Aviation Security
Efforts to Validate TSA's Passenger Screening Behavior Detection Program Underway, but Opportunities Exist to Strengthen Validation and Address Operational Challenges
Gao ID: GAO-10-763 May 20, 2010
To enhance aviation security, the Transportation Security Administration (TSA) began initial testing in October 2003 of its Screening of Passengers by Observation Techniques (SPOT) program. Behavior Detection Officers (BDO) carry out SPOT's mission to identify persons who pose a risk to aviation security by focusing on behavioral and appearance indicators. GAO was asked to review the SPOT program. GAO analyzed (1) the extent to which TSA validated the SPOT program before deployment, (2) implementation challenges, and (3) the extent to which TSA measures SPOT's effect on aviation security. GAO analyzed TSA documents, such as strategic plans and operating procedures; interviewed agency personnel and subject matter experts; and visited 15 SPOT airports, among other things. Although the results from these visits are not generalizable, they provided insights into SPOT operations.
Although the Department of Homeland Security (DHS) is in the process of validating some aspects of the SPOT program, TSA deployed SPOT nationwide without first validating the scientific basis for identifying suspicious passengers in an airport environment. A scientific consensus does not exist on whether behavior detection principles can be reliably used for counterterrorism purposes, according to the National Research Council of the National Academy of Sciences. According to TSA, no other large-scale security screening program based on behavioral indicators has ever been rigorously scientifically validated. DHS plans to review aspects of SPOT, such as whether the program is more effective at identifying threats than random screening. Nonetheless, DHS's current plan to assess SPOT is not designed to fully validate whether behavior detection can be used to reliably identify individuals in an airport environment who pose a security risk. For example, factors such as the length of time BDOs can observe passengers without becoming fatigued are not part of the plan and could provide additional information on the extent to which SPOT can be effectively implemented. Prior GAO work has found that independent expert review panels can provide comprehensive, objective reviews of complex issues. Use of such a panel to review DHS's methodology could help ensure a rigorous, scientific validation of SPOT, helping provide more assurance that SPOT is fulfilling its mission to strengthen aviation security. TSA is experiencing implementation challenges, including not fully utilizing the resources it has available to systematically collect and analyze the information obtained by BDOs on passengers who may pose a threat to the aviation system. TSA's Transportation System Operations Center has the resources to investigate aviation threats but generally does not check all law enforcement and intelligence databases available to it to identify persons referred by BDOs. Utilizing existing resources would enhance TSA's ability to quickly verify passenger identity and could help TSA to more reliably "connect the dots." Further, most BDOs lack a mechanism to input data on suspicious passengers into a database used by TSA analysts and also lack a means to obtain information from the Transportation System Operations Center on a timely basis. TSA states that it is in the process of providing input capabilities, but does not have a time frame for when this will occur at all SPOT airports. Providing BDOs, or other TSA personnel, with these capabilities could help TSA "connect the dots" to identify potential threats. Although TSA has some performance measures related to SPOT, it lacks outcome-oriented measures to evaluate the program's progress toward reaching its goals. Establishing a plan to develop these measures could better position TSA to determine if SPOT is contributing to TSA's strategic goals for aviation security. TSA is planning to enhance its evaluation capabilities in 2010 to more readily assess the program's effectiveness by conducting statistical analysis of data related to SPOT referrals to law enforcement and associated arrests.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Stephen M. Lord
Team:
Government Accountability Office: Homeland Security and Justice
Phone:
(202) 512-4379
GAO-10-763, Aviation Security: Efforts to Validate TSA's Passenger Screening Behavior Detection Program Underway, but Opportunities Exist to Strengthen Validation and Address Operational Challenges
This is the accessible text file for GAO report number GAO-10-763
entitled 'Aviation Security: Efforts to Validate TSA's Passenger
Screening Behavior Detection Program Underway, but Opportunities Exist
to Strengthen Validation and Address Operational Challenges' which was
released on May 20, 2010.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as
part of a longer term project to improve GAO products' accessibility.
Every attempt has been made to maintain the structural and data
integrity of the original printed product. Accessibility features,
such as text descriptions of tables, consecutively numbered footnotes
placed at the end of the file, and the text of agency comment letters,
are provided but may not exactly duplicate the presentation or format
of the printed version. The portable document format (PDF) file is an
exact electronic replica of the printed version. We welcome your
feedback. Please E-mail your comments regarding the contents or
accessibility features of this document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to the Ranking Member, Committee on Transportation and
Infrastructure, House of Representatives:
United States Government Accountability Office:
GAO:
May 2010:
Aviation Security:
Efforts to Validate TSA's Passenger Screening Behavior Detection
Program Underway, but Opportunities Exist to Strengthen Validation and
Address Operational Challenges:
GAO-10-763:
GAO Highlights:
Highlights of GAO-10-763, a report to the Ranking Member, Committee on
Transportation and Infrastructure, House of Representatives.
Why GAO Did This Study:
To enhance aviation security, the Transportation Security
Administration (TSA) began initial testing in October 2003 of its
Screening of Passengers by Observation Techniques (SPOT) program.
Behavior Detection Officers (BDO) carry out SPOT‘s mission to identify
persons who pose a risk to aviation security by focusing on behavioral
and appearance indicators. GAO was asked to review the SPOT program.
GAO analyzed (1) the extent to which TSA validated the SPOT program
before deployment, (2) implementation challenges, and (3) the extent
to which TSA measures SPOT‘s effect on aviation security. GAO analyzed
TSA documents, such as strategic plans and operating procedures;
interviewed agency personnel and subject matter experts; and visited
15 SPOT airports, among other things. Although the results from these
visits are not generalizable, they provided insights into SPOT
operations.
What GAO Found:
Although the Department of Homeland Security (DHS) is in the process
of validating some aspects of the SPOT program, TSA deployed SPOT
nationwide without first validating the scientific basis for
identifying suspicious passengers in an airport environment. A
scientific consensus does not exist on whether behavior detection
principles can be reliably used for counterterrorism purposes,
according to the National Research Council of the National Academy of
Sciences. According to TSA, no other large-scale security screening
program based on behavioral indicators has ever been rigorously
scientifically validated. DHS plans to review aspects of SPOT, such as
whether the program is more effective at identifying threats than
random screening. Nonetheless, DHS‘s current plan to assess SPOT is
not designed to fully validate whether behavior detection can be used
to reliably identify individuals in an airport environment who pose a
security risk. For example, factors such as the length of time BDOs
can observe passengers without becoming fatigued are not part of the
plan and could provide additional information on the extent to which
SPOT can be effectively implemented. Prior GAO work has found that
independent expert review panels can provide comprehensive, objective
reviews of complex issues. Use of such a panel to review DHS‘s
methodology could help ensure a rigorous, scientific validation of
SPOT, helping provide more assurance that SPOT is fulfilling its
mission to strengthen aviation security.
TSA is experiencing implementation challenges, including not fully
utilizing the resources it has available to systematically collect and
analyze the information obtained by BDOs on passengers who may pose a
threat to the aviation system. TSA‘s Transportation System Operations
Center has the resources to investigate aviation threats but generally
does not check all law enforcement and intelligence databases
available to it to identify persons referred by BDOs. Utilizing
existing resources would enhance TSA‘s ability to quickly verify
passenger identity and could help TSA to more reliably ’connect the
dots.“ Further, most BDOs lack a mechanism to input data on suspicious
passengers into a database used by TSA analysts and also lack a means
to obtain information from the Transportation System Operations Center
on a timely basis. TSA states that it is in the process of providing
input capabilities, but does not have a time frame for when this will
occur at all SPOT airports. Providing BDOs, or other TSA personnel,
with these capabilities could help TSA ’connect the dots“ to identify
potential threats.
Although TSA has some performance measures related to SPOT, it lacks
outcome-oriented measures to evaluate the program‘s progress toward
reaching its goals. Establishing a plan to develop these measures
could better position TSA to determine if SPOT is contributing to
TSA‘s strategic goals for aviation security. TSA is planning to
enhance its evaluation capabilities in 2010 to more readily assess the
program‘s effectiveness by conducting statistical analysis of data
related to SPOT referrals to law enforcement and associated arrests.
What GAO Recommends:
GAO recommends that TSA, among other things, use an independent panel
of experts to assist in validating SPOT, enhance SPOT data collection
and analysis, fully utilize TSA resources to identify possible
threats, and establish a plan to develop more outcome-oriented
measures for SPOT. DHS reviewed a draft of this report and generally
concurred with our recommendations although its plans do not fully
address one of our recommendations.
View [hyperlink, http://www.gao.gov/products/GAO-10-763] or key
components. For more information, contact Stephen M. Lord at (202) 512-
4379 or lords@gao.gov.
[End of section]
Contents:
Letter:
Background:
DHS Is Taking Action to Validate the Scientific Basis of TSA's SPOT
Program but Opportunities Exist to Help Inform Future Program
Decisions:
More Fully and Consistently Utilizing Available Information Technology
Could Enhance TSA's Ability to Identify Threats to the Aviation System:
TSA Lacks Program Effectiveness Measures for SPOT but Is Taking Steps
to Improve Evaluation Capabilities:
TSA Developed and Deployed SPOT Training but Further Action Could
Enhance Its Effectiveness:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendix I: Scope and Methodology:
Appendix II: DHS Comments:
Appendix III: GAO Contacts and Staff Acknowledgments:
GAO Contact:
Staff Acknowledgments:
Obtaining Copies of GAO Reports and Testimony:
Tables:
Table 1: Summary of Desirable Characteristics for Developing a
Strategic Plan:
Table 2: Reasons for Arrests from SPOT Referrals, May 29, 2004,
through August 31, 2008:
Table 3: SPOT Instructor Evaluation Ratings, 2006 to September 2008,
and March 2009:
Table 4: TSA Training Standards and Evaluation Branch Recommendations
for Improving SPOT Training and TSA Actions on the Recommendations:
Figures:
Figure 1: TSA's Layers of Aviation Security:
Figure 2: The First Step in the SPOT Process: BDOs Observing
Passengers About to Go Through Checkpoint Magnetometer:
Figure 3: Budget and Personnel Growth in the SPOT Program, Fiscal
Years 2007 through 201027:
Figure 4: Passenger Boardings at SPOT Airports, May 29, 2004, through
August 31, 200844:
Abbreviations:
AMRA: Aviation Modal Risk Assessment:
BDO: Behavior Detection Officer:
CBP: U.S. Customs and Border Protection:
DEA: Drug Enforcement Agency:
DHS: Department of Homeland Security:
FAMS: Federal Air Marshal Service:
FBI: Federal Bureau of Investigation:
ICE: U.S. Immigration and Customs Enforcement:
LEO: Law Enforcement Officer:
NCIC: National Crime Information Center:
NIPP: National Infrastructure Protection Plan:
OMB: Office of Management and Budget:
SOP: Standard Operating Procedures:
SPOT: Screening of Passengers by Observation Techniques:
S&T: Science and Technology Directorate:
TSA: Transportation Security Administration:
TSO: Transportation Security Officer:
[End of section]
United States Government Accountability Office:
Washington, DC 20548:
May 20, 2010:
The Honorable John L. Mica:
Ranking Member:
Committee on Transportation:
and Infrastructure House of Representatives:
Dear Mr. Mica:
The terrorist attacks of September 11, 2001, highlighted the need to
improve security within the nation's civil aviation system to deter
persons seeking to repeat similar attacks on the nation's critical
infrastructure. In October 2003, the Transportation Security
Administration (TSA) of the Department of Homeland Security (DHS)
conducted an operational test of the use of behavior detection
techniques to screen passengers in an airport environment, and
subsequently began training certain Transportation Security Officers
(TSO)--TSA employees responsible for screening passengers and their
property--in these techniques. These TSOs performed behavior
observation as a collateral duty. Beginning in fiscal year 2007, TSA
created separate Behavior Detection Officer (BDO) positions as part of
the Screening of Passengers by Observation Techniques (SPOT) program.
[Footnote 1] According to TSA, the SPOT program is a derivative of
other behavioral analysis programs that have been successfully
employed by law enforcement and security personnel both in the United
States and around the world, particularly that of Israel's airline, El
Al.[Footnote 2]
TSA designed SPOT to provide BDOs with a means of identifying persons
who may pose a potential security risk at TSA-regulated airports
[Footnote 3] by focusing on behaviors and appearances that deviate
from an established baseline, and that may be indicative of stress,
fear, or deception. Passengers in an airport terminal, including those
waiting in security checkpoint lines, are observed by the BDOs to
determine if their behavioral and appearance indicators--which are
assigned varying points by SPOT--have (in combination) exceeded a
predetermined numerical threshold. In cases where the passenger
exceeds the threshold, the passenger is referred for additional
screening by BDOs and a TSO. During this referral screening, if the
passenger exhibits behaviors that exceed another numerical threshold,
they are to be referred to a law enforcement officer (LEO) for further
investigation. In addition to observing passengers at airport
checkpoints, BDOs may patrol throughout an airport terminal, and
sometimes participate in other activities, such as TSA's Visible
Intermodal Prevention and Response team operations. These teams are
responsible for periodically augmenting security at air and ground
transportation facilities around the country.[Footnote 4]
As of March 2010, TSA deployed about 3,000 BDOs at an annual cost of
about $212 million; this force increased almost fifteen-fold between
March 2007 and July 2009. BDOs have been selectively deployed to 161
of the 457 TSA-regulated airports in the United States at which
passengers and their property are subject to TSA-mandated screening
procedures.[Footnote 5] The conference report accompanying the fiscal
year 2010 DHS appropriations act provided that $211.9 million of
aviation security funding was for the SPOT program.[Footnote 6] The
administration has requested $232 million for SPOT for fiscal year
2011, a $20.2 million (9.5 percent) increase over the current funding
level. This increase would support a workforce increase from about
3,000 to 3,350 BDOs. If this funding request is approved and
maintained, SPOT would cost about $1.2 billion over the next 5 years.
You asked us to address SPOT's development and implementation. This
report addresses the following questions:
1. To what extent did TSA determine whether SPOT had a scientifically
validated basis for identifying passengers before deploying it and
utilize recognized best practices during SPOT's development?
2. What management challenges, if any, have emerged during the
implementation of SPOT at the nation's airports?
3. To what extent has TSA measured SPOT's effect on aviation security?
4. To what extent has TSA incorporated the attributes of an effective
training program into the training for SPOT?
This report is a public version of the restricted report (GAO-10-
157SU) that we provided to you on May 14, 2010. DHS and TSA deemed
some of the information in the restricted report as sensitive security
information, which must be protected from public disclosure.
Therefore, this report omits this information. Although the
information provided in this report is more limited in scope, it
addresses the same questions as the restricted report. Also, the
overall methodology used for both reports is the same.
To determine the extent to which TSA determined whether SPOT had a
scientifically validated basis for identifying passengers who may pose
a risk to aviation security before deploying it, we reviewed
literature on behavior analysis by subject matter experts, and
analyzed relevant reports and books on the topic. These included a
2008 study by the National Research Council of the National Academy of
Sciences that included a discussion section on deception and
behavioral surveillance, as well as other issues related to behavioral
analysis.[Footnote 7] We interviewed seven recognized experts in the
field, and an expert on emergency responses to terror attacks and
mathematical models in operations management.[Footnote 8] Although the
views of these experts cannot be generalized across all experts on
behavior analysis, because we selected these individuals based on
their publications on behavioral analysis or related topics, their
recognized accomplishments and expertise, and, in some cases, TSA's
use of their work or expertise to design and review the SPOT program's
behaviors, they provided us with an understanding of the fundamentals
of behavior analysis, and its use in airports. We also interviewed
cognizant officials from other U.S. government agencies that utilize
behavior analysis in their work, including U.S. Customs and Border
Protection (CBP), the U.S. Secret Service, the Federal Air Marshall
Service (FAMS), and the Federal Bureau of Investigation (FBI).
[Footnote 9] To better understand how SPOT incorporated expertise on
behavior analysis for aviation security, we also interviewed current
and retired officials of Israel's El Al Airlines, whose security
processes TSA cites as providing part of the basis of the SPOT
program.[Footnote 10]
To determine to what extent TSA utilized best practices during SPOT's
development--including carrying out a comprehensive risk assessment, a
cost-benefit analysis, and a strategic plan--we interviewed program
officials and reviewed related program documentation, including
briefings used in the course of developing and fielding SPOT,
strategic plans, and standard operating procedures.[Footnote 11] We
compared these documents to DHS's 2006 Cost Benefit Analysis
Guidebook,[Footnote 12] Office of Management and Budget (OMB)
guidance,[Footnote 13] and DHS's 2006 and 2009 National Infrastructure
Protection Plans (NIPP), which set forth a risk management framework
to guide security decision making and resource allocation decisions,
and our previous work on the characteristics of an effective strategic
plan.
To identify any challenges that emerged during implementation of the
SPOT program, we conducted field site visits to 15 TSA-regulated
airports with SPOT that represent almost 10 percent of the 161 TSA-
regulated airports with SPOT to observe operations and meet with key
program personnel.[Footnote 14] We chose airports with high, medium,
and low passenger volume; airports with BDOs who are TSA (i.e.,
government) employees and an airport with BDOs employed by contractors
as part of the TSA Screening Partnership Program; and airports with
LEOs who were identified by TSA as having received some form of
behavior detection training and airports where they were not known to
have received such training.[Footnote 15] We also selected airports on
the basis of TSA's assessment of which ones are at highest risk of
attack by terrorists, including the 2 that ranked the highest, as
reported in TSA's Current Airport Threat Assessment.[Footnote 16]
Since the airports we selected range broadly in terms of passenger
volume, physical size and layout, geographic location, and potential
value as a target for terrorism, among other things, the results from
these visits are not generalizable to other airports. However, these
visits provided helpful insights into the operation of SPOT at
airports. In addition, to determine whether challenges emerged in
implementing SPOT, we compared TSA's approach for implementing and
managing SPOT to our Standards for Internal Control in the Federal
Government[Footnote 17] and to risk management principles we had
previously identified.[Footnote 18] In reviewing TSA's approach to
developing and implementing SPOT, we considered relevant laws,
regulations, and other materials, including those related to privacy,
such as TSA's Privacy Impact Assessments. To obtain comparative data
on how SPOT had been implemented at different airports across the
nation, we conducted a survey of all Federal Security Directors
responsible for security operations at TSA-regulated airports with
SPOT.[Footnote 19] (This accounted for all 161 TSA-regulated airports
with SPOT because a single Federal Security Director may be
responsible for several airports.) We obtained a 100 percent response
rate. This survey asked, among other things, about the relationship
between LEOs and the airport authority and BDOs. In addition, to
understand the interaction of BDOs and LEOs, as well as other SPOT
implementation issues, at each of the 15 TSA-regulated airports we
visited we spoke with BDO managers, Federal Security Directors,
Assistant Federal Security Directors, 1 or 2 BDOs, and 1 or 2 LEOs.
To determine the extent to which TSA has measured SPOT's effect on
aviation security, we obtained and analyzed the TSA SPOT referral
database,[Footnote 20] which aims to record all incidents in which
passengers who have passed through the checkpoint are sent to SPOT
referral screening for additional questioning and screening of
property and person. The database also maintains records of instances
where passengers were referred by a BDO to a LEO for questioning. We
assessed the reliability of the SPOT referral data by (1) performing
electronic testing of required data elements, (2) reviewing existing
information about the data and the system that produced them, and (3)
interviewing agency officials knowledgeable about the data. We found a
number of problems related to how the data were collected and recorded
that are discussed later in this report. As a result, we were unable
to use the SPOT referral data to assess whether any behavior or
combination of SPOT behaviors could be used to reliably predict the
final outcome of an incident involving the use of SPOT. However, with
the stated limitations in mind, and after resolving certain
contradictions and anomalies in the database, we utilized the SPOT
referral data to provide examples of information used by TSA to report
on the program's performance, including a count of arrests and the
reasons for those arrests. In addition, to determine if individuals
who were later charged with or pleaded guilty to terrorism-related
offenses had transited SPOT airports and whether TSA could obtain
information from these transits to enhance its understanding of
terrorist behaviors, we reviewed CBP and Department of Justice
information to (1) identify individuals who were charged with or
pleaded guilty to terrorism-related offenses and (2) determine if
these individuals had, prior to being charged, transited airports
where SPOT had been deployed. Further, we used our survey of Federal
Security Directors at SPOT airports to determine the extent to which
video surveillance cameras, which could make video recordings of
terrorists transiting airports, are present at checkpoints.
To assess the extent that SPOT training incorporates the attributes of
an effective training program, we had TSA training experts complete a
training assessment tool that we developed using guidance we prepared
in our previous work for assessing training courses and curricula.
[Footnote 21] To better understand how other entities train their
employees in behavior detection, and what their curricula include, we
conducted site visits to the Secret Service, CBP, FAMS, and the FBI,
and also interviewed nongovernmental experts on aspects of behavior
detection training. We interviewed BDOs and BDO managers about the
SPOT training. In addition, we interviewed El Al officials with regard
to how El Al trains and tests its personnel in behavior recognition
and analysis. Appendix I contains additional details about our scope
and methodology.
We conducted this performance audit from May 2008 through May 2010 in
accordance with generally accepted government auditing standards.
Those standards require that we plan and perform the audit to obtain
sufficient, appropriate evidence to provide a reasonable basis for our
findings and conclusions based on our audit objectives. We believe
that the evidence obtained provides a reasonable basis for our
findings and conclusions based on our audit objectives.
Background:
The Aviation and Transportation Security Act established TSA as the
federal agency with primary responsibility for securing the nation's
civil aviation system, which includes the screening of all passenger
and property transported by commercial passenger aircraft.[Footnote
22] TSA currently has direct responsibility for, or oversees the
performance of, security operations at approximately 457 TSA-regulated
airports in the United States implementing security requirements in
accordance with TSA-approved security programs and other TSA
direction.[Footnote 23] At TSA-regulated airports, prior to boarding
an aircraft, all passengers, their accessible property, and their
checked baggage are screened pursuant to TSA-established procedures,
which include, for example, passengers passing through security
checkpoints where they and their identification documents are checked
by TSOs and Travel Document Checkers, or by Screening Partnership
Program employees.
TSA uses multiple layers of security to deter, detect, and disrupt
persons posing a potential risk to aviation security. These layers
include three principal types of screening employees at airport
checkpoints--Travel Document Checkers, who examine tickets, passports,
and other forms of identification; TSOs, who examine property,
including checked baggage, and persons using x-ray equipment and
magnetometers, as well as other devices; and BDOs, using SPOT to
assess passenger behaviors and appearance.[Footnote 24] BDOs are the
only type of TSA screening employees not deployed to all TSA-regulated
airports and all checkpoints within the airports where it is deployed
on a regular basis. TSA deployed SPOT as an added layer of security to
help deter terrorists attempting to exploit TSA's focus on prohibited
items and other potential security weaknesses. Other security layers
cited by TSA include intelligence gathering and analysis; passenger
prescreening; random canine team searches at airports; federal air
marshals; reinforced cockpit doors; federal flight deck officers; the
passengers themselves; as well as other measures both visible and
invisible to the public. Figure 1 shows TSA's 20 aviation security
layers.
Figure 1: TSA's Layers of Aviation Security:
[Refer to PDF for image: illustration]
Terrorist paths: through the following layers:
Intelligence:
Customs and Border Protection:
Joint Terrorism Task Force:
No-fly List and Passenger Pre-screening[A]:
Crew Vetting:
VIPR:
Canines:
[Start gray bar, screening layers applied to passengers and their
property:
Behavior Detection Officers:
Travel Document Checker:
Checkpoint/Transportation Security Officers:
Checked Baggage[B];
End gray bar, screening layers applied to passengers and their
property]
Transportation Security Inspectors:
Random Employee Screening:
Bomb Appraisal Officers:
Federal Air Marshal Service:
Federal Flight Deck Officers:
Trained Flight Crew:
Law Enforcement Officers:
Hardened Cockpit Door:
Passengers:
Source: TSA.
[A] The No-Fly List is used to identify individuals who should be
prevented from boarding an aircraft; it contains applicable records
from the FBI's Terrorist Screening Center consolidated database of
known or suspected terrorists.
[B] The four layers inside the gray bar are screening layers of
security applied to passengers and their property.
[End of figure]
The gray area in figure 1 highlights four layers that apply to
passengers and their property as they seek to board an aircraft.
Airport LEOs, another layer of security cited by TSA, do not report to
TSA and may not maintain a physical presence at smaller TSA-regulated
airports. According to TSA, each one of these layers alone is capable
of stopping a terrorist attack. In combination, TSA states that their
security value is multiplied, creating a much stronger system, and
that a terrorist who has to overcome multiple security layers in order
to carry out an attack is more likely to be preempted, deterred, or to
fail during the attempt.
SPOT Uses Behavior Detection Techniques to Assess Passenger Behaviors
and Appearances:
The SPOT program utilizes behavior observation and analysis techniques
to identify potentially high-risk passengers. Individuals who exhibit
suspicious behaviors, including both physical and appearance
indicators, may be required to undergo additional screening. Field
agents and law enforcement officers of other federal agencies and
entities--such as the FBI, the Secret Service, CBP, and FAMS--utilize
elements of behavior detection analysis as a part of their work. In
addition, some foreign entities, such as Israel's El Al airlines, use
behavior detection and analysis techniques as part of their security
efforts. However, TSA emphasized to us that the SPOT program is unique
among these entities because it uses a point system to help identify
suspicious persons on the basis of their behavior and appearance and
because behavior detection and analysis are the central focus of SPOT.
Officials from the other agencies stated that their field personnel
incorporate behavior detection as one of many skills used in their
work; in contrast, behavior detection is the primary element of the
BDOs' work.
SPOT trains BDOs to look for and recognize facial expressions, body
language, and appearance that indicate the possibility that an
individual is engaged in some form of deception and fears discovery.
These behaviors and appearances are listed on a SPOT score sheet used
in SPOT training.
Passenger behavior and appearance are to be compared by the BDOs--who
typically work in two-person teams. BDOs are expected to "walk the
line"--that is, to initiate casual conversations with passengers
waiting in line, particularly if their observations led them to
question someone exhibiting behaviors or appearances on the SPOT
checklist. As the BDOs walk the line, and the passenger with SPOT
indicators is reached, a casual conversation is used to determine if
there is a basis for observed behaviors or appearances on the
checklist. In most instances, these conversations provide information
to the BDOs that permits them to consider the issue resolved, and
hence not a security concern. Figure 2 below illustrates the first
step of the three-step SPOT process, the BDO-passenger interaction at
a checkpoint prior to the passenger passing through a magnetometer.
Figure 2: The First Step in the SPOT Process: BDOs Observing
Passengers About to Go Through Checkpoint Magnetometer:
[Refer to PDF for image: illustration]
Step 1:
1. BDOs scan the passengers in line and occasionally initiate casual
conversation.
2. BDOs identify person(s) who exhibit clusters of suspicious
behaviors that meet a given threshold.
3. BDOs identify passengers exhibiting behaviors that exceed SPOT
numerical threshold for referral questioning.
Sources: GAO (analysis), ArtExplosion (clip art), TSA (data).
Note: Circle around passenger shows a person who is exhibiting a
cluster of suspicious behaviors.
[End of figure]
As shown in figure 2, passenger behavior and appearance are observed
by the BDOs as passengers wait in line for screening at a security
checkpoint. Even if the checkpoint is busy, the BDOs must attempt to
visually scan all the passengers waiting in line, as well as persons
near the checkpoint, to determine if any are showing behaviors or
appearances on the SPOT checklist. According to TSA, on average a BDO
has approximately 30 seconds to assess each passenger while the
passenger waits in line. For passengers exhibiting indicators above
baseline conditions, the BDOs are to (mentally) add up the points
assigned to each indicator they observe. Both BDO team members must
agree that observed indicators have exceeded the predetermined
numerical threshold, although they do not have to identify the same
indicators the passenger exhibited. In instances when a passenger's
SPOT indicators place them above the numerical threshold, and the
passenger has placed their property on the conveyor belt for x-raying,
and has walked through the magnetometer or equivalent screening device
for passengers, he or she will be directed to the second step of SPOT,
referral screening. This involves additional questioning and physical
search of their person and property by BDOs and TSOs. This referral
screening occurs in the checkpoint area.
If the passenger's behavior escalates further--accumulating more
points based on the SPOT checklist--the BDOs are to refer the
passenger to a LEO. A referral to a LEO is a potential third step in
the SPOT process. BDOs are not LEOs--they do not conduct criminal
investigations, carry weapons, or make arrests.
After a passenger has been referred by the BDOs to a LEO, the LEO is
then expected to independently determine, through additional
investigation, such as questioning the passenger and, if appropriate,
by conducting an identity verification and background check through
the FBI's National Crime Information Center (NCIC), whether sufficient
grounds exist to take further action, such as detaining or arresting
the passenger. TSA officials who are LEOs also have access to NCIC,
such as an airport's Assistant Federal Security Director for Law
Enforcement or federal air marshals. NCIC is the FBI's computerized
index of criminal justice information (i.e., criminal record history
information, fugitives, stolen properties, and missing persons),
available to federal, state, and local law enforcement and other
criminal justice agencies at all times.[Footnote 25] Similarly, other
federal LEOs also have such access, including CBP, and Drug
Enforcement Agency (DEA) personnel. However, since both local and
federal LEOs have other responsibilities, and may not be present at
each operating checkpoint, BDOs may have to seek them out to request
an NCIC check. According to TSA, aside from requiring that an airport
maintain a law enforcement presence,[Footnote 26] it exercises no
jurisdiction over the law enforcement activities of non-TSA officers
or entities at an airport; thus, it cannot require LEOs to conduct an
NCIC check or to provide BDOs with information about the ultimate
disposition of cases referred by them to LEOs.
Once the LEO concludes his or her investigation and determines whether
the passenger will be arrested or detained, TSA officials are to
evaluate the security concerns to determine whether to allow the
passenger to proceed to the boarding gate. (In some instances, a LEO
might choose not to arrest or detain a passenger; TSA would then
decide whether the infraction was sufficiently serious to necessitate
barring the passenger from boarding.) After a referral incident has
been resolved, BDOs are to enter information about the incident into
TSA's SPOT referral database. The data entered are to include time,
date, location of the incident, behaviors witnessed, prohibited items
found (if any), and information on the LEO's response (if applicable),
such as whether the LEO questioned the passenger, arrested the
individual, or released the passenger. The SPOT referral database
contains no personal identifying information about passengers.
SPOT Has Been Deployed in Phases:
The SPOT program began with pilot tests in 2003 and 2004 at several
New England airports, in which TSA began using uniformed BDOs at
airport checkpoints. After some initial pilot projects and test
deployments, 644 BDOs were deployed to 42 airports in the first phase
of the program from November 2006 through June 2007. As of March 2010,
about 3,000 BDOs utilizing SPOT were deployed at 161 of 457 TSA-
regulated airports.[Footnote 27]
BDO eligibility is restricted to TSOs with at least 12 months of TSO
experience, or others with related security experience. Applicants
must apply and be accepted into the BDO training program. The training
includes 4 days of classroom courses, followed by 3 days of on-the-job
training. BDOs must memorize all of the behaviors and appearances on
the SPOT checklist, as well as the point value assigned to each, in
order to be able to add these up to determine if a passenger should be
sent to SPOT referral screening. BDO applicants must also pass a job
knowledge test at the conclusion of the training. The test includes
related multiple choice questions, true or false statements, and case-
based scenarios.
DHS Is Taking Action to Validate the Scientific Basis of TSA's SPOT
Program but Opportunities Exist to Help Inform Future Program
Decisions:
Although DHS is in the process of validating the way in which the SPOT
program utilizes the science of behavior detection in an airport
environment, TSA deployed SPOT nationwide before first determining
whether there was a scientifically valid basis for using behavior and
appearance indicators as a means for reliably identifying passengers
as potential threats in airports. TSA reported that it deployed SPOT
before a scientific validation of the program was completed in
response to the need to address potential threats to the aviation
system that would not necessarily be detected by existing layers of
aviation security. TSA stated that no other large-scale U.S. or
international screening program incorporating behavior-and appearance-
based indicators has ever been rigorously scientifically validated.
While TSA deployed SPOT on the basis of some risk-related factors,
such as threat information and airport passenger volume, it did not
use a comprehensive risk assessment to guide its strategy of
selectively deploying SPOT to 161 of the nation's 457 TSA-regulated
airports. TSA also expanded the SPOT program over the last 3 years
without the benefit of a cost-benefit analysis of SPOT. Additionally,
TSA's strategic plan for SPOT could be improved by the inclusion of
desirable characteristics identified in our prior work, such as risk
assessment information, cost and resources analysis, and a means for
collaboration with other key entities.
TSA Is in the Process of Validating the Scientific Basis Used to
Identify Passengers with SPOT Behaviors:
TSA proceeded with deploying SPOT on a nationwide basis before
determining whether the list of passenger behaviors and appearances
underpinning the SPOT program were scientifically validated, and
whether these techniques could be applied for counterterrorism
purposes in an airport environment. In 2008, a report issued by the
National Research Council of the National Academy of Sciences noted
that behavior and appearances monitoring might be able to play a
useful role in counterterrorism efforts but stated that a scientific
consensus does not exist regarding whether any behavioral surveillance
or physiological monitoring techniques are ready for use in the
counterterrorist context given the present state of the science.
[Footnote 28] The report also stated that the scientific evidence for
behavioral monitoring is preliminary in nature.[Footnote 29] According
to the report, an information-based program, such as a behavior
detection program, should first determine if a scientific foundation
exists and use scientifically valid criteria to evaluate its
effectiveness before going forward. The report added that programs
should have a sound experimental basis and documentation on the
program's effectiveness should be reviewed by an independent entity
capable of evaluating the supporting scientific evidence. The report
also stated that often scientists and other experts can help
independently assess the scientific evidence on the effectiveness of a
program. A contributor to the National Research Council report also
stated that no conclusive research has been conducted to determine if
behavior detection can be reliably used on a larger scale, such as in
an airport setting, to identify persons intending to cause harm to the
aviation system.
While TSA and DHS's Science and Technology (S&T) Directorate officials
agreed that SPOT was deployed before its scientific underpinnings were
fully validated, they stated that no large-scale U.S. or international
operational screening program incorporating behavior-and appearance-
based indicators has been rigorously scientifically validated. These
officials also questioned the findings of the National Research
Council report and stated that the study lacked sufficient information
for its conclusions because it did not consider recent findings from
unpublished DHS, defense, and intelligence community studies.[Footnote
30] However, National Research Council officials stated that an agency
should be cautious about relying on the results of unpublished
research that has not been peer reviewed, such as that generated by
DHS and the defense and intelligence community, and using unpublished
work as a basis for proceeding with a process, method, or program.
[Footnote 31] Moreover, we have previously reported that peer review
is widely accepted as an important quality control mechanism that
helps prevent the dissemination of potentially erroneous information.
[Footnote 32]
In addition to the unpublished research, TSA told us that the SPOT
program was based on operational best practices from law enforcement,
defense, and the intelligence communities. According to TSA officials,
the agency based its choice of SPOT behavior, appearance, and
deception indicators on existing research and training programs. For
example, TSA cited research on emotions and their behavior indicators
by Dr. Paul Ekman,[Footnote 33] interviewing and interrogation by Stan
Walters,[Footnote 34] and nonverbal indicators by Dr. David Givens
[Footnote 35] and Dr. Mark Frank[Footnote 36] as support for the
choice of several of the behavior indicators. According to TSA, its
development of the SPOT program was based on related DHS research and
information from the training curricula of other federal agencies,
such as the Federal Transit Administration and the Bureau of Alcohol,
Tobacco, Firearms, and Explosives.[Footnote 37]
As with the SPOT behavior indicators, TSA told us that it sought input
in creating the SPOT point scoring system from subject matter experts
and from participants in TSA's SPOT working group, which consisted of
law enforcement officials from agencies such as FBI, DEA, and local
law enforcement officials.[Footnote 38] While TSA officials said that
they coordinated with relevant subject matter experts, such as Dr.
Ekman, and based the SPOT scoring system on existing research and
training programs, no validation of the behavior, appearance, and
deception indicators was conducted prior to the deployment of SPOT in
November 2006. According to TSA officials, they used professional
judgment in developing the SPOT point system and stated that the
purpose of developing the scoring system was to increase the
objectivity of the SPOT process.
Dr. Ekman stated that, in his opinion, and after reviewing the scoring
system and observing the program in operation, it was not clear
whether the SPOT behaviors and appearances, and the related point
system, could be used effectively in an airport environment because no
credible validation research on this issue had been conducted. He
noted, for example, that research is needed to identify how many BDOs
are required to observe a given number of passengers moving at a given
rate per day in an airport environment, or the length of time that
such observation can be conducted before observation fatigue affects
the effectiveness of the personnel. He commented that observation
fatigue is a well-known phenomenon among workers whose work involves
intense observation, and that it is essential to determine the
duration of effective observation and to ensure consistency and
reliability among the personnel carrying out the observations.
DHS has recognized the need to conduct additional research to
scientifically validate the use of the SPOT behavioral indicators in
an airport environment. DHS's S&T Directorate began research in 2007
to determine if there is a statistically significant correlation
between the SPOT behaviors exhibited by airport passengers and finding
airport passengers with prohibited items (such as weapons), false
documents, and illegal drugs or who pose a potential risk to aviation
security. According to S&T, this research is expected to be completed
in fiscal year 2011 and is to include three key elements. First, the
study's purpose is to assess the reliability of the SPOT program by
analyzing TSA's SPOT database to determine patterns of BDO scoring to
measure consistency across BDOs, teams, locations, and other
variables. Second, the study aims to compare the current
implementation of SPOT to random passenger screening. Specifically,
according to S&T officials, 130,000 passengers are to be randomly
selected for additional SPOT referral screening. The study's design
states that data collected about these passengers will be compared to
data for passengers screened through the normal SPOT process. S&T
officials expect that the results of this element of the study will
provide a better understanding of how SPOT compares to random
selection, as well as providing a baseline of each indicator present
in the traveling public. Third, the study also aims to utilize live
and video data, as available, to measure SPOT score ratings by BDOs of
behaviors exhibited by passengers against ratings of the same
passengers by subject matter experts. This element of the study could
help determine whether BDOs are using, or are continuing to use, the
SPOT score sheet correctly as time passes after their initial
training. According to S&T officials, the study is to form the basis
for BDO performance and training requirements.
The S&T Directorate reported some preliminary findings associated with
this research in February 2008. The Directorate reported that although
some of the existing literature supported the possibility of using
behavioral and physiological cues, the results are not
methodologically strong enough to support standardized applications in
an operational setting.[Footnote 39] The preliminary findings also
noted that it is not known whether behavioral and physiological cues
linked to deception in planning a hostile action will be the same or
different as those indicators linked to deception by an individual
after they have already engaged in a hostile action. However, an S&T
program director stated that although early literature can be
characterized as methodologically weak, more recent unpublished
research sponsored by DHS, the Department of Defense, and the
intelligence community is promising in that it has demonstrated some
linkages between behavioral and physiological indicators and
deception.[Footnote 40]
In March 2009, the Under Secretary (Acting) for DHS's S&T Directorate
testified that the Directorate had performed an initial validation of
the behavior indicators used by BDOs.[Footnote 41] The Under Secretary
stated that this analysis provided statistically significant support
that persons demonstrating select behavioral indicators are more
likely to possess prohibited items and that behaviors can distinguish
deceptive from nondeceptive individuals. According to S&T, this
validation was the result of statistical analyses performed by S&T
using operational data from the SPOT program database. However, we
identified weaknesses in TSA's process for maintaining these data. For
example, controls over the SPOT database to help ensure the
completeness and accuracy of the data were missing. Specifically, the
SPOT database did not have computerized edit checks built into the
system to review the format, existence, and reasonableness of data.
For example, we found that discrepancies existed between the number of
passengers arrested by local law enforcement at the screening
checkpoints and the number of screened passengers recorded as
arrested. In another example, we found that the total number of LEO
referrals differed from the number of passenger records with
information on the reasons for LEO referral. Internal control
standards state that controls should be installed at an application's
interfaces with other systems to ensure that all inputs are received
and are valid and that outputs are correct and properly distributed.
[Footnote 42] TSA officials explained these issues as data anomalies
and planned to change instructions to staff entering data to reduce
these problems. Although TSA is taking steps to update the SPOT
database, which are discussed later in this report, the data used by
S&T to conduct its preliminary validation of related behaviors lacked
such controls. In addition, BDOs could not input all behaviors
observed in the SPOT database because the database limits entry to
eight behaviors, six signs of deception, and four types of prohibited
items per passenger referred for additional screening. Because of
these data-related issues, meaningful analyses could not be conducted
to determine if there is an association between certain behaviors and
the likelihood that a person displaying certain behaviors would be
referred to a LEO or whether any behavior or combination of behaviors
could be used to distinguish deceptive from nondeceptive individuals.
As a result, TSA lacks assurance that the SPOT data can be used
effectively to determine that the person poses a risk to aviation
security. S&T has recognized weaknesses in the procedures for
collecting data on passengers screened by SPOT and plans to more
systematically collect data during its study by, for example,
requiring BDOs to record more complete and accurate information
related to a passenger referral immediately following resolution.
The S&T study is an important step to determine whether SPOT is more
effective at identifying passengers who may be threats to the aviation
system than random screening. However, S&T's current research plan is
not designed to fully validate whether behavior detection and
appearances can be effectively used to reliably identify individuals
in an airport terminal environment who pose a risk to the aviation
system. For example, research on other issues, such as determining the
number of individuals needed to observe a given number of passengers
moving at a given rate per day in an airport environment or the
duration that such observation can be conducted by BDOs before
observation fatigue affects effectiveness, could provide additional
information on the extent to which SPOT can be effectively implemented
in airports. In another example, Dr. Ekman told us that additional
research could help determine the need for periodic refresher training
since no research has yet determined whether behavior detection is
easily forgotten or can be potentially degraded with time or lack of
use. While S&T officials agree on the need to validate the science of
behavior detection programs, they told us that some of these other
issues could be examined in the future but are not part of the current
plan due to time and budgetary constraints. According to S&T, some
additional analysis is underway to inform the current BDO selection
process. This analysis is intended to provide information on the
knowledge, skills, abilities, and other characteristics of successful
BDOs. Since the analysis is scheduled for completion in May 2010, it
remains unclear to what extent the findings will help to validate the
science related to SPOT. While we recognize the potential benefits of
these efforts, we believe that an assessment by an independent panel
of experts of the planned methodology of DHS's study could help DHS
assess the costs and benefits associated with a more comprehensive
methodology designed to fully validate the science related to SPOT.
Our prior work has recommended the use of such independent panels for
comprehensive, objective reviews of complex issues.[Footnote 43] In
addition, according to the National Research Council, an independent
panel could provide an objective assessment of the methodology and
findings of DHS's study to better ensure that SPOT is based on
validated science. Thus, an independent panel of experts could help
DHS develop a comprehensive methodology to determine if the SPOT
program is based on valid scientific principles that can be
effectively applied in an airport environment for counterterrorism
purposes.
SPOT Was Deployed Nationwide on Basis of Threat, but Without a
Comprehensive Risk Assessment:
According to DHS's National Infrastructure Protection Plan (NIPP),
risk assessments are to be documented, reproducible (so that others
can verify the results), defensible (technically sound and free of
significant errors), and complete. The NIPP states that comprehensive
risk assessments are necessary for determining which assets or systems
face the highest risk, for prioritizing risk mitigation efforts and
the allocation of resources, and for effectively measuring how
security programs reduce risks. For a risk assessment to be considered
complete, the NIPP states that it must specifically assess threat,
vulnerability, and consequence;[Footnote 44] after these three
components have been assessed, they are to be combined to produce a
risk estimate.[Footnote 45]
According to TSA, SPOT was deployed to TSA-regulated airports on the
basis of threat information in TSA's Current Airport Threat Assessment
list.[Footnote 46] TSA deployed SPOT to 161 of 457 TSA-regulated
airports. TSA officials told us that this selective deployment creates
unpredictability for persons seeking to cause harm to the aviation
system because they would not know which airports had BDO teams and
because BDOs are occasionally sent out to the smaller airports that do
not have BDOs on a permanent basis. Although TSA's selective
deployment of SPOT was based on threat information, TSA did not
conduct vulnerability and consequence assessments to inform the
deployment of BDOs. As a result, it could not combine the results to
conduct a comprehensive risk assessment to inform the deployment of
BDOs to those airports with the highest risks.
TSA officials told us that while they have not completed a
comprehensive risk assessment for airport security, they have prepared
and are currently reviewing a draft of a comprehensive, scenario-based
Aviation Modal Risk Assessment--known as the AMRA--which is to serve
as a comprehensive risk assessment for aviation security.[Footnote 47]
According to TSA officials, the AMRA is to address all three elements
of risk for domestic commercial aviation, general aviation, and air
cargo.[Footnote 48] Although TSA planned to release the AMRA in
February 2008, it now expects to finalize the AMRA in 2010. According
to TSA, the AMRA may help provide information for the prioritization
of BDO deployment within airports, but could not provide specifics on
how it would do so. Further, TSA officials noted that information from
AMRA would inform BDO deployment in conjunction with other TSA
priorities not related to SPOT.[Footnote 49] Since the AMRA is not yet
complete, it is not clear whether it will provide the risk analysis--
including assessments of vulnerability and consequence--needed to
inform TSA's decisions and planning for any revisions or future
deployment of SPOT. If AMRA lacks information relevant to the
deployment of SPOT and further research determines that SPOT has a
scientifically validated basis for using behavior detection for
counterterrorism purposes in the airport environment, then conducting
a comprehensive risk assessment of airports could strengthen TSA's
ability to establish priorities and make cost-effective resource
decisions regarding the deployment of BDOs to those airports deemed to
have the highest priority risks.
TSA Deployed SPOT Nationwide Without Conducting a Cost-Benefit
Analysis but Such an Analysis Could Help Inform Program Decisions
Moving Forward:
DHS and other federal guidance recommend conducting a cost-benefit
analysis before implementing new programs to avoid unnecessary costs
and identify the best way to achieve goals at the lowest costs among
potential alternatives. Our prior work has also supported the use of
cost-benefit analyses during retrospective reviews to validate the
agency's original assumptions regarding costs and benefits.[Footnote
50] In addition, the DHS February 2006 Cost-Benefit Analysis Guidebook
and OMB guidance both recommend the use of cost-benefit analysis, both
in the planning stage for a program, and when significant milestones
or financial options are to be assessed.[Footnote 51] The DHS
Guidebook states that a cost-benefit analysis is designed to identify
optimal financial solutions among competing alternatives. OMB guidance
also identifies cost-benefit analysis as one of the key principles to
be considered when making capital expenditures, that expected benefits
of proposed actions should be explained, and that a baseline should be
identified discussing costs and benefits in comparison with clearly
defined alternatives. DHS's 2006 and 2009 NIPPs also state that
priority is to be given to those protective measures that provide the
greatest mitigation of risk for the resources that are available. The
DHS NIPPs add that effective protective programs seek to use resources
efficiently by focusing on actions that offer the greatest mitigation
of risk for any given expenditure. In addition, measuring cost
effectiveness of SPOT was a key TSA goal in an October 2005 version of
the SPOT strategic plan.
Although the DHS and OMB guidance recommend that a cost-benefit
analysis be conducted prior to deploying a program nationwide--and
potentially incurring substantial costs--TSA did not conduct such an
analysis of SPOT to inform its pilot testing prior to full-scale
nationwide deployment. In early 2003, TSA began conducting a pilot
test of the SPOT program at Boston Logan airport to better understand
the benefits of the program. According to Boston Logan's Federal
Security Director, the primary purpose of this pilot test was to
understand the potential of the program, not to validate its success.
[Footnote 52] TSA officials stated that the program had several
benefits, one of which was its "negligible cost." However, TSA did not
analyze the pilot test results to determine if SPOT was more cost
effective than other alternatives, such as random screening of
passengers. In October 2004, TSA implemented additional pilot programs
in Providence, Rhode Island and Portland, Maine with the goal of
providing Federal Security Directors with an additional layer of
security to identify high-risk passengers for additional screening
using behavior detection techniques. TSA concluded that the pilot
program was successful and cited several security benefits of these
pilots. For example, TSA personnel in Providence identified two
individuals in possession of illegal drugs, who were then arrested.
Law enforcement also arrested another individual referred to them for
providing a fraudulent passport. In another example, BDOs in Portland
discovered a passenger with multiple passports and a hidden luggage
compartment. The passenger was interviewed by LEOs and later released.
TSA determined that these initial pilot tests at three airports were
successful without comparing pilot test data to other possible
security alternatives. For example, the results of random screening of
passengers at the pilot airports could have provided TSA with
objective baseline data. Specifically, these data could have been
compared to data collected during the SPOT pilots to determine if SPOT
was more effective than random screening in detecting passengers who
pose a potential risk to aviation security. TSA concluded that the
pilot tests were successful because pilot airports were able to easily
incorporate SPOT into their security program, train personnel in SPOT,
and implement procedures for an additional layer of security according
to TSA.
TSA conducted additional pilot tests at the Minneapolis-St. Paul,
Minnesota and Bangor, Maine airports in October 2005. TSA also
deployed the program to nine additional airports in response to TSA's
holiday preparedness plan in December 2005 to further operationally
test the program. Senior SPOT program officials explained that TSA did
not conduct an analysis of the pilot testing because the program was
in its infancy and officials were focused on deploying SPOT to
additional airports. Since that time, TSA has not conducted a cost-
benefit analysis, which could help the agency establish the value of
the program relative to other layers of aviation security. Moreover, a
cost-benefit analysis could also be useful considering recent program
growth. For example, from fiscal year 2007 through fiscal year 2009,
TSA allotted about $383 million for SPOT. During this period, SPOT's
share of TSA's total screening operations budget increased from 1
percent to 5 percent.[Footnote 53] The conference report accompanying
the fiscal year 2010 DHS appropriations act designates $212 million of
the appropriated aviation security funding for the SPOT program.
[Footnote 54] A cost-benefit analysis could have provided TSA
management with analysis on whether this allocation was a prudent
investment, as well as whether this level of investment in SPOT is
appropriate. Figure 3 shows the growth in the budget and personnel
numbers for SPOT from fiscal years 2007 through 2010.
Figure 3: Budget and Personnel Growth in the SPOT Program, Fiscal
Years 2007 through 2010:
[Refer to PDF for image: 2 vertical bar graphs]
Fiscal year: 2007;
Total actual cost: $14 million;
Actual BDO allocation: 589.
Fiscal year: 2008;
Total actual cost: $144 million;
Actual BDO allocation: 2,011.
Fiscal year: 2009;
Total actual cost: $198 million;
Actual BDO allocation: 2,860.
Fiscal year: 2010;
Total appropriated: $212 million;
Total BDO allocation: 2,986.
Source: GAO analysis of TSA data.
Note: The actual BDO allocation for fiscal year 2009 is as of June
2009. The appropriated amount for SPOT for fiscal year 2010 is the
amount reflected in the conference report accompanying the fiscal year
2010 DHS appropriations act. The appropriated amounts prior to fiscal
year 2010 cannot be determined because funding was appropriated as a
lump sum with funding for other screeners and the relevant conference
reports did not allocate a specific amount for SPOT. BDO allocation
figures are full-time equivalents.
[End of figure]
SPOT's Strategic Plan Could be Strengthened by Addressing Key
Characteristics of a Successful Strategy:
Our previous work,[Footnote 55] and the Government Performance and
Results Act,[Footnote 56] set forth several key elements of a
strategic plan. Such plans can guide agencies in planning and
implementing an effective government program. Table 1 summarizes the
desirable characteristics of an effective strategic plan, as
identified in our prior work. In April 2009, we reported that these
characteristics are the starting point for developing a strategic
plan.[Footnote 57]
Table 1: Summary of Desirable Characteristics for Developing a
Strategic Plan:
Desirable characteristic: Purpose, scope, and methodology;
Description: Addresses why the plan was produced, the scope of its
coverage, and the process by which it was developed.
Desirable characteristic: Problem definition and risk assessment;
Description: Addresses the particular problems and threats the plan is
directed towards.
Desirable characteristic: Goals, subordinate objectives, activities,
and performance measures;
Description: Addresses what the plan is trying to achieve, steps to
achieve those results, as well as the priorities, milestones, and
performance measures to gauge results.
Desirable characteristic: Resources, investments, and risk management;
Description: Addresses what the plan will cost, the sources and types
of resources and investments needed, and where resources and
investments should be targeted based on balancing risk reductions with
cost.
Desirable characteristic: Organizational roles, responsibilities, and
coordination;
Description: Addresses who will implement the plan, what their roles
will be compared to others, and mechanisms for them to coordinate
their efforts.
Desirable characteristic: Integration and implementation;
Description: Addresses how the plan relates to the agency's other
goals, objectives, and activities, to other federal and nonfederal
entities involved in implementation or coordination, and their plans
to implement the strategic plan.
Source: GAO analysis based on GAO-09-369 and GAO-04-408T.
[End of table]
TSA officials at Boston Logan airport told us that they completed the
first strategic plan for SPOT in 2006. The strategic plan was last
updated in March 2007. The March 2007 plan includes some of the
desirable characteristics described above, such as an overall purpose.
However, incorporating additional characteristics of an effective
strategic plan could enhance the plan's usefulness in program
management and resource allocation decisions to effectively manage the
deployment of SPOT if TSA determines that the program has a
scientifically valid basis. TSA officials stated that they believed
the plan was sufficiently comprehensive to develop a national program,
such as SPOT. However, these officials told us that the plan was not
updated after TSA expanded the program in 2008 and 2009. They also
stated that the program's focus remained on deploying SPOT to
additional airports. Our assessment of the extent to which the SPOT
strategic plan addresses these characteristics is presented below.
Purpose, scope, and methodology: The SPOT strategic plan addresses why
the plan was developed (i.e., purpose) and the scope of its coverage.
Specifically, the plan describes a strategy to utilize behavior
detection screening as an additional layer of security. The plan also
notes that the primary focus is to expand SPOT in the aviation
environment while also developing a capability to deploy BDOs to
support security efforts in all modes of transportation. However, the
plan does not discuss the process by which it was developed (i.e.,
methodology). According to TSA, officials responsible for developing
the plan received input from relevant stakeholders at Boston Logan
airport and TSA headquarters. We believe incorporating the methodology
into the plan could make the document more useful to TSA and other
organizations, such as local law enforcement, responsible for
implementing the plan.
Problem definition and risk assessment: The plan addresses the
particular threat it is directed towards. Specifically, the plan
describes the need to implement SPOT to counter terrorist activities,
improve security, and incorporate additional layers of protection
within aviation security. However, the plan does not incorporate risk
assessment information to identify priorities or guide program
implementation because TSA has not conducted a comprehensive risk
assessment related to the deployment of SPOT.[Footnote 58] Using
available risk assessment information to inform the development of a
strategic plan would help ensure that clear priorities are established
and focused on the areas of greatest need. Specifically, incorporating
the results of a risk assessment in the program's strategic plan could
help inform TSA's decisions such as whether to deploy SPOT to
additional TSA-regulated airports, to shift SPOT teams from one
airport to another, or to remove SPOT at airports where the benefit of
addressing the risk does not outweigh the costs, as well as to
identify and communicate the risks to aviation security if SPOT was
not deployed to all TSA-regulated airports.
Goals, subordinate objectives, activities, and performance measures:
The plan outlines several goals, objectives, and activities for the
SPOT program to achieve. For example, the plan outlines a goal to
develop multimodal partnerships, including at the local level, to
support SPOT. An associated objective for this goal includes
identifying and fostering advocates within each mode of transportation
by developing transportation, intelligence, and law enforcement
working groups with relevant officials to share information and foster
cooperation. The plan also includes a goal to develop and implement
performance measures for SPOT. However, the plan did not include
performance measures for SPOT. Incorporating performance measures into
the plan could help TSA officials measure progress in implementing the
plan's goals, objectives, and activities.
Resources, investments, and risk management: The plan does not
identify the costs and resources needed to achieve program objectives
discussed in the plan. Incorporating information about cost and
resources would facilitate TSA's ability to allocate resources across
programs according to priorities and constraints, track costs and
performance, and shift such investments and resources as appropriate.
Organizational roles, responsibilities, and coordination: The SPOT
program relies on a close partnership with law enforcement officers at
airports. TSA provides briefings to law enforcement on the SPOT
program, and TSA officials conduct outreach efforts to local law
enforcement as needed. The SPOT SOP guidance and SPOT training include
guidance about ensuring that LEOs receive complete and accurate
information about each SPOT referral. However, while the strategic
plan identifies TSA officials and offices as responsible parties for
implementing the strategic plan, it does not provide guidance on how
to effectively link the roles, responsibilities, and capabilities of
federal, state, and local officials providing program support.
Moreover, although SPOT SOP guidance discusses the need for BDOs to
coordinate with other TSA personnel, such as TSOs and TDCs, TSA does
not identify their roles and responsibilities in regards to the SPOT
program in the program's strategic plan. Integrating these elements
into the strategic plan could help to clarify the relationships
between these various implementing parties, which would thereby
increase accountability and improve the effectiveness of
implementation.
Integration and implementation: The SPOT strategic plan does not
discuss how its scope complements, expands upon, or overlaps with
other related strategic documents. For example, TSA's April 2008
Office of Security Operations Organizational Business Plan for Fiscal
Year 2010 describes how its goals--including those for SPOT--relate to
DHS and TSA strategic goals.[Footnote 59] However, TSA does not link
goals in the SPOT strategic plan with other related strategic
documents, such as the Aviation Implementation Plan of DHS's
Transportation Systems Sector-Specific Plan[Footnote 60] and the
Passenger Checkpoint Screening Program Strategic Plan.[Footnote 61] By
linking goals in its SPOT strategic plan to other TSA efforts, TSA
could better ensure that the program's objectives are integrated with
other TSA security programs and that resources are used effectively by
minimizing any unnecessary duplication with these other actions.
More Fully and Consistently Utilizing Available Information Technology
Could Enhance TSA's Ability to Identify Threats to the Aviation System:
Inconsistencies in the use of available information technology to aid
in the collection and recording of data on passengers by BDOs during
referrals to LEOs, lack of guidance on, or a mechanism for, BDOs to
request the TSA's Transportation Security Operations Center to run the
names of passengers exhibiting suspicious behaviors against law
enforcement and intelligence databases, and the Center's not checking
all of the databases available to it--have limited TSA's ability to
identify potential terrorist threats to the aviation system.[Footnote
62] Among other information, these databases include terrorism-related
watch lists.
Systematic Collection of Data on Passengers Identified Through the
SPOT Program Could be Improved to Better Identify Activity Potentially
Harmful to the Aviation System:
TSA is not fully utilizing the resources it has available to
systematically collect the information obtained by BDOs on passengers
whose behaviors and appearances resulted in either SPOT referral
screening, or in a referral to LEOs, and who thus may pose a risk to
the aviation system. TSA's July 2008 Privacy Impact Assessment on the
TSA Transportation Security Operations Center, and its August 2008
Privacy Impact Assessment on SPOT, state that information may be
obtained by BDOs to check an individual's identity against
intelligence, terrorist, and law enforcement databases and to permit
intelligence analysts to conduct trend analysis.[Footnote 63]
The August 2008 SPOT Privacy Impact Assessment states that information
about a passenger who has exceeded the SPOT behavior threshold,
leading to LEO referral, may be collected and entered into DHS's
Transportation Information Sharing System.[Footnote 64] According to
the SPOT Privacy Impact Assessment, information collected may be
submitted to the Transportation Information Sharing System database
for analysis, and, through it to other linked intelligence databases
and the intelligence analysts who study them, to detect, deter, and
defeat a criminal or terrorist act in the transportation domain before
it occurs. The SPOT Privacy Impact Assessment notes that terrorist
acts that threaten transportation security are most vulnerable in the
planning stages and that the timely passage of SPOT referral
information may assist in identifying such efforts before they become
operational. A June 2008 Transportation Information Sharing System
Privacy Impact Assessment similarly states that one goal is to use the
system data to find trends and patterns that may indicate
preoperational terrorist or criminal activity--that is, to "connect
the dots" about a planned terrorist attack or criminal enterprise.
Information in TSA's Transportation Information Sharing System is
primarily activity or behavioral information but may also contain
personal information regarding the individuals identified by the BDO
through SPOT. According to TSA, BDOs do not analyze the data obtained
during referrals; if they have the appropriate training, they may
enter the data by computer into the Transportation Information Sharing
System, where they can be analyzed by intelligence analysts. Other
appropriately trained and officially designated TSA officials, such as
Federal Security Directors, may also enter data into the system.
According to TSA, a 2008 pilot program it conducted that involved BDOs
entering data into the Transportation Information Sharing System
database was "invaluable," in part because over 40 referrals have
since been passed on to other LEO organizations for further
investigation, most of which came from BDO input. A February 2006 TSA
memorandum describes the Transportation Information Sharing System as
"a critical element in the success of SPOT" because it provides the
necessary platform for the reporting of information obtained as a
result of SPOT referrals. TSA noted that through the use of the
Transportation Information Sharing System, two different BDO teams had
separately identified and selected the "same extremist" for secondary
questioning.[Footnote 65] TSA officials also told us about an incident
in which an individual sought to board an aircraft with a handgun on
two separate occasions, at two different airports. Although the
handgun was detected both times, the individual was released after
providing what seemed to be a credible explanation. After the second
incident, however, intelligence analysts who reviewed the system
information saw that this individual had tried twice in 2 weeks to
bring a weapon onto an aircraft. A LEO was dispatched to the person's
home, and an arrest was made. Without the data inputted into the
system both times, no pattern would have been detected by the
analysts, according to TSA. Although the pilot program illustrated the
benefits of BDOs entering data into the system, access to the system
was not expanded to all SPOT airports in 2008 or 2009.
Internal control standards call for management to develop policies,
procedures, and techniques to help enforce management directives. TSA
does not provide official guidance on how or when BDOs or other TSA
personnel should enter data into the Transportation Information
Sharing System or which data should be entered. Official guidance on
what data should be entered into the system on passengers could better
position TSA personnel to be able to consistently collect information
to facilitate synthesis and analysis in "connecting the dots" with
regard to persons who may pose a threat to the aviation system.
On March 18, 2010, TSA officials told us that TSA recognizes the value
of recording SPOT incidents for the purposes of intelligence
gathering. As a result, TSA decided that certain data would be entered
into the Transportation Information Sharing System, and would, in
turn, be analyzed as a way to potentially "connect the dots" with
other transportation security incidents.[Footnote 66]
TSA officials said that the Federal Security Director at each SPOT
airport has been given the discretion to decide which personnel should
have access to the Transportation Information Sharing System. However,
TSA has not developed a plan detailing how many personnel would have
access to the system, or when they would have access at SPOT airports.
TSA officials said that training is currently being provided to
personnel responsible for using the system at all SPOT airports
although they did not provide information on the number being trained.
Standard practices for defining, designing, and executing programs
include developing a road map, or program plan, to establish an order
for executing specific projects needed to obtain defined programmatic
results within a specified time frame. However, TSA stated that it has
not developed a schedule or milestones by which database access will
be deployed to SPOT airports, or a date by which access at all SPOT
airports will be completed. Setting milestones for expanding
Transportation Information Sharing System access to all SPOT airports,
and setting a date by which the expansion will be completed, could
better position TSA to identify threats to the aviation system that
may otherwise go undetected and help TSA track its progress in
expanding Transportation Information Sharing System access as
management intended.
Guidance on and a Mechanism for Running Names of Referred Passengers
Through the Databases Available to the Transportation Security
Operations Center Could Help Improve SPOT Practices:
Internal control standards state that policies, procedures,
techniques, and other mechanisms are essential to help ensure that
actions are taken to address program risks.[Footnote 67] The current
process makes the BDOs dependent on the LEOs with regard to the
timeliness that LEOs respond to BDO calls for service, as well as with
regard to whether the LEOs choose to question the passengers referred
to them or conduct a background check. Our analysis of the SPOT
referral database found a wide variation in the percent of times that
LEOs responded to calls for service at SPOT airports.[Footnote 68]
Moreover, if a local LEO decides to run a background check on a
passenger referred to them, they would be accessing the FBI's NCIC and
not other intelligence and law enforcement databases.
Although LEOs may not always respond to calls for service, question
passengers, or check passenger names against databases available to
TSA, TSA has not developed a mechanism allowing BDOs to send
information to the Transportation Security Operations Center about
passengers whose behavior indicates that they may be a possible threat
to aviation security. According to TSA's July 2008 Transportation
Security Operations Center Privacy Impact Assessment, passenger
information may be submitted to the Transportation Security Operations
Center to ascertain, as quickly as possible, the individual's
identity, whether they are already the subject of a terrorist or
criminal investigation, or to analyze suspicious behavior that may
signal some form of preoperational surveillance or activity.[Footnote
69]
Our survey of Federal Security Directors at SPOT airports found a
notable inconsistency in the rates at which BDOs at different airports
contacted the Transportation Security Operations Center.[Footnote 70]
Developing additional guidance in the SPOT operating procedures could
help improve consistency in the extent to which BDOs utilize
Transportation Security Operations Center resources. Given the range
of responses we received from SPOT airports about whether the BDOs
contact the Transportation Security Operations Center to verify
passenger identities and run their names against terrorist and
intelligence databases and the inconsistencies identified related to
LEO responses to BDO requests for service, developing a standard
mechanism and providing BDOs with additional guidance could help TSA
achieve greater consistency in the SPOT process. Such a mechanism
would provide designated TSA officials with a means of verifying
passenger identities and help them determine whether a passenger was
the subject of a terrorist or criminal investigation and thus posed a
risk to aviation security.
Standards for internal control state that effectively using available
resources, including key information databases, is one element of
functioning internal controls.[Footnote 71] In this connection, it is
widely recognized among intelligence entities and police forces that a
capability to "run" names against databases that contain criminal and
other records is a potentially powerful tool to both identify those
with outstanding warrants and to help discover an ongoing criminal or
security-related incident. Additionally, TSA recommended in an April
2008 Organizational Business plan for its Office of Security
Operations that the SPOT program should establish a mechanism and
policy for allowing real-time checks of federal records for
individuals whose behavior indicates they may be a threat to security.
[Footnote 72] The Office of Security Operations plan also states that
BDOs should communicate the data to U.S. intelligence centers, with
the purpose of permitting rapid communication of this information to
local LEOs to take action. However, TSA officials told us that because
of safety concerns, the Transportation Security Operations Center does
not provide information from database checks directly to BDOs because
BDOs are not LEOs, are unarmed, and do not have the training needed to
deal with potentially violent persons.[Footnote 73] If the mechanism
discussed in the Office of Security Operations business plan were
implemented, it would allow the Transportation Security Operations
Center to use BDO information to conduct real-time record checks of
passengers and communicate the results to LEOs for action. Such a
mechanism could increase the chances to detect ongoing criminal or
terror plans.
TSA's Transportation Security Operations Center Does Not Use All
Database Resources When Contacted:
The final report of the National Commission on Terrorist Attacks Upon
the United States (the "9/11 Commission Report") recommends that in
carrying out its goal of protecting aviation, TSA should utilize the
larger set of information maintained by the federal government, that
is, the entire Terrorist Screening Database--the U.S. government's
consolidated watch list that contains information on known or
suspected international and domestic terrorists--as well as other
government databases, such as intelligence or law enforcement
databases.[Footnote 74] However, the Transportation Security
Operations Center is not using all the resources at its disposal to
support BDOs in verifying potential risks to the aviation system. This
reduces the opportunities to "connect the dots" that would increase
the chances of detecting terrorist attacks in their planning stage,
which the SPOT Privacy Impact Assessment states is when they are the
most vulnerable.
According to TSA, the Transportation Security Operations Center has
access to multiple law enforcement and intelligence databases that can
be used to verify the identity of airline passengers; these include
among others:[Footnote 75]
1. the Selectee list, which identifies persons who must undergo
enhanced screening at the checkpoint prior to boarding;
2. the No-Fly list,[Footnote 76] which lists persons prohibited from
boarding aircraft; and:
3. the Terrorist Identity Datamark Environment terrorist list.
[Footnote 77]
TSA stated that the Transportation Security Operations Center checks
passenger names submitted to it against these three databases if the
passenger has been referred by a BDO to a LEO, but has not been
arrested. Of the three databases that the Transportation Security
Operations Center is to check in the case of a referral, passengers
would have already been screened against two--the Selectee and No-Fly
lists--in accordance with TSA passenger prescreening procedures when
purchasing a ticket. The third database checked--the Terrorist
Identity Datamark Environment--tracks terrorists but not persons
wanted for other crimes. The FBI's NCIC information system would
contain names of such persons, but is not among the three databases
checked for nonarrest referrals. If the passenger has been arrested,
the Transportation Security Operations Center will run the passenger's
name against the additional law enforcement and intelligence databases
available to it.
In addition, TSA told us that the Operations Center does not have
direct electronic access to the Terrorist Screening Database and must
call the FBI's Terrorist Screening Center to provide it with a name to
verify. TSA stated that this is done if a passenger's identity could
not be verified using the Operations Center databases. In effect, if a
passenger has been referred to a LEO, but not arrested, the Operations
Center is to check the three databases shown above to verify the
passenger's identity. If a passenger has been arrested, but the three
databases do not list the person, the Center can check the additional
databases available to it. If none of these databases can verify the
person's identity, the Operations Center can contact the Terrorist
Screening Center by telephone to request further screening.
For passengers who have risen to the level of a LEO referral at an
airport checkpoint, having the Transportation Security Operations
Center consistently check their names against all the databases
available to it could potentially help TSA identify threats to the
aviation system and aid in "connecting the dots." TSA indicated that
there are no obstacles to rapidly checking all databases rather than
the three listed. We did not analyze the extent to which the law
enforcement and intelligence databases available to TSA may contain
overlapping information.
TSA Lacks Program Effectiveness Measures for SPOT but Is Taking Steps
to Improve Evaluation Capabilities:
TSA has established some performance measures by tracking SPOT
referral and arrest data, but lacks the measures needed to evaluate
the effectiveness of the SPOT program and, as a result, has not been
able to fully assess SPOT's contribution to improving aviation
security. TSA emphasized the difficulty of developing performance
measures for deterrence-based programs, but stated that it is
developing additional measures to quantify the effectiveness of the
program. The SPOT program uses teams to assess BDO proficiency,
provide individual and team guidance, and address issues related to
the interaction of BDOs with TSA checkpoint personnel. However, TSA
does not systematically track the teams' recommendations or the
frequency of the teams' airport visits. TSA states that it is working
to address these issues and plans to do so by the end of fiscal year
2010.
TSA Has Taken Action to Collect Data for Some Performance Measures,
but Work Remains to Assess Progress Towards Achieving Strategic Goals:
TSA agreed that the SPOT program lacked sufficient performance
measures in the past, but stated that it has some performance measures
in place including tracking data on passengers referred for additional
screening and the resolution of this screening, such as if prohibited
items were found or if law enforcement arrested the passenger and the
reason for the arrest. TSA is also working to improve its evaluation
capabilities to better assess the effectiveness of the program. DHS's
NIPP, internal controls standards, and our previous work on program
assessment state that performance metrics and associated program
evaluations are needed to determine if a program works and to identify
adjustments that may improve its results.[Footnote 78] Moreover,
standard practices in program management for defining, designing, and
executing programs include developing a road map, or program plan, to
establish an order for executing specific projects needed to obtain
defined programmatic results within a specified time frame.[Footnote
79] Congress also needs information on whether and in what respects a
program is working well or poorly to support its oversight of agencies
and their budgets; and agencies' stakeholders need performance
information to accurately judge program effectiveness.[Footnote 80]
For example, in the Senate Appropriations Committee report
accompanying the fiscal year 2010 DHS appropriations bill,[Footnote
81] the committee noted that while TSA has dramatically increased the
size and scope of SPOT, resources were not tied to specific program
goals and objectives. In addition, the conference report accompanying
the fiscal year 2010 DHS appropriations act requires TSA to report to
Congress, within 60 days of enactment, on the effectiveness of the
program in meeting its goals and objectives, among other things.
[Footnote 82] This report was completed on March 15, 2010.
Although TSA tracks data related to SPOT activities including
prohibited items, law enforcement arrests related to SPOT referrals,
and reasons for the arrests (output measures), it has not yet
developed measures to gauge SPOT's effectiveness in meeting TSA
strategic goals (outcome measures), such as identifying individuals
who may pose a threat to the transportation system.[Footnote 83] OMB
encourages the use of outcome measures because they are more
meaningful than output measures, which tend to be more process-
oriented or means to an end.[Footnote 84] For example, TSA's Assistant
General Manager for the Office of Operation Process and Performance
Metrics[Footnote 85] told us that SPOT staffing levels are currently
used as one performance metric. The official said that since the SPOT
is an added layer of security, additional SPOT staffing would add to
security effectiveness. While staffing levels may help gauge how fast
the program is growing, they do not measure the effectiveness in
meeting strategic goals.
Similarly, TSA also cited the number of prohibited items discovered by
BDOs in SPOT metrics reports as a measure of program success.[Footnote
86] However, TSA told us that possession of a prohibited item is often
an oversight and not an intentional act; moreover, other checkpoint
screening layers are intended to find such items, such as the TSOs and
the property screening equipment.[Footnote 87] TSA also cited measures
of BDO job performance as some of the existing measures of program
effectiveness, but noted that these are "pass/fail" assessments of
individual BDOs, rather than overall program measures.
TSA notes that one purpose of the SPOT program is to deter terrorists,
but that proving that it has succeeded at deterring terrorists is
difficult because the lack of data has presented challenges for the
SPOT program office when developing performance measures. We agree
that developing performance measures, especially outcome measures, for
programs with a deterrent focus is difficult. Nevertheless, such
measures are an important tool to communicate what a program has
accomplished and provide information for budget decisions. TSA uses
proxy measures--indirect measures or indicators that approximate or
represent the direct measure--to address deterrence, other security
goals, or a combination of both. For example, TSA tracks the number of
prohibited items found and individuals arrested as a result of SPOT
referrals. According to OMB, proxy measures are to be correlated to an
improved security outcome, and the program should be able to
demonstrate--such as through the use of modeling--how the proxies tie
to the eventual outcome.[Footnote 88]In using a variety of proxy
measures, failure in any one of the identified measures could provide
an indication on the overall risk to security. However, developing a
plan that includes objectives, milestones, and time frames to develop
outcome-based performance measures could better position TSA in
assessing the effectiveness of the SPOT program.
With regard to more readily quantifiable output performance measures,
such as the number of referrals by BDOs, or the ratio of arrests to
referrals, TSA was limited in its ability to analyze the data related
to these measures. The SPOT database includes information on all
passengers referred by BDOs for additional SPOT screening including
the behaviors of the passengers that led to the additional screening,
as well as the resolution of the screening process (e.g., no further
action taken, law enforcement notification, law enforcement
investigation, arrested, and reason for arrest). However, TSA reported
that any analysis of the data had to be done manually.[Footnote 89]
In March 2010, TSA migrated the SPOT referral data to its Performance
Management Information System, allowing for more statistical and other
analyses. According to TSA, migrating the SPOT referral database will
enhance the SPOT program's analytic capabilities. For example, TSA
stated that it would be able to conduct trend analyses, better
segregate data, and create specific reports for certain data. This
includes better tracking of performance data at specific airports,
analyzing by categories of airports (threat or geographic location),
and tracking the performance data of individual BDOs, such as number
of referrals, number of arrests, arrest to referral ratios, and other
analyses. However, since these changes to the database were not
complete at the time of our audit, we could not assess whether the
problems we identified with the database had been corrected.
Over 4 Years, SPOT Resulted in About 1,100 Arrests Out of Almost
14,000 Referrals to Law Enforcement:
The SPOT referral database records the total number of SPOT referrals
since May 29, 2004, how many were resolved, how many passengers BDOs
referred to LEOs, the recorded reasons for the referral, and how many
referrals led to arrests, among other things. As shown in figure 4, we
analyzed the SPOT referral data for the period May 29, 2004, to August
31, 2008.
Figure 4: Passenger Boardings at SPOT Airports, May 29, 2004, through
August 31, 2008:
[Refer to PDF for image: illustration]
* Approximately 2 billion passengers boarded aircraft at SPOT airports:
* Approximately 152,000 SPOT secondary referrals:
* Approximately 14,000 passengers referred to LEOs:
* Approximately 1,100 SPOT related arrests:
Note: Figure 4 is not drawn to scale.
[End of figure]
Figure 4 shows that approximately 2 billion passengers boarded
aircraft at SPOT airports from May 29, 2004, through August 31, 2008.
[Footnote 90] Of these, 151,943 (less than 1/100TH of 1 percent) were
sent to SPOT referral screening, and of these, 14,104 (9.3 percent)
were then referred to LEOs. These LEO referrals resulted in 1,083
arrests, or 7.6 percent of those referred, and less than 1 percent of
all SPOT referrals (0.7 percent of 151,943).
We also analyzed the reasons for arrests resulting from SPOT
referrals, for the May 29, 2004, through August 31, 2008, period.
Table 2 shows, in descending order, the reasons for the arrests.
Table 2: Reasons for Arrests from SPOT Referrals, May 29, 2004 through
August 31, 2008:
Reasons for arrest: Illegal alien;
Number: 427;
Percentage: 39%.
Reasons for arrest: Outstanding warrants;
Number: 209;
Percentage: 19%.
Reasons for arrest: Possession of fraudulent documents;
Number: 166;
Percentage: 15%.
Reasons for arrest: Other;
Number: 128;
Percentage: 12%.
Reasons for arrest: Possession of suspected drugs;
Number: 125;
Percentage: 12%.
Reasons for arrest: No reason given;
Number: 16;
Percentage: 1%.
Reasons for arrest: Undeclared currency;
Number: 8;
Percentage: 1%.
Reasons for arrest: Suspect documents;
Number: 4;
Percentage: 0.
Reasons for arrest: Total;
Number: 1,083;
Percentage: 99%[A].
Source: TSA, SPOT referral database from period of May 29, 2004,
through August 31, 2008.
[A] Total does not add to 100 percent due to rounding.
[End of table]
While SPOT personnel did not determine a specific reason for arrest
for 128 cases categorized as "other" or 16 other cases categorized as
"no reason given," our analysis of the SPOT database found that a
specific reason for arrest could have been determined for these cases
by using the LEO resolution notes included in the database. For
example, we identified 43 additional arrests related to fraudulent
documents, illegal aliens, and suspect documents, among others. The
remaining 101 arrests originally characterized as "other" or "no
reason given" included arrests for reasons such as intoxication,
unruly behavior, theft, domestic violence, and possession of
prohibited items. Many of the arrests resulting from BDO referrals
would typically fall under the jurisdiction of various local, state,
and federal agencies and are not directly related to threats to
aviation security. For example, the 427 individuals arrested as
illegal aliens, and the 166 arrested for possession of fraudulent
documents, are subject to the enforcement responsibilities shared by
U.S. Immigration and Customs Enforcement (ICE) and CBP. Although
outstanding warrants and the possession of fraudulent or suspect
documents could be associated with a terrorist threat, TSA officials
did not identify any direct links to terrorism or any threat to the
aviation system in any of these cases.
According to TSA, anecdotal examples of BDO actions at airports show
the value added by SPOT to securing the aviation system. However,
because the SPOT program has not been scientifically validated, it
cannot be determined if the anecdotal results cited by TSA were better
than if passengers had been pulled aside at random, rather than as a
consequence of being identified for further screening by BDOs. Some of
the incidents cited by TSA include the following.
* A BDO referred two passengers who were traveling together to
referral screening due to suspicious behavior. During secondary
screening, one passenger presented fraudulent travel documents. The
other could not produce any documentation of his citizenship and it
was determined he was in the United States illegally. ICE responded
and interviewed both passengers. ICE stated one passenger was also in
possession of $10,000 dollars which alarmed positive for narcotics
when swept by a K-9 team. ICE arrested one passenger on a federal
charge of possession of fraudulent identification documents and entry
without inspection. ICE stated charges are still pending for the
possession of $10,000. The second passenger was charged with a federal
charge of entry without inspection.
* A BDO referred a passenger to referral screening for exhibiting
suspicious behavior. Port Authority of Portland (Oregon) Police
responded and interviewed the passenger who did not give a statement.
LEOs conducted an NCIC check which revealed that there was an
outstanding warrant for the failure to appear for a theft charge. LEOs
arrested the passenger on a state charge for an outstanding warrant
for the failure to appear for theft.
* A BDO referred a passenger for referral screening due to suspicious
behavior. During the referral, the passenger admitted that he was
unlawfully present in the United States. The Orlando (Florida) Police
Department and CBP responded and interviewed the passenger who stated
he had $100,000 in his checked baggage, which was confirmed by CBP.
The passenger was arrested on a federal charge of illegal entry.
Because these are anecdotal examples, they cannot be used to reliably
generalize about the SPOT program's overall effectiveness or success
rate. Our analysis of the SPOT referral database found that the
referral data do not indicate if any of the passengers sent to
referral screening, or those arrested by LEOs after being referred to
them, intended to harm the aircraft, its passengers, or other
components of the aviation system. Additionally, SPOT officials told
us that it is not known if the SPOT program has ever resulted in the
arrest of anyone who is a terrorist, or who was planning to engage in
terrorist-related activity.
Reviewing Airport Video Recordings of Individuals Later Arrested or
Who Pleaded Guilty for Engaging in Terrorism-Related Activities Could
Help TSA Better Identify Terrorist-Related Behaviors:
Studying airport video recordings of the behaviors exhibited by
persons waiting in line and moving through airport checkpoints and who
were later charged with or pleaded guilty to terrorism-related
offenses could provide insights about behaviors that may be common
among terrorists or could demonstrate that terrorists do not generally
display any identifying behaviors. TSA officials agreed that examining
video recordings of individuals who were later charged with or pleaded
guilty to terrorism-related offenses, as they used the aviation system
to travel to overseas locations allegedly to receive terrorist
training or to execute attacks, may help inform the SPOT program's
identification of behavioral indicators. In addition, such images
could help determine if BDOs are looking for the right behaviors or
seeing the behaviors they have been trained to observe.
Using CBP and Department of Justice information, we examined the
travel of key individuals allegedly involved in six terrorist plots
that have been uncovered by law enforcement agencies.[Footnote 91] We
determined that at least 16 of the individuals allegedly involved in
these plots moved through 8 different airports where the SPOT program
had been implemented.[Footnote 92] Six of the 8 airports were among
the 10 highest risk airports, as rated by TSA in its Current Airport
Threat Assessment. In total, these individuals moved through SPOT
airports on at least 23 different occasions. For example, according to
Department of Justice documents, in December 2007 an individual who
later pleaded guilty to providing material support to Somali
terrorists boarded a plane at the Minneapolis-Saint Paul International
Airport en route to Somalia to join terrorists there and engage in
jihad. Similarly, in August 2008 an individual who later pleaded
guilty to providing material support to Al-Qaeda boarded a plane at
Newark Liberty International Airport en route to Pakistan to receive
terrorist training to support his efforts to attack the New York
subway system.
Our survey of Federal Security Directors at 161 SPOT airports
indicated most checkpoints at SPOT airports have surveillance cameras
installed. As we previously reported, best practices for project
management call for conducting feasibility studies to assess issues
related to technical and economic feasibility, among other things.
[Footnote 93] In addition, Standards for Internal Control state that
effectively using available resources is one element of functioning
internal controls.[Footnote 94] TSA may be able to utilize the
installed video infrastructure at the nation's airports to study the
behavior of persons who were later charged with or pleaded guilty to
terrorism-related offenses, and determine whether BDOs saw the
behaviors. The Director of Special Operations in TSA's Office of
Inspection told us that video recordings could be used as a teaching
tool to show the BDOs which behaviors or activities they did or did
not observe. In addition, TSA indicated that although the airports may
have cameras at the security screening checkpoints, the cameras are
not owned by TSA, and in many cases, they are not accessible to TSA.
However, TSA officials lack information on the scope of these
potential limitations because prior to our work TSA did not have
information on the number of checkpoints equipped with video
surveillance. We obtained this information as part of our survey of
Federal Security Directors at SPOT airports. While TSA officials noted
several possible limitations of the use of the existing video
surveillance equipment, these images provide TSA a means of acquiring
information about terrorist behaviors in the checkpoint environment
that is not available elsewhere. If current research determines that
the SPOT program has a scientifically validated basis for using
behavior detection for counterterrorism purposes in the airport
environment, then conducting a study to determine the feasibility of
using images captured by video cameras could better position TSA in
identifying behaviors to observe.
Standardization Teams Assess BDO Proficiency in SPOT Activities and
Provide Guidance and Mentoring to BDOs:
TSA sends standardization teams to SPOT airports on a periodic basis
to conduct activities related to quality control. Teams observe SPOT
operations at an airport for several days, working side by side with
the BDOs, on multiple shifts, observing their performance, offering
guidance, and providing training when required. According to TSA, the
purpose of a standardization team visit is to provide operational
support to the BDOs, which includes additional training, mentoring,
and guidance to help maintain a successful SPOT program.
The standardization teams are comprised of at least two G-Band, or
Expert[Footnote 95] BDOs who have received an additional week of
training on SPOT behaviors and mentoring skills. SPOT officials stated
that the SPOT program uses its standardization teams to assess overall
BDO proficiency by observing BDOs, reviewing SPOT score sheet data,
and other relevant data. Standardization teams may also provide a
Behavior Observation and Analysis review class to refresh BDOs if the
team determines that such a class is needed. The SPOT program director
also said that the standardization teams aim to monitor the airport's
compliance with the SPOT program's Standard Operating Procedures. As
part of this mentoring approach, the standardization teams provide
individual and team guidance to the BDOs, offer assistance in program
management, and cover issues related to the interaction of BDOs with
other TSA checkpoint personnel.
TSA reported to us that it does not systematically track the
standardization teams' recommendations or the frequency of the teams'
airport visits. Standards for Internal Control state that programs
should have controls in place to assess the quality of performance
over time and ensure that the findings of audits and other reviews are
promptly resolved. Managers are to (1) promptly evaluate findings from
audits and other reviews, including those showing deficiencies and
recommendations reported by auditors and others who evaluate agencies'
operations; (2) determine proper actions in response to findings and
recommendations from audits and reviews; and (3) complete, within
established time frames, all actions that correct or otherwise resolve
the matters brought to management's attention.[Footnote 96] Although
the standardization teams may provide an airport Federal Security
Director with recommendations on how to improve SPOT operations, the
SPOT program director stated that Federal Security Directors are not
required to document whether they have implemented the team
recommendations. TSA officials told us that standardization teams can
follow up on recommendations made during previous visits. However, TSA
did not track whether corrective actions were implemented or the
frequency of the team's airport visits to ensure the implementation of
the airport's SPOT program. TSA officials stated that they are
currently examining ways to compile data to address this issue, and
expect to have a system in place in fiscal year 2010.
TSA Developed and Deployed SPOT Training but Further Action Could
Enhance Its Effectiveness:
Although TSA has taken steps to incorporate all four elements of an
effective training program by planning, designing, implementing, and
evaluating training for BDOs, further action could help enhance the
training's effectiveness. TSA initially consulted outside experts for
help in the training's development, which began as a half-day course
and has grown to include classroom, on-the-job, and advanced training.
TSA also has efforts underway to improve its training program, such as
the deployment of SPOT recurrent training. However, TSA evaluations of
SPOT program instructors found mixed quality among them, from 2006
onwards. Additionally, TSA has ongoing plans to evaluate the SPOT
training for effectiveness, but has not yet developed time frames and
milestones for completing the evaluation.
TSA Has Taken Actions to Develop and Deploy SPOT Training:
TSA's SPOT Training Evolved Over Time:
In 2003, TSA officials at Boston Logan International airport developed
the initial half-day training course for SPOT based on an existing
course developed for the Massachusetts State Police. Their goal was to
take the behavior detection program designed for law enforcement and
apply it to screeners at airport checkpoints. According to TSA
officials at Boston Logan, after they recognized that the lecture-
style course they originally designed was not effective, they tasked
an instructional system designer from TSA's Workplace Performance and
Training (the former name of TSA's Operational and Technical Training
Division)[Footnote 97] and an industrial psychologist from the Office
of Human Capital to redesign and expand the course, which was piloted
in 2005. The 2007 SPOT strategic plan included training objectives for
the SPOT program as follows:
* reviewing existing behavior observation training providers,
* establishing and prioritizing multimodal training and assistance
efforts based on threat assessments and critical infrastructure,
* establishing a Center of Excellence for Behavior Detection Program
training that would continually enhance the quantity and quality of
training to selected candidates, and:
* developing a recurrent training program designed to refresh and hone
skills needed for an effective Behavior Detection Program.
Since that time, the SPOT program implemented, or is in the process of
implementing, some of these objectives. For example, in 2008, as part
of its effort towards establishing a center for excellence in behavior
detection training (third objective), the SPOT program participated in
a meeting with behavior detection training officials from various DHS
components facilitated by DHS's Screening Coordination Office to
promote the sharing of information about behavior detection training
and foster future collaboration. Additionally, the SPOT program worked
with TSA's Operational and Technical Training Division to create a
recurrent training component for BDOs (fourth objective). For example,
in 2008, the SPOT program office added a course on detecting
microfacial expressions called Additional Behavior Detection
Techniques.[Footnote 98] This 3-day course builds on the behavior
detection skills taught in basic training, by teaching BDOs how to
detect microfacial expressions. After pilot testing, the course began
implementation nationwide in January 2009.
TSA Consulted with Some Experts on Developing SPOT Training:
In developing an effective training program, we previously reported
that consultation with subject matter experts and expert entities is a
core characteristic of the strategic training and development process.
[Footnote 99] TSA SPOT program staff told us that they consulted with
experts on behavior detection and observed existing behavior detection
courses before deploying the SPOT training program. According to SPOT
program officials, a TSA staff member from Boston Logan International
Airport attended other training programs offered by other federal
agencies and private training organizations to inform the design of
SPOT training.[Footnote 100] TSA officials told us that information
from the training courses was used to help develop the list of
behaviors or "stress elevators" for the program, and that the point
system used to identify passengers for referral screening was based in
part on consultations with several subject-matter experts.
TSA documentation also notes that a SPOT working group created in
February 2004 consulted with the FBI's Behavioral Science Unit.
[Footnote 101] The Behavioral Science Unit specializes in developing
and facilitating training, research, and consultation in the
behavioral sciences for the FBI, law enforcement, intelligence, and
military communities. While TSA officials from Boston Logan told us
that the FBI was included in this initial SPOT working group, these
officials agree that coordination with the FBI lapsed until June 2009
when the SPOT Program Office reengaged with the Behavioral Science
Unit, and held a meeting with the unit at the FBI Academy in Quantico,
Virginia. Since that meeting, a subject matter expert from the SPOT
Program Office has been invited to be a member of the Terrorism
Research and Analysis Project, which is an ongoing working group
sponsored by the unit.
In July 2008, DHS's Screening Coordination Office facilitated a
collaborative discussion on behavior detection that included TSA, CBP,
and Secret Service officials to better ensure that components within
DHS share information regarding their efforts in behavior detection
and provide a forum for components to have an informed and
collaborative discussion on current capabilities, best practices, and
lessons learned. According to TSA, no further contact has occurred
between the DHS Behavior Detection Working Group and the SPOT program.
Thus, the extent to which the working group's expertise will be used
to refine or augment SPOT training in the future is not yet clear.
SPOT Program Office Recently Deployed Recurrent Training:
Along with basic and remedial training required by the Aviation and
Transportation Security Act, TSA policy requires its screening force
to regularly complete recurrent (refresher) training. TSA recognized
that ongoing training of screeners on a frequent basis and effective
supervisory training are critical to maintaining and enhancing skills
learned during basic training. According to agency officials, TSA is
currently working with DHS S&T to determine the necessary frequency
for refresher training for each training course within the SPOT
program. Furthermore, TSA plans to place BDOs under TSA's Performance
and Accountability Standards System (PASS) beginning in fiscal year
2010. This will include a recertification module.
In 2008, the SPOT program office began the process for developing
recurrent SPOT training. Our internal control standards and training
assessment guidance suggest that such refresher training should be
considered integral to an effective training program from the start
because work conditions and environments can be expected to change
over time, and additional or updated training is essential to ensuring
that the program mission continues to be accomplished.[Footnote 102]
According to the SPOT program office, the recently deployed recurrent
training will be semiannual. TSA's Operational and Technical Training
Division initially planned to pilot test recurrent training in April
2009 followed by full implementation of the course in approximately
May 2009. Because the Operational and Technical Training Division
focus was shifted to completing the revisions for the SPOT basic
certification course, recurrent training was delayed until September
2009 when they released the training on TSA's Online Learning Center.
Instructor Evaluations Found Mixed Quality; Issues with Program
Management Led to Instructor Retraining:
Our previous work on elements of effective training states that
instructors must be both knowledgeable about the subject matter and
issues involved, as well as able to effectively transfer these skills
and knowledge to others.[Footnote 103] Moreover, internal control
standards state that all personnel need to possess and maintain a
level of competence that allows them to accomplish their assigned
duties.[Footnote 104] Management needs to identify appropriate
knowledge and skills needed for various jobs and provide needed
training, as well as to ensure that those teaching the skills are
themselves competent.
TSA conducted internal assessments of SPOT instructors episodically
from 2006 through March 2008. These assessments involved a few
instructors being rated at a time, and found a wide range of
competency among the instructors. In January 2009, TSA's Office of
Inspections and Investigations began an investigation of the SPOT
training manager, who resigned shortly thereafter. TSA investigators
determined that the training manager and other trainers had created a
hostile training environment that intimidated some trainees. To
address this problem, TSA stated that the program office reexamined
the SPOT training program nationally. This included recertifying 47 of
54 SPOT instructors in March 2009, which included evaluation by TSA's
Office of Human Capital, Quality Assurance assessors. Additionally, in
July 2009, TSA centralized SPOT training at five permanent, regional
training facilities in Orlando, Florida; Houston, Texas; Phoenix,
Arizona; Denver, Colorado; and Philadelphia, Pennsylvania.[Footnote
105] According to the SPOT program director, this will allow the SPOT
program office more oversight over training. Previously, training was
provided at individual airports.
After the March 2009 recertification training, ratings scores of SPOT
instructors showed less variation than did previous ratings. We
reviewed the quality assurance instructor evaluations of two SPOT
instructors conducted by TSA's Office of Human Capital, Training
Standards and Evaluation Branch, and the 167 SPOT program instructor
evaluations of 54 SPOT instructors conducted by the SPOT program
office and TSA's Operational and Technical Training Division since the
program started in October 2006.[Footnote 106] After the
recertification training, 93 percent of instructors were rated as
exceeding expectations, compared to 30 percent in the 2006 to
September 2008 ratings. Table 3 shows the ratings of instructors for
March 2009 compared to the period of 2006 to September 2008.[Footnote
107]
Table 3: SPOT Instructor Evaluation Ratings, 2006 to September 2008,
and March 2009:
2006 - Sept 2008;
Number of instructor evaluations: 73;
Unsatisfactory (0-74%): Number: 3;
Unsatisfactory (0-74%): Percent: 4%;
Needs improvement (75-84%): Number: 5;
Needs improvement (75-84%): Percent: 7%;
Meets expectations (85-94%): Number: 36;
Meets expectations (85-94%): Percent: 49%;
Exceeds expectations (95-100%): Number: 22;
Exceeds expectations (95-100%): Percent: 30%;
No numeric score given: Number: 7;
No numeric score given: Percent: 10%.
March 2009;
Number of instructor evaluations: 94;
Unsatisfactory (0-74%): Number: 0;
Unsatisfactory (0-74%): Percent: 0%;
Needs improvement (75-84%): Number: 1;
Needs improvement (75-84%): Percent: 1%;
Meets expectations (85-94%): Number: 6;
Meets expectations (85-94%): Percent: 6%;
Exceeds expectations (95-100%): Number: 87;
Exceeds expectations (95-100%): Percent: 93%;
No numeric score given: Number: 0;
No numeric score given: Percent: 0%.
Source: GAO analysis of TSA Quality Assurance Instructor Evaluations
for SPOT.
[End of table]
In addition to the variation in numeric scores and rating levels for
the 2006 to September 2008 period, as shown in table 3, we found
substantial variation in the comments about instructor competency for
the same period. For example, in 32 out of 74 instructor evaluation
forms that we reviewed where comments were made about the instructor
prior to 2009, the comments ranged from superb to needs more
experience as an instructor, as well as needs more time performing the
job as a BDO to be able to teach others. In the comments on an
instructor who was rated as "meets expectations," the instructor was
described as having "limited experience within the SPOT program," that
this was "a major concern," and it was recommended that the instructor
spend as much time as possible functioning as a BDO. In other cases,
however, SPOT instructors were described as competent, solid, and
outstanding. For example, one instructor who received a rating of
"exceeds expectations" was described as a superb instructor who "is a
valued member of the National Training Team." As noted above,
following the March 2009 recertification training, 93 percent of the
instructors received a rating of "exceeds expectations" with only 1
percent "needing improvement." Of the 94 instructor evaluations
completed in March 2009, 82 contained written comments. Of these,
multiple SPOT instructors were described as excellent, knowledgeable,
and effective. For example, an instructor who received a rating of
"exceeds expectations" was noted as demonstrating a high degree of
material knowledge and great presentation skills. TSA attributed the
increase in instructor ratings to two factors. The first is low
turnover among SPOT instructors, which allows instructors to hone both
their technical and instructor skills. The second factor cited by TSA
is that TSA conducted a 2-day instructor refresher training
immediately prior to the evaluations in March 2009. To ensure all
instructors were reevaluated within a specific time frame, evaluations
were scheduled and conducted in a controlled environment. Instructors
knew in advance they were going to be evaluated and delivered modules
of the BDO certification course to other BDO instructors.
TSA Has Taken Some Action, but Has Not Evaluated the SPOT Training
Program for Effectiveness:
We previously reported that evaluation is an integral part of training
and development efforts, and that agencies need to systematically plan
for and evaluate the effectiveness of training and development.
[Footnote 108] Employing systematic monitoring and feedback processes
can help by catching potential problems at an early stage, thereby
saving valuable time and resources that a major redesign of training
would likely entail. Similarly, in 2006, TSA's Operational and
Technical Training Division issued general evaluation standards for
training programs, stating that training programs should be
comprehensively evaluated on a periodic basis to identify program
strengths and weaknesses.[Footnote 109] Moreover, standard practices
in program management for defining, designing, and executing programs
include developing a road map, or program plan, to establish an order
for executing specific projects needed to obtain defined programmatic
results within a specified time frame.[Footnote 110]
The former SPOT training manager told us that the SPOT program
internally evaluates the effectiveness of SPOT training through the
job knowledge tests that BDO candidates must pass following the
classroom portion of the training and the SPOT Proficiency/On-the-Job
Training Checklist following the on-the-job portion of the training.
Furthermore, the former training manager told us that TSA knows that
the SPOT training is effective because BDOs are able to recognize
behaviors at the checkpoint, and because of BDOs' demonstrated ability
to identify criminals--such as drug couriers or people with
outstanding arrest warrants--through the screening process.
Although TSA has not conducted a comprehensive analysis of the
effectiveness of the SPOT training program, TSA's Office of Human
Capital, Training Standards and Evaluation Branch conducted training
evaluations to assess how students use what they were taught in the
SPOT basic training course. Specifically, from July through September
2008, the Training Standards and Evaluation Branch conducted
evaluations at 5 of the 161 airports where the SPOT program is
currently operating. Based on BDO feedback at the 5 airports, the
Training Standards and Evaluation Branch's final report contained a
series of recommendations for improving the SPOT training program.
These recommendations and TSA's actions to address them are summarized
in table 4.
Table 4: TSA Training Standards and Evaluation Branch Recommendations
for Improving SPOT Training and TSA Actions on the Recommendations:
Training Standards and Evaluation Branch recommendations: Ensure
training instructors adhere to a set of professional guidelines;
TSA action on recommendations: TSA sent 47 TSA Approved Instructors
for the SPOT program to recertification training in March 2009.
Training Standards and Evaluation Branch recommendations: Add local
policies and procedure as an addendum to the (SPOT) Training;
TSA action on recommendations: No action[A].
Training Standards and Evaluation Branch recommendations: Include more
role-playing and scenarios in the classroom training so all trainees
can practice casual conversation skills;
TSA action on recommendations: TSA added more role-playing scenarios
to their basic SPOT training.
Training Standards and Evaluation Branch recommendations: Develop
recurrent training that can be placed on the TSA Online Learning
Center;
TSA action on recommendations: TSA developed and deployed recurrent
training on the TSA Online Learning Center in September 2009.
Training Standards and Evaluation Branch recommendations: Develop
templates for writing reports;
TSA action on recommendations: TSA added an Incident Report Writing
course to the TSA Online Learning Center. Additionally, TSA has
developed templates for Incident Reports and After Action Reports. TSA
has also developed Online Learning Center training for completing SPOT
Referral Reports.
Training Standards and Evaluation Branch recommendations: Provide more
real world videos;
TSA action on recommendations: TSA revised the SPOT training videos in
late 2008.
Training Standards and Evaluation Branch recommendations: Provide
recurrent training of behaviors through online videos;
TSA action on recommendations: The video scenarios for recurrent
training will be available in the second quarter of fiscal year 2010.
Training Standards and Evaluation Branch recommendations: Add parts of
the Bomb Appraisal Officer task into the training;
TSA action on recommendations: No action[A].
Training Standards and Evaluation Branch recommendations: Provide
recurrent training outside of TSA (more Immigration and Customs
Enforcement, DEA, and CBP training);
TSA action on recommendations: No action[A].
Training Standards and Evaluation Branch recommendations: Have BDOs
spend more time with an On-the-Job-Training mentor;
TSA action on recommendations: No action[A].
Training Standards and Evaluation Branch recommendations: Validate the
training for course content and On-the-Job-Training;
TSA action on recommendations: In 2009, in coordination with DHS S&T,
TSA began the scientific analysis of the BDO position to empirically
derive and validate the knowledge, skills, and attributes that it
requires. The analysis is projected to be completed in fiscal year
2010.
Training Standards and Evaluation Branch recommendations: Clarify
SPOT's "Walk-the-Line" policy and communicate it to all BDO personnel;
TSA action on recommendations: TSA issued revised SPOT Standard
Operating Procedures to all BDOs in January 2009.
Source: TSA, Training Standards and Evaluation Branch, Office of Human
Capital, Memorandum For Operational and Technical Training, and
Behavior Detection and Document Validation Branch, Office of Security
Operations on Training Transfer (L3) of SPOT Training, October 30,
2008.
[A] According to TSA, the SPOT program office will determine if the
recommended action is appropriate after the BDO job task analysis and
training task analysis are completed.
[End of table]
Additionally, in conjunction with S&T, TSA conducted a training
effectiveness evaluation on the Additional Behavior Detection
Techniques course, which showed a statistically significant increase
in knowledge and skills following completion of the course.
S&T is currently conducting a BDO job task analysis, which may be used
to evaluate and update the SPOT training curriculum. Following the
completion of the job task analysis--anticipated in mid-May 2010--
TSA's Operational and Technical Training Division intends to conduct
an in-depth training gap analysis,[Footnote 111] which will take
approximately 2 months to complete. Following completion of the
training gap analysis, the agency will develop project plans,
including milestones for future development efforts, to address any
training concerns. However, to date, the agency does not have an
evaluation plan including time frames and milestones for completion.
According to the Operational and Technical Training Division, TSA will
conduct periodic evaluations as the BDO position evolves. By
conducting a comprehensive evaluation of the effectiveness of its
training program, TSA will be in a better position to determine if
BDOs are being taught the knowledge and skills they need to perform
their job. Furthermore, by developing milestones and time frames for
conducting such evaluations systematically, as well as on a periodic
basis, TSA could help ensure that the SPOT training program is
evaluated in accordance with its directives to help ensure that the
program continues to provide BDOs with the necessary tools required to
carry out their responsibilities.
Conclusions:
TSA developed the SPOT program in the wake of September 11, 2001, in
an effort to respond quickly to potential threats to aviation security
by identifying individuals who may pose a threat to aviation security,
including terrorists planning or executing an attack who were not
likely to be identified by TSA's other screening security measures.
Because TSA did not ensure that SPOT's underlying methodology and work
methods were scientifically validated prior to its nationwide
deployment, an independent panel of experts could help determine
whether a scientific foundation exists for the way in which the SPOT
program uses behavior detection analysis for counterterrorism purposes
in the aviation environment.
With approximately $5.2 billion devoted to screening passengers and
their property in fiscal year 2009, it is important that TSA provides
effective stewardship of taxpayer funds ensuring a return on
investment for each layer of its security system. As one layer of
aviation security, the SPOT program has an estimated projected cost of
about $1.2 billion over the next 5 years if the administration's
requested funding of $232 million for fiscal year 2011 remains at this
level.[Footnote 112] The nation's constrained fiscal environment makes
it imperative that careful choices be made regarding which investments
to pursue and which to discontinue. If an independent expert panel
determines that DHS's study is sufficiently comprehensive to determine
whether the SPOT program is based on valid scientific principles that
can be effectively applied in an airport environment for
counterterrorism purposes, then conducting a comprehensive risk
assessment including threat, vulnerability, and consequence could
strengthen TSA's ability in making resource allocation decisions and
prioritizing its risk mitigation efforts. Moreover, conducting a cost-
benefit analysis could help TSA determine whether SPOT provides
benefits greater than or equal to other security alternatives and
whether its level of investment in the SPOT program is appropriate.
Revising its strategic plan for SPOT to incorporate risk assessment
information, cost and resource analysis, and other essential
components could enhance the plan's usefulness to TSA in making
program management and resource allocation decisions to effectively
manage the deployment of SPOT.
Providing guidance on how to use TSA's resources for running passenger
names against intelligence and criminal databases available to the
Transportation Security Operations Center and helping DHS to connect
disparate pieces of information using the Transportation Information
Sharing System and other related intelligence and crime database and
data sources could better inform DHS and TSA regarding the identity
and background of certain individuals and thereby enhance aviation
security. In addition, implementing the steps called for in the TSA
Office of Strategic Operations plan to provide BDOs with a real-time
mechanism to verify passenger identities and backgrounds via TSA's
Transportation Security Operations Center could strengthen their
ability to rapidly verify the identity and background of passengers
who have caused concern, and increase the likelihood of detecting and
disrupting potential terrorists intending to cause harm to the
aviation system. Additionally, developing outcome-oriented performance
measures, making improvements to the SPOT database, and studying the
feasibility of utilizing video recordings of individuals as they
transited checkpoints and who were later charged with or pleaded
guilty to terrorism-related offenses, could help TSA evaluate the SPOT
program, identify potential vulnerabilities, and assess the
effectiveness of its BDOs. Further, developing a plan for systematic
and periodic evaluation of the training provided to BDOs along with
time frames and milestones for its completion could help ensure that
the SPOT training program is evaluated in accordance with its
directives to help ensure that the program continues to provide BDOs
with the necessary tools required to carry out their responsibilities.
Recommendations for Executive Action:
To help ensure that SPOT is based on valid scientific principles that
can be effectively applied in an airport environment, we recommend
that the Secretary of Homeland Security convene an independent panel
of experts to review the methodology of the DHS S&T Directorate study
on the SPOT program to determine whether the study's methodology is
sufficiently comprehensive to validate the SPOT program. This
assessment should include appropriate input from other federal
agencies with expertise in behavior detection and relevant subject
matter experts.
If this research determines that the SPOT program has a scientifically
validated basis for using behavior detection for counterterrorism
purposes in the airport environment, then we recommend that the TSA
Administrator take the following four actions:
* Conduct a comprehensive risk assessment to include threat,
vulnerability, and consequence of airports nationwide to determine the
effective deployment of SPOT if TSA's ongoing Aviation Modal Risk
Assessment lacks this information.
* Perform a cost-benefit analysis of the SPOT program, including a
comparison of the SPOT program with other security screening programs,
such as random screening, or already existing security measures.
* Revise and implement the SPOT strategic plan by incorporating risk
assessment information, identifying cost and resources, linking it to
other related TSA strategic documents, describing how SPOT is
integrated and implemented with TSA's other layers of aviation
security, and providing guidance on how to effectively link the roles,
responsibilities, and capabilities of federal, state, and local
officials providing program support.
* Study the feasibility of using airport checkpoint-surveillance video
recordings of individuals transiting checkpoints who were later
charged with or pleaded guilty to terrorism-related offenses to
enhance understanding of terrorist behaviors in the airport checkpoint
environment.
Concurrent with the DHS S&T Directorate study of SPOT, and an
independent panel assessment of the soundness of the methodology of
the S&T study, we recommend that the TSA Administrator take the
following six actions to ensure the program's effective implementation:
* To provide additional assurance that TSA utilizes available
resources to support the goals of deterring, detecting, and preventing
security threats to the aviation system, TSA should:
- Provide guidance in the SPOT Standard Operating Procedures or other
TSA directive to BDOs, or other TSA personnel, on inputting data into
the Transportation Information Sharing System and set milestones and a
time frame for deploying Transportation Information Sharing System
access to SPOT airports so that TSA and intelligence community
entities have information from all SPOT LEO referrals readily
available to assist in "connecting the dots" and identifying potential
terror plots.
- Implement the steps called for in the TSA Office of Security
Operations Business plan to develop a standardized process for
allowing BDOs or other designated airport officials to send
information to TSA's Transportation Security Operations Center about
passengers whose behavior indicates that they may pose a threat to
security, and provide guidance on how designated TSA officials are to
receive information back from the Transportation Security Operations
Center.
- Direct the TSA Transportation Security Operations Center to utilize
all of the law enforcement and intelligence databases available to it
when running passenger names, for passengers who have risen to the
level of a LEO referral.
* To better measure the effectiveness of the program and evaluate the
performance of BDOs, TSA should:
- Establish a plan that includes objectives, milestones, and time
frames to develop outcome-oriented performance measures to help refine
the current methods used by Behavior Detection Officers for
identifying individuals who may pose a risk to the aviation system.
- Establish controls to help ensure completeness, accuracy,
authorization, and validity of data collected during SPOT screening.
* To help ensure that TSA provides BDOs with the knowledge and skills
needed to perform their duties, TSA should:
- Establish time frames and milestones for its plan to systematically
conduct evaluations of the SPOT training program on a periodic basis.
Agency Comments and Our Evaluation:
We provided a draft of our report to DHS and TSA on March 19, 2010,
for review and comment. On May 3, 2010, DHS provided written comments,
which are reprinted in appendix II. In commenting on our report, DHS
stated that it concurred with 10 of our recommendations and identified
actions taken, planned, or under way to implement them. However, the
actions DHS reported it plans to take and has underway do not fully
address the intent of our first recommendation. DHS also concurred in
principle with an eleventh recommendation stating that it had convened
a working group to determine the feasibility of implementing it. DHS
commented on the scientific basis underlying SPOT and on two
statements in our report that it believed were inaccurate--
specifically, DHS disagreed with our reliance on a 2008 National
Research Council report published under the auspices of the National
Academy of Sciences on issues related to behavior detection, and
second, on issues related to unpublished research they had cited as a
partial validation of some aspects of the SPOT program.[Footnote 113]
Finally, DHS commented on our conclusion regarding the use of the SPOT
referral data.
Regarding our first recommendation that DHS convene an independent
panel of experts to review the methodology of DHS's Science and
Technology Directorate (S&T) study on SPOT, and to include appropriate
input from other federal agencies with relevant expertise, DHS
concurred and stated the current process includes an independent
review of the program that will include input from other federal
agencies and relevant experts. Although DHS has contracted with the
American Institutes for Research to conduct its study, it remains
unclear who will oversee this review and whether they are sufficiently
independent from the current research process. DHS's response also
does not describe how the review currently planned is designed to
determine whether the study's methodology is sufficiently
comprehensive to validate the SPOT program. As we noted in our report,
research on other issues, such as determining the number of
individuals needed to observe a given number of passengers moving at a
given rate per day in an airport environment or the duration that such
observation can be conducted by BDOs before observation fatigue
affects effectiveness, could provide additional information on the
extent to which SPOT can be effectively implemented in airports. Dr.
Paul Ekman, a leading research scientist in the field of behavior
detection, told us that additional research could help determine the
need for periodic refresher training since no research has yet
determined whether behavior detection is easily forgotten or can be
potentially degraded with time or lack of use. Thus, questions exist
as to whether behavior detection principles can be reliably and
effectively used for counterterrorism purposes in airport settings to
identify individuals who may pose a risk to the aviation system. To
help ensure an objective assessment of the study's methodology and
findings, DHS could benefit from convening an independent panel of
experts from outside DHS to determine whether the study's methodology
is sufficiently comprehensive to validate the SPOT program.
DHS also concurred with our second recommendation to conduct a
comprehensive risk assessment to determine the effective deployment of
SPOT. DHS stated that TSA's Aviation Modal Risk Assessment is designed
to evaluate overall transportation security risk, not deployment
strategies. However, DHS noted that TSA is in the process of
conducting an initial risk analysis using its risk management analysis
tool and plans to update this analysis in the future. However, it is
not clear from DHS's comments how this analysis will incorporate an
assessment of TSA's deployment strategy for SPOT.
DHS also concurred with our third recommendation to perform a cost-
benefit analysis of SPOT. DHS noted that TSA is developing an initial
cost-benefit analysis and that the flexibility of behavior detection
officers already suggests that behavior detection is cost-effective.
However, it is not clear from DHS's comments whether its cost-benefit
analysis will include a comparison of the SPOT program with other
security screening programs, such as random screening, or already
existing security measures as we recommended. Completing its cost-
benefit analysis and comparing it to other screening programs should
help establish whether the SPOT program is cost-effective compared to
other layers of security.
With regard to our fourth recommendation to revise and implement the
SPOT strategic plan using risk assessment information, DHS concurred
and noted that analysis facilitated by the risk management analysis
tool will allow the program to revise the SPOT strategic plan to
incorporate the elements identified in our recommendation.
DHS also concurred with our fifth recommendation to study the
feasibility of using airport checkpoint-surveillance video recordings
to enhance its understanding of terrorist behaviors. DHS noted that
TSA agrees this could be a useful tool and is working with DHS's S&T
Directorate to utilize video case studies of terrorists, if possible.
These cases studies could help TSA determine what behaviors had been
demonstrated by these persons convicted of terrorist-related offenses
who went through SPOT airports, and what could be learned from the
observed behaviors.
DHS concurred with our sixth recommendation that TSA provide guidance
in the SPOT SOP or other directives to BDOs, or other TSA personnel,
on how to input data into the Transportation Information Sharing
System database. DHS stated that the SPOT SOP is undergoing revision,
and that the revised version will provide guidance directing the input
of BDO data into the Transportation Information Sharing System. DHS
anticipates release of the updated SPOT SOP in fiscal year 2010. DHS
also agreed that TSA should set milestones and a time frame for
deploying Transportation Information Sharing System access to SPOT
airports so that TSA and intelligence community entities have
information from all SPOT LEO referrals readily available to assist in
"connecting the dots" and identifying potential terror plots. DHS
stated that TSA is currently drafting a plan to include milestones and
a time frame for deploying System access to all SPOT airports.
DHS concurred with our seventh recommendation to develop a
standardized process to allow BDOs or other designated airport
officials to send information to TSA's Transportation Security
Operations Center about passengers whose behavior indicates they may
pose a threat to security, and to provide guidance on how designated
TSA officials are to receive information back from the Center. DHS
stated that TSA has convened a working group to address this
recommendation. Moreover, TSA is developing a system and procedure for
sending and receiving information from the Center and stated that it
anticipates having a system in place later in fiscal year 2010.
DHS concurred in principle with regard to our eighth recommendation
that the Transportation Security Operations Center utilize all of the
databases available to it when conducting checks on passengers who
rise to the level of a LEO referral against intelligence and criminal
databases. DHS stated that TSA has convened a working group to address
this recommendation. According to DHS, this group will conduct a study
during fiscal year 2010 to determine the feasibility of fully
implementing this recommendation. As such, the study is to review the
various authorities, permissions, and limitations of each of the
databases or systems cited in our report. DHS stated that access to
some of the systems, requires more justification than a BDO referral.
Further, according to DHS, because some of the databases or systems
contain classified information, TSA will also need to adopt a
communication strategy to transmit the passenger information between
the BDO and Transportation Security Operations Center. DHS stated that
TSA will work on a process to collect the passenger information,
verify the passenger's identity, through checks of databases, and
analyze that information to determine if the passenger is the subject
of an investigation and may pose a risk to aviation security.
With regard to our ninth recommendation to establish a plan with
objectives, milestones, and time frames to develop outcome-oriented
performance measures for BDOs, DHS concurred and stated that TSA
intends to consult with experts to develop outcome-oriented
performance measures.
DHS also concurred with our tenth recommendation to establish controls
for SPOT data. DHS noted that TSA established additional controls as
part of the SPOT database migration to TSA's Performance Management
Information System and is exploring an additional technology solution
to reduce possible errors. As noted in our report, since these changes
to the database were not complete at the time of our audit, we could
not assess whether the problems we identified with the database had
been corrected.
Regarding our eleventh recommendation to establish time frames and
milestones to systematically evaluate the SPOT training program on a
periodic basis, DHS concurred and stated that TSA intends to develop
such a plan following completion of DHS's S&T Directorate's BDO Job
Task Analysis, and TSA's training gap analysis, which identifies gaps
in the training curriculum.
DHS also commented on the scientific basis underlying SPOT.
Specifically, DHS stated that decades of scientific research has shown
the SPOT behaviors to be "universal in their manifestation." However,
according to DHS, its S&T Directorate is examining the extent to which
behavior indicators are appropriate for screening purposes and lead to
appropriate and correct security decisions. DHS also commented that
the results of this work, which is currently underway, will establish
a scientific basis of the extent to which the SPOT program instruments
and methods are valid. Thus, DHS's comments suggest that additional
research is needed to determine whether these behaviors can be used in
an airport environment for screening passengers to identify threats to
the aviation system.
Moreover, DHS took issue with our use of a report from the National
Research Council of the National Academy of Sciences stating that we
improperly relied upon this report.[Footnote 114] We disagree. DHS
questioned the findings of the National Research Council report and
stated that it lacked sufficient information for its conclusions
because it principally focused on privacy as it relates to data mining
and behavioral surveillance and was not intended to represent an
exhaustive or definitive review of the research or operational
literature on behavioral screening, including recent unpublished DHS,
defense, and intelligence community studies. DHS also stated that the
National Research Council report did not study the SPOT program and
that the researchers did not conduct interviews with SPOT personnel.
As we noted in our report, although the National Research Council
report addresses broader issues related to privacy and data mining, a
senior Council official--and one of the authors of the study--stated
that the committee included behavior detection as a focus because any
behavior detection program could have privacy implications. This
official added that the primary objective of the report was to develop
a framework for sound decision making for programs, such as SPOT, and
help ensure a sound scientific and legal basis. According to this
official, the National Academy of Sciences' Committee on Technical and
Privacy Dimensions of Information for Terrorism Prevention and Other
National Goals--which had oversight of the report--was briefed on the
SPOT program as part of the study. The Committee also conducted
meetings with three experts in behavior detection as part of their
research. During the course of our review, we interviewed three
Committee members responsible for developing the report's findings, as
well as four other behavior detection experts, including the three who
participated in the National Research Council study. Our discussions
with these experts corroborated the report's findings. Thus, we
believe that our use of the Council report was an appropriate and a
necessary part of our review.
However, the National Research Council report was only one of many
sources that we analyzed with regard to the science of behavioral and
physiological screening, and its applicability to an airport
environment. As we noted in the description of our methodology, our
study included interviews with officials from DHS as well as several
of its components and other U.S. government agencies--each of which
use elements of behavior detection in their daily work. We also
interviewed El Al airline officials, a former director of security at
Israel's Ben-Gurion airport, and seven nationally recognized experts
in behavior detection as part of our review. Moreover, as we explained
in the discussion of our scope and methodology, we conducted a survey
about the SPOT program of all 118 Federal Security Directors for all
SPOT airports, and conducted site visits to 15 SPOT airports. In
addition, we analyzed the SPOT referral database, to the extent the
data permitted, covering a 4-year period and the results from 2
billion passengers passing through SPOT airports. Moreover, we
attended both the basic and advanced training courses in behavior
detection provided by TSA to BDOs, in order to better understand how
the program is carried out. Therefore, our analysis of the program was
not derived from or based on a single study by the National Research
Council as DHS suggested, but rather is based on all of the
information we gathered and synthesized from multiple, diverse, expert
sources, each of which provided different perspectives about the
program, as well as about behavior detection in general.
DHS also disagreed with the accuracy of a statement included in our
report that noted DHS S&T could not provide us with specific contacts
related to sources of information for certain research it cited as
support for the SPOT program. In its comments, DHS stated that it had
provided us with all requested documents that represent DHS's S&T
Directorate-sponsored research. We agree. However, DHS did not provide
us with contact information for the sources of unpublished studies by
the Department of Defense and other intelligence community studies
that DHS S&T had cited as support for the SPOT program. Without such
information, we are unable to verify the contents of these unpublished
studies.
Finally, DHS stated that while we were unable to use the SPOT referral
data to assess whether any behavior or combination of SPOT behaviors
could be used to reliably predict the final outcome of an incident
involving the use of SPOT, it was able to analyze the SPOT referral
database successfully after working with TSA to verify scores assigned
to different indicators. Our concern with the data did not involve the
question of whether some behaviors were entered erroneously, nor
whether errors in coding were excessive or non-random. Rather, we were
concerned with whether the data on behaviors were complete.
Specifically, it cannot be determined from the SPOT referral database
whether all behaviors observed were included for each referred
passenger by each BDO or whether only the behaviors that were
sufficient for a LEO referral were recorded into the database. It is
not possible to determine from the database if the number of observed
behaviors entered for a given passenger was the total number of
observed behaviors, or whether additional behaviors were observed. A
rigorous analysis of the relative effects of the different behaviors
on the outcomes of the use of SPOT would require each BDO to record,
for each of the observable behaviors, whether it was or was not
observed.
TSA also provided technical comments that we incorporated as
appropriate.
We will send copies of this report to the Secretary of Homeland
Security; the TSA Administrator (Acting); and interested congressional
committees as appropriate. The report will also be available at no
charge on the GAO Web site at [hyperlink, http://www.gao.gov].
If you or your staff have any questions about this report, please
contact me at (202) 512-4379 or lords@gao.gov. Contact points for our
Offices of Congressional Relations and Public Affairs may be found on
the last page of this report. Key contributors to this report are
acknowledged in appendix III.
Sincerely yours,
Signed by:
Stephen M. Lord:
Director, Homeland Security and Justice Issues:
[End of section]
Appendix I: Scope and Methodology:
To determine the extent to which the Transportation Security
Administration (TSA) determined whether the Screening of Passengers By
Observation Techniques (SPOT) program had a scientifically-validated
basis for identifying passengers before deploying it, we reviewed
literature on behavior analysis by subject matter experts, interviewed
seven experts in behavior analysis, interviewed other federal agencies
and entities about how they use behavior detection techniques, and
analyzed relevant reports and books on the topic. These included a
2008 study by the National Research Council of the National Academy of
Sciences that has a discussion regarding deception and behavioral
surveillance, as well as other issues related to behavioral
analysis.[Footnote 115] We interviewed Dr. Herbert S. Lin, who was a
primary author of the report, as well as Dr. Robert W. Levenson, and
Dr. Stephen E. Fienberg, both members of the Academy committee that
oversaw the report, about the report's findings with regard to
behavior detection, and the extent to which behavior detection in a
complex environment, such as an airport terminal, has been validated
with regard to its effectiveness in identifying persons who may be a
risk to aviation security. Other behavior detection experts we
consulted were Dr. Paul Ekman;[Footnote 116] Dr. Mark Frank;[Footnote
117] Dr. David Givens;[Footnote 118] Dr. David Matsumoto;[Footnote
119] and Mr. Rafi Ron, former director of security at Israel's Ben-
Gurion Airport. Dr. Ekman, Dr. Frank, and Mr. Ron provided expert
advice for the National Research Council study. Dr. Givens was
identified by TSA as having been their principal source for the
nonverbal behavior indicators used by the SPOT program. We also
interviewed Dr. Lawrence M. Wein, an expert in emergency responses to
terror attacks and mathematical models in operations management.
[Footnote 120] In addition, we interviewed officials from the
Department of Homeland Security's (DHS) Science and Technology (S&T)
Directorate regarding their ongoing research into behavior detection.
Although the views of these experts cannot be generalized across all
experts in behavior analysis because we selected individuals based on
their publications on behavioral analysis or related topics, their
recognized accomplishments and expertise, and, in some cases, TSA's
use of their work or expertise to design and review the SPOT program's
behaviors, they provided us with an overall understanding of the
fundamentals of behavior analysis, and how it could be applied.
To determine the basis for TSA's strategy to develop and deploy SPOT
and evaluate to what extent SPOT was informed by a cost-benefit
analysis and a strategic plan, we reviewed program documentation,
including briefings prepared by the SPOT program office during the
course of developing and fielding SPOT, two versions of a strategic
plan for SPOT, and the 2009 SPOT standard operating procedures
guidance. We compared the plans and analyses used by TSA to develop
and implement SPOT to criteria on how to develop and implement
programs in DHS's 2006 Cost Benefit Analysis Guidebook,[Footnote 121]
as well as to Office of Management and Budget guidance on the utility
of cost-benefit analyses in program implementation.[Footnote 122] We
also analyzed the development of SPOT in light of the standards and
criteria cited in DHS's 2006 National Infrastructure Protection Plan.
We met with relevant TSA officials to discuss these issues. To assess
whether DHS developed an effective strategic plan for SPOT prior to
implementing the program, we interviewed TSA officials involved in
development of the SPOT strategic plan. We analyzed whether the SPOT
plan incorporated the desirable characteristics of an effective
strategic plan as identified by previous GAO work on what strategic
plans should include to be considered effective, such as a risk
assessment, cost and resources analysis, and a means for collaboration
with other key entities.[Footnote 123] We also examined it in light of
the requirements of the Government Performance and Results Act of
1993, which specifies the elements of strategic plans for government
programs.[Footnote 124] We assessed whether the SPOT strategic plan
was followed by TSA. As part of our analysis of the planning for SPOT
before it was implemented on a nationwide basis, we reviewed TSA
documentation related to the development and pilot testing of SPOT,
such as a TSA white paper on SPOT, and interviewed key program
officials from both headquarters and field offices.[Footnote 125]
We also interviewed cognizant officials from other U.S. government
agencies and agency entities that utilize behavior detection in their
work, including U.S. Customs and Border Protection (CBP), the U.S.
Secret Service, the TSA's Federal Air Marshal Service (FAMS)
component, and the Federal Bureau of Investigation (FBI). We sought
their views on the utility of various behavior detection methods,
their experience with practicing behavior detection, and asked them
about the extent to which TSA had consulted with them in developing
and implementing the SPOT program.
To better understand how SPOT incorporated expertise about the use of
behavior detection in an airport setting, we interviewed officials
from Israel's El Al Airlines, which is cited by TSA as having provided
part of the basis of the SPOT program. We asked about El Al's methods
to ensure the security of its passenger aircraft, and also interviewed
a former head of security at Israel's Ben-Gurion airport, who has
advised TSA on security issues. We asked TSA and SPOT program
officials about their consultations with El Al, and about the ways in
which they had utilized El Al's expertise, as well as about any other
entities whose expertise they may have adopted into SPOT.
To determine the challenges, if any, that emerged during
implementation of the SPOT program, we interviewed headquarters and
field personnel about how the program has utilized the resources
available to it to ensure that it is effective. These resources
included the support of law enforcement officers (LEOs), to whom
passengers are referred by Behavior Detection Officers (BDOs) for
additional questioning. In addition, we interviewed SPOT program and
TSA officials about the databases available to them at TSA's
Transportation Security Operations Center to determine if a suspect
passenger is being sought by other U.S. law enforcement or
intelligence entities, and whether there is guidance for BDOs on when
and how to contact the Transportation Security Operations Center. We
also asked about whether there is guidance and training for BDOs on
how to access TSA's Transportation Information Sharing System
database, which is owned by FAMS, and is available through the
Transportation Security Operations Center.[Footnote 126] To determine
if any management challenges had emerged related to management
controls in developing and implementing SPOT, we compared TSA's
approach for implementing and managing the SPOT program with GAO's
Standards for Internal Control in the Federal Government[Footnote 127]
and with risk management principles we had previously identified.
[Footnote 128] Our legal counsel office reviewed court decisions
relevant to the SPOT program. In addition, we interviewed attorneys
from the American Civil Liberties Union, and obtained and reviewed
TSA's Privacy Impact Assessments for SPOT, the Transportation Security
Operations Center, and the Transportation Information Sharing System.
We also met with and discussed relevant privacy and legal issues with
TSA's Offices of Privacy and Civil Rights/Civil Liberties. To obtain
data about certain aspects of the SPOT program that the SPOT program
office did not have, we conducted a survey of Federal Security
Directors[Footnote 129]whose responsibilities included security at all
161 SPOT airports at the time of our survey. (Some Federal Security
Directors have responsibility for more than one airport.) We obtained
a 100 percent response rate. This survey asked, among other things,
about whether there were cameras at security checkpoints that record
the interactions of Transportation Security Officers (TSO), BDOs, and
passengers; if the airport authority had an agreement with TSA that
specifies certain law enforcement actions during a SPOT referral; and
if there was an agreement, or any other comparable guidance that
specified a time limit for LEOs to come to checkpoints after being
called for help by BDOs.
To determine the extent to which TSA has measured SPOT's effect on
aviation security, we obtained and analyzed the TSA SPOT referral
database, which records all incidents in which BDOs refer passengers
to secondary, more intensive questioning, and which also records all
incidents in which BDOs chose to refer passengers to LEOs. We found
that the SPOT database was sufficiently reliable to count the number
of arrests resulting from referrals from BDOs to LEOs, for examining
the reasons for each arrest, and for counting the percentage of times
that LEOs responded to BDO calls for service, and the length of time
required. Use of these data required us to resolve apparent
contradictions and anomalies in the database to make the data usable.
Because of data problems, we were unable to conduct analyses to assess
whether any behavior or combination of behaviors could be used to
predict the final outcome of an incident involving the use of SPOT. In
addition, we reviewed relevant standardization team reports and
observed a standardization team visit in operation.
In addition, we spoke with BDO managers, Federal Security Directors,
and Assistant Federal Security Directors to determine how BDOs are
evaluated. To do so, we conducted site visits to 15 commercial
airports at which BDOs and SPOT have been deployed, or almost 10
percent of the 161 airports with SPOT. We chose these airports taking
into account the following criteria, among others: (1) each airport
had BDOs deployed, and at each, the SPOT program had been in effect
for no less than 3 months; (2) airports were chosen to provide a
variety of sizes, as measured in annual passenger volume; physical
location within the country (northeast, southwest, central, Pacific
Coast, rural, urban); and estimated risk of terrorist incident, using
DHS's Current Airports Threat Assessment[Footnote 130] list (visiting
6 that were in the top 10, and others much lower); (3) BDOs who are
employed by contractors, rather than employed directly by TSA; and (4)
airports with LEOs who were identified to us by TSA as having received
some form of behavior detection training and airports where they were
not known to have received such training. In addition, we took into
account the location of the airports with regard their proximity to
subject matter experts on behavior detection whom we wished to
interview, as well as the time and cost required to reach certain
airports.
At each of the airports we visited, we interviewed cognizant
officials, including the Federal Security Director or Assistant
assigned to the airport, the BDO program manager, one or two BDOs, and
one or two LEOs who have interacted with BDOs. Since each of these
airports differs in terms of passenger volume, physical size and
layout, geographic location, and potential value as a target for
terrorism, among other things, the results from these visits are not
generalizable to other airports. However, these visits provided
helpful insight into the operation of SPOT at airports.
In addition, to determine if individuals had transited SPOT airports
who were later charged with or pleaded guilty to terrorism-related
offenses, we reviewed information contained in (1) the Treasury
Enforcement Communication System II database maintained by CBP;
[Footnote 131] (2) Department of Justice information and court
documents, including indictments and related documents; and (3) media
accounts of individuals accused of terrorism-related activities. We
compared information pertaining to these individuals' dates of transit
to the dates when SPOT was deployed to the various airports identified
in the Treasury Enforcement Communication System and Justice
Department data to determine if SPOT had been deployed at a given
airport when the transits occurred. Further, we used our survey of
Federal Security Directors at SPOT airports to determine the extent to
which video surveillance cameras are present at checkpoints.
To assess the extent that SPOT training incorporates the attributes of
an effective training program, we had training experts at TSA
headquarters complete a training assessment tool that we developed
using our prior work for assessing training courses and curricula.
[Footnote 132] To address training-related issues, including to
understand better how other entities train their employees in behavior
detection, and what their curricula include, we conducted site visits
to the Secret Service, FAMS, CBP, and the FBI, and also interviewed
nongovernmental experts on behavior detection (our selection of these
experts is discussed above). As part of our assessment of SPOT
training, we attended the basic SPOT training course given to BDOs, as
well as the advanced SPOT course on behavior detection. We interviewed
BDOs and BDO managers about the SPOT training, as well as officials of
El Al airlines, with regard to how El Al trains and tests its
personnel who utilize behavior recognition and analysis as part of
their assessment of El Al passengers.
We conducted this performance audit from May 2008 through May 2010, in
accordance with generally accepted government auditing standards.
Those standards require that we plan and perform the audit to obtain
sufficient, appropriate evidence to provide a reasonable basis for our
findings and conclusions based on our audit objectives. We believe
that the evidence obtained provides a reasonable basis for our
findings and conclusions based on our audit objectives.
[End of section]
Appendix II: DHS Comments:
U.S. Department of Homeland Security:
Washington, DC 20528:
May 3, 2010:
Mr. Steve Lord:
Director, Homeland Security & Justice Issues:
U.S. Government Accountability Office (GAO):
441 G Street, NW:
Washington, DC 20548:
Dear Mr. Lord:
Thank you for the opportunity to review and comment on GAO-10-157SU,
the draft report titled: Aviation Security: Efforts to Validate
Aspects of TSA 's Screening of Passengers by Observation Techniques
(SPOT) Program Underway, But Opportunities Exist to Strengthen
Validation and Address Operational Changes. The Transportation
Security Administration (TSA) appreciates the U.S. Government
Accountability Office's work in planning and conducting its review and
issuing this report.
TSA deployed the SPOT program in an effort to mitigate the threat of
individuals with potentially hostile intent from boarding a commercial
airplane and causing harm. Congress has encouraged the use of behavior
recognition to enhance aviation security and has provided resources to
support its implementation and expansion. The SPOT program fulfills
the mandate of Section 1611 of the Implementing Recommendations of the
9/11 Commission Act, P.L. 11053, that "TSA shall provide advanced
training to the transportation security officers for the development
of specialized security skills, including behavior observation and
analysis...in order to enhance the effectiveness of layered
transportation security measures."
Intelligence continues to show there is no specific terrorist profile.
In a March 10, 2010, hearing before the Senate Homeland Security and
Governmental Affairs Committee, TSA Acting Administrator Gale Rossides
highlighted the challenge faced by TSA leaders in "balancing the
requirement to screen all passengers and to actually focus our
officers' attention on the right passengers." TSA designed SPOT to
increase its ability to focus on the "right passengers" by identifying
persons exhibiting behaviors and appearances that may indicate stress,
fear, and deception, and distinguish them from other travelers.
SPOT is Based on Scientific Research and Law Enforcement Practices:
TSAs development and deployment of SPOT was a planned and deliberate
process based on more than 3 years of operational test-bed assessment
of SPOT at Boston's Logan International Airport from June 2003 until
nationwide rollout began in fiscal year (FY) 2007. TSA carefully
developed SPOT by using selective behaviors recognized within both the
scientific and law enforcement communities as displaying stress, fear,
and deception. A SPOT working group, made up of various TSA and U.S.
Department of Homeland Security (DHS) components,[Footnote 133] was
created in February 2004. Other organizations, such as the
Massachusetts State Police, the Federal Bureau of Investigation (FBI)
Behavioral Sciences Unit, and the Federal Law Enforcement Training
Center, were also involved in SPOT development. Through these working
groups, TSA has developed and finalized SPOT standard operating
procedures (SOPs) for a common ability to assess behaviors indicating
hostile intent for both aviation and mass transit modes of
transportation. TSA continues to consult with its SPOT working group
partners as it updates the procedures and science behind the program.
Decades of scientific research have shown the behaviors to be
universal in their manifestation. In fact, the DHS Science and
Technology Directorate (S&T) completed a study on suicide bomber
indicators in July 2009 that illustrates a very high degree of overlap
between operationally reported suicide bomber indicators and TSA SPOT
behaviors. This result further bolsters TSA's contention that the SPOT
program draws from the best practices of many defense, intelligence,
and law enforcement organizations.
SPOT Scientific Validation is Ongoing:
S&T began research in 2007 to examine the validity of the SPOT
program. The series of studies involved in this research is designed
to assess the validity of the SPOT scoring system, including the use
of individual behavioral indicators to identify high-risk travelers.
More specifically, S&T's research plan aims to examine the extent to
which these behavioral indicators are appropriate for screening
purposes and lead to appropriate and correct security decisions. When
this study is complete, SPOT will be one of the most, if not the most,
rigorously tested behavior-based security screening programs in
existence.
Results of this work will establish a scientific basis of the extent
to which the SPOT program, including its instrument and methods, such
as the SPOT Referral Report and SOPs, are valid. Although it is
challenging to establish the validity of a deterrent program in which
the outcomes of interest are extremely rare, critical elements of
reliability and validity will be rigorously assessed. Of particular
importance is the evaluation of criterion-related validity, or the
extent to which travelers are correctly selected for screening based
on the SPOT scoring system. Establishing this degree of classification
accuracy justifies the use of the SPOT program to discriminate high-
risk travelers from low-risk travelers. Regardless of any other
metrics, the extent to which the SPOT scores accurately identify high-
risk travelers is critically important to program validity.
Following criterion-related validity, the next central element of
validity is the consistency of implementation of the instrument and
program. This will be examined in a variety of ways, including an
investigation of the consistency in the operational use of SPOT
behavioral indicators Behavior Detection Officers (BDOs) and across
locations and time periods, all of which represents reliability
assessment. Finally, construct-related validity, or the extent to
which the SPOT program behaviors truly represent the expressions of
high-risk travelers, will be examined by comparing the SPOT behaviors
to similar instruments in use for the same purpose. S&T's July 2009
study of suicide bomber indicators was the first step in evaluating
construct-related validity.
This research is expected to be completed in FY 2011. TSA understands
that after this validation is complete, there will be other areas
where further research should be conducted, and it is TSA's intention
to complete this research.
National Academy of Sciences (NAS) Report Does Not Represent an
Exhaustive or Definitive Review of the Research or Operational
Literature on Behavioral Screening:
TSA would like to specifically address a few comments in the GAO-10-
157SU report that we believe are inaccurate. The report draws heavily
from a National Academy of Sciences (NAS) report which is being
improperly relied upon. As the sponsor of the NAS study, DHS S&T
questioned its findings, stating that the study lacked sufficient
information for its conclusions because the NAS study principally
focused on privacy as it relates to behavioral surveillance”not on
behavioral surveillance technology itself. The study was not intended
to, and the results do not represent an exhaustive or definitive
review of the research or operational literature on behavioral and
physiological screening, including recent findings from unpublished
DHS, defense, and intelligence community studies. Furthermore, it
should be noted that the report did not study the SPOT program, nor
did any of the researchers conduct interviews with SPOT program
personnel.
Additionally, GAO states that "DHS S&T could not provide us with
specific contacts related to the sources of this research." This
statement is not accurate. The record should reflect that DHS S&T
provided all requested documents that represented S&T-sponsored
research and for which S&T possessed the requisite release authority.
DHS was not able to release specific documents related to research for
which it was not the originator.
The report further states that the audit team was unable to use the
SPOT referral data to assess whether any behavior or combination of
SPOT behaviors could be used to reliably predict the final outcome of
an incident involving the use of SPOT. However, DHS S&T was able to
successfully conduct some preliminary analysis of the SPOT referral
database. Prior to analysis of the SPOT reports, S&T worked with TSA
to verify the scores assigned to each indicator with the SPOT score
sheets and to rescore the pertinent sections and total accordingly for
nearly 100,000 operational reports from 2008. While random errors were
noted, errors in large databases that require manual entry are not
uncommon. Convention suggests that large databases like this typically
include an error rate of 3 to 5 percent. As long as such errors are
random, the analytical method is robust enough to account for random
errors in this range.
In conclusion, TSA strongly believes that behavior detection is a
vital layer in its aviation security strategy, and will continue to
strengthen as the program matures. Leaders within the community of
behavior detection researchers agree. TSA appreciates GAO's work to
identify opportunities to enhance the SPOT program, and we will
continue to work diligently to address the issues identified by GAO.
Our ongoing progress demonstrates our commitment to TSA's mission of
securing our Nation's transportation systems.
We also appreciate the opportunity to provide you with, in
collaboration with OHS S&T, comments to GAO's audit recommendations.
Recommendation 1; To help ensure that SPOT is based on valid
scientific principles that can be effectively applied in an airport
environment, we (GAO) recommend that the Secretary of Homeland
Security convene an independent panel of experts to review the
methodology of the S&T Directorate study on the SPOT program before
the study is implemented to determine whether the study's methodology
is sufficiently comprehensive to validate the SPOT program. This
assessment should include appropriate input from other federal
agencies with expertise in behavior detection and relevant subject
matter experts.
Concurs: The U.S. Department of Homeland Security (DHS) Science &
Technology Directorate's (S&T) current validation process includes an
independent and comprehensive review of the ongoing SPOT study to be
conducted in support of and in collaboration with the TSA SPOT
program. The assessment will include input from other Federal agencies
with expertise in behavior detection and relevant subject matter
experts. S&T will work with TSA to present the SPOT validation project
to the panel, produce a report summarizing the panel's
recommendations, and implement pertinent suggestions in FY 2010.
GAO further recommends that if this research determines that the SPOT
program has a scientifically validated basis for using behavior
detection for counterterrorism purposes in the airport environment,
then the TSA Administrator take the following actions:
Recommendation 2: Conduct a comprehensive risk assessment to include
threat, vulnerability, and consequence of airports nationwide to
determine the effective deployment of SPOT If TSA's ongoing Aviation
Modal Risk Assessment lacks this information.
Concur: TSA's Aviation Modal Risk Assessment (AMRA) is designed to
evaluate the transportation security risk landscape and compare it to
other modes. However the AMRA does not evaluate risk effectiveness of
countermeasures or optimal deployment strategies. For the Aviation
mode, TSA uses the Risk Management Analysis Tool (RMAT), a risk
simulation model based on laboratory and operational data that
evaluates risk using threat inputs, vulnerability information, and
consequence estimates. TSA is in the process of conducting an initial
risk analysis on the SPOT program using RMAT. The risk analysis is
based on the initial SPOT validation results and will be updated as
the validation study results are finalized.
Recommendation 3: Perform a cost-benefit analysis of the SPOT program
including a comparison of the SPOT program with other security
screening programs, such as random screening, or already existing
security measures.
Concur: The SPOT program will use RMAT to perform a cost-benefit
analysis of Behavior Detection Officers (BD0s) as a countermeasure.
The first step in the process is the initial risk assessment that is
being conducted on the SPOT program using RMAT. For the cost-benefit
analysis, costs will be defined as the 5-year total cost of the
countermeasure across the aviation system. Benefit will be defined as
risk-reduction across the aviation security system against a portfolio
of scenarios. TSA is currently developing an initial cost-benefit
analysis for a variety of passenger-screening countermeasures
including BDOs using the RMAT tool as a basis for analysis. BDOs'
flexibility across a variety of risk scenarios suggests that behavior
detection is a cost-effective countermeasure.
Recommendation 4. Revise and implement the SPOT strategic plan by
incorporating risk assessment information, identifying cost and
resources, linking it to other related TSA strategic documents,
describing how SPOT is integrated and implemented with TSA's other
layers of aviation security, and providing guidance on bow to
effectively link the roles, responsibilities and capabilities of
federal, state, and local officials providing program support.
Concur: The RMAT risk analysis of the BDO program is assisting the
SPOT program in identifying other countermeasure capabilities that are
linked to the behavior detection capability. This analysis will allow
the SPOT program to develop a revision to the SPOT strategic plan that
will incorporate the elements identified in the recommendation.
Recommendation 5: Study the feasibility of using airport checkpoint-
surveillance video recordings of individuals transiting checkpoints,
and who were later charged with or pleaded guilty to terrorism-related
offenses, to enhance its understanding of terrorist behaviors in the
airport checkpoint environment.
Concur: TSA will study the feasibility of using checkpoint
surveillance video recordings of individuals transiting checkpoints,
and who were later charged with or pleaded guilty to terrorism-related
offenses. TSA agrees that this could be a useful tool in understanding
terrorist behaviors in the checkpoint environment.
Additionally, TSA is currently working with DHS S&T/Human Factors to
conduct operational video validation of the SPOT program. TSA will use
a variety of video case studies to validate the SPOT program
including, if possible, reviewing video of terrorists transiting the
TSA checkpoint. It is exceedingly rare, however, for video cameras to
capture terrorists transiting TSA checkpoints. Unfortunately, this
factor significantly reduces the feasibility of conducting these case
studies.
GAO also recommends that concurrent with the DIIS S&T Directorate
study of SPOT, and an independent panel assessment of the soundness of
the methodology of the S&T study, the TSA Administrator take the
following actions:
Recommendation 6: Provide guidance in the SPOT SOP or other TSA
directive to BDOs, or other TSA personnel, on inputting data into the
Transportation Information Sharing System (TISS) and set milestones
and a timeframe for deploying Transportation Information Sharing
System access to SPOT airports so that TSA and intelligence community
entities have information from all SPOT Law Enforcement officer (LEO)
referrals readily available to assist in "connecting the dots" and
identifying potential terror plots.
Concur: TSA is currently undergoing a revision of the SPOT Standard
Operating Procedure (SOP). The SOP will provide guidance directing the
input of BDO data into TISS. TSA anticipates release of the updated
SPOT SOP in FY 2010. Additionally, TSA is currently drafting a formal
plan to include milestones and a timeframe for deploying T1SS access
to all SPOT airports.
Recommendation 7: Implement the steps called for in the TSA Office of
Security Operations Business plan to develop a standardized process
for allowing BDOs or other designated airport officials to send
information to TSA's Transportation Security Operations Center (TSOC)
about passengers whose behavior indicates that they may pose a threat
to security, and provide guidance on how designated TSA officials are
to receive information back from the Transportation Security
Operations Center.
Concur: TSA has convened a working group made up of members of the
Office of Security Operations, Office of Chief Counsel, Office of
Intelligence, and the Office of Law Enforcement/Federal Air Marshal
Service (FAMS) to address this recommendation. TSA is developing a
system and procedure for sending and receiving information from the
TSOC and anticipates having a system in place in FY 2010. It should be
noted that information from BDO referrals has been transmitted to the
TSOC previously; however, TSA agrees to institute a standardized
process.
Recommendation 8: Utilize all of the databases available to the
Transportation Security Operations Center when running passengers who
rise to the level of a LEO referral against intelligence and criminal
databases.
Concur in principle: TSA has convened a working group composed of
members of the Office of Security Operations, Office of Chief Counsel,
Office of Intelligence, and the Office of Law Enforcement/FAMS to
address this recommendation. This group will conduct a feasibility
study during FY 2010 to examine if this recommendation can be fully
implemented. This study will look at the various authorities,
permissions, and limitations of each of the databases or systems cited
in this audit. Access to some of the systems, such as Criminal History
Record Check (CHRC), requires more justification than a BDO referral.
Because some of the databases or systems contain classified
information, TSA will also need to adopt a communication strategy to
transmit the passenger information back and forth between the BDO and
TSOC. TSA will work on a process to collect the passenger information,
verify the passenger's identity, through checks of databases, and
analyze that information to determine if the passenger is the subject
of an investigation and may pose a risk to aviation.
Recommendation 9: Establish a plan that includes objectives,
milestones, and timeframes to develop outcome-oriented performance
measures to help refine the current methods used by Behavior Detection
Officers for identifying individuals who may pose a risk to the
aviation system.
Concur: TSA understands the value of outcome-oriented performance
measures. However, as noted by GAO, there is difficulty in
establishing these measures for a deterrence-based program.
Nonetheless, TSA will consult with industry experts to develop outcome-
oriented performance measures. TSA will establish a plan that includes
objectives, milestones. and timeframes, with an end result of
producing outcome-oriented performance measures to help refine the
current methods used by BDOs for identifying individuals who may pose
a risk to the aviation system.
Recommendation 10: Establish controls to help ensure completeness,
accuracy, authorization, and validity of data collected during SPOT
screening.
Concur: In March 2010, TSA migrated the SPOT database to TSA's
Performance Management Information System. This migration greatly
enhances the SPOT program's capabilities, as they relate to
completeness, accuracy, authorization, and validity of data collected
during SPOT screening. Additional controls have been put in place to
address the shortcomings of the previous database which were
highlighted by GAO. TSA is also examining a technology solution to
allow one-time transcription of all SPOT referral data. This will
reduce the possibility of errors due to incorrect transcription from
one medium to another.
Recommendation 11: Establish timeframes and milestones for its plan to
systematically conduct evaluations of the SPOT training program on a
periodic basis.
Concur: DHS S&T, in conjunction with TSA has sponsored a BDO Job Task
Analysis (JTA). Outputs of the JTA will include Knowledge, Skills,
Abilities, and Other characteristics of BDOs and Training Learning
Objectives. These two items will enable TSA to conduct an in-depth
training gap analysis. This analysis will begin immediately following
completion of the JTA and will take approximately three months to
complete. Upon completion of the training gap analysis, TSA will
develop detailed project plans with milestones and schedules based on
the scope of the overall curriculum development/revision effort.
Sincerely yours,
Signed by:
Jerald E. Levine:
Director:
DHS GAO/OIG Liaison Office:
[End of section]
Appendix III: GAO Contacts and Staff Acknowledgments:
GAO Contact:
Stephen M. Lord, (202) 512-4379, or lords@gao.gov:
Staff Acknowledgments:
In addition to the contact named above, David M. Bruno, Assistant
Director, and Jonathan R. Tumin, managed this assignment. Ryan
Consaul, Jeff C. Jensen, Kevin Remondini, and Julie E. Silvers made
significant contributions to the work. Arthur James, Jr., Amanda
Miller, and Douglas Sloane assisted with design, methodology, and data
analysis. Chris Dionis assisted with issues related to training.
Katherine Davis and Debra Sebastian provided assistance in report
preparation; Tracey King and Tom Lombardi provided legal support; and
Pille Anvelt and Barbara Hills developed the report graphics.
[End of section]
Footnotes:
[1] BDOs must have at least 12 months experience as a TSO, or related
security work experience, and must pass a BDO training course.
[2] TSA cautions that the applicability of El Al's security processes
to those used by TSA is constrained by differences in the scale of El
Al's worldwide operations and the flexibilities that El Al has in
implementing security processes compared to constraints on TSA. For
example, El Al security screeners are encouraged to spend as much time
with passengers as needed, and are not concerned whether passengers
experience delays in boarding an aircraft.
[3] For the purposes of this report, the term "TSA-regulated airport"
refers to a U.S. airport operating under a TSA-approved security
program.
[4] Visible Intermodal Prevention and Response teams are comprised of
federal air marshals, surface transportation security inspectors,
TSOs, BDOs, and canines.
[5] TSA classifies its regulated airports in the United States into
one of five categories--X, I, II, III, and IV. Generally, category X
airports have the largest number of passenger boardings and category
IV airports have the least.
[6] See H.R. Rep. No. 111-298 at 77 (2009) (Conf. Rep.). The
conference report directed TSA to report, no later than 60 days after
enactment, on the scientific basis for using behavior pattern
recognition for observing airline passengers for signs of hostile
intent, the effectiveness of the SPOT program in meeting its goals and
objectives, and the justification for expanding the program. The
conference report also directed us to review this report and to
provide our findings to the Committees no later than 120 days after
the TSA report is submitted. TSA completed its report to Congress on
March 15, 2010.
[7] National Research Council, Protecting Individual Privacy in the
Struggle Against Terrorists: A Framework for Assessment (Washington,
D.C.: National Academies Press, 2008). We reviewed the approach used
and the information provided in this study and found the study and its
results to be reliable for the purposes for which we used it in this
report.
[8] See appendix I for additional information on the experts we
interviewed.
[9] For reasons of scope, we did not assess the scientific basis of
the methods and processes used by these agencies in their application
of behavioral detection.
[10] Although SPOT is based in some respects on El Al's aviation
security program, El Al's processes differ in substantive ways from
those used by the SPOT program. In particular, El Al does not use a
list of specific behaviors with numerical values for each, or a
numerical threshold to determine whether or not to question a
passenger; rather, El Al security officers utilize behavioral
indicators as a basis for interviewing all passengers boarding El Al
passenger aircraft, and accessing relevant intelligence databases,
when deemed appropriate. In addition, El Al officials told us that
they train all their personnel--not just security officers--in
elements of behavior analysis, and conduct covert tests of their
employees' attentiveness at frequent intervals. According to these
officials, El Al also permits what is termed "profiling," in which
passengers may be singled out for further questioning based on their
nationality, ethnicity, religion, appearance, or other ascriptive
characteristics, but these are not the only basis on which a passenger
may be questioned. In addition, El Al security officers are empowered
to bar any passenger from boarding an aircraft. The scale of El Al
operations is considerably smaller than that of major airlines
operating within the United States. As of 2008, El Al had a fleet of
34 aircraft. In Israel, El Al operates out of one hub airport, Ben-
Gurion International, and also flies to Eilat, a city in southern
Israel; in contrast, there are 457 TSA-regulated airports in the
United States. In 2008, El Al had passenger boardings of about 3.6
million; in contrast, Southwest Airlines alone flew about 102 million
passengers in the same year.
[11] Unless otherwise noted in the report, we refer to the SPOT
strategic plan issued in March 2007.
[12] DHS, Cost Benefit Analysis Guidebook (Washington, D.C.: Feb. 1,
2006).
[13] OMB, Circular No. A-94, Guidelines and Discount Rates for Benefit-
Cost Analysis of Federal Programs (Washington, D.C.: October 1992);
Circular No. A-4, Regulatory Analysis (Washington, D.C.: Sept. 2003).
[14] See appendix I for additional details on the airports we visited.
[15] At airports participating in TSA's Screening Partnership Program,
private-sector contractors perform screening activities, including
SPOT, in accordance with TSA requirements and oversight. See 49 U.S.C.
§ 44920. Unless otherwise specified, references to TSOs include
private-sector contract screeners. For more information, see GAO,
Aviation Security: Progress Made to Set Up Program Using Private-
Sector Airport Screeners, but More Work Remains, GAO-06-166
(Washington, D.C.: Mar. 31, 2006).
[16] The TSA Current Airport Threat Assessment is a threat estimate
designed to provide a snapshot of the current terrorist threat to
airports in the United States as well as for major international
airports serving as last points of departure for U.S. airlines.
[17] GAO, Standards for Internal Controls in the Federal Government,
[hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1]
(Washington, D.C.: November 1999).
[18] See GAO, Risk Management: Further Refinements Needed to Assess
Risks and Prioritize Protective Measures at Ports and Other Critical
Infrastructure, [hyperlink, http://www.gao.gov/products/GAO-06-91]
(Washington, D.C.: Dec. 15, 2005) and Transportation Security:
Comprehensive Risk Assessments and Stronger Internal Controls Needed
to Help Inform TSA Resource Allocation, [hyperlink,
http://www.gao.gov/products/GAO-09-492] (Washington, D.C.: Mar. 27,
2009).
[19] Federal Security Directors are the highest ranking TSA officials
responsible for security operations at TSA-regulated airports. See 49
U.S.C. § 44933. They and their assistants coordinate with both federal
and nonfederal entities present at their airports, including the FAMS,
the Drug Enforcement Administration, and CBP. When appropriate,
Federal Security Directors may bar an individual from boarding an
aircraft.
[20] The SPOT referral data we analyzed covered the period May 29,
2004, through August 31, 2008. These were the data available at the
time of our analysis.
[21] GAO, Human Capital: A Guide for Assessing Strategic Training and
Development Efforts in the Federal Government, [hyperlink,
http://www.gao.gov/products/GAO-04-546G] (Washington, D.C.: Mar. 1,
2004).
[22] See Pub. L. No. 107-71, 115 Stat. 597 (2001). For purposes of
this report, "commercial aircraft" refers to a U.S. or foreign-based
air carrier operating under TSA-approved security programs with
regularly scheduled passenger operations to or from a U.S. airport.
[23] See 49 C.F.R. pt. 1542. Some commercial airports with fewer than
2,500 annual enplanements (passengers boarding an aircraft) do not
have TSA-approved screening processes. Enplanements are the number of
paying passengers on a scheduled or nonscheduled (charter) flight.
Infants and airline personnel are not included. A stop at an airport
is not considered an enplanement if the passenger does not transfer
aircraft.
[24] Private-sector screeners under contract to and overseen by TSA,
and not TSOs, perform screening activities at airports participating
in TSA's Screening Partnership Program. See 49 U.S.C. § 44920.
[25] These requests would typically be made to the law enforcement
entity employing the LEO, such as the airport authority police
department. The department would have a computer that can access NCIC.
According to the FBI's website, the NCIC database consists of 19 files
or databases. Seven are property files which contain records for
articles, boats, guns, license plates, securities, vehicles, and
vehicle and boat parts. Twelve are person files are the Convicted
Sexual Offender Registry, Foreign Fugitive, Identity Theft,
Immigration Violator, Missing Person, Protection Order, Supervised
Release, Unidentified Person, U.S. Secret Service Protective, Violent
Gang and Terrorist Organization, and Wanted Person Files. The
Interstate Identification Index, which contains automated criminal
history record information, is also accessible through the same
network as NCIC. The Violent Gang and Terrorist Organization file
includes the names of known or suspected terrorists.
[26] See 49 CFR §§ 1542.215, .217.
[27] TSA-regulated airports have regular commercial passenger service
and comply with TSA regulations for passengers and their property in
order to operate.
[28] National Research Council, Protecting Individual Privacy in the
Struggle Against Terrorists: A Framework for Assessment (Washington,
D.C.: National Academies Press, 2008). The report's preparation was
overseen by the National Academy of Sciences Committee on Technical
and Privacy Dimensions of Information for Terrorism Prevention and
Other National Goals. Although the report addresses broader issues
related to privacy and data mining, a senior National Research Council
official stated that the committee included behavior detection as a
focus because any behavior detection program could have privacy
implications.
[29] Specifically, the report states that the scientific support for
linkages between behavioral and physiological markers and mental state
is strongest for elementary states, such as simple emotions; weak for
more complex states, such as deception; and nonexistent for highly
complex states, such as when individuals hold terrorist intent and
beliefs.
[30] DHS's S&T Directorate could not provide us with specific contacts
related to the sources of this research.
[31] Peer review is the process of subjecting an author's scholarly
work, research, or ideas to the scrutiny of others who are experts in
the same field. Such review is considered a form of scientific
validation.
[32] For example, we reported that the National Institutes of Health
did not post its researchers' final reports because the risks
associated with posting results that have not been scrutinized and
validated by peer review are too great. See GAO, University Research:
Most Federal Agencies Need to Better Protect against Financial
Conflicts of Interest, [hyperlink,
http://www.gao.gov/products/GAO-04-31] (Washington, D.C.: November
2003).
[33] Dr. Ekman is professor emeritus of psychology at the University
of California Medical School, San Francisco, and is considered one of
the world's foremost experts on facial expressions. His books include:
Emotions Revealed: Recognizing Faces and Feelings to Improve
Communications and Emotional Life (New York: Holt and Company, 2003);
Emotion in the Human Face (New York: Pergamon Press, 1972); Unmasking
the Face: A Guide to Recognizing Emotions from Facial Clues (Englewood
Cliffs, N.J.: Prentice-Hall, 1975). Dr. Ekman has published more than
100 articles.
[34] Mr. Walters is the author of the Principles of Kinesic Interview
and Interrogation: 2ND Edition as well as numerous training materials
related to interviewing and interrogation techniques.
[35] Dr. Givens is the director of the nonprofit Center for Nonverbal
Studies, in Spokane, Washington. Dr. Givens is the author of Love
Signals: A Practical Field Guide to the Body Language of Courtship
(St. Martin's, New York, 2005) and Crime Signals: How to Spot a
Criminal Before You Become a Victim (St. Martin's, 2008). The Center's
Web site links to Dr. Givens' online reference tool, The Nonverbal
Dictionary of Gestures, Signs and Body Language Cues. Dr. Givens said
that he had did not know which nonverbal indicators had been selected
by TSA for use in SPOT, that he had not been asked by TSA to review
their choices from his list, or to review other aspects of the SPOT
program. According to Dr. Givens, attempting to detect more than nine
nonverbal indicators would be difficult for most individuals, even
those trained in behavior detection.
[36] Dr. Frank is Associate Professor, Department of Communication,
College of Arts and Sciences, at the University at Buffalo, State
University of New York. He is on the Advisory Board of the
University's Center for Unified Biometrics and Sensors, and has
conducted research supported by DHS, the Defense Advanced Research
Projects Agency, and the National Science Foundation. Dr. Frank told
us that he had observed SPOT at an airport and had some coordination
with TSA. However, he said that he had not reviewed the SPOT training
curriculum or the SPOT scoring system. Dr. Frank stated that no study
has been performed to validate use of behavior detection in an airport
setting.
[37] According to DHS's S&T Directorate, it completed a study on
suicide bomber indicators in July 2009. The program manager stated
that they reviewed 157 documents and identified approximately 1,200
suicide indicators, which were similar to SPOT suicide bomber
indicators. S&T stated that the study provides preliminary support for
the detection of suicide bomber indicators and that SPOT represents
best practices from defense and intelligence organizations.
[38] According to TSA, the FBI participated in discussions related to
SPOT's development in 2006.
[39] American Institutes for Research, Behavioral Indicators Related
to Deception in Individuals with Hostile Intentions: Interim Results
(Washington, D.C.: February 2008). According to S&T officials, this
review included research conducted prior to 2005.
[40] DHS could not provide us with specific contacts related to the
sources of this research; we were therefore unable to determine the
extent to which it has demonstrated linkages between behavioral and
physiological indicators and deception.
[41] Statement of the Under Secretary (Acting), DHS S&T Directorate,
before the Subcommittee on Homeland Security, Committee on
Appropriations, U.S. House of Representatives, March 26, 2009.
[42] [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1].
[43] See GAO, Oil and Gas Royalties: The Federal System for Collecting
Oil and Gas Revenues Needs Comprehensive Reassessment, [hyperlink,
http://www.gao.gov/products/GAO-08-691] (Washington, D.C.: Sept. 3,
2008). GAO, Combating Nuclear Smuggling: Additional Actions Needed to
Ensure Adequate Testing of Next Generation Radiation Detection
Equipment, [hyperlink, http://www.gao.gov/products/GAO-07-124T]
(Washington, D.C.: Sept. 18, 2007). GAO, Space Operations: NASA
Efforts to Develop and Deploy Advanced Spacecraft Computers,
[hyperlink, http://www.gao.gov/products/GAO/IMTEC-89-17] (Washington,
D.C.: Mar. 31, 1989). GAO, Quadrennial Defense Review: Future Reviews
Could Benefit from Improved Department of Defense Analyses and Changes
to Legislative Requirements, [hyperlink,
http://www.gao.gov/products/GAO-07-709] (Washington, D.C.: Sept. 14,
2007). GAO, Coast Guard: Challenges for Addressing Budget Constraints,
[hyperlink, http://www.gao.gov/products/GAO/RCED-97-110] (Washington,
D.C.: May 1997).
[44] DHS's NIPP defines risk as a function of threat, vulnerability,
and consequence. Threat is an indication of the likelihood that a
specific type of attack will be initiated against a specific target or
class of targets. Vulnerability is the probability that a particular
attempted attack will succeed against a particular target or class of
targets. Consequence is the effect of a successful attack.
[45] As updated in 2009, the NIPP states that to be complete a risk
assessment is to assess threat, vulnerability, and consequence for
every defined risk scenario. However, because the original 2006
version of the NIPP described risk assessments that included all three
components as "credible," our previous reports use this term rather
than "complete" (see GAO, Transportation Security: Comprehensive Risk
Assessments and Stronger Internal Controls Needed to Help Inform TSA
Resource Allocation, [hyperlink,
http://www.gao.gov/products/GAO-09-492] (Washington, D.C.: Mar. 27,
2009)).
[46] We reported in March 2009 that TSA does not assign uncertainty or
varying levels of confidence associated with the intelligence
information used to identify threats to the transportation sector and
guide TSA's planning and investment decisions. Since TSA's
intelligence products have not assigned confidence levels to its
analytic judgments, it is difficult for TSA to correctly prioritize
its tactics and investments based on uncertain intelligence. In March
2009, we recommended that TSA work with the Director of National
Intelligence to determine the best approach for assigning uncertainty
or confidence levels to analytic intelligence products and to apply
this approach. TSA agreed with this recommendation and said it has
begun taking action to address it. See [hyperlink,
http://www.gao.gov/products/GAO-09-492].
[47] The AMRA is being developed by TSA pursuant to the National
Strategy for Aviation Security, which was issued according to Homeland
Security Presidential Directive-16. HSPD-16 directs the production of
an overarching national strategy to optimize and integrate government-
wide aviation security efforts. AMRA was previously known as the Air
Domain Risk Assessment or ADRA.
[48] Commercial aviation includes that sector of the nation's civil
aviation system that provides for the transportation of individuals by
scheduled or chartered operations for a fee, including air carriers
and airports. General aviation includes all civil aviation other than
commercial and military operations, including flight operations such
as personal/family transportation, emergency services, wildlife and
land surveys, traffic reporting, agricultural aviation, firefighting,
and law enforcement. Air cargo is defined as cargo carried on
passenger and all-cargo aircraft.
[49] In addition, TSA states that its risk management analysis toolset
may also be useful in prioritizing BDO deployments since the toolset
analyzes various scenarios for which the use of BDOs may be applicable.
[50] See GAO, Reexamining Regulations: Opportunities Exist to Improve
Effectiveness and Transparency of Retrospective Reviews, [hyperlink,
http://www.gao.gov/products/GAO-07-791] (Washington, D.C.: July 16,
2007).
[51] DHS, Cost Benefit Analysis Guidebook (Washington, D.C.: February
2006); OMB, Circular No. A-94, Guidelines and Discount Rates for
Benefit-Cost Analysis of Federal Programs (Washington, D.C.: October
1992); OMB, Circular No. A-4, Regulatory Analysis (Washington, D.C.:
September 2003).
[52] A pilot test is a preliminary test or study to try out procedures
and discover problems before the main study begins. This enables
researchers to make last minute corrections and adjustments. In a
pilot, the entire study with all of its instruments and procedures is
conducted in miniature. See W.P. Vogt, Dictionary of Statistics and
Methodology: A Nontechnical Guide for the Social Sciences (Newbury
Park: Sage Publications, 1993).
[53] The increase rate for TSA's other screening operations combined
was about 0.27 percent from fiscal year 2007 to fiscal year 2009 (from
$3.727 billion to $3.737 billion, a $10 million increase). The
screening operations account includes privatized screening; passenger
and baggage screener performance, compensation, and benefits; screener
training and other; human resource services; and checkpoint support.
[54] See H.R. Rep. No. 111-298, at 77 (2009) (Conf. Rep.).
[55] [hyperlink, http://www.gao.gov/products/GAO-04-408T].
[56] Pub. L. No. 103-62, 107 Stat. 285 (1993).
[57] See GAO, National Preparedness: FEMA Has Made Progress, but Needs
to Complete and Integrate Planning, Exercise, and Assessment Efforts,
[hyperlink, http://www.gao.gov/products/GAO-09-369] (Washington, D.C.:
Apr. 30, 2009).
[58] TSA, Strategic Plan for Behavior Detection Program (Washington,
D.C.: 2007).
[59] TSA, Office of Security Operations, Strategy Deployment
Organizational Business Plan for Fiscal Year 2010 (Washington, D.C.:
Apr. 8, 2008).
[60] Within the Transportation System Sector-Specific Plan, the
aviation implementation plan outlines transportation security goals
and key objectives with associated programs within the aviation
community. The plan notes that SPOT is intended to identify suspicious
activities within the aviation domain.
[61] TSA issued its Passenger Checkpoint Screening Program Strategic
Plan in August 2008 to outline its strategy and approach for
implementing advanced security capabilities in airport checkpoints
using a combination of people, processes, and technology at all
airport checkpoints. The plan cites TSA's behavior detection
capability as one of three strategic initiatives.
[62] The Transportation Security Operations Center is the central
operations and information-gathering point for TSA across the nation;
it serves as a 24/7-point of contact for all transportation security
concerns, providing access to multiple criminal justice and
intelligence-related databases.
[63] DHS, Privacy Impact Assessment for the TSA Operations Center
Incident Management System (Washington, D.C.: July 8, 2008), and
Privacy Impact Assessment for the Screening of Passengers by
Observation Techniques (SPOT) Program (Washington, D.C.: Aug. 5, 2008).
[64] DHS, Privacy Impact Assessment for the Transportation Information
Sharing System (Washington, D.C.: June 2008). The Transportation
Information Sharing System is a database owned by the TSA's FAMS
component; the data entered into it may be shared with other federal,
state, or local law enforcement and law enforcement support entities.
Federal air marshals file reports related to the observation of
suspicious activities and input this information, as well as incident
reports submitted by airline employees and other individuals within
the aviation domain, into the Transportation Information Sharing
System.
[65] Because the SPOT program has not been scientifically validated,
it cannot be determined if these anecdotal results were better than if
passengers had been pulled aside at random, rather than as a
consequence of being identified for further screening by BDOs.
[66] Some details about the process were deleted because TSA
considered them to be Sensitive Security Information.
[67] [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1].
[68] Some details from our analysis were deleted because TSA
considered them to be Sensitive Security Information.
[69] This information can be submitted about individuals whose
suspicious activity resulted in BDO or LEO referral. See TSA's July
2008 Transportation Security Operations Center Privacy Impact
Assessment.
[70] Some details of our survey results were deleted because TSA
considered them to be Sensitive Security Information.
[71] See [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1].
For example, information should be recorded and communicated to
management and others within the entity who need it and in a form and
within a time frame that enables them to carry out their internal
control and other responsibilities. Further, effective information
technology management is critical to achieving useful, reliable, and
continuous recording and communication of information.
[72] TSA, Strategy Deployment, Organizational Business Plan, Office of
Security Operations, Fiscal Year 2010 (Washington, D.C.: April 2008).
According to TSA, the Office of Security Operations is the operational
arm of TSA and employs the largest TSA workforce. It is responsible
for airport checkpoint and baggage screening operations as well as
other special programs designed to secure all assigned transportation
modes.
[73] In March 2010, TSA told us that over the next 18 months, it will
expand access to information classified up to the "Secret" level to an
additional 10,000 TSA personnel, including all BDOs, all SPOT
Transportation Security Managers (who are responsible for the local
operations of the SPOT program and supervision of the BDOs), and all
Supervisory TSOs (who directly supervise TSOs and the screening
process).
[74] The Terrorist Screening Database is the central terrorist
watchlist consolidated by the FBI's Terrorist Screening Center and
used by multiple agencies to compile their specific watchlists and for
screening.
[75] The other databases available to TSA are omitted because TSA
considered them to be Sensitive Security Information.
[76] The No-Fly list is used to identify individuals who should be
prevented from boarding an aircraft. The No-Fly and Selectee lists
contain applicable records from the FBI's Terrorist Screening Center
consolidated database of known or suspected terrorists. Pursuant to
Homeland Security Presidential Directive 6, dated September 16, 2003,
the Terrorist Screening Center--operational since December 2003 under
the administration of the FBI--was established to develop and maintain
the U.S. government's consolidated terrorist screening database (the
watch list) and to provide for the use of watch-list records during
security-related screening processes. See GAO-08-136T, Aviation
Security: TSA Is Enhancing Its Oversight of Air Carrier Efforts to
Screen Passengers against Terrorist Watch-List Records, but Expects
Ultimate Solution to Be Implementation of Secure Flight (Washington,
D.C.: Sept. 9, 2008).
[77] According to DHS, the Terrorist Identity Datamark Environment is
the database maintained by the National Counterterrorism Center--the
primary organization in the U.S. government for integrating and
analyzing intelligence pertaining to terrorism and counterterrorism--
to serve as a central repository for all information on known or
suspected international terrorists with the exception of purely
domestic terrorism information. See, DHS, Office of Inspector General,
The DHS Process for Nominating Individuals to the Consolidated
Terrorist Watchlist (Washington, D.C.: February 2008).
[78] DHS, National Infrastructure Protection Plan: Partnering to
Enhance Protection and Resiliency (Washington, D.C.: 2009);
[hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1]; and GAO,
Performance Measurement and Evaluation: Definitions and Relationships,
[hyperlink, http://www.gao.gov/products/GAO-05-739SP] (Washington,
D.C.: May 2005).
[79] The Project Management Institute, The Standard for Program
ManagementŠ (2006).
[80] GAO, Executive Guide: Effectively Implementing the Government
Performance and Results Act, [hyperlink,
http://www.gao.gov/products/GAO/GGD-96-118] (Washington, D.C.: June
1996).
[81] See S. Rep. No. 111-31, at 56-57 (2009); see also S. Rep. No. 110-
396, at 59 (2008).
[82] See H.R. Rep. No. 111-298, at 77 (2009) (Conf. Rep.). The report
further directs that GAO review the report submitted by TSA and
provide its findings to the committees no later than 120 days after
the SPOT report is submitted to the committees.
[83] Output measures help determine the extent to which an activity
was performed as planned. Outcome-related measures are more robust
measures because they provide a more comprehensive assessment of the
success of the agency's efforts, as stated in DHS's 2009 NIPP.
[84] OMB and the Council for Excellence in Government, Performance
Measurement Challenges and Strategies (Washington, D.C.: June 18,
2003).
[85] The Office's primary work involves metrics infrastructure; it
assists TSA programs, if requested, in developing applications to
track quantitative measures, such as surrendered items. It also tracks
data for its Management Objectives Report related to three areas:
employees, security effectiveness, and efficiency.
[86] The types of prohibited items found have included knives, guns,
gun ammunition, certain chemicals, strike-anywhere matches, and
certain liquids/gels/aerosols; other illegal items discovered include
narcotics and fraudulent identity documents.
[87] According to TSA, TSOs focus on detecting high-risk threats which
have the ability to cause catastrophic damage to an airplane in flight
(e.g., explosives).
[88] OMB and the Council for Excellence in Government, Performance
Measurement Challenges and Strategies (Washington, D.C.: June 18,
2003).
[89] We also found that the SPOT referral database had a number of
weaknesses. TSA designated our discussion of these weakness as
sensitive security information.
[90] Our estimate of the total number of passengers who went through
checkpoints is based on Bureau of Transportation Statistics data that
we obtained for the airports at which SPOT was deployed during this
period. Some figures were rounded.
[91] The analysis included only flights leaving the United States.
Department of Justice data show that more than 400 individuals have
been convicted in the United States for terrorism-related offenses
since September 11, 2001. We did not examine the travel itineraries of
all these individuals.
[92] The events included the Mumbai, India attack of 2008; a plot to
attack the Quantico, Virginia, Marine base in 2008; an effort by five
Americans to receive training and fight in Pakistan in December 2009;
a plot to attack infrastructure in New York City in 2009; an effort to
provide men and support for terrorists in Somalia in 2008; and an
attack on a U.S. base in Afghanistan by an American who received
training in Pakistan. We were unable to confirm whether BDOs were
stationed at the checkpoints used by these individuals at the time
they traveled.
[93] See, GAO, Supply Chain Security: Feasibility and Cost-Benefit
Analysis Would Assist DHS and Congress in Assessing and Implementing
the Requirement to Scan 100 Percent of U.S.-Bound Containers,
[hyperlink, http://www.gao.gov/products/GAO-10-12] (Washington, D.C.:
Oct. 30, 2009). The Project Management Institute, A Guide to the
Project Management Body of Knowledge.
[94] [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1].
[95] G-Band, or Expert BDOs, have advanced to a lead role, are able to
provide technical expertise on the SPOT program, and are one band away
from a supervisory role.
[96] [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1].
[97] TSA's Operational and Technical Training Division, within the
Office of Security Operations, provides assistance with development
and implementation of technical training for screening, Behavior
Detection Officers, Bomb Appraisal Officers, the Aviation Direct
Access Screening Program, and technical management training.
[98] In May 2009, the title of the course was changed to "Additional
Behavior Detection Techniques" because ABDT is actually a supplemental
tool for BDOs to use during the Casual Conversation phase of SPOT
Referral Screening. The course was formerly titled "Advanced Behavior
Detection Techniques." Microfacial expressions are very brief facial
expressions that can last as little as 1/25 of a second.
[99] GAO, Human Capital: A Guide for Assessing Strategic Training and
Development Efforts in the Federal Government, [hyperlink,
http://www.gao.gov/products/GAO-04-546G] (Washington, D.C.: Mar. 1,
2004).
[100] The TSA staff member attended the following external training
courses: John Reid and Associates' Reid Techniques of Interrogation
and Advanced Reid Techniques of Interrogation; Massachusetts State
Police Academy's Basic Investigations and Professional Development
Program Interview Techniques; International Security Defense Systems'
Verification Agent for Virgin Atlantic Security Systems; New Mexico
Technology, Materials and Research Center's Prevention and Response to
Suicide Bomber Indicators; Abraxis Corporation's Detecting Deception
and Eliciting Response; Langevin Learning Services' Instructional
Techniques for New Instructors; Ekman Group's Understanding Emotions
and Detecting Truth; Chameleon Associates' Suspicious Behavior
Detection; and Federal Transit Administration's Terrorist Awareness,
Recognition, and Response.
[101] The purpose of the SPOT working group was to help refine the
list of SPOT behaviors and to develop standard operating procedures
and a concept of operations for the program.
[102] [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1] and
[hyperlink, http://www.gao.gov/products/GAO-04-546G].
[103] [hyperlink, http://www.gao.gov/products/GAO-04-546G].
[104] [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1].
[105] The SPOT program retains the discretion to train BDOs at a site
other than one of the five training facilities if it is more fiscally
responsible to do so. For example, if there are 15 BDO candidates at a
single airport, the SPOT program will train them at that airport
rather than sending them to a training facility.
[106] Some SPOT instructors have been evaluated multiple times. While
the SPOT program office provided us with print or electronic copies of
all SPOT instructor evaluations, some forms contained only numeric
ratings and no written comments; others had no numeric scores. Because
instructor names were redacted from the evaluations, the numbers may
include duplicates. Additionally, the evaluations containing written
comments were not always filled out using complete sentences, making
it difficult to ascertain the rater's assessment of the instructor.
[107] SPOT Instructors are evaluated using a Quality Assurance
Instructor Evaluation, TSA Form 1909. Using this form, the evaluator
assigns either 0 (zero) points, 0.5 points, or 1 point for each of 57
ratable items depending on whether the instructor meets the standard
as written, needs improvement to meet the standard, or does not meet
the standard. The total points are then entered into a formula that
generates a percentage. This percentage is used to determine the
overall rating. Instructors receiving a score of 95 percent to 100
percent are rated as exceeds expectations; 85 percent to 94 percent
are rated as meets expectations; 75 percent to 84 percent are rated as
needs improvement; and 0 percent to 74 percent are rated as
unsatisfactory.
[108] [hyperlink, http://www.gao.gov/products/GAO-04-546G].
[109] TSA, Operational and Technical Training Division, Training
Standards (Sept. 28, 2006).
[110] The Project Management Institute, The Standard for Program
ManagementŠ (2006).
[111] The training gap analysis identifies gaps in the training
curriculum.
[112] This estimate assumes that there would be no further increases
for SPOT over the next 5 years above the requested $232 million level
for fiscal year 2011. However, to stay even with inflation, the
allocation would likely increase somewhat each year.
[113] The National Research Council is a component of the National
Academy of Sciences, a part of a private, nonprofit institution, the
National Academies, which provide science, technology, and health
policy advice under a congressional charter.
[114] National Research Council, Protecting Individual Privacy in the
Struggle Against Terrorists: A Framework for Assessment (Washington,
D.C.: National Academies Press, 2008). The report's preparation was
overseen by the National Academy of Science's 21-member Committee on
Technical and Privacy Dimensions of Information for Terrorism
Prevention and Other National Goals. We reviewed the approach used and
the information provided in this study and found the study to be
credible for our purposes. The contributors included recognized
experts across a variety of fields, including William J. Perry, former
Secretary of Defense, and Dr. Tara O'Toole, then-CEO and Director of
the Center for Biosecurity of the University of Pittsburgh Medical
Center, Professor of Medicine and of Public Health at the University
of Pittsburgh. (Dr. O'Toole was subsequently nominated and confirmed
as the Under Secretary of the DHS Science and Technology Directorate.)
[115] National Research Council, Protecting Individual Privacy in the
Struggle Against Terrorists: A Framework for Assessment (Washington,
D.C.: National Academies Press, 2008). The report's preparation was
overseen by the NAS's 21-member Committee on Technical and Privacy
Dimensions of Information for Terrorism Prevention and Other National
Goals. We reviewed the approach used and the information provided in
this study and found the study to be credible for our purposes. The
contributors included recognized experts across a variety of fields,
including William J. Perry, former Secretary of Defense, and Dr. Tara
O'Toole, then-CEO and Director of the Center for Biosecurity of the
University of Pittsburgh Medical Center, Professor of Medicine and of
Public Health at the University of Pittsburgh. (Dr. O'Toole was
subsequently nominated and confirmed as the Under Secretary of DHS's
Science and Technology Directorate. The National Research Council is a
component of the National Academy of Sciences, a part of a private,
nonprofit institution, the National Academies, which provide science,
technology, and health policy advice under a congressional charter
[116] Dr. Ekman is professor emeritus of psychology at the University
of California Medical School, San Francisco, and is considered one of
the world's foremost experts on facial expressions. His books include:
Emotions Revealed: Recognizing Faces and Feelings to Improve
Communications and Emotional Life (New York: Holt and Company, 2003);
Emotion in the Human Face (New York: Pergamon Press, 1972); Unmasking
the Face: A guide to Recognizing Emotions from Facial Clues (Englewood
Cliffs, N.J.: Prentice-Hall, 1975). Dr. Ekman has published more than
100 articles.
[117] Dr. Frank is Associate Professor, Department of Communication,
College of Arts and Sciences, at the University at Buffalo, State
University of New York. He is on the Advisory Board of the
University's Center for Unified Biometrics and Sensors, and has
conducted research supported by DHS, the Defense Advanced Research
Projects Agency, and the National Science Foundation.
[118] Dr. Givens is the director of the nonprofit Center for Nonverbal
Studies, in Spokane, Washington. He is the author of Love Signals: A
Practical Field Guide to the Body Language of Courtship (St. Martin's,
New York, 2005) and Crime Signals: How to Spot a Criminal Before You
Become a Victim (St. Martin's, 2008). The Center's Web site links to
Dr. Givens' reference tool, The Nonverbal Dictionary of Gestures,
Signs and Body Language Cues.
[119] Dr. Matsumoto is a Professor, Department of Psychology at San
Francisco State University, and is an associate of Dr. Ekman.
[120] Dr. Wein is the Paul E. Holden Professor of Management Science
at the Graduate School of Business, Stanford University. His homeland
security-related work includes four papers in Proceedings of the
National Academy of Sciences, on an emergency response to a smallpox
attack, an emergency response to an anthrax attack, a biometric
analysis of the US-VISIT Program, and an analysis of a bioterror
attack on the milk supply.
[121] DHS, Cost Benefit Analysis Guidebook (Washington, D.C.: February
2006).
[122] Office of Management and Budget (OMB), Circular No. A-94,
Guidelines and Discount Rates for Benefit-Cost Analysis of Federal
Programs (Washington, D.C.: October 1992); and Circular A-4,
Regulatory Analysis (Washington, D.C.: September 2003).
[123] [hyperlink, http://www.gao.gov/products/GAO-04-408T].
[124] Pub. L. No. 103-62, 107 Stat. 285 (1993).
[125] TSA, Screening of Passengers by Observation Technique (SPOT)
White Paper for the Department of Homeland Security (Washington, D.C.:
Feb. 22, 2005).
[126] The data from interviews of suspicious passengers by FAMS are
inputted into the Transportation Information Sharing System, as are
reports sent to FAMS from airline employees about suspicious
passengers.
[127] [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1].
[128] GAO, Transportation Security: Comprehensive Risk Assessments and
Stronger Internal Controls Needed to Help Inform TSA Resource
Allocation, [hyperlink, http://www.gao.gov/products/GAO-09-492]
(Washington, D.C.: Mar. 27, 2009).
[129] Federal Security Directors are the highest ranking TSA security
officials at U.S. airports; Assistant Federal Security Directors are
their assistants. Both are responsible for all aspects of security at
airports, including coordination with federal and nonfederal law
enforcement entities operating at airports, such as FAMS, the Drug
Enforcement Administration, and CBP.
[130] The Current Airports Threat Assessment is a threat estimate
designed to provide a snapshot of the current terrorist threat to
airports in the United States as well as for major international
airports serving as last points of departure for U.S. airlines.
[131] The Treasury Enforcement Communication System was designed to
provide controlled access to a large database of information about
suspects and to interface with a number of other law enforcement
systems. These capabilities are provided to users through various
applications, including the Inspection/Interagency Border Inspection
System applications that facilitate passenger processing through the
implementation of innovative border control technology.
[132] GAO, Human Capital: A Guide for Assessing Strategic Training and
Development Efforts in the Federal Government, [hyperlink,
http://www.gao.gov/products/GAO-04-546G] (Washington, D.C.: Mar. 1,
2004).
[133] Includes TSA's Office of Civil Rights, Office of Chief Counsel,
and Privacy Office, and DHS's Policy Office and Transportation
Security Laboratory.
[End of section]
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "E-mail Updates."
Order by Phone:
The price of each GAO publication reflects GAO‘s actual cost of
production and distribution and depends on the number of pages in the
publication and whether the publication is printed in color or black and
white. Pricing and ordering information is posted on GAO‘s Web site,
[hyperlink, http://www.gao.gov/ordering.htm].
Place orders by calling (202) 512-6000, toll free (866) 801-7077, or
TDD (202) 512-2537.
Orders may be paid for using American Express, Discover Card,
MasterCard, Visa, check, or money order. Call for additional
information.
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Ralph Dawn, Managing Director, dawnr@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, D.C. 20548:
Public Affairs:
Chuck Young, Managing Director, youngc1@gao.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, D.C. 20548: