Highway Infrastructure

Federal Efforts to Strengthen Security Should Be Better Coordinated and Targeted on the Nation's Most Critical Highway Infrastructure Gao ID: GAO-09-57 January 30, 2009

The nation's highway transportation system is vast and open--vehicles and their operators can move freely and with almost no restrictions. Securing the U.S. highway infrastructure system is a responsibility shared by federal, state and local government, and the private sector. Within the Department of Homeland Security (DHS), the Transportation Security Administration (TSA) has primary responsibility for ensuring the security of the sector. GAO was asked to assess the progress DHS has made in securing the nation's highway infrastructure. This report addresses the extent to which federal entities have conducted and coordinated risk assessments; DHS has developed a risk-based strategy; and stakeholders, such as state and local transportation entities, have taken voluntary actions to secure highway infrastructure -- and the degree to which DHS has monitored such actions. To conduct this work, GAO reviewed risk assessment results and TSA's documented security strategy, and conducted interviews with highway stakeholders.

Federal entities have several efforts underway to assess threat, vulnerability, and consequence--the three elements of risk--for highway infrastructure; however, these efforts have not been systematically coordinated among key federal partners and the results are not routinely shared. Several component agencies and offices within DHS and the Department of Transportation (DOT) are conducting individual risk assessment efforts of highway infrastructure vulnerabilities, and collectively have completed assessments of most of the critical highway assets identified in 2007. However, key DHS entities reported that they were not coordinating these activities or sharing the results. According to the National Infrastructure Protection Plan, TSA is responsible for coordinating risk assessment programs. Establishing mechanisms to enhance coordination of risk assessments among key federal partners could strengthen and validate assessments and leverage limited federal resources. DHS, through TSA, has developed and implemented a strategy to guide highway infrastructure security efforts, but the strategy is not informed by available risk assessments and lacks some key characteristics GAO has identified for effective national strategies. In May 2007, TSA issued the Highway Modal Annex, which is intended to serve as the principal strategy for implementing key programs for securing highway infrastructure. While its completion was an important first step to guide protection efforts, GAO identified a number of limitations that may influence its effectiveness. For example, the Annex is not fully based on available risk information, although DHS's Transportation Systems -Sector Plan and the National Infrastructure Protection Plan call for risk information to be used to guide all protection efforts. Lacking such information, DHS cannot provide reasonable assurance that its current strategy is effectively addressing security gaps, prioritizing investments based on risk, and targeting resources toward security measures that will have the greatest impact. GAO also identified a number of additional characteristics of effective national strategies that were missing or incomplete in the current Highway Modal Annex. Federal entities, along with other highway sector stakeholders, have taken a variety of actions to mitigate risks to highway infrastructure; however, DHS, through TSA, lacks a mechanism to determine the extent to which voluntary security measures have been employed to protect critical assets. Specifically, highway stakeholders have developed publications and training, conducted research and development activities, and implemented specific voluntary protective measures for infrastructure assets, such as fencing and cameras. However, TSA does not have a mechanism to monitor protective measures implemented for critical highway infrastructure assets, although TSA is tasked with evaluating the effectiveness and efficiency of federal initiatives to secure surface transportation modes. Without such a monitoring mechanism, TSA cannot determine the level of security preparedness of the nation's critical highway infrastructure.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-09-57, Highway Infrastructure: Federal Efforts to Strengthen Security Should Be Better Coordinated and Targeted on the Nation's Most Critical Highway Infrastructure This is the accessible text file for GAO report number GAO-09-57 entitled 'Highway Infrastructure: Federal Efforts to Strengthen Security Should Be Better Coordinated and Targeted on the Nation's Most Critical Highway Infrastructure' which was released on March 9, 2009. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to the Chairman, Committee on Homeland Security, House of Representatives: United States Government Accountability Office: GAO: January 2009: Highway Infrastructure: Federal Efforts to Strengthen Security Should Be Better Coordinated and Targeted on the Nation's Most Critical Highway Infrastructure: GAO-09-57: GAO Highlights: Highlights of GAO-09-57, a report to the Chairman, Committee on Homeland Security, House of Representatives. Why GAO Did This Study: The nation‘s highway transportation system is vast and open”vehicles and their operators can move freely and with almost no restrictions. Securing the U.S. highway infrastructure system is a responsibility shared by federal, state and local government, and the private sector. Within the Department of Homeland Security (DHS), the Transportation Security Administration (TSA) has primary responsibility for ensuring the security of the sector. GAO was asked to assess the progress DHS has made in securing the nation‘s highway infrastructure. This report addresses the extent to which federal entities have conducted and coordinated risk assessments; DHS has developed a risk-based strategy; and stakeholders, such as state and local transportation entities, have taken voluntary actions to secure highway infrastructure ” and the degree to which DHS has monitored such actions. To conduct this work, GAO reviewed risk assessment results and TSA‘s documented security strategy, and conducted interviews with highway stakeholders. What GAO Found: Federal entities have several efforts underway to assess threat, vulnerability, and consequence”the three elements of risk”for highway infrastructure; however, these efforts have not been systematically coordinated among key federal partners and the results are not routinely shared. Several component agencies and offices within DHS and the Department of Transportation (DOT) are conducting individual risk assessment efforts of highway infrastructure vulnerabilities, and collectively have completed assessments of most of the critical highway assets identified in 2007. However, key DHS entities reported that they were not coordinating these activities or sharing the results. According to the National Infrastructure Protection Plan, TSA is responsible for coordinating risk assessment programs. Establishing mechanisms to enhance coordination of risk assessments among key federal partners could strengthen and validate assessments and leverage limited federal resources. DHS, through TSA, has developed and implemented a strategy to guide highway infrastructure security efforts, but the strategy is not informed by available risk assessments and lacks some key characteristics GAO has identified for effective national strategies. In May 2007, TSA issued the Highway Modal Annex, which is intended to serve as the principal strategy for implementing key programs for securing highway infrastructure. While its completion was an important first step to guide protection efforts, GAO identified a number of limitations that may influence its effectiveness. For example, the Annex is not fully based on available risk information, although DHS‘s Transportation Systems -Sector Plan and the National Infrastructure Protection Plan call for risk information to be used to guide all protection efforts. Lacking such information, DHS cannot provide reasonable assurance that its current strategy is effectively addressing security gaps, prioritizing investments based on risk, and targeting resources toward security measures that will have the greatest impact. GAO also identified a number of additional characteristics of effective national strategies that were missing or incomplete in the current Highway Modal Annex. Federal entities, along with other highway sector stakeholders, have taken a variety of actions to mitigate risks to highway infrastructure; however, DHS, through TSA, lacks a mechanism to determine the extent to which voluntary security measures have been employed to protect critical assets. Specifically, highway stakeholders have developed publications and training, conducted research and development activities, and implemented specific voluntary protective measures for infrastructure assets, such as fencing and cameras. However, TSA does not have a mechanism to monitor protective measures implemented for critical highway infrastructure assets, although TSA is tasked with evaluating the effectiveness and efficiency of federal initiatives to secure surface transportation modes. Without such a monitoring mechanism, TSA cannot determine the level of security preparedness of the nation‘s critical highway infrastructure. What GAO Recommends: GAO recommends that DHS establish a mechanism to enhance coordination of risk assessments; TSA address limitations in its documented security strategy for highway infrastructure; and that TSA develop a mechanism to monitor security measures for critical highway infrastructure. DHS and TSA concurred with these recommendations. To view the full product, including the scope and methodology, click on [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-09-57]. For more information, contact Cathleen Berrick at (202) 512-3404 or berrickc@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: Federal Entities Have Initiated Efforts to Assess Risks to Highway Infrastructure, But Coordination of These Efforts is Limited: DHS's Strategy to Secure Highway Infrastructure Was Not Fully Informed by Available Risk Information, and Should be Strengthened: Government and Industry Stakeholders Have Efforts Underway to Enhance the Security of Highway Infrastructure, but TSA Lacks a Mechanism to Monitor Implementation of Voluntary Security Measures: Conclusions: Recommendations for Executive Action: Agency Comments and Our Evaluation: Appendix I: Objectives, Scope and Methodology: Appendix II: Selected Laws and Federal Guidance Concerning the Security of Highway Infrastructure, 1996 to Present: Appendix III: Examples of Selected Protective Security Measures that Could be Implemented by Asset Owners and Operators: Appendix IV: Summary of Selected Federal and Non-Federal Research and Development Programs to Enhance Highway Infrastructure: Appendix V: Comments from the Department of Homeland Security: Appendix VI: GAO Contact and Staff Acknowledgments: Tables: Table 1: Summary of Federal Risk Assessment Activities for Highway Infrastructure: Table 2: Summary of Key Programs and Activities to Enhance Security of Highway Infrastructure: Table 3: FEMA Grant Funding for Highway Infrastructure-Related Security Projects, 2004 to 2007: Figures: Figure 1: Multiple Stakeholders Involved In Highway Infrastructure Security: Figure 2: NIPP Risk Management Framework: Abbreviations: 9/11 Commission Act: Implementing Recommendations of the 9/11 Commission Act: AASHTO: American Association of State Highway and Transportation Officials: ATSA: Aviation and Transportation Security Act: BEL: Bridge Explosives Loading: BZPP: Buffer Zone Protection Program: CBP: U.S. Customs and Border Protection: CIKR: critical infrastructure and key resources: CIP: Critical Infrastructure Protection: CSR: Corporate Security Review: DHS: Department of Homeland Security: DOD: Department of Defense: DOT: U.S. Department of Transportation: FEMA: Federal Emergency Management Agency: FHWA: Federal Highway Administration: FMCSA: Federal Motor Carrier Safety Administration: GCC: Government Coordinating Council: GPRA: Government Performance and Results Act: HITRAC: Homeland Infrastructure Threat and Risk Analysis Center: HMC: Highway and Motor Carrier Division: HSIN: Homeland Security Information Network: HSPD-7: Homeland Security Presidential Directive-7: HSPD-8: Homeland Security Presidential Directive-8: I&A: Office of Intelligence and Analysis: IP: Office of Infrastructure Protection: ISAC: Information Sharing Analysis Center: LLIS: Lessons Learned Information System: MOU: memorandum of understanding: MSRAM: Maritime Security Risk Analysis Model: NCHRP: National Cooperative Highway Research Programs: NIPP: National Infrastructure Protection Plan: NISAC: National Infrastructure Simulation and Analysis Center: NPPD: National Protection and Programs Directorate: NSTS: National Strategy for Transportation Security: OI: Office of Intelligence: OMB: Office of Management and Budget: PDD-63: Presidential Decision Directive 63: PSA: Protective Security Advisor: S&T: Directorate Directorate for Science and Technology: SAV: Site Assistance Visit: SCC: Highway Sector Coordinating Council: SHIRA: Strategic Homeland Infrastructure Risk Assessment: SSA: Sector-Specific Agency: TPFS: Transportation Pooled Fund Study: TRB: Transportation Research Board: TSA: Transportation Security Administration: TSP: Trucking Security Program: TSSP: Transportation Systems Sector-Specific Plan: U.S. Template: Universal Security Template: USCG: U.S. Coast Guard: VIPR: Visible Intermodal Prevention and Response: [End of section] United States Government Accountability Office: Washington, DC 20548: January 30, 2009: The Honorable Bennie G. Thompson: Chairman: Committee on Homeland Security: House of Representatives: According to the Federal Highway Administration (FHWA), the nation's highway transportation system includes approximately four million miles of roadways, 600,000 bridges, and 50 tunnels over 500 meters in length. This system supports 86 percent of all personal travel, moves 80 percent of the nation's freight (based on value), and serves as a key component in national defense mobility. The U.S. highway system is particularly vulnerable to potential terrorist attacks because of its openness--vehicles and their operators can move freely and with almost no restrictions, and some bridge and tunnel elements are easily accessible and located in isolated areas making them more challenging to secure. Failure to prepare for a terrorist attack against critical highway infrastructure could, according to security experts, lead to catastrophic loss of life and economic disruption estimated to be in the billions of dollars. Thus, the challenge of effectively securing the nation's highway infrastructure against legitimate threats involves balancing the cost and effectiveness of implementing security measures while not impeding the free flow of people and commerce. Securing the nation's highway infrastructure system is a responsibility shared by federal, state and local governments, and the private sector. Within the Department of Homeland Security (DHS), the Transportation Security Administration (TSA) has primary responsibility for ensuring the security of highway infrastructure. DHS's Infrastructure Protection (IP) Office, whose mission includes leading the coordinated national effort to reduce the risk to critical infrastructure and key resources posed by acts of terrorism, supports TSA's efforts to protect highway infrastructure.[Footnote 1] In addition, the U.S. Coast Guard (USCG) is the lead federal agency responsible for the security of the nation's ports and waterways, which may include highway assets that have a maritime nexus, such as bridges. In conjunction with highway infrastructure stakeholders, such as state and local governments, the federal government is involved in a range of security efforts, including conducting risk assessments, providing guidance and training to asset owners, and conducting research and development activities, among others. The federal government is also responsible for providing some funding assistance to highway infrastructure stakeholders. However, the bulk of the responsibility for implementing specific security measures falls largely on state and local governments who own most highway infrastructure, although independent entities, such as public authorities and private entities, own a limited number of major, iconic structures. You asked us to assess the progress DHS has made in securing the nation's highway infrastructure. This report answers the following questions: * To what extent have federal entities assessed the risks to the nation's highway infrastructure and coordinated these efforts? * To what extent has DHS developed a risk-based strategy, consistent with applicable federal guidance and characteristics of an effective national strategy, to guide its highway infrastructure security efforts? * What actions have government and highway sector stakeholders taken to secure highway infrastructure, and to what extent has DHS monitored the implementation of asset-specific protective security measures? To identify what efforts federal entities have taken to assess the risk to highway infrastructure and coordinated their efforts, we obtained and analyzed risk assessment data from DHS and the Department of Transportation (DOT), comprised of various threat, vulnerability, and consequence related assessments for highway infrastructure assets. [Footnote 2] We sought to determine the reliability of these data by, among other things, obtaining information on the processes used for collecting and maintaining written data from agency officials. On the basis of our review of the processes used to collect the data, we determined that the data were sufficiently reliable for the purposes of this report. We interviewed DHS, DOT and selected state transportation, homeland security, and law enforcement officials, associations representing highway infrastructure owners and operators, and members of the Highway Government Coordinating Council (GCC) and the Highway Sector Coordinating Council (SCC), to discuss federal risk assessment efforts.[Footnote 3] We also obtained information on federal coordination and collaboration activities from TSA and highway infrastructure stakeholders and compared these efforts to the coordination requirements established in Homeland Security Presidential Directive-7, as well as GAO's recommended practices for effective collaboration.[Footnote 4] To assess the extent to which DHS developed a risk-based strategy consistent with applicable federal guidance, including the National Infrastructure Protection Plan (NIPP) and the Transportation Systems Sector-Specific Plan (TSSP) and best practices to guide its highway infrastructure security efforts, we reviewed federal agency reports, guidelines, and infrastructure security studies on risk management sponsored by industry associations. We also interviewed DHS and DOT officials, state, and industry association highway infrastructure representatives regarding their use of risk management principles for protecting highway infrastructure. As the principal strategy for protecting the nation's highway infrastructure, we also analyzed TSA's Highway Modal Annex to determine how it aligned with the requirements set out in Executive Order 13416, Strengthening Surface Transportation Security.[Footnote 5] In addition, we assessed the extent to which the Highway Modal Annex contained the desirable characteristics for an effective national strategy that we have previously identified.[Footnote 6] To identify the actions taken by government and highway sector stakeholders to enhance the security of highway infrastructure and assess the extent to which DHS through TSA monitored the implementation of asset specific protective security measures implemented by stakeholders, we interviewed DHS, DOT, and the Department of Defense (DOD), and selected state transportation and homeland security officials; associations representing highway infrastructure operators; and the chairpersons of the Highway GCC and SCC. Although the perspectives of the state transportation and homeland security officials we spoke with cannot be generalized across the wider population of highway infrastructure owners and operators, they provided us a broad overview of highway infrastructure asset security. We selected the associations that we spoke with based on input from TSA, FHWA, and industry stakeholders who identified the major associations representing highway infrastructure owners and operators. We also analyzed TSA reviews of security practices at the state level and records of GCC and SCC meetings and stakeholder conferences. In addition, we selected 12 bridges and 1 tunnel to observe security measures implemented since September 11, 2001, and to discuss security- related issues with highway infrastructure owners and operators. We selected these assets based on criteria including location, ownership, and importance or criticality. We also considered input from TSA, DOT, and the American Association of State Highway and Transportation Officials (AASHTO) to help ensure that selected assets represented those that have implemented a range of security measures--from minimal to more robust.[Footnote 7] Due to the limited number of assets in our sample, and because the selected assets did not constitute a representative sample, the results of our observation and analysis cannot be generalized to the universe of highway infrastructure assets. However, our observations provided us with an overview of the kinds of security measures implemented at some critical infrastructure since September 11, 2001 as well as perspectives on issues highway infrastructure owners and operators face. We also compared TSA's actions to obtain data on actions taken by highway infrastructure stakeholders to enhance security and to monitor implementation of those actions with criteria in Standards for Internal Control in the Federal Government.[Footnote 8] We conducted this performance audit from May 2007 through January 2009 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Appendix I provides additional details about our scope and methodology. Results in Brief: Federal entities have several efforts underway to assess threat, vulnerability, and consequence--the three elements of risk--for highway infrastructure; however, these assessments have not been systematically coordinated among federal partners. DHS entities--including TSA, the DHS Office of Intelligence and Analysis (I&A), and USCG--each conduct efforts to assess the threats posed to highway infrastructure. For example, the threat assessments developed for the highway sector by TSA's Office of Intelligence (OI) include information about general terrorist activity worldwide and provides additional threat and suspicious incident information to key federal and nonfederal highway infrastructure stakeholders as needed. In addition, TSA's OI has also developed likelihood estimates for specific threat scenarios involving highway infrastructure. The threat information contained in these products is used to identify specific attack scenarios which serve as an input for the other two components of a risk assessment--assessing the potential vulnerabilities to and consequences of an attack on highway assets. Federal entities have several programs underway to assess the vulnerability of highway infrastructure assets; however, the scope and purpose of these individual efforts vary considerably. For example, TSA conducts reviews of security practices at the state level through its Corporate Security Review (CSR) program to develop a baseline assessment of security nationwide. These reviews have been completed in most states to date, as well as on a select number of individual assets. While TSA's CSR assessments have a wide scope, IP, USCG, and FHWA operate programs that assess the security vulnerabilities of specific highway assets. However, the various assessments conducted to date were not well coordinated among these key federal partners, and the results have not been routinely shared. According to the NIPP, TSA is responsible for, among other things, coordinating and facilitating comprehensive risk assessment programs for the transportation sector. Our previous work has also shown that one of the principal characteristics of effective collaboration among federal agencies is leveraging available resources.[Footnote 9] Without coordinating risk assessment activities and sharing the results, federal entities are missing opportunities to leverage resources and facilitate protection efforts for the greatest number of critical assets. DHS, through TSA, has developed a strategy to guide highway infrastructure security efforts, but the strategy was not fully informed by available risk assessments, as provided for in federal guidance, and lacks key characteristics that we have identified for an effective national strategy. In accordance with Executive Order 13416, in May 2007, TSA issued the Highway Modal Annex, which serves as the principal strategy for implementing key protective programs for securing the nation's highway infrastructure. While the completion of the Annex is an important first step in guiding national efforts to protect highway infrastructure, it does not fully incorporate existing risk assessment results to inform and prioritize security efforts. Specifically, according to TSA, the Annex incorporates threat assessment results; however, it is not based on vulnerability and consequence information available from completed federal risk assessments as required by the NIPP and the TSSP. Without considering the results of completed vulnerability and consequence assessments, DHS cannot provide reasonable assurance that its strategy is addressing those areas of greatest risks or that its resources are being prioritized and allocated most effectively and efficiently. In addition, we identified areas where the Annex can be strengthened to be more consistent with Executive Order 13416. For example, the Executive Order requires that the Annex define roles and responsibilities of various stakeholders, yet the Annex only identifies a limited number of stakeholders and does not describe their roles and responsibilities. With so many distinct stakeholders, clearly defined roles and responsibilities for protecting highway infrastructure are vital to help ensure that assets are protected. The Annex also lacks characteristics of an effective national strategy--such as the inclusion of performance goals and measures with which to assess the program's overall progress toward securing highway infrastructure. Without performance measures and an evaluation of the effectiveness of the Annex's goals and objectives, TSA does not have meaningful information from which to determine whether the strategy is achieving its intended results and to target any needed improvements. According to TSA officials, the Annex was developed under a relatively short timeframe, which limited government and industry stakeholders' input to support its development, but TSA officials anticipate that future revisions will contain more detailed information. Federal entities, along with state and industry stakeholders, have various efforts underway to mitigate risks to highway infrastructure; however, TSA lacks a mechanism to monitor the extent to which highway infrastructure owners have implemented voluntary protective security measures. Efforts taken by federal and non-federal stakeholders to secure highway infrastructure include a combination of publications and training for infrastructure owners and operators, research and development activities, and implementation of specific protective measures intended to enhance the security of infrastructure assets. For example, AASHTO, in conjunction with the FHWA and TSA, has developed and issued several key publications to support states' efforts to identify critical assets, perform risk assessments, and develop potential countermeasures. A combination of federal and state-led research efforts have also served to identify methods to help protect highway infrastructure, such as the development of measures to reduce the vulnerability of flooding in underwater tunnels and potential attacks to bridge support cables. For example, in fiscal year 2008, the Science and Technology (S&T) Directorate, whose responsibilities include advising the Secretary of Homeland Security on research and development efforts, began to evaluate blast effects and mitigation measures for dams, tunnels, and bridges. In addition to these efforts, infrastructure owners and operators implemented a range of voluntary protective security measures, such as the installation of cameras and fencing to help control access to vulnerable structures. However, while TSA, through its CSR program, has determined that asset owners are implementing protective actions to secure highway infrastructure, the agency does not have a mechanism to monitor the extent to which specific protective security measures have been implemented for the nation's critical highway infrastructure. According to Executive Order 13416, DHS, through TSA, is tasked with assessing the security of each transportation mode and evaluating the effectiveness and efficiency of current federal government surface transportation security initiatives. Lacking a mechanism to monitor the implementation of voluntary protective security measures, and without evaluating the effectiveness and efficiency of these measures, TSA cannot reasonably determine the level of overall security preparedness for highway infrastructure assets deemed nationally critical. In order to strengthen collaboration between federal stakeholders involved in securing highway infrastructure, we are recommending that DHS establish a mechanism to systematically coordinate risk assessment activities and share the results of these activities among federal stakeholders. In addition, we are recommending that TSA, in consultation with the Highway GCC and the Highway SCC, incorporate the results of completed risk assessments in future revisions of the Highway Modal Annex; provide clarification of federal and non federal roles and responsibilities related to highway infrastructure protection; and establish timeframes for developing performance goals and measures for highway infrastructure security programs, among other things. Finally, we are recommending that TSA develop a mechanism to monitor the implementation of protective security measures for highway infrastructure assets identified as nationally critical. We provided a draft of this report to DHS for review. In its written comments, DHS concurred with the recommendations. However, DHS stated that TSA officials believe that GAO has misstated a key fact involving TSA's desire and intention to conduct individual vulnerability assessments on critical highway structures. Specifically, TSA noted that the report indicates that TSA has not decided whether to conduct such assessments or determined that they do not need to be done. Furthermore, TSA stated that it intends to conduct individual assessments on all bridge and tunnel properties that TSA has identified as critical beginning in 2009. Throughout this review, TSA officials repeatedly told us that it would utilize primarily a non asset-specific approach to conducting vulnerability assessments of the highway infrastructure sector, through the Corporate Security Review program. TSA did not make us aware of its plans to conduct individual vulnerability assessments of critical assets until it provided formal written comments on a draft of this report in January, 2009. While we acknowledge TSA's plans to conduct individual vulnerability assessments on all critical highway infrastructure assets, we do not believe the agency's recently reported plans to conduct these assessments affect the findings of this report. Nevertheless, we added a discussion to this report to clarify TSA's plans related to vulnerability assessments. Background: The nation's highway transportation system includes infrastructure, vehicles and users, equipment, facilities, and control and communications. Infrastructure or the "fixed" aspect of the highway transportation system includes roads, bridges, tunnels, and terminals, where travelers and freight can enter and leave the system. Many vehicle types operate on the highway system, moving both people and freight. Highway system users include commercial vehicle and private passenger drivers, cargo shippers and receivers, passengers, and pedestrians. Equipment refers to items such as machinery, cones, barriers and bollards used to create stand off distance. Facilities include terminals, warehouses, depots, and other transportation- related buildings that support the highway system. Finally, control and communications are methods for controlling vehicles, infrastructure, and the entire transportation network. These items include traffic lights, message signs, call boxes, ramp metering, closed circuit television and speed monitoring systems. Although these security enhancements are typically funded by the asset owner, the Federal Emergency Management Agency (FEMA) has provided funding to secure highway infrastructure through its grant programs. DHS funding for highway infrastructure security consists of a general appropriation to TSA for its entire surface transportation security program, which includes commercial vehicles and highway infrastructure, rail and mass transit, and pipeline security, and appropriations to FEMA for its Homeland Security Grant Program and Infrastructure Protection Program.[Footnote 10] Annual appropriations to TSA for its surface transportation security program were $36 million in fiscal year 2006, $37.2 million in fiscal year 2007, $46.6 million in fiscal year 2008, and $49.6 million in fiscal year 2009. Total FEMA funding available under the two principal grant programs increased from approximately $2 billion to over $2.5 billion from fiscal years 2006 through 2008. Multiple Stakeholders Share Responsibility for Securing Highway Infrastructure: Protecting the nation's highway infrastructure can be complicated due to the number of stakeholders involved. As illustrated in figure 1, numerous entities at the federal, state, and local levels, including public and private sector owners and operators, play a key role in highway infrastructure security. Highway infrastructure in the United States is owned and operated by a combination of federal entities, states, counties, municipalities, tribal authorities, private enterprise, and groupings of these entities. Although state and local governments own, operate, and have law enforcement jurisdiction over most of the highway infrastructure in the United States, bridge and turnpike authorities operate some major infrastructure, and there are a few privately owned bridges, tunnels, and roadways. Figure 1: Multiple Stakeholders Involved In Highway Infrastructure Security: [Refer to PDF for image: illustration] Federal stakeholders: Science and Technology Directorate; Federal Emergency Management Agency; Federal Highway Administration; Transportation Security Administration; Customs and Border Protection; U.S. Coast Guard; Office of Infrastructure Protection. State and local stakeholders: State homeland security; State and local transportation; Public authorities. Private owners and operators: Private sector. Associations: Associations. Councils: Highway Government Coordinating Council; Highway Sector Coordinating Council. Source: GAO analysis. [End of figure] DHS is the cabinet level department with primary responsibility for helping to secure highway infrastructure.[Footnote 11] Within DHS, TSA has primary responsibility for securing all modes of transportation, including highway infrastructure with support from other DHS entities including the National Protection and Programs Directorate (NPPD), USCG, Science and Technology Directorate, FEMA, and U.S. Customs and Border Protection (CBP). For example, as part of its mission, CBP is responsible for preventing people or goods that could threaten infrastructure from entering ports of entry. Although TSA is the lead agency responsible for the security of highway infrastructure, DOT, through FHWA, provides highway transportation expertise to assist TSA with respect to securing highway infrastructure.[Footnote 12] NPPD, through IP, is responsible for coordinating efforts to protect the nation's most critical assets across all critical infrastructure and key resources, which includes surface transportation. Within the transportation sector, IP works with TSA to identify nationally critical highway assets. USCG also conducts activities in support of highway infrastructure protection, such as identifying potential vulnerabilities of individual highway assets that have a maritime nexus or that affect the marine transportation system, such as bridges over navigable waterways. The Science and Technology Directorate is responsible for advising the Secretary on research and development efforts to support the Department's mission and conducts research to identify and mitigate vulnerabilities to bridges and tunnels. FEMA is responsible for awarding and administering DHS grant funds in conjunction with responsible program offices. While federal stakeholders play a role in facilitating risk-based infrastructure security efforts, implementation of asset-specific protective security measures remains the responsibility of individual asset owners- operators, most commonly states or other public entities. A number of national organizations and coordination groups exist to represent the broad composition of public and private sector highway infrastructure stakeholders. At the state level, representation is provided by AASHTO. To date, AASHTO has played a key role in representing state interests related to protecting highway infrastructure and routinely collaborates with federal entities to assist their members in enhancing infrastructure security. In April 2006, the Highway GCC was established to foster communication across government agency lines, and between the government and private industry, in support of the nation's homeland security mission. The Highway GCC membership largely consists of key Federal departments and stakeholders responsible for or involved with highway and motor carrier security, but also includes key entities such as AASHTO. The objective of the Highway GCC is to coordinate highway and motor carrier security strategies and activities; establish policies, guidelines and standards; and develop program metrics and performance criteria for the highway mode. The counterpart to the Highway GCC is the Highway SCC. This group is comprised of private sector owners and operators and representative associations of highway and motor carrier assets. The Highway SCC is an industry advisory body that, as appropriate, is to coordinate the private industry perspective on highway and motor carrier security policy, practices, and standards that affect the highway mode. Laws and Federal Guidance Concerning the Security of Highway Infrastructure: Federal laws and directives call for critical infrastructure protection activities to help secure infrastructure assets that are essential to national security. While a number of federal laws impose safety requirements on highway infrastructure, no federal laws explicitly require highway infrastructure operators to take action to safeguard their assets against a terrorist attack. In November 2001, the Aviation and Transportation Security Act (ATSA) generally required TSA to (1) receive, assess, and distribute intelligence information related to transportation security; (2) assess threats to transportation security and develop policies, strategies, and plans for dealing with those threats, including coordinating countermeasures with other federal organizations; and, (3) enforce security-related regulations and requirements.[Footnote 13] Further, in November 2002, the Homeland Security Act of 2002 created DHS and mandated IP to comprehensively assess the vulnerabilities of the critical infrastructure and key resources of the United States; integrate relevant information, intelligence analyses, and vulnerability assessments to identify protective priorities and support implemented protective security measures; and develop a comprehensive national plan for securing the key resources and critical infrastructures of the United States. [Footnote 14] The Intelligence Reform and Terrorism Prevention Act of 2004 also requires DHS to develop and implement a National Strategy for Transportation Security to include an identification and evaluation of the transportation assets that must be protected from attack or disruption, the development of risk-based priorities for addressing security needs associated with such assets, means of defending such assets, a strategic plan that delineates the roles and missions of various stakeholders, a comprehensive delineation of response and recovery responsibilities, and a prioritization of research and development objectives.[Footnote 15] More recently, in August 2007, the Implementing Recommendations of the 9/11 Commission Act (9/11 Commission Act), among other things, specified that the transportation modal security plans, including the plan for highways, required by the Intelligence Reform and Terrorism Prevention Act must include threats, vulnerabilities, and consequences, and requires DHS to establish a Transportation Security Information Sharing Plan.[Footnote 16] The President has also issued directives concerning protecting critical infrastructure. In May 1998, Presidential Decision Directive 63 (PDD- 63) established critical infrastructure protection as a national goal and presented a strategy for cooperative efforts by the government and infrastructure stakeholders to protect the physical and cyber-based systems essential to the minimum operations of the economy and the government. In addition, in December 2003, HSPD-7 was issued, superseding PDD-63. HSPD-7 defines responsibilities for DHS, federal stakeholders that are responsible for addressing specific critical infrastructure sectors--sector-specific agencies, and other departments and stakeholders. HSPD-7 instructs these sector-specific agencies to collaborate with all relevant Federal departments and agencies, State and local governments, and the private sector, including with key persons and entities in their infrastructure sector; conduct or facilitate vulnerability assessments of the sector; and encourage risk management strategies to protect against and mitigate the effects of attacks against critical infrastructure and key resources. HSPD-7 designates DHS as responsible for, among other things, coordinating national critical infrastructure protection efforts and establishing uniform policies, approaches, guidelines, and methodologies for integrating federal infrastructure protection and risk management activities within and across sectors. Moreover, Homeland Security Presidential Directive-8 (HSPD-8), issued at the same time as HSPD-7, directs DHS to coordinate the development of an all-hazards National Preparedness Goal that establishes measurable priorities, targets, standards for preparedness assessments and strategies, and a system for assessing the Nation's overall level of preparedness. Further, in December 2006 the President issued Executive Order 13416, which focused on strengthening the security of surface transportation modes and requires DHS to assess the security of each surface transportation mode and evaluate the effectiveness and efficiency of current surface transportation security initiatives.[Footnote 17] For additional key federal laws and guidance related to critical highway infrastructure protection, see Appendix II. Risk Management Approach to Guide Homeland Security Investments: Recognizing that each sector possesses its own unique characteristics and risk landscape, HSPD-7 designates Federal Government Sector Specific Agencies (SSAs) for each of the critical infrastructure sectors who are to work with DHS to improve critical infrastructure security. On June 30, 2006, DHS released the NIPP, which developed--in accordance with HSPD-7--a risk-based framework for the development of Sector-Specific Agency (SSA) strategic plans. The NIPP defines roles and responsibilities for security partners in carrying out critical infrastructure and key resources (CIKR) protection activities through the application of risk management principles. Figure 2 illustrates the several interrelated activities of the risk management framework as defined by the NIPP, including setting security goals and performance targets, identifying key assets and sector information, and assessing risk information including both general and specific threat information, potential vulnerabilities, and the potential consequences of a successful terrorist attack. The NIPP requires that federal agencies use this information to inform the selection of risk-based priorities and for the continuous improvement of security strategies and programs to protect people and critical infrastructure through the reduction of risks from acts of terrorism. Figure 2: NIPP Risk Management Framework: [Refer to PDF for image: illustration] NIPP Risk Management Framework: Physical; Cyber; Human: * Set security goals; * Identify assets, systems, networks, and functions; * Assess risks (consequences, vulnerabilities, and threats); * Prioritize; * Implement protective programs; * Measure effectiveness; Feedback loop: to each aspect of the framework: Continuous improvement to enhance protection of critical infrastructure and key resources. Source: DHS. [End of figure] The NIPP risk management framework consists of the following interrelated activities: * Set security goals: Define specific outcomes, conditions, end points, or performance targets that collectively constitute an effective protective posture. * Identify assets, systems, networks, and functions: Develop an inventory of the assets, systems, and networks that comprise the nation's critical infrastructure, key resources, and critical functions. Collect information pertinent to risk management that takes into account the fundamental characteristics of each sector. * Assess risks: Determine risk by combining potential direct and indirect consequences of a terrorist attack or other hazards (including seasonal changes in consequences, and dependencies and interdependencies associated with each identified asset, system, or network), known vulnerabilities to various potential attack vectors, and general or specific threat information. * Prioritize: Aggregate and analyze risk assessment results to develop a comprehensive picture of asset, system, and network risk; establish priorities based on risk; and determine protection and business continuity initiatives that provide the greatest mitigation of risk. * Implement protective programs: Select sector-appropriate protective actions or programs to reduce or manage the risk identified, and secure the resources needed to address priorities. * Measure effectiveness: Use metrics and other evaluation procedures at the national and sector levels to measure progress and assess the effectiveness of the national Critical Infrastructure and Key Resources protection program in improving protection, managing risk, and increasing resiliency. Federal Entities Have Initiated Efforts to Assess Risks to Highway Infrastructure, But Coordination of These Efforts is Limited: Several federal entities have efforts underway to assess threat, vulnerability, and consequence--the three elements of risk--for highway infrastructure; however, these assessments have not been systematically coordinated among key federal partners. DHS agencies and offices, including TSA, I&A, and USCG, each have efforts underway to assess the threats posed to highway infrastructure, including the most likely tactics that terrorists may use and potential targets. Federal agencies are also assessing the security vulnerabilities of and consequences of an attack on highway assets to some degree, although the scope and purpose of these individual efforts vary considerably. However, the risk assessment activities conducted to date have not been systematically coordinated among the federal partners. Given competing departmental priorities and limited resources identified by TSA and IP officials, it is important for federal stakeholders to coordinate their efforts and share available risk information to avoid potential duplication, better focus future assessment efforts, and leverage limited resources. Federal Stakeholders Have Taken Actions to Assess Risks to Highway Infrastructure: Several DHS stakeholders play a role in securing highway infrastructure, including TSA, I&A, IP, and USCG--along with FHWA within DOT. Collectively, they have a number of independent efforts underway to conduct threat, vulnerability, and consequence assessments of highway assets. Although the scope and purpose of these individual efforts vary by entity and are at various levels of completion, they have been used to a limited extent to assess the general state of security for the sector, and to identify potential security enhancements for a majority of highway infrastructure assets identified as nationally critical. See table 1 for a summary of federal risk assessment activities related to highway infrastructure assets. Table 1: Summary of Federal Risk Assessment Activities for Highway Infrastructure: Transportation Security Administration (TSA): Agency/Office: Office of Intelligence; Program/Activity: Highway Threat Assessments; Description: Provides an overview of threats--including key actors and possible attack tactics and targets--to the National Highway System and its critical infrastructure. Includes incidents of interest and suspicious activity targeting various highway modes (e.g. bridges, tunnels) in the United States and overseas; Risk Component: Threat: [Check]; Risk Component: Vulnerability: [Empty]; Risk Component: Consequence: [Empty]. Agency/Office: Highway and Motor Carrier Division (HMC); Program/Activity: Corporate Security Reviews (CSRs); Description: TSA conducts CSRs with state DOTs to establish baseline data to assess the state of security nationwide and identify common practices used to secure highway infrastructure. In conjunction with the State CSRs, HMC has also conducted a limited number of asset- specific CSRs; Risk Component: Threat: [Empty]; Risk Component: Vulnerability: [Check]; Risk Component: Consequence: [Empty]. Office of Infrastructure Protection (IP)/DHS Office of Intelligence and Analysis (I&A): Agency/Office: Homeland Infrastructure Threat and Risk Analysis Center (HITRAC)[A]; Program/Activity: Strategic Homeland Infrastructure Risk Assessment (SHIRA); Description: Provides a national overview of current high-risk scenarios for critical infrastructure across all industry sectors, including attacks on select highway infrastructure. Scenarios are identified on the basis of available threat information, perceived vulnerabilities of the sector, and the potential consequences of a successful attack; Risk Component: Threat: [Check]; Risk Component: Vulnerability: [Check]; Risk Component: Consequence: [Check]. Agency/Office: Office of Infrastructure Protection; Program/Activity: Site Assistance Visits (SAVs) & Buffer Zone Protection Program (BZPP); Description: These programs are intended to provide DHS and applicable stakeholders with detailed information about asset vulnerabilities to help it identify potential mitigation efforts and reduce potential consequences of an attack; * SAV: Facility-level assessments conducted by a federally-led team in partnership with asset owners. Mitigation measures to address identified vulnerabilities are provided to owners as "options for consideration"; * BZPP: An assessment conducted by local law enforcement of the "buffer area" in the vicinity of critical infrastructure which may be used to conduct surveillance or an attack. The results are utilized to identify resource needs and develop a purchasing plan, funded through a DHS grant program, to reduce vulnerabilities and mitigate potential consequences; Risk Component: Threat: [Empty]; Risk Component: Vulnerability: [Check]; Risk Component: Consequence: [Check]. Agency/Office: Office of Infrastructure Protection; Program/Activity: Tier 1/Tier 2 Program[B]; Description: In conjunction with SSAs and state Homeland Security Advisors, this effort identifies nationally significant, high- consequence assets and systems that, if destroyed or disrupted, could cause significant casualties, major economic losses, or widespread and long-term disruptions to national well-being and governance capacity. The Tier 2 CIKR assets include nationally-significant and high- consequence assets. Tier 1 assets are a small subset of the Tier 2 list that include assets and systems certain to produce the most significant consequences; Risk Component: Threat: [Empty]; Risk Component: Vulnerability: [Empty]; Risk Component: Consequence: [Check]. U.S. Coast Guard (USCG): Agency/Office: Port Security Specialists; Program/Activity: Maritime Security Risk Analysis Model (MSRAM); Description: USCG conducts assessments on key maritime bridges and tunnels with a maritime nexus, as part of its annual risk assessment of each port, via the MSRAM; Risk Component: Threat: [Check]; Risk Component: Vulnerability: [Check]; Risk Component: Consequence: [Check]. Agency/Office: Port Security Assessment Teams; Program/Activity: Terrorist; Operations Assessments; Description: From 2004 through 2005, USCG also conducted port-wide vulnerability assessments at several of the nation's most critical ports. These assessments, in part, targeted key bridges and tunnels that had not undergone any other federal assessments; Risk Component: Threat: [Empty]; Risk Component: Vulnerability: [Check]; Risk Component: Consequence: [Empty]. Federal Highway Administration (FHWA): Agency/Office: Office of Infrastructure; Program/Activity: Vulnerability Assessments; Description: FHWA conducts vulnerability assessments and provides subject matter expertise and technical assistance upon request to DHS/TSA; state, local, and tribal governments; private sector stakeholders; and infrastructure owners; Risk Component: Threat: [Empty]; Risk Component: Vulnerability: [Check]; Risk Component: Consequence: [Empty]. Source: GAO analysis. [A] HITRAC represents a joint effort between IP and the Critical Infrastructure Threat Analysis Division within I&A. [B] Assets identified as nationally significant through this program are placed into two distinct tiers based on the estimated consequences to the nation. [End of table] Threat Assessments: DHS stakeholders develop a combination of products that identify what they have determined to be the most probable threat scenarios involving highway infrastructure. For example, TSA's OI issues an annual threat assessment of the U.S. highway system and provides additional threat and suspicious incident information to key federal and nonfederal highway infrastructure stakeholders as needed.[Footnote 18] Recent suspicious activity involving highway infrastructure reported by the media could suggest potential terrorist plans to attack the nation's highway system. For example, in July 2008, the media reported a U.S.- educated female Pakistani neuroscientist suspected of having links to Al Qaeda, while captured in Afghanistan, was found carrying handwritten notes referring to a "mass casualty attack" on famous locations in New York, including the Brooklyn Bridge.[Footnote 19] In addition to the issuance of the Highway Threat Assessment, TSA's OI has also developed likelihood estimates for specific threat scenarios involving highway infrastructure. These estimates include scores of both terrorist intent and capability--the key components of threat--for five specific threat scenarios. These scores are intended to serve as the input for the threat component of the overall risk equation that TSA uses: Risk = ƒ(Threat x Vulnerability x Consequences). The Homeland Infrastructure Threat and Risk Analysis Center (HITRAC), which is a joint program office between the Office of Infrastructure Protection and the Office of Intelligence and Analysis, manages the Strategic Homeland Infrastructure Risk Assessment process. The results of this process provide a national overview of current high-risk scenarios for all critical infrastructure and key resources, which includes attacks on select highway infrastructure. In developing these scenarios, analysts consider terrorist capability and intent (threat), as well as vulnerability and consequence information.[Footnote 20] While this product is not intended to cover the full range of potential threat scenarios posed to the highway sector, it may serve to assist TSA and other federal highway security stakeholders in identifying specific high-risk scenarios that may require additional focus or resources. As part of its annual risk assessment of maritime infrastructure, USCG has also developed a number of threat scenarios involving select bridges and tunnels. USCG uses threat information provided internally by its Intelligence Coordination Center to evaluate 19 different attack scenarios for each infrastructure asset via the Maritime Security Risk Analysis Model (MSRAM).[Footnote 21] As with TSA and IP, USCG uses threat information as an input when conducting assessments of potential vulnerabilities and consequences of an attack on maritime highway infrastructure. Vulnerability Assessments: According to the NIPP, DHS is responsible for ensuring that comprehensive vulnerability assessments are performed for infrastructure that is deemed nationally critical. Given the potential for loss of life, economic disruption, and other impacts resulting from an attack on critical highway infrastructure, DHS stakeholders and other federal partners have a number of efforts underway to assess the vulnerabilities of these assets. These efforts are intended to help identify potential security gaps and prioritize mitigation solutions. However, the degree to which vulnerability assessments have been completed for individual highway infrastructure assets varies considerably between these entities, given their available resources and other security priorities. For example, given the substantial number of highway infrastructure assets under their jurisdiction and staffing limitations, TSA's Highway Motor Carrier Division (HMC) has chosen to identify highway infrastructure vulnerabilities by working primarily with State departments of transportation to identify the extent to which common security practices are employed.[Footnote 22] However, more comprehensive asset-specific vulnerability analyses are conducted by both IP and USCG, although the scope and purpose of the resulting products vary considerably. While these distinct entities each have vulnerability assessment efforts underway, the assessment efforts of TSA and IP have slowed considerably due to other identified priorities, and no timeframes currently exist for their completion. In addition, during the course of this review TSA officials stated TSA, as the Sector-Specific Agency for highway infrastructure, had not yet determined whether asset-specific federal vulnerability assessments should be completed for all critical highway infrastructure. However, when providing written comments on this report in January 2009, TSA officials noted that they intend to conduct individual assessments on all bridge and tunnel properties that it has identified as critical beginning in 2009. The following represents the specific vulnerability assessment activities conducted by DHS entities and their federal partners. TSA - Highway Motor Carrier Division: Through its CSR program, HMC conducts interviews with state officials to assess the security plans, policies, and security actions of organizations whose operations include critical highway infrastructure. As part of these interviews, TSA utilizes standardized questions to document the extent to which security efforts have been implemented within 11 functional areas, including security planning, physical security measures, and security training programs, among others. [Footnote 23] These security reviews focus primarily on state DOT offices, but may include other state agencies with transportation security functions, such as the Offices of Emergency Management or Homeland Security. At the time of our review, HMC officials stated that the resources associated with conducting vulnerability assessments makes it impractical to conduct asset-specific assessments of the vast number of bridges and tunnels that comprise the nation's highway system. For this reason, HMC had chosen to utilize primarily a non asset-specific approach to conducting vulnerability assessments of the highway infrastructure sector, through the CSRs. HMC officials stated that they rely on infrastructure owners and operators to conduct asset- level vulnerability assessments on highway assets, and that they generally review these findings as a component of their CSR activities. However, as previously stated, after reviewing a draft this report, TSA commented in January 2009 that it intends to conduct individual assessments on all bridge and tunnel properties that TSA has identified as critical beginning in 2009. Since the CSR program was initiated in May 2004, HMC has completed CSRs for most of the states and a select number of CSRs for specific highway infrastructure assets.[Footnote 24] According to HMC officials, the goal of these efforts is to assess potential security gaps and provide state officials with suggested actions for strengthening security. However, the pace of TSA's CSR program has slowed considerably in recent years, and no timeframe currently exists for their completion for all 50 states. Specifically, most of the state level CSRs were conducted during the first two years of the program's implementation, which began in May 2004. HMC officials stated that a combination of competing priorities and a reduction in staff available to perform CSR's led to the slowing of this effort. Specifically, HMC officials said that the 9/11 Commission Act placed a number of additional requirements on the division, such as completing a national risk assessment for school buses. While HMC officials are currently planning to conduct highway infrastructure CSR's in all remaining states, it remains unclear if, or when, this will be achieved.[Footnote 25] In accordance with standard program management principles, timeframes or milestones should typically be incorporated as part of a road map to achieve a specific desired outcome or result.[Footnote 26] The voluntary nature of the CSR program contributes to the inability for TSA to establish clear timeframes for completion. For example, according to HMC officials, two states have already declined to participate in the CSR program due to their lack of perceived security risk to their assets. In January 2009, HMC officials said that one of those states subsequently reversed its decision and is willing to participate in the CSR program. In 2008, HMC also began conducting follow-up state level CSR's to states previously assessed, and has completed a limited number of such assessments as of January 2009. According to TSA officials, the purpose of these visits is to update existing data and determine current infrastructure security efforts at the state-level. In the absence of CSR vulnerability data for infrastructure assets in the remaining states, TSA may rely on other mechanisms to obtain this data. As outlined in HSPD-7, the SSA is responsible for conducting or facilitating vulnerability assessments across the sector. According to TSA officials, the CSR effort represents their primary mechanism for meeting this responsibility. Yet, given competing priorities and resource limitations identified by HMC, there may be limited value to expending further resources to complete highway infrastructure CSRs in states or territories lacking any critical assets. Specifically, only two remaining states or territories that have not undergone a CSR have any highway infrastructure assets deemed nationally critical by IP. However, to obtain vulnerability information for the remaining critical assets, TSA could conduct a CSR visit or collaborate with other highway sector stakeholders. For example, HMC may be able to leverage the resources of other federal partners that have completed vulnerability assessments for those assets. Another potential option includes the utilization of the existing bridge safety program to obtain information about critical asset vulnerabilities. According to HMC officials, they are currently conducting pilot programs with several states to incorporate security-related questions within mandatory National Bridge Inspection program conducted biennially by state inspectors.[Footnote 27] While TSA has stated that it intends to conduct individual assessments on all bridge and tunnel properties that it has identified as critical, TSA does not plan to begin those assessments until our review is completed. Thus, it is too early to tell whether these assessments will provide TSA with sufficient data about asset vulnerabilities to make informed decisions about sector needs and priorities. Office of Infrastructure Protection (IP): As part of its responsibility to help protect critical infrastructure in all industry sectors, since 2002, IP has completed a number of vulnerability assessments of specific highway infrastructure assets through two key programs.[Footnote 28] Specifically, IP has conducted, or participated in, assessments evaluating vulnerabilities of major roadways, bridges, and tunnels as part of its SAV and BZPP programs. While the scope and purpose of these two programs differ considerably, they each serve to provide DHS, as well as applicable stakeholders and owners and operators, with detailed information about identified asset vulnerabilities to develop and prioritize mitigation efforts. Site Assistance Visits (SAVs). This voluntary program includes asset- level vulnerability assessments conducted by a federally-led team in partnership with asset owners and operators. SAVs are designed to facilitate discussion about vulnerability identification and mitigation between security partners and asset owners and operators. The visits, which take between one and three days to complete, incorporate various attack scenarios to identify potential asset vulnerabilities that could be exploited by a potential terrorist. Given the voluntary nature of the SAVs, implementation of identified mitigation measures is not required through the program; however, IP provides asset owners and operators with "options for consideration" intended to help them detect and prevent terrorist attacks. According to IP officials, their experience has shown that asset operators are generally willing to address these options because it is in their best economic and social interest to do so, given the potential consequences that may result in the event of an attack. As of January 2009, IP has conducted SAVs on a number of highway infrastructure assets; however, many of these were completed prior to July 2005. Buffer Zone Protection Program (BZPP). Under this DHS grant program, IP assists state and local authorities, as well as private industry, in developing protection plans for critical infrastructure assets, including selected highway assets. Unlike the SAV, which focuses on the security of infrastructure assets directly, the BZPP focuses on the buffer area surrounding an asset that a terrorist may use to conduct surveillance or an attack. While DHS provides the assessment tools as well as operational and technical support, the actual BZPP assessment is conducted by local law enforcement agencies with jurisdiction over the selected asset. Based on the vulnerabilities identified during the assessment, a Buffer Zone Plan is developed, in cooperation between IP and state and local partners, to address potential security gaps and identify measures to deter terrorist activity near key assets. As part of this plan, recommended enhancements are identified that may be eligible for grant funding based on a validation of the assessment and approval of a spending plan by IP officials.[Footnote 29] Potential items funded through this program include personal protective equipment, interoperable communication equipment, patrol boats, and detection equipment, among others. Since October 2002, a number of highway infrastructure assets have been assessed through the BZPP program, and additional highway assets were assessed since fiscal year 2006.[Footnote 30] While BZPP and SAV assessments serve as some of DHS' principal efforts to identify vulnerabilities and inform risk analysis of the highway sector, the pace of both of these activities has slowed considerably since 2006 due, in large part, to competing agency priorities. According to IP officials, the principal reason for the reduction in these activities is the office's focus on sectors that are a higher priority, such as dams and nuclear facilities. Since 2006, these sectors have been deemed a higher priority due to the potential for catastrophic effects resulting from a terrorist attack. Moreover, it is uncertain to what extent IP vulnerability assessments will be conducted on additional highway infrastructure assets in the future because no timeframes for additional assessments currently exist and future resource priorities remain unknown. United States Coast Guard (USCG): As part of its maritime security responsibilities, USCG completes an annual risk assessment of all key bridges and tunnels that are located on or within U.S. navigable waters. In addition to this broad effort, USCG has also conducted more comprehensive vulnerability assessments for a number of critical maritime bridges and tunnels as part of its Terrorist Operations Assessments completed in the wake of the attacks on September 11, 2001. Maritime Security Risk Analysis Model (MSRAM). Each year, USCG uses the MSRAM to develop a risk-score for maritime infrastructure likely to result in significant potential consequences if attacked, including select bridges and tunnels, as part of its port-wide risk assessments. The vulnerability component of the model is determined by identifying any applicable protective measures employed, such as access controls, perimeter security and surveillance, and explosives detection, among others, against a number of identified threat scenarios. According to USCG officials, all available federal assessments, such as SAVs, as well as those conducted by private contractors, are incorporated into the analysis to assist in determining the vulnerability of each asset being assessed. The purpose of the model is to identify port critical infrastructure that may pose the highest overall risk. The resulting information is then used to prioritize USCG security efforts and guide security planning actions with maritime stakeholders.[Footnote 31] USCG does not regulate or enforce the risk mitigation efforts for bridges and tunnels. According to USCG officials, these efforts remain voluntary and it is the owner or operator's responsibility to implement potential countermeasures. The MSRAM tool currently covers approximately 370 maritime bridges and tunnels, including the majority of critical highway assets identified by DHS in 2007. Terrorist Operations Assessments. USCG also performed vulnerability analyses on a number of maritime bridges and tunnels as a component of port-wide security assessments conducted at the nation's most critical ports after the attacks of September 11, 2001. These vulnerability assessments were conducted on a number of individual bridges and tunnels selected based on a combination of their perceived criticality and the absence of any previous federal assessments conducted. According to USCG officials, these assessments helped inform the agency's infrastructure security operations and were incorporated into the MSRAM analysis described above. The results of these assessments were also shared with the owners and operators of the assets, according to USCG officials. Federal Highway Administration (FHWA): Although DHS entities are currently the primary lead for federal highway infrastructure risk assessments, FHWA has played a key role in facilitating these efforts. Beginning in 2003, FHWA began conducting risk management workshops and responded to requests by state officials to conduct vulnerability assessments of selected bridges and tunnels that the states had identified as critical. To date, FHWA has taken the lead for conducting assessments at the state or local-level, as well as additional asset-specific assessments. Collectively, these assessments cover a number of individual bridges and tunnels, including some identified as critical assets. According to FHWA, owners generally receive a report of all assessment findings, including a suite of measures that can be used to make a facility more secure. However, officials noted that it remains the decision of the asset owner to determine how much risk to accept and how much money should be invested to protect against terrorism. From 2004 through 2005, FHWA also played a key role in assisting USCG conduct its port-wide vulnerability assessments. According to FHWA officials, their current role is to help support DHS' overall efforts to protect highway infrastructure by providing subject matter expertise; participating in assessments with various DHS entities; conducting training, and developing guidance, in conjunction with AASHTO, to assist states in conducting their own risk assessments of transportation infrastructure. Consequence Assessments: Although federal entities have collected consequence information as part of their ongoing efforts to identify critical assets and conduct vulnerability assessments, detailed consequence assessments of highway infrastructure have been limited. According to the NIPP, risk assessments should include consequence assessments to measure key effects to the well being of the nation. These effects include the negative consequences on public health and safety, the economy, public confidence in national economic and political institutions, and the functioning of government that can be expected if an asset, system, or network is damaged, destroyed, or disrupted by a terrorist attack. On a sector-wide basis, TSA and IP work together to develop a list of highway infrastructure assets deemed nationally critical based on several consequence-related factors, such as the potential loss of life and economic impact.[Footnote 32] While this list is not intended to provide the type of detailed consequence information used to prioritize mitigation decisions between specific assets, as called for in the NIPP, DHS officials stated that it serves to identify those assets that should be considered when conducting more comprehensive risk assessments of the sector. Since 2007, IP has been responsible for developing critical asset lists for all critical infrastructure and key resources in conjunction with applicable SSAs and state and territorial Homeland Security Advisors. This list is broken into two distinct tiers based on estimated consequences to the nation. The first list, Tier 1, is comprised of critical infrastructure assets and key resources that, if disrupted or destroyed, would have significant negative consequences. Currently, no highway infrastructure assets are included on the Tier 1 list. The Tier 2 list includes highway infrastructure that, based on established criteria, represent assets that, if destroyed, are also likely to result in relatively significant potential negative consequences to the nation. As part of DHS's effort to assess risk to the nation's critical infrastructure, HITRAC also engages in a collaborative effort with SSAs to collect consequence information. Specifically, HITRAC incorporates analysis of potential consequences when developing the high-risk threat scenarios contained within the SHIRA report. For example, HITRAC disseminates worksheets to each of the SSA's to collect estimates of consequences resulting from a variety of different attack scenarios. For each scenario, the SSA develops numerical rankings for several categories of potential consequences, including potential loss of life, economic effects, psychological consequences, and potential effect on agency mission. Upon review of this data, HITRAC is then able to identify and prioritize those scenarios that are likely to result in significant potential consequences relative to other attack methods or targets. In addition, some asset-level federal vulnerability assessments, such as SAVs, also include estimates of potential consequences. For example, the standard template used to record information during these visits incorporates a series of questions regarding consequences to estimate the potential loss of life and other economic consequences resulting from an attack, and to determine how critical the asset is based on its interdependencies with other transportation systems or facilities. Although these consequence estimates are a key component of an asset-specific risk assessment, not all critical highway assets have been subject to an SAV assessment to allow for consequence data to be evaluated nationwide to help establish protection priorities. Similarly, USCG also calculates consequence scores for all maritime critical infrastructure as a key component of its MSRAM analysis; however, not all of the nation's critical bridges and tunnels have a maritime nexus for which USCG analysis applies. Federal Risk Assessment Activities Have Been Hampered by Limited Coordination: While federal entities are conducting a number of individual efforts to assess highway infrastructure risks, they have not systematically coordinated these efforts or shared the results. Federal entities have collectively conducted asset-level vulnerability assessments on a substantial percentage of highway infrastructure assets identified on the 2007 Tier 2 list. However, limited mechanisms exist to share the assessment results among the various federal partners to inform their own assessment efforts. For example, HMC reported that it is generally unfamiliar with the assessment processes, mechanisms, and results of the other DHS entities, particularly IP. Lacking adequate coordination mechanisms, the potential for duplication and inadequate leveraging of federal resources exists. For example, multiple vulnerability assessments were conducted by federal agencies for numerous assets that were on the fiscal year 2007 Tier 2 list. Specifically, IP and USCG conducted assessments on a number of the same assets identified as critical.[Footnote 33] Given the number of highway infrastructure assets identified as critical, it is especially important to ensure that future risk assessment efforts are effectively coordinated between federal entities and the results shared amongst these entities. As the SSA for highway infrastructure security, TSA is responsible for facilitating and coordinating risk assessment activities and protection efforts for these assets. As further specified in the NIPP, the SSA is responsible for the overall coordination and facilitation of comprehensive risk assessment programs for the sector, which include gathering all available threat, vulnerability, and consequence information from sector partners for use in national risk management efforts. Our previous work has also indicated that a key component for successful collaboration between federal agencies includes the effective leveraging of available resources.[Footnote 34] While TSA is compiling limited vulnerability assessment information through its CSR program, no policies or mechanisms currently exist to coordinate this effort with those of other federal partners.[Footnote 35] Considering that IP and USCG are conducting nearly all of the federal asset- specific vulnerability assessments completed to date, TSA is missing an opportunity to fully inform its vulnerability analysis for the highway infrastructure sector and validate the findings obtained from its CSRs. While some efforts have been initiated by DHS entities to improve the coordination of highway infrastructure assessment activities, such actions have been limited. According to USCG officials, MSRAM analysis routinely includes the review of completed IP assessments of port- related infrastructure, including bridges and tunnels; however, coordination among the other two agencies is less mature. For example, HMC officials were generally unfamiliar with the scope of IP's SAV assessments and were unaware how these activities may be leveraged to achieve mutual goals. According to TSA officials, they had begun to receive notifications of IP assessments in July 2008; however, in September 2008, they stated that they generally do not review these assessments or incorporate the results.[Footnote 36] HMC officials also stated that they have not reached out to obtain MSRAM data because they believe that port areas are well managed by USCG. Similarly, IP officials stated that they had not requested or reviewed the results of TSA's highway infrastructure CSRs. According to IP officials, a Protective Measures Section was created in fiscal year 2008 to consolidate and track IP assessments, as part of the Vulnerability Assessment Project. This project, as described in the IP Strategic Plan: FY 2008-2013, was originally intended to also provide a mechanism to track and analyze the vulnerability assessments conducted by other Federal, State, local, and private sector partners in order to enhance coordination and collaboration with stakeholders, eliminate duplication of effort, and enable assessment prioritization. However, OIP officials stated that, due to a lack of funding, the scope of this effort was limited only to IP's own vulnerability assessments.[Footnote 37] Another area where additional collaboration between federal partners may be improved involves the potential streamlining, or standardization, of existing assessment tools and methodologies. As outlined in the NIPP, vulnerability assessments need to be comparable to support national-level and cross-sector analysis. Further, HSPD-7 requires DHS to establish uniform policies, approaches, guidelines, and methodologies for integrating Federal infrastructure protection and risk management activities within and across sectors. However, a number of varied risk assessment tools and methodologies exist both within and across sectors that differ in terms of assumptions, comprehensiveness, and objectivity. Efforts to combine or streamline some of these tools and methodologies may assist to enhance the comparability and usefulness of the various risk assessments. For example, IP's Strategic Plan: FY 2008-2013, identifies opportunities for the development of a scalable methodology, in collaboration with other SSAs, to standardize current approaches for identifying vulnerabilities and promote better coordination and collaboration. USCG officials also cited the need for a comprehensive risk analysis model so that all sectors could utilize a common tool. According to the Highway Modal Annex to the TSSP, issued in May 2007, TSA was working with DOT agencies, including the Federal Motor Carrier Safety Administration (FMCSA) and FHWA, to combine their respective risk assessment and risk mitigation tools into a single product that will reduce redundancy, increase efficiencies, and minimize impact on private stakeholders. However, in October 2008, FHWA officials stated that this effort had not occurred.[Footnote 38] The Modal Annex does not identify any additional plans for TSA to combine or incorporate any other key risk assessment tools, including USCG's MSRAM tool, IP's risk assessment and mitigation tools, or AASHTO's risk methodology. While the development of a single risk assessment tool that meets the individual needs of the distinct federal entities involved in highway infrastructure security may not be a realistic alternative, opportunities remain for DHS to identify where specific assessment tools and methodologies can be used most effectively to enhance assessments and better leverage future resources. Effective coordination of federal vulnerability assessments and sharing of assessment results is more important given the number of highway infrastructure assets. Lacking adequate coordination with federal partners, TSA will be unable to determine the extent to which specific critical assets have been assessed and if potential adjustments in its own CSR methodology may be necessary to adequately target remaining critical infrastructure assets. Given the resource limitations and competing priorities of TSA and IP discussed previously, it is increasingly important for federal entities to coordinate their risk assessment activities and to share all available risk information to avoid duplication, better focus future assessments, and more effectively leverage resources. DHS's Strategy to Secure Highway Infrastructure Was Not Fully Informed by Available Risk Information, and Should be Strengthened: While DHS has developed a strategy--the Highway Modal Annex--to secure the nation's highway infrastructure, it is not based on completed risk assessments to help ensure that federal programs and resources are focused on the areas of greatest need. Moreover, the Annex can be strengthened to better address the requirements of Executive Order 13416 on Strengthening Surface Transportation, and more fully incorporate characteristics of an effective national strategy. In addition, we identified areas where the Highway Modal Annex can be strengthened to enhance its value to highway security stakeholders by providing greater clarity of roles and focusing resources to protect highway infrastructure. TSA plans to revise the strategy in the near future, as required by the Annex and in accordance with TSA guidance, and officials stated that they would consider enhancing the Annex to address these areas at that time. DHS's Highway Modal Annex Does Not Fully Incorporate Risk Assessment Results: In May 2007, TSA published the Highway Modal Annex which documents DHS's strategy for securing the nation's highway infrastructure; [Footnote 39] however, while both the NIPP and the TSSP outline a framework whereby infrastructure protection efforts are to be guided by risk assessments of critical assets, the TSSP Highway Modal Annex is not fully informed by available vulnerability and consequence information. The Annex describes key TSA and FHWA programs related to highway infrastructure security efforts, as well as how transportation sector goals and objectives are to be achieved to protect the highway transportation system. However, while nearly all of TSA's and IP's completed vulnerability assessments were conducted prior to the issuance of the Highway Modal Annex, their results were not used to develop the Annex. Both the NIPP and TSSP sets forth a comprehensive risk management framework which includes a process of considering threat, vulnerability and consequence assessments together to determine the likelihood of a terrorist attack and the severity of its impact. In addition, the TSA guidance used to assist each mode in drafting the Annex identifies that the Annex should emphasize how each mode will use risk informed decision-making to determine specific actions required to achieve the transportation sector goals and objectives. According to HMC officials, the Highway Modal Annex was developed in conjunction with the Highway GCC and SCC using available threat information, professional judgment, and information about past terrorist incidents. However, HMC officials stated that they did not review available IP and USCG vulnerability and consequence assessments of highway infrastructure--which represents the vast majority of asset-specific information. According to these officials, the initial development of the Highway Modal Annex was limited by time, which impacted HMC's ability to consider more comprehensive risk assessment information collected and incorporate stakeholder input.[Footnote 40] However, officials stated that they anticipate that future revisions to the TSSP Highway Modal Annex will consider more risk assessment information and stakeholder input. In addition, HMC officials said that they are working on developing a separate national bridge strategy to supplement the Annex, but officials did not have a time frame for its completion. According to TSA guidance used to develop the Highway Modal Annex, the Highway GCC and SCC are to review the Annex annually and make periodic interim updates as required, which provide TSA with an opportunity to consider the results of risk assessments to inform its strategy moving forward. The Highway GCC and SCC are instructed to conduct a complete revision of TSA's Highway Modal Annex every three years, and as necessary in the interim. HMC is beginning the revision process and updating the TSSP Highway Modal Annex in 2008 to allow time for the revised strategy to be reviewed by government and sector stakeholders. However, HMC officials stated that they did not know when the revision would be issued. Without considering the results of available risk assessments, TSA is limited in its ability to assist highway infrastructure operators in prioritizing investments based on risk, and target resources towards security measures that will have the greatest impact. DHS's Highway Modal Annex Does Not Fully Address Areas Outlined in Executive Order: In reviewing the Highway Modal Annex, we identified areas in which the Annex does not fully address areas outlined in Executive Order 13416, Strengthening Surface Transportation Security, which was issued in December 2006 to address surface transportation security challenges consistent with the NIPP risk management framework. Executive Order 13416 requires that the Secretary of Homeland Security assess the security of each surface transportation mode and evaluate the effectiveness and efficiency of current surface transportation security initiatives. In addition, the Executive Order required the Secretary to develop modal annexes that include, at a minimum: * an identification of existing security guidelines and requirements and any security gaps; * a description of how the TSSP will be implemented for each mode, and the respective roles, responsibilities, and authorities of Federal, State, local, and tribal governments and the private sector; * schedules and protocols for annual reviews of the effectiveness of surface transportation security-related information sharing mechanisms; and: * a process for assessing compliance with any security guidelines and requirements issued by the Secretary for surface transportation, and the need for revisions of such guidelines and requirements to ensure their continuing effectiveness. Although Executive Order 13416 requires the identification of existing security guidelines and security requirements for each surface transportation mode, the Annex does not reference existing guidance developed by other federal and state highway infrastructure stakeholders including IP, FHWA, or AASHTO guidance on protective measures for highway infrastructure.[Footnote 41] TSA acknowledged that this information is missing from the Annex. Without including such information in TSA's national strategy for highway security, the agency is missing opportunities to identify and leverage available guidance resources for securing highway infrastructure. In addition, as called for in Executive Order 13416, the Annex does identify a number of existing security gaps related to highway infrastructure, and recognizes that addressing potential threats to the highway system is particularly challenging because of the openness of the system. However, while the Annex identifies that the conveyance of hazardous materials poses the greatest threat to highway infrastructure--and is where HMC has focused its efforts--the Annex provides little details about the different types of threats to highway infrastructure and their relative likelihood. For example, the Annex does not describe how terrorists might use explosives against highway infrastructure. According to the Annex, some bridges and tunnels are especially vulnerable because their structural components are in some cases easily accessible and because the assets themselves are located in remote areas. Furthermore, Executive Order 13416 requires DHS to describe how the TSSP will be implemented within the specific transportation mode, yet we identified areas where the Annex could improve its description of how the TSSP would be implemented. For example, although not specifically required, the Annex lacks milestones. Specifically, the Annex does not indicate timeframes or milestones for its overall implementation or for accomplishing specific actions or initiatives for which entities can be held responsible. In addition, the Annex's priorities, goals and supporting objectives and activities are not ranked by their importance. Executive Order 13416 also calls for Modal Annexes to include a description of the roles and responsibilities of key stakeholders, which the Highway Modal Annex only partially addresses because the Annex does not clearly define the authorities of federal, state, local, and tribal governments and the private sector to secure highway infrastructure. For example, the Annex does not identify that TSA has the authority to issue and enforce security related regulations and requirements it deems necessary to protect transportation assets. In addition, the Highway Modal Annex discusses the Highway GCC and Highway SCC roles and responsibilities related to highway and motor carrier security strategies and activities, as well as policies, guidelines and standards and developing program metrics and performance criteria for the mode. It also describes several TSA and FHWA highway related risk assessment programs involving collaboration with stakeholders. However, the strategy does not identify the specific roles of federal and non federal stakeholders such as HMC, IP, FEMA, CBP, FHWA, or AASHTO in the protection of critical highway infrastructure or key assets. HMC officials attributed these omissions to the short turn around time required to develop the Annex. In addition, HMC officials stated that the Annex was vetted by a variety of stakeholders including IP, and no one raised concerns over the absence of a description of the roles of these federal and non federal entities and their programs. HMC officials stated that they were willing to consider including these entities in future revisions of the Annex. Moreover, the Annex does not identify lead, support, and partner roles related to highway infrastructure security. For example, CBP is responsible for prohibiting the entry into the United States of people or goods that pose a security threat; as well as the protection of the infrastructure within the footprint of the ports of entry, while TSA is responsible for the security of all modes of transportation, including any associated infrastructure.[Footnote 42] An overlap in responsibility exists when the people and goods crossing the border intend to harm infrastructure, e.g. a truck crossing a border bridge with the intention of exploding the bridge. Our prior work has highlighted the importance of addressing which organizations will implement a national strategy, their roles and responsibilities, and mechanisms for collaborating their efforts.[Footnote 43] DHS's Highway Modal Annex Should Be Enhanced by Incorporating Characteristics of an Effective National Strategy: We assessed the Highway Modal Annex using desirable characteristics developed by our prior work on national strategies, and found several areas where future versions of the Annex can be enhanced.[Footnote 44] Our prior work has shown that national strategies can be more useful if they contain characteristics such as a description of the purpose, scope, and methodology of the strategy; goals, objectives, activities, and performance measures; a definition of the roles and responsibilities and mechanisms for collaborating; the sources and types of resources and investments associated with a strategy; and a description of how a national strategy will be integrated with other national strategies and how it will be implemented. We believe that these characteristics can assist DHS in strengthening and implementing the Highway Modal Annex going forward, as well as enhance its usefulness in resource and policy decisions and to better assure accountability. Purpose, Scope, and Methodology: This characteristic addresses the purpose for developing the strategy, the scope of its coverage, and the process by which it was developed. In addition to describing what it is meant to do and the major functions, mission areas, or activities it covers, a national strategy would ideally address the methodology used to develop it. For example, a strategy might discuss the principles or theories that guided its development, what organizations or offices drafted the document, whether it was the result of a working group, or which parties were consulted in its development. The purpose and scope of the strategy are generally described in the Annex. For example, the Annex provides a description of the nation's highway transportation system and how transportation sector goals and objectives will be achieved to protect the highway transportation system. However, the Annex does not explain the methodology used in its development. For example, while the Highway Modal Annex references the NIPP and TSSP as providing the principles or theories that guided its development, the Annex does not describe the process and information that was used to develop it. HMC officials attributed this omission to the TSA guidance used to develop the Highway Modal Annex not requiring the process and information that was used to develop it be documented. HMC officials stated that stakeholders used their collective professional judgment to develop the Annex. Goals, Objectives, Activities, and Performance Measures: This characteristic addresses what the national strategy strives to achieve and the steps needed to garner those results, as well as the priorities, milestones, and performance measures that will be used to gauge results. At the highest level, this could be a description of an ideal "end-state" of the strategy, followed by a logical hierarchy of major goals, subordinate objectives, and specific activities to achieve results. Our prior work has shown that long-term action-oriented goals and a time line with milestones are necessary to track an organization's progress toward its goals.[Footnote 45] Ideally, a national strategy would set clear desired results and priorities, specific milestones, and outcome-related performance measures while giving implementing parties flexibility to pursue and achieve those results within a reasonable timeframe. While the Highway Modal Annex identifies individual, high-level goals, subordinate objectives, and specific activities to achieve results which are aligned with the specific goals and objectives identified in the TSSP, it does not describe key related activities. The Annex identifies three major goals--prevent and deter acts of terrorism using or against the transportation system, enhance resilience of the transportation system, and improve the cost-effective use of resources for transportation security. The three goals are underpinned by objectives, such as an objective supporting the goal of implementing flexible, layered, and effective security programs using risk management principles. The objectives in turn, have accompanying activities. For example, one of the supporting activities for the goal to prevent and deter acts of terrorism using or against the transportation system is HMC's CSR program. However, the Annex focuses on HMC and FHWA activities, but does not describe several key related federal and non federal activities. For example, the Highway Modal Annex does not describe the relationship of IPs Vulnerability Assessment program, USCG's risk assessment activities related to highway infrastructure, S&T Directorate's related research and development projects, AASHTO's security design standard development efforts, or CBP's activities related to international border crossings as they relate to supporting the Annex's goals and objectives. In addition, one of the Annex's objectives is to enhance information and intelligence sharing among transportation security partners. Accordingly, the strategy identifies the Highway Information Sharing Analysis Center (ISAC) and the Homeland Security Information Network (HSIN) as two mechanisms to share information with the highway infrastructure stakeholders. However, the Annex does not discuss how HSIN complements or is different from other information sharing tools, such as DHS's Lessons Learned Information System (LLIS), as it concerns highway infrastructure. The Annex also does not discuss how HSIN is related to state efforts for sharing information. For example, during our review, one of the states we visited was developing a web site to share information for transportation security stakeholders which would potentially duplicate or overlap with information available through HSIN or LLIS. Furthermore, TSA, in conjunction with the Highway GCC and the Highway SCC, has not developed a baseline set of performance goals and measures or established a time frame upon which to assess and improve preparedness of highway infrastructure to an attack that are linked to the Annex's goals, objectives, and activities for securing highway infrastructure. The NIPP requires DHS to work with its security partners to develop sector-specific metrics. In addition, the Government Performance and Results Act (GPRA) as well as Standards for Internal Control in the Federal Government,[Footnote 46] require that agencies use performance measurement to reinforce the connection between their long-term strategic goals and the day-to-day activities of their managers and staff. In addition, the Office of Management and Budget requires all programs to have at least one cost efficiency measure as part of their mix of performance measures. With respect to highway infrastructure security, performance measures would gauge to what extent federal efforts and highway infrastructure operators are achieving the Annex's goals and objectives. HMC officials stated that although they recognize the importance of measuring the effectiveness of security efforts, they have not developed performance measures for highway infrastructure. HMC officials attributed this omission to the TSA guidance used to develop the Highway Modal Annex not requiring performance measures. Without performance measures and an evaluation of the effectiveness of the Annex's goals and objectives, TSA will lack meaningful information from which to determine whether the strategy is achieving its intended results and to target any needed improvements. Organizational Roles, Responsibilities, and Collaboration: This characteristic addresses which organizations will implement the strategy, their roles and responsibilities, and mechanisms for coordinating their efforts. It helps answer the fundamental question about who is in charge, not only during times of crisis, but also during all phases of homeland security and combating terrorism efforts: prevention, vulnerability reduction, and response and recovery. This characteristic entails identifying the specific federal departments, agencies, or offices involved and, where appropriate, the different sectors, such as state, local, private, or international sectors. In our past work, we reported that a successful strategy clarifies implementing organizations' relationships in terms of leading, supporting, and partnering. In addition, a strategy could describe the organizations that will provide the overall framework for accountability and oversight. Furthermore, a strategy might identify specific processes for collaboration between sectors and organizations- -and address how any conflicts would be resolved. For example, our previous work on effective interagency collaboration has also demonstrated that a strategy provide for some mechanism to ensure that the parties are prepared to fulfill their assigned responsibilities. [Footnote 47] The Annex provides limited information related to collaboration between highway infrastructure stakeholders. In addition, the 9/11 Commission Act requires DHS and DOT to execute and develop an annex to the memorandum of understanding (MOU) between the two agencies, which was signed in September 2004, that addresses motor carrier security. [Footnote 48] The annex must delineate specific roles, responsibilities, and resources needed to address motor carrier transportation security matters and the processes the Departments will follow to promote communications, efficiency, and ensure non duplication of effort. HMC officials stated that they plan on developing a similar annex to the MOU for highway infrastructure, but they do not have a timetable for doing so. Our prior work has shown that collaboration between federal stakeholders can be improved by clearly identifying organizational roles, responsibilities and specific processes for collaboration between sectors--and how any conflicts would be resolved. HMC officials stated that such an annex would serve to lay the groundwork and provide the proper protocols for sharing of data and personnel, and acknowledge leadership roles and responsibilities to strengthen highway infrastructure security. The 9/11 Commission Act also requires that DHS, to the greatest extent practicable, provide public and private stakeholders with transportation security information in an unclassified format.[Footnote 49] The Highway Modal Annex provides limited details on how (process, policy, mechanism) it will collaborate or what is needed to enhance information and intelligence sharing. For example, the Annex does not describe HITRAC's role related to information sharing. HITRAC is a joint organization between IP and the Critical Infrastructure Threat Analysis Division within I&A that is to integrate, analyze, and share information regarding threats and risks to U.S. critical infrastructure for DHS, other federal departments and stakeholders, the intelligence community, state and local governments and law enforcement stakeholders, and the private sector. HMC officials attributed this omission to the TSA guidance used to develop the Highway Modal Annex not requiring a description of how it is to collaborate or what is needed to enhance information and intelligence sharing. The Act also required DHS to establish a plan to share transportation information relating to the risks to transportation modes, including the highway mode that was due in early 2008; however the plan has not yet been completed.[Footnote 50] TSA officials said that DHS was developing the information sharing plan, but they did not know when the plan would be issued. Development of a plan could improve information sharing by clarifying roles and responsibilities and clearly articulating actions to address any remaining challenges, including consideration of appropriate incentives for nonfederal entities to increase information sharing with the federal government, increase sector participation, and perform other specific tasks to protect critical highway infrastructure. Resources and Investments: This characteristic addresses what the strategy will cost, the sources and types of resources and investments associated with the strategy, and where those resources and investments should be targeted. Ideally, a strategy would also identify criteria and appropriate mechanisms to allocate and take in resources--such as grants, in-kind services, loans, and user fees--based on identified needs. Alternatively, as our prior work has shown, the strategy might identify appropriate "tools of government," such as regulations, tax incentives, and standards, to mandate or stimulate nonfederal organizations to use their unique resources.[Footnote 51] The Highway Modal Annex does not describe any incentives that could be used to encourage owners to conduct voluntary risk assessments, such as grants or training that could be used to determine the best courses of action to reduce potential consequences, threats, or vulnerabilities, as required by the NIPP. These incentives are important because asset owners are not currently regulated by TSA. According to HMC officials, the guidance provided by TSA to HMC used to develop the Highway Modal Annex did not require a description of possible incentives. In addition, HMC officials said that they are working on developing a separate national bridge strategy to supplement the Annex. According to HMC officials the national bridge strategy is to assist the stakeholder community in assessing both the criticality and the security vulnerabilities of its assets; identify the most appropriate and cost- effective mitigation tools; and serve as a mechanism for the identification of sources of funding that are exclusively dedicated to security needs and do not require diversion of funding that is otherwise reserved for safety or structural enhancement or refurbishment. However, this effort is not completed and HMC does not have a time frame for its implementation. In addition, the Annex identifies that measures to secure assets of the Highway Transportation System must be implemented in a way that balances cost, efficiency, and preservation of the nation's commerce; however, it provides relatively few details on the types and levels of resources associated with implementation of security measures or where to target resources for securing highway infrastructure. Highway infrastructure operators have received some federal funding for implementing security upgrades since September 11th, 2001, but available funding has been limited due to competing priorities, such as dams and nuclear facilities. Targeting investments is especially important given that the current economic environment makes this a difficult time for private industry or state and local governments to make security investments. Integration and Implementation: This characteristic addresses both how a national strategy relates to other strategies' goals, objectives, and activities, and to subordinate levels of government and their plans to implement the strategy. For example, a national strategy could discuss how its scope complements, expands upon, or overlaps with other national strategies. Similarly, related strategies could highlight their common or shared goals, subordinate objectives, and activities. In addition, a national strategy could address its relationship with relevant documents from implementing organizations, such as the strategic plans, annual performance plans, or annual performance reports. A strategy might also discuss, as appropriate, various strategies and plans produced by the state, local, private, or international stakeholders. The Highway Modal Annex contains certain elements of this characteristic, but it lacks a description of how it relates to other strategies. For example, the Annex references FHWA's Multiyear Plan for Bridge and Tunnel Security Research, Development, and Deployment, which highlights efforts to secure the nation's highway infrastructure. However, the Highway Modal Annex does not define its relationship with other related strategies or federal actions, or address its relationship with other plans by federal, state, local, and international implementing parties. Specifically, although TSA is engaged in three strategic planning initiatives that have similar goals but slightly different requirements, the Annex does not discuss its relationship to these strategies. First, the Intelligence Reform and Terrorism Prevention Act of 2005 requires a strategy for transportation security--the National Strategy for Transportation Security (NSTS)-- containing the identification and evaluation of transportation assets and appropriate mitigation approaches. Second, the NIPP and HSPD-7 require each sector to prepare a sector specific plan, in collaboration with its security partners across government and private industry. Third, Executive Order 13416 contains requirements for developing modal annexes to the TSSP for surface modes of transportation. However, the Annex does not discuss how its scope complements, expands upon, or overlaps with these strategic plans and guidance. In addition, the Annex does not discuss how the programs in IP's strategic plan complement or overlap with the Highway Modal Annex. Without such information in TSA's national strategy for highway security, the agency is missing opportunities to build on organizational roles and responsibilities and further clarify relationships, which could improve the strategy's implementation. Government and Industry Stakeholders Have Efforts Underway to Enhance the Security of Highway Infrastructure, but TSA Lacks a Mechanism to Monitor Implementation of Voluntary Security Measures: Government and industry highway sector stakeholders have taken actions to mitigate the risks to highway infrastructure through a combination of efforts, including developing publications and conducting seminars, sponsoring research and development activities, and implementing specific infrastructure protection measures. However, because HMC does not routinely conduct asset-specific assessments of highway infrastructure, TSA does not have a mechanism to monitor the implementation of both government and industry voluntary security enhancements put in place to address identified asset vulnerabilities and help protect the nation's critical highway infrastructure. TSA is tasked with assessing and evaluating the effectiveness and efficiency of current federal government surface transportation security initiatives. According to TSA officials, such a monitoring mechanism for voluntary efforts is not necessary because TSA obtains the information that it needs to monitor highway infrastructure security efforts through HMC's CSR efforts. However, the CSRs are at a high level and do not provide a means to assess the protective security measures implemented for specific assets. Lacking a mechanism to monitor the implementation of protective security measures, TSA cannot evaluate the effectiveness of existing programs and assessing the overall security preparedness of the nation's critical highway infrastructure. The Federal Government, States, and Other Highway Stakeholders Have Voluntary Efforts Underway to Enhance the Security of Highway Infrastructure: Highway sector stakeholders have taken a variety of voluntary actions intended to enhance the security of highway infrastructure. Key efforts include developing security publications, sponsoring infrastructure security workshops, conducting research and development activities, and implementing specific protective measures intended to deter an attack or reduce potential consequences, such as security patrols, electronic detection systems, and physical barriers. Overall, these programs and activities are intended to provide asset owners and operators with tools and guidance for assessing highway infrastructure security risks, highlight effective practices in security planning and vulnerability reduction, and share technical expertise and information for enhancing asset security. See table 2 for a summary of key highway infrastructure security programs and activities. Table 2: Summary of Key Programs and Activities to Enhance Security of Highway Infrastructure: Publications, Guidance, and Training: Key Programs and Activities: Bridge and Tunnel; Workshops; Description: These workshops, introduced in fiscal year 2004, are intended to provide participants with information about identifying infrastructure risks and developing appropriate mitigation measures. As of January 2009, FHWA had conducted a series of workshops, targeted primarily to bridge and tunnel engineers and asset operators, in 28 locations; Responsible Organizations: FHWA. Key Programs and Activities: Publications; Description: Since 2002, AASHTO, through the Transportation Research Board (TRB), has sponsored or developed several key publications to help asset owners identify critical assets, perform risk assessments, and evaluate potential countermeasures. At the request of AASHTO and FHWA, in 2003, a Blue Ribbon Panel was convened to prepare recommendations for bridge and tunnel security; FHWA has also issued security-related publications, such as the Multi-Year Plan for Bridge and Tunnel Security Research Development and Deployment, and an article entitled Risk Management for Terrorist Threats to Bridges and Tunnels; IP has developed several reports identifying general threats and common vulnerabilities for highway infrastructure assets; Responsible Organizations: TRB, AASHTO, FHWA, IP. Key Programs and Activities: Regional Conferences; Description: In cooperation with AASHTO, TSA and FHWA co-sponsored a series of regional infrastructure protection conferences for state DOT officials. These conferences provided an opportunity for participants to exchange information concerning effective security practices and communicate security concerns and implementation challenges; Responsible Organizations: TSA, FHWA, AASHTO. Research and Development: Key Programs and Activities: Transportation Sector Research & Development Working Group; Description: With broad-based federal and state representation, this group serves to identify potential research areas for the highway sector; Responsible Organizations:TSA, IP, FHWA, State DOTs. Key Programs and Activities: DHS Science & Technology (S&T); Description: S&T is responsible for executing multiple highway research projects based on identified needs and national risk priorities. Several bridge and tunnel projects have been initiated in recent years (see appendix IV for additional project details); Responsible Organizations: DHS S&T. Key Programs and Activities: Cooperative Research Programs; Description: The TRB, through its Cooperative Research Programs, produced a number of reports each year addressing highway research issues, such as Recommendations for Bridge and Tunnel Security, and a guide to making transportation tunnels safe and secure; Responsible Organizations: TRB, FHWA, AASHTO. Key Programs and Activities: Transportation Pooled Fund Study (TPFS); Description: This program consists of pooled funds provided by individual states and other agencies, including TSA, to conduct research or provide training or education materials desired by the contributors. FHWA is currently managing several projects, including the development of training materials in the areas of security and emergency management, and development of blast mitigation measures for critical bridges; Responsible Organizations: FHWA. Protective Security Measures: Key Programs and Activities: Owner/Operator Funded Security Measures; Description: States and other highway infrastructure asset owners/operators have implemented a variety of protective security measures, including security patrols, cameras and other detection equipment, physical barriers, and security awareness training, among others. According to state officials, funding represents the principal constraint to implementation of security measures; Responsible Organizations: Highway Asset Owners/Operators. Key Programs and Activities: Grant Programs; Description: FEMA manages DHS grant programs and has allocated funds to state and local stakeholders for highway security enhancements through two primary programs--the Homeland Security Grant Program and the Infrastructure Protection Program. Since 2004, approximately $34 million has been allocated to projects related, in part, to highway infrastructure security; The Trucking Security Program (TSP), within the Infrastructure Protection Program, provides funds to assist professionals and operating entities in the highway sector to develop awareness of potential highway-related security concerns. The program also includes a 24-hour call center for the anti-terrorism and security awareness program, and the Highway Information Sharing and Analysis Center (ISAC) for investigation of terrorist threats. While FEMA has the lead for the administrative mechanisms needed to manage the TSP, TSA provides subject matter expertise and oversight. A grantee is responsible for the day to day operations of these efforts; IP guides the allocation of BZPP grant funds, part of the Infrastructure Protection Program, administered by FEMA, and shares in overall programmatic oversight and final decision-making authority with FEMA; Responsible Organizations: FEMA, TSA, IP. Key Programs and Activities: Protective Security Advisor (PSA) Program; Description: These individuals serve as liaisons between Federal stakeholders, state and local governments, and the private sector. Their principal roles and responsibilities include identifying, assessing, monitoring, and mitigating risk to high-risk critical infrastructure and key resources at the local level. PSAs are knowledgeable of all high-priority critical infrastructure and key resources across the various sectors, within their area of responsibility; Responsible Organizations: IP. Source: GAO analysis of highway infrastructure security related programs and activities. [End of table] Publications, Guidance, and Training: Highway infrastructure stakeholders have developed a number of products and programs intended to facilitate the identification of critical assets and provide guidance for conducting security planning. Many of these products and programs are conducted as joint efforts between the State highway agencies, represented by AASHTO and federal partners, including TSA, FHWA, and the Transportation Research Board (TRB). Since 2002, AASHTO, through TRB's Cooperative Research Programs, sponsored or developed several key publications that serve to assist states in identifying critical assets, perform risk assessments, and evaluate options for reducing asset vulnerabilities, including providing a characterization of potential costs and challenges associated with infrastructure security enhancements.[Footnote 52] According to AASHTO, all state DOTs have access to, and a large majority (84 percent) are using, AASHTO guidance on vulnerability and criticality assessment, and risk management, to determine the extent and nature of vulnerabilities to their state's transportation systems. As discussed previously, IP has also developed and issued several reports to provide sector stakeholders guidance on security measures, and identifies general threats and common vulnerabilities for highway infrastructure assets. [Footnote 53] In addition, IP provides stakeholders with guidance on security measures to implement based on homeland security advisory system threat levels. According to IP officials, these reports are made available to industry stakeholders via an internet portal.[Footnote 54] TSA, FHWA, and AASHTO have also co-sponsored a series of regional conferences to facilitate the exchange of information about effective security practices and communicate stakeholder concerns and implementation challenges.[Footnote 55] These conferences provide state transportation officials with a forum to share knowledge concerning infrastructure protection methods and help them identify potential training and guidance resources available. In a separate effort, FHWA also provided risk management training to bridge and tunnel engineers, asset operators, and first responders through a series of workshops. These workshops, introduced in 2003, are intended, in part, to provide highway infrastructure stakeholders a methodology for identifying vulnerabilities and developing appropriate and cost-effective risk mitigation plans. In addition, a security awareness training program is provided as part of the Trucking Security Program directed at highway sector professionals, which includes truck and motor coach drivers, highway engineers, and law enforcement, to identify and report suspicious activity on the nation's highway system.[Footnote 56] Research and Development: A collection of research and development activities designed to secure highway infrastructure are currently being conducted by federal and state entities. As outlined in the Homeland Security Act of 2002, DHS is responsible for, among other things, working with federal laboratories and the private sector to develop innovative approaches to address homeland security challenges. Within the highway sector, these activities include research on the vulnerabilities of bridges and tunnels to various types of explosives and experimental methods to help protect these assets. At the federal level, research and development activities are coordinated through the DHS Transportation Sector Working Group. With fairly broad-based representation---including representatives from TSA, IP, S&T Directorate, FHWA, and state DOTs, among others--this group serves to identify potential research areas, which are then prioritized by IP and executed by DHS' S&T Directorate. According to S&T officials, highway infrastructure has been a focus of infrastructure security research efforts in recent years. Since 2005, bridges, in particular, have been prioritized to gain a better understanding of their potential vulnerabilities and identify better retrofit techniques. Some individual projects identified through this effort include the development of measures to reduce the vulnerability of flooding in underwater tunnels and potential attacks to bridge cables, as well as understanding failure mechanisms and mitigation against explosive attacks and other cross cutting research. See Appendix IV for a list of selected highway infrastructure research and development projects. Other key research programs include the National Cooperative Highway Research Programs (NCHRP) administered by the Transportation Research Board TRB and FHWA's Transportation Pooled Fund Study program. Through the NCHRP Cooperative Research Programs, a number of research projects are conducted each year addressing highway-related research issues proposed by AASHTO.[Footnote 57] Although highway infrastructure security comprises just one component of the program's research portfolio, several security-related products have been developed in recent years. Some of these products include guidance on securing transportation tunnels and a tool to estimate the impact of disruption of key transportation choke points.[Footnote 58] The Transportation Pooled Fund Study is a separate program, administered by FHWA, whereby states and other agencies contribute to a pooled fund to conduct research or provide training or education materials desired by the contributors. Some proposed products include the development of experimentally verified mitigation measures, clearly defined roles and responsibilities for State DOTs in infrastructure security, risk management training tailored to bridge and tunnel vulnerability assessments, and the development of blast mitigation measures for steel bridge towers and a bridge surveillance and security technology database, among others. Protective Security Measures: While federal stakeholders play a role in facilitating risk-based infrastructure security efforts, the actual implementation of asset- specific protective security measures remains the responsibility of individual asset owners and operators, most commonly states or other public entities. Unlike some other transportation modes, such as commercial aviation, no federal laws explicitly require highway infrastructure owners to take security actions to safeguard their assets against a terrorist attack. The protection of highway infrastructure is being undertaken using a voluntary approach, although TSA retains the authority to issue and enforce security related regulations and requirements it deems necessary to protect transportation assets. According to HMC officials, TSA's decision to implement a voluntary approach to highway infrastructure security is based on available threat information, as well as information obtained during CSR activities, which indicates to them that states are generally aware of their security responsibilities and are implementing protective actions. In addition, HMC officials stated that a voluntary approach to security requires reduced federal resources and provides a greater amount of buy-in and acceptance from asset owners than government regulations. Asset owners have implemented a range of voluntary protective security measures to help ensure public safety and protect their highway infrastructure assets. For example, asset owners commonly employ measures such as cameras or other surveillance equipment, and install fencing and other physical barriers to control access to vulnerable structures, among other protective measures. (See appendix III for additional examples of protective security measures for highway infrastructure assets). Specific mitigation measures typically fall into three broad categories: * Deterrence and Detection. These mitigation measures secure access to restricted areas and reduce the likelihood of a potential attack. Common protective security measures include installing fencing, improving lighting, conducting security patrols and installing electronic detection systems. * Defense. Defensive measures are intended to reduce the consequences of a successful attack. For example, installation of a physical barrier around vulnerable components or systems, such as a bridge pier, may reduce the impact of an explosive blast on the structure. * Design and Redesign. These efforts are intended to harden planned or existing infrastructure assets against potential attacks by incorporating security considerations into engineering designs. According to highway infrastructure operators, factors such as competing priorities and budgetary constraints greatly influence whether security measures are implemented. One principal factor impacting the implementation of security measures identified by some state officials we spoke to concerns the availability of revenue sources to fund security improvements for individual assets. For example, bridges and tunnels funded by user fees, such as tolls, could generate additional revenue for security enhancements. Alternately, mitigation measures financed with general federal and state transportation funds may be limited due to competing state priorities. However, the federal government has provided funds to state and local stakeholders to implement highway infrastructure improvements through a combination of several FEMA grant programs. Since 2004, FEMA has funded 60 highway-related security projects, totaling approximately $34 million (see table 3). Some of these projects include funding for additional cameras and surveillance equipment, watercraft for investigation and response to threats, and interoperable communication equipment, among others. Table 3: FEMA Grant Funding for Highway Infrastructure-Related Security Projects, 2004 to 2007: Grant Year: 2004; Number of Highway-Related Projects: 23; FEMA Grant Funding for Highway-Related Projects[A]: $16,981,204. Grant Year: 2005; Number of Highway-Related Projects: 23; FEMA Grant Funding for Highway-Related Projects[A]: $5,703,092. Grant Year: 2006; Number of Highway-Related Projects: 11; FEMA Grant Funding for Highway-Related Projects[A]: $8,431,666. Grant Year: 2007; Number of Highway-Related Projects: 3; FEMA Grant Funding for Highway-Related Projects[A]: $2,844,538. Grant Year: Total; Number of Highway-Related Projects: 60; FEMA Grant Funding for Highway-Related Projects[A]: $33,960,501. Source: GAO analysis of FEMA data. [A] An initial list of potential highway-related projects was provided by FEMA using a keyword search of Biannual Strategy Implementation Reports. These reports--required by FEMA to be updated every six months as part of its grant monitoring process--are comprised of self-reported data submitted by grantees describing their use of allocated grant funds. To determine the total number of projects included in this analysis, we reviewed each of the project descriptions and omitted those that did not clearly have a component related to highway security. For example, a number of projects were specific to mass transit tunnels or railroad bridges and consequently, were not included. In addition, 22 of the projects that GAO identified above were targeted only in part to highway security, such as the purchase of patrol boats or interoperable communications equipment for first responders. [End of table] States have generally taken actions to help secure their highway infrastructure; however, wide variation exists regarding the implementation of specific protection efforts. According to TSA's 2006 summary of its CSRs, all of the states polled have completed at least some security-related actions among the 11 functional areas assessed by TSA.[Footnote 59] However, TSA reported that the level of implementation of security actions varied between states. For example, TSA reported that background checks of transportation workers conducted by state agencies ranged from a criminal history check driving records and citizenship checks down to reference checks for employment applications. According to TSA, the need for background checks varied from state to state, since the perceived threat and the level of risk tolerance also vary by state. In another example, most of the states responded that they conducted security planning at the state level; however, according to TSA, state governments vary considerably in the way the security plans are organized. For example, they reported that states assign different security functions to different agencies-- particularly for transportation security functions. Each agency does some level of planning to ensure its ability to perform its functions. As a result, these preparations are documented in different places, including emergency response plans, traffic management plans, hazardous materials management plans, National Guard plans, homeland security advisory level preparedness plans, continuity of operations plans, and police patrol plans. Some of the plans are more complete than others, depending on the diligence of the agency. TSA reported that most of these states were able to produce a document that defined basic responses to different threat levels and defined who was in charge. Similar variation in state responses and the scope of individual efforts were also illustrated in several of the other security-related functional areas. The variation in state security efforts identified by TSA is generally consistent with what we identified during interviews with officials and observations of select highway infrastructure in five states.[Footnote 60] Although the specific protective security measures implemented at the 13 individual assets we visited were varied, we identified some common mitigation themes, such as investment in new security equipment, leveraging law enforcement resources, and identifying incident response roles, among others. Specific protective measures identified by asset owners with whom we spoke, include increased surveillance efforts-- adding cameras and other detection equipment--as well as installation of fencing, physical barriers, and implementation of enhanced access controls. In addition, some state officials we interviewed stated that they restricted access to building designs and response plans, increased their patrol of critical structures, and implemented stand- off distances. TSA Lacks a Mechanism to Monitor the Implementation of Protective Security Measures for Critical Infrastructure: Although government and industry stakeholders have taken actions to address the risks to highway infrastructure, TSA lacks a mechanism to determine the extent to which specific protective security measures have been implemented for critical assets. Such a mechanism is important to evaluate the security preparedness of nationally critical infrastructure assets and to help ensure that TSA's voluntary approach to highway infrastructure security remains adequate. For example, a monitoring mechanism would provide TSA with feedback regarding how its existing programs and security initiatives, in conjunction with highway stakeholders, are translating into specific security actions by asset owners. TSA is tasked with assessing the security of each transportation mode and evaluating the effectiveness and efficiency of current federal government surface transportation security initiatives. [Footnote 61] In addition, Standards for Internal Control in the Federal Government generally calls for controls to be designed to ensure that an agency has relevant and reliable information about programs and that ongoing monitoring occurs.[Footnote 62] However, TSA has not documented how it will monitor the industry's progress in implementing voluntary highway infrastructure protective security measures for assets identified as nationally critical. Although various federal entities have issued suggested security measures to asset owners, the extent that they have been implemented remains unclear. DHS risk assessment activities, including the CSR and SAV programs, identified highway infrastructure assets that would benefit from additional security measures and have suggested a number of voluntary protective actions to asset owners to address these enhancements. However, given the voluntary nature of these programs, TSA, IP, and USCG stated that they do not know the extent to which asset owners are implementing the protective security measures identified by completed risk assessments for critical infrastructure. In addition to competing resource priorities previously identified, IP officials stated that monitoring the implementation of voluntary protective security measures remains difficult due to limited resources. Specifically, they stated that IP does not have the resources needed to conduct follow-up assessments on all Tier 1 and Tier 2 assets across all critical infrastructure and key resources. They also noted that repeated visits may create a burden on private sector partners. In 2008, IP implemented the Enhanced Critical Infrastructure Protection initiative. This effort involves sending PSAs to all Tier 1 and 2 assets, including transportation infrastructure. According to DHS, while this is a voluntary, non-regulatory program, PSAs conduct initial and follow-up visits to CIKR and document the implementation of enhanced security and protective measures. According to HMC officials, the completion of a second round of state CSR visits will provide an opportunity to review whether asset owners are implementing previous CSR-related security considerations; however, the follow-up visits will be performed over a four year cycle and will not be conducted at the asset level. While these efforts are a positive step, they do not provide the type of detailed information necessary to ensure that specific highway infrastructure assets, particularly those deemed nationally critical, are protected. According to TSA officials, the collection of more detailed data about protective measures is not currently feasible given available resources and other security priorities. However, HMC officials have stated that alternative cost- effective methods of collecting this information may be available, such as potentially leveraging the resources of state transportation inspectors during biannual bridge safety inspections. According to these officials, this program would provide a means to assess the protective security measures implemented for specific assets. Lacking a mechanism to monitor what protective security measures are being implemented to protect the nation's critical highway infrastructure assets, TSA is unable to determine, with any degree of certainty, the level of overall security preparedness of these assets. In addition, without a process in place to better understand what security measures owners and operators are implementing, TSA is not effectively utilizing available information to help identify potential security gaps, establish protection priorities, and determine what, if any, additional measures may be needed to enhance highway infrastructure security. Conclusions: Securing the nation's vast and diverse highway infrastructure is a daunting task. The nature, size, and complexity of this infrastructure highlights the need for federal and non-federal entities to work together to secure these assets and enhance security. While the cost of enhancing highway infrastructure security can be significant, the potential costs of a terrorist attack, in terms of both the loss of life and property and long-term economic impacts, would also be significant although difficult to predict and quantify. The importance of the nation's highway infrastructure and the limited resources available to protect it underscore the need for a risk management approach to prioritize security efforts so that a proper balance between costs and security can be achieved. By not fully evaluating the risks posed by terrorists to the nation's highway infrastructure through available assessments, TSA and its security partners are limited in their ability to focus resources on those highway infrastructure vulnerabilities that represent the most critical security needs. The large and diverse group of stakeholders involved in highway infrastructure security makes it difficult to achieve the needed cooperation and consensus to move forward with security efforts. As we have noted in past reports, coordination and consensus-building are critical to the successful implementation of security efforts. By coordinating risk assessment activities and sharing the results of risk assessments, DHS could more effectively use scarce resources to target further assessment activities and mitigate identified risks. By developing the Highway Modal Annex for highway infrastructure, TSA established strategic goals and objectives, a key first step in implementing a risk management approach. However, highway infrastructure stakeholders could benefit from a Highway Modal Annex that clearly describes their roles, responsibilities, relationships, and expectations for securing highway infrastructure and provides accountability for accomplishing its objectives. Moreover, performance measures developed in conjunction with the Highway GCC and SCC are important to assist TSA in evaluating the effectiveness of highway infrastructure programs, based on desired results that are defined by the Annex. Without performance measures, TSA may not have information with which to systematically assess these program's strengths, weaknesses, and performance. Additional guidance on where to target resources and investments would help implementing parties allocate resources and investments according to priorities and constraints, track costs and performance, and shift such investments and resources as appropriate. We recognize that the Highway Modal Annex is not an endpoint for communicating and providing a framework for protecting highway infrastructure, but rather, a starting point. As with any planning effort, implementation is the key. The ultimate measure of this strategy's value will be the extent to which it proves useful as guidance for policy and decision-makers in allocating resources and balancing highway infrastructure security priorities with other important, non-highway infrastructure security objectives. It will be important over time to obtain and incorporate feedback from the stakeholder community as to how the strategy can better provide this guidance, and how Congress and the executive branch can identify and remedy impediments to implementation, such as legal, jurisdictional, or resource constraints. Finally, while the varied actions government and industry stakeholders have taken to address the risks to highway infrastructure are important initial efforts, without a mechanism to monitor what protective security measures are being taken to secure nationally critical infrastructure, TSA cannot fully determine the extent of security preparedness across the nation's highway infrastructure. Recommendations for Executive Action: We are recommending that the Secretary of Homeland Security take the following three actions: * To enhance collaboration among federal entities involved in securing highway infrastructure and better leverage federal resources, we recommend that the Secretary of Homeland Security establish a mechanism to systematically coordinate risk assessment activities and share the results of these activities among the federal partners. * To help ensure that highway infrastructure stakeholders are provided with useful information to identify and prioritize potential infrastructure security measures, enhance future planning efforts, and determine the extent to which specific protective security measures have been implemented, we recommend that the Secretary of Homeland Security direct the Assistant Secretary for the Transportation Security Administration, in consultation with the Highway Government Coordinating Council and the Highway Sector Coordinating Council, to take the following actions: (1) for the upcoming revision to the Highway Modal Annex: - in addition to the results of threat assessment information, incorporate the results of available vulnerability, and consequence assessment information into the strategy for securing highway infrastructure; - consistent with Executive Order 13416 and desirable characteristics of an effective national strategy, identify existing guidance developed by other federal and state highway infrastructure stakeholders; indicate timeframes or milestones for its overall implementation for which entities can be held responsible; more clearly define security- related roles and responsibilities for highway infrastructure security activities for itself and other federal stakeholders, state and local government, and the private sector; establish a timeframe for developing performance goals and measures for monitoring the implementation of the Annex's goals, objectives, and activities; and provide more guidance on resources, investments and risk management to help implementing parties allocate resources and investments according to priorities and constraints; and: (2) develop a cost-effective mechanism to monitor the implementation of voluntary protective security measures on highway infrastructure assets identified as nationally critical. Agency Comments and Our Evaluation: We provided a draft of this report to DHS for review and comment. DHS provided written comments on January 21, 2009, which are presented in Appendix VI. In commenting on the draft report, DHS and TSA reported that they concurred with all three of our recommendations and have started to develop plans to implement these recommendations. With regard to our first recommendation that DHS establish a mechanism to systematically coordinate risk assessment activities and share the results of these activities among federal partners, DHS stated TSA will have the lead in developing a sector coordinated risk assessment. TSA stated that it recognizes that it is responsible for all transportation security matters, must fulfill its leadership role in the highway infrastructure arena, and is prepared to assume responsibility for all highway infrastructure security issues. TSA added that it will request of all DHS, DOT and State or local governmental bodies that TSA become the repository for all risk assessment models and data associated with this mode. Toward this goal, DHS stated that TSA has convened representatives of both DHS and DOT agencies to produce the "National Strategy for Highway Bridge Security," which is currently under review by agencies and offices within both Departments. Once fully vetted, DHS believes that this document will provide for appropriate participation and coordination of efforts by all Federal agencies engaged in highway infrastructure security. We support TSA's efforts to improve coordination and develop the National Strategy for Highway Bridge Security. The intent of our recommendation is to help DHS avoid potential duplication, better focus future assessment efforts, and leverage limited resources. Thus, if TSA's efforts result in a mechanism that systematically coordinates risk assessment activities among the federal partners, this effort would go far in addressing the intent of our recommendation. Developing a plan that establishes a mechanism to systematically coordinate risk assessment activities and share the results of these activities among federal partners will also be an important and necessary step to fulfilling the agency's oversight and coordination responsibilities. TSA concurred with our second recommendation to include the results of available vulnerability and consequence assessment information in the upcoming revision to the Highway Modal Annex. In addition, TSA agreed to incorporate existing guidance developed by other federal and state highway infrastructure stakeholders, more clearly define security- related roles and responsibilities, establish a timeframe for its overall implementation and developing performance goals and measures. TSA stated that at the time of the drafting of the first iteration of the Highway Modal Annex, such vulnerability and consequence data was not available. TSA further stated that as the agency has expanded its CSR program, become more familiar with the stakeholder community security practices, and conducted much more detailed analyses of vulnerability and mitigation tools, TSA has improved its ability to conduct more comprehensive risk assessments that address threat, vulnerability, and consequences. TSA further stated that while those elements were considered in the preparation of the initial Annex, the document itself did not adequately explain how they were incorporated into the resulting strategy, and that future Annex publications would better explain TSA's use of all three risk elements. TSA agreed that the agency is in the best position to provide strategy guidance, coordination and oversight in this area. TSA also agreed that implementation milestones and preparedness timeframes are appropriate for the Highway Modal Annex. However, TSA cautioned that any limitations on the stakeholder community's implementation strategies will be based on a lack of resources, and indicated that the National Strategy for Highway Bridge Security is intended to help responsible stakeholders find resources dedicated exclusively to address the security needs of their structures. TSA stated that it does not believe that direct regulation is appropriate for the stakeholder community accountable for highway structures because, based on its experience, TSA believes this to be an overwhelmingly responsible constituency that will be highly proactive given appropriate resources and guidance. However, until TSA provides the details of how it plans to address our recommendation that it incorporate available vulnerability and consequence information into the Highway Annex and take other steps to strengthen the Annex, it remains unclear whether TSA can demonstrate that the Highway Modal Annex provides highway infrastructure stakeholders with available useful information to identify and prioritize potential infrastructure security measures, enhances future planning efforts, clarifies roles and responsibilities, and provides accountability. With regard to our third recommendation to develop a cost-effective mechanism to monitor the implementation of voluntary protective security measures on highway infrastructure assets identified as nationally critical, TSA agrees and stated that it is moving forward to identify a variety of mechanisms to monitor the voluntary security measures implemented with respect to critical highway structures. TSA stated that in fiscal year 2009, using funds made available specifically for this purpose for the first time since TSA was created, the agency will begin conducting individual vulnerability assessments on the nationally critical Tier 2 structures list. According to TSA, each assessment will be accompanied by a TSA-recommended approach to risk mitigation, and TSA will track the status of those recommendations on a periodic basis. TSA stated that its security partners will be kept informed of the progress of this effort. In addition, TSA stated its intention to clearly identify any to the implementation of voluntary security measures and would assist stakeholders in executing identified measures. Our intention in making this recommendation is for TSA to have the tools to allow it to more effectively monitor the level of overall security preparedness of critical assets, help identify potential security gaps, establish protection priorities, and determine what, if any, additional measures may be needed to enhance highway infrastructure security. Despite TSA's stated plans, the agency has not indicated the frequency with which it plans to compile or analyze information on highway infrastructure operator's security practices for critical assets, nor did TSA provide a time frame for completing the asset specific vulnerability assessments or identify what mechanisms would be used to monitor their implementation of voluntary protective security measures on highway infrastructure assets identified as nationally critical. Taking such actions would be necessary to fully address the intent of this recommendation. In addition, TSA noted that GAO has misstated or misinterpreted a key fact involving TSA's desire and intention to conduct individual vulnerability assessments on critical highway structures. TSA believes this misstatement significantly affects the findings of the report. TSA noted that the report indicates that TSA has either not decided whether to conduct such assessments or determined that they do not need to be done. Furthermore, TSA stated that it intends to conduct individual assessments on all bridge and tunnel properties that TSA has identified as critical, beginning in 2009. However, TSA did not indicate its desire to conduct these assessments, nor did it provide any documentation to support these plans, during the course of this review. Rather, throughout this review, TSA officials repeatedly told us that the resources associated with conducting individual vulnerability assessments of critical assets made it impractical to conduct such assessments. For this reason, TSA officials stated that they would utilize primarily a non asset-specific approach to conducting vulnerability assessments of the highway infrastructure sector, through the CSR program, and that the agency would rely on infrastructure owners and operators to conduct asset-level vulnerability assessments on highway assets. TSA officials did not make us aware of its plans to conduct individual vulnerability assessments of critical assets until the agency provided written comments on a draft of this report in January 2009. While we acknowledge TSA's stated intention to conduct individual vulnerability assessments on all critical highway infrastructure assets, we do not believe that the agency's recently reported plans to conduct these assessments affect the findings of this report because our discussion of TSA's efforts related to highway infrastructure vulnerability assessments was not used as the basis of any of the report's recommendations. However, we have revised this report to clarify TSA's plans related to vulnerability assessments. DHS also provided technical comments and clarifications, which we have considered and incorporated where appropriate. As agreed with your office, unless you publicly announce the contents of this report, we plan no further distribution for 30 days from the report date. At that time, we will send copies of this report the Secretary of Homeland Security, the Secretary of Transportation, the Assistant Secretary of the Transportation Security Administration, and appropriate congressional committees. In addition, this report will be available at no charge on the GAO Web site at [hyperlink, http://www.gao.gov/]. If you have any further questions about this report, please contact me at (202) 512-3404 or berrickc@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix VII. Signed by: Cathleen A. Berrick: Managing Director: Homeland Security and Justice Issues: [End of section] Appendix I: Objectives, Scope and Methodology: Objectives: You asked us to assess the progress DHS has made in securing the nation's highway infrastructure. This report answers the following questions: To what extent have federal entities assessed the risks to the nation's highway infrastructure and coordinated these efforts? To what extent has DHS developed a risk-based strategy, consistent with applicable federal guidance and characteristics of an effective national strategy, to guide its highway infrastructure security efforts? and: What actions have government and highway sector stakeholders taken to secure highway infrastructure, and to what extent has DHS monitored the implementation of asset-specific protective security measures? Scope and Methodology: To determine the extent that federal entities have assessed the risks to the nation's highway infrastructure and coordinated these efforts, we obtained and analyzed risk assessment data from DHS and DOT, comprised of various threat, vulnerability, and consequence related assessments for highway infrastructure assets.[Footnote 63] We did not assess the quality of the assessments completed. We sought to determine the reliability of these data by, among other things, discussing methods of inputting and maintaining data with agency officials. On the basis of these discussions and our review of the processes used to collect the data, we determined that the data were sufficiently reliable for the purposes of this report. We interviewed DHS, DOT and selected state transportation, homeland security, and law enforcement officials, associations representing highway infrastructure owners and operators, and members of the Highway GCC and the Highway SCC, to discuss federal risk assessment efforts. Although the selected state transportation and homeland security officials perspectives cannot be generalized across the wider population of highway infrastructure owners and operators, because we selected these states based on characteristics including location, and input on states representing security programs in which minimal to more robust security measures were implemented, they provided us a broad overview of highway infrastructure asset security. We selected the associations that we spoke with based on input from TSA, FHWA, and industry stakeholders who identified the major associations representing highway infrastructure owners and operators. To determine the extent to which TSA has used a risk management approach to guide decisions on securing highway infrastructure, we compared NIPP and TSSP requirements with TSA's efforts to implement such an approach. We focused on the strategic planning and risk assessment elements related activities of the NIPP management framework because DHS is early on in the process. The views reported include only those individuals we interviewed and are not necessarily representative of the views of others in those organizations. We also reviewed federal coordination and collaboration activities related to stakeholder efforts to assess and strengthen highway infrastructure security and compared them to GAO's recommended coordination practices. We also discussed with DHS, DOT and selected state transportation, homeland security, and law enforcement officials, associations representing highway infrastructure operators, and members of the Highway GCC, and the Highway SCC, the federal coordination and collaboration activities related to stakeholder efforts to assess and strengthen highway infrastructure security and compared them to the coordination requirements established in Homeland Security Presidential Directive-7, as well as GAO's recommended practices for effective collaboration. In addition, we analyzed TSA's actions regarding performance measurement with requirements in the Government Performance Results Act and GAO Standards for Internal Control in the Federal Government[Footnote 64] regarding the use of use performance measurement. To obtain information on how threat information is shared and TSA's efforts to address threats, we met with officials from TSA's Highway Motor Carrier Division, TSA's OI, and HITRAC. Individuals from these offices provided documentation on DHS and DOT's threat assessment efforts. In addition, we met with officials from DOT's Office of Intelligence regarding the sharing of threat information. To assess the extent to which DHS developed a risk-based strategy consistent with applicable federal guidance and characteristics of an effective national strategy to guide its highway infrastructure security efforts, we reviewed federal agency reports, guidelines, and infrastructure security studies sponsored by industry associations on using risk management, and interviewed DHS, and DOT officials and state and industry association highway infrastructure representatives regarding their use of risk management for protecting highway infrastructure. As the principal strategy for protecting the nation's highway infrastructure, we also analyzed TSA's Highway Modal Annex to determine how it aligned with the requirements set out in Executive Order 13416: Strengthening Surface Transportation Security. In addition, we assessed the extent to which the Highway Modal Annex contained the desirable characteristics for an effective national strategy that we have previously identified.[Footnote 65] To identify the actions taken by government and highway sector stakeholders to enhance the security of highway infrastructure and assess the extent TSA has monitored the implementation of protective security measures implemented by stakeholders, we interviewed DHS, DOT, DOD, and selected state transportation, homeland security, and law enforcement officials, all major associations representing highway infrastructure operators, and members of the Highway GCC, and the Highway SCC. We also analyzed TSA, IP, and USCG vulnerability assessments of security practices at the state level and records of GCC and SCC meetings and stakeholder conferences. In addition, we selected 12 bridges and one tunnel to observe security measures implemented since September 11, 2001 and to discuss security-related issues with highway infrastructure owners and operators. We selected these assets based on characteristics including location, ownership, and criticality, and input on locations representing assets in which minimal to more robust security measures were implemented from TSA, DOT, and AASHTO[Footnote 66]. Because of the limited number of assets in our sample, and because the selected assets did not constitute a representative sample, the results of our observation and analysis cannot be generalized to the universe of highway infrastructure assets. However, we believe that the observations obtained from these visits provide us with a broad overview of highway infrastructure asset security. We also reviewed federal guidance and applicable laws and regulations. In addition, we observed FHWA training programs and joint stakeholder conferences. We also reviewed DHS Science and Technology Directorate, TSA, DOT, AASHTO, and TRB documents to identify research and development efforts to improve highway infrastructure security. We also compared TSA's actions to obtain data on actions taken by highway infrastructure stakeholders to enhance security and to monitor implementation of those actions with criteria in GAO Standards for Internal Control in the Federal Government.[Footnote 67] We conducted this performance audit from May 2007 through January 2009 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. [End of section] Appendix II: Selected Laws and Federal Guidance Concerning the Security of Highway Infrastructure, 1996 to Present: [End of section] Although there are no laws that specifically address highway infrastructure security or require highway infrastructure owners and operators to take certain security measures, a number of laws that generally address critical infrastructure protection and transportation security have been enacted. Similarly, the President has issued directives, and federal agencies have developed strategies, designed to coordinate the federal effort to ensure the security of critical infrastructure and transportation assets. The below table lists statutes, executive orders, presidential directives, and strategies that address critical infrastructure protection and transportation security. Policy action: Executive Order 13010[A]; Date: July 1996; Key elements: Established the President's Commission on Critical Infrastructure Protection (CIP) to study the nation's vulnerabilities to both cyber and physical threats. Identified the need for the government and the private sector to work together to establish a strategy for protecting critical infrastructures from physical and cyber threats. Policy action: Presidential Decision Directive 63; Date: May 1998; Key elements: Established CIP as a national goal and presented a strategy for cooperative efforts by government and the private sector to protect the physical and cyber-based systems essential to the minimum operations of the economy and the government; Superseded by HSPD-7 (see details on HSPD-7 below). Policy action: USA PATRIOT Act[B]; Date: Oct. 2001; Key elements: Established the National Infrastructure Simulation and Analysis Center (NISAC) to serve as a source of national competence to address critical infrastructure protection and continuity through support for activities related to counterterrorism, threat assessment, and risk mitigation. Policy action: Executive Order 13228[C]; Date: Oct. 2001; Key elements: Established the Office of Homeland Security, within the Executive Office of the President, to develop and coordinate the implementation of a comprehensive national strategy to secure the United States from terrorist threats or attacks; Established the Homeland Security Council to advise and assist the President with all aspects of homeland security and to ensure the coordination of homeland security-related activities of executive departments and agencies and effective development and implementation of homeland security policies. Policy action: Executive Order 13231[D]; Date: Oct. 2001; Key elements: Established the President's Critical Infrastructure Protection Board, which was to recommend policies and coordinate programs for protection information systems for critical infrastructure. Policy action: Aviation and Transportation Security Act[E]; Date: Nov. 2001; Key elements: Created the Transportation Security Administration (TSA) and conferred upon TSA responsibility for security in all modes of transportation. Policy action: National Strategy for Homeland Security[F]; Date: July 2002; Key elements: Identified the protection of critical infrastructures and key assets as a critical mission area for homeland security.; Specified 8 major initiatives for CIP, one of which specifically calls for the development of the NIPP. Policy action: Homeland Security Act of 2002[G]; Date: Nov. 2002; Key elements: Created the DHS and assigned it the following CIP responsibilities: (1) developing a comprehensive national plan for securing the key resources and critical infrastructures of the United States; (2) recommending measures to protect the key resources and critical infrastructures of the United States in coordination with other entities; and (3) disseminating, as appropriate, information to assist in the deterrence, prevention, and preemption of or response to terrorist attacks. Also provided for protection of voluntarily submitted information regarding the security of critical infrastructure. Policy action: The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets[H]; Date: Feb. 2003; Key elements: Identifies a set of goals and objectives and outlines the guiding principles that will underpin efforts to secure the infrastructures and assets vital to the nation's public health and safety, national security, governance, economy, and public confidence. Policy action: Exec. Order No. 13,286, 68 Fed. Reg. 10609 (Feb. 28, 2003); Date: Feb. 2003; Key elements: Amended Executive Order 13231 but generally maintained the same national policy statement regarding the protection against disruption of information systems for critical infrastructures.; Designated the National Infrastructure Advisory Council to continue to provide the President with advice on the security of information systems for critical infrastructures supporting other sectors of the economy through the Secretary of Homeland Security. Policy action: Homeland Security Presidential Directive 7; Date: Dec. 2003; Key elements: Superseded Presidential Decision Directive 63 and established that federal departments and agencies will identify and prioritize U.S. critical infrastructure and key resources and to protect them from terrorist attack.; Defined roles and responsibilities for the DHS and sector-specific agencies to work with sectors to coordinate CIP activities; Established a CIP Policy Coordinating Committee to advise the Homeland Security Council on interagency CIP issues. Policy action: Homeland Security Presidential Directive 8; Date: Dec. 2003; Key elements: Directed DHS to coordinate the development of an all- hazards National Preparedness Goal that establishes measurable priorities, targets, standards for preparedness assessments and strategies, and a system for assessing the Nation's overall level of preparedness. Policy action: Intelligence Reform and Terrorism Prevention Act of 2004[I]; Date: Dec. 2004; Key elements: Required the Secretary of Homeland Security to develop and implement a National Strategy for Transportation Security (NSTS) and modal security plans.; Required the NSTS to include an identification and evaluation of the transportation assets that must be protected from attack or disruption, the development of risk-based priorities for addressing security needs associated with such assets, means of defending such assets, a strategic plan that delineates the roles and missions of various stakeholders, a comprehensive delineation of response and recovery responsibilities, and a prioritization of research and development objectives. Policy action: Safe, Accountable, Flexible, Efficient Transportation Equity Act: A Legacy for Users[J]; Date: Aug. 2005; Key elements: Expanded security as a separate factor that must be addressed by statewide and metropolitan transportation plans by requiring that plans provide for consideration of projects and strategies that, among other things, will increase the security of the transportation system for motorized and non-motorized users. Policy action: National Strategy for Transportation Security; Date: Sept. 2005; Key elements: Outlines the Federal government's approach - in partnership with state, local and tribal governments and private industry - to secure the U.S. transportation system from terrorist threats and attacks, and prepare the Nation by increasing our capacity to respond if either occurs. Policy action: Post-Katrina Emergency Management Reform Act[K]; Date: Oct. 2006; Key elements: Expanded the purpose of the NISAC to include support for activities related to a natural disaster, act of terrorism, or other man-made disaster; Specified that the support must include modeling, simulation, and analysis of the systems and assets comprising critical infrastructure, in order to enhance preparedness, protection, response, recovery, and mitigation activities; Required any federal agency with critical infrastructure responsibilities under HSPD-7 to establish a relationship, including an agreement regarding information sharing, between such agency and the NISAC. Policy action: National Infrastructure Protection Plan; Date: June 2006; Key elements: Provided the framework and set the direction for implementing a coordinated, national effort. It provides a roadmap for identifying Critical Infrastructure/Key Resource assets, assessing vulnerabilities, prioritizing assets, and implementing protection measures in each infrastructure sector. Policy action: Procedures for Handling Critical Infrastructure Information[L]; Date: Sept. 2006; Key elements: Established procedures for federal, state, local, and tribal government agencies and contractors regarding the receipt, validation, handling, storage, marking, and use of critical infrastructure information voluntarily submitted to the DHS. Policy action: Executive Order 13416[M]; Date: Dec. 2006; Key elements: Required the Secretary of Homeland Security to assess the security of each surface transportation mode and evaluate the effectiveness and efficiency of current surface transportation security initiatives.; Imposed a deadline on the Secretary of Homeland Security to complete the Transportation Sector-Specific Plan (TSSP) and required the Secretary to develop modal annexes that addresses each surface transportation mode. Policy action: Transportation Sector-Specific Plan (TSSP); Date: May 2007; Key elements: Establishes the transportation sector's strategic approach and related security framework. Policy action: Highway and Motor Carrier Annex; Date: May 2007; Key elements: Describes how the TSSP will be implemented in the Highway mode. Policy action: Implementing Recommendations of the 9/11 Commission Act[N]; Date: Aug. 2007; Key elements: Required the Secretary to establish and maintain a national database of each system or asset that the Secretary determines to be vital and the loss, interruption, incapacity, or destruction of which would have a negative or debilitating effect on economic security, public health, or safety, or that the Secretary otherwise determines to be appropriate for inclusion; Required the Under Secretary for Information Analysis and Infrastructure Protection, not later than 35 days after the last day of each fiscal year, including fiscal year 2007, to submit to the appropriate committees, for each sector identified in the NIPP, a report on the comprehensive assessments carried out by the Secretary of critical infrastructure and key resources, evaluating threat, vulnerability, and consequence; Required the Secretary, not later than 6 months after the last day of each fiscal year, to submit to the appropriate committees a report that details the actions of the federal government to ensure the preparedness of industry to reduce interruption of critical infrastructure and key resource operations during an act of terrorism, natural catastrophe, or other similar national emergency; Specified that the transportation modal security plans required under 49 U.S.C. § 114(t) must include threats, vulnerabilities, and consequences for aviation, railroad, ferry, highway, maritime, pipeline, public transportation, over-the-road bus, and other transportation infrastructure assets; Required that the National Strategy for Transportation Security include a 3-and 10-year budget for federal transportation security programs that will achieve the priorities of the NSTS, methods for linking the individual transportation modal security plans and a plan for addressing intermodal transportation, and transportation modal security plans; Required the Secretary, in addition to submitting an assessment of the progress made on implementing the NSTS, to submit an assessment of the progress made on implementing the transportation modal security plans; Required that the progress reports include an accounting of all grants for transportation security, funds requested in the President's budget for transportation security, by mode, personnel working on transportation security, by mode, and information on the turnover in the previous year among senior staff working on transportation security issues; Required the Secretary, at the end of each fiscal year, to submit to the appropriate committees an explanation of any federal transportation security activity that is inconsistent with the NSTS; Required that the NSTS include the Transportation Sector-Specific Plan (TSSP) required by HSPD- 7; Required the Secretary to establish a Transportation Security Information Sharing Plan, and specifies the contents of the plan; Required the Secretary, not later than 150 days after enactment and annually thereafter, to submit to the appropriate committees a report containing the plan; Required the Secretary, to the greatest extent practicable, to provide public and private stakeholders with transportation security information in an unclassified format; Required the Secretary, in a semiannual report, to provide to the appropriate committees a report that includes the number of public and private stakeholders that were provided with each report, a description of measures that the Secretary has taken to ensure proper treatment and security for any classified information to be shared with stakeholders, and an explanation of the reason for the denial of information to any stakeholder that has previously received information; Required the Secretary to establish a National Transportation Security Center of Excellence to conduct research and education activities and to develop or provide professional security training; Provided for civil and administrative penalties for violations of transportation security regulations prescribed by the Secretary; Authorized the Secretary to develop Visible Intermodal Prevention and Response (VIPR) teams to augment the security of any mode of transportation in any location in the United States; Authorized to be appropriated such funds as may be necessary to carry out this section for fiscal years 2007 through 2011.; Authorized the Secretary to train, employ, and utilize surface transportation inspectors; Required the Secretary to establish a program to provide appropriate information that the Department has gathered or developed on the performance, use, and testing of technologies that may be used to enhance surface transportation security to surface transportation entities; Required the Inspector General of the DHS, not later than 90 days after enactment, to submit a report to the appropriate committees on the federal trucking industry security grant program for fiscal years 2004 and 2005 that addresses the grant announcement, application, receipt, review, award, monitoring, and closeout process and states the amount obligated or expended under the program for fiscal years 2004 and 2005 for certain purposes; Required the Inspector General of the DHS, not later than 1 year after enactment, to submit a report to the appropriate committees that analyzes the performance, efficiency, and effectiveness of the federal trucking industry security grant program and the need for the program, using all years of available data, and that makes recommendation regarding the future of the program. Source: GAO analysis of documents listed above. [A] Exec. Order No. 13,010, 61 Fed. Reg. 37,347 (July 15, 1996). [B] 42 U.S.C. § 5195c. [C] Exec. Order No. 13,228, 66 Fed. Reg. 51,812 (Oct. 8, 2001). [D] Exec. Order No. 13,231, 66 Fed. Reg. 53,063 (Oct. 16, 2001). [E] 49 U.S.C. § 114. [F] The White House, Office of Homeland Security, National Strategy for Homeland Security. [G] Pub. L. No. 107-296, §§ 201(d), 214, 116 Stat. 2135, 2145-47, 2152- 55 (2002). [H] The White House, The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. [I] 49 U.S.C. § 114(s). [J] Pub. L. No. 109-59, § 6001(a), 119 Stat. 1144, 1839-57 (codified at 23 U.S.C. § 134, 135). [K] 6 U.S.C. § 321. [L] 6 C.F.R. §§ 29.1-29.9. [M] Exec. Order No. 13,416, 71 Fed.Reg. 71,033 (Dec. 5, 2006). [N] Pub. L. No. 110-53, 121 Stat. 266 (2007). [End of table] [End of section] Appendix III: Examples of Selected Protective Security Measures that Could be Implemented by Asset Owners and Operators: Potential Countermeasures: Restrict physical access to critical systems and structures: * Install fencing and other physical barriers to prevent access to critical bridge elements such as decks, piers, towers, and cable anchors; * Utilize a full-time security officer to control access to restricted areas; * Utilize security badges or other identification device to ensure access to restricted areas is properly controlled; * Install locking devices on all access gates and utilize remote controlled gates where necessary; * Eliminate parking under bridges or near critical structures; * Protect tunnel ventilation intakes with barriers and install and protect ventilation emergency shut off systems; * Utilize creative landscaping to increase standoff distance from critical areas. Surveillance and detection efforts: * Provide inspections to identify potential explosive devices, as well as increased or suspicious potential criminal activity; * Display signs warning that the property is secured and being monitored; * Install CCTV systems where they cannot be easily damaged or avoided while providing coverage of critical areas (to monitor activity, detect suspicious actions, and identify suspects); * Install enhanced lighting with emergency backup; * Install motion sensors or other intrusion detection systems; * Clear overgrown vegetation to improve lines of sight to critical areas. Security planning and coordination: * Develop and implement a security plan that serves to identify critical systems and establishes procedures for their protection; * Provide emergency telephones to report incidents or suspicious activity; * Develop communication and incident-response protocols with applicable local, state, and federal law enforcement; * Review locations of trashcans or other storage areas that could be used conceal an explosive device and ensure they are not near critical areas; * Provide pass-through gates in concrete median barriers to enable rerouting of traffic and access for emergency vehicles; * Use of an advanced warning system, including warning signs, lights, horns, and pop-up barricades to restrict access after span failure (manually activated or activated by span failure detectors). Structural modifications: * Shield the lower portions of cables on cable-stayed bridges and suspension bridges with protective armor to protect against damage from blast and fragmentation; * Increase the standoff distance and reduce access to critical elements with structural modifications (extending cable guide pipe length, moving guard rails, etc.); * Reinforce welds and bolted connections to ensure plastic capacity; * Use energy absorbing bolts to strengthen connections and reduce deformations; * Provide system redundancy to ensure alternate load paths exist should a critical structural element fail or become heavily damaged as a result of a terrorist attack. Source: GAO analysis of data prepared by FHWA, IP, AASHTO, and TRB. [End of table] [End of section] Appendix IV: Summary of Selected Federal and Non-Federal Research and Development Programs to Enhance Highway Infrastructure: Project Title: Synthesis of surveillance and security technologies and development of info-sharing website; Description: This study is a synthesis of existing surveillance and security technologies to assist bridge owners in decision making. FHWA is also developing a website for infrastructure owners to access this information and interact with other owners on their effectiveness; Key Organization: FHWA. Project Title: Modeling and analysis of steel bridge towers subjected to blast loadings; Description: This is a pooled fund experimental study to determine the effects of detonating explosives on steel bridge towers, develop and test retrofit strategies, and validate computer codes and modeling techniques; Key Organization: FHWA. Project Title: Bridge specific blast loading program; Description: This study modified the Conventional Weapons Effects Program to provide a user friendly computer program for consistent definition of blast loadings on bridges titled the Bridge Explosives Loading (BEL) program; Key Organization: FHWA. Project Title: Blast testing of full scale, pre-cast, pre-stressed concrete girder bridges; Description: FHWA is participating in this pooled fund study led by Washington State DOT to assess blast loadings and develop recommendations for possible mitigation measures that would harden this type of bridge blast damage; Key Organization: WSDOT, FHWA. Project Title: Blast resistant composite barriers; Description: This study will characterize blast, fire and mechanical cutting-resistant material properties of available composite materials and the feasibility of producing improved properties through the use of nano-composites or other material modifications; Key Organization: FHWA. Project Title: Protective retrofit for small-diameter cables or thin- sectioned steel structural members; Description: This study aims to establish performance requirements for a lightweight structural system for protecting small-diameter cables and thin-sectioned steel members against different attack methods; Key Organization: FHWA. Project Title: International Survey on Underground Transportation Systems in Europe; Description: This survey identified European safety practices that can be used in the United States to improve safety. Specific practices and security strategies identified have been shared in a written report as well as outreach efforts to tunnel owners. As a secondary effort, FHWA developed a Load and Resistance Design Factor Guide for AASHTO which incorporated findings from the International Survey and has become the standard design methodology; Key Organization: FHWA, AASHTO. Project Title: Blast/Projectile Protection Project; Description: This study includes basic research to understand the blast failure mechanisms of the most vital critical infrastructures such as dams, tunnels and bridges. In fiscal year 2007, the program developed a program plan and began physical testing and numerical modeling of blast effects on embankment dams and mitigation (hardening) measures for tunnels and bridge cables. In fiscal year 2008, the project began to evaluate blast effects and mitigation measures for dams, tunnels, and bridges. The amount of project funding targeted to bridge research was approximately $3.0 million for fiscal year 2007 and fiscal year 2008. The amount dedicated to tunnels during this period was approximately $1.9 million. However, an additional $1.0 million of fiscal year 2007 Infrastructure/Geophysical funds were dedicated to tunnel research, bringing the total funding for tunnel research funding for to $2.9 million; Key Organization: DHS, Science and Technology Directorate. Project Title: Infrastructure Blast Mitigation Project; Description: This project is developing technologies to mitigate the explosive and damaging force from an IED. In fiscal year 2008, the project conducted tests and evaluation of prototype technologies to evaluate blast mitigation performance and performed proof-of-concept demonstrations. In fiscal year 2009, the project plans to begin to develop models to further determine the vulnerability of infrastructure, bridges, and tunnels to various explosive threats; Key Organization: DHS, Science and Technology Directorate. Project Title: Rapid Mitigation and Recovery (for Critical Infrastructure) Project; Description: This project is developing rapid mitigation and recovery technologies for critical infrastructure to limit damage and consequences and to more quickly resume normal operations. The project will investigate rapid response and recovery technologies in addition to conducting basic research for the most vital infrastructure assets, such as underwater tunnels, bridges, levees, and dams; Key Organization: DHS, Science and Technology Directorate. Project Title: Resilient Tunnel Project; Description: This study seeks approaches to address critical vulnerabilities in U.S. transportation tunnels. Beginning in fiscal year 2007, this project surveyed concepts for tunnel protection, including studies on advanced materials for tunnel hardening and identification of an inflatable plug system, based on European technology, to limit the spread of fire. Further development of this system has continued in fiscal year 2008, with full completion and demonstration of a prototype inflatable plug currently scheduled for fiscal year 2010; Key Organization: DHS, Science and Technology Directorate. Project Title: Cooperative Research Program; Description: The following reports represent a sample of products completed at the request of the AASHTO Special Committee on Transportation Security: * American Association of State Highway and Transportation Officials. Protecting America's Roads, Bridges, and Tunnels: The Role of State DOTs in Homeland Security. Project 20-59 (16). Washington, D.C., 2005; * Blue Ribbon Panel on Bridge and Tunnel Security. Recommendations for Bridge and Tunnel Security. Project 20-59 (3). Washington, D.C.: Federal Highway Administration, September 2003; * Transportation Research Board. A Self-Study Course on Terrorism- Related Risk Management of Highway Infrastructure. Project 20-59 (2). Washington, D.C., 2005; * Transportation Research Board. Disruption Impact Estimating Tool- Transportation (DIETT): A Tool for Prioritizing High-Value Transportation Choke Points. Project 20-59 (9).Washington, D.C., 2005; * Transportation Research Board. Guide to Making transportation tunnels safe and secure. Project 20-67. Washington, D.C., 2006; * Transportation Research Board. Guidelines for Transportation Emergency Training Exercises. Project 20-59 (18). Washington, D.C., 2005; * Transportation Research Board. National Needs Assessment for Ensuring Transportation Infrastructure Security. Project 20-59 (5). Washington, D.C., 2002; * Transportation Research Board. Responding to Threats: A Field Personnel Manuals. Project 20-59 (6). Washington, D.C., 2003; Key Organization: Transportation Research Board. Source: GAO analysis of information provided by DHS, FHWA, AASHTO, and TRB. [End of table] [End of section] Appendix V: Comments from the Department of Homeland Security: U.S. Department of Homeland Security: Washington, DC 20528: [hyperlink, http://www.dhs.gov]: January 21, 2009: Ms. Cathleen A. Berrick: Director, Homeland Security and Justice Issues: U.S. Government Accountability Office: 441 G Street, NW: Washington, D.C. 20548: Dear Ms. Berrick: RE: Draft Report GAO-09-57SU, Highway Infrastructure: Federal Efforts to Strengthen Security Should Be Better Coordinated and Targeted on the Nation's Most Critical Highway Infrastructure (GAO Job Code 440633) The Department of Homeland Security (DHS) appreciates the opportunity to review and comment on the draft report referenced above. The report contains two recommendations, one to the Department and another specifically addressed to the Transportation Security Administration. Department and Transportation Security Administration (TSA) officials agree with the recommendations. TSA officials have already started to formulate implementation plans. The following response brings current any references made in the draft report to ongoing, developing, or maturing programs within TSA to ensure the integrity of any actions or decisions premised on this review. This report represents a snapshot of TSA initiatives as of the time of its compilation. Although there is agreement with the recommendations, TSA officials believe that the U.S. Government Accountability Office (GAO) has misstated or misinterpreted a key fact and this misstatement significantly affects the findings of the report. The issue involves the TSA Highway and Motor Carrier (HMC) Division's desire and intention to conduct individual vulnerability assessments on critical highway structures. This report indicates that the TSA HMC Division has either not decided whether to conduct such assessments or has determined that they would not be done. TSA intends to conduct individual assessments on all bridge and tunnel properties that TSA had identified as "critical" and thus selected to occupy the DHS "Tier 2" structures list. Recommendation 1: The Secretary of Homeland Security establish a mechanism to systematically coordinate risk assessment activities and share the results of these activities among the federal partners. Response: The Department agrees with the recommendation. TSA will have the lead in developing a sector coordinated risk assessment. The function of "security risk assessment" has taken many forms under many agencies since the events of 9/11 and that a uniform and central system of assessment, data storage, and information sharing is critical to the effective implementation of terrorist mitigation tools in the future. In large part, TSA attributes the current state of coordination and information sharing to the enthusiasm of legacy U.S. Department of Transportation (USDOT) agencies to play a meaningful role in security immediately after the events of 9/11, the evolution of assignment of federal security responsibility through laws and policies, and the maturation processes of TSA and fellow DHS components. TSA recognizes, however, that it is responsible for all transportation security matters and intends to fulfill its leadership role in the highway infrastructure arena. TSA is prepared to assume responsibility for all highway infrastructure security issues and will request of all DHS, USDOT and state or local governmental bodies that TSA become the repository for all risk- assessment models and data associated with this mode. Toward this goal, TSA has already convened representatives of both DHS and USDOT agencies to produce the document titled, National Strategy for Highway Bridge Security, which is currently under review by agencies and offices within both Departments. Once fully vetted, this document provides for appropriate participation and coordination of efforts by all federal agencies engaged in highway infrastructure security. Recommendation 2: The Assistant Secretary for the Transportation Security Administration, in consultation with the Highway Government Coordinating Council and the Highway Sector Coordinating Council should take the following two actions: (1) For the upcoming revision to the Highway Modal Annex: (a) in addition to the results of threat assessment information, incorporate the results of available vulnerability and consequence assessment information into the strategy for securing highway infrastructure; (b) consistent with Executive Order 13416 and desirable characteristics of an effective national strategy, identify existing guidance developed by other federal and state highway infrastructure stakeholders; indicate timeframes or milestones for its overall implementation for which entities can be held responsible; more clearly define security- related roles and responsibilities for highway infrastructure security activities for itself and other federal stakeholders, state and local government, and the private sector; establish a timeframe for developing performance goals and measures for monitoring the implementation of the Annex's goals, objectives, and activities; and provide more guidance on resource, investment, and risk management to help implementing parties allocate resources and investments according to priorities and constraints; and; (2) develop a cost-effective mechanism to monitor the implementation of voluntary protective security measures on highway infrastructure assets identified as nationally critical. Response: TSA agrees with the recommendation. (l a) At the time of the drafting of the first iteration of the Highway Modal Annex, such vulnerability and consequence data was not available. As TSA has expanded its Corporate Security Review (CSR) program, personnel have become more familiar with stakeholder community security practices, and conducted much more detailed analyses of vulnerability and mitigation tools. As a result, TSA has improved its ability to conduct more comprehensive risk assessments that address threat, vulnerability, and consequences. While those elements were considered in the preparation of the initial Annex, the document itself did not adequately explain how they were incorporated into the resulting strategy. Future Annex publications will better explain TSA's use of all three risk elements. TSA agrees that it is in the best position to provide strategy guidance, coordination, and oversight in this area. TSA also agrees that implementation milestones and preparedness timeframes are appropriate for the Highway Modal Annex, but cautions that limitations on this stakeholder community's implementation strategies will be based on lack of resources, not lack of enthusiasm. It is for that reason that the National Strategy for Highway Bridge Security document referenced in the response to Recommendation 1 seeks to help responsible stakeholders find resources dedicated exclusively to address the security needs of their structures. (lb) TSA has indicated to GAO that it does not believe that direct regulation is appropriate for the stakeholder community accountable for highway structures (largely state and local governments, quasi- government authorities and public corporations). Based on experience, TSA believes this to be an overwhelmingly responsible constituency that will be highly proactive given appropriate resources and guidance. TSA does, however, agree with GAO's recommended actions for its motor carrier constituency. TSA is responsible for both motor carriers (e.g., trucks, buses) and highway structures (e.g., bridges, roads, tunnels). To be clear, the agency will provide guidance and consider regulations and compliance for the motor carrier segment of its stakeholder community but does not believe there is a need for regulation in the stakeholder community responsible for critical highway structures. (2) TSA agrees and is moving forward to identify a variety of mechanisms to monitor the voluntary security measures implemented with respect to critical highway structures. In Fiscal Year 2009, using funds made available specifically for this purpose, TSA will begin individual vulnerability assessments on its national critical Tier II structures list. Each assessment will be accompanied by a TSA- recommended approach to risk mitigation, and TSA will track the status of those recommendations on a periodic basis. TSA's security partners will be kept informed of progress. In addition, it is TSA's intention to clearly identify any hindrances to implementation and try to assist the stakeholder in executing identified measures. Sincerely, Signed by; Jerald E. Levine: Director: Departmental GAO/OIG Liaison Office: [End of section] Appendix VI: GAO Contact and Staff Acknowledgments: GAO Contact: Cathleen A. Berrick, (202) 512-3404 or berrickc@gao.gov: Staff Acknowledgments: In addition to the contact named above, Steve Morris, Assistant Director, and Gary M. Malavenda, Analyst-in-Charge, managed this assignment. Jean Orland, Ryan Lambert, Susan Langley, and Dan Rodriguez made significant contributions to the work. Stan Kostyla and Chuck Bausell assisted with design, methodology, and data analysis. Linda Miller provided assistance in report preparation; Tracey King provided legal support; Nikki Clowers provided expertise on physical infrastructure issues; Sara Veale provided expertise on coordination and collaboration best practices; Elizabeth Curda provided expertise on performance management; and Pille Anvelt and Avrum Ashery developed the report's graphics. [End of section] Footnotes: [1] IP is an organizational entity within the National Protection and Programs Directorate. Critical infrastructure are systems and assets, whether physical or virtual, so vital to the United States that their incapacity or destruction would have a debilitating impact on national security, national economic security, national public health or safety, or any combination of those matters. Key resources are publicly or privately controlled resources essential to minimal operations of the economy and government. For purposes of this report, we will use the term critical infrastructure to also include key resources. [2] DHS determined that the risk assessment information is "For Official Use Only." As a result, the related data are not contained in this report. [3] The Highway GCC was established in April 2006, and consists of federal stakeholders and state and local officials with sector-specific security responsibilities. The Highway SCC, established in June 2006, consists of private sector organization, owner-operators, and entities with transportation security responsibilities. [4] Homeland Security Presidential Directive-7, issued December 17, 2003, establishes a national policy for Federal departments and agencies to identify and prioritize U.S. critical infrastructure and to protect them from terrorist attacks. The Directive identifies key roles and responsibilities of the DHS Secretary and applicable federal agencies, including requirements for coordination of protection efforts among government agencies and with the private sector. GAO, Results- Oriented Government: Practices That Can Help Enhance and Sustain Collaboration among Federal Agencies, [hyperlink, http://www.gao.gov/products/GAO-06-15] (Washington D.C: October 21, 2005). [5] Executive Order 13416, issued in December 2005, mandates that an annex shall be completed for each surface transportation mode in support of the Transportation Systems Sector-Specific Plan. The Highway Infrastructure and Motor Carrier modal annex (Highway Modal Annex) was developed to meet this mandate and is intended to meet the minimum content requirements set forth in this Order. Exec. Order No. 13,416, 71 Fed. Reg. 71,033 (Dec. 5, 2006). [6] These characteristics were developed after our research found that there were no legislative or executive mandates identifying a uniform set of required or desirable characteristics for national strategies. For a more detailed discussion of these characteristics, see GAO: Combating Terrorism: Evaluation of Selected Characteristics in National Strategies Related to Terrorism, GAO-04-408T (Washington, D.C: Feb. 3, 2004). [7] AASHTO represents highway and transportation departments in the 50 states, the District of Columbia, and Puerto Rico. [8] GAO, Standards for Internal Control in the Federal Government, [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1] (Washington, D.C.: Nov. 1, 1999). These standards, issued pursuant to the requirements of the Federal Managers' Financial Integrity Act of 1982 (FMFIA), provide the overall framework for establishing and maintaining internal control in the federal government. Also pursuant to FMFIA, the Office of Management and Budget (OMB) issued Circular A- 123, revised December 21, 2004, to provide the specific requirements for assessing the reporting on internal controls. Internal control standards and the definition of internal control in OMB Circular A-123 are based on GAO's Standards for Internal Control in the Federal Government. [9] See [hyperlink, http://www.gao.gov/products/GAO-06-15]. [10] The Homeland Security Grant Program consists of three underlying programs that have been used, in part, to finance highway infrastructure security enhancements--the State Homeland Security Program, the Urban Area Security Initiative, and the Law Enforcement Terrorism Prevention Program. Under the Infrastructure Protection Program, highway infrastructure security efforts have primarily been funded through the Buffer Zone Protection Program (BZPP) and the Trucking Security Program. [11] Prior to the terrorist attacks of September 11, 2001, DOT was the primary federal entity involved in regulating highway infrastructure as it concerned safety. No particular entity was responsible for highway infrastructure security prior to the establishment of TSA. [12] Homeland Security Presidential Directive-7 (HSPD-7) directed DOT and the DHS to collaborate on all matters related to transportation security and transportation infrastructure protection. [13] Pub. L. No. 107-71, § 101(a), 115 Stat. 597, 598 (2001) (codified at 49 U.S.C. § 114(f)). [14] Pub. L. No. 107-296, §§ 101, 201(d),116 Stat. 2135, 2142, 2145-46 (2002). [15] Pub. L. No. 108-458, § 4001(a), 118 Stat. 3638, 3710 (2004) (codified as amended at 49 U.S.C. § 114(s)). [16] Pub. L. No. 110-53, §§ 1202, 1203, 121 Stat. 266, 381-86 (2007). At the time of our review, DHS had not issued this plan. [17] Exec. Order No. 13,416, 71 Fed. Reg. 71,033 (Dec. 5, 2006). [18] Specific threat information is "For Official Use Only" and is not contained in this report. [19] According to TSA officials, investigation of this incident was still ongoing and no additional details were provided. [20] As part of the analysis conducted to determine the high-risk scenarios identified in the SHIRA report for the highway sector, IP incorporated vulnerability and consequence data provided by TSA, as well as input from DOT. [21] MSRAM is a terrorism risk analysis tool used by USCG units to identify critical infrastructure and support risk-based security decisions. [22] The HMC division of TSA currently has 19 staff and is responsible for managing the following functional areas: Trucking and Hazardous Materials, Motor coaches, School Transportation, Commercial Drivers Licenses, and Highway Infrastructure. [23] The 11 CSR functional areas identified by TSA include: threat assessments, vulnerability assessments, security planning, credentialing, designation and management of secure areas, critical asset identification, physical security measures, cyber security measures, security training, communications practices, and security exercises. [24] While HMC has identified these visits as asset-specific CSRs, HMC documented its findings for a limited number of cases. The other visits did not result in a formal CSR report. [25] According to HMC officials, the decision to complete CSR's in all 50 states was largely attributable to a request by AASHTO. Prior to this decision, HMC documented that CSR's would be conducted on the basis of risk and prioritized to those states with greater numbers of critical highway infrastructure assets. [26] The Standard for Program ManagementŠ (The Project Management Institute, 2006). [27] According to HMC officials, the effort has the full support of AASHTO but remains dependent on individual states to support additional training and other requirements related to these efforts. [28] The number of vulnerability assessments that were conducted is designated "For Official Use Only" and is not contained in this report. [29] Requests for federal funding under the BZPP are tracked using the Vulnerability Reduction Purchasing Plan. Once the plan is reviewed and approved by IP, FEMA is responsible for administering the funds and monitoring expenditures. [30] Grant funding available through the BZPP program was approximately $91 million in 2005 and approximately $50 million for each fiscal year from 2006 through 2008. [31] Stakeholder security efforts are coordinated within the Area Maritime Security Committee, whose members may include asset owners and operators of maritime bridges and tunnels. [32] DHS determined that the Tier 1 list criteria and all numbers related to the Tier list is "For Official Use Only." As a result, the related data are not contained in this report. [33] According to USCG officials, risk assessments conducted by IP on the same infrastructure assets may be valuable to validate and inform its own MSRAM analysis. [34] See [hyperlink, http://www.gao.gov/products/GAO-06-15]. [35] According to FHWA officials, they assisted in arranging and participated in several of the CSRs performed by TSA. [36] According to DHS officials, the SSA Auto Notification System, provided through the Linking Encryption Network System (LENS), has resolved the issue of IP notifying to SSAs when they scheduled vulnerability assessments. The Auto Notification System sends an email to the SSA when an assessment has been scheduled, including the type of vulnerability assessment, a description of the assessment, trip dates, and further contact information are listed in the email. [37] According to DHS, IP's Protective Measures Section is to collect and analyze information to evaluate the effectiveness of assessments, protective measures implemented, and grant funding provided to high- priority CIKR. [38] According to FHWA officials, representatives from TSA and FHWA met in December, 2008 to initiate planning efforts to combine risk assessment tools, where they deemed applicable. [39] Development and implementation of the Highway Modal Annex was conducted by HMC. [40] Executive Order 13416 mandated that modal annexes were to be completed within 90 days after the comprehensive TSSP was completed. [41] TSA officials stated they are planning to issue best security practices for the entire highway mode on major topics including access control and vulnerability assessments to highway infrastructure stakeholders. HMC refers to this guidance as the U.S. (Universal Security) Template, but does not have a time frame for issuing this product. [42] CBP is not responsible for the bridges or tunnels that may lead to and/or away from the port of entry as they are not owned nor leased by CBP and are not a part of the footprint of the port of entry. Ports of entry are government-designated locations where CBP inspects persons and goods to determine whether they may be lawfully admitted into the country. A land port of entry may have more than one border crossing point where CBP inspects travelers for admissibility into the United States. [43] [hyperlink, http://www.gao.gov/products/GAO-06-15]. [44] [hyperlink, http://www.gao.gov/products/GAO-04-408T]. [45] GAO, Highlights of a GAO Forum: Mergers and Transformation: Lessons Learned for a Department of Homeland Security and Other Federal Agencies, [hyperlink, http://www.gao.gov/products/GAO-03-293SP] (Washington, D.C.: November 2002). [46] Pub. L. No. 103-62, 107 Stat. 285 (1993); and GAO/AIMD-00-21.3.1. [47] See [hyperlink, http://www.gao.gov/products/GAO-04-408T]. [48] Pub. L. No. 110-53, § 1541, 121 Stat. 266, 469 (2007). [49] Id. at § 1203(a)(9), 121 Stat. at 386 (codified at 49 U.S.C. § 114(u)(9)). [50] Id. at § 1203(a)(2), 121 Stat. at 384 (codified at 49 U.S.C. § 114(u)(2)). [51] [hyperlink, http://www.gao.gov/products/GAO-04-408T]. [52] A Guide to Highway Vulnerability Assessment for Critical Asset Identification and Protection, Science Applications International Corporation, May 2002; National Needs Assessment for Ensuring Transportation Infrastructure Security, Parsons Brinckerhoff & Science Applications International Corporation, October 2002.; Protecting America's Roads, Bridges, and Tunnels: The Role of State DOTs in Homeland Security, AASHTO, January 2005. [53] Referred to as the "Collective Protection Papers," IP has produced a number of products to provide sector stakeholders guidance on security measures and specifically addresses the threats and vulnerabilities of highway infrastructure assets. These reports include: Characteristics and Common Vulnerabilities-Infrastructure Category: Highway Bridges; and Potential Indicators of Terrorist Activity-Infrastructure Category: Highway Bridges, among others. [54] We did not assess the extent to which these products were being utilized by stakeholders when conducting vulnerability assessments. [55] These conferences have been conducted in three locations. As of January 2009, TSA did not have any additional workshops scheduled. [56] The security awareness security program is funded through DHS' Trucking Security Program (TSP). For 2008, Congress appropriated $16 million to administer the TSP (approximately $77.8 million in total funds have been provided since fiscal year 2003). In September 2008, the DHS Inspector General identified several areas where the TSP program could be improved to enhance accountability and help ensure the viability of the program. Department of Homeland Security Inspector General, Effectiveness of the Federal Trucking Industry Security Grant Program, OIG-08-100 (Washington, D.C.: Sept. 26, 2008). [57] The Transportation Research Board is one of six divisions of the National Research Council in the National Academies. The Board provides leadership through research and information exchange. The program is supported by state transportation departments, federal stakeholders including the component administrations of DOT, and other organizations and individuals interested in the development of transportation. [58] According to FHWA, a new Cooperative Research Program study will soon be published by AASHTO entitled, "Costing Asset Protection: An All Hazards Guide for Transportation Agencies." [59] TSA Transportation Sector Network Management Office - Highway and Motor Carrier Division, Assessment of Highway Mode Security: Corporate Security Review Results, May 2006. The 11 functional areas are: threat assessment, vulnerability assessment, security planning, credentialing, secure areas, critical infrastructure, physical security, cyber security, security training, communications and exercises. [60] To observe security measures undertaken by highway infrastructure operators, we selected a non-probability sample of 13 bridges and tunnels in 5 states to visit. [61] Executive Order 13416, Strengthening Surface Transportation Security, December 5, 2006. [62] [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1]. [63] DHS determined that the risk assessment information is "For Official Use Only." As a result, the related data are not contained in this report. [64] Pub. L. No. 103-62, 107 Stat. 285 (1993); and GAO, Standards for Internal Control in the Federal Government, GAO/AIMD-00-21.3.1 (Washington, D.C.: Nov. 1999). These standards, issued pursuant to the requirements of the Federal Managers' Financial Integrity Act of 1982 (FMFIA), provide the overall framework for establishing and maintaining internal control in the federal government. Also pursuant to FMFIA, the Office of Management and Budget (OMB) issued Circular A-123, revised December 21, 2004, to provide the specific requirements for assessing the reporting on internal controls. Internal control standards and the definition of internal control in OMB Circular A-123 are based on GAO's Standards for Internal Control in the Federal Government. [65] These characteristics were developed after our research found that there were no legislative or executive mandates identifying a uniform set of required or desirable characteristics for national strategies. For a more detailed discussion of these characteristics, see Combating Terrorism: Evaluation of Selected Characteristics in National Strategies Related to Terrorism, GAO-04-408T (Washington, D.C: Feb. 3, 2004). [66] AASHTO represents highway and transportation departments in the 50 states, the District of Columbia, and Puerto Rico. [67] [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1]. [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Phone: The price of each GAO publication reflects GAO‘s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO‘s Web site, [hyperlink, http://www.gao.gov/ordering.htm]. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.