Transportation Security

Comprehensive Risk Assessments and Stronger Internal Controls Needed to Help Inform TSA Resource Allocation Gao ID: GAO-09-492 March 27, 2009

Numerous incidents around the world have highlighted the vulnerability of commercial vehicles to terrorist acts. Commercial vehicles include over 1 million highly diverse truck and intercity bus firms. Within the Department of Homeland Security (DHS), the Transportation Security Administration (TSA) has primary federal responsibility for ensuring the security of the commercial vehicle sector, while vehicle operators are responsible for implementing security measures for their firms. GAO was asked to examine: (1) the extent to which TSA has assessed security risks for commercial vehicles; (2) actions taken by key stakeholders to mitigate identified risks; and (3) TSA efforts to coordinate its security strategy with other federal, state, and private sector stakeholders. GAO reviewed TSA plans, assessments, and other documents; visited a nonrandom sample of 26 commercial truck and bus companies of varying sizes, locations, and types of operations; and interviewed TSA and other federal and state officials and industry representatives.

TSA has taken actions to evaluate the security risks associated with the commercial vehicle sector, including assessing threats and initiating vulnerability assessments, but more work remains to fully gauge security risks. Risk assessment uses a combined analysis of threat, vulnerability, and consequence to estimate the likelihood of terrorist attacks and the severity of their impact. TSA conducted threat assessments of the commercial vehicle sector and has also cosponsored a vulnerability assessment pilot program in Missouri. However, TSA's threat assessments generally have not identified the likelihood of specific threats, as required by DHS policy. TSA has also not determined the scope, method, and time frame for completing vulnerability assessments of the commercial vehicle sector. In addition, TSA has not conducted consequence assessments, or leveraged the consequence assessments of other sectors. As a result of limitations with its threat, vulnerability, and consequence assessments, TSA cannot be sure that its approach for securing the commercial vehicle sector addresses the highest priority security needs. Moreover, TSA has not developed a plan or time frame to complete a risk assessment of the sector. Nor has TSA completed a report on commercial trucking security as required by the Implementing Recommendations of the 9/11 Commission Act (9/11 Commission Act). Key government and industry stakeholders have taken actions to strengthen the security of commercial vehicles, but TSA has not assessed the effectiveness of federal programs. TSA and the Department of Transportation (DOT) have implemented programs to strengthen security, particularly those emphasizing the protection of hazardous materials. States have also worked collaboratively to strengthen commercial vehicle security through their transportation and law enforcement officials' associations, and the establishment of fusion centers. TSA also has begun developing and using performance measures to monitor the progress of its program activities to secure the commercial vehicle sector, but has not developed measures to assess the effectiveness of these actions in mitigating security risks. Without such information, TSA will be limited in its ability to measure its success in enhancing commercial vehicle security. While TSA has also taken actions to improve coordination with federal, state, and industry stakeholders, more can be done to ensure that these coordination efforts enhance security for the sector. TSA signed joint agreements with DOT and supported the establishment of intergovernmental and industry councils to strengthen collaboration. TSA and DOT completed an agreement to avoid duplication of effort as required by the 9/11 Commission Act. However, some state and industry officials GAO interviewed reported that TSA had not clearly defined stakeholder roles and responsibilities consistent with leading practices for collaborating agencies. TSA has not developed a means to monitor and assess the effectiveness of its coordination efforts. Without enhanced coordination with the states, TSA will have difficulty expanding its vulnerability assessments.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-09-492, Transportation Security: Comprehensive Risk Assessments and Stronger Internal Controls Needed to Help Inform TSA Resource Allocation This is the accessible text file for GAO report number GAO-09-492 entitled 'Transportation Security: Comprehensive Risk Assessments and Stronger Internal Controls Needed to Help Inform TSA Resource Allocation' which was released on April 23, 2009. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. United States Government Accountability Office: GAO: March 2009: Transportation Security: Comprehensive Risk Assessments and Stronger Internal Controls Needed to Help Inform TSA Resource Allocation: GAO-09-492: GAO Highlights: Highlights of GAO-09-492, a report to the Chairman, Committee on Homeland Security, House of Representatives. Why GAO Did This Study: The Department of Homeland Security (DHS) has called for using risk- informed approaches to help prioritize its investments, develop plans, and allocate resources in a way that balances security and commerce. Within DHS, the Transportation Security Administration (TSA) is responsible for making risk-informed investments to secure the transportation system. GAO evaluated to what extent TSA (1) implemented a risk management approach to inform the allocation of resources across the transportation sector and (2) followed internal control standards in its efforts to implement and use a risk management approach to inform resource allocation. In conducting this work, GAO analyzed, among other things, DHS and TSA documents, such as TSA‘s risk management methodology, and compared them to DHS‘s risk management framework for infrastructure protection, compared TSA‘s management activities to criteria in federal internal control standards, and interviewed DHS and TSA officials. What GAO Found: TSA has taken some actions but has not fully implemented a risk management approach to inform the allocation of resources across the transportation modes (aviation, mass transit, highway, freight rail, and pipeline). DHS‘s risk management framework for infrastructure protection consists of six sequential steps that are used to systematically and comprehensively identify risk and establish risk- informed security priorities. TSA has taken some actions that the six steps require but has not conducted comprehensive risk assessments. For example, TSA collected information related to threat, vulnerability, and consequence within the transportation modes but has not conducted risk assessments that integrated these three components for each mode or the transportation sector as a whole. Identifying and prioritizing risk in this way is essential to efforts to allocate resources to address the highest priority risks. TSA developed an approach to prioritization based primarily on intelligence instead of comprehensive risk assessments. However, DHS has not reviewed or validated this methodology; thus, TSA lacks assurance that its approach provides the agency and DHS information needed to guide investment decisions to ensure resources are allocated to the highest risks. TSA also did not have a plan specifying the degree to which risk assessments are needed for the sector, the appropriate level of resources required to complete them, and time frames for completing its risk assessment efforts. Without a plan to identify the scope, resource requirements, and timeline for risk assessments, it will be difficult for TSA to ensure that it conducts timely and cost-effective risk assessments to inform resource allocation. TSA has not followed federal internal control standards to assist it in implementing DHS‘s risk management framework and informing resource allocation. Specifically, TSA lacked the following: * An organizational structure that allows the agency to direct and control operations to achieve agency objectives. Although TSA officials acknowledged that a focal point for TSA‘s risk management activities is needed, the agency has not yet established such a focal point. * Policies, procedures, and guidance to assist its offices in ensuring that DHS‘s National Infrastructure Protection Plan (NIPP) risk management framework and related activities, such as risk assessments, are implemented as DHS and TSA intended for the transportation sector and its individual modes. * A mechanism to monitor the quality of performance. While TSA reports to DHS on the implementation of its risk management activities, it did not discuss all of the steps necessary to implement DHS‘s risk management framework, such as the status of efforts taken to complete risk assessment activities including threat, vulnerability, and consequence assessments. Without effectively implementing such controls, TSA cannot provide reasonable assurance that its resources are being used effectively and efficiently to achieve security priorities and that accountability and oversight regarding the quality of risk management activities implemented exists. What GAO Recommends: To promote effective use of risk management, GAO is recommending, among other things, that the Assistant Secretary, TSA, work with DHS to validate its risk management approach, conduct comprehensive risk assessments, and establish related internal controls. DHS concurred with all of our recommendations. View [hyperlink, http://www.gao.gov/products/GAO-09-492] or key components. For more information, contact Stephen M. Lord at (202) 512- 4379 or lords@gao.gov. [End of section] Contents: Letter: Background: TSA Has Not Fully Implemented the Risk Management Framework Required by the NIPP to Inform Resource Allocation across the Transportation Sector: Establishing Effective Internal Controls Would Help Enforce TSA's Implementation of the NIPP's Risk Management Framework: Conclusion: Recommendations for Executive Action: Agency Comments: Appendix I: Transportation Security Administration (TSA) Risk Management Frameworks: Appendix II: Detailed Summary of TSA's Current Assessment Activities: Appendix III: GAO Analysis of TSA's SHIRA Input: Appendix IV: Comments from the Department of Homeland Security: Appendix V: GAO Contacts and Staff Acknowledgements: Tables: Table 1: Risk Management in Transportation Sector Key Documents: Table 2: Summary of TSA's Current Assessment Activities: Table 3: TSA Funding Levels (in millions of dollars) for each Fiscal Year, 2007-2009: Table 4: Ranking Scale for Countermeasure Effectiveness: Table 5: Consequences Ranking Scales: Figures: Figure 1: GAO Risk Management Framework: Figure 2: NIPP Risk Management Framework: Figure 3: Alignment between the NIPP and TSA's Systems-Based Risk Management Framework (SBRM): Abbreviations: ADASP: Aviation Direct Access Screening Program: ADRA: Air Domain Risk Assessment: BASE: Baseline Assessment and Security Enhancement: BDO: Behavior Detection Officer: CIKR: Critical Infrastructure and Key Resources: DHS: Department of Homeland Security: ERSC: Executive Risk Management Steering Committee: FAMS: Federal Air Marshals: FEMA: Federal Emergency Management Agency: FYHSP: Future Years Homeland Security Program: GCC: Government Coordinating Council: HSGP: Homeland Security Grant Program: HSPD-7: Homeland Security Presidential Directive 7: I&A: Office of Intelligence and Analysis: IP: Office of Infrastructure Protection: MANPADS: Man-Portable Air Defense Systems: MSRAM: Maritime Security Risk Analysis Model: NIPP: National Infrastructure Protection Plan: NTSRA: National Transportation Sector Risk Analysis: OI: Office of Intelligence: OMB: Office of Management and Budget: OMRR: Objectively Measured Risk Reduction: PPBE: Planning, Programming, Budgeting, and Execution: RAP: Resource Allocation Plan: RMA: Office of Risk Management and Analysis: RMSI: Office of Risk Management and Strategic Innovation: SAAP: Security Analysis and Action Program: SBRM: Systems-Based Risk Management: SCC: Sector Coordinating Council: SHIRA: Strategic Homeland Infrastructure Risk Assessment: TSA: Transportation Security Administration: TSNM: Office of Transportation Sector Network Management: TS-SSP: Transportation Systems Sector-Specific Plan: VIPR: Visible Intermodal Prevention and Response: [End of section] United States Government Accountability Office: Washington, DC 20548: March 27, 2009: The Honorable Bennie G. Thompson: Chairman: Committee on Homeland Security: House of Representatives: Dear Mr. Chairman: Recent terrorist events have demonstrated that transportation systems remain targets of attack worldwide. The July 2006 rail attacks in Mumbai, India, and the alleged August 2006 terrorist plot to detonate liquid explosives onboard multiple commercial aircraft bound for the United States from the United Kingdom underscore the vulnerability of transportation systems worldwide to terrorist attack and highlight the need to focus on the security of these systems. Securing this transportation system is an enormously complicated undertaking. In the United States, the nation's transportation system includes roughly 4 million miles of roads and highways, more than 100,000 miles of rail, 600,000 bridges, more than 300 tunnels, numerous sea ports, 2 million miles of pipeline, 500,000 train stations, and 500 public-use airports. [Footnote 1] Key modes of transportation include aviation, freight rail, highway, maritime, mass transit, and pipeline. The transportation system crisscrosses the nation and extends beyond our borders to move millions of passengers and tons of freight each day. Securing the system is further complicated by the number of private and public stakeholders involved in operating and protecting the system and the need to balance security with the expeditious flow of people and goods. The Department of Homeland Security's (DHS) mission includes preventing terrorist attacks, reducing vulnerabilities, minimizing damages from attacks, and aiding recovery efforts. Within DHS, the Transportation Security Administration (TSA) is responsible for securing the transportation system while facilitating commerce and ensuring the freedom of movement for the traveling public. Since it is not practical or feasible to protect all assets and systems against every possible terrorist threat, DHS has called for using risk-informed approaches to prioritize its investments and for developing plans and allocating resources in a way that balances security and commerce.[Footnote 2] A risk management approach entails a continuous process of managing risk through a series of actions, including setting strategic goals and objectives, assessing risk, evaluating alternatives, selecting initiatives to undertake, and implementing and monitoring those initiatives. In June 2006, DHS issued the National Infrastructure Protection Plan (NIPP), which named TSA as the primary federal agency responsible for coordinating critical infrastructure protection efforts within the transportation sector.[Footnote 3] The NIPP also established a six-step risk management framework to establish national priorities, goals, and requirements for Critical Infrastructure and Key Resource (CIKR) protection so that federal funding and resources are applied in the most effective manner to deter threats, reduce vulnerability, and minimize the consequences of attacks and other incidents.[Footnote 4] The NIPP defines risk as a function of threat, vulnerability, and consequence. Threat is an indication of the likelihood that a specific type of attack will be initiated against a specific target or class of targets. Vulnerability is the probability that a particular attempted attack will succeed against a particular target or class of targets. Consequence is the effect of a successful attack. Our past work examining TSA found that it has undertaken numerous initiatives to strengthen transportation security, particularly in aviation. However, we also reported that TSA could strengthen its risk- informed efforts to include conducting systematic analysis to prioritize its security investments.[Footnote 5] Although TSA has implemented risk-informed efforts with many of its programs and initiatives, we reported that --because of circumstances beyond TSA's control and a lack of planning--TSA has not always conducted the systematic analysis needed to inform its decision-making processes and to prioritize investments in security programs. For example, we reported that TSA has not always conducted needed assessments of threats, vulnerabilities, and consequences to inform the allocation of its resources and has not fully assessed alternatives that could be pursued to achieve efficiencies and potentially enhance security. You asked us to evaluate the extent to which TSA has implemented a risk- informed framework to guide federal programs and responses to better prepare against terrorism and other threats and to better direct finite resources to the areas of highest priority. This report answers the following questions: (1) to what extent has TSA implemented a risk management approach consistent with the NIPP to inform the allocation of resources across the transportation sector and (2) to what extent has TSA followed internal control standards in its efforts to implement a risk management approach and use it to inform resource allocation. To assess the extent to which TSA has made progress in implementing a risk management approach to inform the allocation of resources across the transportation sector, we analyzed DHS and TSA internal documents, such as agency memoranda, TSA's risk management methodology and the transportation system sector-specific plan and its modal annexes, and compared them to criteria in the NIPP's risk management framework. We also reviewed relevant laws; presidential directives; budget procedures, priorities, and submissions; TSA management directives; and our prior work on risk management and transportation security. We analyzed DHS budgeting and planning guidance, such as the resource allocation plan and sector annual report instructions, to determine the extent to which risk management was to inform TSA practices. Further, we interviewed DHS and TSA officials to identify TSA's risk management efforts at the strategic and modal levels and the extent to which TSA had implemented the NIPP's risk management framework. We also interviewed DHS and TSA officials to identify alignment between the allocation of resources and stated priorities. In conducting this work, we limited our analysis to the five modes of the transportation sector that TSA is responsible for securing: aviation, freight rail, highway infrastructure and motor carrier, mass transit, and pipeline.[Footnote 6] Further, while the private sector, state, local, and tribal governments, and other federal agencies have roles in securing the transportation sector, we limited our analysis to activities conducted by TSA. Due to the scope of our work, we relied on TSA to identify its assessment activities but did not assess the extent to which its assessment activities meet the NIPP criteria for threat, vulnerability, and consequence assessments. To identify the extent to which TSA has followed internal control standards in its efforts to implement a risk management approach and use it to inform resource allocation, we compared controls TSA designed to assist in its risk management efforts with criteria in standards for internal control in the federal government.[Footnote 7] Specifically, we focused on the extent to which TSA established a focal point; clearly defined roles and responsibilities; set policies, procedures, and guidance; and created a monitoring system for implementing a risk management framework. We also reviewed our past reports on risk management and transportation security and documentation provided by DHS and TSA on the organization of TSA's risk management office and its monitoring system. We conducted interviews with DHS and TSA officials to identify their internal controls. In our interviews, we asked DHS and TSA officials to identify any factors that affected implementation of the risk management framework and its use to inform resource allocation. We conducted this performance audit from February 2008 through March 2009 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Background: Legislation and Presidential Directives Require the Development of a Risk Management Approach for the Transportation Sector: In recent years, the President and Congress have provided that federal agencies with homeland security responsibilities are to apply risk management principles to inform their decision making regarding allocating limited resources and prioritizing security activities. [Footnote 8] They have done this through Homeland Security Presidential Directives (HSPD)[Footnote 9] and laws, such as the Implementing Recommendations of the 9/11 Commission Act of 2007 (9/11 Commission Act) and the Intelligence Reform and Terrorism Prevention Act of 2004. [Footnote 10] The Homeland Security Act of 2002, which established DHS, also directed the department's former Directorate of Information Analysis and Infrastructure Protection to use risk management principles in coordinating the nation's critical infrastructure protection efforts.[Footnote 11] This requirement includes integrating relevant information, analysis, and vulnerability assessments to identify priorities for protective and support measures by the department, other federal agencies, state and local government agencies and authorities, the private sector, and other entities. Homeland Security Presidential Directive 7 (HSPD-7) and the Intelligence Reform and Terrorism Prevention Act further define and establish critical infrastructure protection responsibilities for DHS and Sector-Specific Agencies, which are federal departments and agencies responsible for Critical Infrastructure and Key Resources (CIKR) protection activities in specified CIKR sectors such as transportation. In particular, HSPD-7 required the development of a comprehensive, integrated national plan for CIKR protection, the NIPP, which in turn required the development of a Transportation Systems Sector-Specific Plan (TS-SSP). Table 1 shows the relationship and responsibilities established by HSPD-7, the NIPP, and the TS-SSP.[Footnote 12] Table 1: Risk Management in Transportation Sector Key Documents: Presidential level: HSPD-7: Homeland Security Presidential Directive, December 2003; HSPD-7 required DHS to produce a comprehensive, integrated national plan for CIKR protection, and DHS designated TSA as the sector-specific agency in charge of the transportation sector. Department level: DHS: NIPP: National Infrastructure Protection Plan, June 2006; DHS issued the NIPP which required TSA and other sector-specific agencies to support and align with the NIPP risk management framework. Component level: TSA: TS-SSP: Transportation Systems Sector-Specific Plan, May 2007; TSA developed the TS-SSP to comply with NIPP requirements which detailed a strategic risk management framework for the sector that aligned with NIPP guidance. Sources: GAO presentation of DHS and TSA information. [End of table] DHS's 2008 Strategic Plan also identifies risk management as an important tool for decision making. The plan states that securing the country from every conceivable threat is not feasible, and consequently, the department has instituted risk management as the primary basis for policy and resource allocation decisions. The plan explains that in the government's complex and resource-constrained environment, DHS will use quantitative and qualitative risk assessments to help guide resource decisions. Effective risk assessments will allow these resources to target the most significant threats, vulnerabilities, and potential consequences and will provide assurances that priorities and investments are based on the best information available. GAO and DHS Have Developed Similar Risk Management Frameworks: Risk management is a tool for informing policymakers' decisions about assessing risks, allocating resources, and taking actions under conditions of uncertainty. We have previously reported that a risk management approach can help to prioritize and focus the programs designed to combat terrorism.[Footnote 13] Risk management, as applied in the transportation security context, can help federal decision makers determine where and how to invest limited resources within and among the various modes of transportation. To provide guidance to agency decision makers, we developed a risk management framework which is intended to be a starting point for applying risk-informed principles.[Footnote 14] Our risk management framework, shown in figure 1, entails a continuous process of managing risk through a series of actions, including setting strategic goals and objectives, assessing risk, evaluating alternatives, selecting initiatives to undertake, and implementing and monitoring those initiatives. Figure 1: GAO Risk Management Framework: [Refer to PDF for image: illustration] Interlocking circle: Strategic Goals, Objectives, and Constraints; Risk Assessment; Alternatives Evaluation; Management Selection; Implementation and Monitoring. Source: GAO. [End of figure] Setting strategic goals, objectives, and constraints is a key first step in applying risk management principles and helps to ensure that management decisions are focused on achieving a purpose. These decisions should take place in the context of an agency's strategic plan that includes goals and objectives that are clear and concise. The ability to achieve strategic goals depends, in part, on how well an agency manages risk. The agency's strategic plan should address risk- related issues that are central to the agency's overall mission. Risk assessment, an important element of a risk-informed approach, helps decision makers identify and evaluate potential risks so that countermeasures can be designed and implemented to prevent or mitigate the effects of the risks. Risk assessment is a qualitative and/or quantitative determination of the likelihood of an adverse event occurring and the severity, or impact, of its consequences. Risk assessment in a homeland security application involves assessing three key components--threat, vulnerability, and consequence. A threat assessment is the identification and evaluation of adverse events that can harm or damage an asset. A vulnerability assessment identifies weaknesses in physical structures, personal protection systems, processes, or other areas that may be exploited A consequence assessment is the process of identifying or evaluating the potential or actual effects of an event, incident, or occurrence. Information from these three assessments contributes to an overall risk assessment that characterizes risks, for example, rating them on a scale of high, medium, or low. Such information provides input for evaluating alternatives and prioritizing security initiatives. The risk assessment element in the overall risk management cycle informs each of the remaining steps of the cycle. Alternatives evaluation addresses the evaluation of risk reduction methods by consideration of countermeasures or countermeasure systems and the costs and benefits associated with them. Management selection addresses such issues as determining where resources and investments will be made, the sources and types of resources needed, and where those resources would be targeted. Finally, implementation and monitoring address the degree to which risk management strategies contain internal controls and performance measurement guidelines. In addition to implementing countermeasures, it may also include implementing new organizational policies and procedures, as well as human, physical, and technical controls. The 2006 NIPP, issued by DHS, included a risk management framework. This framework consists of six steps (see figure 2), which for the most part mirror GAO's risk management framework.[Footnote 15] Figure 2: NIPP Risk Management Framework: [Refer to PDF for image: illustration] This illustration indicates that after step six, there can be a return to any step in the process: Step 1: Set security goals; Step 2: Identify assets,systems, networks,and functions; Step 3: Assess risks (consequences, vulnerabilities, and threats); Step 4: Prioritize; Step 5: Implement protective programs; Step 6: Measure effectiveness. Source: GAO presentation of DHS information. [End of figure] (1) Set security goals: Define specific outcomes, conditions, end points, or performance targets that collectively constitute an effective protective posture. (2) Identify assets, systems, networks, and functions: Develop an inventory of the assets, systems, and networks that comprise the nation's critical infrastructure, key resources, and critical functions. Collect information pertinent to risk management that takes into account the fundamental characteristics of each sector. (3) Assess risks: Determine risk by combining general or specific threat information, known vulnerabilities to various potential attack vectors, potential direct and indirect consequences of a terrorist attack or other hazards (including seasonal changes in consequences, and dependencies and interdependencies associated with each identified asset, system, or network). (4) Prioritize: Aggregate and analyze risk assessment results to develop a comprehensive picture of asset, system, and network risk; establish priorities informed by risk; and determine protection and business continuity initiatives that provide the greatest mitigation of risk. (5) Implement protective programs: Select sector-appropriate protective actions or programs to reduce or manage the risk identified and secure the resources needed to address priorities. (6) Measure effectiveness: Use metrics and other evaluation procedures at the national and sector levels to measure progress and assess the effectiveness of the national CIKR protection program in improving protection, managing risk, and increasing resiliency. Like GAO's framework, the NIPP's risk management framework is a repetitive process that continuously uses the results of each step to inform the activities in both subsequent and previous steps over time. The six steps of the NIPP risk management framework are designed to produce a systematic and comprehensive understanding of risk and ultimately provide for security investments based on this knowledge of risk. In February 2009, DHS revised and reissued the NIPP. The six-step risk management framework remains unchanged. TSA Has Not Fully Implemented the Risk Management Framework Required by the NIPP to Inform Resource Allocation across the Transportation Sector: TSA has not fully implemented the risk management framework required by the NIPP to inform the allocation of resources across the transportation sector. While TSA has taken some actions to complete the six steps required by the NIPP framework, it has not conducted comprehensive risk assessments, a key step needed to complete the other steps required by the framework. Conducting comprehensive risk assessments as envisioned by the NIPP would improve TSA's evaluation of risk for the transportation sector and its individual modes and help improve its efforts to allocate resources to those areas with the highest priority risks. Instead of conducting comprehensive risk assessments, TSA has used an intelligence-driven approach to risk management. Officials cited high costs and methodological difficulties as reasons for taking this approach rather than fully implementing the NIPP framework. TSA Took Action to Implement the NIPP's Six-Step Risk Management Framework but Could Strengthen Efforts by Conducting Comprehensive Risk Assessments, a Key Step: TSA has taken action to implement the first two steps of the NIPP's risk management framework, but has not conducted comprehensive risk assessments, the third step, which is key in conducting the remaining three steps of the six-step framework. TSA developed security goals, in accordance with the NIPP's first step, but did not approve or circulate them. Further, TSA established a database to track assets and systems, the second step of the NIPP. However, while TSA's risk assessments contain elements of risk--threat, vulnerability, and consequence--TSA does not combine these elements to estimate risk for each transportation mode. Without comprehensive risk assessments, TSA cannot ensure that its priorities, protective programs, and measurements of effectiveness are risk-informed, steps four through six of the NIPP. TSA has Taken Some Actions to Set Security Goals and Identify Assets, Systems, Networks, and Functions: Setting security goals is the first step in the NIPP framework. TSA developed and published the following goals in its May 2007 Transportation Systems Sector-Specific Plan (TS-SSP): (1) prevent and deter acts of terrorism using or against the transportation system, (2)enhance the resilience of the transportation system, and: (3) improve the cost-effective use of resources for transportation security. However, TSA did not define specific outcomes, conditions, end points, or performance targets for these goals as called for by the NIPP. The TS-SSP also calls for the establishment of specific security goals, which TSA developed but did not approve or circulate.[Footnote 16] These goals were not approved or circulated because they were part of a discontinued risk management effort (see app. I for details on this effort). According to TSA, these specific goals were to represent TSA's highest risk mitigation priorities, expressed as high level consequences to be prevented or otherwise mitigated, and would establish specific, measurable, realistic, attainable targets that, when achieved, was to reduce the risk to the sector. Unless TSA approves and circulates specific goals, it will be difficult for TSA to prioritize what risks to assess, what countermeasures to deploy, and what performance to measure. TSA has taken actions to identify assets and systems, the second step of the NIPP. DHS, through its Office of Infrastructure Protection (IP), established an Infrastructure Data Warehouse, which includes infrastructure data from a variety of federal, state, and local sources and other authoritative open source infrastructure databases. TSA has updated the transportation source data and worked with DHS to expand the database. TSA has also worked with DHS's Homeland Infrastructure Threat and Risk Analysis Center to identify and prioritize assets that, according to DHS, if destroyed, damaged, or otherwise compromised, could create very significant consequences on a regional or national scale. According to DHS, this prioritized critical infrastructure list provides a common basis for DHS and its security partners to plan and undertake CIKR protective efforts.[Footnote 17] TSA Has Taken Some Actions but Has Not Conducted Comprehensive Risk Assessments for the Transportation Sector: To be considered credible, the NIPP states that a risk assessment must specifically address the three components of risk: threat, vulnerability, and consequence. The NIPP also states that after these three components have been assessed, they are to be combined to provide an estimate of the expected loss considering the likelihood of an attack or other incident. Further, to be not only credible but comparable to other methodologies, according to the NIPP's criteria, risk assessments must be documented, transparent (to avoid bias in assumptions), reproducible (so that other experts can verify the results), and accurate. Comprehensive risk assessments must have these qualities so that they can be used to support comparisons of risk, planning, and resource prioritization at the national level. In December 2005, we reported that a lack of information that fully depicts threats, vulnerabilities, and consequences limits an organization's ability to establish priorities and make cost-effective countermeasure decisions.[Footnote 18] TSA had not conducted comprehensive risk assessments in a manner consistent with the NIPP criteria. In 2007, TSA initiated but later discontinued an effort to conduct a comprehensive risk assessment for the entire transportation sector, known as the National Transportation Sector Risk Analysis (NTSRA). Specifically, TSA was planning to estimate the threat, vulnerability, and consequence of a range of hypothetical attack scenarios and integrate these estimates to produce risk scores for each scenario that could be compared among each of the modes of transportation.[Footnote 19][Footnote 20] However, TSA discontinued its work on the NTSRA because officials stated that estimating the likelihood of terrorist threats was difficult to quantify.[Footnote 21] Further, although TSA reported that it conducted assessments within each mode of transportation to gather information related to threat, vulnerability, and consequence, it has not integrated this information into comprehensive, credible risk assessments that meet the NIPP criteria. Table 2 provides an overview of assessment activities TSA reported having conducted (see app. II for details on these activities).[Footnote 22] Table 2: Summary of TSA's Current Assessment Activities: Mode: Multiple modes; Program activity title: Administrators Daily Intelligence Briefing; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Multiple modes; Program activity title: Homeland Information Report; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Multiple modes; Program activity title: Note to Administrator; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Multiple modes; Program activity title: Strategic Homeland Infrastructure Risk Assessment; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: Yes; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Multiple modes; Program activity title: Spot Reports; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Multiple modes; Program activity title: Special Event Threat Assessments; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Multiple modes; Program activity title: Transportation Intelligence Gazettes; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Multiple modes; Program activity title: Transportation Suspicious Incidents Report; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Aviation; Program activity title: Air Cargo Vulnerability Assessments; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Aviation; Program activity title: Aviation Mode Annual Threat Assessment; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Aviation; Program activity title: Current Airport Threat Assessment; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Aviation; Program activity title: Joint Vulnerability Assessments; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Aviation; Program activity title: Man-Portable Air Defense Systems (MANPADS) Vulnerability Assessments; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Aviation; Program activity title: No-Fly/Selectee Lists; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Freight rail; Program activity title: Corporate Security Reviews; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Freight rail; Program activity title: Freight Rail Mode Annual Threat Assessment; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Freight rail; Program activity title: Rail Corridor Reviews; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: Yes; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Freight rail; Program activity title: Toxic Inhalation Hazard (TIH) Rail Risk Monitoring Program; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: Yes; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Highway infrastructure and motor carrier; Program activity title: Corporate Security Reviews; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Highway infrastructure and motor carrier; Program activity title: Highway Infrastructure and Motor Carrier Mode Annual Threat Assessment; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Mass transit; Program activity title: Baseline Assessment and Security Enhancement review (BASE); Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Mass transit; Program activity title: Mass Transit Mode Annual Threat Assessment; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Mass transit; Program activity title: Security Analysis and Action Program (SAAP); Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Pipeline; Program activity title: Acute Assessment; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Pipeline; Program activity title: Corporate Security Reviews; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Pipeline; Program activity title: Pipeline Cross-Border Vulnerability Assessments Program; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Pipeline; Program activity title: Pipeline Mode Annual Threat Assessment; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Source: TSA and GAO analysis. [A] A risk assessment requires a combination of all three components of risk, and in these cases no efforts were made to combine the components into a comprehensive assessment. [End of table] As table 2 shows, while TSA reported that it conducted assessments related to individual components of risk for certain modes of transportation, risk assessments providing quantitative analysis that combine the three components of risk had not been conducted for any mode. Examples of TSA's assessment activities include the following: * TSA's Office of Intelligence produces an annual threat assessment for the aviation mode, among other intelligence products. These assessments provide information on individuals who could carry out attacks, tactics they might use, and potential targets. TSA's most recent aviation threat assessment, dated December 2008, identifies that terrorists worldwide continue to view civil aviation as a viable target for attack and as a weapon that can be used to inflict mass casualties and economic damage. It also concluded that improvised explosive devises and hijackings pose the most dangerous terrorist threat to commercial airliners in the United States. * Consistent with direction specified in law,[Footnote 23] and partly in response to our recommendations, TSA implemented an Air Cargo Vulnerability Assessment Program in November 2006. In August 2008, we reported that TSA officials stated that the agency had conducted air cargo vulnerability assessments at six domestic airports and planned to conduct air cargo vulnerability assessments at all 27 domestic Category X airports by the end of calendar year 2009. * As we reported in January 2009, in the highway infrastructure and motor carrier mode, TSA conducts annual threat assessments, as well as corporate security reviews--a type of assessment related to vulnerability information.[Footnote 24] For highway infrastructure, these corporate security reviews largely consist of interviews with state officials to assess the security plan, policies, and security actions of organizations whose operations include critical highway infrastructure. According to highway motor carrier officials, the goal of these reviews is to evaluate potential security gaps and provide suggested actions to state officials for strengthening them. According to TSA, in addition to its current assessment activities, it is planning to conduct assessments required by the 9/11 Commission Act on railroad transportation, school buses,[Footnote 25] rail tank cars, and general aviation airports. Although TSA did not follow the NIPP's approach to assessing risk, TSA officials stated that a high-risk focus is determined for each mode.[Footnote 26] While TSA's efforts may provide useful information, TSA's approach to assessing vulnerability and consequence is not based on the NIPP's criteria. Doing so is important to providing reasonable assurances that TSA's resources have been allocated to programs designed to protect assets that face relatively higher risk. Although TSA has not conducted comprehensive risk assessments as required by the NIPP, TSA participates in DHS's effort to assess risk across and within each of the nation's 18 CIKR sectors. DHS's effort is documented in an annual, classified product, known as the Strategic Homeland Infrastructure Risk Assessment (SHIRA). According to DHS, the White House is the principal consumer of SHIRA information. To develop SHIRA, DHS works with members of the Intelligence Community to determine applicable threats against various systems and assets. TSA then estimates vulnerabilities and consequences resulting from scenarios involving these threats by providing scores, based on professional judgment, and enters these data onto a worksheet which TSA certifies as the official record of its position and participation in SHIRA. However, TSA does not combine this threat, vulnerability, and consequence information to develop a comprehensive risk assessment, nor does TSA use this information to set agency goals or inform its resource allocation process. As we reported in January 2009, other federal agencies have conducted assessments that could be useful to TSA in considering how to design and complete risk assessments, but TSA has not leveraged these assessments.[Footnote 27] For example, federal entities have collectively conducted asset-level vulnerability assessments on a substantial percentage of highway infrastructure assets identified on the 2007 prioritized critical infrastructure list.[Footnote 28] However, limited mechanisms exist to share the assessment results among the various federal partners to inform their own assessment efforts. For example, TSA's Highway Motor Carrier Division reported that it is generally unfamiliar with the assessment processes, mechanisms, and results of the other DHS entities, particularly the Office of Infrastructure Protection (IP). Lacking adequate coordination mechanisms, the potential for duplication and inadequate leveraging of federal resources exists.[Footnote 29] For example, multiple vulnerability assessments were conducted by federal agencies for numerous assets that were on the fiscal year 2007 prioritized critical infrastructure list.[Footnote 30] Specifically, IP and the U.S. Coast Guard conducted assessments on a number of the same assets identified as critical. Given the number of highway infrastructure assets identified as critical, it is especially important to ensure that future risk assessment efforts are effectively coordinated between federal entities and the results shared among these entities. For this reason, we recommended that TSA incorporate the results of available threat, vulnerability, and consequence information into the strategy for securing highway infrastructure.[Footnote 31] DHS and TSA agreed with our recommendation, and TSA is working to address it. Conducting Comprehensive Risk Assessments Would Allow TSA to Provide Reasonable Assurances that its Priorities, Protective Programs, and Measurements of Effectiveness are Risk-Informed: TSA has taken actions to set priorities, the fourth step of the NIPP, but without comprehensive risk assessments it is difficult to prioritize what risks to address and to what degree. The NIPP states that security partners should establish priorities based on risk analysis that, consistent with NIPP criteria, combine threat, vulnerability, and consequence assessments. The NIPP further states that an estimate of the benefits resulting from actions taken to mitigate risk must be combined with estimates of their costs in a cost- benefit analysis to prioritize and choose among various protective measures. TSA has identified three priorities in its CIKR sector annual report:[Footnote 32] (1) Protect the nation's transportation systems from attacks involving explosives, (2) Manage and reduce the risk associated with key nodes, links, and flows within critical transportation systems to improve overall network survivability, (3) Align sector resources with the highest priority transportation risks using risk analysis and economic analysis as decision criteria. Within each priority, TSA listed sector-wide actions for improving CIKR protection, such as reducing the risk associated with underwater tunnels. However, it is unclear on what basis these priorities and actions were selected. For example, in the highway infrastructure and motor carrier mode, TSA and DHS leadership directed TSA's Highway Motor Carrier division to base its strategy for securing the commercial vehicle sector on the security risks posed by the shipment of hazardous materials without first conducting risk assessments to determine whether they posed the highest risk. Agency officials could not explain why TSA and DHS leadership decided to focus on hazardous materials. [Footnote 33] Conducting comprehensive risk assessments would better position TSA to develop reasonable risk mitigation estimates that target the highest priority risks, inform its cost-benefit analyses, and help ensure the prioritization and selection of the most cost- effective protective programs. Regarding the fifth step of the NIPP, TSA has implemented a number of protective programs, but without comprehensive risk assessments, the agency could not provide reasonable assurance that these programs were directed at the highest priority risks. The NIPP states that implementing protective programs based on risk assessment and prioritization enables DHS, Sector-Specific Agencies, and other security partners to enhance current CIKR protection programs and develop new programs where they will offer the greatest benefit. Without complete sector-wide risk assessments, resources may be allocated to programs designed to protect against scenarios that are of relatively lower risk. For example, TSA has not conducted an assessment of commercial aviation checkpoint screening risks to help prioritize its investments in checkpoint screening technologies. However, agency officials stated that they are currently reviewing a draft of an aviation risk assessment, known as the Air Domain Risk Assessment (ADRA), which is expected to address checkpoint security. ADRA is to provide a scenario-based risk assessment for the aviation system that may augment the information TSA uses to prioritize investments in security measures, including TSA's passenger screening program. However, TSA has not provided details on its content or its planned completion date. In the meantime, TSA has continued to invest in checkpoint screening technologies, totaling over $795 million during fiscal years 2002 through 2008. However, until ADRA or a similar risk assessment is conducted, TSA increases the possibility that such investments will not address the highest-priority security needs in the most cost-effective manner. In another example, although TSA had not assessed risks to the transportation sector, the agency determined that certain threats were not a high-risk focus area, that is, a high-priority threat that TSA should focus on mitigating.[Footnote 34] In doing so, TSA did not follow the NIPP's approach, which calls for providing a systematic and comparable estimate of risk that can help inform sector-level risk management decisions. Instead, TSA stated that in general, intelligence, vulnerability assessments, scientific analysis, proxies for consequence, security incidents, 9/11 Commission Act requirements, and other relevant information informed TSA's determination of which threats were and were not to be high-risk focus areas. However, these activities do not meet the NIPP criteria for credible and comparable risk assessments that integrate assessments of threat, vulnerability, and consequence in a way that is documented, transparent, reproducible, and accurate. Credible risk assessments are particularly important to ensure that resources are directed to programs that address threat scenarios of relatively higher rather than relatively lower risks. Were credible and comparable risk assessments, such as those described in the NIPP, conducted for terrorism threat scenarios, the agency would be able to compare the relative risks of different types of terrorist acts. [Footnote 35] The availability of such comparisons would allow TSA to prioritize its programs based on credible, systematic, and objective risk assessments. For instance, while Visible Intermodal Protective Response (VIPR)[Footnote 36] teams and screening by Behavior Detection Officers (BDO)[Footnote 37] may serve as a deterrent for improvised explosive device attacks in mass transit and aviation, they are not as likely to be as effective at providing warning for unseen biological and chemical attacks as sensors that screen air particles. Without being able to compare the relative risks of one threat scenario with another, it is unclear whether the VIPR teams and BDOs address a threat with a relatively higher or lower risk relative to other threats, such as a chemical or biological attack. Because preventing, protecting against, responding to, or recovering from such distinct scenarios requires at times very different approaches and investments in countermeasures, without comprehensive risk assessments it is difficult for TSA to provide reasonable assurance that it is directing its programs towards the highest priority risks. Regarding the sixth and final step of the NIPP, TSA took some steps to measure effectiveness, but without conducting comprehensive risk assessments, it could not effectively measure how its programs reduce security risks. The NIPP states that its risk management framework uses several types of performance measures to measure effectiveness, and that as the NIPP is implemented, TSA should emphasize outcome measures that track progress toward a strategic goal by documenting the beneficial results of the programs it implements. The NIPP further identifies examples of outcome measures, including (1) the reduction of risk for a specific sector measured by comparing consistent data from one year to another and (2) the overall risk mitigation achieved nationally by a particular CIKR protection initiative. Without comprehensive risk assessments, this type of analysis cannot be conducted for the transportation sector. Despite the lack of comprehensive risk assessments, TSA made efforts to measure risk reduction for the freight rail mode. For example, TSA's freight rail mode has identified four performance metrics designed to assist the agency in gauging progress toward meeting its goals and objectives. One of these metrics specifically focused on measuring risk reduction--reducing the risk associated with the transportation of toxic inhalation hazard in major cities that have been identified as high-threat urban areas by 50 percent by the end of 2008.[Footnote 38] TSA considered this metric its key overall performance indicator for the freight rail security program and reported its progress in meeting this indicator to Congress on several occasions. However, as we reported in March 2009, TSA was unable to obtain critical data necessary to consistently measure cumulative results for this measure over the time period that it had been measuring them--2005 to 2008. [Footnote 39] In particular, some baseline data needed to cumulatively calculate results for this measure are historical and could not be collected. As a result, the agency used a method for estimating risk for its baseline year that was different than what it used for calculating results for subsequent years. Thus, we recommended that TSA take steps to revise the baseline year associated with its performance measure to enable the agency to more accurately report results for this measure. Components of Risk Inform Resource Allocation, but Without Comprehensive Risk Assessments, TSA Lacks Reasonable Assurance that Budgets Address the Highest Priority Risks: DHS policy requires TSA to use risk to inform resource allocation for the transportation sector through two avenues: the NIPP's requirement for the development of sector annual reports and DHS's budget process. The development of a sector annual report, in coordination with DHS's budget submission, is intended to inform the Office of Management and Budget (OMB), the White House, and Congress of program priorities. [Footnote 40] Developing a sector annual report requires TSA to coordinate with sector partners to determine sector priorities, program requirements, and funding needs. TSA's 2008 sector annual report includes the three goals described above and associated priorities--for example, protecting the nation's transportation systems from attacks involving explosives. However, TSA had not conducted the comprehensive risk assessments necessary to inform these priorities. Further, CIKR sector annual report guidance directs TSA to identify investments made by other federal agencies, states, or private sector security partners, where possible. TSA's 2008 annual report included information on federal spending, but did not include information on private and state investments. While TSA communicated with its partners through its government coordinating council (GCC) and modal sector coordinating councils (SCC), TSA did not use the GCC and SCCs to help identify these private and state transportation security investments. [Footnote 41] TSA officials acknowledged that though it is important to have reliable data on what other partners are doing to secure the transportation modes, they do not collect this type of data. Without such information, it will be difficult for TSA to avoid potentially redundant efforts in transportation security and to identify security gaps within the transportation sector that have not been addressed by federal, private sector, or state security investments. The second avenue through which DHS policy requires TSA to use risk to inform resource allocation for the transportation sector is DHS's annual budget process--the Planning, Programming, Budgeting, and Execution (PPBE) process.[Footnote 42] PPBE is a process that results in the Future Years Homeland Security Program (FYHSP), which describes DHS's resource allocation plan over 5 years as well as its annual budget request. The PPBE process recognizes that risk assessments are a key element of program plans and ultimately resource allocation, and as a component within DHS, TSA is subject to the PPBE process.[Footnote 43] To support FYHSP, DHS components play a key role in the PPBE process by providing DHS with an annual budget request and justification for funding. The funding justification, called the Resource Allocation Plan (RAP), is to provide a comprehensive expression of resources a component needs to carry out the goals, commitments, and objectives of DHS. For the components to justify their budget requests, the PPBE process requires that components review threat and vulnerability assessments; assess the status, performance, and capabilities of current programs; identify unresolved issues; and assess how they can best meet policy and planning priorities. The funding justifications must also discuss how changes in capabilities and resources affect the level of risk to the nation.[Footnote 44] Components are required to articulate how risk analysis was used in these submissions to prioritize and justify activities. Components are also required to identify which DHS strategic objective and priority will be supported by any request for funding. While this guidance instructs TSA to consider risk in the resource allocation process, TSA could not provide documentation that showed they developed budget justifications supported by risk analysis to prioritize and justify activities. TSA officials told us that, in general, program officials define vulnerabilities and advocate for resources that will allow them to mitigate those vulnerabilities through additional personnel, equipment, and operational funding. However, as previously noted in this report, while TSA's current assessment activities independently address individual components of risk, such as threat and vulnerability, they do not combine all three components of risk to create a credible risk assessment as required by the NIPP. To be considered credible, the NIPP states that risk assessments must be documented and include all three components of risk so that they can be used to support comparisons of risk, planning, and resource prioritization at the national level. To be comparable to other methodologies, the NIPP also states that risk assessments must be documented, transparent, reproducible, and accurate. Without comprehensive risk assessments, TSA lacks reasonable assurance that its long-term investments in FYHSP are allocated to the highest priority risks. TSA officials also stated that risk is considered in the resource allocation process because TSA uses threat information to inform budget priorities. Officials said that time-critical intelligence on the imminence of a particular threat has driven budget priorities. As an example, TSA told us that in late summer of 2007, DHS and OMB submitted an amendment to the President's Budget Request for 2008 which requested funding for mitigation strategies to meet threats identified in the 2007 National Intelligence Estimate. Through this amendment, TSA received funding for additional personnel for the Aviation Direct Access Screening Program (ADASP),[Footnote 45] VIPR personnel, additional K-9 teams, and additional international flight coverage by the Federal Air Marshals (FAMS). However, these budget changes were driven by assessments of threat, and the usefulness of threat information alone to inform resource allocation can be limited. For instance, it is impossible to know whether every threat has been identified or whether complete information about each threat has been collected. Also, a threat against a low vulnerability (hardened) facility merits a different response than the same threat made against a vulnerable facility. Thus, vulnerability and consequence assessments are essential and required to supplement threat information to better prepare for terrorist attacks.[Footnote 46] TSA officials also identified their methodology for assigning Federal Air Marshals to select flights as an example of how risk informs resource allocation at the agency. However, as we reported in January 2009,[Footnote 47] the FAMS methodology is applied to one aspect of TSA's operations.[Footnote 48] Further, our report noted that several improvements could be made to this methodology. Specifically, we reported that an independent review of FAMS conducted by the Homeland Security Institute recommended that FAMS refine its definition of vulnerability and increase the randomness of its flights. In response, FAMS officials stated that a new, automated, decision-support tool for selecting flights is being developed with assistance from the Homeland Security Institute and will incorporate consideration of more traditional aspects of vulnerability.[Footnote 49] FAMS expects development of this tool to be completed by the end of calendar year 2009. Without comparative risk assessments, TSA lacks reasonable assurance that risk informs the prioritization of programs within current requests across the transportation sector. Table 3 shows TSA's recent funding levels, highlighting a focus on investments in aviation security, which comprise approximately 85 percent of TSA's budget. Table 3: TSA Funding Levels for each Fiscal Year, 2007-2009 (in millions of dollars): Account: Aviation Security; FY07: $4,732; FY08: 4,809; FY09: $4,755. Account: Aviation Security Capital Fund; FY07: $250; FY08: $250; FY09: $250. Account: Checkpoint Screening Security Fund; FY07: 0; FY08: $250; FY09: 0. Account: Federal Air Marshal Service; FY07: $714; FY08: $770; FY09: $819. Account: Threat Assessment and Credentialing; FY07: $40; FY08: $83; FY09: $116. Account: Surface Transportation Security; FY07: $37; FY08: $47; FY09: $50. Account: Transportation Security Support; FY07: $525; FY08: $524; FY09: $948. Account: Total; FY07: $6,298; FY08: $6,733; FY09: $6,938. Source: Pub. L. No. 110-329, Div. D, 121 Stat. 3574, 3652 (2008); Pub. L. No. 110-161, Div. E, 121 Stat. 1844, 2042 (2007); Pub. L. No. 109- 295, 120 Stat. 1355 (2006). Notes: Funding levels are approximate as the amounts do not reflect rescissions, transfers, reprogrammings, carry-over balances, or supplemental appropriations. The Aviation Security Capital Fund and Checkpoint Security Screening Fund are derived from security fees collected pursuant to 49 U.S.C. § 44940 and do not constitute an actual appropriation. See 49 U.S.C. §§ 44923(h), 44940(i). [End of table] We recognize that, since the inception of TSA, other factors, such as statutory mandates, have dictated how TSA's resources have been allocated, particularly with respect to its civil aviation security responsibilities. For example, provisions of the Aviation and Transportation Security Act mandated that TSA establish a federal screening workforce within 1 year of enactment and, as amended, mandated that TSA provide for the screening of all checked baggage using explosive-detection systems by December 31, 2003.[Footnote 50] More recently, the 9/11 Commission Act mandated that TSA establish a system for screening 100 percent of cargo carried on passenger aircraft.[Footnote 51] Satisfying and maintaining these mandates require the continued dedication of a substantial portion of TSA's annual resources, and TSA's annual appropriation dictates many of the purposes for which its resources must be used. In addition, a wide range of decision makers influence how TSA uses its resources for transportation security, including DHS leadership, the White House, and ultimately Congress. As a result, TSA lacks the flexibility to independently allocate its resources across transportation modes solely on the basis of risk. However, through its annual budget submission, TSA can propose the creation of new programs or changes to existing programs, and additional funding for any purpose authorized by law. Thus, the existence of external constraints, such as statutory mandates, does not prevent TSA from using a risk management framework to inform investment priorities and help guide future investments in security programs. To illustrate how a risk-assessment process could help shape TSA's budget, we analyzed TSA's input to the Strategic Homeland Infrastructure Risk Assessment (SHIRA), an annual, classified DHS risk assessment, by combining TSA's vulnerability and consequence data to create a risk score for each threat scenario and then ranking each threat across all modes of transportation. We were unable to determine the reliability of TSA's data, which according to officials, were based on the judgment of subject matter experts.[Footnote 52] However, TSA certifies these data to DHS as its official position and as the record of its participation in the SHIRA process. Our analysis suggests that based on TSA's data, the transportation mode that may be at highest risk is mass transit, followed by aviation, highway, freight rail, and pipeline.[Footnote 53] While our analysis suggests that mass transit may be at highest risk of a terrorist attack, the highest proportion of TSA's budget is focused on aviation security.[Footnote 54] It was unclear whether TSA's budget priorities were appropriately informed by risk because the agency lacks comprehensive risk assessments and information on investments in security measures by state and private sector security partners. TSA Uses an Intelligence-Driven Approach to Risk Management Due to Concerns About the Costs of Implementing the NIPP and Reported Methodological Limitations: TSA officials told us that the agency uses an intelligence-driven approach to risk management to guide strategic investment decisions across the transportation sector because of concerns about the high cost of implementing the NIPP and the methodological limitations of this approach.[Footnote 55] Although TSA committed to using the risk management framework in the NIPP with the issuance of the TS-SSP in 2007, officials reported that they encountered two main challenges that prevented them from using the NIPP framework. First, TSA officials cited that it is costly and time consuming to follow the NIPP's risk management framework--particularly in conducting comprehensive vulnerability and consequence assessments. For example, TSA's pipeline division conducts corporate security reviews that collect information on the vulnerabilities of pipelines. According to TSA officials, a pipeline corporate security review can take days to complete. TSA's pipeline division stated that they would like more staff in order to conduct its corporate security reviews more frequently. TSA officials also stated that analyzing secondary or indirect consequences of a terrorist attack and developing strategic research objectives required much time and effort. While TSA officials reported that it was challenging to follow the NIPP's risk management framework because it would be costly, they were not able to provide estimates of the time and resources needed to do so. For example, TSA does not have a plan specifying the degree to which risk assessments of the sector are needed, the scope of the risks assessments, the appropriate level of resources required to complete these assessments, and time frames for completing its risk assessment efforts. However, having such a plan would help TSA identify the needed time and resources to implement the NIPP requirements. Standard practices in program management include, among other things, defining the program's scope, roles, and responsibilities, and developing a road map that establishes an order for executing projects within a specified time frame.[Footnote 56] Without a plan to identify the scope, resource requirements, and timeline for risk assessments within the transportation sector, it is difficult to ensure that TSA focuses its risk assessments on the highest priorities and conducts them in a timely and cost-effective manner. TSA officials cited a second challenge that prevented them from implementing the NIPP framework. TSA officials said they do not believe that a traditional risk assessment methodology--such as that provided for in the NIPP--provides a reliable method for determining the likelihood of terrorist attacks given the adaptive nature of terrorists.[Footnote 57] Because terrorists adapt their tactics in response to countermeasures, TSA contends that threat assessments that quantify the likelihood of a terrorism scenario have limited value because any numerical value assigned to threats could be invalid by the end of the day.[Footnote 58] Additionally, TSA contends that the traditional method of identifying terrorism scenarios is flawed because unlikely yet highly consequential threats that have never occurred cannot be anticipated and will not be included in a threat assessment. [Footnote 59] For example, prior to 9/11, an attack using a plane as a weapon would have been viewed as unlikely. Rather than using the methodology established in the NIPP for assessing risk, TSA officials stated that the agency uses an intelligence-driven approach to make strategic investment decisions across the transportation sector.[Footnote 60] Within this intelligence-driven approach for the sector, TSA also developed a tactical, threat-based process known as Objectively Measured Risk Reduction (OMRR) at the program or modal level to help each of its individual modal divisions to manage their day-to-day security operations. These approaches differ from the NIPP in part because they rely primarily on intelligence information to identify threats, prioritize tactics, and guide long- term investments, rather than systematically assessing the vulnerabilities and consequences of a range of threat scenarios. TSA officials stated that they will revise and reissue TS-SSP to reflect the adoption of their intelligence-driven methodology, as required by DHS,[Footnote 61] but were unable to provide a date by which it will be reissued or a date by which their new methodology and risk management approach will be submitted to DHS for review and approval.[Footnote 62] However, TSA officials said that they would likely not revise TS-SSP to reflect their intelligence-driven approach and submit it for review until late 2010 when the new leadership at DHS would have time to review it. Until TSA works with DHS to validate its risk management approach, TSA lacks assurance that its approach provides the agency and DHS information needed to guide investment decisions to ensure resources are allocated to the highest risks. Establishing a plan and time frame for assessing the appropriateness of TSA's intelligence- driven risk management approach could help ensure that it completes this step in a timely manner. Although intelligence is necessary to inform threat assessments, it does not provide all of the information needed to assess risk, in particular information needed to conduct some of the vulnerability and consequence assessments that TSA lacks. In addition, the intelligence- driven approach that TSA uses may be limited because, in contrast with practices adopted by the intelligence community and the Department of Defense, TSA officials do not plan to assign uncertainty or confidence levels to the intelligence information it uses to identify threats and guide long-range planning and strategic investment. Both Congress and the administration have recognized the uncertainty inherent in intelligence analysis and have required analytic products within the intelligence community to properly caveat and express uncertainties or confidence in analytic judgments.[Footnote 63] TSA's intelligence products do not ascribe confidence levels to its analytic judgments. In addition, TSA officials stated that TSA does not have plans to include confidence levels in future analytic products because there do not appear to be well-established best practices within the intelligence community on how to define and use confidence levels. However, the National Intelligence Council uses a method of ascribing high, medium, or low levels of confidence to its National Intelligence Estimates, and the military intelligence community has also adopted a process for ascribing confidence levels in analytical judgments.[Footnote 64] Furthermore, while intelligence can and does help the U.S. security community on an operational or tactical level to anticipate and disrupt terrorist plots, uncertainty in intelligence analysis limits its utility for long-range planning and strategic investment. Without expressing confidence levels in its analytic judgments, it will be difficult for TSA to correctly prioritize its tactics and long-term investments based on uncertain intelligence. While TSA officials stated that they do not believe that a traditional risk assessment methodology provides a reliable method for determining the likelihood of terrorist attacks given the adaptive nature of terrorists, it is important to note that risk assessment is an accepted and required practice with a long history of use in a wide variety of public and private sector organizations. Also, the consistent assessment of risk is necessary to allow comparison of risk across and within sectors. Specifically, other agencies conduct risk assessments based on threat, vulnerability, and consequences and have overcome the challenges TSA cited. For example, within DHS, the U.S Coast Guard and the Federal Emergency Management Agency (FEMA) use traditional risk assessment methodologies to inform resource allocation:[Footnote 65] * The U.S. Coast Guard, which is responsible for securing the maritime transportation mode, conducts risk assessments using its Maritime Security Risk Analysis Model (MSRAM). Used by every Coast Guard unit, MSRAM assesses the risk of terrorist attack based on scenarios--a combination of target and attack mode--in terms of threats, vulnerabilities, and consequences to more than 18,000 targets. MSRAM combines these assessments and provides analysis to identify security priorities and support risk management decisions at the strategic, operational, and tactical levels. The tool's underlying methodology is designed to capture the security risk facing different types of targets spanning every DHS CIKR industry sector, allowing comparison between different targets and geographic areas at the local, regional, and national levels. In conducting assessments, the Coast Guard Intelligence Coordination Center quantifies threat as a function of intent (the likelihood of terrorists seeking to attack), capability (the likelihood of terrorists having the resources to attack), and presence (the likelihood of terrorists having the personnel to attack). [Footnote 66] Intelligence Coordination Center officials stated that the Coast Guard uses MSRAM to inform allocation decisions, such as the local deployment of local resources and grants. * We have reported that FEMA used a reasonable risk assessment methodology, based on a definition of risk as a function of threat, vulnerability, and consequence, to determine grant funding allocations under the Homeland Security Grant Program (HSGP).[Footnote 67] We found that this program used a reasonable methodology to assess risk and allocate grants to states and urban areas even though its assessment of vulnerability was limited. The risk assessment methodology used by FEMA is based on assessments of threat, vulnerability, and consequences of a terrorist attack to each state and the largest urban areas. FEMA's methodology estimates the threat to geographic areas based on terrorists' capabilities and intentions, as determined by intelligence community judgment and data on credible plots, and planning and threats from international terrorist networks. Because this threat information is recognized as uncertain, threat accounts for 20 percent of the total risk to a geographic area, while vulnerability and consequence account for 80 percent.[Footnote 68] DHS plans to enhance coordination of risk management throughout the department using an Integrated Risk Management process that accommodates the NIPP framework. In January DHS approved a new, department-wide Interim Integrated Risk Management Framework document that provides a vision, principles, overarching risk management cycle, and objectives for risk management at DHS. Implementation of the framework will include promulgation of analytical guidelines for conducting risk assessments. Establishing Effective Internal Controls Would Help Enforce TSA's Implementation of the NIPP's Risk Management Framework: TSA could strengthen its internal controls to help implement the NIPP's risk management framework. An organizational structure with a focal point and clearly defined roles and responsibilities would help organize TSA's efforts to implement the framework. Further, policies, procedures and guidance that require the use of the NIPP's risk framework would aid in its implementation. Finally, a mechanism to monitor the implementation of the NIPP's risk management framework would help ensure that results are achieved and performance improved. Having a Focal Point and Clearly Defined Roles and Responsibilities Would Strengthen TSA's Implementation of Risk Management Activities: While TSA acknowledged the need for a focal point to ensure implementation of risk management activities, TSA has not yet established such a focal point. Standards for Internal Control in the Federal Government state that an agency's organizational structure provides management's framework for planning, directing, and controlling operations to achieve agency objectives.[Footnote 69] Further, internal control standards state that this structure should clearly define key areas of authority and responsibility and establish appropriate lines of reporting. Public and private sector organizations have developed organizational structures that can contribute to effective risk management practices. In October 2007, we convened a forum of national and international experts to advance a national dialogue on applying risk management principles to homeland security.[Footnote 70] Participants discussed effective risk management practices used in the public and private sectors. One practice they discussed was the concept of a chief risk officer, an executive responsible for focusing on understanding information about risks and reporting this information to senior executives. One key practice for creating an effective chief risk officer, participants said, was defining reporting relationships within the organization in a way that provides sufficient authority to hold the organization, including its highest levels, accountable to the framework and to support risk-based approaches. This practice is also consistent with internal control guidance and standards that state that organizational structure should be appropriately centralized with clearly defined key areas of authority and responsibility, and appropriate lines of reporting. A focal point--like a chief risk officer, for example--would provide an organizational structure that helps incorporate risk-informed decision making into its operations. Although TSA officials acknowledged that a focal point would enhance TSA's risk management efforts, they stated the agency has not yet established such a focal point. TSA officials said they have taken some steps to define key areas of authority and responsibility for risk management but that more could be done. For example, in September 2008, TSA's Transportation Sector Network Management (TSNM) Office issued a risk management directive to implement its tactical risk management methodology, OMRR. The directive establishes TSNM's Assistant Administrator as the official responsible for reducing the risk of terrorist attacks within the transportation sector, as well as for developing and implementing the OMRR methodology and serving as the lead official for coordinating OMRR activities among public and private sector stakeholders. However, this effort has not yet provided a focal point for TSA's risk management activities, nor does it ensure that the six steps of the NIPP's framework are implemented. For instance, the directive does not provide the Assistant Administrator with authority over staff in other offices or divisions conducting risk analysis, such as TSA's Office of Intelligence (OI), or define the relationship between OI and TSNM. In another example, TSA officials stated that they plan to establish a Risk Management Executive Steering Committee to serve as a focal point. The committee is to be charged with conducting oversight for TSA's risk management strategy, communications, and related activities, as well as with coordinating major projects and issues. However, as of December 2008, TSA had not completed a charter stating the purpose of the committee, determined its membership, established clear and appropriate lines of reporting, or held any meetings, and could not provide a date for when these actions would be completed. Further, in spring 2008, TSA disbanded its office of Risk Management and Strategic Innovation (RMSI), which was responsible for developing risk analyses that followed the NIPP's methodology and served as a liaison between DHS's risk management offices and academic communities, among other things.[Footnote 71] Since that time, TSA has not clearly defined roles and responsibilities for implementing the NIPP framework. Without a focal point for risk management that has clearly defined authority, responsibility, and appropriate lines of reporting, TSA will not have an organizational structure to direct and control activities required by the NIPP's risk management framework. Establishing Policies, Procedures, or Guidance Would Help TSA Require the Use of the NIPP's Risk Management Framework and Specify How to Use It: TSA had not established policies, procedures, or guidance that require the use of the NIPP's risk management framework and that provide specific direction on how to use the framework. Internal control standards state that managers should take actions, such as establishing policies, procedures, and guidance, to help ensure the agency's directives are carried out, specifically, in this case, that a risk management framework is implemented and related work activities completed. Further, control activities are an integral part of an entity's planning, implementing, reviewing, and accountability for stewardship of government resources and achieving effective results. TSA lacks policies and procedures, such as a management directive, that would provide specific guidance on how to use a risk management framework, including specific guidance on how to conduct risk assessments and aggregate and analyze risk assessment results to develop a comprehensive picture of asset, system, and network risk. In September 2008, TSNM issued a directive containing policies and procedures for implementing OMRR, TSA's threat-based and tactical approach to assessing risk at the program or modal level. However, this directive does not provide additional guidance on how to implement the six steps of the NIPP's risk management framework within TSA to inform resource allocation and long-term planning for the sector. Further, there are no mechanisms that enforce DHS's requirements, such as documenting the completion of risk assessments that meet the criteria the NIPP establishes. Without implementing such controls, TSA cannot provide reasonable assurance that it has taken the necessary steps to address risks consistently across all modes of transportation. Internal Monitoring Would Help TSA Implement the NIPP's Risk Management Framework: In addition, TSA has not established a mechanism to monitor how effectively the agency has implemented its risk management framework and used these results to improve its performance. According to internal control standards, monitoring should assess the quality of performance over time and ensure that the findings of audits and other reviews are promptly resolved. Managers are to promptly evaluate findings from audits and other reviews, including those showing deficiencies and recommendations, determine proper actions in response, and complete, within established time frames, all actions that correct or otherwise resolve the matters brought to management's attention. In addition, step six of the NIPP risk management framework requires agencies to measure progress and assess the effectiveness of these efforts in reducing risk. TSA officials stated that they monitor the agency's effectiveness in implementing a risk management framework and identified their submission to the DHS Secretary's Priority Tracker, a report prepared for the Secretary on a monthly basis, as their monitoring mechanism. To prepare their monthly submission, TSA officials collect information from the modes, such as the status of strategic risk objective development and participation in the Tier 1 and 2 process. However, providing status updates for the Priority Tracker does not provide a mechanism to monitor how effectively the agency has implemented its risk management framework or to identify how TSA might improve its performance for several reasons. First, the scope of the information collected to update the Secretary's Priority Tracker does not include key information that would be needed to monitor TSA's progress in completing all of the steps in the NIPP's risk management framework. For example, information included in the Tracker includes participation in the Tier 1 and 2 process rather than information on the progress or the status of efforts to complete key risk assessment activities, including threat, vulnerability, and consequence assessments within each transportation mode. Second, these monthly submissions provide status reports but do not measure how effectively TSA has implemented a risk management framework to reduce risk. Third, these monthly status reports do not identify ways in which TSA could more effectively implement a risk management framework or better use risk management principles to guide resource allocation. Without establishing controls to monitor the effectiveness of its risk management efforts, TSA misses an opportunity to measure, evaluate, and improve its risk management activities. Conclusion: Using risk management principles to help set priorities and guide investments in homeland security programs can be challenging for a number of reasons, including those identified by TSA, such as the difficulty of identifying and assessing the risks posed by terrorism. However, TSA's choice to implement an intelligence-driven approach to risk management departs from GAO's and DHS's frameworks for risk management. TSA's current approach lacks assurance that it provides the agency and DHS information needed to guide investment decisions to ensure resources are allocated to the highest risks. Establishing a plan and time frame for DHS's review could help TSA ensure it obtains this important information. Further, it is important that TSA abide by the core principles of risk management to inform the annual budget process and to develop a long-term strategic investment strategy that changes over time as needed to reflect progress made in mitigating risks of terrorist attacks. These core principles would cover, at a minimum, setting security goals and conducting comprehensive risk assessments to include threat, vulnerability, and consequence. In addition, establishing a plan and milestones for conducting risk assessments that identify the scope and resource requirements for risk assessments could help TSA ensure that it completes these key tasks. Additionally, establishing an approach to gathering data on state and private sector investments in transportation security would add to TSA's understanding of how to allocate limited resources to the highest priorities. Moreover, assigning uncertainty or confidence levels to its analytic intelligence products will permit TSA to improve the prioritization of its tactics and long-term investments. Finally, strengthening internal controls for risk management at TSA would help to ensure accountability for achieving results. Recommendations for Executive Action: To promote the effective use of risk management at TSA, we recommended in the restricted version of this report that the Assistant Secretary of TSA take the following six actions: * To help provide assurances that resources are allocated to the highest priority risks across the transportation sector, better ensure that its risk management approach includes: - adopting security goals that define specific outcomes, conditions, end points, and performance targets; and: - conducting comprehensive risk assessments for the transportation sector that meet the NIPP criteria and combine individual assessments of threat, vulnerability, and consequence and analyzing these assessments to produce a comparative analysis of risk across the entire transportation sector to guide current and future investment decisions. * Establish an approach for gathering data on state and private sector security partners' investments in transportation security. * Establish a plan and milestones for conducting risk assessments for the transportation sector that identify the scope of the assessments and resource requirements for completing them. * Work with DHS to validate its risk management approach by establishing a plan and time frame for assessing the appropriateness of TSA's intelligence-driven risk management approach for managing risk at TSA and document the results of this review once completed. * Work with the Director of National Intelligence to determine the best approach for assigning uncertainty or confidence levels to analytic intelligence products and apply this approach to intelligence products. * Establish internal controls, including: - a focal point and clearly defined roles and responsibilities for ensuring the risk management framework is implemented; - policies, procedures, and guidance that require the implementation of its framework and completion of related work activities; and: - a system to monitor and improve how effectively the framework is being implemented. We will send copies of this report to interested congressional committees and subcommittees. We will also make copies available to others upon request. Agency Comments: We provided a draft of our restricted report to DHS and TSA for review and comment. In March 2009, DHS and TSA provided written comments, which are presented in Appendix V. In commenting on our report, DHS and TSA stated that they agreed with our recommendations, and TSA identified actions planned or underway to implement them. In its comments, TSA recognized the importance of resources being allocated to the highest priority risks across the transportation sector and stated that security goals will be developed and that comprehensive risk assessments will be conducted in the aviation and highway modes this calendar year. TSA also agreed to expand this approach across all modes and then integrate the results into a comparative risk analysis across the transportation sector. In addition, TSA stated that it would establish an approach for gathering data on state and private sector security partners' investments in transportation security. TSA also stated that its plans to implement several GAO recommendations will be more concrete and credible with specific milestones, scoping, and resource requirements. Further, TSA agreed to work with the National Protection and Programs Directorate, Office of Risk Management and Analysis to validate TSA's current and future risk management approach and to work with the Director of National Intelligence to determine the best approach for including uncertainty or confidence levels in TSA analytic intelligence products and to apply this approach. Finally, TSA stated that it has established an Executive Risk Management Steering Committee (ERSC) that will have overarching responsibility for managing, overseeing, and coordinating all risk analysis and risk-related management activities, including helping to frame important trade-offs for senior decision makers. However, it will be important that TSA complete a charter stating the purpose of the committee, determine its membership, establish clear and appropriate lines of reporting, and begin to hold ERSC meetings in the near future. It will also be important that the ERSC establish policies, procedures, and guidance that require the implementation of TSA's risk management framework and completion of related work activities and that it establish a system to monitor and improve how effectively the framework is being implemented. DHS and TSA also provided us with technical comments, which we considered and incorporated in the report where appropriate. If you or your staff have any questions about this report or wish to discuss these matters further, please contact me at (202) 512-4379 or lords@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Other key contributors to this report are listed in appendix V. Sincerely yours, Signed by: Stephen M. Lord: Director, Homeland Security and Justice Issues: [End of section] Appendix I: Transportation Security Administration (TSA) Risk Management Frameworks: TSA developed a strategic risk management framework that aligns with the National Infrastructure Protection Plan's (NIPP) risk management framework but decided not to implement it to guide resource allocation. While the NIPP does not require that TSA develop an additional framework, TSA developed its own strategic risk management framework to tailor the NIPP framework to the transportation system. In May 2007, TSA issued the Transportation Systems Sector-Specific Plan (TS-SSP), as well as supporting annexes for the aviation, freight rail, highway, maritime, mass transit, and pipeline modes. This plan and its supporting modal annexes and appendixes describe the security framework that is to enable sector stakeholders to make effective, risk-informed security and resource allocation decisions. A key component of TS-SSP is TSA's Systems-Based Risk Management (SBRM) framework, which is a structured, eight-step approach for implementing the plan. According to TS-SSP, this framework was not designed for operational or tactical planning. Instead, SBRM was developed to augment the NIPP and looks beyond protecting a single asset or set of assets by taking a systems view of risk to address the complex and interconnected nature of the systems that comprise the transportation network. According to TSA, this strategic, systems-level approach is vital to providing security to the transportation sector because consequences of system-level failure can far exceed consequences associated with single assets. Figure 3 describes how the eight steps of SBRM align with the six steps of the NIPP. Figure 3: Alignment between the NIPP and TSA's Systems-Based Risk Management Framework (SBRM): [Refer to PDF for image: illustration] NIPP Framework: Step 1: Set security goals; SBRM Framework: Step 1: Strategic risk objective; Step 2: System identification. NIPP Framework: Step 2: Identify assets,systems, networks,and functions; SBRM Framework: Step 3A: System screen; Step 3B: Asset screen. NIPP Framework: Step 3: Assess risks (consequences, vulnerabilities, and threats); SBRM Framework: Step 4A: System assessment; Step 4B: Asset assessment. NIPP Framework: Step 4: Prioritize; SBRM Framework: Step 5: Countermeasure prioritization. NIPP Framework: Step 5: Implement protective programs; SBRM Framework: Step 6: Countermeasure program development; Step 7: Development engine. NIPP Framework: Step 6: Measure effectiveness; SBRM Framework: Step 8: Performance measurement. Source: GAO presentation of DHS and TSA information. [End of figure] According to TSA officials, the NIPP's risk management framework does not produce actionable information for their day-to-day operations and they instead have developed what they refer to as an intelligence- driven approach to risk management. Although with the issuance of TS- SSP in 2007, TSA committed to use the risk management framework in the NIPP, its experience trying to implement the risk management framework to guide selection of programs and investments since then has led TSA to conclude the agency should follow an "intelligence-driven" approach to risk management. TSA officials also stated that they plan to replace SBRM with the intelligence-driven methodology as part of its reissuance of TS-SSP, but they did not provide specific details on when they will reissue TS-SSP or whether the new methodology will be first approved by DHS. Within this intelligence-driven approach, TSA has developed a process for assessing risk known as Objectively Measured Risk Reduction (OMRR). TSA officials explained that OMRR is meant to assist in their day-to- day efforts addressing immediate risks rather than serving as a strategic framework for the overall transportation sector. TSA officials emphasized the value and relative ease of using OMRR rather than the agency's strategic risk management framework. TSA officials stated that all of the modal divisions within TSA's office of Transportation Security Network Management are expected to use OMRR, although it does not align with the steps of the risk management framework in the NIPP. [End of section] Appendix II: Detailed Summary of TSA's Current Assessment Activities: Mode: Multiple modes; Program activity: Title: Administrators Daily Intelligence Briefing; Program activity: Description: Provides a 24-hour snapshot of transportation-related intelligence; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Multiple modes; Program activity: Title: Homeland Information Report; Program activity: Description: Provides intelligence information to the intelligence and law enforcement communities; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Multiple modes; Program activity: Title: Note to Administrator; Program activity: Description: Provides information on a specific request from the Administrator on a topic of interest; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Multiple modes; Program activity: Title: Strategic Homeland Infrastructure Risk Assessment; Program activity: Description: Classified report developed by DHS's Homeland Infrastructure Threat Assessment Center that provides an overview of current high-risk scenarios across all critical infrastructure and key resources sectors. Transportation Sector Network Management's (TSNM) modal divisions contribute vulnerability and consequence analysis; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: Yes; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Multiple modes; Program activity: Title: Spot Reports; Program activity: Description: Share time-sensitive information and provide situational awareness on individuals denied boarding or in flight, people of interest to the law enforcement or intelligence community, or an event important to TSA's mission; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Multiple modes; Program activity: Title: Special Event Threat Assessments; Program activity: Description: Provide in-depth analysis of potential threats with a transportation focus; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Multiple modes; Program activity: Title: Transportation Intelligence Gazettes; Program activity: Description: Provide in-depth analysis focused on a specific topic within a transportation mode; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Multiple modes; Program activity: Title: Transportation Suspicious Incidents Report; Program activity: Description: Provides analysis of suspicious activities and surveillance directed against all transportation modes; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Aviation; Program activity: Title: Air Cargo Vulnerability Assessments; Program activity: Description: Collect information on how air carriers, freight forwarders, and agents operate their businesses and on physical surroundings, such as the quality of door locks and alarms; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Aviation; Program activity: Title: Aviation Mode Annual Threat Assessment; Program activity: Description: Provides in-depth analysis of potential threats; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Aviation; Program activity: Title: Current Airport Threat Assessment; Program activity: Description: Provides threat information on various classes of airports across the United States; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Aviation; Program activity: Title: Joint Vulnerability Assessments; Program activity: Description: Investigate physical security elements of airports, such as fences and access controls. Conducted with cooperation from the FBI, Federal Security Directors, cargo inspectors, airport management, and other entities. The FBI independently conducts a threat assessment, and TSA independently conducts a vulnerability assessment; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Aviation; Program activity: Title: Man-Portable Air Defense Systems (MANPADS) Vulnerability Assessments; Program activity: Description: Evaluate the locations from which attackers can deploy MANPADS. Conducted in cooperation with the FBI, Federal Aviation Administration, airport operators, local law enforcement, and other key stakeholders; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Aviation; Program activity: Title: No-Fly/Selectee Lists; Program activity: Description: The No Fly List identifies individuals who should be prevented from boarding an aircraft. The Selectee List identifies individuals who must undergo enhanced screening at the checkpoint prior to boarding[B]; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Freight rail; Program activity: Title: Corporate Security Reviews; Program activity: Description: Evaluate freight rail companies' security plans and procedures and may include site visits; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Freight rail; Program activity: Title: Freight Rail Mode Annual Threat Assessment; Program activity: Description: Provides in-depth analysis of potential threats; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Freight rail; Program activity: Title: Rail Corridor Reviews; Program activity: Description: Determine the vulnerabilities and potential consequences toxic inhalation hazard (TIH) cars pose in major areas by identifying locations within a city's rail network where TIH cars are vulnerable to attack; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: Yes; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Freight rail; Program activity: Title: TIH Rail Risk Monitoring Program; Program activity: Description: Assesses the security of rail TIH transportation in 46 major urban areas using industry data about TIH car movements inside the urban area. Also audits the security status of cars while at rail yards using TSA inspectors and assess potential consequences associated with the surrounding population; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: Yes; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Highway infra-structure and motor carrier; Program activity: Title: Corporate Security Reviews; Program activity: Description: Conducted with organizations engaged in transportation by motor vehicle and those that maintain or operate key physical assets within the highway transportation community. Serve to evaluate and collect physical and operational preparedness information, evaluate critical assets and key point-of-contact lists, review emergency procedures and domain awareness training, and provide an opportunity to share industry best practices; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Highway infra-structure and motor carrier; Program activity: Title: Highway Infrastructure and Motor Carrier Mode Annual Threat Assessment; Program activity: Description: Provide in-depth analysis of potential threats; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Mass transit; Program activity: Title: Baseline Assessment and Security Enhancement review (BASE); Program activity: Description: Reviews transit systems implementation of 17 security action items jointly developed by TSA and FTA in coordination with the Mass Transit Sector Coordinating Council; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Mass transit; Program activity: Title: Mass Transit Mode Annual Threat Assessment; Program activity: Description: Provides in-depth analysis of potential threats; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Mass transit; Program activity: Title: Security Analysis and Action Program (SAAP); Program activity: Description: Provides a systematic vulnerability assessment of mass transit or passenger rail systems. SAAPs can be conducted on individual critical infrastructure facilities or entire rail systems, with particular emphasis on critical control points; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Pipeline; Program activity: Title: Acute Assessment; Program activity: Description: Evaluates threats to the security of selected sites; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No; Mode: Pipeline; Program activity: Title: Corporate Security Reviews; Program activity: Description: Provide on-site reviews of pipeline security companies; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Pipeline; Program activity: Title: Pipeline Cross-Border Vulnerability Assessments Program; Program activity: Description: U.S. and Canadian teams assess pipeline operations, control systems, interdependencies, and assault planning in critical cross-border infrastructure; Risk information provided: Threat: No; Risk information provided: Vulnerability: Yes; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Mode: Pipeline; Program activity: Title: Pipeline Mode Annual Threat Assessment; Program activity: Description: Provides in-depth analysis of potential threats; Risk information provided: Threat: Yes; Risk information provided: Vulnerability: No; Risk information provided: Consequence: No; Risk assessment conducted (Including threat, vulnerability, and consequence)[A]: No. Source: TSA and GAO Analysis. [A] A risk assessment requires a combination of all three components of risk, and in these cases no efforts were made to combine the components into a comprehensive assessment. [B] DHS determined that details on the No-Fly and Selectee Lists are sensitive security information. Details on the lists are provided in the restricted version of this report, GAO-09-319SU. [End of table] [End of section] Appendix III: GAO Analysis of TSA's SHIRA Input: The Strategic Homeland Infrastructure Risk Assessment (SHIRA) is an annual, classified product that assesses risk across and within each of the nation's 18 Critical Infrastructure and Key Resource (CIKR) sectors. To develop SHIRA, the Department of Homeland Security (DHS) works with members of the Intelligence Community to determine applicable threats against various systems and assets. TSA then assesses vulnerabilities and consequences resulting from scenarios involving these threats by providing scores and enters these data into a worksheet which TSA certifies as the official record of its position and participation in SHIRA. The vulnerability and consequence ranking data in table 4 is derived from TSA's worksheets. We were unable to determine the reliability of this data, which according to TSA officials was based on the judgment of subject matter experts, who were informed by assessment activities (see table 2) and in lieu of risk assessments, contextual information such as passenger volume, the nature of the infrastructure (underground, underwater), time of day, and number of rail lines. However, TSA certifies these data to DHS as its official position and as the record of its participation in the SHIRA process. Vulnerability rankings are based on countermeasure effectiveness, which are ranked on a scale of 0 to 4 as shown in table 4. Table 4: Ranking Scale for Countermeasure Effectiveness: 0: The existing countermeasures are very likely (80 to 100 percent chance) to defeat the attack; 1: The existing countermeasures are likely (60 to 80 percent chance) to defeat the attack; 2: The existing countermeasures are somewhat likely (40 to 60 percent chance) to defeat the attack; 3: The existing countermeasures are unlikely (20 to 40 percent chance) to defeat the attack; 4: The existing countermeasures are very unlikely (0 to 20 percent chance) to defeat the attack. Source: DHS. [End of table] We used the midpoint of each of these rankings as the probability that the existing countermeasures will defeat the attack, and then subtracted this probability from 1 to determine the probability that the existing countermeasures will not defeat the attack. Consequence rankings are also based on a scale of 0 to 4, as shown in table 5 below. Table 5: Consequences Ranking Scales: Ranking scale: 0: Negligible; Loss of life: No fatalities; Economic consequences: Less than $100 million; Psychological consequences: No major change in population behavior, or effects on social functioning locally or nationally. Ranking scale: 1: Minor; Loss of life: Less than 100; Economic consequences: Greater than $100 million; Psychological consequences: Occasional or minor loss of nonessential social functions in a circumscribed geographical area. Ranking scale: 2: Moderate; Loss of life: Greater than 100; Economic consequences: Greater than $1 billion; Psychological consequences: Loss of many nonessential social functions in a circumscribed geographical area. Ranking scale: 3: Significant; Loss of life: Greater than 1,000; Economic consequences: Greater than $10 billion; Psychological consequences: Dysfunctional behavior and disruption of important social functions for a sustained period. Ranking scale: 4: Severe; Loss of life: Greater than 10,000; Economic consequences: Greater than $100 billion; Psychological consequences: Loss of belief in government and institutions, widespread disregard for official instructions, widespread looting and civil unrest. Source: DHS. [End of table] Our analysis of TSA's input to SHIRA suggests that mass transit may be at the greatest risk of a terrorist attack, followed by aviation, highway, freight rail, and pipeline.[Footnote 72] The results of this analysis are dependent on the specific set of threat scenarios selected by DHS and the ratings assigned to the scenarios by TSA; the analysis does not consider the differences in the likelihood of occurrence since TSA did not assign likelihood estimates to the threat scenarios. [Footnote 73] As a result, our analysis uses conditional risk values, consequence multiplied by vulnerability, as called for by the NIPP. We used similar weightings to those applied in other DHS models to weight consequence values: 60 percent for loss of life, 35 percent for economic consequences, and 5 percent for psychological consequences. We applied these weightings to the consequence values and summed them to determine the weighted consequence value for each scenario. We then calculated the risk scores for each scenario by multiplying the weighted consequences by the likelihood that existing countermeasures will defeat the scenario. Risk scores were then aggregated for each mode to determine the relative risk to each mode. [End of section] Appendix IV: Comments from the Department of Homeland Security: U.S. Department of Homeland Security: Washington, DC 20528: March 23, 2009: Mr. Stephen M. Lord: Director, Homeland Security and Justice Issues: U.S. Government Accountability Office (GAO): 441 G Street, NW: Washington, DC 20548: Dear Mr. Lord: The U.S. Department of Homeland Security (DHS) appreciates the opportunity to review and comment on Draft Report GAO-09-492, Transportation Security: Comprehensive Risk Assessments and Stronger Internal Controls Needed to Help Inform TSA Resource Allocation (GAO Job Code 440795). DHS, specifically, the Transportation Security Administration (TSA), values GAO's extensive review of TSA' s risk management methodologies and practices. While TSA acknowledges there are opportunities for improvement to our risk assessment framework, it is important to understand the context in which these opportunities exist. TSA is a young organization charged with a significant mission and extensive daily operating responsibilities in areas at high risk of terrorist attacks. For these reasons, TSA has focused on operations, and integrating risk information, analyses, and approaches to support them. As the organization has matured, TSA has begun to devote additional focus to longer-term approaches to risk management, including areas covered by GAO's report. In the past, TSA has made resource allocation and technology decisions that were informed by considerations of risk, including threat, vulnerability, and consequence analysis, but not by explicit formal comparative or comprehensive assessment. Nevertheless, through this process TSA has arrived at key insights that have become guiding principles for our risk management decisions. These principles include a deep appreciation for uncertainty and for the limits of what can be "known," and a bias against rigid prioritization and narrow inflexible solutions that can be overcome by events or by dynamic, adaptive adversaries. As a result, TSA has focused on developing capabilities that are flexible and adaptable, that cut across risks and are threat-agnostic, and that contain elements of randomness or unpredictability to inject uncertainty into the adversaries planning process. These principles have informed many of TSA's operational and technology decisions, as demonstrated by the development of the Aviation Direct Access Screening Program to provide random screening throughout the airport environment, and the Screening Passengers by Observation Technique which focuses on screening the entire person rather than focusing on objects. TSA recognizes the need for, and usefulness of threat, vulnerability, and consequence (TVC) risk analyses as important decision inputs and will pursue this work going forward. A range of comparative, scenario- based TVC risk analyses are already in progress. The results of these analyses and additional planned work will be useful in assessing mitigation strategies and informing decisions about strategy, operations, and technology across TSA's transportation security responsibilities by challenging and revealing assumptions. Comparative TVC risk analyses do not replace but rather complement and enhance TSA's principles of risk management. Together they will enable decisions on transportation security that are more transparent, more defendable, and more effective. Implementation of Recommendations: The recommendations provide TSA with a useful analysis of TSA's current approach toward risk management, recognition of progress to date, and additional guidance for success. TSA is accomplishing much of what GAO recommends and is formulating additional plans to fulfill the recommendations. Recommendation 1: To help provide assurances that resources are allocated to the highest priority risks across the transportation sector by better ensuring that its risk management approach includes: - Adopting security goals that define specific outcomes, conditions, end points, and performance targets; and - Conducting comprehensive risk assessments for the transportation sector that meet the National Infrastructure Protection Plan criteria and combine individual assessments of threat, vulnerability, and consequence and analyzing these assessments to produce a comparative analysis of risk across the entire transportation sector to guide current and future investment decisions. Response: TSA concurs. As described below, TSA is already taking action to implement many aspects of the recommendation. Security goals will be developed from and informed by the existing body of risk work already accomplished, and supplemented by work in progress. The newly formed Executive Risk Steering Committee, detailed below in our response Recommendation 6, is charged with sponsoring the development of, approving, and monitoring specific risk outcomes and performance targets. Over the past year and a half, TSA has been conducting comprehensive strategic-level risk assessments in the aviation and highway modes. These assessments combine assessments of threat, vulnerability, and consequence to produce comparative analyses of risk within each mode. These assessments are projected for completion this calendar year. Further, TSA will expand this approach across all modes and then integrate the results into a comparative risk analysis for the transportation sector. This effort is being undertaken not only in response to this recommendation but also in response to a requirement in the Department of Homeland Security Appropriations Act, 2009. TSA senior executives have already approved this effort and identified funding. As recommended by GAO, the results of these modal and cross-modal comparative risk analyses will be used to guide current and future decisions on investment, regulations, operations, and analytical focus. However, TSA does not intend to mechanically allocate resources in direct proportion to the results of these comparative risk analyses. Rather, they will be important inputs to the decision process that also accounts for statutory requirements, cost, feasibility, effectiveness, and impact on commerce, privacy, current operations and future capabilities of security partners, and other considerations. TSA recognizes the importance of resources being allocated to the highest priority risks across the transportation sector. However, transportation security resource allocation is a complex function of operational responsibility among multiple Federal, State, and local agencies and private operators, the varying cost of risk-mitigating activities, and the changing nature of threats. These factors, in addition to Congressionally-mandated security requirements, make it very difficult to draw simple, two-dimensional risk/resource correlations for TSA. While risk has always been a consideration in TSA's decision making, the increasing availability of comparative risk information that is more explicit, more transparent, more comprehensive, and more sophisticated will improve the transparency and defensibility, and quality of those decisions going forward. However, the decision process must continue to take account of the other considerations listed above as well. Recommendation 2: Establish an approach for gathering data on State and private sector security partners' investments in transportation security. Response: TSA concurs. Recommendation 3: Establish a plan and milestones for conducting risk assessments for the transportation sector that identify the scope of the assessments and resource requirements for completing them. Response: TSA concurs. TSA currently has several comprehensive, comparative, TVC modal risk assessments in-progress. These assessments in the aviation and highway modes are scoped and resourced with specific milestones. A comprehensive cross modal transportation risk assessment will incorporate these assessments, along with additional assessments in the remaining modes, as recommended by GAO and required by Appropriations legislation. The overarching resourcing and scoping has been estimated and is being finalized. As described later in this response, TSA has established an Executive Risk Steering Committee (ERSC) that will finalize and approve these decisions, as well as directing the establishment, approval, and tracking of supporting milestones and related decisions. Recommendation 4: Work with DHS to validate its risk management approach by establishing a plan and timeframe for assessing the appropriateness of TSA's intelligence-driven risk management approach for managing risk at TSA and document the results of this review once completed. Response: As detailed in our response to Recommendation 6 below, TSA has developed an ERSC. One of the functions of the ERSC is to work closely with the DHS Office of Risk Management and Analysis as they further develop their risk methodology. TSA and the National Protection and Programs Directorate, Office of Risk Management and Analysis, will collaborate on the issue of validating TSA's current and future risk management approach. This approach includes the intelligence-driven risk management approach TSA discussed with GAO in December 2008, but also now includes TSA' s broad range of comprehensive TVC risk assessments currently in progress or planned, as recommended by GAO and as required by Appropriations legislation. Recommendation 5: Work with the Director of National Intelligence to determine the best approach for assigning uncertainty or confidence levels to analytic intelligence products and apply this approach to intelligence products. Response: TSA concurs. TSA recognizes the inherent uncertainty of intelligence analysis and the value of including proper caveats and expressions of uncertainties or confidence in analytic judgments. In concert with DHS Intelligence and Analysis, TSA's Office of Intelligence will work with the Director of National Intelligence (DNI) to determine the best approach for including uncertainty or confidence levels in TSA analytic intelligence products and apply this approach. These actions will be taken in line with TSA's already significant interactions with the DNI's National Counterterrorism Center on analytical matters. We note, however, that TSA produces many informational rather than analytical intelligence products, including our Transportation Suspicious Incidents Report, No-Fly/Selectee Lists, Spot Reports, and Posters. Thus, it may not be appropriate or useful to include uncertainty and confidence judgments in a broad array of such products. We also note that in many of our intelligence products TSA already includes descriptions of (a) the credibility of the underlying intelligence sources and (b) critical intelligence gaps. While not a substitute for uncertainty/confidence levels, such descriptions of source credibility and intelligence gaps convey important information about the scope and quality of the intelligence we use to support our analytic judgments. Recommendation 6: Establish internal controls, including: - a focal point and clearly defined roles and responsibilities for ensuring the risk management framework is implemented; - policies, procedures, and guidance that require the implementation of its framework and completion of related work activities; and; - a system to monitor and improve how effectively the framework is being implemented. Response: TSA has established an ERSC that will have overarching responsibility for managing, overseeing, and coordinating all risk analysis and risk- related management activities, including framing important trade-offs for the senior leadership. The ERSC is charged with overseeing the development of a comprehensive risk management strategy that will address risk management issues facing the entire transportation sector. The overall goal of the ERSC is to determine an appropriate cross- cutting, risk-based strategy that will enable risk-informed resource allocations and decision making across various transportation modes and systems. In terms of functionality, the ERSC will provide: - Oversight and approval for TSA's risk management strategy, communications, and related activities; - Integration among TSA offices on major projects/issues relating to risk management; - A corporate voice on risk management issues for DHS, GAO, Congress, and other organizations as appropriate; - A structure to support standing and ad hoc working groups on risk management which supports the above; and, - Focus and integration with respect to risk management activities, policies, and actions set-forth by DHS's Office of Risk Management and Analysis. The ERSC will have a Chair reporting directly to the TSA Administrator. The Chair will be supported by a small project management staff. Working groups will consist of Senior Executive Service and staff-level participants, as required. Working groups will develop detailed plans defining milestones and key deliverables that meet requirements and tasks from the ERSC. The ERSC will monitor the progress and products developed by the working groups. Among the ERSC' s early tasks will be defining, in more detail, actions appropriate for the ERSC's consideration, and a process for recognizing and dealing with those actions. Again, we would like to thank GAO for their extensive review of TSA's risk management methodologies and practices. Sincerely yours, Signed by: Jerald E. Levine: Director: DHS GAO/OIG Liaison Office: [End of section] Appendix V: GAO Contacts and Staff Acknowledgements: GAO Contact: Stephen M. Lord, (202) 512-4379, lords@gao.gov: Staff Acknowledgments: In addition to the contact named above, Anne Laffoon, Assistant Director, and Tony Cheesebrough, Analyst-in-Charge, managed this assignment. Jason Barnosky, Kathryn Bolduc, Maylin Jue, and David Messman made significant contributions to this work. Chuck Bausell and Stan Kostyla assisted with design, methodology, and data analysis. Katherine Davis provided assistance in report preparation; Tom Lombardi provided legal support; and Pille Anvelt and Barbara Hills developed the report's graphics. [End of section] Footnotes: [1] Department of Homeland Security, Transportation Security Administration, Transportation Systems Sector-Specific Plan, May 2007. [2] Risk-based decision making has often been used interchangeably with risk-informed decision making. However, according to the DHS Risk Lexicon, risk-based decision making uses the assessment of risk as the primary decision driver, while risk-informed decision making may consider other relevant factors in addition to risk information. In keeping with this distinction, we have used the term risk-informed rather than risk-based throughout this report. [3] Issued in December 2003, Homeland Security Presidential Directive 7 (HSPD-7) directed the Departments of Transportation and Homeland Security to collaborate on all matters relating to transportation security and transportation infrastructure protection. DHS subsequently designated TSA as the lead agency for addressing HSPD-7 as it relates to securing the nation's transportation sector. [4] CIKR include the assets, systems, networks, and functions that provide vital services to the nation and are dispersed among the following 18 sectors: Agriculture and Food; Banking and Finance; Chemical; Commercial Facilities; Communications; Critical Manufacturing; Dams; Defense Industrial Base; Emergency Services; Energy; Government Facilities; Healthcare and Public Health; Information Technology; National Monuments and Icons; Nuclear Reactors, Materials, and Waste; Postal and Shipping; Transportation Systems; and Water. [5] See GAO, Transportation Security: Systematic Planning Needed to Optimize Resources, [hyperlink, http://www.gao.gov/products/GAO-05-357T] (Washington, D.C. June 29, 2005); Passenger Rail Security: Enhanced Federal Leadership Needed to Prioritize and Guide Security Efforts, [hyperlink, http://www.gao.gov/products/GAO-07-225T] (Washington, D.C.: Jan. 18, 2007); Commercial Vehicle Security: Risk-Based Approach Needed to Secure the Commercial Vehicle Sector, [hyperlink, http://www.gao.gov/products/GAO-09-85] (Washington, D.C.: Feb. 6, 2009); and Highway Infrastructure: Federal Efforts to Strengthen Security Should Be Better Coordinated and Targeted on the Nation's Most Critical Highway Infrastructure, [hyperlink, http://www.gao.gov/products/GAO-09-57] (Washington, D.C.: Jan. 30, 2009). [6] We did not include the maritime mode of transportation in our analysis because the United States Coast Guard is the primary agency responsible for maritime security. [7] See GAO, Standards for Internal Control in the Federal Government, [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1] (Washington, D.C.: Nov. 1999). These standards, issued pursuant to the requirements of the Federal Managers' Financial Integrity Act of 1982, provide the overall framework for establishing and maintaining internal control in the federal government. Also pursuant to the 1982 Act, the Office of Management and Budget (OMB) issued circular A-123, revised December 21, 2004, to provide the specific requirements for assessing the reporting on internal controls. Internal control standards and the definition of internal control in OMB Circular A-123 are based on GAO's Standards for Internal Control in the Federal Government. [8] See The National Strategy for Homeland Security, October 2007: "Despite our best efforts, achieving a complete state of CIKR protection is not possible in the face of the numerous and varied catastrophic possibilities that could challenge the security of America today. Recognizing that the future is uncertain and that we cannot envision or prepare for every potential threat, we must understand and accept a certain level of risk as a permanent condition—The assessment and management of risk underlies the full spectrum of our homeland security activities, including decisions about when, where, and how to invest in resources that eliminate, control, or mitigate risks." [9] See, e.g., Homeland Security Presidential Directive/HSPD-7, Critical Infrastructure Identification, Prioritization, and Protection (Dec. 17, 2003). [10] See, e.g., Pub. L. No. 110-53, § 1202, 121 Stat. 266, 381-83 (2007) (amending 49 U.S.C. § 114(s), as redesignated); Pub. L. No. 108- 458, § 4001, 118 Stat. 3639, 1370, 3710-12 (2004) (codifying 49 U.S.C. § 114(s), as redesignated, and amending 49 U.S.C. § 44904). In general, section 114(s), as codified and amended, requires the Secretary of Homeland Security to develop, prepare, implement, and update a National Strategy for Transportation Security and modal security plans that address security risks, including threats, vulnerabilities, and consequences. [11] See Pub. L. No. 107-296, § 201, 116 Stat. 2135, 2145-49 (2002). In 2006, DHS reorganized its Information Analysis and Infrastructure Protection division. The functions of the Directorate of Information Analysis and Infrastructure Protection were moved to the Office of Intelligence Analysis and Office of Infrastructure Protection. [12] TSA's Transportation Systems Sector-Specific Plan describes a risk management framework known as the Systems-Based Risk Management (SBRM) Framework (see app. I for a description). [13] See, for example, GAO, Risk Management: Further Refinements Needed to Assess Risks and Prioritize Protective Measures at Ports and Other Critical Infrastructure, [hyperlink, http://www.gao.gov/products/GAO-06-91] (Washington, D.C.: Dec. 15, 2005); [hyperlink, http://www.gao.gov/products/GAO-07-255T]; Department of Homeland Security: Progress Report on Implementation of Mission and Management Functions, [hyperlink, http://www.gao.gov/products/GAO-07-454] (Washington, D.C.: Aug. 17, 2007); and Risk Management: Strengthening the Use of Risk Management Principles in Homeland Security, [hyperlink, http://www.gao.gov/products/GAO-08-904T] (Washington, D.C.: June 25, 2008). [14] See [hyperlink, http://www.gao.gov/products/GAO-06-91]. [15] The six-step risk management framework described by DHS in the National Infrastructure Protection Plan is consistent with GAO's five- step risk management framework described in [hyperlink, http://www.gao.gov/products/GAO-06-91]. While the content and sequence of the frameworks is effectively the same, the frameworks differ in the number of steps and the degree to which actions are divided or combined into different steps. For example, the second step in the GAO framework (Risk Assessment) is separated into the second and third steps in the NIPP framework (Identify Assets and Systems, and Assess Risks, respectively). DHS also recently issued an Interim Integrated Risk Management Framework for DHS-wide risk management purposes that is similar, differing only in the subdivision of the steps. [16] DHS determined that details on the specific security goals are sensitive security information. Details on the goals are provided in the restricted version of this report, GAO-09-319SU. [17] DHS determined that details on the prioritized critical infrastructure list are sensitive security information. Details on this list are provided in the restricted version of this report, GAO-09- 319SU. [18] See [hyperlink, http://www.gao.gov/products/GAO-06-91]. [19] TSA intended NTSRA to address GAO, congressional, and other concerns that TSA had not conducted a comprehensive risk assessment for the transportation sector. As part of its initial efforts, TSA identified 38 distinct threat scenarios for the transportation sector as part of NTSRA--including a variety of conventional explosive attacks as well as chemical and biological attacks--but it did not produce a risk score for these scenarios by integrating threat, vulnerability, and consequence assessments. [20] DHS determined that details on the 38 NTSRA threat scenarios are sensitive security information. Details on these scenarios are provided in the restricted version of this report, GAO-09-319SU. [21] As a result, in July 2008, TSA stated that progress on NTSRA had been suspended, and in September 2008, TSA stated that NTSRA would not be issued or used. However, in December 2008 TSA stated that it was developing a Risk Management Executive Steering Committee that would reconsider the status of NTSRA. [22] Due to the scope of our work, we did not assess the extent to which these assessment activities meet the NIPP criteria for threat, vulnerability, and consequence assessments. [23] See Pub. L. No. 110-28, 121 Stat. 112, 140-41 (2007) (providing that the $80 million appropriated for air cargo shall be used to complete air cargo vulnerability assessments for all Category X airports, among other purposes). TSA classifies the commercial airports in the United States into one of five security risk categories (X, I, II, III, and IV). In general, Category X airports have the largest number of passenger boardings, and category IV airports have the smallest. Category X, I, II, and III airports account for more than 90 percent of the nation's air traffic. [24] See [hyperlink, http://www.gao.gov/products/GAO-09-57]. [25] In addition to the 9/11 Commission Act requirement for a school bus risk assessment, TSA reports that it plans to conduct risk assessments for the other major components of the highway system: truck, over-the-road bus, commercial trucking and port interface, and infrastructure highway. [26] According to TSA, the high-risk focus for a mode is informed by intelligence insights; vulnerability studies such as corridor assessments in rail; scientific analysis such as a study conducted by the Homeland Security Institute for general aviation; proxies for consequence such as ridership and the number of underground tunnels in mass transit; security incidents at airports; 9/11 Commission Act requirements such as 100 percent screening of cargo transported on passenger aircraft; and other relevant information. As a result, TSA's approach to identifying high-risk focus areas is not based on criteria in the NIPP. For example, TSA stated that transportation system partners and owners and operators provide input into vulnerability analysis, rather than follow NIPP guidance that would have TSA identify consistent methodologies and tools for transportation assets and systems and then identify and group vulnerabilities using common threat scenarios. Further, TSA stated that consequences are typically assessed using historic analogs--roughly similar events for which the consequences have been observed--rather than an assessment of the effects of such an attack on people, the economy, public confidence, and the government's capability, as required by the NIPP. [27] See [hyperlink, http://www.gao.gov/products/GAO-09-57]. [28] DHS determined that details on the prioritized critical infrastructure list are sensitive security information. Details on this list are provided in the restricted version of this report, GAO-09- 319SU. [29] According to DHS, the Office of Risk Management and Analysis (RMA) has recognized this as an issue internal to DHS, and will require components to share results with RMA. [30] DHS determined that details on the prioritized critical infrastructure list are sensitive security information. Details on this list are provided in the restricted version of this report, GAO-09- 319SU. [31] See [hyperlink, http://www.gao.gov/products/GAO-09-57]. [32] HSPD-7 requires Sector-Specific Agencies to provide an annual report to the Secretary of Homeland Security on their efforts to identify, prioritize, and coordinate CIKR protection in their respective sectors. Consistent with this requirement, DHS provides reporting guidance and templates that include requests for specific information, such as sector CIKR protection priorities, requirements, and resources. TSA completed its 2008 CIKR sector annual report in June 2008. [33] DHS determined that details on the threats are sensitive security information. Details on these threats are provided in the restricted version of this report, GAO-09-319SU. [34] DHS determined that details on the threats are sensitive security information. Details on the threats are provided in the restricted version of this report, GAO-09-319SU. [35] DHS determined that details on the threats are sensitive security information. Details on the threats are provided in the restricted version of this report, GAO-09-319SU. [36] VIPR missions are targeted deployments of integrated TSA and other federal, state, or local assets to secure any mode of transportation. VIPR missions can occur in a variety of venues. [37] Behavior Detection Officers are Transportation Security Officers specially trained to detect suspicious behavior in individuals in the airport environment. [38] The other three performance measures include (1) the number of completed rail corridor assessments in high threat urban areas; (2) the percentage of carrier adopted security action items; and (3) the percentage of employees who have received security awareness training. [39] See GAO, Freight Rail: Actions Have Been Taken to Enhance Freight Rail Security, but the Federal Strategy Can Be Strengthened and Security Efforts Better Monitored, GAO-09-243SU (Washington, D.C.: Mar. 2009). [40] The DHS annual budget submission is supported by the CIKR National Annual Report, which is a combination of all sector annual reports. [41] According to the NIPP, sector-specific planning and coordination are addressed through private sector and government coordinating councils that are established for each sector. Government coordinating councils (GCC) are comprised of representatives of the sector-specific agencies, in this case, TSA; other federal departments and agencies; and state, local, and tribal governments. Sector coordinating councils (SCC) are comprised of private sector representatives. [42] The objective of PPBE is to articulate DHS goals, objectives, and priorities; align DHS programs to those goals; and develop and implement a program structure to accomplish those goals and objectives. FYHSP is intended to be influenced by risk assessments performed during this process. [43] This guidance is contained in DHS Management Directive 1330. [44] DHS has also begun to work with its components to assess risk and to evaluate the risk reduction achieved by its programs through the Office of Risk Management and Analysis' Risk Assessment Process for Informed Decision-making (RAPID). RAPID is intended to inform the program and budget phases of PPBE with strategic-level risk analysis, and is currently in the prototype phase of development. [45] ADASP involves Transportation Security Officers performing security screening for explosives, incendiaries, weapons, and other prohibited items or improper airport identification media. This security screening will occur at direct access points to include secured areas, sterile areas, or aircraft operating areas outside of TSA's security screening checkpoints. [46] See GAO, Homeland Security: DHS Risk-Based Grant Methodology Is Reasonable, But Current Version's Measure of Vulnerability is Limited, [hyperlink, http://www.gao.gov/products/GAO-08-852] (Washington, D.C.: June 27, 2008). [47] See GAO, Aviation Security: Federal Air Marshal Service has Taken Actions to Fulfill its Core Mission and Address Workforce Issues, but Additional Actions are Needed to Improve Workforce Survey, [hyperlink, http://www.gao.gov/products/GAO-09-273] (Washington, D.C.: Jan. 14, 2009). [48] The FAMS budget represents approximately 12 percent of TSA's total budget in fiscal year 2009. [49] FAMS officials stated that they consulted with the aviation security community and believe that the agency's definition of vulnerability is appropriate for risk analyses relevant to the mission of FAMS. [50] See generally 49 U.S.C. § 44901. [51] See 49 U.S.C. § 44901(g). [52] According to TSA, these experts were informed by assessment activities (see figure 3) and in lieu of risk assessments, contextual information such as passenger volume, the nature of the infrastructure (underground, underwater), time of day, and number of rail lines. [53] The results of this analysis are dependent on the specific set of threat scenarios selected by DHS and the ratings assigned to the scenarios by TSA; the analysis does not consider the differences in the likelihood of occurrence since these data have not been provided by DHS. For example, if the set of scenarios selected by DHS were to include a more comprehensive set of likely threats, our analysis may produce different results. [54] Our analysis suggests that TSA's budget may not reflect the risk information they are currently reporting via SHIRA to DHS, and in turn, to the White House and Congress. TSA has acknowledged the high risk to mass transit in its TS-SSP by citing a Brookings Institution study that stated "from 1991 to 2001, 42 percent of all terrorist attacks worldwide have targeted rail systems or buses." [55] TSA Risk Management Methodology, December 9, 2008. [56] See GAO-08-492. [57] According to this view, unlike natural disasters, when one avenue of attack is deterred by a countermeasure, terrorists will find a new mode of attack, shifting their focus to other vulnerable areas of the transportation sector. [58] According to TSA officials, TSA's rejection of the NIPP's risk management framework in favor of an intelligence-driven approach is based in part on the assumption that risk assessment is intended to precisely predict terrorist threats. However, this assumption is inconsistent with the purpose of risk assessment, which is to provide a tool for prioritizing which assets require greater protection relative to finite resources. As we reported in December, 2005, although agencies may not have enough information to identify and characterize all threats related to their assets, known or imagined adverse events should be characterized in some detail based on an understanding of an adversary's capabilities and intentions. [59] TSA's Risk Management Methodology refers to such an event as "a low probability, high consequence event beyond the realm of normal expectations which is typically unpredicted and unpredictable. The Great Depression, the fall of the Soviet Union, and 9/11 are all examples." [60] TSA Risk Management Methodology, December 9, 2008. [61] DHS guidance directs sector-specific agencies like TSA to update DHS on changes to its sector specific plan, including changes in risk assessment methodologies. [62] See [hyperlink, http://www.gao.gov/products/GAO-09-57]; see also GAO-09-243SU. TS-SSP includes annexes for each transportation mode describing how the mode would achieve the objectives and priorities established in TS-SSP. In both of these products, we reported that the annexes for the freight rail mode and the highway motor carrier mode lacked some key characteristics of successful national strategies. For example, we reported that the highway modal annex did not provide details on how sector partners will collaborate on information sharing. Similarly, we reported that the freight rail annex did not clearly identify roles and responsibilities within the freight rail mode or provide milestones for most of its programs and activities. [63] See Pub. L. No. 108-458, § 1019, 118 Stat. at 3671-72 (requiring the Director of National Intelligence to assign an individual or entity with responsibility for ensuring that finished intelligence products produced by any element or elements of the intelligence community are timely, objective, independent of political considerations, based upon all sources of available intelligence, and employ the standards of proper analytic tradecraft). See also Intelligence Community Directive 203, which establishes Intelligence Community Analytic Standards, including that analytic products: "Exhibit Proper Standards of Analytic Tradecraft, Specifically...[that each product]...properly caveats and expresses uncertainties or confidence in analytic judgments. Analytic products should indicate both the level of confidence in analytic judgments and explain the basis for ascribing it. Sources of uncertainty--including information gaps and significant contrary reporting--should be noted and linked logically and consistently to confidence levels in judgments. As appropriate, products should also identify indicators that would enhance or reduce confidence or prompt revision of existing judgments." [64] See JP 2-0, Joint Intelligence, June 22, 2007: [hyperlink, http://www.dtic.mil/doctrine/jel/new_pubs/jp2_0.pdf]. [65] In addition to the U.S. Coast Guard and FEMA, DHS's Office of Science and Technology has conducted the following risk assessments using traditional methodologies: a Biological Threat Risk Assessment and an Integrated Chemical, Biological, Radiological, and Nuclear Terrorism Risk Assessment. [66] According to officials from the Intelligence Coordination Center, they use intelligence to quantify each sub-element within capability, intent, and presence. For example, presence is composed of two sub- elements--the number of known or suspected extremists and the number of areas of potential support or permissive environments--which are quantified and weighted within the overall threat model. This threat assessment is combined with assessments of vulnerability and consequence to produce MSRAM's risk assessment. [67] See [hyperlink, http://www.gao.gov/products/GAO-08-852]. [68] See [hyperlink, http://www.gao.gov/products/GAO-08-852]. According to DHS officials, the agency's Office of Intelligence and Analysis (I&A) calculated the Threat Index by (1) collecting qualitative threat information with a nexus to international terrorism, (2) analyzing the threat information to create threat assessments for states and urban areas, (3) empaneling intelligence experts to review the threat assessments and reach consensus as to the number of threat tiers, and (4) assigning threat scores. This process, according to DHS officials, relied upon analytical judgment and interaction with the Intelligence Community, as opposed to the use of total counts of threats and suspicious incidents to calculate the Threat Index for the 2006 grant cycle. The final threat assessments are approved by the Intelligence Community--the Federal Bureau of Investigation, Central Intelligence Agency, National Counterterrorism Center, and the Defense Intelligence Agency--along with the DHS Under Secretary for Intelligence and Analysis and the Secretary of DHS, according to DHS officials. [69] See [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1]. [70] See GAO, Highlights of a GAO Forum: Strengthening the Use of Risk Management Principles in Homeland Security, [hyperlink, http://www.gao.gov/products/GAO-08-627SP] (Washington, D.C.: Apr. 15, 2008). [71] RMSI developed a strategic risk management framework and the May 2007 Transportation Systems Sector-Specific Plan (TS-SSP). It also worked on the National Transportation Sector Risk Assessment (NTSRA), which was intended to be a risk assessment for the entire transportation sector. RMSI staff also worked with Boeing on the development of the Risk Management Analysis Process, a tool for evaluating the effectiveness of countermeasures in the commercial aviation sector. [72] DHS determined that details of our analysis of TSA's input to SHIRA are sensitive security information. Details of this analysis are provided in the restricted version of this report, GAO-09-319SU. [73] For example, if the set of scenarios selected by DHS were to include a more comprehensive set of likely threats, our analysis may produce different results Given the lack of likelihood estimates for the threat scenarios, a test of the sensitivity of our analysis with respect to key sources of uncertainty would test the robustness of these results. [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Phone: The price of each GAO publication reflects GAO‘s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO‘s Web site, [hyperlink, http://www.gao.gov/ordering.htm]. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.