: 42,187; FY 2007[A]: 43,779. Actual spending (dollars in thousands); FY 2004: $2,191,551; FY 2005: 2,291,572; FY 2006: 2,251,503; FY 2007[A]: 2,418,329. Source: TSA: [A] Fiscal year 2007 figures are projected. [End of table] FSDs we interviewed in 2006[Footnote 37] as part of our ongoing review of TSA's staffing model generally reported that the model is a more accurate predictor of staffing needs than TSA's prior staffing model, which took into account fewer factors that affect screening operations.[Footnote 38] However, FSDs identified that some assumptions used in the fiscal year 2006 staffing model did not reflect actual operating conditions. For example, FSDs noted that the staffing model's assumption of a 20 percent part-time workforce--measured in terms of full-time equivalents--had been difficult to achieve, particularly at larger (category X and I) airports, because of, among other things, economic conditions leading to competition for part-time workers, remote airport locations coupled with a lack of mass transit, TSO base pay that has not changed since fiscal year 2002, and part-time workers' desire to convert to full-time status. TSA data show that for fiscal years 2005 and 2006, the nation's category X airports had a TSO workforce composed of about 8 percent part-time equivalents, and the part-time TSO attrition rate nationwide remains considerably higher than the rate for full-time personnel (approximately 46 percent versus 16 percent for full-time TSOs for fiscal year 2006). FSDs also expressed concern that the model did not specifically account for the recurrent training requirement for TSOs of 3 hours per week averaged over a fiscal year quarter. Further, FSDs identified that the model for fiscal year 2006 did not account for time away from screening to perform operational support duties. FSDs we interviewed stated that because they are not authorized to hire a sufficient number of mission support staff, TSOs are being routinely used to perform certain operational support functions, such as payroll processing, scheduling, distribution and maintenance of uniforms, data entry, and workman's compensation processing. Similarly, in September 2006, the Department of Homeland Security's Office of Inspector General reported that TSA had not determined the precise number of FSD administrative positions it needed and was using TSOs to perform administrative work. In response to FSDs' input and the various mechanisms TSA has implemented to monitor the sufficiency of the model's allocation outputs, TSA made changes to some assumptions in the model for fiscal year 2007. Our preliminary observations indicate that these revisions should help address the concerns identified by FSDs. For example, TSA recognized that some airports cannot likely achieve a 20 percent part- time full-time equivalent level and others (most likely smaller airports) may operate more effectively with other levels of part-time TSO staff. As a result, for fiscal year 2007, TSA modified this assumption to include a variable part-time goal based on each airport's historic part-time to full-time TSO ratio. TSA also included an allowance in the fiscal 2007 Staffing Allocation Model for training to provide additional assurance that TSOs complete the required training on detecting improvised explosive devices--which TSA has identified as the most significant threat to commercial aviation. Additionally, TSA included an allowance for operational support duties in the 2007 Staffing Allocation Model to account for the current need for TSOs to perform these duties. Factors outside of the staffing model's determination of overall TSO staffing levels also affect FSDs' ability to effectively deploy their TSO workforce. Specifically, FSDs we interviewed as part of our ongoing review of TSA's staffing model cited difficulties in recruiting and retaining sufficient TSOs (both full-time and part-time) to reach their full allocations as determined by the model; staffing checkpoints appropriately given that some TSOs are unavailable due to absenteeism and injuries; and managing around physical infrastructure limitations at some airports, such as lack of room for additional lanes or baggage check areas despite demand levels that would justify such added capacity. TSA has made progress in addressing these challenges through a variety of human capital initiatives. For example, to allow FSDs to more efficiently address staffing needs, TSA has shifted responsibility for hiring TSOs from TSA headquarters to FSDs at individual airports and, according to TSA officials, provided contractor support to assist in this effort. TSA data show that since local hiring began in March 2006, TSA has increased the number of new hire TSOs from approximately 180 per pay period in February 2006 to nearly 450 each pay period under the local hiring initiative. In addition to having an adequate number of TSOs, effective screening involves TSOs being properly trained to do their job. Since we first reported on TSO training in September 2003,[Footnote 39] TSA has taken a number of actions designed to strengthen training available to the TSO workforce beyond the basic training requirement. For example, TSA has expanded training available to the TSO workforce, such as introducing an Online Learning Center that makes self-guided courses available over TSA's intranet and the Internet, and enhanced training on explosives detection. This training included both classroom and hands-on experience, and focused particularly on identifying X-ray images of improvised explosives device component parts, not just a completely assembled bomb. According to TSA, as of February 6, 2007, about 98 percent of the 48,236 TSOs on board had received classroom, checkpoint, or computer-based improvised explosive device recognition training. TSA has also developed new training curriculums to support new screening approaches. For example, TSA recently developed a training curriculum for TSOs in behavior observation and analysis at the checkpoint to identify passengers exhibiting behaviors indicative of stress, fear, or deception. The President's fiscal year 2008 budget request includes $89.7 million to fully implement TSO training programs and related TSO workforce development programs. TSA has also made progress in addressing challenges that made it difficult for TSOs to access training. We reported in May 2005 that insufficient TSO staffing and a lack of high-speed Internet/intranet connectivity to access the Online Learning Center made it difficult for all TSOs at many airports to receive required training, and had limited TSO access to TSA training tools.[Footnote 40] We stated that without addressing the challenges to delivering ongoing training, including installing high-speed connectivity at airport training facilities, TSA may have difficulty maintaining a screening workforce that possesses the critical skills needed to perform at a desired level. As previously discussed, our preliminary observations from our ongoing review of TSA's staffing model indicate that TSA has taken steps to address the TSO staffing challenges, including providing an allowance for TSO training in the Staffing Allocation Model for fiscal year 2007. However, it is too soon to determine whether TSA's efforts will address TSA's ability to provide required training while maintaining adequate coverage for screening operations. TSA established its Online Learning Center to provide passenger and baggage TSOs with online, high-speed access to training courses. However, effective use of the Online Learning Center requires high-speed Internet/intranet access, which TSA has not been able to provide to all airports. We reported that as of October 2004, about 45 percent of the TSO workforce did not have high- speed Internet/intranet access to the Online Learning Center. Given the importance of the Online Learning Center in both delivering training and serving as the means by which the completion of TSO training is documented, we recommended that TSA develop a plan that prioritizes and schedules the deployment of high-speed Internet/intranet connectivity to all TSA's airport training facilities to help facilitate the delivery of TSO training and the documentation of training completion. Since that time, TSA has made progress in deploying high-speed connectivity to airports. According to the President's fiscal year 2008 budget request, 95 percent of the nation's airports now have high-speed connectivity. According to the budget request, TSA expects to meet the goal of all airports having high-speed connectivity during fiscal year 2007. TSA Has Taken Steps to Strengthen Passenger and Checked Baggage Screening Procedures, but Could Improve Its Evaluation and Monitoring of the Procedures: In addition to TSA's efforts to train and deploy a federal TSO workforce, steps have also been taken to strengthen passenger and checked baggage screening procedures to enhance detection capabilities. However, TSA could improve its evaluation and oversight of these procedures. With regard to passenger checkpoint screening procedures, between April and December 2005, proposed modifications were made in various ways and for a variety of reasons, and a majority of the proposed modifications--48 of 92--were ultimately implemented at airports. As part of our ongoing review of TSA's process for determining whether and how screening procedures should be modified, we found that TSA officials proposed standard operating procedure (SOP) modifications based on risk information (threat and vulnerability information), daily experiences of staff working at airports, and complaints and concerns raised by the traveling public.[Footnote 41] In addition to these factors, our preliminary observations indicate that consistent with its mission, TSA senior leadership made efforts to balance the impact that proposed SOP modifications would have on security, efficiency, and customer service when deciding whether proposed SOP modifications should be implemented. For example, in August 2006, TSA sought to increase security by banning liquids and gels from being carried onboard aircraft in response to the alleged terrorist plot to detonate liquid explosives onboard multiple aircraft en route from the United Kingdom to the United States. In September 2006, after obtaining more information about the alleged terrorist plot--to include information from the United Kingdom and U.S. intelligence communities, discussions with explosives experts, and testing of explosives--TSA officials decided to lift the total ban on liquids and gels to allow passengers to carry small amounts of liquids and gels onboard aircraft. TSA officials also lifted the total ban because banning liquids and gels as carry-on items was shown to affect both efficiency and customer service. Specifically, following the implementation of the total ban in August 2006, the number of bags checked per passenger increased by approximately 27 percent--thus placing a strain on the efficiency of the checked-baggage screening system. In addition, TSA recognized that passengers have legitimate needs that may require them to carry some liquids and gels onboard aircraft. Moreover, in an effort to harmonize its liquid screening procedures with other countries, in November 2006, TSA revised its procedures to allow 3.4 fluid ounces of liquids, gels, and aerosols onboard aircraft, which is equivalent to 100 milliliters--the amount permitted by the 27 countries in the European Union, as well as Australia, Norway, Switzerland, and Iceland. According to TSA, this means that approximately half of the world's travelers will be governed by similar measures with regard to this area of security. In some cases, TSA first tested proposed modifications to screening procedures at selected airports to help determine whether the changes would achieve their intended purpose, such as to enhance detection of prohibited items or free up TSO resources to perform screening activities focused on threats considered to pose a high risk, such as explosives. TSA's efforts to collect quantitative data through testing proposed procedures prior to deciding whether to implement or reject them is consistent with our past work that has shown the importance of data collection and analyses to support agency decision making. However, as part of our ongoing work, we identified that TSA's data collection and analyses could be improved to help TSA determine whether proposed procedures that are operationally tested would achieve their intended purpose. Specifically, we found that for the tests of proposed screening procedures TSA conducted during the period April 2005 through December 2005, including the removal of small scissors and small tools from the prohibited items list,[Footnote 42] although TSA collected some data on the efficiency of and customer response to the procedures at selected airports, the agency generally did not collect the type of data or conduct the necessary analysis that would yield information on whether proposed procedures would achieve their intended purpose.[Footnote 43] We will report on the results of our analysis of TSA's efforts to test proposed modifications to screening procedures later this year. Once proposed SOP changes have been implemented, it is important that TSA have a mechanism in place to ensure that TSOs are complying with established procedures. As part of our ongoing review of TSA's process for revising passenger screening procedures, we identified that TSA monitors TSO compliance with passenger checkpoint screening SOPs through its performance accountability and standards system and through local and national covert testing.[Footnote 44] According to TSA officials, the performance accountability and standards system was developed in response to a 2003 report by us that recommended that TSA establish a performance management system that makes meaningful distinctions in employee performance,[Footnote 45] and in response to input from TSA airport staff on how to improve passenger and checked baggage screening measures. This system will be used by TSA to assess agency personnel at all levels on various competencies, including, among other things, technical proficiency. The technical proficiency component of the performance accountability and standards system will be used to measure TSO compliance with passenger checkpoint screening procedures. In addition to implementing the performance accountability and standards system, TSA conducts local and national covert tests to evaluate, in part, the extent to which TSOs' noncompliance with the SOPs affects their ability to detect simulated threat items hidden in accessible property or concealed on a person. Our preliminary observations indicate that TSA airport officials have experienced resource challenges in implementing these compliance monitoring methods. TSA headquarters officials stated that they are taking steps to address these challenges. For example, officials said that they have automated many of the data entry functions of the performance accountability and standards system to relieve the field of the burden of manually entering this information into the online system. TSA has also taken steps to strengthen checked baggage screening through reducing the need to use alternative screening procedures. In addition to screening with standard procedures using EDS and ETD, which TSA had determined to provide the most effective detection of explosives, TSA also allows alternative screening procedures to be used when volumes of baggage awaiting screening pose security vulnerabilities or when TSA officials determine that there is a security risk associated with large concentrations of passengers in an area. These alternative screening procedures include the use of EDS and ETD machines in nonstandard ways,[Footnote 46] and also include three procedures that do not use EDS or ETD--screening with explosives detection canines, physical bag searches, and matching baggage to passenger manifests to confirm that the passenger and his or her baggage are on the same plane. TSA's use of alternative screening procedures has involved trade-offs in security effectiveness.[Footnote 47] However, the extent of the security trade-offs is not fully known because TSA has not tested the effectiveness of alternative screening procedures in an operational environment. In our July 2006 report on TSA's use of alternative screening procedures, we recommended that TSA conduct local testing of alternative screening procedures to determine whether checked baggage TSOs can detect simulated improvised explosives when using these procedures.[Footnote 48] Since then, TSA has conducted covert testing of alternative screening procedures at some airports. TSA is pursuing several mitigating actions to reduce the need to use alternative screening procedures. These actions include deploying more efficient checked baggage screening systems, strengthening its coordination with groups such as tour operators to better plan for increases in baggage screening needs, deploying "optimization teams" to airports that were frequently using alternative screening procedures to determine why the procedures were being used so often and to suggest remedies, and deploying additional EDS machines. However, although TSA has taken steps to reduce the need to use alternative screening procedures at airports, TSA's oversight of FSDs' use of alternative screening procedures could be strengthened. For example, in July 2006, we reported that FSDs and their staff did not always accurately report the occurrences when a particular alternative baggage screening procedure was used, impeding TSA's ability to reliably determine how often and for how long the alternative screening procedures were used. In addition, FSDs and their staff did not always report the use of alternative screening procedures as required. TSA officials stated that they were working with FSDs to correct these reporting problems and had issued guidance clarifying requirements for reporting alternative screening procedures. Additionally, while TSA is working to minimize the need to use alternative screening procedures at airports, TSA has not created performance measures or targets related to the use of these procedures. By creating a performance measure for the use of alternative screening procedures as part of the checked baggage screening index or as a stand- alone measure, TSA could gauge whether it is making progress towards minimizing the need to use these procedures at airports and have more complete information on how well the overall checked baggage screening system is performing. Furthermore, performance targets for the use of alternative screening procedures would provide an indicator of how much risk TSA is willing to accept in using these procedures, and TSA's monitoring of this indicator would identify when it has exceeded the level of risk that it has determined acceptable. We recommended that TSA develop performance measures and performance targets for the use of alternative screening procedures. Additionally, in September 2006, Congress directed TSA to take a variety of actions- -most of which we recommended in our July 2006 report--to monitor and assess the use of alternative screening procedures, including (1) develop performance measures and performance targets for the use of alternative screening procedures; (2) track the use of alternative screening procedures at airports; (3) assess the effectiveness of these measures; (4) conduct covert testing at airports that use alternative screening procedures; (5) develop a plan to stop alternative screening procedures at airports as soon as practicable; and (6) report to the Senate and House Committees on Appropriations, the Senate Committee on Commerce, Science, and Transportation, and the House Committee on Homeland Security by January 23, 2007, on implementation of these requirements.[Footnote 49] According to TSA officials, the agency is continuing to monitor and track the use of alternative screening procedures, which has allowed it to identify areas for improvement nationwide and address local issues to minimize the need for alternative screening procedures. TSA is Exploring New Technologies to Enhance Detection of Explosives and Other Threats, but Faces Management and Funding Challenges in Fielding Technologies to Airports: TSA is supporting the development and deployment of technologies to strengthen commercial aviation security but faces management and funding challenges. For example, TSA and DHS's S&T are exploring new passenger checkpoint screening technologies to enhance the detection of explosives and other threats. However, limited progress has been made in fielding explosives detection technology at passenger screening checkpoints, in part due to challenges DHS S&T and TSA face in coordinating research and development efforts. In addition, TSA has begun to systematically plan for the optimal deployment of checked baggage screening systems, but resources have not been made available to fund the installation of in-line EDS machines on a large-scale basis. Passenger Checkpoint Screening Technologies: To enhance passenger checkpoint screening, TSA is currently working with DHS S&T's Transportation Security Laboratory to develop new passenger checkpoint screening technologies.[Footnote 50] TSA designated about $80.5 million in fiscal year 2007 to acquire and deploy emerging screening technologies, and has requested $81.6 million for similar purposes in fiscal year 2008. Our preliminary work has found that of the various research and development projects funded by TSA and DHS S&T, six checkpoint screening projects are currently in the applied research or advanced development phases.[Footnote 51] Projects in the applied research phase include liquid bottle screening devices, explosives trace portals that will reduce the size of the current explosives trace portals at checkpoints, and shoe scanners. Three other projects in the advanced development phase include whole body imagers, cast and prosthesis scanners, and checkpoint explosives detection systems. TSA plans to place whole body imagers and checkpoint explosives detection systems at certain airport locations to collect initial operational data, and plans to continue to conduct similar tests of the cast and prosthesis scanners during fiscal year 2007. Table 2 provides a description and status of the passenger checkpoint screening technologies TSA and DHS S&T are currently researching and developing. Table 2: Description of Passenger Checkpoint Screening Technologies in the Research and Development Phase, as of January 2007: Technology: Liquid bottle screening devices; Description: Screens for liquid explosives; Status: In the applied research phase. DHS S&T is currently testing various devices. Technology: Explosives trace portals II; Description: Detects trace amounts of explosives on persons (will reduce the size of the current explosives trace portals at checkpoints); Status: In the applied research phase. Technology: Shoe scanners; Description: Scans passengers shoes with explosives detection capability; Status: In the applied research phase. Private industry developed this device to be used in combination with other technologies to screen registered travelers. Vendors requested that TSA assess this technology for effectiveness. Technology: Whole body imagers; Description: Provides two-dimensional, full-body images of all items on a passenger's body, including plastic explosives and concealed metallic, non-metallic, and ceramic or plastic objects; Status: In the advanced development phase. TSA plans to place some units at collect initial operational data during operational tests using the whole body imager at one U.S. airport in early 2007. Technology: Cast and prosthesis scanners; Description: Provides a 2- dimensional image of the area beneath a cast or inside a prosthetic device; Status: In the advanced development phase. TSA placed this equipment at an airport in September 2006 and collected operational data. TSA is considering deploying this technology in 2007. Technology: Checkpoint explosives detection systems; Description: Creates a three dimensional image of bags to detect explosives and other nonmetallic items; Status: In the advanced development phase. TSA plans to place this equipment at airports and collect operational data in fiscal year 2007. Source: TSA. [End of table] Despite TSA's efforts to develop passenger checkpoint screening technologies, preliminary results from our ongoing work suggests that limited progress has been made in fielding explosives detection technology at checkpoints. For example, TSA's fiscal year 2007 budget justification requested $80.5 million in budget authority to acquire and deploy screening technologies emerging from research and development programs, including the acquisition of 92 additional explosives trace portal machines and funds to operate and service approximately 434 portals. TSA had anticipated that the portals would be in operation throughout the country during fiscal year 2007. However, due to performance and maintenance issues, TSA halted the acquisition and deployment of the portals in June 2006, and the acquisition of additional portals is contingent on resolution of these issues. As a result, TSA has fielded less than 25 percent of the 434 portals it projected it would deploy by fiscal year 2007. In addition to the portals, TSA has fallen behind in its projected acquisition of other emerging screening technologies. For example, the acquisition of 91 Whole Body Imagers has been delayed in part because TSA needed to develop a means to protect the privacy of passengers screened by this technology. For fiscal year 2008, TSA has requested an additional $81.6 million to evaluate, acquire, and install emerging technologies. We will continue to assess DHS S&T and TSA's deployment of checkpoint screening technologies during our on-going review. While TSA and DHS have taken steps to coordinate the research, development, and deployment of checkpoint technologies, our ongoing work has identified that challenges remain. For example, TSA and DHS S&T officials stated that they encountered difficulties in coordinating research and development efforts due to reorganizations of TSA and S&T. A senior TSA official also stated that while TSA and the DHS S&T have executed a memorandum of understanding to establish the services that the Transportation Security Laboratory is to provide to TSA, coordination with S&T remains a challenge because the organizations have not fully implemented the terms of the memorandum of understanding. In addition to challenges in coordinating with each other, our preliminary observations suggest that TSA and DHS S&T also face challenges in coordinating with external stakeholders. Specifically, while TSA and DHS S&T have taken steps to coordinate efforts with external stakeholders, some airport managers we interviewed in October 2006 stated that TSA did not adequately communicate with them about when new technologies were to be deployed in their airports. TSA officials stated that they do not have a master schedule that establishes milestones for conducting operational tests and evaluations of emerging technologies or for deploying these technologies. Lack of such a schedule could limit TSA's ability to coordinate operational tests and deployments with stakeholders. Additionally, TSA does not yet have a strategic plan to guide its efforts to acquire and deploy screening technologies. As part of our ongoing work, we will assess further TSA's efforts to develop an overall strategic approach to guide the deployment of checkpoint technologies. A lack of a strategic plan or approach could limit TSA's ability to deploy emerging technologies at those airport locations deemed at highest risk. TSA officials stated that the agency is in the process of developing a strategic plan for the checkpoint that is scheduled to be completed in early 2007. TSA officials stated that the completion of the plan was delayed due to competing priorities, including ensuring the screening of checked baggage using explosives detection systems and responding to new and emerging threats, such as homemade explosives. TSA officials also said that reorganizations at TSA and DHS S&T have contributed to the delay. It is important that TSA continue to invest in and develop technologies for detecting explosives, as demonstrated by the alleged August 2006 terrorist plot to detonate liquid explosives on board multiple commercial aircraft bound for the United States from the United Kingdom. The President's fiscal year 2007 budget request notes that emerging checkpoint technology will enhance the detection of prohibited items, especially firearms and explosives, on passengers. We are currently evaluating DHS's and TSA's progress in planning for, managing, and deploying research and development programs in support of airport checkpoint screening operations and will report on the results of our work later this year. Checked Baggage Screening Technologies: At checked baggage screening stations, TSA has been effective in deploying EDS machines and ETD machines. However, initial deployment of EDS machines in a stand-alone mode--usually in airport lobbies--and ETD machines resulted in operational inefficiencies and security risks as compared with using EDS machines integrated in-line with airport baggage conveyor systems. As we reported in March 2005,[Footnote 52] to initially deploy EDS and ETD equipment to screen 100 percent of checked baggage for explosives, TSA implemented interim airport lobby solutions rather than in-line EDS baggage screening systems.[Footnote 53] TSA officials stated that they used EDS machines in stand-alone mode and ETD machines as an interim solution in order to meet the congressional deadline for screening all checked baggage for explosives. Officials stated that they employed these interim solutions because of the significant costs required to install in-line systems and the need to reconfigure many airports' baggage conveyor systems to accommodate the equipment. TSA's use of stand-alone EDS and ETD machines has required a greater number of TSOs and resulted in screening fewer bags for explosives each hour. Additionally, because in-line EDS checked baggage screening systems can significantly reduce the need for TSOs to handle baggage, installing them may also reduce the number of TSO on-the-job injuries. Moreover, screening with in-line EDS systems could also result in security benefits by reducing congestion in airport lobbies and reducing the need for TSA to use alternative screening procedures.[Footnote 54] In March 2005, we reported that at nine airports where TSA had agreed to help fund the installation of in-line EDS systems, TSA estimated that screening with in-line EDS machines could save the federal government about $1.3 billion over 7 years. In February 2006, TSA reported that a savings of approximately $4.7 billion could be realized over a period of 20 years by installing optimal checked baggage screening systems, including in-line EDS machines, at the airports with the highest checked baggage volumes. However, TSA also reported in February 2006 that many of the initial in-line EDS systems had not achieved the degree of anticipated savings initially estimated. TSA has since determined that recent improvements to the design of the in-line EDS systems and EDS screening technology now offer the opportunity for higher-performance and lower-cost screening systems. In June 2006, TSA issued guidance to airports to provide options, ideas, and suggestions for airports to choose from when considering security requirements in the planning and design of new or renovated airport facilities.[Footnote 55] This guidance also provides recommendations for airports in constructing in-line systems. TSA has begun to systematically plan for the optimal deployment of checked baggage screening systems, but resources have not been made available to fund the installation of in-line EDS machines on a large- scale basis. In March 2005, we reported that while TSA had made progress in deploying EDS and ETD machines, it had not conducted a systematic, prospective analysis of the optimal deployment of these machines to achieve long-term savings and enhanced efficiencies and security. We recommended that TSA systematically evaluate baggage screening needs at airports. In February 2006, TSA released its strategic planning framework for checked baggage screening aimed at increasing security through deploying more EDS machines, lowering program life-cycle costs, minimizing impacts to TSA and airport and airline operations, and providing a flexible security infrastructure. According to TSA, the framework will be used to establish a comprehensive strategic plan for TSA's checked baggage screening program. As part of this planning effort, TSA identified, among other things, the top 25 airports that should first receive federal funding for projects related to the installation of in-line EDS systems, and the optimal checked baggage screening solutions for the 250 airports with the highest checked baggage volumes.[Footnote 56] DHS's budget execution reports for TSA for fiscal year 2007 show that TSA received $524.4 million for the purchase, installation, maintenance, and operations integration of EDS and ETD machines. The President's fiscal year 2008 budget request includes $692 million for these activities--an increase of $167.6 million over the previous year's appropriations. Most (about 72 percent) of this increase is for installation of EDS and ETD machines.[Footnote 57] In February 2006, TSA officials reported that if some of the top 25 airports do not receive in-line checked baggage screening systems, they will require additional screening equipment to be placed in airport lobbies and additional TSO staffing in order to remain in compliance with the mandate for screening all checked baggage using explosive detection systems. Additionally, in May 2006, TSA reported that under current investment levels, the installation of optimal checked baggage screening systems would not be completed until approximately 2024. According to TSA, as of September 30, 2006, 36 airports had operational in-line systems--18 airports had airport-wide systems, while the remaining 18 airports had systems at a particular terminal or terminals. Over the next 2 years, TSA expects full and partial in-line systems to become operational at 25 additional airports. This level of effort, according to TSA, balances resources with other risks to transportation security. In March 2005, we reported that TSA and airport operators were relying on several sources of funding to construct in-line checked baggage screening systems. One source of funding airport operators initially used was the Federal Aviation Administration's Airport Improvement Program, which traditionally funds grants to maintain safe and efficient airports. With Airport Improvement Program funds no longer available after fiscal year 2003 for this purpose, airports turned to other sources of federal funding to construct in-line systems.[Footnote 58] The fiscal year 2003 Consolidated Appropriations Resolution approved the use of letter of intent agreements as a vehicle to leverage federal government and industry funding to support facility modification costs for installing in-line EDS baggage screening systems.[Footnote 59] TSA also uses other transaction agreements as an administrative vehicle to directly fund, with no long-term commitments, airport operators for smaller in-line airport modification projects.[Footnote 60] Under these agreements, as implemented by TSA, the airport operator provides a portion of the funding required for the modification. To fund the procurement and installation of explosive detection systems in-line, TSA uses annual appropriations and the $250 million mandatory appropriation of the Aviation Security Capital Fund.[Footnote 61] For example, in fiscal years 2005, 2006, and 2007, TSA received appropriations of $175 million, $180 million, and $141.4 million, respectively, for the procurement of explosive detection systems. It received appropriations of $45 million in fiscal years 2005 and 2006, and $138 million in fiscal year 2007 for the installation of explosive detection systems, in addition to the $250 million made available through the capital fund.[Footnote 62] Congress also authorized an additional appropriation of $400 million per year through fiscal year 2007 for airport security improvement projects, including the installation of in-line EDS systems. However, appropriations have not been made under this authorization.[Footnote 63] Figure 5 shows TSA obligated funding levels for EDS installation and integration. Figure 5: TSA Obligated Funding Levels for EDS Installation and Integration: [See PDF for image] Source: Aviation Security Advisory Committee analysis of TSA data. [A] This is an estimate as of August 2006. [End of figure] TSA is collaborating with key stakeholders to identify funding and financing strategies for installing optimal checked baggage screening systems. In August 2006, the Aviation Security Advisory Committee baggage screening investment study working group, of which TSA is a member, released a study outlining an investment strategy for funding TSA's checked baggage screening program.[Footnote 64] According to TSA, this study, which has been provided to the Office of Management and Budget for review, is the final component of TSA's strategic plan for checked baggage screening. The investment study recommended four investment options, including (1) tax credit bonds,[Footnote 65] (2) continued appropriations for the procurement and installation of EDS machines, (3) combined line items for the purchase and installation of EDS machines in order to provide TSA increased flexibility in directing the funding where it is most needed, and (4) enhanced eligibility for the Passenger Facility Charge (PFC).[Footnote 66] The working group estimated that under its recommended approach, the present value cost of the checked baggage screening program is $23.3 billion over the next 20 years. Of these costs, the aviation industry is projected to bear $3.6 billion and the federal government is projected to bear $19.7 billion. According to the working group, the net effect of investing in optimal systems would be to reduce overall life-cycle costs by $1.2 billion relative to the current rate of investment, primarily through TSO staff cost savings and avoidance of increased TSO staff costs in the future. In addition, in its August 2006 study, the working group identified that in order to achieve these cost savings, a formal cost management process is needed given evolving technology and design practices, the various parties involved in design and operation, and the amount of capital investment to be made over the next several years. The working group identified a variety of actions that should be taken by Congress, TSA, and the aviation industry, including implementing a structured process for ongoing government and industry collaboration and increasing program management resources to provide for more substantial TSA involvement throughout the planning, design, and construction process. (App. I includes a complete list of the specific actions the working group identified for Congress, TSA, and the aviation industry.) Federal Action Is Needed to Strengthen Air Cargo Security: In October 2005, we reported that TSA had taken a number of actions intended to strengthen domestic air cargo security, but, as we reported, factors existed that may have limited their effectiveness. Since our report was released, TSA has issued an air cargo security rule that revised some of the requirements air carriers are required to follow to ensure air cargo security, and has drafted new and revised security programs for domestic and foreign passenger and all-cargo carriers that contain more specific security requirements. However, more work remains to ensure that TSA has a comprehensive strategy to secure air cargo that fully incorporates risk management principles. TSA Has Taken Steps to Incorporate Risk Management Principles into Its Decision Making to Secure Domestic Air Cargo, but Most Efforts Are in the Early Stages: TSA has taken steps towards applying a risk-based management approach to addressing domestic air cargo security, including conducting threat assessments. However, opportunities exist to strengthen these efforts. Applying a risk management framework to decision making is one tool to help provide assurance that programs designed to combat terrorism are properly prioritized and focused. TSA has underscored the importance of implementing a risk-based approach that protects against known threats, but that is also sufficiently flexible to direct resources to mitigate new and emerging threats. According to TSA, the ideal risk model would be one that could be used throughout the transportation sector and applicable to different threat scenarios. As part of TSA's risk-based approach, TSA issued an Air Cargo Strategic Plan in November 2003 that focused on securing the domestic air cargo supply chain.[Footnote 67] TSA coordinated with air cargo industry stakeholders representing passenger and all-cargo carriers to develop this plan. TSA officials stated that they are revising their existing domestic air cargo strategic plan, but as of February 5, 2007, agency officials had not set a timeframe for when TSA will complete this revision. TSA's Air Cargo Strategic Plan describes, among other things, an approach for screening or reviewing information on all domestic air cargo shipments to determine their level of relative risk, ensuring that 100 percent of cargo identified as posing an elevated risk is physically inspected, and pursuing technological solutions to physically inspect air cargo. TSA officials anticipate that the agency's system for targeting domestic air cargo, referred to as Freight Assessment, will minimize the reliance on the random physical inspections currently conducted by air carriers. According to agency plans, air carriers would receive targeting information from TSA on specific cargo items identified as posing an elevated risk. Upon notification by TSA's Freight Assessment System, air carrier personnel would be responsible for conducting the inspection of cargo identified as elevated risk. In October 2005, we reported that although TSA had identified data elements that could be used in its Freight Assessment System, the agency had not yet ensured that these data are complete, accurate, and current. We recommended that TSA take steps to do so; however, as of February 2007, TSA has not yet addressed this recommendation. Further, while TSA planned to phase in implementation and deployment of the targeting system for cargo transported on passenger carriers during calendar years 2006 and 2007, as of February 2007, TSA's system for targeting domestic cargo is still under development. In addition to developing a strategic plan, a risk management framework in the homeland security context should include risk assessments, which typically involve three key elements--threats, vulnerabilities, and criticality or consequence. Information from these three assessments provides input for setting priorities, evaluating alternatives, allocating resources, and monitoring security initiatives. In September 2005, TSA's Office of Intelligence (formerly known as the Transportation Security Intelligence Service) completed an overall threat assessment for air cargo, which identified general and specific threats to domestic air cargo.[Footnote 68] However, we reported that TSA had not conducted a vulnerability assessment to identify the range of security weaknesses that could be exploited by terrorists.[Footnote 69] TSA plans to conduct this assessment of domestic air cargo vulnerabilities--as we recommended--and expects it to be completed in late 2007. TSA Has Implemented Measures Intended to Strengthen Domestic Air Cargo Security, but More Work Remains: In October 2005, we reported that TSA had taken a number of actions intended to strengthen domestic air cargo security, but that factors existed that may limit the effectiveness of these actions. For example, we reported that TSA had established a centralized Known Shipper database to streamline the process by which shippers (individuals and businesses) are made known to carriers with whom they conduct business.[Footnote 70] However, at that time, the information in this database on the universe of shippers was incomplete, because participation in this database was voluntary. Moreover, we identified problems with the reliability of the information in the database. TSA estimated that the agency's centralized database contained information on about 400,000 known shippers, or less than one-third of the total population of known shippers, which is estimated to be about 1.5 million. In May 2006, TSA issued an air cargo security rule that included a number of provisions aimed at enhancing the security of air cargo.[Footnote 71] For example, TSA made participation in the Known Shipper database mandatory, requiring air carriers and indirect air carriers to submit information on their known shippers to TSA's Known Shipper database. However, the May 2006 security rule did not modify TSA's current process for validating known shippers, which remains the responsibility of indirect air carriers and air carriers. Accordingly, passenger, all cargo, and indirect air carriers will continue to be responsible for determining the integrity of the shipper, which may allow for potential conflicts of interest because air carriers who conduct business with shippers will also continue to have the authority to validate these same shipping customers. In October 2005, we also reported that TSA had established requirements for air carriers to randomly inspect air cargo, but had exempted some cargo from inspection, potentially creating security weaknesses.[Footnote 72] We recommended that TSA examine the rationale for existing air cargo inspection exemptions, determine whether such exemptions leave the air cargo system unacceptably vulnerable to terrorist attack, and make any needed adjustments to the exemptions. TSA established a working group to examine the rationale for existing air cargo inspection exemptions, and in October 2006, issued a security directive and emergency amendment to domestic and foreign passenger air carriers operating within and from the United States that limited the inspection exemptions. According to TSA officials, the agency is still considering revisions to the inspection exemptions for cargo being transported into the United States. In October 2005, we also reported that TSA conducted compliance inspections of air carriers to ensure that they were complying with existing air cargo security requirements. These compliance inspections ranged from a comprehensive review of the implementation of all air cargo security requirements by an air carrier or indirect air carrier to a review of just one or several security requirements.[Footnote 73] However, TSA had not developed measures to assess the adequacy of air carrier compliance with air cargo security requirements, or assessed the results of its compliance inspections to target higher-risk air carriers or indirect air carriers for future reviews. More recently, TSA reported that the agency has increased the number of inspectors dedicated to conducting air cargo inspections, and has begun analyzing the results of the compliance inspections to help focus their inspections on those entities that have the highest rates of noncompliance. For fiscal year 2008, the President's budget includes a request of about $56 million for TSA's air cargo security program, which includes funding for, among other things, 300 air cargo security inspectors, TSA-certified canines for air cargo related activities, and the development and deployment of a Freight Assessment System to target elevated-risk cargo. In addition to taking steps to strengthen inspections of air cargo, TSA is working to enhance air cargo screening technologies. Specifically, TSA, together with DHS's S&T, is currently developing and pilot testing a number of technologies to assess their applicability to inspecting and securing air cargo. These efforts include: * an air cargo explosives detection pilot program implemented at three airports, testing the use of explosive detection systems, explosive trace detectors, standard X-ray machines, canine teams, technologies that can locate a stowaway through detection of a heartbeat or increased carbon dioxide levels in cargo, and manual inspections of air cargo;[Footnote 74] * an EDS pilot program, which is testing the use of computer-aided tomography to measure the densities of objects in order to identify potential explosives in air cargo;[Footnote 75] * an air cargo security seals pilot, which is exploring the viability of potential security countermeasures, such as tamper-evident security seals, for use with certain classifications of exempt cargo; * the use of hardened unit-loading devices, which are containers made of blast-resistant materials that could withstand an explosion onboard the aircraft; and: * the use of pulsed fast neutron analysis, which allows for the identification of the material signatures of contraband, explosives, and other threat objects. According to TSA officials, the agency will determine whether it will require the use of any of these technologies once it has completed its assessments and analyzed the results. However, TSA has not established a timeframe for completing these assessments. According to TSA officials, the federal government and the air cargo industry face several challenges that must be overcome to effectively implement any of these technologies to inspect or secure air cargo. These challenges include factors such as the nature, type, and size of the cargo; environmental and climatic conditions; inspection throughput rates; staffing and training issues for individuals who inspect air cargo; the location of air cargo facilities (centralized versus decentralized); cost and availability; and employee health and safety concerns. To effectively inspect domestic air cargo that TSA deems to pose an elevated risk, the agency will need to make decisions regarding which technologies will be used to inspect such cargo. According to TSA officials, there is no single technology capable of efficiently and effectively inspecting all types of air cargo for the full range of potential terrorist threats, including explosives and weapons of mass destruction. We will soon report on the second phase of our review of air cargo security, which focuses on DHS's efforts to secure air cargo that is transported into the United States from abroad, referred to as inbound air cargo. This report will address (1) the actions TSA and CBP have taken to secure inbound air cargo, and how, if at all these efforts could be strengthened; and (2) the practices the air cargo industry and select foreign governments have adopted that could be used to enhance TSA's efforts to strengthen inbound air cargo security, and the extent to which TSA and CBP have worked with foreign governments to enhance their air cargo security efforts. Concluding Observations: DHS and TSA have undertaken numerous initiatives to strengthen the security of the nation's aviation system, and should be commended for these efforts. Meeting the congressional mandates to screen airline passengers and checked baggage alone was a tremendous challenge. Since that time, TSA has turned its attention to strengthening passenger prescreening, more efficiently allocating and deploying TSOs, strengthening screening procedures, developing and deploying more effective and efficient screening technologies, and improving domestic air cargo security, among other efforts. TSA has made progress in all of these areas, but opportunities exist to further strengthen their efforts, in particular in the areas of risk-based decision making, program planning and monitoring, and stakeholder collaboration. Our work has shown--in homeland security and in other areas--that a comprehensive risk management approach can help inform decision makers in the allocation of finite resources to the areas of greatest need. We are encouraged that risk management has been a cornerstone of DHS and TSA policy, and that TSA has implemented risk-based decision making into a number of its efforts. Despite this commitment, however, TSA will continue to face difficult decisions and trade-offs--particularly as threats to commercial aviation evolve--regarding acceptable levels of risk and the need to balance security with efficiency and customer service. We recognize that doing so will not be easy. In implementing a risk-based approach, DHS and TSA must also address the challenges we identified in our work related to program planning, risk assessments, and implementation and monitoring of aviation security programs. Without rigorous planning and prioritization, and knowledge of the effectiveness of aviation security programs, DHS and TSA cannot be sure that they are focusing their finite resources on the areas of greatest need. Risk-based decision making will be particularly important as TSA begins to place more focus on the security of non-aviation modes of transportation, including passenger rail, and resource decisions and related trade-offs will have to be made not only within aviation, but across all transportation modes. TSA must also continue its work to strengthen partnerships with other federal agencies, state and local governments, the private sector, and international partners to improve the security of the commercial aviation system. Securing all aspects of commercial aviation is shared a responsibility among these parties. Accordingly, it is important that all stakeholders be involved, as appropriate, in coordinating security- related priorities and activities, and reviewing and sharing best practices and developing common security frameworks. Such efforts are particularly important with international partners due to our interdependence with foreign nations in securing the aviation system-- as evidenced by the recent alleged terrorist plot to detonate liquid explosives onboard multiple aircraft departing the United Kingdom for the United States. TSA has strengthened its coordination efforts with domestic and international partners, which has aided its security efforts and helped to avoid duplication of effort. Existing risk-based decision making, program planning and monitoring, and coordination efforts will need to continue and be strengthened as TSA works to address continuing challenges and threats facing commercial aviation. Mr. Chairman, this concludes my statement. I would be pleased to answer any questions that you or other members of the committee may have at this time. Contact Information: For further information on this testimony, please contact Cathleen A. Berrick, (202) 512-3404 or berrickc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. In addition to the contact named above, Mike Bollinger, Kristy Brown, Carissa Bryant, Tony Cheesebrough, Kevin Copping, Christine Fossett, Samantha Goodman, John Hansen, Mike Harmond, Dawn Hoff, Suzanne Heimbach, Adam Hoffman, Anne Laffoon, Thomas Lombardi, Steve Morris, Katrina Moss, Mona Nichols-Blake, Leslie Sarapu, Brian Sklar, Edith Sohna, Maria Strudwick, Meg Ullengren, and Candice Wright made contributions to this testimony. [End of section] Appendix I: Key Actions for Congress, TSA, and the Aviation Industry, as Recommended by the Baggage Screening Investment Study Working Group: In August 2006, the Aviation Security Advisory Committee baggage screening investment study working group, of which TSA is a member, released a study outlining an investment strategy for the funding of TSA's checked baggage screening program.[Footnote 76] The working group's investment study identified five key actions that should be taken by Congress, TSA, and the aviation industry, respectively, with regard to funding these systems. Table 3 provides a summary of the key actions identified by the working group. Table 3: Summary of key actions for Congress, TSA, and the aviation industry, as recommended by the baggage screening investment study working group: Congress: Authorize a voluntary tax credit bond program of $3 billion for fiscal years 2008 through 2011, which airports could access to fund the infrastructure necessary for automated EDS baggage screening systems; TSA: Finalize and publish the draft baggage screening investment study guidelines developed by the baggage screening investment study technical team. Include a detailed explanation of the upgraded design review and approval process in the baggage screening investment study guidelines. Update the baggage screening investment study guidelines at least yearly to reflect ongoing lessons learned; Aviation industry: Use upcoming industry conferences to communicate the key findings and recommendations of the baggage screening investment study. Congress: Permit use of tax credit bonds for refunding by airports or airlines that have or will self-fund their in-line screening systems through the tax credit bond authorization period (with the airport facilitating conduit financing on behalf of airlines as needed, as tax credit bonds require the issuer to be a public entity); TSA: Issue detailed funding guidance to the aviation industry explaining the alternatives available for funding baggage screening systems and communicate the process and business rules to access facility modification grants for airports and airlines not wishing or not able to use the tax credit bond program; Aviation industry: For those airports and airlines that have already developed designs for in-line systems but not yet initiated construction, prepare refined designs consistent with the baggage screening investment study guidelines. Congress: Continue or increase the existing rate of annual appropriations for purchase and installation of EDS equipment ($435 million per year, escalating annually). TSA would be responsible for prioritizing the use of these funds, which could include provision of (a) equipment to airports that use the voluntary tax credit bond program, (b) grants and equipment to airports and airlines that do not use the voluntary tax credit bond program, (c) grants to airports and airlines requiring reimbursement for self-funded optimal screening systems that do not use the tax credit bond program, (d) ongoing support for expansion of optimal screening systems to accommodate future traffic growth, and (e) life-cycle replacement and refurbishment of previously installed equipment; TSA: Provide Congress with requested information regarding an estimated deployment timeline on an airport-by-airport basis; Aviation industry: Create integrated local design teams for individual design efforts to facilitate stakeholder coordination at the local level. Congress: Eliminate any restrictions associated with combining purchase and installation funds to provide TSA with increased flexibility to manage the impact of the voluntary tax credit bond program; TSA: Work with DHS and equipment manufacturers to actively manage the timely development and deployment of new screening technologies critical to the costs and performance assumptions in the baggage screening investment study; Aviation industry: Develop contracts with baggage handling systems designers, suppliers, and other associated contractors that require compliance with the baggage screening investment study guidelines and the performance standards specified therein. Congress: Enhance passenger facility charge program flexibility to include (a) tax credit bond sinking fund payments and (b) modification or construction of exclusive-use outbound baggage systems to accommodate EDS screening systems; TSA: Establish an integrated national deployment team composed of representatives from TSA, airport, airline, and key industry trade associations to actively and collaboratively manage the cost and quality of automated EDS baggage screening systems at a national level; Aviation industry: Actively participate in the integrated national deployment team, including providing dedicated representatives to work with TSA during the initial deployment of optimal screening systems to all categories X, I, II, and III airports. Source: Aviation Security Advisory Committee: [End of table] [End of section] Related GAO Products: Airline Passenger Prescreening: Transportation Security Administration's Office of Intelligence: Responses to Post Hearing Questions on Secure Flight. GAO-06-1051R. Washington D.C.: August 4, 2006. Aviation Security: Management Challenges Remain for the Transportation Security Administration's Secure Flight Program. GAO-06-864T. Washington D.C.: June 14, 2006. Aviation Security: Significant Management Challenges May Adversely Affect Implementation of the Transportation Security Administration's Secure Flight Program. GAO-06-374T. Washington, D.C.: Feb. 9, 2006. Aviation Security: Transportation Security Administration Did Not Fully Disclose Uses of Personal Information During Secure Flight Program Testing in Initial Privacy Notes, but Has Recently Taken Steps to More Fully Inform the Public. GAO-05-864R. Washington, D.C.: July 22, 2005. Aviation Security: Secure Flight Development and Testing Under Way, but Risks Should Be Managed as System Is Further Developed. GAO-05-356. Washington, D.C.: March 28, 2005. Aviation Security: Measures for Testing the Effect of Using Commercial Data for the Secure Flight Program. GAO-05-324. Washington, D.C.: Feb. 23, 2005. Aviation Security: Challenges Delay Implementation of Computer- Assisted Passenger Prescreening System. GAO-04-504T. Washington, D.C.: March 17, 2004. Aviation Security: Computer-Assisted Passenger Prescreening System Faces Significant Implementation Challenges. GAO-04-385. Washington, D.C.: Feb. 13, 2004. Airline Passenger Checkpoint and Checked Baggage Screening: Aviation Security: TSA Oversight of Checked Baggage Screening Procedures Could Be Strengthened. GAO-06-869. Washington, D.C.: July 28, 2006. Aviation Security: TSA Has Strengthened Efforts to Plan for the Optimal Deployment of Checked Baggage Screening Systems but Funding Uncertainties Remain. GAO-06-875T. Washington, D.C.: June 29, 2006. Aviation Security: Enhancements Made in Passenger and Checked Baggage Screening, but Challenges Remain. GAO-06-371T. Washington, D.C.: April 4, 2006. Aviation Security: Transportation Security Administration Has Made Progress in Managing a Federal Security Workforce and Ensuring Security at U.S. Airports, but Challenges Remain. GAO-06-597T. Washington, D.C.: April 4, 2006. Aviation Security: Better Planning Needed to Optimize Deployment of Checked Baggage Screening Systems. GAO-05-896T. Washington, D.C.: July 13, 2005. Aviation Security: Screener Training and Performance Measurement Strengthened, but More Work Remains. GAO-05-457. Washington, D.C.: May 2, 2005. Aviation Security: Systematic Planning Needed to Optimize the Deployment of Checked Baggage Screening Systems. GAO-05-365. Washington, D.C.: March 15, 2005. Aviation Security: Challenges Exist in Stabilizing and Enhancing Passenger and Baggage Screening Operations. GAO-04-440T. Washington, D.C.: Feb. 12, 2004. Airport Passenger Screening: Preliminary Observations on Progress Made and Challenges Remaining. GAO-03-1173. Washington, D.C.: Sept. 24, 2003. Air Cargo: Aviation Security: Federal Action Needed to Strengthen Domestic Air Cargo Security. GAO-06-76. Washington, D.C.: Oct. 17, 2005. Aviation Safety: Undeclared Air Shipments of Dangerous Goods and DOT's Enforcement Approach. GAO-03-22. Washington, D.C.: Jan. 10, 2003. Aviation Security: Vulnerabilities and Potential Improvements for the Air Cargo System. GAO-03-344. Washington, D.C.: Dec. 20, 2002. In-Flight Security: Aviation Security: Further Study of Safety and Effectiveness and Better Management Controls Needed If Air Carriers Resume Interest in Deploying Less-than-Lethal Weapons. GAO-06-475. Washington, D.C.: May 26, 2006. Aviation Security: Federal Air Marshal Service Could Benefit from Improved Planning and Controls, GAO-06-203. Washington, D.C.: Nov. 28, 2005. Aviation Security: Flight and Cabin Crew Member Security Training Strengthened, but Better Planning and Internal Controls Needed. GAO-05- 781. Washington, D.C.: Sept. 6, 2005. Aviation Security: Federal Air Marshal Service Is Addressing Challenges of Its Expanded Mission and Workforce, but Additional Actions Needed. GAO-04-242. Washington, D.C.: Nov. 19, 2003. Aviation Security: Information Concerning the Arming of Commercial Pilots. GAO-02-822R. Washington, D.C.: June 28, 2002. Perimeter Security, Access Controls, and General Aviation: Homeland Security: Agency Resources Address Violations of Restricted Airspace, but Management Improvements Are Needed. GAO-05-928T. Washington, D.C.: July 21, 2005. General Aviation Security: Increased Federal Oversight Is Needed, but Continued Partnership with the Private Sector Is Critical to Long-Term Success. GAO-05-144. Washington, D.C.: Nov. 10, 2004. Aviation Security: Further Steps Needed to Strengthen the Security of Commercial Airport Perimeters and Access Controls. GAO-04-728. Washington, D.C.: June 4, 2004. Aviation Security: Challenges in Using Biometric Technologies. GAO-04- 785T. Washington, D.C.: May 19, 2004. Nonproliferation: Further Improvements Needed in U.S. Efforts to Counter Threats from Man-Portable Air Defense Systems. GAO-04-519. Washington, D.C.: May 13, 2004. Aviation Security: Factors Could Limit the Effectiveness of the Transportation Security Administration's Efforts to Secure Aerial Advertising Operations. GAO-04-499R. Washington, D.C.: March 5, 2004. The Department of Homeland Security Needs to Fully Adopt a Knowledge- based Approach to Its Counter-MANPADS Development Program. GAO-04-341R. Washington, D.C.: Jan. 30, 2004. Other Aviation Security: Homeland Security: Progress Has Been Made to Address the Vulnerabilities Exposed by 9/11, but Continued Federal Action Is Needed to Further Mitigate Security Risks. GAO-07-375. Washington, D.C.: Jan. 24, 2007. Terrorist Watch List Screening: Efforts to Help Reduce Adverse Effects on the Public. GAO-06-1031. Washington, D.C.: Sept. 29, 2006. Transportation Security Administration: More Clarity on the Authority of Federal Security Directors Is Needed. GAO-05-935. Washington, D.C.: Sept. 23, 2005. Aviation Security: Improvement Still Needed in Federal Aviation Security Efforts. GAO-04-592T. Washington, D.C.: March 30, 2004. Aviation Security: Efforts to Measure Effectiveness and Strengthen Security Programs. GAO-04-285T. Washington, D.C.: Nov. 20, 2003. Aviation Security: Efforts to Measure Effectiveness and Address Challenges. GAO-04-232T. Washington, D.C.: Nov. 5, 2003. Aviation Security: Progress Since September 11, 2001, and the Challenges Ahead. GAO-03-1150T. Washington, D.C.: Sept. 9, 2003. Airport Finance: Past Funding Levels May Not Be Sufficient to Cover Airports' Planned Capital Development. GAO-03-497T. Washington, D.C.: Feb. 25, 2003. Airport Finance: Using Airport Grant Funds for Security Projects Has Affected Some Development Projects. GAO-03-27. Washington, D.C.: Oct. 15, 2002. Commercial Aviation: Financial Condition and Industry Responses Affect Competition. GAO-03-171T. Washington, D.C.: Oct. 2, 2002. Aviation Security: Transportation Security Administration Faces Immediate and Long-Term Challenges. GAO-02-971T. Washington, D.C.: July 25, 2002. Aviation Security: Vulnerabilities in, and Alternatives for, Preboard Screening Security Operations. GAO-01-1171T. Washington, D.C.: Sept. 25, 2001. Aviation Security: Weaknesses in Airport Security and Options for Assigning Screening Responsibilities. GAO-01-1165T. Washington, D.C.: Sept. 21, 2001. Aviation Security: Terrorist Acts Demonstrate Urgent Need to Improve Security at the Nation's Airports. GAO-01-1162T. Washington, D.C.: Sept. 20, 2001. Aviation Security: Terrorist Acts Illustrate Severe Weaknesses in Aviation Security. GAO-01-1166T. Washington, D.C.: Sept. 20, 2001. Note: GAO Products that are not available to the public because they are considered Security Sensitive Information, Law Enforcement Sensitive, or National Security Secret are not included in this list of related products. [End of section] FOOTNOTES [1] TSA also requires that both U.S. and foreign air carriers utilize the No Fly and Selectee Lists to prescreen passengers prior to conducting operations to, from, or within the United States, in accordance with TSA security directives. [2] Indirect air carriers are entities that consolidate air cargo from multiple shippers and deliver it to air carriers to be transported. [3] See Pub. L. No. 107-71, 115 Stat. 597 (2001). [4] Other federal entities involved in securing or safeguarding air cargo include the Department of Homeland Security-U.S. Customs and Border Protection, the United States Postal Service, the Department of Commerce, the Department of Transportation, and the Department of the Treasury. [5] See Pub. L. No. 108-458, § 4012(a)(1)-(2), 118 Stat. 3638, 3714-19 (codified at 49 U.S.C. §§ 44903(j)(2)(C), 44909(a)(6)). [6] Currently, TSA requires that both U.S. and foreign air carriers utilize the No Fly and Selectee lists to prescreen passengers prior to conducting operations to, from, or within the United States, in accordance with TSA security directives. [7] GAO, Aviation Security: Significant Management Challenges May Adversely Affect Implementation of the Transportation Security Administration's Secure Flight Program, GAO-06-374T (Washington, D.C.: Feb. 9, 2006). GAO, Aviation Security: Secure Flight Development and Testing Under Way, but Risks Should Be Managed as System Is Further Developed, GAO-05-356 (Washington, D.C.: Mar. 28, 2005). [8] Following the events of September 11, and in accordance with ATSA, TSA began an effort in March 2003 to develop a new computer-assisted passenger prescreening system known as CAPPS II. See 49 U.S.C. § 44903(j)(2)(A). Because of a variety of delays and challenges, in August 2004, DHS cancelled the development of CAPPS II. In its place, TSA announced that it would develop a new prescreening program called Secure Flight. [9] Although the air carriers currently conduct the watch list matching and CAPPS prescreening functions, these processes are required and overseen by TSA. [10] In addition to name matching prescreening activities, CBP also prescreens travelers by evaluating the authenticity and completeness of passengers' passports and other travel documents as part of its travel document review procedures. CBP also attempts to identify high-risk travelers on international flights through its Automated Targeting System--Passenger (ATS-P). Under this risk assessment program, CBP conducts a risk-targeting process by evaluating passenger information (for both passengers departing from and for the United States) against risk assessment rules and algorithms within the ATS-P. The ATS-P compares passenger information against data from numerous national intelligence and law enforcement databases to identify those travelers who are likely to present a higher risk, so that CBP can interdict and further screen these travelers. [11] As passengers are not required to present a passport to board domestic flights, the name matching process for domestic flights primarily uses only PNR data, not APIS data. [12] See 19 C.F.R. §§ 122.49a, 122.75a (establishing the electronic manifest transmission requirements for passengers onboard commercial aircraft arriving in or departing from the United States). [13] 71 Fed. Reg. 40,035 (July 14, 2006). A notice of proposed rulemaking provides notice to interested or affected parties of an agency's anticipated regulatory action and an opportunity for such parties to comment on this action before implementation. [14] TSA also allows airports to apply to opt-out of federal screening and to use private screeners under contract with TSA. See 49 U.S.C. § 44920. Six airports currently have screening operations conducted by private screening contractors under TSA's Screening Partnership Program. [15] Sterile areas are located within the terminal where passengers are provided access to boarding aircraft. Access to these areas is controlled by TSOs (or by non-federal screeners at airports participating in the Screener Partnership Program) at checkpoints where they conduct physical screening of individuals and their carry-on baggage for weapons and explosives. [16] TSOs must deny passage beyond the screening location to any individual or property that has not been screened or inspected in accordance with passenger screening standard operating procedures. If an individual refuses to permit inspection of any item, that item must not be allowed into the sterile area or onboard an aircraft. [17] At some airports, some passengers may also be screened by walking through an explosives trace portal--a machine that detects trace amounts of explosives on persons. [18] Explosive detection systems use computer-aided tomography X-rays to examine objects inside baggage and identify the characteristic signatures of threat explosives. This equipment operates in an automated mode. [19] Explosive trace detection works by detecting vapors and residues of explosives. Human operators collect samples by rubbing bags with swabs, which are chemically analyzed to identify any traces of explosive materials. [20] Positive passenger bag match requires that passengers be on the same aircraft as their checked baggage. According to TSA officials, this procedure is rarely used. [21] As of January 2007, TSA security programs include (1) Aircraft Operators Standard Security Program, which applies to domestic passenger air carriers; (2) Indirect Air Carrier Standard Security Program, which applies to domestic indirect air carriers; (3) Domestic Security Integration Program, a voluntary program that applies to domestic all-cargo carriers; (4) the Twelve-Five Program, which applies to certain operators of aircraft weighing more than 12,500 pounds in scheduled or charter service that carry passengers, cargo, or both; (5) Model Security Program, which applies to foreign passenger air carriers; and (6) All-Cargo International Security Procedures, which applies to each foreign air carrier engaged in the transportation of cargo to, from, within, or overflying the United States in all-cargo aircraft with a maximum certified takeoff weight of more than 12,500 pounds. TSA drafted new security programs for foreign and domestic all- cargo carriers with operations to, from, and within the United States. TSA expects to finalize these programs in early 2007. [22] The International Civil Aviation Organization defines a regulated agent as an agent, freight forwarder, or any other entity that conducts business with an aircraft operator and provides security controls that are accepted or required by the appropriate government authority with respect to cargo or mail. [23] DHS's budget execution reports are monthly statements that reflect the Department's financial activity. [24] In our analysis of DHS's budget execution reports and the President's fiscal year 2008 budget request for TSA, we included funding specifically designated for aviation security and funding for other programs, projects, and activities related to aviation security, to the extent they were identifiable. In addition, these aviation security totals do not reflect funding for activities that may support TSA's aviation security programs and projects, such as intelligence and administration, because TSA's documentation does not identify the proportion of funding dedicated to support aviation security. Also, during this time period, a number of aviation security related activities were transferred in or out of TSA's jurisdiction, which impact TSA funding levels for the affected fiscal years. [25] GAO-05-356. [26] GAO-05-356. [27] The Department of Homeland Security Appropriations Act, 2007, mandates that GAO review and confirm, upon the department's certification, that the Secure Flight Program meets the 10 conditions listed in section 522(a) of Public Law 108-334. See Pub. L. No. 109- 295, § 514, 120 Stat 1355, 1379 (2006). See also Pub. L. No. 108-334, § 522, 118 Stat. 1298, 1319-20 (2004). We are also conducting our ongoing review in response to requests from the United States Senate: the Committee on Commerce, Science, and Transportation, and its Subcommittee on Aviation; Committee on Appropriations, Subcommittee on Homeland Security; Committee on Homeland Security and Governmental Affairs; Committee on Judiciary; also the House of Representatives: Committee on Transportation and Infrastructure, Committee on Homeland Security; and the Chairman of the Committee on Government Reform. [28] We have ongoing work that includes collecting information about the identity-matching systems currently used by air carriers to match information for passengers on domestic flights against information on the No Fly and Selectee Lists derived from the TSDB. Air carriers will continue to conduct this name matching until Secure Flight becomes fully operational. Our interviews with officials from the 15 air carriers is part of this ongoing review of the air carriers' domestic identity matching efforts. In that we did not use probability sampling methods to select these 15 air carriers, information provided by officials from these air carriers cannot be generalized to other air carriers. [29] Privacy Act of 1974, Pub. L. No. 93-579, 88 Stat. 1896 (codified as amended at 5 U.S.C. § 552a). [30] GAO, Aviation Security: Transportation Security Administration Did Not Fully Disclose Uses of Personal Information During Secure Flight Program Testing in Initial Privacy Notes, but Has Recently Taken Steps to More Fully Inform the Public, GAO-05-864R (Washington, D.C.: July 22, 2005). [31] GAO-05-356. [32] GAO-06-374T and GAO-05-356. [33] GAO, Aviation Security: Efforts to Strengthen International Passenger Prescreening are Under Way, But Planning and Implementation Issues Remain, GAO-07-55SU (Washington, D.C.: November 2006). This report contains information considered to be Security Sensitive Information. [34] GAO, Aviation Security: Challenges Exist in Stabilizing and Enhancing Passenger and Baggage Screening Operations, GAO-04-440T (Washington, D.C.: Feb. 12, 2004). [35] As part of TSA's Screening Partnership Program, six airports used private contract screeners in lieu of federal TSOs during fiscal year 2006. Despite the fact that these airports do not use federal screeners, TSA still used the Staffing Allocation Model to determine the full-time equivalent screening staff at each of these airports for fiscal year 2006. These staffing levels, as determined by the model, were to serve as a limit on the number of private screeners that the private screening contractors could employ. According to TSA, the 1,702 total full-time equivalent staffing allocation at these airports does not count against TSA's nationwide ceiling of 45,000 full-time equivalents for TSO staff. In addition, according to the President's fiscal year 2008 budget request for TSA, TSA is accepting two additional airports--Key West and Marathon Florida--with a combined total of 30 full-time equivalent TSOs, into the Screening Partnership Program. [36] According to the President's fiscal year 2008 budget request, under previous passenger checkpoint screening procedures (prior to August 10, 2006), airport contract employees conducted all document checking for passengers approaching the checkpoint. TSA has determined that a security gap exists in verifying the documentation of the traveling public, and is seeking to close this gap to better meet its security responsibilities through more rigorous document checking procedures than those being done by private industry. [37] We visited 14 airports as part of this ongoing review. We did not use probability sampling methods to select the airports at which the FSDs were located; therefore, information provided by these FSDs cannot be generalized to other airports. [38] The Intelligence Reform and Terrorism Prevention Act of 2004, enacted in December 2004, required TSA to, among other things, develop and submit to the Senate Committee on Commerce, Science, and Transportation, and the House of Representatives Committee on Transportation and Infrastructure, standards for determining the aviation security staffing for all airports at which TSA provides or oversees screening services by March 2005. These standards are to provide the necessary levels of aviation security and ensure that the average aviation security related delay experienced by passengers is minimized. The Intelligence Reform and Terrorism Prevention Act also mandated that we conduct an analysis of TSA's staffing standards. Pub. L. No. 108-458, § 4023, 118 Stat. 3638, 3723-24 (2004). [39] GAO, Airport Passenger Screening: Preliminary Observations on Progress Made and Challenges Remaining, GAO-03-1173 (Washington, D.C.: Sept. 24, 2003). [40] GAO, Aviation Security: Screener Training and Performance Measurement Strengthened but More Work Remains, GAO-05-457 (Washington, D.C.: May 2, 2005). [41] We will report on the results of this work later this year. [42] In December 2005, TSA revised the prohibited and permitted items list by removing (1) metal scissors with pointed tips and a blade 4 inches or less in length as measured from the fulcrum and (2) tools-- such as pliers, screwdrivers, and wrenches--7 inches or less in length (excluding crowbars, drills, hammers, and saws) from the list. Pursuant to the change, passengers are able to bring these items onboard commercial aircraft on domestic flights and international flights departing the United States. See 70 Fed. Reg. 79,930 (Dec. 8, 2005). In addition to assessing the December 2005 prohibited items list change as part of our ongoing review of TSA's process for modifying passenger checkpoint screening procedures, we recently initiated a mandated review of the public safety impacts and risks, if any, of TSA's decision to allow small and tools onboard aircraft, and will report on the results of this work later this year. [43] TSA conducted tests of several proposed procedures that officials believed would have a significant impact on how TSOs perform daily screening functions, TSO training, and customer acceptance. [44] Covert testing involves TSA headquarters officials (national testing) or TSA field staff and other federal employees (local testing) attempting to carry simulated threat objects through the checkpoint without the objects being detected by TSOs. The results of the local covert tests are sensitive security information and the results of national covert tests are classified, and therefore are not included in this testimony. [45] GAO, Transportation Security Administration: Actions and Plans to Build a Results Oriented Culture, GAO-03-190 (Washington, D.C.: January 2003). [46] The nonstandard ways that the machines are used is sensitive security information. [47] Certain information we obtained and analyzed regarding explosives detection technologies and their effectiveness in TSA's checked baggage screening operations is classified or is considered by TSA to be sensitive security information. Accordingly, the results of our review of this information have been removed from this testimony. [48] GAO, Aviation Security: TSA Oversight of Checked Baggage Screening Procedures Could Be Strengthened, GAO-06-869 (Washington, D.C.: Jul. 28, 2006). [49] See H.R. Conf. Rep. No. 109-699, at 113 (2006) (accompanying H.R. 5441, enacted into law as the Department of Homeland Security Appropriations Act, 2007, Pub. L. No.109-295, 120 Stat. 1362 (2006)). [50] DHS's S&T is responsible for research and development of checkpoint technologies related to aviation security, managing the activities conducted at the Transportation Security Laboratory, and coordinating these efforts with TSA. TSA's Passenger Screening Program is responsible for evaluating and deploying systems to detect explosives and weapons concealed on persons or in carry-on items, while strengthening access control, improving screener performance, and reducing staffing requirements. [51] Research and development projects generally fall within the following phases: (1) basic research includes all scientific efforts and experimentation directed to increase knowledge and understanding in the fields of science related to long-term national needs; (2) applied research includes efforts directed toward solving specific problems with a focus on developing and evaluating the feasibility of proposed solutions; (3) advanced development includes efforts directed toward the development of hardware for field experiments; and (4) operational testing includes evaluation of technologies in a realistic operating environment to assess the performance or cost reduction potential of advanced technology. [52] GAO-05-365. [53] TSA was required to provide for the screening of all checked baggage for explosives using explosive detection systems by December 31, 2003. See 49 U.S.C. § 44901(d). [54] TSA has projected that the number of originating domestic and international passengers will rise by about 127 million passengers over current levels by 2010. If TSA's current estimate of an average of 0.76 checked bags per passenger were to remain constant through 2010, TSA would be screening about 96 million more bags than it now screens. This could increase airports' need to rely on alternative screening procedures in the future in the absence of additional or more efficient checked baggage screening systems. [55] TSA, Recommended Security Guidelines for Airport Planning, Design and Construction, Revised June 15, 2006. [56] According to TSA, these 250 airports process 99 percent of all checked baggage transported. [57] The President's fiscal year 2008 budget request acknowledges that it does not take into account amounts from the Aviation Security Capital Fund because the Fund was only authorized through fiscal year 2007. As such, although the amount requested for installation reflects an increase of $121 million from the amount specifically appropriated in fiscal year 2007, it also reflects an overall decrease of $129 million in total funding from fiscal year 2007 absent the $250 million previously available from the Fund. [58] The Consolidated Appropriations Act, 2004, prohibited the use of Airport Improvement Program funds for activities related to the installation of in-line explosive detection systems. See Pub. L. No. 108-199, 118 Stat. 3, 283. The Consolidated Appropriations Act, 2005, and the Department of Transportation Appropriations Act, 2006, continued this prohibition. See Pub. L. No. 108-447, 118 Stat. 2809, 3203 (2004); Pub. L. No. 109-115, 119 Stat. 2396, 2400-01 (2005). [59] Consolidated Appropriations Resolution, 2003, Pub. L. No. 108-7, § 367, 117 Stat. 423-24. The letter of intent agreements entered into between TSA and the airport authorities, though not a binding commitment of federal funding, represent TSA's intent to reimburse the airport authority for costs incurred in executing the security improvement project--in future years and up to the agreed upon amount- -contingent upon the receipt and availability of sufficient appropriations to fulfill the agreement. [60] Other transaction agreements are administrative vehicles used by TSA to directly fund airport operators for smaller airport modification projects without undertaking a long-term commitment. These transactions take many forms and are generally not required to comply with federal laws and regulations that apply to contracts, grants, or cooperative agreements; and enable the federal government and others entering into these agreements to freely negotiate provisions that are mutually agreeable. [61] The Aviation Security Capital Fund provides TSA with a mandatory appropriation of $250 million for each of fiscal years 2004 through 2007 in support of airport improvement projects related to the installation of explosive detection systems. See 49 U.S.C. § 44923. A provision of the DHS Appropriations Act, 2004, precluded the use of passenger security fees to establish the capital fund in fiscal year 2004, but the capital fund has been made available to TSA in each of fiscal years 2005 through 2007. Congress must reauthorize the capital fund for it to continue beyond fiscal year 2007. [62] Of the $250 million available through the Aviation Security Capital Fund, $125 million is designated as priority funding to fulfill letters of intent, with the remaining $125 million available for allocation in accordance with a formula based on the size of the airport and risks to aviation security. See 49 U.S.C. § 44923(h). [63] Funds appropriated pursuant to this authorization must follow the same 50 percent split as mandated under the Aviation Security Capital Fund. See 49 U.S.C. § 44923(i). [64] Aviation Security Advisory Committee Working Group Report, Baggage Screening Investment Study Prepared for the Aviation Security Advisory Committee, August 9, 2006. [65] Tax credit bonds are bonds where bondholders receive credit against their federal income tax liabilities instead of cash interest. [66] The Passenger Facility Charge Program allows the collection of PFC fees up to $4.50 for every enplaned passenger at commercial airports controlled by public agencies. Airports use these fees to fund FAA- approved projects that enhance safety, security, or capacity; reduce noise; or increase air carrier competition. [67] U.S. Department of Homeland Security, TSA's Air Cargo Strategic Plan, November 2003. [68] TSA's Office of Intelligence (formerly know as the Transportation Security Intelligence Service) does not independently gather intelligence information but rather produces threat assessments using available intelligence from sources such as DHS's Directorate of Information Analysis, the Federal Bureau of Investigation, and the Central Intelligence Agency. The details of TSA's threat assessment are classified. [69] At the departmental level, DHS does not have any efforts under way specifically aimed at assessing the vulnerabilities of inbound air cargo. However, agency officials stated that the Office of Infrastructure Protection, an office within DHS charged with coordinating national critical infrastructure protection efforts, is coordinating with TSA on conducting risk assessments associated with U.S. airports. [70] A known shipper is an individual or business with an established history of shipping cargo on passenger carriers. [71] 71 Fed. Reg. 30,478 (May 26, 2006). [72] GAO, Aviation Security: Federal Action Needed to Strengthen Domestic Air Cargo Security, GAO-06-76 (Washington, D.C.: October 2005). [73] TSA compliance inspections are fundamentally different from air carriers' inspections of air cargo. TSA inspections are designed to ensure air carrier compliance with air cargo security requirements, while air carrier inspections focus on ensuring that air cargo does not contain an improvised explosive device or human stowaway. [74] The Conference Report accompanying the Department of Homeland Security Appropriations Act, 2006, Pub L. No. 109-90, directed $30 million to the Science and Technology Directorate to conduct three cargo screening pilot programs testing different concepts of operation. See H.R. Conf. Rep. No. 109-241, at 53 (2005). [75] Computer-aided tomography is a method of producing a three- dimensional image of the internal structures of an object from a large series of two-dimensional X-ray images taken around a single axis of rotation. [76] Aviation Security Advisory Committee, Working Group Report, Baggage Screening Investment Study Prepared for the Aviation Security Advisory Committee, August 9, 2006. GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site (www.gao.gov). Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to www.gao.gov and select "Subscribe to Updates." Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000 TDD: (202) 512-2537 Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Gloria Jarmon, Managing Director, JarmonG@gao.gov (202) 512-4400 U.S. Government Accountability Office, 441 G Street NW, Room 7125 Washington, D.C. 20548: Public Affairs: Paul Anderson, Managing Director, AndersonP1@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.