Transportation Security

Key Actions Have Been Taken to Enhance Mass Transit and Passenger Rail Security, but Opportunities Exist to Strengthen Federal Strategy and Programs Gao ID: GAO-09-678 June 24, 2009

Terrorist incidents worldwide have highlighted the need for securing mass transit and passenger rail systems. The Department of Homeland Security's (DHS) Transportation Security Administration (TSA) is the primary federal entity responsible for securing these systems. GAO was asked to assess (1) the extent to which federal and industry stakeholders have assessed risks to these systems since 2004, and how TSA has used this information to inform its security strategy; (2) key actions federal and industry stakeholders have taken since 2004 and the extent to which federal actions are consistent with TSA's security strategy, and the challenges TSA faces in implementing them; and (3) TSA's reported status in implementing 9/11 Commission Act provisions for mass transit and passenger rail security. GAO reviewed documents including TSA's mass transit and passenger rail strategic plan, and interviewed federal officials and industry stakeholders from 30 systems and Amtrak--representing 75 percent of U.S. mass transit and passenger rail ridership.

Since 2004, federal and industry stakeholders have conducted assessments of individual elements of risk--threat, vulnerability and consequence--for mass transit and passenger rail systems and this information has informed TSA's security strategy; however, TSA has not combined information from these three elements to conduct a risk assessment of these transportation systems. By completing a risk assessment, TSA would have reasonable assurance that it is directing its resources toward the highest priority needs. Further, while TSA's mass transit and passenger rail security strategy contains some information, such as goals and objectives, that is consistent with GAO's prior work on characteristics of a successful national strategy, it could be strengthened by including performance measures to help TSA track progress in securing these systems, among other things. Federal and industry stakeholders have taken several key actions to strengthen the security of mass transit and passenger rail systems since 2004, and while federal actions have been generally consistent with TSA's security strategy, TSA faces coordination challenges, and opportunities exist to strengthen some programs. TSA has deployed surface inspectors to assess industry security programs and worked with DHS to develop security technologies, among other actions. Mass transit and passenger rail systems, including Amtrak, also reported taking actions to increase security, such as implementing passenger and baggage screening programs. Although TSA has taken steps to enhance its efforts, it can further strengthen security programs by, for example, expanding its efforts to obtain and share security technology information with industry. By improving information sharing with industry, TSA can help to ensure that its and industry's limited resources are used more productively to secure mass transit and passenger rail systems. As of March 2009, TSA reported implementing some of the 9/11 Commission Act provisions related to securing mass transit and passenger rail such as developing a strategy for securing transportation, but had missed deadlines, for example, for issuing new regulatory requirements for mass-transit and passenger-rail employee security training. In addition, TSA's progress reports that track its implementation of 9/11 Act provisions lack milestones to guide this effort as called for by project management best practices. Additionally, in some cases, TSA progress reports identify challenges to meeting 9/11 Act provisions, but these reports do not include a plan for addressing these challenges. Until TSA develops a plan with milestones, it will be difficult for TSA to provide reasonable assurance that the act's provisions are being implemented and that a plan is in place for overcoming challenges that arise. Additionally, officials from almost half of the mass transit and passenger rail systems GAO visited reported concerns with the potential costs and the feasibility of implementing pending employee security training requirements.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-09-678, Transportation Security: Key Actions Have Been Taken to Enhance Mass Transit and Passenger Rail Security, but Opportunities Exist to Strengthen Federal Strategy and Programs This is the accessible text file for GAO report number GAO-09-678 entitled 'Transportation Security: Key Actions Have Been Taken to Enhance Mass Transit and Passenger Rail Security, but Opportunities Exist to Strengthen Federal Strategy and Programs' which was released on July 24, 2009. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to the Chairman, Committee on Homeland Security, House of Representatives: United States Government Accountability Office: GAO: June 2009: Transportation Security: Key Actions Have Been Taken to Enhance Mass Transit and Passenger Rail Security, but Opportunities Exist to Strengthen Federal Strategy and Programs: GAO-09-678: GAO Highlights: Highlights of GAO-09-678, a report to the Chairman, Committee on Homeland Security, House of Representatives. Why GAO Did This Study: Terrorist incidents worldwide have highlighted the need for securing mass transit and passenger rail systems. The Department of Homeland Security‘s (DHS) Transportation Security Administration (TSA) is the primary federal entity responsible for securing these systems. GAO was asked to assess (1) the extent to which federal and industry stakeholders have assessed risks to these systems since 2004, and how TSA has used this information to inform its security strategy; (2) key actions federal and industry stakeholders have taken since 2004 and the extent to which federal actions are consistent with TSA‘s security strategy, and the challenges TSA faces in implementing them; and (3) TSA‘s reported status in implementing 9/11 Commission Act provisions for mass transit and passenger rail security. GAO reviewed documents including TSA‘s mass transit and passenger rail strategic plan, and interviewed federal officials and industry stakeholders from 30 systems and Amtrak”representing 75 percent of U.S. mass transit and passenger rail ridership. What GAO Found: Since 2004, federal and industry stakeholders have conducted assessments of individual elements of risk”threat, vulnerability and consequence”for mass transit and passenger rail systems and this information has informed TSA‘s security strategy; however, TSA has not combined information from these three elements to conduct a risk assessment of these transportation systems. By completing a risk assessment, TSA would have reasonable assurance that it is directing its resources toward the highest priority needs. Further, while TSA‘s mass transit and passenger rail security strategy contains some information, such as goals and objectives, that is consistent with GAO‘ s prior work on characteristics of a successful national strategy, it could be strengthened by including performance measures to help TSA track progress in securing these systems, among other things. Federal and industry stakeholders have taken several key actions to strengthen the security of mass transit and passenger rail systems since 2004, and while federal actions have been generally consistent with TSA‘s security strategy, TSA faces coordination challenges, and opportunities exist to strengthen some programs. TSA has deployed surface inspectors to assess industry security programs and worked with DHS to develop security technologies, among other actions. Mass transit and passenger rail systems, including Amtrak, also reported taking actions to increase security, such as implementing passenger and baggage screening programs. Although TSA has taken steps to enhance its efforts, it can further strengthen security programs by, for example, expanding its efforts to obtain and share security technology information with industry. By improving information sharing with industry, TSA can help to ensure that its and industry‘s limited resources are used more productively to secure mass transit and passenger rail systems. As of March 2009, TSA reported implementing some of the 9/11 Commission Act provisions related to securing mass transit and passenger rail such as developing a strategy for securing transportation, but had missed deadlines, for example, for issuing new regulatory requirements for mass-transit and passenger-rail employee security training. In addition, TSA‘s progress reports that track its implementation of 9/11 Act provisions lack milestones to guide this effort as called for by project management best practices. Additionally, in some cases, TSA progress reports identify challenges to meeting 9/11 Act provisions, but these reports do not include a plan for addressing these challenges. Until TSA develops a plan with milestones, it will be difficult for TSA to provide reasonable assurance that the act‘s provisions are being implemented and that a plan is in place for overcoming challenges that arise. Additionally, officials from almost half of the mass transit and passenger rail systems GAO visited reported concerns with the potential costs and the feasibility of implementing pending employee security training requirements. What GAO Recommends: Among other things, GAO recommends that TSA conduct a risk assessment that includes all elements of risk, enhance its security strategy by incorporating performance measures, improve sharing of security technology information, and develop a plan with milestones for meeting 9/11 Act provisions. DHS concurred with GAO‘s recommendations. View [hyperlink, http://www.gao.gov/products/GAO-09-678] or key components. For more information, contact Cathy Berrick at (202) 512- 3404 or berrickc@gao.gov. [End of section] Contents: Letter: Background: Federal and Industry Stakeholders Have Assessed Individual Elements of Risk, Which Have Informed TSA's Security Strategy, but TSA Could Strengthen Its Approach by Conducting a Risk Assessment and Updating Its Security Strategy: Federal and Industry Stakeholders Have Taken Key Actions to Strengthen Transit Security and Federal Actions Have Been Generally Consistent with TSA's Strategy, but Opportunities Exist to Strengthen Some Programs: TSA Reported Implementing Some 9/11 Commission Act Provisions for Mass Transit and Passenger Rail Security, but Implementing New Regulations May Pose Challenges for TSA and Industry Stakeholders: Conclusions: Recommendations for Executive Action: Agency Comments: Appendix I: Objectives, Scope, and Methodology: Appendix II: TSA/FTA Security and Emergency Management Action Items: Appendix III: Identifying Characteristics of Successful National Strategies in the Context of Mass Transit and Passenger Rail Security: Appendix IV: Federal Actions Taken to Enhance Mass Transit and Passenger Rail Security since 2004: Appendix V: Modal Annex Objectives and Examples of Actions Taken to Achieve Them as of February 2009: Appendix VI: DHS Mass Transit and Passenger Rail Related Security Technology Pilots Conducted from 2004 to 2009: Appendix VII: Comments from Amtrak: Appendix VIII: Comments from the Department of Homeland Security: Appendix IX: GAO Contacts and Staff Acknowledgments: Tables: Table 1: Summary of Federal and Industry Stakeholders' Assessment Activities since 2004: Table 2: Summary of Federal and Industry Stakeholders' Assistance to Transit Agencies for Risk Assessments Provided since 2004: Table 3: Summary of Desirable Characteristics of Successful National Strategies and Related Executive Order Factors: Table 4: Sector Goals and Passenger Rail and Mass Transit Subordinate Objectives to Complete Sector Goals: Table 5: Key Federal Actions Taken to Enhance Mass Transit and Passenger Rail Security Since 2004: Table 6: Key Selected Provisions of the 9/11 Commission Act for Mass Transit and Passenger Rail Security and TSA's Reported Implementation Status, as of March 2009: Table 7: Mass Transit and Passenger Rail Systems Interviewed: Table 8: Federal Actions Taken to Enhance Mass Transit and Passenger Rail Security since 2004: Table 9: TSA Mass Transit Modal Annex Objectives and Examples of Actions That Have Been Employed to Achieve the Objectives, as of February 2009: Table 10: DHS Mass Transit and Passenger Rail Related Security Technology Pilots Conducted from 2004 to 2009: Figures: Figure 1: Geographic Distribution of Amtrak and Rail Transit Systems in the United States: Figure 2: NIPP Risk Management Framework: Figure 3: Photo of DHS S&T Pilot Technology for a Fare Card Vending Machine with Explosive Trace Detection Capability: Abbreviations: AAR: after-action report: APTA: American Public Transportation Association: ASFD-S: Assistant Federal Security Director-Surface: BASE: Baseline Assessment for Security Enhancement: CI/KR: critical infrastructure and key resource: CONOPS: Concept of Operations: DHS: Department of Homeland Security: DHS S&T: Department of Homeland Security Science and Technology Directorate: DOT: Department of Transportation: FEMA: Federal Emergency Management Administration: FRA: Federal Railroad Administration: FTA: Federal Transit Administration: GCC: Government Coordinating Council: HITRAC: Homeland Infrastructure Threat Reporting and Analysis Center: HSIN: Homeland Security Information Network: HSPD-7: Homeland Security Presidential Directive 7: IED: improvised explosive device: IPT: Integrated Product Team: MOU: memorandum of understanding: NPPD: National Protection and Programs Directorate: NSTS: National Strategy for Transportation Security: NTI: National Transit Institute: ODP: Office of Domestic Preparedness: PAG: Transit Policing and Security Peer Advisory Group: PART: Program Assessment Rating Tool: SAAP: Security Analysis and Action Program: SCC: Sector Coordinating Council: SEMTAP: Security and Emergency Management Technical Assistance Program: SHIRA: Strategic Homeland Infrastructure Risk Assessment: SSA: sector-specific agency: STSIP: Surface Transportation Security Inspection Program: TRAM: Transit Risk Assessment Methodology: TSA: Transportation Security Administration: TSA-OI: TSA Office of Intelligence: TSGP: Transit Security Grant Program: TSI-S: Transportation Security Inspector-Surface: TSNM: Transportation Sector Network Management: TS-SSP: Transportation Systems-Sector Specific Plan: VIPR: Visible Intermodal Prevention and Response: [End of section] United States Government Accountability Office: Washington, DC 20548: June 24, 2009: The Honorable Bennie G. Thompson: Chairman: Committee on Homeland Security: House of Representatives: Dear Mr. Chairman: Mass transit and passenger rail systems are vital components of the nation's transportation infrastructure, encompassing rail transit (heavy rail, commuter rail, and light rail), intercity rail, and transit bus systems.[Footnote 1] In the United States, mass transit and passenger rail systems provide approximately 34 million passenger trips each weekday, and commuters rely on these systems to provide efficient, reliable and safe transportation.[Footnote 2] However, terrorist attacks on mass transit and passenger rail systems around the world-- such as the 2006 passenger train bombing in Mumbai, India that resulted in 209 fatalities--highlight the vulnerability of these systems and the need for an increased focus on securing them from terrorism. While there have been no terrorist attacks against U.S. mass transit and passenger rail systems to date, the systems are vulnerable to attack in part because they rely on an open architecture that is difficult to monitor and secure due to its multiple access points, hubs serving multiple carriers, and, in some cases, no barriers to access. Further, an attack on these systems could potentially lead to significant casualties due to the high number of daily transit passengers, especially during peak commuting hours. While several entities play a role in helping to fund and secure U.S. mass transit and passenger rail systems, the Department of Homeland Security's (DHS) Transportation Security Administration (TSA) is the primary federal agency responsible for overseeing security for these systems and for developing a national strategy and implementing programs to enhance their security. Additionally, several DHS components--with assistance from the Department of Transportation's (DOT) Federal Transit Administration (FTA) and Federal Railroad Administration (FRA)--are to conduct threat and vulnerability assessments of mass transit and passenger rail systems, research and develop security technologies for these systems, and develop security training programs for mass transit and passenger rail employees. Day- to-day responsibility for securing mass transit and passenger rail systems falls on mass transit and passenger rail agencies themselves, local law enforcement, and often state and local governments that own a significant portion of the infrastructure. The partnership of federal and non-federal mass transit and passenger rail stakeholders was strengthened following the terrorist attacks of September 11TH, in part, by collaborating to implement a variety of security programs. In addition, the passage of the Implementing Recommendations of the 9/11 Commission Act (9/11 Commission Act) in August 2007 requires DHS to further expand its roles and responsibilities for securing mass transit and passenger rail in several areas, such as by conducting and updating security assessments and issuing new regulations that will establish new security requirements for mass transit and passenger rail agencies to implement.[Footnote 3] You requested that we evaluate TSA's mass transit and passenger rail security strategy and supporting programs and activities, as well as TSA's efforts to assess the impact of these initiatives on U.S. mass transit and passenger rail systems since TSA's issuance of passenger rail security directives in 2004.[Footnote 4] Specifically, this report addresses the following questions: * To what extent have federal and industry stakeholders assessed or supported assessments of the security risks to mass transit and passenger rail since 2004, and how, if at all, has TSA used risk assessment information to inform and update its security strategy? * What key actions, if any, have federal and industry stakeholders implemented or initiated, since 2004, to strengthen the security of mass transit and passenger rail systems; to what extent are federal actions consistent with TSA's security strategy; and what challenges, if any, does TSA face in implementing them? * What is TSA's reported status in implementing provisions of the Implementing Recommendations of the 9/11 Commission Act of 2007 related to mass transit and passenger rail security, and what challenges, if any, does TSA and mass transit and passenger rail industry face in implementing the actions required by the act? To determine the extent to which federal and industry stakeholders assessed security risks to mass transit and passenger rail systems since 2004, we analyzed various assessment reports from DHS component agencies, including TSA, DHS's Office of Infrastructure Protection within the National Protection and Programs Directorate (NPPD), and the Homeland Infrastructure Threat Reporting and Analysis Center (HITRAC), as well as FTA and stakeholders outside of the federal government. [Footnote 5] Because of the scope of our work, we relied on TSA to identify its assessment activities but did not assess the extent to which its assessment activities meet the National Infrastructure Protection Plan (NIPP) criteria for threat, vulnerability, and consequence assessments. In addition, we analyzed TSA's security strategy for the mass transit and passenger rail systems--the Mass Transit Modal Annex--to determine the extent to which it addressed the threats, vulnerabilities, and consequences identified in the assessments we reviewed. We also analyzed requirements pertaining to mass transit and passenger rail security assessments and strategy including Executive Order 13416: Strengthening Surface Transportation Security, to determine the extent to which TSA's security strategy conformed to requirements.[Footnote 6] We analyzed executive guidance including the NIPP and the Transportation Systems-Sector Specific Plan (TS-SSP) to determine the best practices for effectively implementing a risk management framework and associated best practices for conducting risk assessments. We also reviewed guidance on strategic planning that GAO developed in a previous report.[Footnote 7] To determine key actions federal and industry stakeholders have initiated or implemented since 2004 to strengthen mass transit and passenger rail security, we analyzed documentation on DHS and DOT mass transit and passenger rail security programs, including the Mass Transit Modal Annex, after action reports of TSA security operations, and security technology information on DHS's Homeland Security Information Network (HSIN) Public Transit Portal. We also interviewed federal stakeholders, including DHS representatives from TSA, the DHS Science and Technology Directorate (DHS S&T), and HITRAC, and DOT representatives from FTA and FRA.[Footnote 8] Additionally, we analyzed federal actions against the objectives outlined in TSA's security strategy--the Mass Transit Modal Annex--to determine whether these actions were consistent with the strategy. To identify implementation challenges with these actions, we interviewed federal and transit agency stakeholders involved in either developing or participating in these programs. We conducted site visits, or held teleconferences with, security and management officials from 30 mass transit and passenger rail agencies across the nation. Additionally, we met with officials from two regional transit authorities and Amtrak officials responsible for overall systems security as well as individual station security personnel. The entities we interviewed represent 75 percent of the nation's total mass transit and passenger rail ridership based on information we obtained from the Federal Transit Administration's National Transit Database and the American Public Transportation Association. Because we selected a non-probability sample of mass transit and passenger rail agencies, the results from these visits and teleconferences cannot be generalized to all mass transit and passenger rail agencies; however, information we obtained provided us with an broad overview of the types of key actions taken to strengthen security. To determine TSA's reported status in implementing mass transit and passenger rail provisions of the 9/11 Commission Act and challenges TSA and industry stakeholders may face in implementing actions required by the act, we analyzed TSA documentation outlining the agency's status in fulfilling various requirements and documentation on TSA's Surface Transportation Security Inspection Program. We also interviewed officials from TSA's Surface Transportation Security Inspection Program, including headquarters officials, and inspectors from 13 of 54 field office locations, including 11 of 12 Assistant Federal Security Directors for Surface (supervisors for primary field offices) regarding how the 9/11 Commission Act requirements may affect their job responsibilities. We interviewed officials from all inspection program field locations that have oversight responsibility for the mass transit and passenger rail agencies we interviewed. Because we selected a non- probability sample of TSA's Surface Transportation Security Inspection Program field offices, the results from these interviews cannot be generalized to all Surface Transportation Security Inspection Program field offices; however, information we obtained provided us with an overview of the potential impact of the 9/11 Commission Act on field operations. We conducted this performance audit from September 2007 through June 2009 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Background: Overview of U.S. Mass Transit and Passenger Rail Systems: Mass transit and passenger rail systems provided 10.7 billion passenger trips in the United States in fiscal year 2008.[Footnote 9] The nation's mass transit and passenger rail systems include all multiple- occupancy vehicle services designed to transport customers on local and regional routes, such as transit buses, heavy rail, commuter rail, and light rail services, and the interconnected facilities and vehicles feeding into the transit systems. Buses are the most widely used form of transit, providing almost two-thirds of all passenger trips. Heavy rail systems--subway systems like New York City's transit system and Washington, D.C.'s Metro--typically operate on fixed rail lines within a metropolitan area and have the capacity for a heavy volume of traffic. Commuter rail systems typically operate on railroad tracks and provide regional service (e.g., between a central city and adjacent suburbs). Light rail systems are typically characterized by lightweight passenger rail cars that operate on track that is not separated from vehicular traffic for much of the way. Mass transit and passenger rail systems in the United States are typically owned and operated by public sector entities, such as state and regional transportation authorities. Amtrak, which reported that it provided 25.8 million passenger trips in fiscal year 2007, operates the nation's primary intercity passenger rail and serves more than 500 stations in 46 states and the District of Columbia.[Footnote 10] Amtrak operates over a 22,000 mile network, primarily over leased freight railroad tracks. In addition to leased tracks, Amtrak owns about 650 miles of track, primarily on the "Northeast Corridor" between Boston and Washington, D.C., which carries about two-thirds of Amtrak's total ridership. Stations are owned by Amtrak, freight carriers, municipalities, and some private entities. Amtrak also operates commuter rail services in certain jurisdictions on behalf of state and regional transportation authorities. Figure 1 identifies the geographic distribution of rail transit systems and Amtrak within the United States. Though not indicated on the map, all of these cities also have bus transit systems. Figure 1: Geographic Distribution of Amtrak and Rail Transit Systems in the United States: [Refer to PDF for image: U.S. map] The map represents the geographic distribution of Amtrak and Rail Transit systems in the United States, specifically depicting: * Amtrak rail network; * Amtrak rail stations along the network. Additionally, for specific cities, the following information is depicted: City: Albuquerque, New Mexico; Number of light rail systems in city: 1. City: Alexandria, Virginia; Number of light rail systems in city: 1. City: Anchorage, Alaska; Number of light rail systems in city: 1. City: Atlanta, Georgia; Number of heavy rail systems in city: 1. City: Baltimore, Maryland; Number of heavy rail systems in city: 1; Number of commuter rail systems in city: 1. City: Boston, Massachusetts; Number of heavy rail systems in city: 1; Number of commuter rail systems in city: 1; Number of light rail systems in city: 1. City: Buffalo, New York; Number of light rail systems in city: 1. City: Chesterton, Indiana; Number of light rail systems in city: 1. City: Chicago, Illinois; Number of heavy rail systems in city: 1; Number of commuter rail systems in city: 2. City: Cleveland, Ohio; Number of heavy rail systems in city: 1; Number of light rail systems in city: 1. City: Dallas, Texas; Number of commuter rail systems in city: 1; Number of light rail systems in city: 1. City: Denver, Colorado; Number of light rail systems in city: 1. City: Detroit; Michigan; Number of light rail systems in city: 1. City: Galveston, Texas; Number of light rail systems in city: 1. City: Harrisburg, Pennsylvania; Number of light rail systems in city: 1. City: Houston, Texas; Number of light rail systems in city: 1. City: Kenosha, Wisconsin; Number of light rail systems in city: 1. City: Los Angeles, California; Number of heavy rail systems in city: 1; Number of commuter rail systems in city: 1; Number of light rail systems in city: 1. City: Memphis, Tennessee; Number of light rail systems in city: 1. City: Miami, Florida; Number of heavy rail systems in city: 1; Number of commuter rail systems in city: 1. City: Minneapolis, Minnesota; Number of light rail systems in city: 1. City: Nashville, Tennessee; Number of light rail systems in city: 1. City: New Haven, Connecticut; Number of commuter rail systems in city: 1. City: New Jersey cities; Number of light rail systems in city: 3. City: New Orleans, Louisiana; Number of light rail systems in city: 1. City: New York, New York; Number of heavy rail systems in city: 3; Number of commuter rail systems in city: 3. City: Philadelphia, Pennsylvania; Number of heavy rail systems in city: 2; Number of commuter rail systems in city: 1; Number of light rail systems in city: 1. City: Pittsburgh, Pennsylvania; Number of light rail systems in city: 1. City: Portland, Oregon; Number of light rail systems in city: 1. City: Sacramento, California; Number of light rail systems in city: 1. City: Salt Lake City, Utah; Number of light rail systems in city: 1. City: San Diego, California; Number of commuter rail systems in city: 1; Number of light rail systems in city: 1. City: San Francisco, California; Number of heavy rail systems in city: 1; Number of commuter rail systems in city: 1; Number of light rail systems in city: 1. City: San Jose, California; Number of commuter rail systems in city: 1; Number of light rail systems in city: 1. City: Seattle, Washington; Number of commuter rail systems in city: 1; Number of light rail systems in city: 1. City: St. Louis, Missouri; Number of light rail systems in city: 1. City: Syracuse, New York; Number of light rail systems in city: 1. City: Tampa, Florida; Number of light rail systems in city: 1. City: Tacoma, Washington; Number of light rail systems in city: 1. City: Washington, DC; Number of heavy rail systems in city: 1; Number of commuter rail systems in city: 2. Source: Amtrak and National Transit Database; Map Resources (map). [End of figure] Mass Transit and Passenger Rail Systems Are Inherently Vulnerable to Terrorist Attacks: To date, U.S. mass transit and passenger rail systems have not been attacked by terrorists. However, these systems have received heightened attention as several alleged terrorists' plots have been uncovered, including multiple plots involving systems in the New York City area. Worldwide, mass transit and passenger rail systems have been the frequent target of terrorist attacks. According to the Worldwide Incidents Tracking System maintained by the National Counter-Terrorism Center, from January 2004 to July 2008, there were 530 terrorist attacks worldwide against mass transit and passenger rail targets, resulting in over 2,000 deaths and over 9,000 injuries. Terrorist attacks include a 2007 attack on a passenger train in India (68 fatalities and over 13 injuries); the 2005 attack on London's underground rail and bus systems (52 fatalities and over 700 injuries); and the 2004 attack on commuter rail trains in Madrid (191 fatalities and over 1,800 injuries). In January 2008, Spanish authorities arrested 14 suspected terrorists who were allegedly connected to a plot to conduct terrorist attacks in Spain, Portugal, Germany, and the United Kingdom, including an attack on the Barcelona metro subway system. The most common means of attack against mass transit and passenger rail systems has been improvised explosive devices (IED), with many of these attacks delivered by suicide bombers.[Footnote 11] According to transit agency officials, certain characteristics of mass transit and passenger rail systems make them inherently vulnerable to terrorist attacks and therefore difficult to secure. By design, mass transit and passenger rail systems are open (i.e., have multiple access points, hubs serving multiple carriers, and, in some cases, no barriers to access) so that they can move large numbers of people quickly. The openness of these systems can leave them vulnerable because operator personnel cannot completely monitor or control who enters or leaves the systems. In addition, other characteristics of mass transit and passenger rail systems--high ridership, expensive infrastructure (more so for passenger rail than bus), economic importance, and location in large metropolitan areas or tourist destinations--also make them attractive targets for terrorists because of the potential for mass casualties, economic damage and disruption. Moreover, some of these same characteristics make them difficult to secure. For example, the number of riders passing through a subway system--especially during peak hours--may make the sustained use of some security measures, such as airport style passenger screening checkpoints, difficult because the measures could disrupt scheduled service. In addition, multiple access points along extended routes may make securing each location difficult because of the costs associated with such actions. Balancing the potential economic impacts of security enhancements with the benefits of such measures is a difficult challenge. Multiple Stakeholders Share Responsibility for Securing Mass Transit and Passenger Rail Systems: Securing the nation's mass transit and passenger rail systems is a shared responsibility requiring coordinated action on the part of federal, state, and local governments; the private sector; and passengers who ride these systems. Since the September 11, 2001 attacks, the role of federal agencies in securing the nation's transportation systems has continued to evolve. In response to the September 11TH terrorist attacks, Congress passed the Aviation and Transportation Security Act of 2001, which created TSA within DOT and conferred to the agency broad responsibility for overseeing the security of all modes of transportation, including mass transit and passenger rail.[Footnote 12] In 2002, Congress passed the Homeland Security Act, which established DHS, transferred TSA from DOT to DHS, and assigned DHS responsibility for protecting the nation from terrorism, including securing the nation's transportation systems. [Footnote 13] Within TSA, the office of Transportation Sector Network Management (TSNM) leads the unified effort to protect and secure the nation's intermodal transportation systems, with divisions dedicated to each transportation mode, including mass transit and passenger rail. Within TSA's Office of Security Operations, the Office of Multi-modal Oversight manages the Surface Transportation Security Inspection Program which coordinates with TSNM to develop and implement security programs, including strategies for conducting and implementing assessments and other actions in mass transit and passenger rail. In addition, TSA's Office of Intelligence (TSA-OI) is responsible for collecting and analyzing threat information related to the transportation network, which includes all modes of transportation. TSA is supported in these efforts by other DHS entities such as the NPPD and the Federal Emergency Management Agency's (FEMA) Grant Programs Directorate and Planning and Assistance Branch. The NPPD is responsible for coordinating efforts to protect the nation's most critical assets across all 18 industry sectors, including surface transportation.[Footnote 14] FEMA's Grant Programs Directorate is responsible for managing DHS grants for mass transit. FEMA's Planning and Assistance Branch is responsible for assisting transit agencies with how to conduct risk assessments. TSA has issued requirements related to the security of mass transit and passenger rail systems. Specifically, in May 2004, TSA issued security directives that mandated passenger rail agencies and Amtrak to implement certain security measures, such as periodically inspecting passenger rail cars for suspicious or unattended items and reporting potential threats or significant security concerns to appropriate law enforcement authorities and TSA.[Footnote 15] In addition to these requirements, in August 2007, the 9/11 Commission Act was signed into law, which included provisions that task TSA with security actions related to mass transit and passenger rail security. Among other things, these provisions include mandates for developing and issuing reports on TSA's strategy for securing public transportation, conducting and updating security assessments of mass transit systems, and establishing a program for conducting security exercises for transit and rail agencies. While TSA is the lead federal agency for overseeing the security of all transportation modes, DOT continues to play a key supporting role in securing mass transit and passenger rail systems. In a 2004 memorandum of understanding (MOU) and a 2005 annex to the MOU, TSA and FTA agreed that the two agencies would coordinate their programs and services, with FTA playing a supporting role by providing technical assistance and assisting DHS with implementation of its security policies, including collaborating in developing regulations affecting transportation security. In particular, FTA has played a role in coordinating and funding security training programs for mass transit and passenger rail employees, and provided dedicated funding to three federal training providers to implement mass transit and passenger rail employee training programs. Additionally, FTA administers the State Safety Oversight program and may withhold federal funding for states' noncompliance with regulations governing state safety oversight agencies.[Footnote 16] As part of this program, state safety oversight agencies are responsible for reviewing and approving rail transit agencies' safety and security plans, among other activities. FTA also promotes mass transit and passenger rail safety and security by providing funding for research, technical assistance, and technology demonstration projects. In addition to FTA, DOT's FRA also has regulatory authority over commuter rail operators and Amtrak and employs over 400 inspectors who periodically monitor the implementation of safety and security plans at these systems. FRA regulations require railroads that operate intercity or commuter passenger train service or that host the operation of that service to adopt and comply with a written emergency preparedness plan approved by FRA.[Footnote 17] State and local governments, mass transit and passenger rail operators, and private industry are also important stakeholders in the nation's mass transit and passenger rail security efforts. State and local governments, in some cases, own or operate a significant portion of mass transit and passenger rail systems. Consequently, the responsibility for responding to emergencies involving systems that run through their jurisdictions often falls to state and local governments. Although all levels of government are involved in mass transit and passenger rail security, the primary responsibility for securing the systems rests with the mass transit and passenger rail operators. These operators, which can be public or private entities, are responsible for administering and managing transit activities and services, including security. They can also directly operate the security service provided or contract for all or part of the total service. We discuss security actions taken by federal agencies and mass transit and passenger rail system operators later in this report. A Risk-Based Approach to Mass Transit and Passenger Rail Security: In recent years, we, along with the Congress, the executive branch, and the 9/11 Commission have recommended that federal agencies with homeland security responsibilities utilize a risk management approach to help ensure that finite national resources are dedicated to assets or activities considered to have the highest security priority.[Footnote 18] We have concluded that without a risk management approach, there is limited assurance that programs designed to combat terrorism would be properly prioritized and focused.[Footnote 19] Thus, risk management, as applied in the homeland security context, can help to more effectively and efficiently prepare defenses against acts of terrorism and other threats. Homeland Security Presidential Directive 7 (HSPD-7) directed the Secretary of Homeland Security to establish uniform policies, approaches, guidelines, and methodologies for integrating federal infrastructure protection and risk management activities. Recognizing that each sector possesses its own unique characteristics and risk landscape, HSPD-7 designates federal government sector specific agencies (SSA) for each of the critical infrastructure sectors that are to work with DHS to improve critical infrastructure security.[Footnote 20] On June 30, 2006, DHS released the National Infrastructure Protection Plan (NIPP), which created--in accordance with HSPD-7--a risk-based framework for the development of SSA strategic plans. [Footnote 21] As the SSA for transportation, TSA developed the Transportation Systems--Sector Specific Plan (TS-SSP) in 2007 to document the process to be used in carrying out the national strategic priorities outlined in the NIPP and the National Strategy for Transportation Security (NSTS).[Footnote 22] The TS-SSP contains supporting modal implementation plans for each transportation mode, including mass transit and passenger rail, which provides information on current efforts to secure mass transit and passenger rail, as well as TSA's overall goals and objectives related to mass transit and passenger rail security.[Footnote 23] The NIPP defines roles and responsibilities for security partners in carrying out critical infrastructure and key resource (CI/KR) protection activities through the application of risk management principles.[Footnote 24] Figure 2 illustrates the several interrelated activities of the risk management framework as defined by the NIPP. The NIPP requires that federal agencies use this information to inform the selection of risk-based priorities and the continuous improvement of security strategies and programs to protect people and critical infrastructure by reducing the risk of acts of terrorism. Figure 2: NIPP Risk Management Framework: [Refer to PDF for image: illustration] Utilizing physical, human, and cyber interaction, the following interrelated activities comprise the risk management framework through a feedback loop of continuous improvement to enhance protection of critical infrastructure and key resources: * Set security goals; * Identify assets, systems, networks, and functions; * Assess risks (consequences, vulnerabilities, and threats); * Prioritize; * Implement protective programs; * Measure effectiveness. Source: DHS. [End of figure] Within the risk management framework, the NIPP also establishes baseline criteria for conducting risk assessments. According to the NIPP, risk assessments are a qualitative and/or quantitative determination of the likelihood of an adverse event occurring and are a critical element of the NIPP risk management framework. Risk assessments can also help decision makers identify and evaluate potential risks so that countermeasures can be designed and implemented to prevent or mitigate the potential effects of the risks. The NIPP characterizes risk assessment as a function of three elements: * Threat: The likelihood that a particular asset, system, or network will suffer an attack or an incident. In the context of risk associated with a terrorist attack, the estimate of threat is based on the analysis of the intent and the capability of an adversary; in the context of a natural disaster or accident, the likelihood is based on the probability of occurrence. * Vulnerability: The likelihood that a characteristic of, or flaw in, an asset, system, or network's design, location, security posture, process, or operation renders it susceptible to destruction, incapacitation, or exploitation by terrorist or other intentional acts, mechanical failures, and natural hazards. * Consequence: The negative effects on public health and safety, the economy, public confidence in institutions, and the functioning of government, both direct and indirect, that can be expected if an asset, system, or network is damaged, destroyed, or disrupted by a terrorist attack, natural disaster, or other incident. Information from the three elements that assess risk--threat, vulnerability and consequence--can lead to a risk characterization and provide input for prioritizing security goals. Federal and Industry Stakeholders Have Assessed Individual Elements of Risk, Which Have Informed TSA's Security Strategy, but TSA Could Strengthen Its Approach by Conducting a Risk Assessment and Updating Its Security Strategy: Since 2004, federal and industry stakeholders have conducted assessments of individual elements of risk--threat, vulnerability and consequence--and this information has informed TSA's mass transit and passenger rail security strategy. However, TSA could strengthen its approach by using and combining this information to conduct a risk assessment of the mass transit and passenger rail system and by updating its strategy to include characteristics that we identified as desirable practices for successful national strategies and to more fully address elements that are outlined in Executive Order 13416: Strengthening Surface Transportation Security.[Footnote 25] Federal and Industry Stakeholders Have Conducted Assessments of Individual Elements of Risk, but TSA Could Strengthen Its Approach by Conducting a Risk Assessment: While federal and industry stakeholders have conducted assessments of individual elements of risk--threat, vulnerability, and consequence-- TSA could strengthen its security approach by using and combining this information to conduct a risk assessment of the mass transit and passenger rail system. A risk assessment, as required by the NIPP, involves assessing each of the three elements of risk and then combining them together into a single analysis. Since 2004, federal agencies have conducted a range of assessment activities related to the individual elements of risk to help determine their strategy for securing mass transit and passenger rail systems, and provided guidance to mass transit and passenger rail agencies on how to conduct assessments of individual elements of risk. For example, DHS's threat assessments considered potential threats to the mass transit and passenger rail system, while vulnerability assessments focused on mass transit and passenger rail systems' security conditions or specific infrastructure such as tunnels. In addition to DHS assessments, DOT provided assistance to mass transit and passenger rail agencies on how to conduct threat and vulnerability assessments, and transit agencies have reported conducting risk assessments for their own systems or assets. See table 1 for a summary of federal and industry stakeholders' assessment activities related to individual elements of risk. Table 1: Summary of Federal and Industry Stakeholders' Assessment Activities since 2004: DHS Transportation Security Administration (TSA): Entity: Office of Intelligence; Time frame: 2008; Description: Annual Threat Assessments: TSA's Office of Intelligence provides an overview of threats--including key actors and possible attack tactics and targets--to mass transit and passenger rail systems. The assessment includes incidents of interest and suspicious activities targeting mass transit and passenger rail in the United States and overseas; Risk Elements: Threat. Entity: Transportation Sector Network Management (TSNM)/Surface Transportation Security Inspection Program (STSIP); Time frame: 2006-present; Description: Baseline Assessment for Security Enhancement (BASE): Surface inspectors, in coordination with transit agency officials, assess a transit agency's overall security posture, focusing on the implementation and effectiveness of security plans, programs and measures, security gaps, and best practices. Since 2006, TSA reported it has conducted BASE reviews at 91 of the top 100 largest mass transit and passenger rail agencies in the nation and has initiated follow-on BASE reviews to determine if previously identified security shortfalls have been corrected; Risk Elements: Vulnerability. DHS National Protection and Programs Directorate (NPPD): Entity: Homeland Security Threat and Risk Analysis Center (HITRAC); Time frame: 2008; Description: Strategic Homeland Infrastructure Risk Assessment (SHIRA): Annual document assessing risk across each of the 18 CI/KR sectors including mass transit and passenger rail. Includes threat scenarios identified by HITRAC and vulnerability and consequence information provided by each CI/KR sector; Risk Elements: Threat; Vulnerability[A]; Consequence[A]. Entity: Science and Technology Directorate (DHS S&T); Time frame: 2007; Description: DHS Transportation Security Administration (TSA): Transit Tunnel Vulnerability Assessments: DHS S&T, in coordination with TSNM- Mass Transit and National Laboratories, assessed the vulnerabilities of transit tunnels and potential consequences to tunnel structures resulting from various types of explosive threats. S&T also assists transit agencies with planning and implementing protective measures to deter and prevent terrorist attacks; Risk Elements: Vulnerability; Consequence. Industry Stakeholders: Entity: National Railroad Passenger Corporation (Amtrak); Time frame: 2007-present; Description: Risk Assessment: Amtrak has reported conducting risk assessments that incorporate and combine all three elements of risk (threat, vulnerability, and consequence) for all of its systems; Risk Elements: Threat; Vulnerability; Consequence. Entity: Transit Systems; Time frame: 2008-present; Description: DHS Transportation Security Administration (TSA): Risk Assessment: Transit system officials reported conducting risk assessments that incorporate and combine all three elements of risk (threat, vulnerability, and consequence) to their systems and assets; Risk Elements: Threat; Vulnerability; Consequence. Source: GAO analysis of DHS and industry data. [A] Bullets in parentheses represent assessment information provided by TSA-TSNM-Mass Transit to DHS HITRAC for its risk analysis. [End of table] As table 1 shows, DHS developed the Strategic Homeland Infrastructure Risk Assessment (SHIRA) that assessed risk across 18 CI/KR sectors. To develop SHIRA, DHS collaborated with members of the intelligence community to determine threats against various systems and assets in the 18 CI/KR sectors. TSA then assessed the vulnerabilities and consequences that resulted from these threat scenarios and provided this information to HITRAC. Although TSA contributed to DHS's risk assessment effort, it has not conducted its own risk assessment of mass transit and passenger rail systems. TSA officials explained that the threat scenarios that SHIRA provided were general and not specific to mass transit and passenger rail. TSA could, however, use the information it provided for SHIRA to support a risk assessment. Table 1 also shows that mass transit and passenger rail agencies, including Amtrak, have reported conducting risk assessments of their own systems. Officials from 26 of 30 of the transit systems we visited stated that they had conducted their own assessments of their systems, including risk assessments. For example, one transit agency official stated that the agency had conducted risk assessments of its stations since 2003 and had updated them every 2 years. The official explained that his agency uses the risk assessment results to conduct cost benefit analyses that the agency uses before instituting new programs or purchasing equipment for its system. He also said that the assessments help the agency track risk reduction as a result of its security investments. Additionally, Amtrak officials stated that they conducted a risk assessment of all of their systems. As part of the assessment, Amtrak contracted with a private consulting firm to provide a scientific basis for identifying critical points at stations that might be vulnerable to IED attacks or that are structurally weak. Amtrak officials also stated that they gather and analyze threat information obtained from various classified and unclassified sources such as DHS, TSA, and the Federal Bureau of Investigation's Joint Terrorism Task Force. Transit agencies have also received assistance in the form of either guidance or actual risk assessments from several federal and industry stakeholders. Table 2 identifies the various assistance programs available to transit agencies for risk assessment efforts. Table 2: Summary of Federal and Industry Stakeholders' Assistance to Transit Agencies for Risk Assessments Provided since 2004: DHS Transportation Security Administration (TSA). Entity: Office of Security Operations/Surface Transportation Security Inspection Program (STSIP); Timeframe: 2008-present; Description: Risk Assessment Tool: Mass transit and passenger rail risk assessment product to be used by TSA's surface inspectors. This tool is still being developed by the Office of Security Operations (OSO) in coordination with TSNM, TSA Office of Intelligence (TSA-OI), and STSIP. Initial field testing is estimated to commence in July 2009. Entity: Transportation Sector Network Management (TSNM)/Surface Transportation Security Inspection Program (STSIP); Timeframe: 2005-present; Description: Security Analysis and Action Program (SAAP): Upon a transit agency's request, surface inspectors conduct analyses of a transit agency's critical infrastructure and physical systems and, among other things, identify deficiencies, determine the underlying causes, and develop recommendations to the agency to correct the deficiencies. As of November 2008, TSA had completed SAAPs for seven mass transit and passenger rail systems; however, no SAAP has been conducted since November 2008[A]. Vulnerability Identification Self-Assessment Tool (VISAT): Self- assessment risk tool used by surface inspectors to conduct SAAP on transit agencies. The tool is to be used in developing a security baseline evaluation of a transit agency. The tool focuses on the prevention and mitigation of an array of threat scenarios and enables users to assess their security system's effectiveness in direct response to these specific threat scenarios. DHS Federal Emergency Management Agency: Entity: Planning and Assistance Branch; Timeframe: 2004-present; Description: Mass Transit Technical Assistance Program; FEMA officials, through a private consulting firm, assist passenger rail operators in enhancing their capacity and preparedness to respond to terrorist incidents and prioritize countermeasures. As of April 2009, FEMA has provided technical assistance to 36 passenger rail operators. This program was initially administered by DHS's Office of Domestic Preparedness (ODP) but has been managed by DHS-FEMA since March 2007[B]. Transit Risk Assessment Methodology Tool Kit (TRAM): Risk guidance for transit agencies that was part of the Mass Transit Technical Assistance Program. Department of Transportation (DOT): Entity: Federal Transit Administration (FTA); Timeframe: 2004-present; Description: Security and Emergency Management Technical Assistance Program (SEMTAP): Through this program, FTA officials provided guidance to the largest transit agencies on how to conduct threat and vulnerability assessments. Entity: Federal Transit Administration (FTA); Timeframe: 2007; Description: FTA-TSA Security and Emergency Management Action Items for Transit Agencies: Risk guidance for transit agencies including a resource link to a sample methodology. Industry stakeholder: Entity: American Public Transportation Association (APTA); Timeframe: 2008-present; Description: Recommended Practices for the Development and Implementation of a Security and Emergency Preparedness Plan (SEPP): Provides procedures for developing and implementing a security and emergency preparedness plan by transit agencies. Includes threat, vulnerability, and consequence identification and resolution approaches for transit agencies. Source: GAO analysis of DHS, DOT and industry data. Note:Although a few assistance programs started before 2004 (e.g., FEMA's Mass Transit Assistance Program and FTA's SEMTAP), for the purpose of this report, we are limiting our analysis to assistance that has been provided since 2004. [A] The seven SAAP assessments TSA reported conducting were those on the Virginia Railway Express, Portland Tri-Met Light Rail, Alaska Railroad, Amtrak Northeast Corridor power infrastructure, CSX Railroad (Indianapolis), Avon Yards (Indianapolis), and New Mexico Rail Runner Express. [B] In March 2004, the Secretary of Homeland Security consolidated ODP with the Office of State and Local Government Coordination to form the Office of State and Local Government Coordination and Preparedness (SLGCP). In 2007, SLGCP was incorporated under the DHS Preparedness Directorate as OGT and, in March 2007, OGT was incorporated into DHS- FEMA. [End of table] As table 2 shows, federal and industry stakeholders also provided assistance to transit agencies on how to assess risk. For example, FTA provided on-site technical assistance to the nation's 50 largest transit agencies (i.e., those transit agencies with the highest ridership) on how to conduct threat and vulnerability assessments, among other technical assistance needs, through its Security and Emergency Management Technical Assistance Program (SEMTAP). According to FTA officials, although FTA continues providing technical assistance to transit agencies, the on-site SEMTAP program concluded in July 2006. Furthermore, FTA officials stated that on-site technical assistance was transferred to TSA when TSA became the lead agency on security matters for mass transit and passenger rail. Also, from 2004 though 2007, the former DHS Office of Domestic Preparedness (ODP), through a private consulting firm, provided assistance to transit agencies on how to conduct risk assessments through the Mass Transit Technical Assistance Program. Within this program, ODP developed a Transit Risk Assessment Methodology (TRAM) tool kit that provided transit agencies with an instrument to compare relative risks of terrorism against critical assets to better identify and prioritize security enhancements to reduce those risks. We reported in 2005 that officials from transit agencies participating in the Mass Transit Technical Assistance Program valued it and stated that the program was successful in helping them to devise risk-reduction strategies to guide security-related investments.[Footnote 26] Subsequently, since the restructuring of ODP in 2007, this program has been transferred to FEMA's Planning and Assistance Branch where it has continued assisting transit agencies with risk assessments. However, according to FEMA's Chief of the Planning and Assistance Branch, because of the high cost of the program--$300,000 to $600,000 per transit agency--the rate of assistance to transit agencies has decreased annually. Also, FEMA is trying to convert the focus of the program from technical assistance to training. As such, FEMA plans to educate transit agencies on how to conduct risk assessments. Additionally, the same FEMA official reported that FEMA is also in the process of conducting a pilot project with one transit agency to evolve the program and the tool kit to an all hazards focus. Furthermore, recognizing the value of this program, officials from four of the 30 transit agencies we interviewed have since contracted with the same private consulting firm that ODP and FEMA used to update security plans or conduct a cost-benefit analysis of new programs or equipment. Multiple Potential Threats to Mass Transit and Passenger Rail Have Been Identified: TSA has reported conducting annual threat assessments of the mass transit and passenger rail systems, and these assessments have provided TSA with an array of information about potential threats to the systems. TSA is responsible for conducting and issuing an annual threat assessment report for the mass transit and passenger rail systems. While it has been widely reported that no specific threats to the mass transit and passenger rail systems currently exist, it has been noted that terrorists tend to target these systems, as overseas attacks on mass transit and passenger rail systems have demonstrated. TSA's Mass Transit Modal Annex identified numerous potential threats to mass transit, including placing a vehicle bomb near a station or track or introducing an IED or lower-yield explosive in a station, train, or bus, or laying explosives on a track. Deploying conventional or improvised explosives would likely result in scores of casualties. Since IEDs were used in the majority of the recent overseas attacks against mass transit and passenger rail systems, TSA and other experts are concerned that extremists may be motivated to employ similar tactics to target mass transit and passenger rail systems. In its Modal Annex, TSA also noted that the threat to heavy and commuter rail (i.e., underground, subway, elevated, rapid rail, or metro) is higher than the threat to buses and light rail (i.e., street cars, trolley) because of the accessibility of the large numbers of people typically found in the confined spaces of a rail system. DHS Components, Including TSA, Conducted Several Vulnerability and Consequence Assessments That Identified Areas for Security Improvements: Several DHS components, including TSA, conducted assessments related to vulnerability and consequence since 2004, which have highlighted areas for security improvement. For example, DHS S&T conducted vulnerability assessments of transit tunnels as well as assessments of the potential consequences that various types of explosives threats would have on tunnel structures (which showed that improving evacuation plans and emergency response efforts, among other things, would improve public safety). Additionally, TSA has gathered vulnerability data through such programs as the Baseline Assessment for Security Enhancement (BASE). TSA officials reported that the BASE assesses the security posture of a mass transit or passenger rail system against the Security and Emergency Management Action Items and is TSA's primary source of vulnerability information.[Footnote 27] For example, through initial assessments of the BASE program, TSA officials identified the need for increased security training at mass transit and passenger rail systems. Furthermore, FEMA has calculated consequence information for mass transit and passenger rail by using proxy data, such as population and national infrastructure indices. This information has been incorporated into the Transit Security Grant Program (TSGP).[Footnote 28] TSA officials also reported using population density and ridership data as information for consequence assessments for mass transit and passenger rail systems and stated that they consider the number of potential casualties when determining consequence, and as a result, have chosen to focus their security efforts on the mass transit and passenger rail systems carrying the most passengers. Officials also mentioned that other factors such as the nature of the infrastructure (underground, underwater tunnels), time of day, and number of mass transit and passenger rail lines are also considered when assessing consequence. TSA Reported Using Existing Assessments to Inform Its Security Strategy, but Its Approach Could Be Strengthened by Conducting a Risk Assessment: TSA has used these various threat, vulnerability, and consequence assessments to inform its security strategy for mass transit and passenger rail--the Mass Transit Modal Annex. TSA reported that its efforts to inform its strategy included using information from TSA-OI's annual mass transit threat assessment report to, for example, highlight the greater threats to underground and underwater passenger rail segments within a transit system. TSA also reported incorporating into its strategy information identified through its BASE reviews, such as the need for increased security training at mass transit and passenger rail systems. While TSA reported using these various assessments to inform its mass transit and passenger rail security strategy, it could further strengthen its approach for securing these systems by combining the results from these assessments to conduct a risk assessment of the mass transit and passenger rail systems. Both the NIPP and TS-SSP establish a risk management framework that includes a process for considering threat, vulnerability, and consequence assessments together to determine the likelihood of a terrorist attack and the severity of its impact. The NIPP states that after the three elements of risk have been assessed, they are factored numerically and combined mathematically to provide an estimate of the expected loss considering the likelihood of an attack or other incident. It also states that when numerical values are not practical, scales could be used to estimate threat, vulnerability, and consequence. Thus, risk can be measured either quantitatively (i.e., numerically) or qualitatively (i.e., descriptively). However, rather than using the methodology established in the NIPP for assessing risk, TSA officials stated that the agency uses an intelligence-driven approach to make strategic investment decisions across the transportation system. Within this intelligence- driven approach for the sector, TSA also developed a tactical, threat- based process known as Objectively Measured Risk Reduction (OMRR) at the program level to help each of its individual divisions manage their day-to-day security operations. These approaches differ from the NIPP in part because they rely primarily on intelligence information to identify threats, prioritize tactics, and guide long-term investments, rather than systematically assessing the vulnerabilities and consequences of a range of threat scenarios. In March 2009, we recommended that TSA work with DHS to validate its risk management approach by establishing a plan and time frame for assessing the appropriateness of TSA's intelligence-driven risk management approach for managing risk and document the results of this review once completed. TSA concurred with this recommendation.[Footnote 29] TSA officials stated that they plan to revise and reissue the TS- SSP, as required by DHS, to reflect the adoption of their intelligence- driven methodology. As on June 2009, TSA reported that the update of the TS-SSP is ongoing, with the goal of completing the effort in 2009. Until TSA works with DHS to validate its risk management approach, TSA lacks assurance that its approach provides the agency and DHS with the information needed to guide investment decisions to ensure resources are allocated to the highest risks. Moreover, as we reported in March 2009, although intelligence is necessary to inform threat assessments, it does not provide all of the information needed to assess risk, in particular information related to vulnerability and consequence assessments.[Footnote 30] In addition, the intelligence-driven approach that TSA uses may be limited because, in contrast with practices adopted by the intelligence community, TSA officials do not plan to assign uncertainty or confidence levels to the intelligence information it uses to identify threats and guide long- range planning and strategic investment. Both Congress and the administration have recognized the uncertainty inherent in intelligence analysis and have required analytic products within the intelligence community to properly caveat and express uncertainties or confidence in analytic judgments. Furthermore, while intelligence can and does help the U.S. security community on an operational or tactical level, uncertainty in intelligence analysis limits its utility for long-range planning and strategic investment. Without expressing confidence levels in its analytic judgments, it will be difficult for TSA to correctly prioritize its tactics and long-term investments based on uncertain intelligence. In March 2009, we recommended that the Assistant Secretary of TSA work with the Director of National Intelligence to determine the best approach for assigning uncertainty or confidence levels to analytic intelligence products and apply this approach to intelligence products. TSA officials agreed that they do not have a risk assessment and expressed the desire to conduct one; however, they reported that a lack of resources and other factors made completing a risk assessment challenging. For example, TSA officials stated that comprehensive vulnerability and consequence assessments are cost-prohibitive and time- intensive to conduct. Specifically, according to TSA officials, the Security Analysis and Action Program conducted by surface inspectors, a program that identifies, among other things, transit agencies' vulnerabilities can take days to complete resulting in a large resource investment. However, the 9/11 Commission Act requires TSA to use existing relevant assessments developed by federal and industry stakeholders, as appropriate, to develop a risk assessment for rail, including passenger rail. Furthermore, as suggested by the NIPP, agencies should consider existing risk measures when assessing risk. In addition to using the information for SHIRA, TSA could use other risk assessments, such as industry stakeholders' risk assessments and federal and industry stakeholders' guidance on how to conduct risk assessments, to potentially support a risk assessment of the mass transit and passenger rail systems. Despite the challenges that TSA officials reported, it is important to note that risk assessment is an accepted and required practice with a long history of use in a wide variety of public and private sector organizations. Completing a risk assessment would provide TSA greater assurance that it is directing its resources toward mitigating the highest priority risks. Moreover, other agencies conduct risk assessments based on threat, vulnerability, and consequences and have overcome the challenges TSA cited. For instance, within DHS, the U.S. Coast Guard, and FEMA use risk assessment methodologies to inform resource allocation.[Footnote 31] * The U.S. Coast Guard, which is responsible for securing the maritime transportation mode, conducts risk assessments using its Maritime Security Risk Analysis Model (MSRAM). Coast Guard units use the Maritime Security Risk Analysis Model to assess the risk of terrorist attack based on scenarios--a combination of target and attack mode--in terms of threats, vulnerabilities, and consequences to more than 18,000 targets. The model combines these assessments and provides analysis to identify security priorities and support risk management decisions at the strategic, operational, and tactical levels. The tool's underlying methodology is designed to capture the security risks facing different types of targets spanning every DHS CI/KR industry sector, allowing comparison between different targets and geographic areas at the local, regional, and national levels. In conducting assessments, the Coast Guard Intelligence Coordination Center quantifies threat as a function of intent (the likelihood of terrorists seeking to attack), capability (the likelihood of terrorists having the resources to attack), and presence (the likelihood of terrorists having the personnel to attack).[Footnote 32] Intelligence Coordination Center officials stated that the Coast Guard uses MSRAM to inform allocation decisions, such as the local deployment of resources and grants. * In June 2008, we reported that FEMA used a reasonable risk assessment methodology--based on a definition of risk as a function of threat, vulnerability, and consequence--to determine grant funding allocations under the Homeland Security Grant Program.[Footnote 33] We found that this program utilized a reasonable methodology to assess risk and allocate grants to states and urban areas even though its assessment of vulnerability was limited. The risk assessment methodology used by FEMA is based on assessments of the threat, vulnerability, and consequence of a terrorist attack to each state and the largest urban areas. FEMA's methodology estimates the threat to geographic areas based on terrorists' capabilities and intentions, as determined by intelligence community judgment and data on credible plots, and planning and threats from international terrorist networks. Because this threat information is recognized as uncertain, threat accounts for 20 percent of the total risk to a geographic area, while vulnerability and consequence account for 80 percent.[Footnote 34] Moreover, the NIPP states that implementing protective programs based on risk assessment and prioritization enables DHS, sector-specific agencies, and other security partners to enhance current CI/KR protection programs and develop new programs where they will offer the greatest benefit. By conducting a risk assessment, TSA would be able to better prioritize risks as well as more confidently assure that its programs are directed toward the highest priority risks. TSA's Security Strategy Could Be Strengthened by Including Key Characteristics of a Successful National Strategy and More Fully Addressing Elements Outlined in Executive Order 13416: TSA's Mass Transit Modal Annex contains some information that is consistent with our prior work on characteristics of a successful national strategy and that is called for by Executive Order 13416: Strengthening Surface Transportation Security. However, the Modal Annex could be strengthened by including additional information that could help TSA and other implementing parties better leverage their resources to achieve the strategy's vision of protecting mass transit and passenger rail systems from terrorist attacks. In February 2004, we identified six characteristics of successful national strategies.[Footnote 35] Additionally, the Executive Order calls for the Secretary of Homeland Security to develop modal annexes for each transportation sector that includes certain elements, many of which are similar to the national strategy characteristics. Table 3 provides a brief description of five of the national strategy characteristics and relevant Executive Order elements that are discussed further below. [Footnote 36] Table 3: Summary of Desirable Characteristics of Successful National Strategies and Related Executive Order Factors: Characteristic: Purpose, scope, and methodology; Description: Addresses why the strategy was produced, the scope of its coverage, and the process by which it was developed. In addition to describing what it is meant to do and the major functions, mission areas, or activities it covers, a national strategy would ideally also outline its methodology, such as discussing the principles or theories that guided its development, what organizations or offices drafted the document, whether it was the result of a working group, or which parties were consulted in its development. Characteristic: Goals, subordinate objectives, activities, and performance measures; Description: Addresses what the strategy is trying to achieve, steps to achieve those results, as well as the priorities, milestones, and performance measures to gauge results. At the highest level, a strategy could provide a description of an ideal "end state," followed by a logical hierarchy of major goals, subordinate objectives, specific activities, and performance measures to achieve results.[A] Executive Order 13416 calls for the annex of each transportation mode, or Modal Annex, to identify processes for assessing compliance with security guidelines and requirements, and for assessing the need for revision of such guidelines and requirements to ensure their continuing effectiveness--something that could be accomplished with defined performance measures. The Order also directs TSA to evaluate the effectiveness and efficiency of current surface transportation security initiatives and calls for the annex to identify processes for assessing compliance with security guidelines and requirements. Characteristic: Resources, investments, and risk management; Description: Addresses what the strategy will cost, the sources and types of resources and investments needed, and where resources and investments should be targeted based on balancing risk reductions with costs. Ideally, a strategy would also identify criteria and appropriate mechanisms to allocate resources, such as grants, in-kind services, loans, and user fees, based on identified needs. Alternatively, the strategy might identify appropriate "tools of government," such as regulations, tax incentives, and standards; or stimulate nonfederal organizations to use their unique resources. Characteristic: Organizational roles, responsibilities, and coordination; Description: Addresses which organizations are to implement the strategy, their roles and responsibilities, and mechanisms for collaboration. This information considers who is in charge, not only during times of crisis but also during all phases of combating terrorism, including prevention, vulnerability reduction, and response and recovery. This entails identifying the specific federal entities involved and, where appropriate, the different levels of government or stakeholders, such as state and local governments and private entities. Executive Order 13416 also calls for the Secretary of Homeland Security to develop modal annexes that include a description of the respective roles, responsibilities, and authorities of federal, state, local, and tribal governments. A strategy could also describe the organizations that will provide the overall framework for accountability and oversight, and identify specific processes for collaboration and address how any conflicts would be resolved. Characteristic: Integration and implementation; Description: Addresses how a national strategy relates to other strategies' goals, objectives, and activities and to subordinate levels of government and their plans to implement the strategy. For example, a national strategy could discuss how its scope complements, expands upon, or overlaps with other national strategies. Also, related strategies could highlight their common or shared goals, subordinate objectives, and activities. Executive Order 13416 requires that the modal annex identify existing security guidelines and requirements. A strategy could address its relationship to other agency strategies using relevant documents from implementing organizations, such as strategic plans, annual performance plans, or annual performance reports that the Government Performance and Results Act of 1993 requires of federal agencies. A strategy might also discuss, as appropriate, various strategies and plans produced by the state, local, or private sectors and could provide guidance, for example, on the development of national standards, to more effectively link the roles, responsibilities, and capabilities of the implementing parties. Source: GAO. [A] A goal (also known as a strategic goal or objective) constitutes a specific set of policy, programmatic, and management objectives for the programs and operations covered in the strategic plan, and serves as a framework from which the annual objectives and activities are derived. A goal is expressed in a manner that allows a future assessment to be made regarding whether the goal was or is being achieved. Subordinate objectives assist in focusing the mode's programs and activities to meet the goals. Activities are specific programs and actions to achieve the subordinate objectives. Performance measures are particular values or characteristics used to measure output or outcome of activities, objectives, and goals. An outcome measure describes the intended result or effect from carrying out a program or activity. It defines an event or condition that is external to the program or activity and that is of direct importance to the intended beneficiaries and/or the public. An output measure describes the level of activity that will be provided over a period of time, including a description of the characteristics (e.g., timeliness) established as standards for the activity. [End of table] The Modal Annex contains information related to three of the characteristics we identified as desirable characteristics for a successful national strategy: (1) purpose, scope and methodology; (2) organizational roles, responsibilities, and coordination; and (3) integration and implementation. For example, the organizational roles, responsibilities, and coordination characteristic, which is also an element in Executive Order 13416, calls for agencies to identify which organizations are to implement the strategy, their roles and responsibilities, and the mechanisms for collaborating.[Footnote 37] The Modal Annex generally addresses this characteristic as it identifies relevant stakeholder roles and responsibilities. Specifically, the Modal Annex states that TSA has primary responsibility for ensuring security for mass transit and passenger rail while other federal and industry stakeholders, such as the FTA, FRA, FBI, private sector, and transit labor representatives have partnership roles. The Modal Annex also describes stakeholders' collaboration efforts. For example, it describes FTA, FRA, APTA, and transit operators' involvement in the development and implementation of security standards and directives. See appendix III for more information on the characteristics the Modal Annex includes. The Modal Annex, however, could be strengthened by addressing the other two desirable characteristics of an effective national strategy: (1) goals, subordinate objectives, activities, and performance measures and (2) resources and investments. Both of these could be useful in achieving the vision articulated in the Modal Annex of securing the mass transit and passenger rail systems. Goals, Subordinate Objectives, Activities, and Performance Measures: In conformance with this characteristic, the Modal Annex identifies sector-wide goals that apply to all modes of transportation as well as subordinate objectives specific to mass transit and passenger rail systems. For instance, one of TSA's transportation sector goals is to enhance resiliency of the U.S. transportation system and presents three subordinate objectives to demonstrate how the agency intends to meet this goal. Further, for each subordinate objective, TSA presents information to explain what TSA, other federal components, or industry stakeholders are doing to meet the subordinate objective. For example, the agency identifies its Explosives Detection Canine Teams as an activity to accomplish assessing, managing, and reducing risk associated with key modes, links, and flows within critical transportation systems. Table 4 provides a complete list of the TSA's goals and their subordinate objectives for the mass transit and passenger rail systems. Table 4: Sector Goals and Passenger Rail and Mass Transit Subordinate Objectives to Complete Sector Goals: Sector Goal: 1) Prevent and deter acts of terrorism using or against the transportation system; Subordinate Objectives: * Implement risk-based, flexible, layered and unpredictable security programs; * Increase vigilance of travelers and transportation workers; * Enhance information and intelligence sharing among transportation sector security partners. Sector Goal: 2) Enhance resiliency of the U.S. transportation system; Subordinate Objectives; * Assess, manage, and reduce risk associated with key nodes, links, and flows within critical transportation systems; * Ensure the capacity for rapid response and recovery to all-hazards events; * Develop, disseminate, and promote the adoption of a standard risk reduction methodology. Sector Goal: 3) Improve the cost-effective use of resources for transportation security. Subordinate Objectives; * Align sector resources with the highest priority transportation security risks using both risk and economic consequences as decision criteria; * Maximize passenger rail and mass transit sector participation as a partner in the developing and implementing of public sector programs for critical infrastructure/key resource protection; * Improve transportation sector security research, development, test, and evaluation resource allocation; * Ensure that public sector funds expended have achieved the expected risk reduction. Source: GAO Analysis of TSA information. [End of table] While the Modal Annex identifies goals, objectives, and activities, it does not contain measures or targets on the effectiveness of the operations of the security programs identified in the Modal Annex. For example, one of TSA's security programs listed in the Modal Annex-- Security Technology Deployment--aligns under one of the sector goals: prevent and deter acts of terrorism using or against the transportation system. However, the Modal Annex contains no measures or targets to assess the effectiveness of this program in achieving this goal. In August 2006, we reported that performance measures are an important tool to communicate what a program has accomplished and provide information for budget decisions. Further, we noted that it is desirable for these measures to be as effective as possible in helping to explain the relationship between resources expended and results achieved because agencies that understand this linkage are better positioned to allocate and manage their resources effectively.[Footnote 38] Although the Modal Annex does not contain specific measures or targets, it does call for developing measures of effectiveness to evaluate mass transit and passenger rail efforts to mitigate risk and increase the resilience of systems and assets. TSA has developed performance measures to track the progress that the surface transportation security program has made in conducting activities to enhance the security of the mass transit and passenger rail systems. Specifically, TSA's Surface Transportation Security Inspection Program fiscal year 2009 Annual Inspection Plan identifies annual and quarterly performance metrics for conducting mass transit and passenger rail-related assessments that TSA plans nationwide: * number of inspections conducted per 1,000 inspector work hours on mass transit, passenger rail, and freight rail systems and[Footnote 39] * number of BASE reviews conducted at the top 100 largest transit agencies. While these measures are useful in tracking activities or actions taken, they are output measures that do not fully inform TSA about how various actions have impacted the security of mass transit and passenger rail systems' goals and objectives. For example, TSA has so far reported the progress in its Visible Intermodal Prevention and Response (VIPR) program in terms of the number of VIPR operations TSA conducted, but has not yet developed measures or targets to report on the effectiveness of the operations themselves.[Footnote 40] However, in June 2009, TSA program officials reported that they are planning the introduction of additional performance measures for no later than the first quarter of fiscal year 2010. These measures would gather information on (1) interagency collaboration by collecting performance feedback from federal, state and local security, law enforcement, and transportation officials prior to and during VIPR deployments; and (2) stakeholder views on the effectiveness and value of the VIPR deployment. In February 2009, TSA reported plans to introduce its first outcome measures for its mass transit and passenger rail security programs. For example, TSA plans to introduce a performance measure for its BASE review program. TSA officials reported that they plan to calculate this measure by comparing the results from the first and second round BASE reviews for the nation's top 100 largest transit mass transit and passenger rail systems. TSA also reported plans to introduce additional outcome performance measures in the future, including an overall risk reduction measure tied to the BASE program. Implementing these new performance measures and including them in future updates of the Mass Transit Modal Annex should better inform decision makers at TSA on the effect of its programs in securing mass transit and passenger rail. Resources and Investments: While the Modal Annex identifies how TSA has allocated funds available to different transit agencies, the Modal Annex provides relatively few details on how grant resources should be targeted. Also, the Modal Annex contains little information on resources and costs associated with mass transit and passenger rail security programs. For example, the Modal Annex identifies as its third sector-goal, as shown on table 4, improve the cost-effective use of resources for transportation security; however, it provides few details on the costs, types, or levels of resources associated with implementation of the security programs that are aligned with this goal. Furthermore, the Modal Annex describes risks to the mass transit and passenger rail systems by discussing overseas attacks and the potential consequences of such attacks in the United States. However, the Modal Annex does not provide information on the cost of the consequences of such attacks and is silent on risk assessment efforts. TSA officials acknowledged the lack of this information and the need to include it in future updates of the Modal Annex. While providing cost estimates may be difficult to do, including resources and costs, to the extent possible, would help implementing parties allocate budgets according to priorities and constraints, and would help stakeholders shift such investments and resources as appropriate. Federal and Industry Stakeholders Have Taken Key Actions to Strengthen Transit Security and Federal Actions Have Been Generally Consistent with TSA's Strategy, but Opportunities Exist to Strengthen Some Programs: Since 2004, federal and industry stakeholders have implemented several key actions to strengthen the security of the nation's mass transit and passenger rail systems and federal actions have generally been consistent with TSA's security strategy. However, federal efforts are largely in the early stages and opportunities exist for TSA to strengthen some programs. Federal Actions to Secure Mass Transit and Passenger Rail Have Been Varied and Generally Consistent with TSA's Security Strategy: Since 2004, federal stakeholders have taken a number of key actions to secure mass transit and passenger rail systems and TSA has been the primary federal agency involved in implementing these actions. In general, these actions can be categorized into three areas: (1) deploying surface inspectors and other personnel to conduct voluntary security assessments and security operations at the nation's largest mass transit and passenger rail systems; (2) establishing and implementing coordination mechanisms between federal entities and mass transit and passenger rail industry stakeholders; and (3) coordinating with the DHS Science and Technology Directorate (DHS S&T) to develop and test new security technology appropriate for deployment in mass transit and passenger rail systems.[Footnote 41] Since 2004, TSA's primary security activity for mass transit and passenger rail has been conducting voluntary security assessments of the nation's top 100 largest mass transit and passenger rail systems through its BASE program.[Footnote 42] TSA has used the BASE results to inform the development of security enhancement programs and to determine priorities for allocating mass transit and passenger rail security grants. In addition, through its VIPR program and its National Explosive Detection Canine Team Program (NEDCTP), TSA has deployed personnel and explosive detection canine teams to augment mass transit and passenger rail systems' security forces to conduct hundreds of random and event-based security operations as a show of force to deter potential terrorist attacks at key mass transit and passenger rail stations. Federal agencies have taken other actions as well to strengthen security by enhancing coordination with transit industry stakeholders. For example, TSA established the monthly Transit Policing and Security Peer Advisory Group (PAG) and FTA initiated the semi-annual Transit Safety and Security Roundtables, both of which provide forums for TSA and mass transit and passenger rail systems, including Amtrak, to share security information and ideas. Additionally, FTA has enhanced mass transit and passenger rail security by funding the development and delivery of security training curriculum and programs for mass transit and passenger rail system employees, and by developing a list of recommended security and emergency action items for mass transit security programs, which it later updated in collaboration with TSA. TSA also collaborates with DHS S&T to pursue research, development, and testing of new security technology appropriate for deployment in mass transit and passenger rail systems. In 2006, DHS reorganized its security technology research and development structure, and under the new structure, TSA is to identify technology priorities to address security gaps and communicate these priorities to DHS S&T, which in turn is to conduct technology research, development, and testing. Table 5 provides descriptions of key federal programs and activities, initiated since 2004, mostly by TSA and FTA, to enhance mass transit and passenger rail system security. For a more extensive list of federal programs and activities, see appendix IV. Table 5: Key Federal Actions Taken to Enhance Mass Transit and Passenger Rail Security Since 2004: Category/Program: Deploying manpower; Surface Transportation Security Inspection Program (STSIP); Lead agency: TSA; Description: Established in 2005, TSA's surface inspectors serve as the agency's field force for conducting non-regulatory security assessments, outreach, and technical assistance with the nation's top 100 largest mass transit and passenger rail agencies, as well as participating in VIPR security operations at key transit and passenger rail locations. TSA reported that, as of February 2009, its surface inspectors had conducted non-regulatory security posture assessments-- or BASE reviews--of 91 mass transit and passenger rail agencies, including 82 of the largest agencies, and had conducted over 1,350 site visits to mass transit rail stations to complete Station Profiles, which gather detailed information on a station's physical security elements, geography, and emergency points of contact. Category/Program: Deploying manpower; Visible Intermodal Prevention and Response (VIPR) Program; Lead agency: TSA; Description: Since late 2005, TSA has reported deploying over 800 teams of TSA personnel to augment the security of mass transit and passenger rail systems and promote the visibility of TSA. Working alongside local security and law enforcement officials, VIPR teams conduct a variety of security tactics to introduce unpredictability and deter potential terrorist actions, including random high visibility patrols at mass transit stations, and passenger and baggage screening operations using specially trained behavior detection officers and explosive detection canine teams and explosive detection technologies. Category/Program: Deploying manpower; National Explosive Detection Canine Team Program (NEDCTP); Lead agency: TSA; Description: TSA implemented the NEDCTP in 2000 for aviation, and in 2005 expanded the program into mass transit and passenger rail. TSA has worked in partnership with transit systems to procure, train, certify, and deploy 88 explosives detection canine teams to 15 participating mass transit and passenger rail systems nationwide to provide mobile and flexible deterrence and explosives detection capabilities. TSA provides the canine training for the handler and the dogs and also allocates funds to cover the costs associated with continued training and maintenance of the capabilities of the team, while the transit system commits a handler to attend the TSA training and receive program certification. Category/Program: Coordinating with federal and industry stakeholders and issuing guidance: DHS/DOT memorandum of understanding (MOU) for coordination of roles/responsibilities; Lead agency: TSA; FTA; Description: Through a 2004 MOU and 2005 annex DOT (FTA) and DHS (TSA) agreed to closely coordinate their mass transit and passenger rail programs and services in developing transit security guidance and regulations. The agreements confirm that TSA has the lead role for transportation security and DOT has a supporting role in providing technical assistance and with assisting DHS in implementation of its security policies. Category/Program: Coordinating with federal and industry stakeholders and issuing guidance: Transit, Commuter and Long Distance Rail Government Coordinating Council (GCC) and Mass Transit Sector Coordinating Council (SCC) Joint Working Groups; Lead agency: TSA; FTA; Description: In 2007, under the Transit, Commuter and Long Distance Rail Government Coordinating Council (GCC) and Mass Transit Sector Coordinating Council (SCC) framework, TSA and FTA collaborated with the American Public Transportation Association to establish working groups composed of federal and industry mass transit and passenger rail security stakeholders to serve as a modal coordinating council for mass transit and passenger rail systems. Working groups were established in three substantive areas: security training, security technology, and grants. Category/Program: Coordinating with federal and industry stakeholders and issuing guidance: Transit Policing and Security Peer Advisory Group (PAG); Lead agency: TSA; Description: In late 2006, TSA established the monthly Transit Policing and Security Peer Advisory Group (PAG) to bring together 16 transit police chiefs and security directors from Amtrak and major transit systems across the nation to act as a consultative forum for advancing the security concerns of transit systems. Category/Program: Coordinating with federal and industry stakeholders and issuing guidance: Transit Safety and Security Roundtables; Lead agency: TSA; FTA; Description: Administered in 2003 and 2004 by FTA and jointly administered since 2005, TSA and FTA have convened semi-annual Transit Safety and Security Roundtables to serve as a means for representatives of the 50 largest mass transit agencies to share security-related ideas and information. Category/Program: Coordinating with federal and industry stakeholders and issuing guidance: Security Standards; Lead agency: TSA; FTA; Description: In accordance with the DOT/DHS MOU annex, FTA is leading an initiative with TSA to develop security standards for mass transit and passenger rail systems, with a focus on recommended procedures and practices. FTA has funded APTA to administer this initiative, and as of March 2009, APTA had issued six security standards related to security emergency management, security infrastructure, and security risk management. Category/Program: Developing security technology and providing technology information: Security technology research and development (R&D); Lead agency: DHS S&T/; TSA; Description: DHS S&T and TSA collaborate to research, develop, and test various security technologies for applicability in mass transit and passenger rail systems, including explosive trace detection technologies, infrastructure protection measures, and behavior based and advanced imaging technologies. Category/Program: Developing security technology and providing technology information: Transportation Research Board; Lead agency: FTA; Description: FTA sponsors academic research from the Transportation Research Board (TRB) which is one of six divisions within the National Research Council. The National Research Council serves as an independent adviser to the federal government and others on scientific and technical questions of national importance. TRB has produced several reports on public transportation security, such as a report on mass transit passenger security inspections procedures and technology. Source: GAO analysis of TSA and FTA programs. [End of table] Federal Mass Transit and Passenger Rail Security Actions Are Generally Consistent with TSA's Security Strategy: Federal actions to secure mass transit and passenger rail systems generally have been consistent with those that TSA outlined in its security strategy for mass transit, the Mass Transit Modal Annex. The Modal Annex describes TSA's strategic objectives and associated federal programs and activities to meet these objectives. For example, one objective calls for conducting security readiness assessments, which TSA has been doing since August 2006 through its BASE review program. Another objective calls for a public awareness program, which TSA reported implementing through its Employee Awareness Poster Program. [Footnote 43] See appendix V for a list of all of the Modal Annex mass transit objectives and TSA's reported actions to achieve these objectives. Mass Transit and Passenger Rail Systems Have Taken Key Actions to Enhance Security: Mass transit and passenger rail systems, including Amtrak, reported taking key actions since 2004 to improve their security. Most systems reported making operational enhancements to their security programs, such as adding security personnel or transit police. Moreover, some of the largest systems have implemented varying types of random passenger or baggage inspection screening programs. These programs include deploying security personnel at checkpoints to conduct visual observation of passengers for suspicious behaviors as well as non- invasive baggage checks. Since 2004, Amtrak reported taking additional actions to secure its system, focusing particularly on securing stations on its Northeast Corridor. Among other things, Amtrak introduced new passenger and baggage screening operations, increased its own explosive detection canine capacity, and deployed an armed mobile tactical team to respond to threats and conduct deterrent operations. Further, Amtrak provided security training to all of its frontline employees and conducted additional security risk assessments on its system as the baseline for developing its corporate security strategy. Officials from 24 of 25 passenger rail systems we interviewed and Amtrak also reported taking actions to strengthen the security of their systems in response to TSA's 2004 passenger rail security directives. These actions included removing trash receptacles from high-risk platform areas and deploying explosive detection canine units to patrol their systems. Amtrak also initiated identification checks for adult passengers. However, TSA's security directives contained limited requirements for passenger rail, and TSA has not enforced their implementation.[Footnote 44] Additionally, TSA released a report summarizing results of the BASE reviews it had conducted of mass transit and passenger rail systems during fiscal year 2007.[Footnote 45] This report showed that almost all transit agencies reported providing some type of security training to their frontline employees; however, the extent of the training provided varied greatly--with a majority providing an introductory level of safety and security training for new hires, but not refresher training.[Footnote 46] Many mass transit and passenger rail agencies also reported making capital improvements to secure their systems. For example, since 2004, 19 of the 30 transit agencies we interviewed had embarked on programs to upgrade their existing security technology, including upgrading closed-circuit television at key station locations with video surveillance systems that alert personnel to suspicious activities and abandoned packages and installing chemical, biological, radiological, nuclear, and explosives detection equipment and laser intrusion detection systems in critical areas. For bus transit agencies, capital improvements have included installing automatic vehicle location tracking, silent alarms, and engine disabling systems to counter potential hijacking threats. While mass transit and passenger rail systems as a whole have taken actions to enhance their security, TSA's BASE reviews indicated that rail transit agencies were implementing a wider range of security programs than bus only transit agencies.[Footnote 47] For example, according to TSA's initial findings from its BASE reviews of the 50 largest transit agencies, conducted during fiscal year 2007, rail transit agencies implemented more of the TSA/FTA security and emergency management action items than bus-only systems. TSA officials attributed the differences to three factors. First, passenger rail agencies have been required to comply with FTA's triennial State Safety Oversight audits that require passenger rail agencies to have both a safety and security plan in place and TSA's 2004 security directives. In contrast, bus-only transit agencies have not been required to implement such FTA security requirements, and no federal agency has issued bus-specific security requirements or directives. Second, bus-only transit agencies tend to be smaller than rail only or rail and bus transit agencies and have fewer financial resources available to invest in security activities. Finally, because passenger rail has been the target of recent high profile terrorist attacks overseas and rail is considered a higher security risk to terrorist attack than bus-only systems, passenger rail transit security has received greater focus--both by the transit industry and the federal government. Opportunities Exist for TSA to Strengthen Management and Coordination of Three Mass Transit and Passenger Rail Security Programs: DHS is Exploring New Security Technologies, but Expanding Outreach and Improving Information Sharing Could Strengthen Future Research and Development Endeavors: As part of its research and development (R&D) strategy, DHS has been exploring new explosive detection technologies, particularly those that deter, detect, defeat, and protect against the use of IEDs in or around transit infrastructure. Accordingly, DHS technology pilot projects for mass transit and passenger rail have sought to identify and develop technologies that can effectively detect explosive weapons or compounds while causing minimal delays to passengers, such as fare card vending machines capable of detecting explosive residue on passengers' bodies or bags (see figure 3). Although DHS has worked to develop some security technologies specific to mass transit and passenger rail systems, most technologies that it has pursued could work across different transportation modes, including aviation, maritime, mass transit, and passenger rail. DHS has also pursued several infrastructure protection projects that address the threat of IEDs, with a particular focus on addressing the vulnerabilities of underground and underwater transit tunnels. Unlike its role in commercial aviation, TSA does not procure or deploy security technologies for mass transit and passenger rail systems. Instead, TSA partners with mass transit and passenger rail systems to conduct pilot projects and demonstrations of commercially available technologies and technologies from DHS laboratories. The mass transit and passenger rail systems themselves determine which security technologies to procure and deploy.[Footnote 48] See appendix VI for a list of ongoing and completed TSA and DHS mass transit and passenger rail security-related technology pilot programs. Figure 3: Photo of DHS S&T Pilot Technology for a Fare Card Vending Machine with Explosive Trace Detection Capability: [Refer to PDF for image: photograph] Source: DHS Science and Technology Directorate. [End of figure] A 2006 pilot test by DHS S&T involved a fare card vending machine capable of detecting trace amounts of explosives residue on the fingertips of passengers. Though successfully demonstrating the technology, the machines were estimated to cost 75 to 100 percent more than standard fare-card vending machines. Since 2007, TSA, like other DHS components, has been responsible for articulating the technology needs of all transportation sector end- users--including mass transit and passenger rail agency operators--to DHS S&T for development.[Footnote 49] TSA has taken some initial actions to reach out to mass transit and passenger rail systems regarding their security R&D needs; however, these efforts could be expanded and improved by more fully leveraging existing forums to solicit a wider range of input. This effort is important because, as we reported in September 2004, stakeholders are more likely to use research results if they are involved in the R&D process from the beginning.[Footnote 50] The Mass Transit Modal Annex states that DHS S&T and TSA will identify security technology needs in full partnership with the mass transit community. To achieve this, TSA officials told us that TSA leverages existing forums for communication, such as the semi- annual Transit Security Roundtables, to identify technology capability gaps and to solicit input and feedback on its technology priorities. Additionally, in 2008, TSA headquarters officials reported that they sought input from transit industry representatives through the Transit Policing and Security Peer Advisory Group and the Mass Transit Sector Coordinating Council Security Technology Working Group. Nonetheless, in a September 2008 draft report, the Mass Transit Sector Coordinating Council Security Technology Working Group reported that other than occasional telephone discussions, there was no ongoing structure that brought the federal government and transit industry together to discuss transit security technology priorities, needs, and areas of potential interest for technology advancement and research.[Footnote 51] In September 2004, we recommended that DHS and TSA improve their outreach to the transportation industry (including mass transit and passenger rail systems) to ensure that the industry's R&D security needs have been identified and considered. DHS agreed that this recommendation was key to a successful R&D program and since that time, DHS and TSA have made some preliminary efforts to outreach on R&D security issues. [Footnote 52] However, by continuing to expand these efforts and getting input early on in the project selection process, TSA should be able to ensure that DHS has adequately considered and addressed the full scope of the industry's R&D needs. TSA has taken initial actions to share information on available security technologies, but could strengthen its approach by providing more information to support transit agencies that are considering deploying new security technologies. Consistent with a recommendation we made in September 2005, TSA established the Public Transit Portal of DHS's Homeland Security Information Network (HSIN), a secure Web site that serves as a clearinghouse of information on available security technologies that have been tested and evaluated by DHS, in addition to providing security alerts, advisories, and information bulletins. [Footnote 53] In February 2009, TSA reported that it had established HSIN accounts for 75 of the 100 largest mass transit and passenger rail systems. However, officials from 11 of 17 mass transit and passenger rail systems who discussed HSIN told us that they did not use it for guidance on available security technologies when considering security technology investments. These officials said that they did not use HSIN when considering such investments because HSIN did not contain product details that would support these decisions, including details on product capabilities, maintenance, ease of use, and the suitability of the products in a bus or rail venue. We reviewed HSIN and found that for a given security product, TSA's listing provides a categorical definition (such as video motion analysis), a sub-category (such as day/night camera), and the names of products within those categories. However, HSIN neither provides nor indicates how transit agencies can obtain information beyond the product's name and function. A senior program official with TSA's TSNM mass transit division told us that mass transit and passenger rail system officials would already know whom to contact at TSA for more information on a product. However, the official acknowledged that the product listing could be enhanced by including the contact information of the TSA officials capable of providing that information. In the absence of more detailed information on security-related technologies, officials from 19 of 30 mass transit and passenger rail systems we interviewed told us that they either (1) asked other operators about their experiences with a particular technology; (2) performed their own research via the Internet or trade publications; or (3) performed their own testing. Making the results of research testing available to industry stakeholders could be a valuable use of federal resources by reducing the need for multiple industry stakeholders to perform the same research and testing. The senior TSA program official with the TSNM mass transit division also acknowledged that HSIN contained limited technology information but noted that the site's content was largely in the early stages of development. The official attributed some of the limitations to TSA's reluctance to provide substantive details regarding any particular product, since TSA officials did not want to be perceived as endorsing any particular vendor. Nonetheless, TSA stated that its goal for HSIN was to provide a way for transit agencies to share, receive, and find information on security technology as well as to provide a technology database with performance standards and product capabilities so that mass transit and passenger rail agencies would be well prepared to interact with vendors. Although TSA has set this goal for HSIN, there was no set deadline for the content-related improvements. By taking action to address mass transit and passenger rail agencies' need for more information, TSA could help provide transit agencies with a consolidated source of information on security technologies and help ensure that limited resources are not used to duplicate research and testing efforts. TSA Reported Taking Steps to Respond to Transit Industry Concerns and Improve the Effectiveness of its VIPR Program: In response to mass transit and passenger rail industry concerns about its VIPR program, TSA reported taking steps to work with the industry to improve the effectiveness of the program. TSA conducts VIPR operations as a way to introduce security measures (such as random bag searches) at mass transit and passenger rail systems to deter potential terrorist threats, augment local security forces, and promote the visibility of TSA resources.[Footnote 54] TSA, to date, has conducted over 800 VIPR operations at mass transit and passenger rail systems. TSA also reported that almost all operations were deployed on a random basis or to enhance security at special events or on holidays, rather than in response to specific threat information.[Footnote 55] Mass transit and passenger rail system officials we interviewed had varying opinions on the effectiveness of the VIPR operations that TSA had conducted on their systems. For example, security and management officials from 5 of the 30 mass transit and passenger rail systems we visited told us that they generally welcomed the additional security resources that the VIPRs provided. In contrast, officials from four other mass transit and passenger rail systems reported that because they were already deploying their own transit police and security personnel on their systems on a daily basis, the addition of a largely unarmed VIPR team on a single day did not add significant security value especially with the additional planning and costs incurred by these operations. In response to VIPR planning and implementation concerns raised by large mass transit and passenger rail systems, in October 2007 TSA issued a Concept of Operations (CONOPS) for its VIPR program that established general guidelines for the planning and execution of a VIPR deployment. TSA developed the guidance in coordination with members of the Transit Policing and Security Peer Advisory Group and issued the guidance to both its field personnel and the mass transit industry. The CONOPS includes general guidelines for 10 core components of collaboration, such as coordination, planning, and communications. [Footnote 56] In June 2008, the DHS Inspector General (DHS-IG) reported on VIPR planning and implementation concerns and noted that transit system officials reported that TSA's issuance of the VIPR guidance had led to improvements that addressed many of the VIPR implementation concerns.[Footnote 57] Nevertheless, our review of TSA after-action reports for 104 VIPR operations TSA conducted from November 2007 through July 2008 on mass transit and passenger rail systems--a nine month period after TSA issued the CONOPS guidance--identified insufficient interoperable radio communications as a key challenge faced during many VIPR operations. According to the after-action reports, TSA's key challenge has been ensuring that its VIPR teams have reliable interoperable radio communications--both among TSA personnel and with local law enforcement. According to the CONOPS, ensuring interoperable radio communications between VIPR team members and local law enforcement is essential to the safe and effective execution of VIPR programs, including ensuring their ability to communicate information on potential threats encountered during operations. However, in almost half of the after-action reports we reviewed (49 of 104), VIPR participants reported that a lack of reliable communications equipment had hindered their ability to conduct real-time communications with local law enforcement. This challenge has existed since TSA expanded the VIPR program into mass transit and passenger rail systems, where cell phone or other communications systems that previously worked in airports did not effectively operate in a transit environment. In many cases, TSA field personnel reported requests for new interoperable radio systems, but had not had those requests fulfilled by TSA headquarters. These reports indicated the need for a more comprehensive solution in which TSA procures communications systems capable of real time interoperability with security partners in mass transit and passenger rail systems. TSA managers of the VIPR program acknowledged the challenges that the VIPR program had experienced since it expanded into mass transit and passenger rail systems and stated that the agency was taking actions to address them. Examples include: * Communications Improvements: TSA reported deploying additional communications equipment to field locations and working with DHS S&T to test new technologies for enhancing communications capability and interoperability in a mass transit or passenger rail environment. * Coordination and Awareness: TSA reported that it developed and made available to mass transit and passenger rail systems a brochure with information on scheduling and deploying VIPR operations, including a description of the different options available for systems in utilizing VIPR teams and the planning and operational roles and responsibilities of participating TSA personnel.[Footnote 58] Further, to improve nationwide coordination of VIPR operations, TSA established a coordination center dedicated solely to VIPR operations and has established dedicated mobile VIPR teams in 10 cities. TSA has reported that it plans to expand the number of these teams nationwide by 2010. * Training TSA Personnel: TSA reported in February 2009 that the agency had begun requiring VIPR team personnel to participate in system orientation and safety training from mass transit and passenger rail systems where they deploy in order to familiarize VIPR team members with both the transit agency's physical structure and operating procedures. TSA also reported offering additional training on surface- based law enforcement tactics and legal authorities. Because TSA plans to further expand the VIPR program in 2009, effectively implementing these actions should better ensure that TSA uses its limited security resources to maximize the security benefit of VIPR operations in mass transit and passenger rail. TSA Established a Program to Expand Security Training for Mass Transit and Passenger Rail Employees, but Opportunities Exist to Strengthen It: In February 2007, TSA established a training program to assist mass transit and passenger rail agencies in expanding security training for their frontline transit employees. However, opportunities exist for TSA to strengthen its process for ensuring consistency in the performance of non-federal training vendors that mass transit and passenger rail agencies use to obtain training through the program. After TSA's initial BASE reviews revealed wide variations in the extent of training that transit agencies were providing to their employees, including limited recurrent training, TSA established a Mass Transit Security Training program to provide curriculum guidelines for basic and follow- on security training areas--training programs and courses largely developed and funded by FTA. It also specified areas in which particular categories of employees should receive recurrent training as well as a matrix tool to enable transit agencies to determine the costs and timelines for implementing the training. To support delivery of the training courses, TSA aligned the program with the DHS Transit Security Grant Program. The Transit Security Grant Program has made transit agency grant funding for security training a top priority and offers mass transit and passenger rail agencies the option of using grant funding to cover costs for training to employees that is supplied by either (1) training providers that are federally funded or sponsored or (2) other training providers.[Footnote 59] While TSA has reported that the Mass Transit Security Training Program is providing opportunities for mass transit and passenger rail systems to expand security training to their employees, senior officials from FTA's Safety and Security Office expressed concern that TSA had not established the necessary criteria to effectively manage the program. According to TSA's Mass Transit Security Training Program guidance, TSA allows transit systems to obtain DHS grant funding to contract with private security training vendors if TSA has determined that the performance of the vendors' training curriculum and delivery services is equal to those of the federally sponsored providers.[Footnote 60] As a result, TSA assumed new responsibility for evaluating whether these security training vendors met the performance standards of federally sponsored training providers and whether they could be used by transit agencies for training under the Transit Security Grant Program. [Footnote 61] However, opportunities exist for TSA to strengthen its process for making this evaluation. According to TSA, transit agency requests to use non-federally funded or sponsored training vendors under the Transit Security Grant Program are reviewed by TSA's mass transit training specialist and by FEMA's Grants Program Directorate for approval. This review includes an analysis of course documentation, such as a description of the course syllabus, cost estimate, and justification for why the course was the preferred solution. However, both FTA and TSA officials acknowledged that additional criteria are needed for TSA to properly evaluate the selection of the training vendors. As the lead federal agency for developing and implementing mass transit employee safety training programs since 1971, FTA is in the process of issuing guidance that could be relevant to TSA's evaluation of training vendors. According to FTA's 2009 Training Curriculum Development Guidelines, scheduled for release in 2009, criteria for evaluating the quality of training services should include, among other things, a review of the credentials of the instructors who would deliver the training course, the training vendor's experience in providing the security course, and any performance evaluations or feedback obtained from organizations and students who previously received training from the vendor. [Footnote 62] Additionally, as we reported in March 2004, agencies should try to develop clear criteria when determining whether to contract with vendors for training.[Footnote 63] We identified factors that agencies should consider include the prior experience, capability, and stability of the vendors offering the training. Since implementing the Mass Transit Security Training Program in 2007, TSA reported that about 50 mass transit and passenger rail systems had applied for Transit Security Grant Program funding for employee security training, including one agency that applied to use training vendors that are not federally funded or sponsored. However, more applications for this option are expected as additional grant funding for training becomes available. TSA and FTA officials both noted their preference for transit agencies to use federally-sponsored training providers and expressed concerns that increased demands on the providers may make scheduling training with federally funded or sponsored providers more difficult. Enhancing criteria for evaluating the quality of training services could strengthen DHS's ability to ensure that the grant money DHS is awarding to mass transit and passenger rail agencies is consistently funding sound and valid security training programs for these employees. In October 2005, we reported that collaborating agencies can identify opportunities to leverage each other's resources, thus obtaining additional benefits that would not be available by working separately.[Footnote 64] By coordinating the enhancement of these criteria with other agencies conducting similar efforts, such as FTA, TSA could also leverage the expertise of other agencies to better ensure its efforts result in sound criteria. TSA Reported Implementing Some 9/11 Commission Act Provisions for Mass Transit and Passenger Rail Security, but Implementing New Regulations May Pose Challenges for TSA and Industry Stakeholders: In March 2009, TSA reported that it had implemented some of the 9/11 Commission Act's provisions related to mass transit and passenger rail security. While most mass transit and passenger rail industry security actions have been voluntary to date, the 9/11 Commission Act sets forth mandatory requirements for federal and industry stakeholders, and implementing those requirements may pose challenges for TSA and industry stakeholders, particularly for TSA's Surface Transportation Security Inspection Program. TSA has more than doubled the size of its Surface Transportation Security Inspection Program over the past year, but has not completed a workforce plan to address current and future program needs, and surface inspectors have reported concerns with organizational changes that TSA has made to the program that may affect implementation of new responsibilities. Additionally, officials from the mass transit and passenger rail industry have reported concerns with the cost and feasibility of implementing pending 9/11 Commission Act regulations. TSA Reported Implementing Some Provisions of the 9/11 Commission Act for Mass Transit and Passenger Rail Security: The 9/11 Commission Act, enacted in August 2007, contains many provisions that task TSA with implementing various actions related to surface transportation, including mass transit and passenger rail security. Among other things, these provisions identify mandates for developing and issuing reports on TSA's strategy for securing public transportation, conducting and updating security assessments of mass transit systems, and establishing a program for conducting security exercises for transit and rail agencies. In March 2009, TSA reported that it had satisfied some provisions of the 9/11 Commission Act pertaining to mass transit and passenger rail, including some through actions that had been taken prior to the enactment of the 9/11 Commission Act. For example, TSA reported that it had issued a report on the transportation security enforcement process and that its Mass Transit Modal Annex satisfied the requirement to develop a strategy for securing public transportation. However, TSA also reported that it had not yet implemented a number of other 9/11 Commission Act provisions, including several requiring TSA to issue regulations that would place new requirements on the mass transit and passenger rail industry. The 9/11 Commission Act requires TSA to develop and issue several different regulations for mass transit and passenger rail, including regulations for employee security training programs and requiring high- risk rail carriers to develop and implement security plans. TSA reported that it was in the process of developing these regulations and that for some required regulations it had sought feedback from the transit industry as it developed new regulations. However, as of March 2009, TSA had missed several legislative deadlines for issuing the required mass transit and passenger rail regulations, and in some cases had not established time frames for when it would ultimately do so. For example, TSA was required to issue interim regulations outlining requirements for a mass transit employee security training program by November 2007, with final regulations due by August 2008. TSA was also required to issue regulations by August 2008 requiring high-risk rail carriers to develop and implement security plans. However, TSA did not meet these deadlines. TSA reported that deadlines in the act for developing and issuing new regulations have been difficult to meet because of different factors, including the comprehensive scope of the requirements, the need to coordinate them with various entities, and a lack of resources for completing certain tasks. See table 6 below for a list of key selected 9/11 Commission Act mass transit and passenger rail provisions mandating actions by TSA, along with TSA's reported status in doing so, as of March 2009. Table 6: Key Selected Provisions of the 9/11 Commission Act for Mass Transit and Passenger Rail Security and TSA's Reported Implementation Status, as of March 2009: Strategies: Section: § 1404; Requirement: Develop and implement the National Strategy for Public Transportation Security; TSA reported status: TSA reported that the Mass Transit Modal Annex to the Transportation System - Sector Specific Plan meets this requirement. Section: § 1511; Requirement: Establish a task force to complete (by Feb. 2008) a risk assessment of a terrorist attack on railroad carriers, and based on the assessment, develop and implement the National Strategy for Railroad Transportation Security; TSA reported status: TSA reported that the task force has been established and that the National Strategy for Railroad Transportation Security is under development. For passenger rail, TSA reported that the Mass Transit Modal Annex to the Transportation System - Sector Specific Plan meets the requirement to develop and implement a security strategy. Vulnerability assessments and security plans: Section: § 1405; Requirement: Review and update FTA security assessments of high-risk public transportation agencies, require high-risk public transportation agencies to develop security plans and review, amend as necessary, and approve the security plans; TSA reported status: TSA reported that FTA security assessments were provided to TSA and that TSA used the BASE program to update the assessments. TSA stated that it will use the BASE results in developing regulations implementing this requirement. TSA reported that a regulatory project has been initiated. Section: § 1405(b); Requirement: Conduct security assessments to determine the specific needs of local bus-only transportation systems; TSA reported status: TSA reported that the assessments have been completed and that information is being prepared for use by the transportation system operators. Section: § 1512; Requirement: Issue regulations (by Aug. 2008) that require each railroad carrier, including passenger rail carriers, determined to be high-risk to conduct a vulnerability assessment and to prepare, submit for approval, and implement a security plan; TSA reported status: TSA reported that a regulatory project has been initiated. Exercise programs: Section: § 1407, § 1516; Requirement: Establish a program for conducting security exercises for public transportation agencies and for railroad carriers. Establish a program for conducting security exercises for railroad carriers, including passenger rail carriers; TSA reported status: TSA reported that its Intermodal Security Training and Exercise Program meets this requirement. The agency further reported a multi-phased, multi-jurisdictional pilot of this exercise program was held in the National Capitol Region from January through June 2008, northern New Jersey in September 2008, and Los Angeles from February to June 2009. Training programs: Section: § 1408, § 1517; Requirement: Issue interim (by Nov. 2007) and final regulations (by Aug. 2008) for a public transportation security training program and issue regulations (by Feb. 2008) for a security training program for frontline railroad, including passenger railroad, employees; TSA reported status: TSA reported that a consolidated regulatory project including public transportation, railroad, and over-the-road bus has been initiated. TSA reported that it anticipates issuing a Notice of Proposed Rulemaking in late calendar year 2009 or early calendar year 2010. Background checks: Section: § 1411, § 1520; Requirement: Complete a name-based security background check for all public transportation frontline employees and frontline railroad employees; TSA reported status: TSA reported that it has begun to develop a project plan for a rulemaking needed to satisfy this requirement, but that significant funding and time will be required to meet this requirement. Source: GAO analysis of TSA data. [End of table] TSA reported that it tracks the implementation status of mass transit and passenger rail security provisions of the 9/11 Commission Act on a monthly basis as part of a DHS-managed working group and was identifying processes needed to implement the provisions. TSA provided us with progress reports for completing these provisions which, in certain cases, identified challenges it faced in doing so, including a lack of resources. But the reports did not include a plan for addressing these challenges or milestones for implementing several 9/11 Act Commission provisions, as called for by project management best practices.[Footnote 65] TSA officials reported that before they could move forward on the 9/11 Commission Act requirements, they needed to allow the new administration time to review TSA's efforts to date. However, until TSA develops a plan with milestones, it will be difficult to provide reasonable assurance that the provisions of the act are being developed and that a strategy is in place for overcoming identified challenges. While Industry Security Actions Have Largely Been Voluntary, New 9/11 Commission Act Requirements Outline a Mandatory Approach and Pose Challenges for TSA's Inspectors: While the majority of industry actions to secure mass transit and passenger rail have been taken on a voluntary basis, the pending 9/11 Commission Act regulations outline a new approach that sets forth mandatory requirements, the implementation of which may create challenges for TSA and industry stakeholders. With the exception of the 2004 passenger rail security directives, TSA had not, until recently, imposed security requirements on the mass transit and passenger rail industry. Instead TSA took a collaborative approach in encouraging passenger rail systems to voluntarily participate and address security gaps through its BASE review program.[Footnote 66] With TSA's pending issuance of regulations required by the 9/11 Commission Act, TSA will fundamentally shift this approach, and establish a new regulatory regime for mass transit and passenger rail security. Once TSA issues the pending regulations for mass transit and passenger rail security, TSA's Surface Transportation Security Inspection Program would have responsibility for enforcing industry compliance--further expanding and evolving the roles and responsibilities these inspectors have for mass transit and passenger rail, in addition to their responsibilities for other surface modes, such as freight rail, highway, and motor carrier security. TSA officials have raised concerns about their ability to meet the growing inspection requirements for mass transit and passenger rail and other surface modes that will be incurred by the new regulations required by the 9/11 Commission Act, particularly because TSA's Surface Transportation Security Inspection Program is already challenged to meet its existing workload. For example, 10 of 11 Surface Transportation Security Inspection Program field office supervisors--Assistant Federal Security Directors for Surface Transportation (AFSD-S)--whom we interviewed reported that while they were meeting their primary inspection responsibilities for mass transit and other surface modes, resource constraints were routinely leading them to delay secondary activities, such as conducting stakeholder outreach with mass transit and passenger rail agencies.[Footnote 67] These field office supervisors attributed their resource constraints to a significantly expanded Surface Transportation Security Inspection Program workload from fiscal year 2006 through 2008 without a corresponding increase in its workforce. During this time, TSA expanded the responsibilities of the surface transportation security inspectors to include additional surface transportation modes, including conducting various voluntary security inspections for mass transit bus and freight rail, and participating in VIPR operations.[Footnote 68] TSA's Surface Transportation Security Inspection Program is at risk of being unable to meet its expanding responsibilities if it does not plan for how to meet them. TSA reported that the agency had been appropriated funding to hire an additional 125 surface inspectors that would more than double its surface inspector workforce--including 75 in fiscal year 2008 and 50 more in fiscal year 2009--and planned to complete their hiring, training, and deployment by the end of fiscal year 2009.[Footnote 69] TSA reported plans to largely dedicate its newly hired surface inspectors to conducting VIPR activities, assessing security activities on surface modes, and monitoring newly issued freight rail security rules, such as ensuring a secure chain of custody for certain hazardous materials.[Footnote 70] However, as reported by the DHS Inspector General, beyond supporting current activities, the additional manpower TSA plans to put into its Surface Transportation Security Inspection Program may provide only limited relief.[Footnote 71] As a result, even with these additional resources, TSA's surface inspectors may face challenges in fulfilling their responsibilities. GAO guidance on strategic human capital management reinforces that high performing organizations conduct workforce planning and analysis to identify and prepare for current and future workforce needs.[Footnote 72] Accordingly, a workforce plan that includes an analysis of a program's workforce needs can help to ensure that the program has the right amount of resources to achieve program goals, allowing program managers to spotlight areas for attention before problems develop. In February 2009, we reported that TSA did not have a human capital or other workforce plan for its Transportation Security Inspection Program, but the agency had plans to conduct a staffing study to identify the optimal workforce size to address its current and future program needs.[Footnote 73] TSA reported that it had hired a contractor to conduct a full workforce analysis of its security inspectors, including both its aviation and surface inspectors, to determine the number needed to fulfill expanded roles and responsibilities and ensure effective deployment. TSA reported that it had initiated the study in January 2009 to be completed in late fiscal year 2009.[Footnote 74] This study, if completed, should provide TSA with a more reasonable basis for determining the surface inspector workforce needed to achieve its current and future workload needs in light of the new requirements of the 9/11 Commission Act.[Footnote 75] Stakeholders Have Raised Concerns Regarding Changes to TSA's Surface Transportation Security Inspection Program Field Office Command Structure: Surface inspectors have raised concerns about recent organizational changes that TSA has made to the Surface Transportation Security Inspection Program that may affect the implementation of its expanded roles and responsibilities. These concerns were reported by Surface Transportation Security Inspection Program field officials we interviewed, two recent DHS-IG reports, and an internal TSA report prepared by several Surface Transportation Security Inspection Program field officials.[Footnote 76] Specifically, in April 2008, TSA announced plans to expand the number of Surface Transportation Security Inspection field offices nationwide, from 22 to 54. Under a re- organized reporting structure, TSA placed 31 of the 32 new field offices under the command of Federal Security Directors and Assistant Federal Security Directors for Inspections--aviation-focused positions that historically have not had an active role in conducting mass transit, passenger rail, or other surface transportation inspection duties. TSA's Surface Transportation Security Inspection Program headquarters officials continue to set strategy and annual goals, while in most field offices the surface inspectors report to the Federal Security Directors and Assistant Federal Security Directors for Inspections, who have day-to-day management lead and hiring responsibilities for surface inspectors. Reported field official concerns include: * Balancing aviation and surface transportation priorities: A January 2008 report that 6 of 12 of TSA's Assistant Federal Security Directors for Surface submitted to TSA headquarters cited concerns that placing the Surface Transportation Security Inspection program under the Federal Security Directors had resulted in the surface transportation mission being diluted by TSA's aviation mission. The report also stated that the current reporting line of surface inspectors is less efficient and may create confusion among surface inspectors, because Federal Security Directors' priorities and needs differ from those of the surface program. * Establishing and maintaining credibility with industry stakeholders: Eight of the 11 Assistant Federal Security Directors for Surface we interviewed reported concerns that Federal Security Directors were not sufficiently focused on mass transit and passenger rail and the different challenges that surface inspectors face in overseeing the industry's voluntary participation in non-regulatory security assessment activities. For example, one Assistant Federal Security Director for Surface commented that Federal Security Directors had tasked aviation security officers to participate in surface assessments and that doing so had caused some frustration among transit agency officials because of their lack of knowledge about the transit environment. A June 2008 DHS-IG report also noted surface inspectors' concerns that Federal Security Directors were hiring surface inspectors who had no prior surface transportation experience, and that in some cases, Assistant Federal Security Directors reported that they were not included in hiring decisions. TSA disagreed with the DHS-IG and Assistant Federal Security Directors reports' findings that the present Surface Transportation Security Inspection Program field office command structure had inhibited the program's effectiveness. For example, TSA did not concur with the DHS- IG's recommendation that TSA place the Surface Transportation Security Inspection Program under the direct authority of a TSA headquarters official responsible for surface transportation, rather than under the Federal Security Directors. TSA reported that they had selected their current command structure because Federal Security Directors were best equipped to make full use of the security network in their geographical location because they frequently interacted with state and local law enforcement and mass transit operators, and were aware of vulnerabilities in these systems. Transit Industry Stakeholders Expressed Concern about the Cost and Feasibility of Implementing Pending Regulatory Requirements: While TSA has not yet issued the new 9/11 Commission Act regulations for mass transit and passenger rail, 12 of 30 mass transit and passenger rail agencies we interviewed raised potential implementation concerns associated with one expected regulatory requirement regarding training for mass transit and passenger rail employees. Among other comments, mass transit and passenger rail agency officials reported that unless these new regulations were accompanied by funding to address implementation costs, they would be challenged to comply since mass transit agencies face tight budgetary constraints. For example, one transit agency official reported in feedback to TSA that an agency with 5,000 employees would incur labor costs of $1.5 million to have its employees participate in an 8-hour training program. Another transit agency official reported that it would be an achievement to get 30 to 40 percent of frontline employees through training in a year due, in part, to the costly overtime for backfilling those employees' positions while they are in training. Additionally, these 12 agencies also reported concerns about the logistical feasibility of implementing the training requirement. For instance, under the act, mass transit and passenger rail agencies would be required to complete security training for all of their frontline employees within one year of DHS's approving the transit agency's training program. However, several mass transit and passenger rail agencies reported having thousands of employees and said it would be difficult to schedule training for all employees within one year without disrupting operations because they did not have the staff needed to backfill the positions of the employees undergoing training. Conclusions: As terrorist attacks on mass transit and passenger rail systems overseas have made clear, even with a variety of security precautions in place, mass transit and passenger rail systems that move high volumes of passengers on a daily basis remain vulnerable to attack. Since 2004, TSA has introduced a variety of initiatives aimed at enhancing the security of the nation's mass transit and passenger rail systems, including conducting security assessments, implementing new security programs, and implementing some provisions of the 9/11 Commission Act. However, given the importance of the mass transit and passenger rail systems, the inherent vulnerabilities that could be exploited by terrorist threats, and the broadening requirements that will result in a shift to a regulatory approach, addressing management and coordination challenges should help ensure that current and future actions effectively improve the security of these systems. TSA has taken key steps to help secure the nation's mass transit and passenger rail systems; however, additional actions to more effectively target resources would strengthen TSA's security approach. To ensure that TSA's efforts best prioritize and address risks, TSA should conduct a risk assessment for the mass transit and passenger rail systems that combines the results of threat, vulnerability, and consequence assessments. Until the overall risk to the entire system is identified through such an assessment, TSA cannot best determine how and where to target its limited resources to achieve the greatest security gains. TSA's 2007 Mass Transit Modal Annex represents a positive step toward documenting TSA's strategy for securing the mass transit and passenger rail systems, but further refinements to the strategy documented in future updates to the Modal Annex would help ensure that it provides all stakeholders with a clear and measurable path forward. For example, including relevant performance metrics will allow stakeholders to better evaluate their progress in achieving the strategy's vision. In addition, incorporating information on what the strategy will cost, to the extent possible, would help implementing parties allocate budgets according to priorities and constraints, and would help stakeholders shift such investments and resources as appropriate. Federal and industry efforts to work together in securing mass transit and passenger rail in the absence of any significant federal security regulations have been commendable. In particular, TSA's BASE reviews have been a positive step as they enhanced the awareness of security vulnerabilities at mass transit and passenger rail agencies throughout the country, while strengthening relationships among transit stakeholders. Notwithstanding TSA's progress, TSA's efforts remain largely in the early stages and opportunities exist for TSA to strengthen the implementation of some of its security programs. Expanding its outreach with mass transit and passenger rail officials will be particularly important for TSA in gathering security technology information and disseminating it to the systems and enabling officials to identify and deploy new security technologies to better secure their systems. In addition, with HSIN, TSA already has a venue in place for expanding the dissemination process and should explore the feasibility of populating this site with better and more relevant technology information to help meet the needs of mass transit and passenger rail agencies regarding information on available security technology. Such action should help ensure that limited resources are not used to duplicate research and testing efforts. Finally, by providing guidance and funding to cover mass transit and passenger rail agency costs for providing employee security training, TSA has taken steps to reduce a key vulnerability it identified during its BASE reviews. However, with the anticipated increase in demand for employee security training, it is important that TSA have an effective evaluation process in place to ensure it is consistently funding sound and valid training programs for mass transit and passenger rail agencies seeking funding to pay for non- federal training providers. Finally, a significant transition lies ahead. While TSA reports making progress in implementing the provisions of the 9/11 Commission Act, the agency has fallen behind in issuing required mass-transit and passenger- rail security regulations. The implementation of these regulations will be a fundamental shift in approach for TSA as it assumes more of a regulatory role in securing mass transit and passenger rail. This shift--combined with an expanding Surface Transportation Security Inspector workforce that has more than doubled in size in the past year and shifting deployment and field reporting structures--will challenge TSA to manage its new responsibilities. However, this transition will be important for both TSA and industry stakeholders to manage successfully to ensure that new requirements are met and that TSA and stakeholders continue to work together to secure mass transit and passenger rail. One approach that could help DHS manage these many changes is to develop a schedule with milestones for implementing the remaining 9/11 Commission Act requirements pertaining to mass transit and passenger rail. Without such a plan, it will be difficult for TSA to provide reasonable assurance that the provisions of the act are being implemented and that a strategy is in place for overcoming identified challenges. We recognize the inherent challenges to securing these systems given the continuing terrorist threat, openness of the system, and difficulties posed by attempting to secure and patrol numerous points of entry. However, given the criticality of mass transit and passenger rail systems to our way of life and the economy, and the inherent risks to them, TSA should continue to strive to strengthen its security efforts for the systems. Recommendations for Executive Action: To help ensure that the Transportation Security Administration is successfully prioritizing resources and collaborating with federal and industry stakeholders in implementing actions to secure the mass transit and passenger rail systems from acts of terrorism, and that its strategy is consistent with the characteristics of a successful national strategy, we are making six recommendations to the Assistant Secretary for the Transportation Security Administration: * To help ensure that the federal strategy to secure the mass transit and passenger rail systems considers assessment information within the context of risk, TSA, as the sector-specific agency for mass transit and passenger rail, should conduct a risk assessment that integrates all three elements of risk--threat, vulnerability, and consequence. As part of this assessment, TSA should, to the extent feasible, fully leverage existing assessment information from its own sources as well as those provided by other federal and industry stakeholders, as appropriate, and use this information to inform its security strategy. * To better achieve the security strategy laid out in its Mass Transit Modal Annex--TSA's security strategy for the mass transit and passenger rail systems--TSA should, to the extent feasible, incorporate into future updates of the Modal Annex the characteristics of a successful national strategy and the elements outlined in Executive Order 13416, including: - measuring the agency's and industry's performance in achieving the goals of preventing and deterring acts of terrorism and enhancing the resiliency of mass transit and passenger rail systems and: - incorporating information on what the strategy will cost along with the specifying the sources and types of resources and investments needed, and identifying where those resources and investments should be targeted. * To help ensure that DHS security technology research and development efforts reflect the security technology needs of the nation's mass transit and passenger rail systems, TSA should expand its outreach to the mass transit and passenger rail industry in the planning and selection of related security technology research and development projects. * To meet the needs of mass transit and passenger rail agencies regarding information on available security technologies, TSA should explore the feasibility of expanding the security technology product information on the Public Transit Portal of the Homeland Security Information Network, and consider including information such as product performance in a rail or bus venue, cost, maintenance needs, and other information to support mass transit and passenger rail agencies purchasing and deploying new security technologies. * To better ensure that DHS consistently funds sound and valid security training delivery programs for mass transit and passenger rail employees, TSA should consider enhancing its criteria for evaluating whether security training vendors meet the performance standards of federally sponsored training providers and whether the criteria could be used by transit agencies for training under the transit security grant program. As part of this effort, TSA should consider coordinating with other federal agencies that have developed criteria for similar programs, such as the Federal Transit Administration. * To better ensure DHS's ability to satisfy the provisions of the 9/11 Commission Act related to mass transit and passenger rail, DHS should develop a plan with milestones for implementing provisions of the 9/11 Commission Act related to mass transit and passenger rail security. Agency Comments: We provided a draft of this report to DOT, Amtrak, and DHS for review and comment. DOT did not provide comments. Amtrak provided written comments on June 16, 2009. In its letter, Amtrak provided additional information on security actions they were taking, noted collaboration with federal agencies, and expressed some concern about the cumbersome nature and cost share requirements of the Transit Security Grant Program. Amtrak's comments are presented in appendix VII. DHS provided written comments on June 17, 2009, which are presented in appendix VIII. In commenting on the report, DHS stated that it concurred with all six recommendations and identified actions planned or under way to implement them. In comments related to our first recommendation, that DHS conduct a risk assessment that integrates all three elements of risk, DHS stated that it recognized the importance of conducting risk assessments to inform agency priorities, security enhancement programs, and resource allocations. It also reported that in addition to the various assessments already completed and the BASE reviews conducted on a continuous cycle, an assessment pilot program is planned for later in 2009. Under this pilot, TSA will evaluate the effectiveness of and provide lessons learned from its new risk assessment tool for mass transit and passenger rail to enhance the tool's capability prior to its implementation. In comments related to our second recommendation that DHS incorporate in future updates of the Modal Annex the characteristics of a successful national strategy and the elements outlined in Executive Order 13416, DHS reported that it planned to revise its Mass Transit Modal Annex and incorporate these characteristics and elements to improve its ability to measure agency and industry progress toward achieving mass transit and passenger rail security performance goals. In response to our third recommendation that TSA expand its outreach to the mass transit and passenger rail industry in the planning and selection of related security technology research and development projects, DHS reported on several planned coordination efforts including its intent to coordinate the Modal Annex update with mass transit and passenger rail stakeholders, and work to ensure that stakeholders have ample opportunities to provide input on security technology development and testing priorities. With regard to our fourth recommendation that TSA explore the feasibility of expanding the security technology product information on the Public Transit Portal of the Homeland Security Information Network, DHS reported that it expects to expand both the scope and quality of security technology information provided to stakeholders through the Public Transportation Information Sharing and Analysis Center--which has a principal objective of aligning and integrating analytical and information sharing activities with relevant federal processes to enhance the information-sharing environment for the mass transit and passenger rail community. In comments related to our fifth recommendation that TSA consider enhancing its criteria for evaluating security training vendors under the Transit Security Grant Program and consider coordinating with other federal agencies that have developed such criteria, DHS stated that TSA will work with FTA through an existing joint working group to develop criteria for reviewing new vendor- provided training courses. Lastly, with regard to our sixth recommendation that DHS develop a plan with milestones for implementing provisions of the 9/11 Commission Act related to mass transit and passenger rail security, DHS reported that TSA will produce a plan that identifies necessary actions and sets milestones to evaluate its effectiveness in meeting statutory requirements associated with the 9/ 11 Commission Act. DHS and Amtrak also provided us with technical comments, which we considered and incorporated into the report where appropriate. As agreed with your office, unless you publicly announce the contents of this report, we plan no further distribution for 30 days from the report date. At that time, we will send copies of this report to the Secretary of Homeland Security, the Secretary of Transportation, Amtrak, interested congressional committees, and other interested parties. The report will also be available at no charge on the GAO Web site at [hyperlink, http://www.gao.gov]. If you or your staff have any questions concerning this report, or wish to discuss these matters further, please contact me at (202) 512-3404 or berrickc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix IX. Sincerely yours, Signed by: Cathleen A. Berrick: Managing Director, Homeland Security and Justice Issues: [End of section] Appendix I: Objectives, Scope, and Methodology: The objectives of this report were to: (1) determine the extent that federal and industry stakeholders assessed or supported assessments of the security risks to mass transit and passenger rail since 2004, and how, if at all, TSA used risk assessment information to inform and update its security strategy; (2) describe key actions, if any, that federal and industry stakeholders implemented or initiated, since 2004, to strengthen the security of mass transit and passenger rail systems, the extent to which federal actions were consistent with TSA's security strategy, and what challenges, if any, TSA faces in implementing these actions; and (3) describe TSA's reported status in implementing provisions of the Implementing Recommendations of the 9/11 Commission Act of 2007 related to mass transit and passenger rail security, and discuss challenges, if any, TSA and the mass transit and passenger rail industry face in implementing the actions required by the act. To determine the extent that federal and industry stakeholders have assessed or supported assessments of the security risks to mass transit and passenger rail since 2004, and how, if at all, TSA has used risk assessment information to inform and update its security strategy, we obtained and analyzed various reports that address some or all elements of security risk (threat, vulnerability, and consequence) from DHS component agencies, including TSA, the DHS Office of Infrastructure Protection within the National Protection and Programs Directorate (NPPD), and the Homeland Infrastructure Threat Reporting and Analysis Center (HITRAC). We also reviewed information on risk-related assessments conducted by federal agencies, including mass transit and passenger rail security vulnerability assessments conducted by DOT's Federal Transit Administration (FTA), and a variety of federally developed security risk assessment tools for the mass transit and passenger rail industry. Additionally, we reviewed TSA's Baseline Assessment for Security Enhancement (BASE) review checklist and fiscal year 2007 BASE report of the results of BASE reviews that TSA conducted at 44 of the top 50 largest mass transit and passenger rail agencies--by ridership--as a measure of TSA's efforts to gather vulnerability information. We gathered information on TSA's consequence assessments through interviews with Transportation Sector Network Management (TSNM) officials. We also interviewed TSNM officials in order to assess how risk assessments were informing TSA's security strategy for mass transit and passenger rail and then compared TSA's actions to GAO and DHS reports on risk assessment.[Footnote 77] Because of the scope of our work, we relied on TSA to identify its assessment activities but did not assess the extent to which its assessment activities meet the National Infrastructure Protection Plan criteria for threat, vulnerability, and consequence assessments. To further assess risk assessment efforts, we interviewed federal officials from DHS's HITRAC, TSA's Office of Intelligence, TSA's Surface Transportation Security Inspection Program, and, at DOT, FTA's Office of Safety and Security to understand what additional assessment information or assistance on risk assessments was available to either TSA or the transit agencies. Further, we interviewed security officials from Amtrak and 30 mass transit and passenger rail agencies across the nation. This sample allowed us to meet with agencies of varying sizes and types to determine their perspectives on federal and mass transit and passenger rail industry risk assessment efforts to date (see objective 2 for how these agencies and cities were selected). Additionally, we reviewed TSA's strategic planning document--the Mass Transit Modal Annex to the Transportation System - Sector Specific Plan (TS-SSP) issued in May 2007--and identified federal guidelines for developing a risk-based security strategy. Specifically, to determine the extent to which TSA's strategy conformed to requirements and best practices, we reviewed relevant statutory requirements of the Government Performance and Results Act of 1993 (GPRA) that included general requirements that are applicable in the establishment of government strategies and programs, and the Implementing Recommendations of the 9/11 Commission Act of 2007, which included requirements for establishing a security strategy. For example, we reviewed existing Executive Directives, including Homeland Security Presidential Directives 1, 7, and 8, and Executive Order 13416: Strengthening Surface Transportation Security to determine the extent to which TSA's Mass Transit Modal Annex conformed to these requirements. We also analyzed executive guidance documents outlining best practices for effectively implementing a risk management framework, and in particular, risk assessment best practices, including both the DHS National Infrastructure Protection Plan (NIPP) and the TS- SSP. We also reviewed GAO best practice criteria for developing a successful national strategy and compared the Mass Transit Modal Annex against it. Finally, to identify the extent to which TSA is measuring its performance in implementing its mass transit and passenger rail security programs, we reviewed DHS and TSA documents, including the Modal Annex, DHS Critical Infrastructure and Key Resources Annual Reports, and Surface Transportation Regulatory Activities Plan, as well as the Office of Management and Budget's Program Assessment Rating Tool (PART), which assessed the adequacy and effectiveness of these program measures. To identify and describe the key actions federal and industry stakeholders have implemented or initiated since 2004 to strengthen the security of mass transit and passenger rail systems, the extent to which federal actions are consistent with TSA's security strategy, and the challenges, if any, that TSA has faced in making these actions effective, we interviewed officials from DHS and DOT. From DHS, we interviewed officials from TSA's Surface Transportation Security Inspection Program within the Office of Security Operations, TSA's Office of Security Technology, and, within TSA's Office of Law Enforcement, the Federal Air Marshal Service (which plays a lead role in implementing VIPR Operations). We also interviewed officials from DHS's Science and Technology Directorate and Federal Emergency Management Agency's Grants Programs Directorate. Within DOT, we interviewed officials from FTA's Office of Safety and Security and also the Federal Railroad Administration. We also interviewed officials from the three federally sponsored mass transit employee training providers-- the National Transit Institute, Transportation Safety Institute, and Johns Hopkins University--to obtain information on training they offered to mass transit and passenger rail employees and their perspectives on TSA's Mass Transit Security Training Program. To obtain information on industry security actions and perspectives on federal mass transit and passenger rail security actions, we conducted site visits at, or held teleconferences with, officials representing 30 mass transit and passenger rail systems across the nation--representing 75 percent of the nation's total mass transit and passenger rail ridership--based on information we obtained from the Federal Transit Administration's National Transit Database and the American Public Transportation Association (APTA). We selected this non-probability sample of mass transit and passenger rail systems and cities because of their high levels of ridership, geographic dispersion, experience with TSA security assessments, eligibility for grant funding, and expert recommendation. Because we selected a non-probability sample of mass transit and passenger rail agencies, the information obtained from these site visits cannot be generalized to all transit agencies nationwide. However, we determined that the selection of these sites was appropriate for our design and objectives and that the selection would provide valid and reliable evidence. The information we obtained provided us with a broad overview of the types of actions taken to strengthen security. Table 1 lists the mass transit and passenger rail systems we interviewed. Table 7: Mass Transit and Passenger Rail Systems Interviewed: Mass transit and/or passenger rail system: Bay Area Rapid Transit (BART); Urban area served: San Francisco-Oakland, California. Mass transit and/or passenger rail system: Broward County Office of Transportation (BCT); Urban area served: Broward County, Florida. Mass transit and/or passenger rail system: CALTRAIN; Urban area served: San Francisco and San Jose, California. Mass transit and/or passenger rail system: Chicago Transit Authority (CTA); Urban area served: Chicago, Illinois. Mass transit and/or passenger rail system: Dallas Area Rapid Transit (DART); Urban area served: Dallas, Texas. Mass transit and/or passenger rail system: Delaware River Port Authority (PATCO); Urban area served: New Jersey and Philadelphia, Pennsylvania. Mass transit and/or passenger rail system: Fort Worth Transportation Authority (The T); Urban area served: Fort Worth, Texas. Mass transit and/or passenger rail system: King County Department of Transportation - Metro Transit Division (King County Metro); Urban area served: Seattle, Washington. Mass transit and/or passenger rail system: Los Angeles County Metropolitan Transportation Authority (LACMTA); Urban area served: Los Angeles, California. Mass transit and/or passenger rail system: Maryland Transit Administration (MTA); Urban area served: Greater Washington, D.C., and Maryland. Mass transit and/or passenger rail system: Massachusetts Bay Transportation Authority (MBTA); Urban area served: Boston, Massachusetts. Mass transit and/or passenger rail system: METRA Commuter Rail; Urban area served: Chicago, Illinois. Mass transit and/or passenger rail system: Metropolitan Atlanta Rapid Transit Authority (MARTA); Urban area served: Atlanta, Georgia. Mass transit and/or passenger rail system: Metro Transit; Urban area served: Minneapolis, Minnesota. Mass transit and/or passenger rail system: Metropolitan Transit Authority of Harris County (Houston Metro); Urban area served: Houston, Texas. Mass transit and/or passenger rail system: Miami Dade Transit; Urban area served: Miami, Florida. Mass transit and/or passenger rail system: New Jersey Transit; Urban area served: Newark, New Jersey - New York, New York. Mass transit and/or passenger rail system: New York Metropolitan Transit Authority (MTA); Urban area served: New York, New York. Mass transit and/or passenger rail system: Orange County Transportation Authority (OCTA); Urban area served: Orange County, California. Mass transit and/or passenger rail system: Pierce County Public Transportation Benefit Area (Pierce Transit); Urban area served: Tacoma - Seattle, Washington. Mass transit and/or passenger rail system: Port Authority Trans Hudson (PATH); Urban area served: New York, New York--New Jersey. Mass transit and/or passenger rail system: Santa Clara Valley Transportation Authority (VTA); Urban area served: San Jose, California. Mass transit and/or passenger rail system: South Florida Regional Transportation Authority (SFRTA); Urban area served: Miami, Florida. Mass transit and/or passenger rail system: Southern California Regional Rail Authority (Metrolink); Urban area served: Greater Los Angeles, California. Mass transit and/or passenger rail system: San Francisco Municipal Railway (MUNI); Urban area served: San Francisco, California. Mass transit and/or passenger rail system: Sound Transit (Sounder); Urban area served: Seattle, Washington. Mass transit and/or passenger rail system: Southeastern Pennsylvania Transportation Authority (SEPTA); Urban area served: Philadelphia, Pennsylvania. Mass transit and/or passenger rail system: TRIMET; Urban area served: Portland, Oregon. Mass transit and/or passenger rail system: Virginia Railway Express (VRE); Urban area served: Northern Virginia, Greater Washington, D.C. Mass transit and/or passenger rail system: Washington Metropolitan Area Transit Authority (WMATA); Urban area served: Washington, D.C. Source: GAO and TSA data. [End of table] We also interviewed Amtrak headquarters officials and visited three Amtrak station locations in the Northeast Corridor. During site visits to mass transit and passenger rail agencies, we interviewed security officials, toured stations and other facilities such as control centers, and observed security practices. Further, we interviewed TSA surface transportation security inspectors from the 13 field offices responsible for overseeing the passenger rail and mass transit systems we visited, and in one case, observed the inspectors conduct a BASE review of a mass transit system. We also interviewed state officials with homeland security responsibilities, representatives of the American Public Transportation Association, and where applicable, regional transportation authority officials. To determine the extent to which federal and industry actions were consistent with TSA's security strategy, we reviewed TSA and FTA documentation describing ongoing programs and compared them with the strategic objectives, programs, and actions TSA described in its Mass Transit Modal Annex. To further assess federal and industry actions, and identify potential challenges, we reviewed DHS and DOT documents relevant to federal and industry stakeholder actions to secure passenger rail and mass transit systems. For example, we reviewed program documentation for TSA's Mass Transit Security Training Program, as well as FTA's 2009 Final Draft of Training Curriculum Development Guidelines and federal transit employee training curricula. We also reviewed TSA's Surface Transportation Security Inspection Program Standard Operating Procedures, strategic and annual plans, and documentation of completed mass transit and passenger rail security assessments. We also reviewed TSA's Concept of Operations (CONOPS) for its Visible Intermodal Prevention and Response (VIPR) program--TSA's program for deploying security personnel to augment security on mass transit and passenger rail systems--to identify guidelines TSA has established for implementing the program. We then obtained a list of VIPR operations, by location and date, that TSA reported conducting in mass transit and passenger rail systems immediately following its issuance of the CONOPS in October 2007. We obtained and matched this list with information found in electronic copies of all TSA VIPR operation plan after-action reports (AAR)-- describing the results and challenges encountered during VIPR operations that TSA conducted at mass transit and passenger rail systems from November 2007 through July 2008. We chose to review after- action reports for this period to determine the impact of guidance TSA issued in October 2007, to improve its implementation of the VIPR program. Both the initial list and after-action reports identified 108 VIPR operations; however, we reviewed 104 of these.[Footnote 78] Two analysts independently coded the challenges noted on each of the reports. They discussed differences until agreement could be reached on the most appropriate challenge category. We also conducted a site visit to the Transportation Security Operations Center to interview officials with TSA's Federal Air Marshal Service within the Office of Law Enforcement--which manages the VIPR program--to discuss the challenges identified in the after-action reports. We also obtained access to, and reviewed, the DHS Homeland Security Information Network -Public Transit Portal secure Web communication system to identify the type and extent of security technology information that TSA had made available to industry users of the system, and identified and reviewed best practices applicable to R&D programs identified by leading research organizations, such as the National Research Council of the National Academy of Sciences, in order to establish criteria for evaluating federal and industry coordination in research and development efforts. We also reviewed two DHS-IG reports and found the quality of the methods used to develop these reports sufficient for use as a source in this report. For the final objective, to determine the status of TSA's implementation of 9/11 Commission Act requirements for mass transit and passenger rail, and challenges, if any, that TSA and the mass transit and passenger rail industry face in meeting these requirements, we reviewed the 9/11 Commission Act to identify DHS and industry requirements related to mass transit and passenger rail security. We also reviewed TSA status reports outlining the agency's reported status in satisfying various 9/11 Commission Act provisions related to mass transit and passenger rail security. However, we did not verify the accuracy of TSA's reported status in implementing these 9/11 Commission Act requirements. To identify potential challenges TSA and the mass transit and passenger rail industry may face in implementing various 9/ 11 Commission Act requirements, we interviewed TSA headquarters officials from the Transportation Security Network Management--Mass Transit division, including the Deputy General Manager, and officials from TSA's Surface Transportation Security Inspection Program, including the headquarters based Program Chief, and Surface Transportation Security Inspectors from 13 of 54 field offices, including 11 of 12 Assistant Federal Security Directors for Surface. [Footnote 79] We also reviewed TSA program documents relating to its inspection program including strategic and annual inspection plans, standard operating procedures, and memorandums and directives documenting organizational and staffing plans. Moreover, to obtain information on industry perspectives of potential challenges, we interviewed officials from 30 mass transit and passenger rail systems and Amtrak as well as APTA. In addition, we obtained and reviewed various reports which discuss the federal or industry role in implementing the 9/11 Commission Act, including recent reports issued by the DHS-IG, Congressional Research Service, and a January 2008 report prepared by six Assistant Federal Security Directors for Surface. We conducted this performance audit from September 2007 through June 2009 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. [End of section] Appendix II: TSA/FTA Security and Emergency Management Action Items: The following list of voluntary Security and Emergency Management Action Items is an update to the Federal Transit Administration's Top 20 Security Program Action Items originally released in January 2003. The update has been developed by FTA and the Department of Homeland Security's Transportation Security Administration and Office of Grants & Training in consultation with the public transportation industry through the Mass Transit Sector Coordinating Council, for which the American Public Transportation Association serves as Executive Secretary. The updated action items address current security threats and risks that confront transit agencies, with particular emphasis on priority areas where gaps need to be closed in security and emergency preparedness programs. Though this update consolidates the previous 20 items into 17, the purpose, scope, and objectives remain consistent. Management and Accountability: 1. Establish written security plans and emergency management plans. 2. Define roles and responsibilities for security and emergency management. 3. Ensure that operations and maintenance supervisors, forepersons, and managers are held responsible for security issues under their control. 4. Coordinate security and emergency management plan(s) with local and regional agencies. Security and Emergency Response Training: 5. Establish and maintain a security and emergency training program. Homeland Security Advisory System: 6. Establish plans and protocols to respond to the DHS Homeland Security Advisory System threat levels. Public Awareness: 7. Implement and reinforce a Public Security and Emergency Awareness Program. Drills and Exercises: 8. Conduct tabletop and functional drills. Risk Management and Information Sharing: 9. Establish and use a risk management process to assess and manage threats, vulnerabilities and consequences. 10. Participate in an information sharing process for threat and intelligence information. 11. Establish and use a reporting process for suspicious activity (internal and external). Facility Security and Access Controls: 12. Control access to security critical facilities with ID badges for all visitors, employees, and contractors. 13. Conduct physical security inspections. Background Investigations: 14. Conduct background investigations of employees and contractors. Document Control: 15. Control access to documents of security critical systems and facilities. 16. Ensure existence of a process for handling and access to Sensitive Security Information (SSI). Security Audits: 17. Conduct security program audits. [End of section] Appendix III: Identifying Characteristics of Successful National Strategies in the Context of Mass Transit and Passenger Rail Security: To help the federal government develop sound national strategies, we have previously identified six desirable characteristics of successful national strategies, including (1) purpose, scope, and methodology of the strategy; (2) risk assessment; (3) goals, subordinate objectives, activities, and performance measures; (4) resources and investments; (5) organizational roles, responsibilities, and coordination; (6) integration and implementation.[Footnote 80] We discussed four of these characteristics in the body of the report, and below we discuss the other two characteristics.[Footnote 81] Where applicable, we link relevant sections of Executive Order 13416 to highlight the importance of these measures to strengthen the passenger rail and mass transit security national strategy. Purpose, Scope, and Methodology: This characteristic addresses why the strategy was produced, the scope of its coverage, and the process by which it was developed. For example, a strategy might discuss the specific impetus that led to its creation, such as statutory requirements, executive mandates, or other events--such as terrorist attacks. In addition to describing what the strategy is meant to do and the major functions, mission areas, or activities it covers, a national strategy would ideally also outline its methodology. For example, a strategy might discuss the principles or theories that guided its development, what organizations or offices drafted the document, whether it was the result of a working group, or which parties were consulted in its development. TSA's Mass Transit Modal Annex identifies the purpose and scope of the Modal Annex and references several principle documents used to develop the Modal Annex--including the Presidential Executive Order 13416: Strengthening Surface Transportation Security, the Transportation System-Sector Specific Plan (TS-SSP), and the National Infrastructure Protection Plan. It also describes the process or methodology that was used and who developed the Annex. For example, the Modal Annex states that TSA's vision is to provide a secure, resilient transit system that leverages public awareness, technology, and layered security programs while maintaining the efficient flow of passengers and encouraging the expanded use of the nation's transit services. The Modal Annex also discusses the scope and type of various federal and industry mass transit and passenger rail security efforts and aligns them with three broad DHS security goals for the transportation sector, as outlined in the TS-SSP.[Footnote 82] In addition, the Modal Annex references the National Infrastructure Protection Plan as a source for developing security programs for mass transit and passenger rail systems, and it also discusses several domestic and international terrorist attacks that have occurred as evidence of the various security risks to the mass transit and passenger rail systems.[Footnote 83] Furthermore, the Modal Annex explains the methodology used in its development, as called for in our prior work on characteristics of a national strategy. In addition to referencing the National Infrastructure Protection Plan and the TS-SSP as literatures providing the principles or theories that guided the development of the Modal Annex, the Modal Annex also describes the process and information that were used to develop the strategy and identified entities that contributed to its development. For example, the strategy describes how mass transit and passenger rail security programs and initiatives are developed and implemented and how they are aligned with the overall transportation sector goals and objectives and mass transit and passenger rail modal strategies and objectives. Also, the Modal Annex identifies the Transit, Commuter and Long Distance Rail Government Coordinating Council (TCLDR-GCC), the Mass Transit Sector Coordinating Council (SCC), the Critical Infrastructure Partnership Advisory Council, and TSA's Mass Transit Division as entities involved in developing the transportation security strategic policy. Integration and implementation: This characteristic addresses both how a national strategy relates to other strategies' goals, objectives, and activities and to subordinate levels of government and their plans to implement the strategy. For example, a national strategy could discuss how its scope complements, expands upon, or overlaps with other national strategies, such as DHS efforts to mitigate transportation risks. Also, related strategies could highlight their common or shared goals, subordinate objectives, and activities. Similarly, the Executive Order requires that the Modal Annex identify existing security guidelines and requirements. To meet these requirements and because protecting the mass transit and passenger rail systems is a shared responsibility among many stakeholders, the Modal Annex could identify regulations and programs that affect the security of the mass transit and passenger rail systems. In addition, a strategy could address its relationship to other agency strategies using relevant documents from implementing organizations, such as strategic plans, annual performance plans, or annual performance reports that GPRA requires of federal agencies. A strategy might also discuss, as appropriate, various strategies and plans produced by the state, local, or private sectors and could provide guidance such as the development of national standards to more effectively link together the roles, responsibilities, and capabilities of the implementing parties. TSA's Modal Annex delineates mechanisms to facilitate stakeholders coordination, specifically the TCLDR-GCC and the Mass Transit SCC, discusses other relevant industry security plans, and identifies regulations and programs such as the regulation on designating a rail security coordinator and security programs related to public awareness and training that affect the security of the mass transit and passenger rail systems. The Modal Annex also addresses its relationship with strategic documents or activities of other federal agencies that have a role in mass transit and passenger rail security, such as those that guide FTA, which has a supporting role along with TSA for protecting mass transit and passenger rail systems. For example, the Modal Annex mentions how FTA's activities, such as the State Safety Oversight Agencies audit program and FTA's Section 5307 grant program fit into TSA's overall strategy for securing mass transit and passenger rail systems. The Modal Annex also mentions DHS-DOT collaborative efforts through their memorandum of understanding such as the development of public transportation annex delineating areas of coordination to assist transit agencies in prioritizing and addressing security related needs. In addition, the Modal Annex points out how it relates to the National Strategy for Transportation Security required by the Intelligence Reform and Terrorism Prevention Act of 2004.[Footnote 84] For example, it explains how TSA's effort in building security force multipliers through security training for front-line employees of mass transit and passenger rail systems directly supports the National Priorities, the National Preparedness Goal, and the National Strategy for Transportation Security. By providing such information, the agency is identifying linkages with other developed strategies and other organizational roles and responsibilities. [End of section] Appendix IV: Federal Actions Taken to Enhance Mass Transit and Passenger Rail Security since 2004: This appendix expands on the list of key actions identified in the body of the report in table 5. This table presents a more comprehensive list of federal actions taken to enhance mass transit and passenger rail security since 2004. Table 8: Federal Actions Taken to Enhance Mass Transit and Passenger Rail Security since 2004: Category: Deploying Manpower: Program: Surface Transportation Security Inspection Program (STSIP); Lead agency: TSA; Description: Established in 2005, TSA's Surface Transportation Security Inspectors (TSI-S) serve as the agency's field force for conducting non- regulatory security assessments, outreach, and technical assistance with the nation's largest mass transit agencies, as well as participating in VIPR security operations at key transit and passenger rail locations. TSA reported that, as of February 2009, TSI-S had conducted non-regulatory security posture assessments--BASE reviews--of 91 mass transit and passenger rail agencies, including 82 of the largest agencies, and over 1,350 site visits to mass transit rail stations--Station Profiles--to gather detailed information pertaining to their physical security elements, geography, and emergency points of contact. Program: Visible Intermodal Prevention and Response (VIPR) Program; Lead agency: TSA; Description: TSA, to date, has reported deploying over 800 teams of various TSA personnel to augment the security of mass transit and passenger rail systems and promote the visibility of TSA. Working alongside local security and law enforcement officials, VIPR teams conduct a variety of security tactics to introduce unpredictability and deter potential terrorist actions, including random high visibility patrols at mass transit stations and conducting passenger and baggage screening operations using specially trained behavior detection officers and a varying combination of explosive detection canine teams and explosives detection technology. Program: National Explosive Detection Canine Team Program (NEDCTP); Lead agency: TSA; Description: In 2005, TSA expanded the NEDCTP from aviation into mass transit. TSA has worked in partnership with mass transit systems to procure, train, certify, and deploy 88 explosives detection canine teams to 15 participating mass transit systems nationwide to provide mobile and flexible deterrence and explosives detection capabilities. TSA provides the canine training for the handler and the dogs and also allocates funds to cover costs associated with continued training and maintenance of the team, while the transit system commits a handler to attend the TSA training and receive program certification. Category: Coordinating with federal and industry stakeholders and issuing guidance: Program: Mass Transit Modal Annex; Lead agency: TSA; Description: In 2007, TSA, in coordination with FTA, issued the Mass Transit Modal Annex to serve as the federal strategy for achieving the objectives and priorities laid out in the Transportation Systems-Sector Specific Plan. The Modal Annex outlines security programs and activities--initiated largely by TSA, but including FTA and other federal stakeholders--to enhance the security of the nation's mass transit and passenger rail systems. Program: DHS/DOT memorandum of understanding (MOU) for coordination of roles/responsibilities; Lead agency: TSA, FTA; Description: Through a 2004 MOU and 2005 annex DOT (FTA) and DHS (TSA) agreed to closely coordinate their mass transit and passenger rail programs and services in developing mass transit and passenger rail security guidance and regulations, with TSA as the lead agency. The agreements confirm TSA as having the lead role for transportation security and DOT as having a supporting role for providing technical assistance and assisting DHS in the implementation of its security policies. Program: Transit, Commuter and Long Distance Rail Government Coordinating Council and Mass Transit Sector Coordinating Council (GCC/SCC) Joint Working Groups; Lead agency: TSA, FTA; Description: In 2007, under the Transit, Commuter and Long Distance Rail Government Coordinating Council (GCC) and Mass Transit Sector Coordinating Council (SCC) framework, TSA and FTA collaborated with the American Public Transportation Association to establish working groups composed of federal and industry mass transit and passenger rail security stakeholders to serve as a modal coordinating council for the mass transit and passenger rail modes. Working groups were established in three substantive areas: security training, security technology, and grants. Program: Transit Policing and Security Peer Advisory Group (PAG); Lead agency: TSA; Description: In late 2006, TSA established the monthly Transit Policing and Security Peer Advisory Group (PAG) to bring together 16 transit police chiefs and security directors from Amtrak and major transit systems across the nation to act as a consultative forum for advancing the security concerns of transit systems. Program: Transit Safety and Security Roundtables; Lead agency: TSA, FTA; Description: Administered in 2003 and 2004 by FTA, and jointly administered since 2005, TSA and FTA have convened semi-annual Transit Safety and Security Roundtables to serve as a means for representatives of the 50 largest mass transit agencies to share security-related ideas and information. Program: Coordinated Security Surges; Lead agency: TSA; Description: Coordinated effort integrating TSA with mass transit and passenger rail agencies and law enforcement partners in the systems' operating areas. TSA reported initiating the program with planning, coordination, and execution of "Northeast Corridor Rail Security Day" in September 2008, a surge operation that brought officers from nearly 120 law enforcement agencies to some 150 Amtrak, commuter rail, and rail transit stations from Fredericksburg, Virginia to Portland, Maine. Program: Security Standards; Lead agency: TSA, FTA; Description: In accordance with the DOT-DHS MOU annex, FTA is leading an initiative with TSA to develop security standards for mass transit and passenger rail systems, with a focus on recommended procedures and practices. FTA has funded APTA to administer this initiative, and as of March 2009, APTA had issued six security standards related to security emergency management, security infrastructure, and security risk management. Program: Smart Security Practices List; Lead agency: TSA; Description: In June 2008, TSA disseminated to the mass transit industry a list of 55 smart security practices listing the most effective security activities, measures, practices, and procedures inspectors had identified in TSA mass transit security assessments. TSA plans to periodically expand this list as it continues to identify additional smart practices through its security assessments. Program: Mass Transit Security Training Program; Lead agency: TSA, FEMA, FTA; Description: In early 2007, to improve the quality and scope of transit agency employee security training, TSA established the Mass Transit Security Training Program to provide transit agencies with curriculum guidance and expedited grant funding to cover training costs. FEMA administers the funding through the Transit Security Grant Program. The program is largely based on courses developed and financially supported by FTA. For example, among other things, FTA funds and supports delivery of a variety of security training, including 17 security training programs for mass transit and passenger rail agency employees. Program: Connecting Communities Public Transportation Emergency Preparedness Workshops; Lead agency: FTA, TSA; Description: Established by FTA in 2002 and funded by both FTA and TSA, these 2-day workshops are designed to facilitate coordination between federal stakeholders and the local agencies that respond to transit emergencies. TSA and FTA share transit policies, procedures, resources, and effective practices with local first responders and discuss emergency management and response, including the roles of federal, state, and local emergency management offices. FTA and TSA convene these workshops several times per year in cities nationwide. Program: Transit Watch; Lead agency: TSA/FTA; Description: To boost public vigilance and awareness of potential terrorist threats, Transit Watch was introduced in 2003 as a nationwide safety and security awareness program designed to encourage the active participation of transit passengers and employees. Via the program, TSA/FTA jointly created templates for use by transit agencies to produce security-awareness materials, such as posters and flyers. Program: Bomb Squad Response to Transportation Systems; Lead agency: TSA; Description: TSA reported that through training and scenario-based exercises, this program expands regional capabilities to respond to a threat or incident involving a suspected explosive device in mass transit and passenger rail systems. Bomb technicians from law enforcement forces in the system's operating area are placed in the mass transit or passenger rail environment to confront exercise situations necessitating coordinated planning and execution of operations to identify, resolve, and, if appropriate, render harmless improvised explosive devices. TSA reported that as of May 2009, this program has been conducted at three mass transit locations. Program: Employee Awareness Program; Lead agency: TSA; Description: TSA reported that this program produces posters and tip cards for frontline employees emphasizing the critical importance of observing and reporting in terrorism prevention. The products are adapted to the partnering agency, applying its logo, system images, and employees' quotes. Category: Developing security technology and providing technology information: Program: Security Technology Research and Development; Lead agency: DHS S&T/TSA; Description: DHS Science and Technology Directorate and TSA collaborate to research, develop, and test various security technologies for applicability in the mass transit and passenger rail modes, including explosive trace detection technologies, infrastructure protection measures, and behavior based and advanced imaging technologies. Program: Homeland Security Information Network Public Transit Portal; Lead agency: TSA; Description: In 2006, TSA established the Public Transit Portal of the Homeland Security Information Network, a secure, web-based communications system to provide the mass transit industry with information on threats, best practices, and security technologies. Program: Transportation Research Board; Lead agency: FTA; Description: FTA sponsors academic research from the Transportation Research Board (TRB), which is one of six divisions within the National Research Council. The National Research Council serves as an independent advisor to the federal government and others on scientific and technical questions of national importance. TRB has produced several reports on public transportation security, such as a report on mass transit passenger security inspections procedures and technology. Source: GAO analysis of DHS and DOT information. [End of table] [End of section] Appendix V: Modal Annex Objectives and Examples of Actions Taken to Achieve Them as of February 2009: Table 9: TSA Mass Transit Modal Annex Objectives and Examples of Actions That Have Been Employed to Achieve the Objectives, as of February 2009: Modal Annex mass transit objective: * Employ technology for screening passengers and bags in random applications throughout the mass transit and passenger rail systems as appropriate; Action to achieve objective: Explosive detection technology screening employed during VIPR operations. Modal Annex mass transit objective: * Bolster screening technology efforts with a program for random searches of passengers' bags entering system; Action to achieve objective: Screening programs introduced by select major transit agencies. Modal Annex mass transit objective: * Affect regional approach through coordinated planning among federal, local, and mass transit security stakeholders to maximize application of available security resources through multiple teams for random, unpredictable activities; Action to achieve objective: TSA VIPR operations and coordinated security surges. Modal Annex mass transit objective: * Conduct Security Readiness assessments; Action to achieve objective: TSA BASE reviews. Modal Annex mass transit objective: * Coordinate with system security officials to examine capabilities of transit agencies and front-line employees in identifying and reporting suspicious items and activities; Action to achieve objective: TSA Security Analysis and Action Program Assessments. Modal Annex mass transit objective: * Use covert testing to test awareness and reporting by employees and passengers; Action to achieve objective: N/A[A]. Modal Annex mass transit objective: * Improve flow of threat and other security information through outreach and regional intelligence and information-sharing centers; Action to achieve objective: Joint Terrorism Task Force mass transit threat briefings[B] and TSA mass transit security awareness messages[C]. Modal Annex mass transit objective: * Coordinate focused transit system employee training to be aligned with needs and requirements of mass transit agencies; Action to achieve objective: TSA Mass Transit Security Training Program. Modal Annex mass transit objective: * Employ all available media-public address system announcements in public awareness programs; Action to achieve objective: TSA Employee Awareness Poster Program[D]. Source: GAO Analysis of TSA information and Mass Transit Modal Annex. [A] As of February 2009, due to potential safety risks and potential disruptions to transit operations, TSA has elected not to conduct covert testing of passenger rail and mass transit systems. [B] DHS, TSA, and the Federal Bureau of Investigation (FBI) conduct Joint Terrorism Task Force (JTTF) Mass Transit Threat Briefings on a quarterly basis, or as threats or security incidents warrant, bringing together mass transit and passenger rail security directors and law enforcement chiefs with their federal security partners in 15 metropolitan areas simultaneously through the secure video teleconferencing system maintained in the JTTF network. [C] Through its Mass Transit Security Awareness Messages, TSA periodically disseminates unclassified threat information to mass transit and passenger rail security and management officials to increase vigilance and preparedness and practical guidance on how to enhance security. [D] Through the Employee Awareness Poster Program, TSA partners with mass transit and passenger rail agencies to produce tailored posters specifically focused on transit employee security awareness. TSA develops a common theme, transit agencies provide graphics, logos, and quotations, and TSA tailors the posters for use by the transit agencies. [End of table] [End of section] Appendix VI: DHS Mass Transit and Passenger Rail Related Security Technology Pilots Conducted from 2004 to 2009: Table 10: DHS Mass Transit and Passenger Rail Related Security Technology Pilots Conducted from 2004 to 2009: Pilot program: Program for Response Options and Technology Enhancement for Chemical/Biological Terrorism (PROTECT); Description: Technology is an automated network of chemical sniffers, TV cameras, and computers that provides early warning of chemical attack, as well as intelligent emergency response management; Status: Evaluation is completed. In March 2003, it became the nation's first permanently installed detection system for chemical attacks in a public place. PROTECT can be found in three major cities. Pilot program: Transit and Rail Inspection Pilot (TRIP); Description: Three phase pilot program launched in 2004 that evaluated the feasibility of using checkpoint style passenger screening, explosive trace detection systems for passenger checked baggage, and evaluated the feasibility of modifying a passenger rail car by installing screening technologies within it and conducting passenger screening operations while the train was moving at normal speed; Status: Evaluation is completed. TSA found that the screening technologies and processes tested would be difficult to implement on more heavily used passenger rail systems. TSA concluded that the screening technologies could be used randomly or during certain high- risk events. For example, similar technologies were used by TSA to screen certain passengers and belongings in Boston and New York during the Democratic and Republican national conventions, respectively, in 2004. Pilot program: Conventional screening technology adaptation pilot program (Countermeasures Test Beds Rail Security Pilot); Description: Congressionally mandated project which included testing the feasibility of adapting airport security checkpoint screening technologies and procedures to screen rail passengers and baggage for explosives and testing technologies that would be integrated into fare card purchasing machines to detect trace levels of explosive residue on the hands of passengers; Status: Evaluation is completed. Though DHS found that several of the technologies could be adapted to function on mass transit in the near term, it identified several obstacles that needed to be overcome, including high technology costs, high personnel requirements, high false-alarm rates, and reduced passenger throughput. Pilot program: Mobile security checkpoints; Description: Tested the rapid deployment of the "screener in a box" - a full airport-style x-ray checkpoint passenger and baggage screening system that fits into two standard-sized shipping containers; Status: Evaluation is completed. The pilot determined that the checkpoint could be used for screening passengers at a moderately busy transit platform, but coordination and logistical support, storage, screeners, and set-up challenges make these checkpoints suitable only for short term, high threat use in mass transit and passenger rail. The unit is now maintained for deployment in situations of heightened alert. Pilot program: Advanced Screening Equipment - SPO-20 deployment; Description: As part of TSA's increased security presence at the nation's major transportation centers on July 4 2007, TSA tested the rapid deployment of the SPO-20, a passive millimeter wave screening device that can scan large crowds for body-borne improvised explosive devices; Status: Evaluation is completed. TSA reported the pilot successfully screened almost all passengers at a busy transit station with few false alarms. The most significant challenge came from the fact that TSA gave the transit agency less than 24 hours to coordinate the SPO-20's deployment, which caused some logistical and training issues. TSA concluded that pre-deployment site visits and coordinating meetings are crucial to successful deployment. Pilot program: Resilient tunnel; Description: In 2003-2004, DHS S&T conducted an assessment of the nation's 29 underground and underwater tunnels for mass transit and passenger rail to identify ways to mitigate vulnerabilities that terrorists using improvised explosive devices could exploit to cause catastrophic failure of an underground transit tunnel; Status: Ongoing. In fiscal year 2007, the project surveyed concepts for tunnel protection and identified existing European inflatable tunnel protection systems that could be used to limit the spread of fire caused by an explosion. DHS S&T plans to complete and demonstrate a prototype inflatable tunnel protection system by fiscal year 2010. Pilot program: Bus communications and control; Description: In 2006, TSA and DHS S&T developed the ability to remotely disable a bus using engine control technologies and therefore prevent its use as a delivery device for a weapon of mass destruction; Status: Ongoing. In fiscal year 2007, the project began with full field operational testing, which will continue through fiscal year 2009. Pilot program: Standoff technology demonstration program; Description: A field testing program intended to accelerate the development of promising standoff detection technologies and adapted checkpoint screening systems. The program's objectives include testing and evaluating technologies, developing concept of operation plans, and to developing agile test beds to evaluate technologies; Status: Ongoing. In fiscal year 2010, the program will demonstrate an integrated system of technologies to detect a left-behind IED or a suicide bomber in commuter rail. Pilot program: Future Attribute Screening Technologies Mobile Module (FASTM2); Description: This module is developing real-time, mobile screening technologies to automatically detect behavior indicative of mal-intent at security checkpoints such as border crossings, transportation portals, and other critical infrastructures; Status: Ongoing. In fiscal year 2009, the project plans to conduct a prototype demonstration of real-time intent detection capability. Pilot program: Infrastructure Blast Mitigation Project; Description: Project is developing proof-of-concept technologies to mitigate the explosive and damaging force from an IED. This project will include basic research studies on advanced mitigation technologies, including new glass materials and deflecting structures that reduce damage to infrastructure or personnel; Status: Ongoing. In fiscal year 2009, the project plans to begin developing models to further determine the vulnerability of infrastructure, bridges, and tunnels to various explosive threats. Pilot program: Automated Carry-on Detection Project; Description: Project develops advanced capabilities to detect explosives and concealed weapons, including home-made explosives. This project will introduce new standalone technologies or adjunct technologies to Computed Tomography technology to continue improving detection performance and the detection of novel explosives; Status: Ongoing. In fiscal year 2009, the project plans to award a development contract for the detection of novel explosives in what are called "next generation" checkpoint systems. Pilot program: Concrete Mats for Tunnel Protection; Description: Project is testing articulated concrete mats, which are composed of individual concrete blocks held together by a series of cables, for their potential effectiveness in protecting underwater transportation tunnels; Status: Ongoing. In fiscal year 2006, a series of scaled experiments in geotechnical centrifuge was initiated to evaluate the effectiveness of the mats for tunnel protection. In February 2009, the third phase of the experimental testing was nearing completion, after which a report will be generated. All work has been coordinated with a specific mass transit agency to inform the operational deployment of the mats once the project is finished. Source: GAO analysis of TSA and DHS documents. [End of table] [End of section] Appendix VII: Comments from Amtrak: Amtrak: June 15, 2009: Ms. Cathy Berrick: Managing Director: Homeland Security and Justice: U.S. Government Accountability Office: 441 G Street. NW: Washington, DC 20548: Dear Ms. Berrick: Thank you for your correspondence of May 13, 2009, regarding a draft report from your office for "Transportation Security: Key Actions Have Been Taken to Enhance Mass Transit and Passenger Rail Security, but Opportunities Exist to Strengthen Federal Strategy and Programs, GAO-09- 678SU" provided for agency comment. With regard to industry stakeholders conducting risk assessments related to security, the Department of Homeland Security (DHS) funded a risk-based assessment of all Amtrak facilities, practices and assets in 2004-2005. DHS hired Science Applications International Corporation (SAIC) directly to conduct the assessment, which occurred from 2005 through 2008. The methodology employed conforms to DHS risk assessment standards. Amtrak has embraced this assessment as the baseline from which all subsequent security remediation priorities have been determined and acted upon. In addition arid since 2006, Amtrak has utilized corroborating sub- assessments, executed by institutions such as the Lawrence Livermore National Laboratories (LLNL), and the Department of Defense's (DOD) Full Spectrum Vulnerability Analysis Assessment (FSIVA) process. to confirm, augment, clarity, and otherwise round out the SAIC results. TSA was largely uninvolved in this process, though the TSGP grant program administered by at agency did fund some of the sub-assessments. In response to key remediation actions taken by industry stakeholders to address issues identified in risk-based assessments, Amtrak has taken and continues to aggressively implement remediation actions, in risk order priority, identified in the DHS-sponsored risk assessment, and in corroborating independent assessments. Broadly, these activities fall into the following categories: a) Physical infrastructure hardening (barriers, fences, CCTV systems, IIVAC sensors, etc.,) funded through successive Transportation Security Grant Programs (TSGP), and more recently through $196 million from the ARRA. b) Employee and passenger security training and awareness programs funded in the same way. c) Increase in counter-terrorism security and police headcount, training, and capability, to include expansion of Amtrak's canine bomb detection program. through both grant and corporate operating budget funding. d) Prototype development of focused information sharing and intelligence systems, funded through grants. e) Development of station action teams and contingency plans for key facilities and stations (as identified by risk analysis), paid for through grants and corporate operating budget. Detailed information on any or all of these programs can be made available upon written request. TSA involvement in these activities is primarily that of a funding agency--in that it administers TSGP, first authorized by the Congress in 2005. Additionally, TSA has been significantly and profoundly helpful in the conduct of Amtrak security contingency operations and exercises since 2005. DHS (through its Science and Technology Division) has been directly involved in assisting Amtrak with ideas and assessments of promising security technologies. TSA has sponsored exploratory tests with millimeter wave detection technologies. Relating to impediments to implementing security remediation, the grants regime facilitates Amtrak's pursuit of security remediation (see above), especially with regard to physical infrastructure hardening. The grant approval process managed by TSA and FEMA is at times cumbersome and overly bureaucratic. As well, the grant guidance administered by TSA sometimes diverged from clear legislative intent. This was particularly the case in the 2008 TSGP grant rules. which imposed a 25% cost share on grant funds selectively applied to five programs where Amtrak was implementing risk mitigation measures. While subsequently removed by Congressional action, this requirement caused hardship to transit agencies with already constrained resources, and considerable frustration to those charged with planning and scheduling complex projects distributed over multiple fiscal years. We appreciate this opportunity to provide more detailed information on our security- and counterterrorism activities, and believe that the report contributes significantly to understanding the challenges involved in securing the transit environment. Sincerely, Signed by: Joseph H. Boardman: President and Chief Executive Officer: [End of section] Appendix VIII: Comments from the Department of Homeland Security: U.S. Department of Homeland Security: Washington, DC 20528: June 17, 2009: Ms. Cathleen A. Berrick: Managing Director, Homeland Security and Justice Issues: U.S. Government Accountability Office (GAO): 441 G Street, NW: Washington, DC 20548: Dear Ms. Berrick: Thank you for the opportunity to comment on GAO-09-678SU, the draft report entitled, "Key Actions Have Been Taken to Enhance Mass Transit and Passenger Rail Security, but Opportunities Exist to Strengthen Federal Strategy and Programs." We commend the professionalism and thoroughness of the GAO team consistently displayed throughout the audit. The findings and recommendations in the report will prove helpful as we continue the persistent effort to strengthen the security strategy and enhance security programs for mass transit and passenger rail. In particular, we appreciate the description of the extensive progress that has been made in security strategy, program development, and program execution since the publication of the last comprehensive GAO audit of mass transit and passenger rail in September 2005. As the report shows, TSA has developed a foundation for strong mass transit and passenger rail security. Constant commitment to improvement of this foundation is essential to meeting the challenges of the security mission. The current draft GAO report, which provides a broad investigation and pointed analysis, will foster this process. Specific responses to the recommendations for executive action follow. Recommendation 1: To help ensure that the federal strategy to secure the mass transit and passenger rail systems considers assessment information within the context of risk, TSA, as the Sector-Specific Agency for mass transit and passenger rail, should conduct a risk assessment that integrates all three elements of risk: threat, vulnerability, and consequence. As part of this assessment, TSA should, to the extent feasible, fully leverage existing assessment information from its own sources as well as those provided by other federal and industry stakeholders, as appropriate, and use this information to inform its security strategy. DHS Concurs: We appreciate the constructive review and discussion of the subject of a comprehensive risk assessment in mass transit and passenger rail. In this context, it is important to note that mass transit and passenger rail agencies operating in the Nation's sizeable metropolitan areas are among the most thoroughly assessed of all transportation modes. Since 9/11, they have undergone security assessments by the Federal Transit Administration (FTA), the former Office of Grants and Training of the U.S. Department of Homeland Security (DHS) (for grant funding eligibility), the American Public Transportation Association (APTA), private sector security consultants (often funded by DHS grants), and now the Baseline Assessment for Security Enhancement (BASE) program. Additionally, through DHS's Office of Infrastructure Protection, Protective Security Advisors (PSAs) have conducted risk assessments on specific critical assets in mass transit and passenger rail systems (including Amtrak) in higher risk areas. As the draft report notes, through the BASE program, TSA assesses the security posture of mass transit and passenger rail agencies in the Security and Emergency Management Action Items. Developed in a joint effort of TSA, DHS, Department of Transportation/FTA, and mass transit and passenger rail operating and security officials engaged through the Mass Transit Sector Coordinating Council (SCC), the Action Items cover a range of areas that are foundational to an effective security program. Components include security program management and accountability, security and emergency response training, drills and exercises, public awareness, protective measures for Homeland Security Advisory System (HSAS) threat levels, physical security, personnel security, and information sharing and security. Particular emphasis is placed on posture in the six Transit Security Fundamentals (protection of underground/underwater infrastructure; protection of other high consequence systems and assets; random, unpredictable deterrence; training; exercises; and public awareness). TSA's approach with the BASE program is distinct from the multiple risk assessments conducted previously in mass transit and passenger rail. The specific purpose is to evaluate, with a thorough checklist and narrative responses, the effectiveness of the security programs, procedures, and measures developed and implemented by mass transit and passenger rail agencies in response to the results of the prior risk assessments. TSA's Surface Transportation Security Inspectors (STSIs) conduct the BASE assessments in partnership with mass transit and passenger rail agencies' security chiefs and directors to ensure full understanding of their efforts and thorough assessment of their effectiveness. The results of these assessments inform development of risk mitigation priorities, security enhancement programs, and resource allocations, including transit security grants. The results have also enabled production and dissemination of a compilation of Smart Security Practices, listed by implementing agency with name and contact information for a key official, with the specific purpose of inspiring networking among transit security professionals to expand adoption of these effective security practices. TSA disseminated the initial compilation to the mass transit and passenger rail community in July 2008. Annual updates are projected. The assessed agencies receive a complete report of the results. This information helps focus the development and implementation of plans, programs, and measures to redress identified weaknesses and informs the preparation of project applications under the Transit Security Grant Program. TSA acknowledges the importance of GAO's recommendation to leverage the results of these assessments and advance the capability to produce a comprehensive risk assessment of the mass transit and passenger rail mode. The ongoing development of the Risk Assessment Tool, cited in Table 2 of the draft report, aims to provide a comprehensive risk assessment product for TSA in mass transit and passenger rail. A pilot program planned for later this year will apply this tool, evaluate its effectiveness, and produce lessons learned to enhance the capability prior to programmatic implementation. This effort, integrating the findings of the earlier assessments, is specifically intended to address this GAO recommendation. Recommendation 2: To better achieve the security strategy laid out in its Mass Transit Modal Annex - TSA's security strategy for the mass transit and passenger rail systems - TSA should, to the extent feasible, incorporate in future updates of the Modal Annex the characteristics of a successful national strategy and the elements outlined in Executive Order 13416, including: * Measuring the agency's and industry's performance in achieving the goals of preventing and deterring acts of terrorism and enhancing the resiliency of mass transit and passenger rail systems; and; * Incorporating information on what the strategy will cost along with the sources and types of resources and investments needed, and identifying where those resources and investments should be targeted. DHS Concurs: We welcome the constructive review and insights on improving the effectiveness of the Mass Transit Modal Annex to the Transportation Systems Sector-Specific Plan (TS-SSP) as TSA's security strategy for mass transit and passenger rail. TSA will apply this context in the ongoing effort to update the Annex and enhance its utility as a national strategy. Additionally, TSA will coordinate this update with the mass transit and passenger rail community through multiple forums, such as the Mass Transit SCC, the Transit Policing & Security Peer Advisory Group, and participants in the semi-annual Transit Safety and Security Roundtables that bring together the law enforcement. chiefs and security directors of Amtrak and the largest 50 mass transit and passenger rail agencies with federal security partners to advance collaborative solutions to security challenges. Recommendation 3: To help ensure that DHS security technology research and development efforts reflect the security technology needs of the nation's mass transit and passenger rail systems, TSA should expand its outreach to the mass transit and passenger rail industry in the planning and selection of related security technology research and development projects. DHS Concurs: While we believe significant progress has been made in this area, as discussed in the draft report, the reference to concerns reported by the security technology working group of the Mass Transit SCC warrants our attention. As part of the continuous improvement process, we will strive to ensure security partners in mass transit and passenger rail are afforded ample and clear opportunities to provide input on priorities for security technology development and testing. Recommendation 4: To meet the needs of mass transit and passenger rail agencies regarding information on available security technologies, TSA should explore the feasibility of expanding the security technology product information on the Public Transit Portal of the Homeland Security Information Network, and consider including information such as product performance in a rail or bus venue, cost, maintenance needs, and other information to support mass transit and passenger rail agencies purchasing and deploying new security technologies. DHS Concurs: As noted in the discussion on this subject above, we recognize the need for a more comprehensive and user-friendly approach in providing appropriate information on security technologies that may be deployed in mass transit and passenger rail. To progress in this area, and consistent with the provisions of section 1410(b) of the 9/11 Commission Act, TSA has arranged funding in the amount of $600,000 for operations of the Public Transportation Information Sharing and Analysis Center (PT-ISAC) in fiscal year 2009. Beyond meeting the statutory requirement, a principal objective of this initiative is to align and integrate the PT-ISAC's analytical and information sharing activities with relevant Federal processes to establish and maintain a comprehensive information sharing environment for the mass transit and passenger rail community. Expanding the scope and enhancing the quality of the security technology information resource, in coordination with the Mass Transit SCC, will be a key component of this effort. Recommendation 5: To better ensure the DHS consistently funds sound and valid security training delivery programs for mass transit and passenger rail employees, TSA should consider enhancing its criteria for evaluating whether security training vendors meet the performance standards of federally sponsored training providers and whether they could be used by transit agencies for training under the transit security grant program. As part of this effort, TSA should consider coordinating with other federal agencies that have developed criteria for similar programs, such as the Federal Transit Administration. DHS Concurs: In recent years, DHS has substantially increased the investment in security training in mass transit and passenger rail through awards under the Transit Security Grant Program (TSGP). Though to date, new proposals for approval of courses for use of TSGP funds have been limited, we must anticipate growth in these types of requests from security training vendors as security training of frontline employees in mass transit and passenger rail remains a strategic security priority. An existing joint working group staffed by the appropriate officials from TSA and FTA is evaluating the security training program for mass transit and passenger rail to assess the effectiveness of current courses and to identify any gaps and needed improvements. Consistent with this GAO recommendation, we will add the establishment of criteria to review new training courses proposed by security training vendors to the joint working group's focus areas. Recommendation 6: To better ensure DHS's ability to satisfy the provisions of the 9/11 Commission Act related to mass transit and passenger rail, DHS should develop a plan with milestones for implementing provisions of the 9/11 Commission Act related to mass transit and passenger rail security. DHS Concurs: TSA reports its progress in implementing the requirements of the 9/11 Commission Act to DHS on a monthly basis. For items not yet completed, this monthly report includes projected actions to advance implementation with general timelines. However, a progress report is not the equivalent of an overall plan that identifies necessary actions and sets milestones to evaluate the effectiveness of efforts to meet the statutory requirements. Pursuant to this recommendation, TSA will produce such a plan. Again, DHS appreciates the work GAO has done in the review of mass transit and passenger rail security. We look forward to maintaining communication with GAO as we work to continue progress in these areas. Sincerely yours, Signed by: Jerald E. Levine: Director, DHS GAO/OIG Liaison Office: [End of section] Appendix IX: GAO Contacts and Staff Acknowledgments: GAO Contacts: Cathleen Berrick, (202) 512-3404 or berrickc@gao.gov: Staff Acknowledgments: In addition to the contact named above, Dawn Hoff, Assistant Director, and Daniel Klabunde, Analyst-in-Charge, managed this assignment. Jay Berman, Martene Bryan, Charlotte Gamble, and Su Jin Yon made significant contributions to the work. Chuck Bausell and Rudy Chatlos, assisted with design, methodology, and data analysis. Lara Kaskie and Linda Miller provided assistance in report preparation; and Tracey King provided legal support. [End of section] Footnotes: [1] Mass transit and passenger rail systems consist of various bus and passenger rail transit systems. Transit bus includes inter-city bus or trolleybus systems. Transit rail is comprised of heavy, commuter, light and intercity rail systems. Heavy rail is an electric railway that can carry a heavy volume of traffic. Heavy rail is characterized by high speed and rapid acceleration, passenger rail cars operating singly or in multi-car trains on fixed rails, separate rights of way from which all other vehicular and foot traffic is excluded, sophisticated signaling, and high-platform loading. Most subway systems are considered heavy rail. Commuter rail is characterized by passenger trains operating on railroad tracks and providing regional service, such as between a central city and its adjacent suburbs. Light rail systems typically operate passenger rail cars singly (or in short, usually two-car, trains) and are driven electrically with power being drawn from an overhead electric line. Amtrak operates the nation's primary intercity rail system. [2] The American Public Transportation Association compiled this ridership data from the Federal Transit Administration's National Transit Database. Ridership on rail transit systems in the District of Columbia and Puerto Rico are included in these statistics. A passenger trip is defined as the number of passengers who board public transportation vehicles. Passengers are counted each time they board vehicles no matter how many vehicles they use to travel from their origin to their destination. [3] Pub. L. No. 110-53, 121 Stat. 266 (2007). [4] According to TSA's fiscal year 2009 Surface Transportation Security Inspection Program Annual Domestic Inspection and Assessment Plan, a security directive is a mandatory measure or measures issued by TSA in response to a threat assessment or to a specific threat against transportation, requiring affected transportation organizations to implement specified security measures. TSA issued two security directives in May 2004 after terrorists attacked the commuter rail system in Madrid, Spain. The directives mandated passenger rail systems and Amtrak to implement a number of security measures. [5] For the purpose of this report, industry stakeholders include mass transit and passenger rail systems, Amtrak and an industry association. [6] Exec. Order No. 13416, 71 Fed. Reg. 71033 (Dec. 5, 2006). [7] GAO, Combating Terrorism: Evaluation of Selected Characteristics in National Strategies Related to Terrorism, [hyperlink, http://www.gao.gov/products/GAO-04-408T] (Washington, D.C.: Feb. 3, 2004). [8] DHS S&T was established by the Homeland Security Act of 2002 to, among other things, coordinate the federal government's civilian efforts to identify and develop countermeasures to emerging terrorist threats to the United States. As DHS's primary research and development arm, DHS S&T is tasked with providing federal, state, local, and tribal officials with state of the art technology and other resources. [9] Ridership data reported by the American Public Transportation Association for 2008. [10] The Alaska Railroad Corporation also operates intercity passenger rail service. Amtrak's ridership data comes from the 2007 Amtrak Environmental Health and Safety Report, which is the most recently available data. [11] An IED, or "homemade bomb," is typically constructed of commonly available materials, and can be carried by an individual or deposited in an unnoticed location for detonation by a timer or remote control. [12] Pub. L. No. 107-71, 115 Stat. 597 (2001). A mode of transportation refers to the different means that are used to transport people or cargo. [13] Pub. L. No. 107-296, 116 Stat. 2135 (2002). [14] The 18 industry sectors include agriculture and food, banking and finance, chemical, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, government facilities, information technology, national monuments and icons, nuclear, postal and shipping, public health and healthcare, transportation, and water. [15] On November 26, 2008, TSA published a final rule that included some of the provisions in the security directives, including requirements for passenger rail systems to appoint a security coordinator and report potential threats and significant security concerns to TSA. 73 Fed. Reg. 72130 (Nov. 26, 2008). [16] Through 49 C.F.R. pt. 659, FTA requires states to designate an agency to conduct tri-annual safety and security audits of the nation's light or heavy rail systems. These agencies are called state safety oversight agencies. [17] According to FRA, the regulation makes clear that an "emergency" includes a security-related situation. Each plan must address employee training and qualification, and provide for training and coordination with emergency responders. Also, each covered railroad must conduct full-scale passenger train emergency simulations in order to determine its capability to execute the emergency preparedness plan. [18] The 9/11 Commission was one of the congressionally chartered commissions established by Congress on November 27, 2002 to (1) investigate the relevant facts and circumstances relating to the terrorist attacks of September 11, 2001; (2) identify, review, and evaluate lessons learned from these attacks; and (3) report to the President and the Congress on findings, conclusions, and recommendations that generated from the investigation and review. [19] GAO, Passenger Rail Security: Enhanced Federal Leadership Needed to Prioritize and Guide Security Efforts, [hyperlink, http://www.gao.gov/products/GAO-05-851] (Washington, D.C.: September 2005). [20] Sector-specific agencies (SSA) refer to the federal department or agency responsible for infrastructure protection activities in a designated critical infrastructure sector or key resources category. [21] DHS serves as the sector-specific agency for 11 of the18 sectors: information technology; communications; transportation systems; chemical; emergency services; nuclear reactors, material, and waste; postal and shipping; dams; government facilities; and commercial facilities; and critical manufacturing. Other sector-specific agencies such as the departments of Agriculture, Defense, Energy, Health and Human Services, the Interior, the Treasury, and the Environmental Protection Agency are responsible for the other 7 sectors: agriculture and food; defense industrial base; energy; healthcare and public health; national monuments and icons; banking and finance; and water. See GAO, Critical Infrastructure Protection: Sector Plans and Sector Councils Continue to Improve, [hyperlink, http://www.gao.gov/products/GAO-07-706R] (Washington D.C.: July 10, 2007). [22] The NSTS, mandated in the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA), outlines the federal government approach--in partnership with state, local, and tribal governments and private industry--to secure the U.S. transportation system from terrorist threats and attacks. [23] DHS updated its NIPP in 2009. [24] Critical infrastructure are systems and assets, whether physical or virtual, so vital to the United States that their incapacity or destruction would have a debilitating impact on national security, national economic security, national public health or safety, or any combination of those matters. Key resources are publicly or privately controlled resources essential to minimal operations of the economy or government, including individual targets whose destruction would not endanger vital systems but could create a local disaster or profoundly damage the nation's morale or confidence. [25] [hyperlink, http://www.gao.gov/products/GAO-04-408T] and Exec. Order No. 13416, 71 Fed. Reg. 71033 (Dec. 5, 2006). [26] See [hyperlink, http://www.gao.gov/products/GAO-05-851]. [27] Security and Emergency Management Action Items consist of 17 action items developed by TSA and FTA which address current security threats and risks that confront transit agencies, with particular emphasis on priority areas where gaps need to be closed in security and emergency preparedness programs. Also, see appendix II for a list of these 17 action items. [28] The TSGP provides grant funding to the nation's key high-threat urban areas to enhance security measures for their critical transit infrastructure including bus, ferry and rail systems. For more information on the TSGP, please see GAO, Transit Security Grant Program: DHS Allocates Grants Based on Risk, but its Risk Methodology, Management Controls, and Grant Oversight Can Be Strengthened, GAO-09- 491 (Washington, D.C., June 8, 2009). [29] GAO, Transportation Security: Comprehensive Risk Assessments and Stronger Internal Controls Needed to Help Inform TSA Resource Allocations, [hyperlink, http://www.gao.gov/products/GAO-09-492] (Washington, D.C., Mar. 27, 2009). [30] [hyperlink, http://www.gao.gov/products/GAO-09-492]. [31] In addition to the U.S. Coast Guard and FEMA, DHS's Office of Science and Technology has conducted the following risk assessments using traditional methodologies: a Biological Threat Risk Assessment and an Integrated Chemical, Biological, Radiological, and Nuclear Terrorism Risk Assessment. [32] According to officials from the Intelligence Coordination Center, they use intelligence to quantify each sub-element within capability, intent, and presence. For example, presence is composed of two sub- elements--the number of known or suspected extremists and the number of areas of potential support or permissive environments--which are quantified and weighted within the overall threat model. This threat assessment is combined with assessments of vulnerability and consequence to produce MSRAM's risk assessment. [33] See GAO, Homeland Security: DHS Risk-Based Grant Methodology Is Reasonable, But Current Version's Measure of Vulnerability is Limited, [hyperlink, http://www.gao.gov/products/GAO-08-852] (Washington, D.C.: June 27, 2008). [34] See [hyperlink, http://www.gao.gov/products/GAO-08-852]. According to DHS officials, the agency's Office of Intelligence and Analysis (I&A) calculated the Threat Index by (1) collecting qualitative threat information with a nexus to international terrorism, (2) analyzing the threat information to create threat assessments for states and urban areas, (3) empaneling intelligence experts to review the threat assessments and reach consensus as to the number of threat tiers, and (4) assigning threat scores. This process, according to DHS officials, relied upon analytical judgment and interaction with the Intelligence Community, as opposed to the use of total counts of threats and suspicious incidents to calculate the Threat Index for the 2006 grant cycle. The final threat assessments are approved by the intelligence community--the Federal Bureau of Investigation, Central Intelligence Agency, National Counterterrorism Center, and the Defense Intelligence Agency--along with the DHS Under Secretary for Intelligence and Analysis and the Secretary of DHS, according to DHS officials. [35] [hyperlink, http://www.gao.gov/products/GAO-04-408T]. [36] The sixth characteristic is "Problem Definition and Risk Assessment," which addresses the particular national problems and threats the strategy is directed toward. However, because we provided details earlier in our report in the section on risk assessment, we do not address this characteristic in this section of our report. [37] This information helps answer the fundamental question about who is in charge, not only during times of crisis, but also during all phases of homeland security and combating terrorism including prevention, vulnerability reduction, and response and recovery. This entails identifying the specific federal entities involved and, where appropriate, the different levels of government or stakeholders, such as state and local governments and private entities. In our past work, we found that a successful strategy clarifies implementing organizations' relationships in terms of leading, supporting, and partnering. In addition, a strategy could describe the organizations that will provide the overall framework for accountability and oversight. Furthermore, a strategy might identify specific processes for collaboration between sectors and organizations--and address how any conflicts would be resolved. [38] GAO, Coast Guard: Non-Homeland Security Performance Measures Are Generally Sound, but Opportunities for Improvement Exist, [hyperlink, http://www.gao.gov/products/GAO-06-816] (Washington, D.C.: Aug. 16, 2006). [39] According to TSA's fiscal year 2009 Regulatory Inspection Plan, this measure demonstrates the efficiency of inspection activities by quantifying the number of completed mass transit and freight rail inspections. For mass transit and passenger rail, this includes BASE reviews and station profiles, and for freight rail, this includes Security Action Item Reviews. [40] Since late 2005, TSA has reported deploying Visible Intermodal Prevention and Response (VIPR) teams consisting of various TSA personnel to augment the security of mass transit and passenger rail systems and promote the visibility of TSA. Working alongside local security and law enforcement officials, VIPR teams conduct a variety of security tactics to introduce unpredictability and deter potential terrorist actions, including random high visibility patrols at mass transit and passenger rail stations and conducting passenger and baggage screening operations using specially trained behavior detection officers and a varying combination of explosive detection canine teams and explosives detection technology. [41] Another key action TSA has taken to strengthen mass transit and passenger rail security since 2004 has been providing grant funding through the Transit Security Grant Program (TSGP). We reported on DHS's administration of the grant program in [hyperlink, http://www.gao.gov/products/GAO-09-491]. [42] From August 2006 to February 2009, TSA reported conducting BASE reviews of 82 of the top 100 largest mass transit and passenger rail systems. As of February 2009, five transit agencies had declined TSA's request to participate in the reviews. [43] Through the Employee Awareness Poster Program, TSA partners with mass transit and passenger rail agencies to produce tailored posters specifically focused on transit employee security awareness. TSA develops a common theme, transit agencies provide graphics, logos, and quotations, and TSA tailors the posters for use by the transit agencies. [44] On May 20, 2004, TSA issued Transportation Security Directives RAILPAX 04-01: Threat to Passenger Rail Systems and RAILPAX 04-02: Threat to Passenger Rail Systems--National Railroad Corporation (Amtrak) and Alaska Rail Road Corporation. As of March 2009, these directives remained in place. However, senior TSA Headquarters officials told us that since 2006, as a matter of policy, TSA had chosen not to enforce industry compliance with the directives, and instead used the security directives as a tool to communicate general security priorities. TSA officials attributed their decision not to enforce the directives to passenger rail industry concerns regarding the impracticality of implementing some of the measures, the ambiguity of the directives, and the lack of industry input in developing and issuing the directives. Of the 30 systems which we included in our study, 25 systems operated passenger rail services and were subject to implementing the security directives. [45] In fiscal year 2007, TSA reported conducting BASE reviews of 53 mass transit and passenger rail systems, including 44 that were ranked in the top 50 in the nation based on ridership. TSA's BASE review report assessed the status of these 53 systems in implementing the 17 TSA/FTA Security and Emergency Management Action Items. [46] According to the 9/11 Commission Act, frontline transit employees include an employee of a public transportation agency who is a transit vehicle driver or operator; dispatcher; maintenance and maintenance support employee; station attendant,; customer service employee; security employee; or transit police or any other employee who has direct contact with riders on a regular basis, and any other employee of a public transportation agency that the Secretary determines should receive training. Pub. L. No. 110-53, § 1402(4), 121 Stat. 266, 401 (2007). [47] Rail transit agencies include either (1) those which operate passenger rail systems only or (2) a combination of both passenger rail and bus transit systems. [48] TSA conducts this work through the Surface Transportation Technology Program, established in fiscal year 2007. It conducts this work to assess potential technologies for addition to the Transit Security Grant Program guidance, to gain a better understanding of emerging technologies, to evaluate technologies in the mass transit environment, and to provide test results and lessons learned to mass transit and passenger rail authorities. [49] To carry out this process, DHS S&T brings together agency representatives into Integrated Product Teams (IPTs) to collaboratively set research and spending priorities to the individual project level. The IPTs do not include technology end-users--such as transit bus and rail system security operators--because DHS has assumed that its component agencies would represent end-user interests. [50] GAO, Transportation Security R&D: TSA and DHS Are Researching and Developing Technologies, but Need to Improve R&D Management, [hyperlink, http://www.gao.gov/products/GAO-04-890] (Washington D.C.: Sept. 30, 2004). [51] There are two working groups comprised of federal, industry, and other stakeholders for transportation security research and development. The Mass Transit Sector Coordinating Council (SCC) Security Technology Working Group is led by the American Public Transportation Association (APTA). This group provides recommendations to federal stakeholders in the area of security technology R&D. The Transportation Systems - Sector Specific Plan Research and Development Working Group meets on a monthly basis and is working on ways to harmonize the R&D efforts for critical infrastructure in all transportation sectors by identifying currently available technology and facilitating common definitions and standards, among other activities. [52] [hyperlink, http://www.gao.gov/products/GAO-04-890]. [53] In September 2005, we recommended that DHS and TSA consider establishing an online clearinghouse of information on security-related products, such as closed circuit television cameras or intrusion detection systems.In December 2002, we also reported that the federal government should play a greater role in testing transportation security technology and making this information available to industry stakeholders. See [hyperlink, http://www.gao.gov/products/GAO-05-851] and GAO, Mass Transit: Federal Action Could Help Transit Agencies Address Security Challenges, [hyperlink, http://www.gao.gov/products/GAO-03-263], (Washington D.C.: Dec. 13, 2002). [54] VIPR teams consist of varying sizes and composition of TSA personnel and other federal, state, or local assets. TSA has designated Federal Air Marshals (FAMs)--the primary law enforcement entity within TSA, whose primary mission is protecting air passengers and crew--as the lead for coordinating VIPR operations. Other VIPR personnel may include Surface and Aviation Transportation Security Inspectors, explosive detection canine teams, and behavioral detection officers-- personnel trained to screen for high-risk individuals based on involuntary physical or psychological behavior. [55] TSA program officials reported that historically TSA has not tracked statistics regarding whether VIPR deployments were driven by specific intelligence, versus being random, broadly risk-based, or special event driven. However, program officials stated that there have been few instances when TSA deployed VIPR teams to mass transit and passenger rail on the basis of specific threat information. In February 2009, TSA officials reported that they had amended the VIPR database to track the reasons for future VIPR deployments. [56] TSA's Concept of Operations for the Effective Employment of VIPR teams in Mass Transit and Passenger Rail lays out guidelines for ten core components that are the foundation for effectively collaborating on VIPR programs, including: (1) coordination; (2) mission focus; (3) active deterrence; (4) planning; (5) force composition; (6) consistency; (7) training; (8) communications; (9) authority; and (10) continuous improvement. [57] Department of Homeland Security Inspector General, TSA's Administration and Coordination of Mass Transit Security Programs (June 12, 2008). [58] In addition, TSA reported it was developing a VIPR tool kit concept to be distributed to mass transit systems and TSA field staff, which will contain an educational DVD explaining the potential security value of VIPR operations. The tool kit is projected for completion by June 2009, with initial distribution at the mid-year Transit Safety and Security Roundtable. [59] According to TSA's program guidance for the Mass Transit Security Training Program, only underground or underwater tunnel infrastructure rank as high as security training among its security priorities. [60] According to the TSA guidance, federally sponsored training providers are FTA-funded training providers including the National Transit Institute (NTI), the Transportation Safety Institute (TSI), and Johns Hopkins University (JHU). [61] According to the guidance, DHS must review transit agency applications for non-federally sponsored or funded training venders and discern the extent to which each vendor it reviews will provide training programs whose curriculum and delivery services generally equal or exceed the performance of those provided by federally sponsored training providers. [62] U.S. Department of Transportation, Federal Transit Administration, Curriculum Development Guidelines: Final Draft (2009). [63] GAO, A Guide For Assessing Strategic Training and Development Efforts, [hyperlink, http://www.gao.gov/products/GAO-04-546G] (Washington D.C: March 2004). [64] GAO, Results-Oriented Government: Practices That Can Help Enhance and Sustain Collaboration among Federal Agencies, [hyperlink, http://www.gao.gov/products/GAO-06-15] (Washington D.C: Oct. 21, 2005). [65] Project Management Institute, The Standard for Program Management (Newton Square, PA, 2006). [66] TSA reported that the pending regulations required by the 9/11 Commission Act requiring transit agencies to issue security plans would supersede the existing security directives. [67] We interviewed 11 of 12 AFSD-S that, as of February 2009, TSA has deployed nationwide to lead area inspection offices. At the time, two AFSD-S shared duties in the New York field office and were interviewed together. [68] TSA's fiscal year 2009 Regulatory Activities Plan for Transportation Surface Inspectors requires surface inspectors to split their assessment workload between mass transit and passenger rail and freight, with a minimum of about 60 percent of their time dedicated to freight and 40 percent to mass transit and passenger rail. [69] From fiscal year 2005 though fiscal year 2007, the Surface Transportation Security Inspection Program was authorized at 100 full- time employees and in June 2008 reported a staffing level of 93 positions. The 9/11 Commission Act authorized DHS to increase its number of surface transportation security inspectors for fiscal years 2008 through 2011 to a maximum of 200 positions. In February 2009, TSA reported that it had completed hiring for 58 of the 75 surface inspector positions that had been appropriated in fiscal year 2008, but had not filled the remaining positions because of contractor hiring challenges. [70] On November 26, 2008, TSA issued a final rule for freight rail and passenger rail that establishes security requirements on freight and passenger rail carriers, including designating a rail security coordinator and reporting significant security concerns, and codifies TSA's authority to conduct security inspections of passenger rail agency property. [71] The DHS Inspector General has issued two recent reports on TSA's mass transit security programs. These include Department of Homeland Security Office of the Inspector General, TSA's Administration and Coordination of Mass Transit Security Programs, OIG-08-66 (June 12, 2008) and Department of Homeland Security Office of the Inspector General, Effectiveness of TSA's Surface Transportation Security Inspector, OIG-09-24, (Feb. 5, 2009). [72] GAO, Key Principles for Effective Strategic Workforce Planning, [hyperlink, http://www.gao.gov/products/GAO-04-39] (Washington D.C.: Dec. 11, 2003). [73] GAO, Aviation Security: Aviation Security: Status of Transportation Security Inspector Workforce. [hyperlink, http://www.gao.gov/products/GAO-09-123R] (Washington, D.C.: Feb. 6, 2009). [74] In fiscal year 2008, TSA reported that it had deployed a total of 1224 inspectors into the aviation and surface modes, 1131 of whom were aviation inspectors. [75] TSA's Surface Transportation Security Inspection Program strategic plan for fiscal year 2008 notes that the program expects to expand its roles and responsibilities to enforce compliance with future mass transit and passenger rail regulations and notes challenges in meeting its current responsibilities because of resource limitations. [76] OIG-09-24 and OIG-08-66. [77] GAO and DHS reports on risk assessment include, but are not limited to, GAO, Passenger Rail Security: Enhanced Federal Leadership Needed to Prioritize and Guide Security Efforts [hyperlink, http://www.gao.gov/products/GAO-05-851] (Washington, D.C.: September 2005) and the DHS National Infrastructure Protection Plan (NIPP). [78] We did not did not review four after actions report files because they could not be opened or TSA did not provide a report that was associated with the operation on TSA's original list. [79] We visited or conducted phone interviews with Surface Transportation Security Inspectors in each location where we visited a mass transit or passenger rail system and TSA had maintained a field office for the inspectors. [80] [hyperlink, http://www.gao.gov/products/GAO-04-408T]. [81] In this report we discuss resources and investments; risk assessment; developing goals, subordinate objectives, activities, and performance measures; and identifying organizational roles, responsibilities, and coordination. [82] These sector goals are: 1) prevent and deter acts of terrorism using or against the transportation system; 2) enhance the resiliency of the U.S. transportation system; and 3) improve the cost-effective use of resources for transportation security. [83] These incidents include, but are not limited to the September 11, 2001, attacks on the World Trade Center and the Pentagon, coordinated attacks on four commuter trains in Madrid in 2004, and attacks on transportation targets in the 2005 London bombings and the 2006 train bombings in Mumbai. [84] The National Strategy for Transportation Security, required by section 4001 of the Intelligence Reform and Terrorism Prevention Act of 2004 outlines the federal government approach--in partnership with state, local and tribal governments and private industry--to secure the U.S. transportation system from terrorist threats and attacks. [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Phone: The price of each GAO publication reflects GAO‘s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO‘s Web site, [hyperlink, http://www.gao.gov/ordering.htm]. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.