Public Transit Security Information Sharing

DHS Could Improve Information Sharing through Streamlining and Increased Outreach Gao ID: GAO-10-895 September 22, 2010

The Transportation Security Administration (TSA), in the Department of Homeland Security (DHS), is committed to sharing information with public transit agencies. The Implementing Recommendations of the 9/11 Commission Act directed GAO to report on public transit information sharing. This report describes (1) the primary mechanisms used to share security information with public transit agencies; and evaluates (2) public transit agencies' satisfaction with federal efforts to share security-related information (e.g., security threats) and opportunities to improve these efforts; and (3) the extent to which DHS has identified goals and measures for sharing information. GAO surveyed 96 of the 694 U.S. public transit agencies based on 2008 ridership and received 80 responses. The 96 public transit agencies surveyed represent about 91 percent of total 2008 ridership. GAO also reviewed documents, such as DHS's Information Sharing Strategy, and interviewed agency officials.

According to the American Public Transportation Association (APTA)--which represents the public transit industry--and TSA officials, the Public Transportation Information Sharing and Analysis Center (PT-ISAC) and the public transit subportal on DHS's Homeland Security Information Network (HSIN-PT) were established as primary mechanisms for sharing security-related information with public transit agencies. The public transit agencies GAO surveyed also cited additional mechanisms for obtaining such information, including other public transit agencies. Further, in March 2010 TSA introduced the Transportation Security Information Sharing and Analysis Center (TS-ISAC), which is a subportal on HSIN focused on sharing security-related information with transportation stakeholders. Seventy-five percent of the public transit agencies GAO surveyed reported being generally satisfied with the security-related information they received; however, federal efforts to share security-related information could be improved. Specifically, three-fourths of public transit agencies reported being either very satisfied or somewhat satisfied with the information they received. Public transit agencies also reported that among the 12 most frequently cited mechanisms, they were the least satisfied with HSIN in terms of general satisfaction (19 of 33) and for each of six dimensions of quality--relevance, validity, timeliness, completeness, actionability, and ease of use. Twenty-four survey respondents also cited the need to streamline the information they received. GAO identified the potential for overlap between the PT-ISAC, the HSIN-PT, and the TS-ISAC, which all communicate similar unclassified and security-related information to public transit agencies. Federal and transit industry officials that GAO interviewed reported the need to streamline information sharing. Moreover, a greater proportion of survey respondents who were unaware of the PT-ISAC or HSIN were from midsize agencies, nonrail agencies, and those without their own police department. Federal and industry officials formed a working group to assess the effectiveness of information-sharing mechanisms, including developing options for streamlining these mechanisms. TSA officials stated that these options will also impact future outreach activities; however, no time frame has been established for completing this effort. Establishing such a time frame could help to ensure that this effort is completed. DHS and TSA have established goals and performance measures for some of their information-sharing activities to help gauge the effectiveness of their overall information-sharing efforts; however, they have not developed goals and outcome-oriented measures of results of activities for the mechanisms established as primary information sources for the public transit industry. TSA officials acknowledged the importance of establishing such goals and measures, but were unable to provide time frames for doing so. Establishing time frames for developing goals and outcome measures, once the working group effort is complete, could assist TSA in gauging the effectiveness of its efforts to share information with public transit agencies. GAO recommends that DHS, among other things, (1) establish time frames for its working group to develop options for improving information sharing, including assessing opportunities to streamline mechanisms and conducting targeted outreach; and (2) establish time frames for developing goals and outcome-oriented measures of results. DHS concurred. GAO is issuing an electronic supplement with this report--GAO-10-896SP--which provides survey results.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Stephen M. Lord Team: Government Accountability Office: Homeland Security and Justice Phone: (202) 512-4379


GAO-10-895, Public Transit Security Information Sharing: DHS Could Improve Information Sharing through Streamlining and Increased Outreach This is the accessible text file for GAO report number GAO-10-895 entitled 'Public Transit Security Information Sharing: DHS Could Improve Information Sharing through Streamlining and Increased Outreach' which was released on September 22, 2010. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Committees: United States Government Accountability Office: GAO: September 2010: Public Transit Security Information Sharing: DHS Could Improve Information Sharing through Streamlining and Increased Outreach: GAO-10-895: GAO Highlights: Highlights of GAO-10-895, a report to congressional committees. Why GAO Did This Study: The Transportation Security Administration (TSA), in the Department of Homeland Security (DHS), is committed to sharing information with public transit agencies. The Implementing Recommendations of the 9/11 Commission Act directed GAO to report on public transit information sharing. This report describes (1) the primary mechanisms used to share security information with public transit agencies; and evaluates (2) public transit agencies‘ satisfaction with federal efforts to share security-related information (e.g., security threats) and opportunities to improve these efforts; and (3) the extent to which DHS has identified goals and measures for sharing information. GAO surveyed 96 of the 694 U.S. public transit agencies based on 2008 ridership and received 80 responses. The 96 public transit agencies surveyed represent about 91 percent of total 2008 ridership. GAO also reviewed documents, such as DHS‘s Information Sharing Strategy, and interviewed agency officials. What GAO Found: According to the American Public Transportation Association (APTA)” which represents the public transit industry”and TSA officials, the Public Transportation Information Sharing and Analysis Center (PT- ISAC) and the public transit subportal on DHS‘s Homeland Security Information Network (HSIN-PT) were established as primary mechanisms for sharing security-related information with public transit agencies. The public transit agencies GAO surveyed also cited additional mechanisms for obtaining such information, including other public transit agencies. Further, in March 2010 TSA introduced the Transportation Security Information Sharing and Analysis Center (TS- ISAC), which is a subportal on HSIN focused on sharing security- related information with transportation stakeholders. Seventy-five percent of the public transit agencies GAO surveyed reported being generally satisfied with the security-related information they received; however, federal efforts to share security- related information could be improved. Specifically, three-fourths of public transit agencies reported being either very satisfied or somewhat satisfied with the information they received. Public transit agencies also reported that among the 12 most frequently cited mechanisms, they were the least satisfied with HSIN in terms of general satisfaction (19 of 33) and for each of six dimensions of quality”relevance, validity, timeliness, completeness, actionability, and ease of use. Twenty-four survey respondents also cited the need to streamline the information they received. GAO identified the potential for overlap between the PT-ISAC, the HSIN-PT, and the TS-ISAC, which all communicate similar unclassified and security-related information to public transit agencies. Federal and transit industry officials that GAO interviewed reported the need to streamline information sharing. Moreover, a greater proportion of survey respondents who were unaware of the PT-ISAC or HSIN were from midsize agencies, nonrail agencies, and those without their own police department. Federal and industry officials formed a working group to assess the effectiveness of information-sharing mechanisms, including developing options for streamlining these mechanisms. TSA officials stated that these options will also impact future outreach activities; however, no time frame has been established for completing this effort. Establishing such a time frame could help to ensure that this effort is completed. DHS and TSA have established goals and performance measures for some of their information-sharing activities to help gauge the effectiveness of their overall information-sharing efforts; however, they have not developed goals and outcome-oriented measures of results of activities for the mechanisms established as primary information sources for the public transit industry. TSA officials acknowledged the importance of establishing such goals and measures, but were unable to provide time frames for doing so. Establishing time frames for developing goals and outcome measures, once the working group effort is complete, could assist TSA in gauging the effectiveness of its efforts to share information with public transit agencies. What GAO Recommends: GAO recommends that DHS, among other things, (1) establish time frames for its working group to develop options for improving information sharing, including assessing opportunities to streamline mechanisms and conducting targeted outreach; and (2) establish time frames for developing goals and outcome-oriented measures of results. DHS concurred. GAO is issuing an electronic supplement with this report-” GAO-10-896SP-”which provides survey results. View [hyperlink, http://www.gao.gov/products/GAO-10-895] or key components. For more information, contact Stephen M. Lord at (202) 512- 4379 or LordS@gao.gov. [End of section] Contents: Letter: Background: PT-ISAC and HSIN-PT Were Established to Serve as the Primary Security Information-Sharing Mechanisms for Public Transit Agencies: Public Transit Agencies We Surveyed Were Generally Satisfied with Federal Efforts to Share Security-Related Information, but Opportunities Exist to Improve These Efforts: DHS's Information-Sharing Efforts Could be Enhanced by Developing More Specific Goals and Measures and Obtaining Additional Industry Feedback: Conclusions: Recommendations for Executive Action: Agency Comments and Our Evaluation: Appendix I: Objectives, Scope, and Methodology: Appendix II: National Strategies, Plans, and Reports Designed to Enhance Information Sharing: Appendix III: Public Transit Agencies' General Satisfaction with the 12 Most Frequently-Cited Information-Sharing Mechanisms: Appendix IV: Comments from the Department of Homeland Security: Appendix V: GAO Contact and Staff Acknowledgments: Tables: Table 1: Entities Involved in Sharing Security-Related Information with Public Transit Agencies: Table 2: Additional Details on the Mechanisms Most Frequently Cited by Surveyed Public Transit Agencies as Sources for Obtaining Security- Related Information: Table 3: Public Transit Agencies' Overall Satisfaction with Security- Related Information: Table 4: Public Transit Agencies' Survey Responses on Cross-Sector Information: Table 5: Awareness and Use of PT-ISAC for Different Categories of Public Transit Agencies: Table 6: Awareness of and Access to HSIN for Different Categories of Public Transit Agencies: Table 7: DHS and TSA Performance Goals and Measures for Information- Sharing Activities: Table 8: Public Transit Agencies Interviewed: Table 9: Public Transit Agencies' Survey Responses Regarding Satisfaction with 12 Information-Sharing Mechanisms Along 6 Dimensions of Quality: Figure: Figure 1: Mechanisms Cited Most Frequently by the Public Transit Agencies Surveyed as Sources for Security-Related Information: Abbreviations: APTA: American Public Transportation Association: DHS: Department of Homeland Security: DOJ: Department of Justice: DOT: Department of Transportation: FBI: Federal Bureau of Investigation: FOUO: For Official Use Only: FTA: Federal Transit Administration: GCC: Government Coordinating Council: HSIN: Homeland Security Information Network: HSIN-CS: Homeland Security Information Network Critical Sectors portal: HSIN-PT: Homeland Security Information Network public transit subportal: I&A: Office of Intelligence and Analysis: IP: Office of Infrastructure Protection: JTTF: Joint Terrorism Task Force: NIPP: National Infrastructure Protection Plan: NPPD: National Protection and Programs Directorate: PT-ISAC: Public Transportation Information Sharing and Analysis Center: SBU: Sensitive but Unclassified: SCC: Sector Coordinating Council: TSA: Transportation Security Administration: TSA-OI: Transportation Security Administration Office of Intelligence: TS-ISAC: Transportation Security Information Sharing and Analysis Center: TSISP: Transportation Security Information Sharing Plan: TSOC: Transportation Security Operations Center: TSNM: Transportation Sector Network Management: [End of section] United States Government Accountability Office: Washington, DC 20548: September 22, 2010: Congressional Committees: Public transit systems provided 10.2 billion passenger trips in the United States in calendar year 2009.[Footnote 1] To date, U.S. public transit systems have not been successfully attacked by terrorists. However, the February 2010 guilty plea by Najibullah Zazi for, among other things, conspiring to detonate explosives in the New York City subway system highlighted the vulnerability of public transit agencies and the importance of the federal government to share quality security- related information with the public transit industry.[Footnote 2] The Homeland Security Act of 2002 and the Implementing Recommendations of the 9/11 Commission Act of 2007 (9/11 Commission Act)--assigned the Department of Homeland Security (DHS) responsibility for sharing information related to terrorism and homeland security with its federal, state, tribal, local, and private sector homeland security partners.[Footnote 3] Since the terrorist attacks of September 11, 2001, the federal government, including DHS, has taken a number of actions to enhance the security of transportation systems. These actions include improving information sharing with its critical sector stakeholders, which is highlighted in the 2008 Department of Homeland Security Information Sharing Strategy, as well as the 2009 National Infrastructure Protection Plan (NIPP).[Footnote 4] To help facilitate information sharing with the public transit industry, DHS and the Transportation Security Administration (TSA) have created and funded a number of mechanisms, including the Public Transportation Information Sharing and Analysis Center (PT-ISAC), which is administered by the American Public Transportation Association (APTA).[Footnote 5] The PT- ISAC was created under the direction of the Department of Transportation (DOT) in 2003 and is currently funded by TSA via DOT's Federal Transit Administration (FTA).[Footnote 6] In addition to DHS, other federal agencies, such as the Department of Justice's (DOJ) Federal Bureau of Investigation (FBI) and FTA, have also taken action to enhance their efforts to share security-related information with public and private stakeholders, including public transit agencies. Our prior work on information sharing with private and public security stakeholders has shown that information sharing continues to be a challenge for the federal government.[Footnote 7] In January 2005, we designated establishing effective mechanisms for sharing terrorism- related information to protect the homeland a high-risk area because the government had continued to face challenges in analyzing and disseminating this information in a timely, accurate, and useful manner. We reported that information is a crucial tool in fighting terrorism and that its timely dissemination is critical to maintaining the security of our nation. This area remains on our high-risk list. [Footnote 8] As mandated by section 1410 of the 9/11 Commission Act, this review assesses the role of the PT-ISAC and other related federal mechanisms for sharing security-related information within the public transit industry.[Footnote 9] Specifically, our report addresses the following questions: * What are the primary mechanisms established or funded by the federal government to share security-related information with public transit agencies? * To what extent are public transit agencies satisfied with federal efforts to share security-related information, and how, if at all, can these efforts be improved? * To what extent has DHS identified goals for sharing security-related information with public transit agencies and developed measures to gauge its progress in meeting those goals? To identify the mechanisms established or funded by the federal government to serve as primary information sources for public transit agencies, we reviewed and assessed relevant documentation, such as the Homeland Security Information Network (HSIN) Program Management Plan and DHS's Information Sharing Strategy. We interviewed officials from DHS components including the Office of Infrastructure Protection (IP) within the National Protection and Programs Directorate (NPPD), the Office of Intelligence and Analysis (I&A), the U.S. Coast Guard, and TSA, as well as officials from FTA and the FBI to discuss the mechanisms they use to share security-related information with public transit agencies.[Footnote 10] We also conducted site visits, or held teleconferences, with security and management officials from a nonprobability sample of 27 public transit agencies across the nation to determine which mechanisms are most routinely used by these agencies to obtain security-related information. These transit agencies were selected to reflect broad representation in size, location, transportation mode, and law enforcement presence and represent about 63 percent of the nation's total public transit ridership based on information we obtained from FTA's National Transit Database. Because we selected a nonprobability sample of transit agencies to interview, the information obtained cannot be generalized to all transit agencies. However, the interviews provided illustrative examples of the perspectives of various transit agencies about federal government information-sharing mechanisms and corroborated information we gathered through other means. To assess the extent to which public transit agencies are satisfied with federal efforts to share quality security-related information and related opportunities for improvement, in March and April 2010, we surveyed 96 of the 694 U.S. public transit agencies on their satisfaction with information-sharing efforts.[Footnote 11] The 96 public transit agencies surveyed represent about 91 percent of total 2008 ridership. For the purposes of this survey, we defined the six aspects of quality security-related information as (1) relevance (i.e., is the information sufficiently relevant to be of value to a public transit agency?); (2) validity (i.e., is the information accurate?); (3) timeliness (i.e., is information received in a timely manner?); (4) completeness (i.e., does the information contain all the necessary details?); (5) actionability (i.e., would the information allow a public transit agency to change its security posture, if such a change was warranted?); and (6) access/ease of use (i.e., is information available through this mechanism easy to obtain?).[Footnote 12] Out of the original population of 96 transit agencies, we received completed questionnaires from 80 respondents--a response rate of 83 percent; however, not all respondents provided answers to every question. To develop the survey instrument, we conducted pretest interviews with four public transit agencies and obtained input from our survey experts. However, since we surveyed a non-probability sample of public transit agencies, the results cannot be used to make inferences about the entire population of public transit agencies, but provided us with additional insights. The survey document and counts of responses received for each question are reproduced in an electronic supplement we are issuing concurrent with this report--GAO-10-896SP. To further address this question, we assessed relevant documentation, including interagency agreements between TSA and FTA, as well as marketing materials on the Transportation Security Information Sharing and Analysis Center (TS- ISAC). We also interviewed APTA, PT-ISAC, TSA, FBI, FTA, and DHS Office of Operations, Coordination, and Planning officials to discuss efforts to streamline existing information-sharing mechanisms, oversee the results of the PT-ISAC, and conduct outreach on various information-sharing mechanisms. We compared these efforts to internal control standards, as well as our previous work on the need to consolidate redundant information systems and target outreach efforts. In addition, we interviewed select public transit agencies and included questions in our Web-based survey of public transit agencies on the various information-sharing mechanisms available to them. To assess the extent to which DHS has identified goals for sharing information with public transit agencies and developed measures to gauge its progress in meeting those goals, we reviewed the DHS Annual Performance Report, Fiscal Years 2008 through 2010, TSA's Transportation Security Information Sharing Plan (TSISP), and available performance measures for fiscal years 2007 through 2010 related to information-sharing efforts with public transit agencies and compared them to leading management practices and our previous work on program assessments.[Footnote 13] We also interviewed relevant DHS and TSA officials to obtain information on their efforts to revise and develop performance measures and goals for this area of information sharing and to obtain feedback from public transit agencies on their satisfaction with the security-related information they receive. In addition, we compared TSA's efforts to evaluate their information-sharing efforts with guidance on performance measurement contained in our previous reports.[Footnote 14] Appendix I provides more details about our objectives, scope, and methodology. We conducted this performance audit from August 2009 through September 2010 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Background: Overview of the U.S. Public Transit Systems: The nation's transportation system is a vast, interconnected network of diverse modes. Key modes of transportation include aviation, freight rail, highway, maritime, transit, and pipeline. The nation's public transit system includes multiple-occupancy vehicle services designed to provide regular and continuing general or special transportation to the public, such as transit buses, light rail, commuter rail, subways, and waterborne passenger ferries. According to APTA, buses are the most widely used form of transit, providing almost two-thirds of all passenger trips. Light rail systems are typically characterized by lightweight passenger rail cars that operate on track that is not separated from vehicular traffic. Commuter rail systems typically operate on railroad tracks and provide regional service (e.g., between a city and adjacent suburbs). Subway systems, like the Metropolitan Transportation Authority's New York City Transit, typically operate on fixed heavy lines within a metropolitan area and have the capacity for a heavy volume of traffic. Waterborne passenger ferries provide a link across many of the nation's waterways and, in some cases, present drivers with an alternative travel option. Public transit systems in the United States are typically owned and operated by public sector entities, such as state and regional transportation authorities. In addition, while some transit agencies rely on their local police department to secure their systems, others, such as the Bay Area Rapid Transit system in San Francisco, have established their own dedicated police department. Mass transit and passenger rail systems carry a high number of passengers every day and are open and fully accessible. Multiple stops and transfers lead to high passenger turnover, which is difficult to monitor effectively, and a terrorist attack on public transit systems could result in a large number of casualties. While there have been no successful terrorist attacks against U.S. public transit systems to date, terrorist attacks on public transit systems around the world, such as the March 2010 subway bombings in Moscow, Russia, and the recent plot to detonate explosives on the New York City subway system, illustrate the potential threat to public transit systems. Multiple Stakeholders Have Responsibility for Sharing Security-Related Information with Public Transit Agencies: Securing the nation's public transit systems is a shared responsibility requiring coordinated action on the part of federal, state, and local governments; the private sector; and passengers who ride these systems. A component of this shared responsibility is ensuring that those within the private and public sector have access to quality security-related information to enhance prevention and protection efforts. DHS is the lead department involved in securing the nation's homeland. As required by the Homeland Security Act of 2002, the department is responsible for coordinating homeland security efforts across all levels of government and throughout the nation, including with federal, state, tribal, local, and private sector homeland security stakeholders.[Footnote 15] The Aviation and Transportation Security Act established TSA as the federal agency with primary responsibility for securing the nation's transportation systems.[Footnote 16] As part of this responsibility, TSA serves as the lead DHS component responsible for assessing intelligence and other information to identify individuals who pose a threat specifically to transportation security and to coordinate countermeasures with other federal agencies to address such threats. TSA is also charged with serving as the sector-specific agency for the transportation community.[Footnote 17] Within TSA, several offices, including the Office of Transportation Sector Network Management and the Office of Intelligence, play a role in sharing security-related information with transportation stakeholders. In addition to TSA, a number of other entities are responsible for sharing security-related information with internal and external stakeholders, including public transit agencies. Table 1 below provides details on roles and responsibilities of some of the various entities involved in sharing security-related information with public transit agencies. Table 1: Entities Involved in Sharing Security-Related Information with Public Transit Agencies: Entity: TSA-Office of Transportation Sector Network Management (TSNM); Information sharing role: Leads federal efforts to protect and secure the nation's transportation systems, with divisions dedicated to each transportation mode, including public transit.[A]. Entity: TSA Office of Intelligence; (TSA-OI); Information sharing role: Responsible for collecting and analyzing threat information related to the transportation network, which includes all modes of transportation. TSA-OI is also responsible for overseeing the content on the Transportation Security Information Sharing and Analysis Center (TS-ISAC), implemented in March 2010.[B] Entity: DHS Office of Intelligence and Analysis (I&A); Information sharing role: A member of the national intelligence community, DHS I&A is responsible for collecting, analyzing, and disseminating information related to homeland security threats to homeland security stakeholders, including those within the private and public sectors. Entity: DHS Office of Infrastructure Protection (IP); Information sharing role: Within IP, several divisions play a role in sharing security-related information with public transit agencies, including the Homeland Infrastructure Threat and Risk Analysis Center which has analysts dedicated to identifying the risk associated with the transportation sector and sharing that information via associated information products. Entity: DOT's Federal Transit Administration (FTA); Information sharing role: FTA disseminates transit security and threat reports to other federal agencies, including DHS, and transit agencies' representatives. In a 2004 memorandum of understanding (MOU) and a 2005 annex to the MOU, TSA and FTA agreed to coordinate their efforts to share threat information with public transportation stakeholders. Entity: DOT's S-60; Information sharing role: DOT's Office of Intelligence, Security and Emergency Response, referred to as S-60, collects, analyzes, and provides security information to both internal DOT and other federal agencies, who in turn share this information with other security stakeholders, including public transit agencies. Entity: FBI; Information sharing role: Responsible for protecting and defending the United States from terrorist threats and serving as the nation's principal counterterrorism investigative agency, among other responsibilities. The FBI's Rail Liaison Agents filter and distribute the relevant security-related information to rail transit agencies that they receive from their local Joint Terrorism Task Force (JTTF).[C] Entity: APTA; Information sharing role: As the sponsor of the PT-ISAC and the secretary of the Mass Transit Sector Coordinating Council (SCC), APTA plays a key role in sharing security-related information with public transit agencies.[D] APTA also manages the PT-ISAC under a cooperative agreement with FTA.[E] Source: GAO analysis of DHS, DOT, DOJ, and APTA information. [A] TSA's TSNM coordinates with the U.S. Coast Guard to secure the maritime sector. [B] See the Senate committee report accompanying the proposed bill for the fiscal year 2009 DHS appropriations act--S. Rep. No. 110-396, at 66 (2008). In this report, the committee directed TSA to implement the TS-ISAC. Hosted on HSIN, the TS-ISAC contains unclassified Sensitive but Unclassified (SBU) intelligence products and other security- related documents available to vetted transportation security stakeholders. [C] JTTFs are investigative units consisting of law enforcement and other specialists from federal, state, and local law enforcement and intelligence agencies, led by DOJ and the FBI. JTTFs are located in 100 cities nationwide, including at least one in each of the FBI's 56 main field offices. The National Joint Terrorism Task Force oversees the local JTTFs across the country. [D] According to TSA, the Long-Distance Rail Government Coordinating Council (GCC) and SCC serve as coordinating bodies to discuss, develop, and refine positions on all matters in transit security. In addition, they streamline the coordination process between government and the transit industry, helping to advance a partnership in developing and implementing security programs. [E] To carry out the day-to-day operations of the PT-ISAC, APTA contracted with Electronic Warfare Associates - Information and Infrastructure Technologies, Inc., to obtain and analyze primarily open source security information and distribute it to PT-ISAC members on a daily basis. [End of table] PT-ISAC and HSIN-PT Were Established to Serve as the Primary Security Information-Sharing Mechanisms for Public Transit Agencies: According to APTA and TSA officials, the PT-ISAC and the public transit subportal on DHS's HSIN (HSIN-PT) were designed to serve as the primary mechanisms for sharing security-related information with public transit agencies. The PT-ISAC, which is implemented by APTA under a cooperative agreement with FTA, was designed to serve as the one stop shop for public transit agencies seeking to obtain security- related information. The PT-ISAC collects, analyzes, and distributes security and threat information from the federal government and open sources on a 24/7 basis. It provides public transit agencies with unclassified and open-source documents obtained from numerous sources, including DOT, DHS, and DOJ. According to PT-ISAC officials, this mechanism disseminates this information through daily E-mails with attachments summarizing and analyzing recent security and cybersecurity information, news, threats, and vulnerabilities within the transportation sector. In addition, the PT-ISAC has a searchable library of government and private security documents, and PT-ISAC analysts hold top secret security clearances. HSIN-PT is also focused on providing security-related information pertaining to the public transit industry. According to DHS officials, HSIN was designed to serve as the department's primary information-sharing mechanism for the larger homeland security community engaged in preventing, protecting from, responding to, and recovering from all threats, hazards, and incidents under DHS jurisdiction.[Footnote 18] HSIN is comprised of a network of communities, referred to as communities of interest, such as Intelligence and Analysis, Law Enforcement, Emergency Management, and Critical Sectors (CS).[Footnote 19] Within HSIN-CS, each of the 18 critical sectors maintains its own site. Under the transportation sector, the public transit mode maintains its own subportal on HSIN.[Footnote 20] According to TSA officials, HSIN-PT is maintained and populated by mass transit and passenger rail private and government stakeholders. HSIN, including its public transit subportal, is accessible via the Internet, but users must first be vetted against established criteria to obtain a user name and password from DHS to access the network and retrieve information. As an additional feature, HSIN users may elect to receive E-mail alerts that include notices of ongoing events or direct the user to a particular location within HSIN to obtain additional information. While the PT-ISAC and HSIN-PT are focused on providing security- related information to public transit agencies, the agencies we surveyed did not rely solely on these two mechanisms for their information needs. Figure 1 below illustrates the 12 key information- sharing mechanisms, identified by the agencies we surveyed, that disseminate security-related information to public transit agencies.[Footnote 21] These mechanisms were cited as sources of security-related information by more than 40 percent of the public transit agencies we surveyed.[Footnote 22] Figure 1: Mechanisms Cited Most Frequently by the Public Transit Agencies Surveyed as Sources for Security-Related Information: [Refer to PDF for image: interactive illustration] Interactive features: Roll your mouse over the name of each information-sharing mechanism for more information. A brief definition of the selected mechanism will appear. To see the full text, see Table 2. DHS: Homeland Security Information Network (HSIN); Transportation Security Administration (TSA) E-mail Alerts; Transportation Security Operations Center (TSOC). DOT: Federal Transit Administration (FTA) E-mail Alerts. DOJ: Joint Terrorism Task Forces (JTTF). Joint federal initiative: Transit Security and Safety Roundtables. Other initiatives: Public Transportation Information Sharing and Analysis Center (PT- ISAC); Fusion centers; Regional/State/Local Information Sharing Mechanisms and Emergency Operations Centers; Other public transit agencies; Industry organizations. Source: GAO analysis of information from DHS, DOJ, DOT and public transit agencies; PhotoDisc (photo). Note: In figure 1, we combine "regional/state/local information- sharing mechanisms" and "regional/state/local emergency operations centers." Both types of mechanisms were identified as sources of security-related information by over 40 percent of survey respondents. [End of figure] The information-sharing mechanisms described in figure 1 vary by intended users of the mechanism, the type and source of information offered, and how the information is distributed. Table 2 provides additional details on the 12 information-sharing mechanisms public transit agencies cited most frequently as sources for security-related information. Table 2: Additional Details on the Mechanisms Most Frequently Cited by Surveyed Public Transit Agencies as Sources for Obtaining Security- Related Information: Information sharing mechanism (number of users)[A]: PT-ISAC; (49); Mechanism: description: A 24/7 mechanism with a threat and incident reporting focus. The PT-ISAC collects, analyzes, and distributes security and threat information from the federal government and open sources. It also disseminates information from other industries through its relationship with other ISACs; Mechanism operator/intended users: This mechanism is administered by APTA and operated by Electronic Warfare Associates - Information and Infrastructure Technologies, Inc. The PT-ISAC is intended to serve the public transit industry; Type/source of information offered: Unclassified and open source documents including law enforcement bulletins obtained from numerous sources, including federal agencies such as DOT, DHS, and DOJ; How information is distributed: (push versus pull system)[B]: A push system. Daily unclassified E-mails are sent with attachments summarizing and analyzing recent security and cybersecurity information, news, threats, and cited vulnerabilities within the transportation sector. Information sharing mechanism (number of users)[A]: HSIN; (34); Mechanism: description: A secure Web-based platform able to facilitate SBU information sharing and collaboration between federal, state, local, tribal, private sector, and international partners; Mechanism operator/intended users: DHS Office of Operations Coordination and Planning operates this mechanism intended to serve federal, state, local, tribal, private sector, and international partners; Type/source of information offered: Unclassified and SBU products focused on threats stemming from suicide bombers, suspicious packages, and international security events; How information is distributed: (push versus pull system)[B]: A pull system. Users must log on to the secure network to access information. Information sharing mechanism (number of users)[A]: FTA E-mail Alerts; (65); Mechanism: description: The lead emergency coordinator at FTA maintains contact with public transit and law enforcement agencies that mitigate and respond to hazards. The emergency coordinator's network now includes roughly 500 individuals and organizations; Mechanism operator/intended users: FTA operates this mechanism intended to serve organizations and officials from public transit agencies, federal, state, and local agencies, fusion centers, and law enforcement; Type/source of information offered: Open source and SBU information sent via daily E-mails that includes breaking news alerts, updates on incidents affecting or disrupting transit operations, police lookouts, counter terrorism information, intelligence bulletins, training and exercise announcements; How information is distributed: (push versus pull system)[B]: A push system. E-mails are provided to public transit officials, organizations, and other individuals within the public transit industry. Information sharing mechanism (number of users)[A]: TSA E-mail; Alerts; (56); Mechanism: description: As a part of its information-sharing efforts, TSA occasionally disseminates E-mails to public transit agencies that include unclassified and SBU security-related information; Mechanism operator/intended users: TSA operates this mechanism intended to serve the public transit industry; Type/source of information offered: Unclassified and SBU information such as suspicious incident and situational awareness reports; How information is distributed: (push versus pull system)[B]: A push system. Information is provided via E-mail. Information sharing mechanism (number of users)[A]: Transportation Security Operations Center (TSOC); (41); Mechanism: description: Also known as the Freedom Center, TSOC is a 24/7 operations center that serves as the main point of contact for security-related incidents or crises in all modes of transportation; Mechanism operator/intended users: TSA operates this mechanism intended to serve all modes of transportation; Type/source of information offered: SBU information on security- related incidents or crises in all modes of transportation; How information is distributed: (push versus pull system)[B]: A push system. Information is shared with federal TSA stakeholders who, in turn, can choose to share TSOC reports with public transit agencies. Information sharing mechanism (number of users)[A]: Transit Security and Safety Roundtables; (44); Mechanism: description: TSA and FTA host roundtables specifically tailored for the nation's largest mass transit and passenger rail agencies to discuss security challenges. These roundtables were formerly held twice a year, but will now be held annually; Mechanism operator/intended users: FTA and TSA cosponsor these events intended to serve law enforcement police, security chiefs, and safety directors from the nation's largest mass transit and passenger rail agencies; Type/source of information offered: SBU and open source information shared during presentations and discussions on specific terrorism prevention, response challenges and efforts to develop effective risk mitigation and security enhancements; How information is distributed: (push versus pull system)[B]: A push system. Information is shared during these meetings with public transit officials. A CD with information presented at the roundtables is also distributed to roundtable participants. Information sharing mechanism (number of users)[A]: Joint Terrorism Task Forces (JTTF); (53); Mechanism: description: Small groups of trained, locally based investigators, analysts, linguists, and other specialists from U.S. law enforcement and intelligence agencies. JTTFs are led by the FBI and are designed to combine the resources of federal, state, and local law enforcement; Mechanism operator/intended users: The FBI operates this mechanism intended to serve all law enforcement critical sectors, including public transit; Type/source of information offered: SBU and classified information related to counterterrorism, current relevant investigations, suspicious activities, significant events, and threats; How information is distributed: (push versus pull system)[B]: Push systems. Information is shared via secure telephones, E-mail, in person, and secure video teleconferences. Information sharing mechanism (number of users)[A]: Fusion Centers; (39); Mechanism: description: A collaborative effort of two or more federal agencies that provide resources, expertise, and information to the center to improve the ability to detect, prevent, and respond to criminal and terrorist activity. DHS provides support to fusion centers through grant funding, technical assistance, training, and data access; Mechanism operator/intended users: State and local law enforcement or governments operate these mechanisms intended to serve federal, state, and local governments, law enforcement, and the private sector; Type/source of information offered: SBU and classified information related to homeland security, terrorism, threats, all crimes, and all hazards (such as public health, safety issues or emergencies). DHS and DOJ provide many fusion centers access to their information systems; How information is distributed: (push versus pull system)[B]: Push systems. Information is provided via E-mail, telephone, or in-person. Information sharing mechanism (number of users)[A]: Other Public Transit Agencies; (48); Mechanism: description: Public transit agencies may receive unclassified security-related information from other public transit agencies on an ad-hoc basis. For example, a large public transit agency may pass along security-related information to a smaller agency in the same geographic region, or security officials at one agency may receive information from officials at other agencies around the country through informal networks; Mechanism operator/intended users: Public transit industry operates and uses this type of mechanism; Type/source of information offered: Unclassified information such as suspicious incidents, alerts, and other security information specific to public transit agencies; How information is distributed: (push versus pull system)[B]: Push systems. Informal communication via E-mail, in-person, or teleconference. Information sharing mechanism (number of users)[A]: Regional/State/; Local Information Sharing Mechanisms and Emergency Operations Centers[C]; (47); Mechanism: description: In addition to federal information-sharing mechanisms, public transit agencies also reported using regional or local information-sharing mechanisms. These mechanisms were established either individually or in coordination with other local or state entities, such as offices of emergency management, local law enforcement, and other public transit agencies; Mechanism operator/intended users: Local law enforcement agencies, emergency management agencies or regional working groups operate this type of mechanism intended to serve federal, state, local law enforcement and public transit industry; Type/source of information offered: Unclassified information on security incidents, alerts, threats, vulnerabilities, and grants; How information is distributed: (push versus pull system)[B]: Although these mechanisms vary by region, the mechanisms described by officials from the 27 public transit agencies we interviewed were push systems that provided information via E-mail, telephone, or in person. Information sharing mechanism (number of users)[A]: Industry organizations (e.g., APTA); (44); Mechanism: description: Industry organizations such as APTA may share security-related information directly with public transit agencies. This information may include, among other things, guidance on improving security and emergency response plans, as well as training opportunities; Mechanism operator/intended users: Private industry operates this type of mechanism intended to serve the public transit industry; Type/source of information offered: Unclassified guidance, situational awareness, security alerts, as well as all hazards and safety information; How information is distributed: (push versus pull system)[B]: Push systems. Information is shared during industry conferences, via E- mail, in-person, and teleconferences. Source: GAO analysis of DHS, DOT, DOJ, PT-ISAC, APTA, and public transit agency information. [A] The number of users equals the total number of agencies that reported using this mechanism based on survey data. For HSIN, the number in parentheses represents the 34 agencies that indicated they had log-in access to HSIN and had not lost or forgotten their password. [B] For the purposes of this report, we define a push system as a system that automatically distributes information to users. We define a pull system as a system that requires a user to log on to obtain information. [CI] n table 2, we combined "regional/state/local information-sharing mechanism" and "regional/state/local emergency operations center," although both mechanisms were identified as sources of security- related information by over 40 percent of survey respondents. Specifically, according to our survey results, 47 agencies reported using regional/local information-sharing mechanisms and 38 agencies reported using regional emergency operations centers to receive security-related information. [End of table] Although all of these mechanisms are used by some segment of the public transit agencies we surveyed to obtain security-related information, access to the information disseminated through the mechanisms illustrated in table 2 may vary by, among other factors, whether the transit agencies have a dedicated police department, the size of transit agency, and accessibility of the information. For example, some public transit agencies with a dedicated police department receive security-related information through their law enforcement representative on the local JTTF.[Footnote 23] According to FBI officials, public transit agencies that do not have a dedicated police department are less likely to receive information from the JTTF. In addition, the Transit Security and Safety Roundtables are specifically tailored for the nation's largest mass transit and passenger rail agencies, typically those ranked within the top 50 or 60 by ridership. Smaller transit agencies are less likely to receive information disseminated through this mechanism since they are typically not invited to participate in these roundtables. Also, of the mechanisms identified by the public transit agencies we interviewed and surveyed, all but one send information directly to transit agencies instead of requiring users to log on to a system to retrieve information ("push" vs. "pull"). In addition to the information-sharing mechanisms identified in table 2, TSA-OI implemented its TS-ISAC in March 2010 as another means for sharing security-related information with the transportation industry, including public transit agencies.[Footnote 24] Specifically, TSA's vision for the TS-ISAC is to serve as the one stop shop to obtain TSA- OI reports and documentation, such as SBU intelligence products and other documents from other transportation security partners and stakeholders. The TS-ISAC aims to enhance collaboration between operators, law enforcement personnel, and security directors from all transportation modes. Similar to HSIN-PT, the TS-ISAC is a subportal of HSIN-CS, and therefore users must have a HSIN password to access it.[Footnote 25] Once access is obtained, TS-ISAC users can set up alerts to be notified when a new document has been posted to the site. Public Transit Agencies We Surveyed Were Generally Satisfied with Federal Efforts to Share Security-Related Information, but Opportunities Exist to Improve These Efforts: Large Transit Agencies and Rail Agencies Were Generally More Satisfied with Information-Sharing Efforts Than Midsized Agencies and Non-Rail Agencies: Our survey results indicate that public transit agencies' satisfaction with the security-related information they received varied with the type of transportation service provided and whether the agency was large or midsized. As highlighted in table 3 below, three-fourths of public transit agencies that responded to this question in our survey (57 of 76) were generally satisfied with the security-related information they received, while less than one-sixth (11 of 76) were generally dissatisfied.[Footnote 26] The agencies that provide heavy rail, light rail, or commuter rail service (rail agencies) were generally more satisfied with the information they received than the agencies that provide bus or ferry service, but not rail service (non- rail agencies). Specifically, most rail agencies (30 of 36) were generally satisfied with the security-related information they received, as opposed to approximately two-thirds (27 of 40) of non- rail agencies. In addition, the larger agencies we surveyed were generally more satisfied with security-related information-sharing than the midsized agencies[Footnote 27]. Specifically, nearly all of the large agencies that responded to the survey (14 of 15) were generally satisfied with the security-related information they received, and nearly half (7 of 15) were "very satisfied." By contrast, 43 of 61 midsized agencies were generally satisfied with the information they received, and less than one-sixth (10 of 61) were "very satisfied." Table 3 illustrates public transit agencies' overall satisfaction with the security- related information they received. Table 3: Public Transit Agencies' Overall Satisfaction with Security- Related Information: Overall satisfaction with security-related information? Very satisfied; Type of public transit agency (number of agencies): All agencies: 17; Type of service: Rail agencies: 12; Type of service: Non-rail agencies: 5; Size of agency: Large agencies: 7; Size of agency: Midsized agencies: 10. Overall satisfaction with security-related information? Somewhat satisfied; Type of public transit agency (number of agencies): All agencies: 40; Type of service: Rail agencies: 18; Type of service: Non-rail agencies: 22; Size of agency: Large agencies: 7; Size of agency: Midsized agencies: 33. Overall satisfaction with security-related information? Neither satisfied nor dissatisfied; Type of public transit agency (number of agencies): All agencies: 7; Type of service: Rail agencies: 1; Type of service: Non-rail agencies: 6; Size of agency: Large agencies: [Empty]; Size of agency: Midsized agencies: 7. Overall satisfaction with security-related information?: Somewhat dissatisfied; Type of public transit agency (number of agencies) All agencies: 9; Type of service: Rail agencies: 4; Type of service: Non-rail agencies: 5; Size of agency: Large agencies: 1; Size of agency: Midsized agencies: 8. Overall satisfaction with security-related information? Very dissatisfied; Type of public transit agency (number of agencies): All agencies: 2; Type of service: Rail agencies: 1; Type of service: Non-rail agencies: 1; Size of agency: Large agencies: [Empty]; Size of agency: Midsized agencies: 2. Overall satisfaction with security-related information? No opinion/do not know; Type of public transit agency (number of agencies): All agencies: 1; Type of service: Rail agencies: [Empty]; Type of service: Non-rail agencies: 1; Size of agency: Large agencies: [Empty]; Size of agency: Midsized agencies: 1. Overall satisfaction with security-related information? Subtotal; Type of public transit agency (number of agencies): All agencies: 76; Type of service: Rail agencies: 36; Type of service: Non-rail agencies: 40; Size of agency: Large agencies: 15; Size of agency: Midsized agencies: 61. Overall satisfaction with security-related information? No response; Type of public transit agency (number of agencies): All agencies: 4; Type of service: Rail agencies: 3; Type of service: Non-rail agencies: 1; Size of agency: Large agencies: [Empty]; Size of agency: Midsized agencies: 4. Overall satisfaction with security-related information? Total; Type of public transit agency (number of agencies): All agencies: 80; Type of service: Rail agencies: 39; Type of service: Non-rail agencies: 41; Size of agency: Large agencies: 15; Size of agency: Midsized agencies: 65. Source: GAO analysis of survey responses. [End of table] The agencies we surveyed reported using several different mechanisms to receive security-related information, and in general they were satisfied with the information they received through these mechanisms. Of the mechanisms included in the survey, 12 were used by or accessible to at least 40 percent of the agencies that responded to the survey. The two mechanisms most often cited were E-mail alerts from FTA officials (65 of 76) and E-mail alerts from TSA officials (56 of 76); overall general satisfaction with these two mechanisms was 86 percent and 74 percent, respectively. Transit Security and Safety Roundtables were the highest-rated mechanism for overall general satisfaction, with 33 of 36 agencies generally satisfied.[Footnote 28] With respect to information relevance, validity, and timeliness--three of the six dimensions of quality we included in the survey--regional emergency operations centers received the highest general satisfaction ratings. For actionable information, respondents rated the information they received from other public transportation systems the highest for general satisfaction (28 of 33). Among the 12 most frequently cited mechanisms, public transit agencies were the least satisfied with HSIN, both in terms of overall general satisfaction (19 of 33) and for each of the six dimensions of quality. Public transit agencies in our survey viewed the PT-ISAC more favorably than HSIN; approximately three-fourths (37 of 49) of PT-ISAC users indicated they were generally satisfied with the security-related information they received from this mechanism. See appendix III for additional data on public transit agencies' satisfaction with individual information- sharing mechanisms. Public transit agencies also expressed their views on the "cross- sector" information they receive.[Footnote 29] Most agencies that responded to our survey indicated that receiving cross-sector information is important or very important (63 of 78), and this view was shared by both rail and non-rail agencies. However, these two groups characterized differently the amount of cross-sector information they received. Specifically, approximately half of responding rail agencies indicated that they received "about the right amount" of cross-sector information (18 of 37). The remaining rail agencies either wanted to receive additional cross-sector information (7 of 37) or felt that they already received too much (10 of 37). [Footnote 30] Conversely, about half of non-rail agencies (22 of 41) reported receiving "too little" or "far too little" cross-sector information. Rail and non-rail agencies also differed with respect to their satisfaction with cross-sector information. Approximately two- thirds of rail agencies that responded to this question (24 of 37) were generally satisfied with cross-sector information, whereas less than half of non-rail agencies (16 of 41) were generally satisfied. See table 4 for public transit agencies' views on cross-sector security information sharing. Table 4: Public Transit Agencies' Survey Responses on Cross-Sector Information: Type of service provided by public transit agency: Amount of cross-sector security information? Far too much; All agencies: 2; Rail agencies: 2; Non-rail agencies: [Empty]. Amount of cross-sector security information? Too much; All agencies: 10; Rail agencies: 8; Non-rail agencies: 2. Amount of cross-sector security information? About the right amount; All agencies: 35; Rail agencies: 18; Non-rail agencies: 17. Amount of cross-sector security information? Too little; All agencies: 21; Rail agencies: 6; Non-rail agencies: 15. Amount of cross-sector security information? Far too little; All agencies: 8; Rail agencies: 1; Non-rail agencies: 7. Amount of cross-sector security information? No opinion/don't know; All agencies: 2; Rail agencies: 2; Non-rail agencies: [Empty]. Amount of cross-sector security information? Subtotal; All agencies: 78; Rail agencies: 37; Non-rail agencies: 41. Amount of cross-sector security information?: No response; All agencies: 2; Rail agencies: 2; Non-rail agencies: [Empty]. Satisfaction with cross-sector security information? Very satisfied; All agencies: 14; Rail agencies: 11; Non-rail agencies: 3. Satisfaction with cross-sector security information? Somewhat satisfied; All agencies: 26; Rail agencies: 13; Non-rail agencies: 13. Satisfaction with cross-sector security information? Neither satisfied nor dissatisfied; All agencies: 15; Rail agencies: 4; Non-rail agencies: 11. Satisfaction with cross-sector security information? Somewhat dissatisfied; All agencies: 13; Rail agencies: 7; Non-rail agencies: 6. Satisfaction with cross-sector security information? Very dissatisfied; All agencies: 5; Rail agencies: 1; Non-rail agencies: 4. Satisfaction with cross-sector security information? No opinion/do not know; All agencies: 5; Rail agencies: 1; Non-rail agencies: 4. Satisfaction with cross-sector security information? Subtotal; All agencies: 78; Rail agencies: 37; Non-rail agencies: 41. Satisfaction with cross-sector security information? No response; All agencies: 2; Rail agencies: 2; Non-rail agencies: [Empty]. Satisfaction with cross-sector security information? Total; All agencies: 80; Rail agencies: 39; Non-rail agencies: 41. Source: GAO analysis of survey responses. [End of table] Opportunities Exist to Streamline Security Information-Sharing Efforts: According to TSA's 2007 Transportation Systems Sector-Specific Plan Mass Transit Modal Annex, a streamlined and effective system to share mass transit and passenger rail information is needed to facilitate information sharing among the federal government and public and private stakeholders.[Footnote 31] Additionally, in September 2009, we reported that multiple information systems can create redundancies that make it difficult for end users to discern what is relevant and can overwhelm users with duplicative information from multiple sources.[Footnote 32] Public transit agencies currently receive similar security-related information from a variety of sources. In addition to identifying the 12 key mechanisms most frequently used by public transit agencies to obtain security-related information, our survey also identified that nearly 80 percent of respondents (63 of 80) used 5 mechanisms or more to receive security information. Further, through interviews with public transit agencies of various sizes around the country, we identified at least 21 mechanisms through which these agencies receive security-related information. Moreover, the Mass Transit SCC/Transit, Commuter, and Long-Distance Rail Government Coordinating Council (GCC) joint Information Sharing Working Group (SCC/GCC Information Sharing Working Group)--which is cochaired by TSA and comprised of federal and industry stakeholders and was formed to improve information sharing with public transit agencies--compiled a list that includes 59 different information products distributed to public transit agencies by 17 different sources.[Footnote 33] We identified the potential for overlap between three mechanisms that are each designed to communicate similar unclassified and SBU security- related information to public transit agencies: the PT-ISAC, the HSIN- PT subportal, and the newly-formed TS-ISAC. According to APTA, the PT- ISAC is intended to be a one stop shop for public transit agencies' information needs. However, according to DHS, the HSIN platform is intended to serve as the agency's primary mechanism for sharing unclassified and SBU information with homeland security stakeholders, and TSA officials stated that the agency intends for the HSIN-PT subportal to be the primary mechanism for sharing such information with public transit agencies. Moreover, the TS-ISAC--which is hosted on HSIN-CS and is intended to serve as a collaborative information- sharing platform for the public transit and other transportation modes--includes unclassified and SBU transportation-related information products produced by TSA-OI. According to TSA officials, the TS-ISAC, which services the larger transportation community, is not intended to compete with or replace HSIN-PT or the PT-ISAC, but in the future it may include a separate Web page that is specific to public transit. FTA, TSA, APTA, and public transit agency officials we interviewed expressed the desire to streamline information sharing to reduce the volume of overlapping information public transit agencies receive. For example, the then-Acting Manager of TSA's Mass Transit Division stated that the current number of sources available to public transit agencies to receive security-related information is "overwhelming." Additionally, officials from 16 of 27 agencies we interviewed also suggested that information sharing could be improved by reducing redundancies and consolidating existing mechanisms. Our survey of public transit agencies also indicated a desire for a more streamlined approach to information sharing. In an open-ended question asking how information sharing could be improved, 24 of 80 agencies provided comments in favor of consolidating existing information-sharing mechanisms. For example, according to one respondent who favored streamlining the existing mechanisms, "there are so many purported analysis centers pushing out redundant information that an inordinate amount of my time is spent filtering these many reports to find the high-value nuggets." Our interviews and survey data are consistent with the Administration's March 2010 Surface Transportation Security Priority Assessment, which recommended, among other things, that TSA implement an approach for sharing transportation security information that provides all relevant threat information and improves the effectiveness of information flow. Federal and industry stakeholders have efforts under way intended to improve the efficiency of information sharing with public transit agencies and reduce the volume of overlapping information public transit agencies receive. Specifically, TSA, FTA, APTA, and other government and private sector stakeholders are participating in the SCC/GCC Information Sharing Working Group, which is reviewing how the PT-ISAC, the HSIN-PT subportal, the TS-ISAC, and other related information-sharing mechanisms (including direct E-mails from FTA and TSA officials) might be streamlined or consolidated to better serve the public transit industry. This working group is considering, among other things, whether the PT-ISAC could produce a daily (or twice daily) 2 to 3 page unclassified/For Official Use Only (FOUO) information product using open-source information as well as intelligence products from TSA, DHS, and other entities. This would mark a shift in the PT-ISAC's activities, as it would replace a longer information product (10 to 15 pages) the PT-ISAC prepares using primarily open-source information.[Footnote 34] Working group participants are still debating how this new information product would be disseminated to the public transit industry (e.g., through direct E- mails to public transit agencies, through HSIN-PT, or both), and whether products could be archived on HSIN-PT or another system to facilitate later viewing. In addition, the working group is considering ways to scale back the number of direct E-mails public transit agencies receive, while still maintaining the capability to disseminate information in this manner when necessary. Participants in this working group have not yet agreed on a path forward to improve information sharing with public transit agencies. As of July 2010, TSA officials stated that the working group had not yet (1) drafted options for improving information sharing with public transit agencies, (2) documented the group's current working proposal, or (3) established a time frame for completing either of these activities. Additionally, the working group has not yet determined how it will incorporate the TS-ISAC into its proposed options. While TSA, through the working group, is assessing, among other things, the extent to which information-sharing mechanisms can be streamlined, there are no time frames established for completing these efforts. Developing such time frames to guide the working group's activities-- including its assessment of opportunities to streamline existing information-sharing mechanisms that target similar user groups with similar information--could assist TSA in completing this important effort.[Footnote 35] The PT-ISAC Is Not Completing Agreed-Upon Responsibilities and Tasks: Standards for Internal Control in the Federal Government provide that internal controls should be designed to assure that ongoing monitoring occurs in the course of normal operations.[Footnote 36] The cooperative agreement between FTA and APTA that provides funding for the PT-ISAC specifies that the ISAC perform several functions related to the HSIN-PT subportal.[Footnote 37] For example, the agreement states that the PT-ISAC is to control access to the HSIN-PT subportal, manage the information that is available on the subportal, and take steps to enhance its user-friendliness. As specified in the cooperative agreement, TSA and FTA monitor the PT-ISAC's expenditures and activities through quarterly financial and operational reports to help ensure the PT-ISAC fulfills these tasks.[Footnote 38] However, while TSA and FTA oversee PT-ISAC expenditures, they are not currently taking steps to ensure that the PT-ISAC performs all of the activities that are specified under the cooperative agreement. For example, the PT-ISAC does not post its analytical products (or other security-related information) to the HSIN-PT subportal, nor has it organized and archived HSIN-PT content to facilitate better access to information, as specified by the agreement. As a result, HSIN-PT is not regularly updated with security-related information, including PT- ISAC analytical products, which could be beneficial to public transit agencies. TSA, FTA, APTA, and PT-ISAC officials agree that the PT-ISAC is not performing the HSIN-related functions specified in the FTA/APTA cooperative agreement. These officials told us that through the SCC/GCC Information Sharing Working Group, they are reviewing the specific roles and responsibilities of the PT-ISAC--including activities related to the HSIN-PT subportal. However, regardless of whether the working group redefines the PT-ISAC's roles and responsibilities, it is important to ensure that the activities specified in the cooperative agreement are carried out. Taking steps to ensure the PT-ISAC fulfills its responsibilities and completes agreed-upon tasks could help assure TSA and FTA that this mechanism meets the security information needs of public transit agencies. Awareness and Use of PT-ISAC and HSIN among Some Public Transit Agencies Could Be Increased: In March 2004, we recommended that agencies take actions to better target federal outreach efforts, and internal control standards call for management to ensure adequate means of communicating with external stakeholders who may have a significant impact on agency goals. [Footnote 39] Security officials at the public transit agencies we surveyed were not always aware of the existence of the PT-ISAC and HSIN, particularly non-rail agencies, midsized agencies, and agencies that do not have their own dedicated police department. For example, of the 80 agencies we surveyed, 23 indicated they did not receive security information from the PT-ISAC and 8 did not know whether they used this mechanism. Moreover, 15 of the 23 agencies that did not receive information from the PT-ISAC had never heard of it (see table 5).[Footnote 40] Table 5: Awareness and Use of PT-ISAC for Different Categories of Public Transit Agencies: Does your agency currently receive security-related information from the PT-ISAC? Type of agency: All agencies; Yes: 49; No[A]: 23; Do not know: 8; Total: 80. Type of agency: Dedicated police department; Yes: 24; No[A]: 4; Do not know: 1; Total: 29. Type of agency: No dedicated police department; Yes: 25; No[A]: 19; Do not know: 7; Total: 51. Type of agency: Rail agencies; Yes: 30; No[A]: 5; Do not know: 4; Total: 39. Type of agency: Non-rail agencies; Yes: 19; No[A]: 18; Do not know: 4; Total: 41. Type of agency: Large agencies; Yes: 14; No[A]: 1; Do not know: 0; Total: 15. Type of agency: Mid-sized agencies; Yes: 35; No[A]: 22; Do not know: 8; Total: 65. Source: GAO analysis of survey responses. [A] Of the 23 agencies that indicated they did not use the PT-ISAC, 15 had never heard of it. [End of table] According to FTA officials, the PT-ISAC is meant to serve as a valuable resource for midsized and smaller public transit agencies. However, our survey results indicate that fewer non-rail and midsized agencies received information from the PT-ISAC than rail and large agencies (19 of 41 non-rail and 35 of 65 midsized agencies, as opposed to 30 of 39 rail agencies and 14 of 15 large agencies, respectively). Moreover, nearly all of the agencies we surveyed that had not heard of the PT-ISAC were non-rail agencies (14 of 15), midsized agencies (15 of 15), or agencies without their own dedicated police department (14 of 15). APTA conducts some PT-ISAC outreach through E-mails and newsletters to its members and other stakeholders, and FTA officials stated that they promote the PT-ISAC at Transit Security and Safety Roundtables. Both APTA and FTA officials agreed, however, on the need for additional outreach to public transit agencies to increase awareness and use of the PT-ISAC. TSA did not provide information on any existing PT-ISAC outreach efforts, but officials stated that the agency's future actions with respect to the PT-ISAC, including outreach activities, will depend on the proposed options that arise from the SCC/GCC Information Sharing Working Group. However, as noted above, there are no time frames for this working group to draft or finalize its proposals for improving information sharing, including who will be responsible for conducting outreach activities for the PT-ISAC or what these activities will entail. Conducting targeted outreach to agencies that are not currently using the PT-ISAC--particularly non-rail agencies, midsized agencies, and agencies that do not have their own dedicated police department--could help to increase awareness and use of this mechanism. TSA and APTA officials also stated that not all public transit agencies are aware of HSIN and those that are may not view the system as a valuable resource. The results of our survey are consistent with this view and illustrate that public transit agencies' awareness of HSIN could be increased. For example, less than half of public transit agencies (34 of 77) reported that they had log-in access to HSIN and had not lost or forgotten their log-in information (see table 6). Table 6: Awareness of and Access to HSIN for Different Categories of Public Transit Agencies: Does your agency currently have log-in access to HSIN? Type of agency: All agencies; Yes: 34; Yes, but lost/forgot log-in information: 13; No[A]: 19; Do not know: 11; Subtotal: 77; No response: 3; Total: 80. Type of agency: Dedicated police department; Yes: 17; Yes, but lost/forgot log-in information: 7; No[A]: 1; Do not know: 2; Subtotal: 27; No response: 2; Total: 29. Type of agency: No dedicated police department; Yes: 17; Yes, but lost/forgot log-in information: 6; No[A]: 18; Do not know: 9; Subtotal: 50; No response: 1; Total: 51. Type of agency: Rail agencies; Yes: 20; Yes, but lost/forgot log-in information: 8; No[A]: 6; Do not know: 3; Subtotal: 37; No response: 2; Total: 39. Type of agency: Non-rail agencies; Yes: 14; Yes, but lost/forgot log-in information: 5; No[A]: 13; Do not know: 8; Subtotal: 40; No response: 1; Total: 41. Type of agency: Large agencies; Yes: 9; Yes, but lost/forgot log-in information: 4; No[A]: 1; Do not know: 1; Subtotal: 15; No response: 0; Total: 15. Type of agency: Midsized agencies; Yes: 25; Yes, but lost/forgot log-in information: 9; No[A]: 18; Do not know: 10; Subtotal: 62; No response: 3; Total: 65. Source: GAO analysis of survey responses. [A] Of the 19 agencies that indicated they do not have log-in access to HSIN, 12 reported they had never heard of it. [End of table] As with PT-ISAC usage, a greater proportion of large agencies, rail agencies, and agencies that maintain their own dedicated police departments indicated they had log-in access to HSIN and had not lost or forgotten their log-in information (9 of 15 large agencies, 20 of 39 rail agencies, and 17 of 29 agencies with dedicated police departments, as opposed to 25 of 65 midsized agencies, 14 of 41 non- rail agencies, and 17 of 51 agencies without dedicated police departments, respectively). Moreover, our survey also identified that, of the 19 agencies that do not have HSIN access, 12 had never heard of the mechanism, and an additional 11 agencies did not know whether they had access to HSIN. Of the 12 agencies that had never heard of HSIN, nearly all were non-rail agencies (10 of 12), midsized agencies (12 of 12), or agencies without their own dedicated police department (12 of 12). Multiple entities have a role in conducting outreach to public transit agencies about HSIN. DHS's Office of Operations, Coordination, and Planning is generally responsible for conducting HSIN outreach, but DHS officials from this office told us that outreach efforts for HSIN- CS, including the HSIN-PT subportal, are under the purview of DHS IP. However, DHS IP officials told us that they are deferring to APTA and TSA (the sector coordinator and sector-specific agency for mass transit, respectively), as described in the NIPP, to conduct outreach to public transit agencies on the HSIN-PT subportal. TSA has conducted some outreach to the public transit industry about HSIN by including HSIN reminders when it distributes security information via E-mail to public transit agencies. However, as table 6 illustrates, past outreach efforts have not resulted in widespread HSIN awareness and use among public transit agencies that we surveyed (particularly midsized agencies, non-rail agencies, and agencies without a dedicated police department), and our survey results suggest that access to HSIN remains a concern.[Footnote 41] TSA officials stated that the agency recognizes the need for additional outreach to increase public transit agencies' awareness and use of the HSIN-PT subportal and added that future outreach efforts will depend on the proposed options that arise from the SCC/GCC Information Sharing Working Group. However, there are no time frames for this working group to draft or finalize its proposals for improving information sharing.[Footnote 42] Conducting targeted outreach to agencies that are not currently using HSIN-- particularly non-rail agencies, midsized agencies, and agencies that do not have their own dedicated police department--could help to increase awareness and use of this mechanism. Regarding the newly-formed TS-ISAC, TSA has conducted initial outreach to increase public transit agencies' awareness. For example, TSA distributed a TS-ISAC marketing package via E-mail to transportation stakeholders, and TSA officials stated that the agency is outreaching to other DHS components, state and local stakeholders, and other ISACs (in addition to the PT-ISAC). According to TSA data from April 2010, officials from 46 public transit agencies had been granted access to the public transit Web page of the TS-ISAC within the first 4 weeks of its operation. However, we did not collect data from public transit agencies on their awareness or use of the TS-ISAC because it was not implemented until March 2010, after we developed our survey. As a result, we could not determine the extent to which outreach efforts have increased awareness and use of the TS-ISAC in the public transit industry. Concerns with Accessibility, User-Friendliness, and Information Value May Hinder HSIN from Meeting the Security Information Needs of Public Transit Agencies: Standards for Internal Control in the Federal Government call for agencies to ensure adequate means of communicating with external stakeholders that may have a significant impact on agency goals, and effective information technology management is critical to achieving useful, reliable, and continuous communication of information.[Footnote 43] However, concerns among public transit agencies about HSIN's accessibility may reduce its value as a source of security-related information. Industry officials characterized HSIN as a "pull" system that requires users to log in and extract what is relevant to their agency. Security officials at 11 of 27 public transit agencies we interviewed told us they prefer security information to be "pushed" out to them (e.g., through E-mails, phone calls) instead of having to log into a system to retrieve it themselves. APTA officials stated that public transit security personnel do not have time to log into a "pull" system, such as HSIN, every day and sift through excess information to extract what is relevant to their agency. In addition, when a HSIN password expires (which occurs after 90 days for security reasons) users must call the HSIN help desk to obtain a new one. However, the contact information for the HSIN help desk is not located on the main HSIN log-in page, so users may not know how to get help if they experience log-in challenges. Of the 27 agencies we interviewed, 8 indicated they had experienced problems accessing HSIN.[Footnote 44] In June 2010, DHS implemented a new agency policy to identify HSIN users that have not accessed the system in 180 days and notify them via E-mail every 3 months instructing them to contact the HSIN help desk to obtain a new password. DHS officials also told us that the phone number for the HSIN help desk would be added to the HSIN log-in page, but the agency had not done so as of August 2010. In addition to accessibility concerns, certain aspects of HSIN are not user-friendly, and the security-related information available on the HSIN-PT subportal is not always valuable to public transit agencies. Of the 11 agencies we interviewed that had access to HSIN and used it to receive security-related information, 5 reported problems with using the system once they logged in. These problems included configuring E-mail alerts to notify them when information is discovered or changed in a particular area of HSIN (e.g., the HSIN-PT subportal). We experienced similar problems using these E-mail alerts. After setting up alerts to notify us when documents are discovered or changed on the HSIN-PT subportal, we received multiple notifications on a near-daily basis with links to outdated documents, such as job announcements last modified in 2007, a threat advisory for the New York City subway system last modified in 2006, and a map of power outages caused by Hurricane Wilma in 2005. Further, we found that security-related information on HSIN that could be useful to public transit agencies was not always posted to the HSIN-PT subportal. For example, in the days following the Moscow subway bombings in March 2010, certain documents pertaining to the attack were available on the HSIN-CS portal, but did not appear on HSIN-PT, despite their direct relevance to public transit agency users. The E-mail alerts we had set up for HSIN-PT did not notify us of any of this information, which included a document describing heightened security measures a large U.S. public transit agency took in response to the Moscow attack. This information could have been of interest to other public transit agencies, but HSIN-PT users would not have known about it unless they logged into the system without an E-mail prompt, navigated to the HSIN- CS portal, and found the information themselves. Based on our survey results--which indicate that only 3 of 77 agencies use HSIN daily-- agencies may not have known that information pertaining to the Moscow bombings was available to them on HSIN[Footnote 45].: DHS and TSA agree that the HSIN-PT subportal is not widely used by the public transit industry and that improvements are needed. One such improvement is related to DHS's efforts to develop a replacement system for the HSIN platform, known as HSIN Next Generation. This new system, which DHS began to develop in 2008, is intended to provide increased security and access to SBU information for public transit agencies and other user communities, including law enforcement, intelligence, immigration, and emergency and disaster management. According to DHS officials, the agency intends to move the subportals on HSIN-CS, including HSIN-PT, to the new HSIN Next Generation platform during the last quarter of calendar year 2010.[Footnote 46] Taking steps to ensure public transit agencies can access and readily use HSIN--and ensuring the HSIN-PT subportal contains security-related information that is of value to these agencies--could help DHS improve HSIN's capacity to meet public transit agencies' security-related information needs. DHS's Information-Sharing Efforts Could be Enhanced by Developing More Specific Goals and Measures and Obtaining Additional Industry Feedback: DHS and TSA Have Established Goals and Measures Related to Information Sharing, but Their Goals Are Not Specific to Public Transit and Existing Measures May Limit Program Assessment: DHS and TSA have established goals and output-oriented performance measures for their information-sharing activities to help gauge the effectiveness of their overall information-sharing efforts with security stakeholders.[Footnote 47] However, they have not developed performance goals and outcome-oriented measures to gauge the effectiveness of their information-sharing efforts specific to public transit agencies. Specifically, DHS and TSA have not developed such goals and measures for HSIN-PT and the PT-ISAC--mechanisms designed to serve as the primary information sources for the public transit agencies--or the recently established TS-ISAC. As a result, DHS and TSA may not be fully informed of the effectiveness of their information-sharing activities for the public transit industry. TSA officials recognize the importance of establishing specific goals and developing outcome-oriented measures, but they are in the beginning stages of doing so and could not provide time frames for when they plan to complete these efforts. Table 7, below, details DHS's current goals and performance measures related to information sharing. Table 7: DHS and TSA Performance Goals and Measures for Information- Sharing Activities: Agency: DHS; Goal: Detect, deter, and prevent terrorist incidents by sharing domestic situational awareness through national operational communications and intelligence analysis; Measure: (1) Number of Homeland Intelligence Reports disseminated[A]; (2) Percentage of breaking homeland security situations disseminated to designated partners within targeted time frames; Focus: Homeland security stakeholders; Source: DHS Annual Performance Report Fiscal Years 2008-2010. Agency: DHS; Goal: Provide, build, and support a robust information-sharing capability among and between federal and state, local, and tribal partners; Measure: None; Focus: Homeland security stakeholders; Source: I&A 2009 Strategy. Agency: TSA; Goal: Prevent or deter acts of terrorism using or against the transportation system; Measure: None; Focus: Transportation industry, including mass transit; Source: TSA Transportation Systems Sector Specific Plan and accompanying Mass Transit Modal Annex. Agency: TSA; Goal: Improve the timely and secure exchange of transportation security information; Measure: None; Focus: Homeland security stakeholders; Source: TSISP 2009 Update. Agency: TSA; Goal: Establish a framework enabling secure, multidirectional transportation security information between government and industry; Measure: None; Focus: Homeland security stakeholders; Source: TSISP 2009 Update. Source: GAO analysis of DHS and TSA information. Note: "None" as used in the performance measures column refers to the lack of performance measures identified by DHS and TSA in writing or orally. [A] Homeland Intelligence Reports provide emergent intelligence information to security stakeholders. The DHS Annual Performance Report Fiscal Years 2007-2009 also measured the percentage of active HSIN users. However, this measure has been temporarily discontinued due to account verification process issues. This measure was not included in the DHS Annual Performance Report Fiscal Years 2008-2010. [End of table] The performance goals and measures established by DHS and TSA are primarily focused on information-sharing efforts with homeland security stakeholders and the transportation community as a whole, and are not specific to their efforts to share security-related information with the public transit industry.[Footnote 48] TSA has developed some output-oriented performance measures specifically for assessing its efforts to share security-related information with public transit agencies. According to TSA officials, the agency currently tracks: (1) the number of meetings held between the GCC and the Mass Transit SCC and the number of Transit Security and Safety Roundtables; (2) the number of teleconferences it conducts with the peer advisory group and the number of intelligence/information products it releases; and (3) the usage of the public transit subportal on HSIN as an indicator of stakeholders' interest in the information provided. TSA-OI is also collecting output data to measure the performance of the TS-ISAC, such as the number of users, the length of time each user is logged-on to the site, and the number of times users access information from the Web site. We have previously reported that decision makers use performance measurement information, including output measures and information on program operations, to help identify problems in individual programs, identify causes of the problems, and modify services or processes to address problems.[Footnote 49] However, leading management practices emphasize that successful performance measurement focuses on assessing the results of individual programs and activities.[Footnote 50] We have also previously reported that without effective performance measurement, especially data on program outcomes, decision makers may have insufficient information to evaluate the cost-effectiveness of their activities.[Footnote 51] While output measures, such as those developed by TSA, are useful because they indicate the quantity of direct services a program delivers, they do not reflect the overall effectiveness of their activities. We recognize and have previously reported on the challenge of assessing the effectiveness of security- related activities such as information sharing and developing outcome- oriented measures, but have called on agencies to take steps towards establishing such measures to hold them accountable for the investments they make. Furthermore, developing such measures provides agencies with valuable information for evaluating the effectiveness of their programs and the extent to which they are meeting their goals. Furthermore, TSA has not developed specific performance goals or outcome-oriented measures for the PT-ISAC or HSIN-PT, which were both established as primary information-sharing mechanisms for public transit agencies. According to TSA and APTA officials, they plan to develop specific goals and measures for the PT-ISAC through the GCC/SCC Information Sharing Working Group. However, the working group is still finalizing its options for enhancing information-sharing efforts with public transit agencies, including assessing opportunities to streamline existing information-sharing mechanisms, and TSA officials were unable to provide us with time frames concerning the completion of these efforts.[Footnote 52] In regard to HSIN-PT, TSA has developed an output-oriented performance measure which tracks the number of users of this mechanism; however, this measure provides limited information on which the agency can assess the results and progress of this information-sharing mechanism. TSA- OI, however, has not developed specific goals or outcome-oriented performance measures for HSIN-PT. Moreover, TSA-OI officials reported that for the newly established TS-ISAC, they are focusing on providing security-related products to 100 percent of homeland security stakeholders, including public transit agencies. However, TSA has not developed goals or related performance measures for this mechanism and could not provide time frames for doing so.[Footnote 53] Once the SCC/GCC Information Sharing Working Group has developed options for improving information sharing with public transit agencies, establishing time frames for developing goals and related, outcome- oriented measures for the PT-ISAC, HSIN-PT, and TS-ISAC could assist TSA in obtaining more meaningful information from which to gauge the effectiveness of these information-sharing mechanisms. DHS Has Taken Steps to Gather Feedback on Public Transit Agencies' Satisfaction with the Security-Related Information They Receive, but Has Not Established a Systematic Process for Collecting Such Information: DHS and TSA have taken some steps to gather feedback on public transit agencies' satisfaction with the security-related information they receive. For example, DHS and TSA developed forms to periodically gather feedback on security-related products from their customers, including public transit agencies. TSA officials also reported that they informally gather feedback during the Transit Security and Safety Roundtables. However, a systematic process for obtaining feedback on the usefulness of the PT-ISAC and HSIN-PT does not currently exist. We have previously reported that agencies with a systematic process for gathering feedback use surveys and other methods to identify the importance or depth of customers' issues in a single, centralized framework, and integrate the feedback information obtained in a standard and consistent manner.[Footnote 54] In December 2009, we reported that additional DHS actions to obtain feedback on the utility and quality of information shared could strengthen the department's efforts in this area.[Footnote 55] Research of best practices for customer satisfaction suggests that multiple approaches to customer feedback, such as focus groups and complaint programs that provide qualitative and quantitative data, and the integration of feedback data, are needed to effectively listen and understand customers' needs and to take appropriate action to meet those needs.[Footnote 56] In March 2010, DHS I&A began attaching a survey to each of its FOUO intelligence products that are disseminated to all its customers, including state and local partners, who receive FOUO products, to better understand customer information needs. Public transit agencies that receive I&A's FOUO intelligence products will therefore have an opportunity to provide feedback on the information provided. I&A officials stated that they plan to use these results to better inform them of product usefulness and the security information needs of their customers. In addition, TSA-OI posted a feedback form on the TS-ISAC to gather users' views, including public transit agencies, on TSA-OI products. However, TSA-OI's marketing materials on the TS-ISAC did not reference this feedback survey, nor has the agency informed users of this survey's existence through any other method. In addition, according to TSA-OI officials, this survey was posted shortly after the TS-ISAC was implemented in March 2010, but as of May 27, 2010, TSA- OI had not received any feedback through this survey. Due to the recent timing of these survey efforts, it may be too early to assess the insights that will be provided through this mechanism. Although TSA officials have established a process to gather user views, including public transit agencies, on TSA-OI products, TSA has not established a systematic process to obtain public transit agencies' feedback on information shared through the PT-ISAC and through HSIN-PT--the primary mechanisms designed to share security- related information with public transit agencies. Also, as of July 2010, TSA officials stated that they are uncertain about whether or not they will continue to use the TS-ISAC feedback form as a mechanism to gather public transit agency feedback. However, they stated that the agency does not have a systematic process in place to request, collect, and analyze feedback in order to gauge public transit agencies' overall satisfaction with its information-sharing activities, and that such a process is needed. TSA officials could consider using various survey tools and other methods to assist them in collecting public transit agency feedback, which could better inform them of the effectiveness of their information-sharing efforts. For example, through our survey, we were able to assess the extent to which these public transit agencies used and were satisfied with a variety of information-sharing mechanisms, including TSA mechanisms. DHS's and TSA's efforts to share security-related information with public transit agencies could be enhanced by developing a systematic process for gathering feedback on these agencies' satisfaction with the information they receive. Conclusions: The recent bombings on the Moscow subway and planned attempts to detonate explosives in the New York City subway system have highlighted the continued threat to public transit systems in foreign countries and in the United States. While the SCC/GCC Information Sharing Working Group's efforts to enhance information sharing with public transit agencies reflects the joint stakeholder commitment to this area, opportunities for strengthening information sharing exist. Until TSA establishes time frames for the SCC/GCC Information Sharing Working Group to complete its efforts, including assessing opportunities to streamline existing information-sharing mechanisms and conducting targeted outreach efforts to increase awareness of the PT-ISAC and HSIN, the agency is limited in its ability to take further action to strengthen information sharing. In addition, without taking steps to ensure that the PT-ISAC fulfills its responsibilities and completes agreed-upon tasks, TSA and FTA cannot be assured that this mechanism meets the security information needs of public transit agencies. Further, while DHS and TSA are taking steps to improve information sharing with public transit agencies, this effort will not be complete until the accessibility and user-friendliness of HSIN are addressed. Moreover, the HSIN-PT subportal will likely continue to be underutilized until DHS takes steps to ensure that this mechanism contains security-related information that is of value to public transit agencies. Once the SCC/GCC Information Sharing Working Group develops options for improving information sharing with public transit agencies, it will be important for DHS and TSA to continue with other efforts to strengthen this area of information sharing. Specifically, until DHS establishes time frames for developing goals and related outcome- oriented performance measures for the PT-ISAC, HSIN-PT, and TS-ISAC, the department will be limited in its ability to gauge the effectiveness of its information-sharing efforts with the public transit industry. Finally, while we are encouraged by the department's efforts to gather feedback on public transit agencies' satisfaction with the security-related information they receive, a systematic process for obtaining such feedback on the PT-ISAC and HSIN-PT is lacking. Such a process could help DHS and TSA assess the effectiveness of their efforts to share security-related information with public transit agencies. Recommendations for Executive Action: To help strengthen information sharing with public transit agencies, we recommend that the Secretary of Homeland Security direct the Assistant Secretary for the Transportation Security Administration to take the following action in coordination with FTA and public transit agencies: * Establish time frames for the SCC/GCC Information Sharing Working Group to develop options for improving information sharing to public transit agencies and complete this effort, including the Working Group's efforts to: - assess opportunities to streamline existing information-sharing mechanisms that target similar user groups with similar information to reduce overlap, where appropriate; and: - conduct targeted outreach efforts to increase awareness of the PT- ISAC and HSIN among agencies that are not currently using or aware of these systems. To help ensure that the PT-ISAC is meeting its objectives for sharing security-related information with public transit agencies, we recommend that the Secretaries of Homeland Security and Transportation direct the Assistant Secretary of the Transportation Security Administration and Administrator of the Federal Transit Administration to take the following action: * Take steps to ensure the PT-ISAC fulfills its responsibilities and completes agreed-upon tasks. To help strengthen DHS's efforts to share security-related information with public transit agencies, we recommend that the Secretary of Homeland Security take the following three actions: * Take steps to ensure that public transit agencies can access and readily utilize HSIN and that the HSIN-PT subportal contains security- related information that is of value to public transit agencies. * Once the SCC/GCC Information Sharing Working Group has developed options for improving information sharing with public transit agencies, establish time frames for developing goals and related outcome-oriented performance measures specific to the PT-ISAC, HSIN- PT, and TS-ISAC. * Develop a process for systematically gathering feedback on public transit agencies' satisfaction with the PT-ISAC and HSIN-PT. Agency Comments and Our Evaluation: We provided a draft of this report and its accompanying e-supplement (GAO-10-896SP) to DHS, DOJ, and DOT for review and comments. We received written comments from DHS on the draft report, which are summarized below and reproduced in full in appendix IV. DHS concurred with the report and recommendations and indicated that it is taking steps to address the recommendations. DHS also provided technical comments that we incorporated where appropriate. In an E-mail received September 7, 2010, the FBI liaison stated that the Bureau had no comments on the draft report. DOT did not provide comments on the findings and recommendations but did provide technical comments to the draft report, which we have incorporated where appropriate. DHS, DOJ, and DOT did not provide comments on the e-supplement. In commenting on the draft report, DHS described the efforts the department has underway or planned to address our recommendations. These efforts are intended to improve information sharing with public transit agencies. However, although the actions DHS reported are important first steps, additional efforts are needed to help ensure that our recommendations are fully implemented, as discussed below. With regard to our first recommendation that TSA coordinate with FTA and public transit agencies to establish time frames for the SCC/GCC Information Sharing Working Group for completing efforts to develop options for improving information sharing to public transit agencies, including assessing opportunities for streamlining existing mechanisms and conducting targeted outreach, DHS stated that TSA is continuing to work with members of the working group to identify options on how to streamline the flow of information and described one such option. According to DHS, the working group has identified at least one product option for streamlining information sharing that would match the needs of stakeholders. This product would be "pushed" out to stakeholders and also be posted on appropriate websites. DHS also stated that TSA is taking steps to improve targeted outreach through collaboration of the Surface Transportation Information Sharing and Analysis Center and the PT-ISAC in the development of periodic intelligence summaries and plans to work with both ISACs, as well as DHS to ensure further outreach is conducted with stakeholders. TSA's efforts to streamline information sharing with public transit agencies and improve its outreach are important first steps toward improving the information provided to the public transit industry. In order to meet the full intent of our recommendation, TSA should establish time frames for completing these efforts. In addition, TSA did not indicate whether it has identified other options or is considering taking additional steps to streamline existing information sharing mechanisms or how its outreach to public transit agencies will be targeted to those agencies not currently using or aware of these systems. Taking such actions would be necessary to fully address the intent of this recommendation. Regarding our second recommendation that TSA and FTA take steps to ensure the PT-ISAC fulfills its responsibilities and completes agreed- upon tasks, DHS stated that the purpose for including HSIN-PT content management and other elements currently in the cooperative agreement with APTA/PT-ISAC was to fill gaps in the information sharing process used by the mass transit and passenger rail community. DHS also stated that TSA intends to ensure compliance with the contract elements by "phasing in PT-ISAC contributions and requirements to achieve maximum effectiveness." TSA's stated plan for ensuring compliance with contract elements appears to be a positive step. However, DHS's response did not indicate the specific steps that will be taken to ensure that the PT-ISAC fulfills its responsibilities and completes agreed-upon tasks. Taking such action would more fully address our recommendation. In regards to our third recommendation that DHS take steps to ensure that public transit agencies can access and readily utilize HSIN and that the HSIN-PT subportal contains security-related information that is of value to public transit agencies, DHS stated that it supports changes to HSIN and the intensification of efforts to expand its use for the broader range of transit and passenger rail agencies. DHS also stated that in fiscal year 2010, the HSIN program increased its efforts to raise the awareness of HSIN through a targeted marketing strategy. DHS also stated that the HSIN program's requirements management process and operator representation on the HSIN Mission Operators Committee governance board will ensure that public transit sector requirements are assessed, prioritized, and implemented. While DHS's reported efforts to expand HSIN use with the public transit community are noteworthy, in order to meet the full intent of our recommendation, DHS should also take steps to ensure that public transit agencies can readily access and use HSIN, as we recommended. Additionally, DHS did not clearly identify the actions it will take to ensure that the HSIN-PT subportal contains security-related information that is of value to public transit agencies. Identifying and implementing such steps would be necessary to fully address the intent of our recommendation. With regard to our fourth recommendation that DHS establish time frames for developing goals and related outcome-oriented performance measures specific to the PT-ISAC, HSIN-PT, and TS-ISAC, DHS agreed that developing outcome-oriented measures for information sharing is important. Specifically, DHS stated that TSA will work with DHS, APTA, and the PT-ISAC to develop a series of goals and measures to assess the effectiveness of its information-sharing efforts. DHS added that these measures, once developed, can be expected to evolve and improve over time as systematic improvements are made. DHS plans to share the developed measures with its stakeholders to obtain their comments. In order to meet the full intent of our recommendation, DHS should establish time frames for developing such goals and measures. Concerning our fifth recommendation that DHS develop a process for systematically gathering feedback on public transit agencies' satisfaction with the PT-ISAC and HSIN-PT, DHS stated that updates to HSIN will enable the department to efficiently capture user feedback. DHS also stated that it would need to collaborate with TSA and DOT as well as industry stakeholders to develop additional stakeholder feedback mechanisms. DHS also noted that is will continue to obtain stakeholder feedback through its survey on the TS-ISAC subportal. While the development of the customer survey on the TS-ISAC is an important step in obtaining feedback on the satisfaction of this mechanism, DHS should ensure that its process for gathering feedback on public transit agencies' satisfaction with the PT-ISAC and HSIN-PT is systematic, as we recommended. Taking such action is necessary to fully address this recommendation. We are sending copies of this report to the Secretaries of Homeland Security and Transportation, and the Attorney General. The report is also available at no charge on GAO's Web site at [hyperlink, http://www.gao.gov]. If you or your staff have any questions about this report, please contact me at (202) 512-4379 or lords@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix V. Signed by: Stephen M. Lord: Director, Homeland Security and Justice Issues: List of Committees: The Honorable Joseph I. Lieberman Chairman The Honorable Susan M. Collins Ranking Member Committee on Homeland Security and Governmental Affairs United States Senate: The Honorable Christopher J. Dodd: Chairman: The Honorable Richard C. Shelby: Ranking Member: Committee on Banking, Housing, and Urban Affairs: United States Senate: The Honorable Bennie G. Thompson: Chairman: The Honorable Peter T. King: Ranking Member: Committee on Homeland Security: House of Representatives: The Honorable James L. Oberstar: Chairman: The Honorable John L. Mica: Ranking Member: Committee on Transportation and Infrastructure: House of Representatives: [End of section] Appendix I: Objectives, Scope, and Methodology: This report addresses the following questions: (1) What mechanisms has the federal government established or funded as primary information- sharing sources for public transit agencies? (2) To what extent are public transit agencies satisfied with federal efforts to share security-related information, and how, if at all, can these efforts be improved? (3) To what extent has the Department of Homeland Security (DHS) identified goals for sharing security-related information with public transit agencies and developed measures to gauge its progress in meeting those goals? To identify the mechanisms established or funded by the federal government to serve as primary information sources for public transit agencies, we reviewed and assessed relevant documentation, such as the Homeland Security Information Network (HSIN) Program Management Plan, and interviewed officials from DHS components including the Office of Infrastructure Protection (IP) within the National Protection and Programs Directorate (NPPD), the Office of Intelligence and Analysis (I&A), the U.S. Coast Guard, and the Transportation Security Administration (TSA), as well as officials from the Federal Transit Administration (FTA) and the Federal Bureau of Investigation (FBI) to discuss the mechanisms they use to share security-related information with public transit agencies.[Footnote 57] We also conducted site visits, or held teleconferences, with security and management officials from a nonprobability sample of 27 public transit agencies across the nation to determine which mechanisms are most routinely used by these agencies to obtain security-related information. These transit agencies were selected to generally reflect the variety of transit agencies in terms of size, location, transportation mode, and law enforcement presence and represent about 63 percent of the nation's total public transit ridership based on information we obtained from FTA's National Transit Database. Because we selected a nonprobability sample of transit agencies to interview, the information obtained cannot be generalized to the overall population of transit agencies. However, the interviews provided illustrative examples of the perspectives of various transit agencies about federal government information-sharing mechanisms and corroborated information we gathered through other means. Table 8 lists the public transit agencies we interviewed. Table 8: Public Transit Agencies Interviewed: Public transit agency: Alameda-Contra Costra Transit District (AC Transit); Urban area served[A]: Oakland, California. Public transit agency: Bay Area Rapid Transit; Urban area served[A]: San Francisco, California. Public transit agency: Chicago Transit Authority; Urban area served[A]: Chicago, Illinois. Public transit agency: Fairfax Connector Bus System; Urban area served[A]: Fairfax, Virginia. Public transit agency: City of Tempe Transportation Planning and Transit Division-Valley Metro; Urban area served[A]: Phoenix-Mesa, Arizona. Public transit agency: Greater Richmond Transit Company; Urban area served[A]: Richmond, Virginia. Public transit agency: Golden Gate Bridge, Highway and Transportation District; Urban area served[A]: San Francisco, California. Public transit agency: Gwinnett County Transit; Urban area served[A]: Atlanta, Georgia. Public transit agency: Long Beach Transit; Urban area served[A]: Los Angeles-Long Beach-Santa Ana, California. Public transit agency: Los Angeles County Metropolitan Transportation Authority; Urban area served[A]: Los Angeles, California. Public transit agency: Maryland Transit Administration; Urban area served[A]: Baltimore, Maryland. Public transit agency: Metropolitan Atlanta Rapid Transit Authority; Urban area served[A]: Atlanta, Georgia. Public transit agency: Metro-North Commuter Railroad Company; Urban area served[A]: New York, New York-Newark, New Jersey- Connecticut. Public transit agency: Metropolitan Transportation Authority Bus; Urban area served[A]: New York, New York-Newark, New Jersey- Connecticut. Public transit agency: Metropolitan Transportation Authority Long Island Railroad; Urban area served[A]: New York, New York-Newark, New Jersey- Connecticut. Public transit agency: Metropolitan Transportation Authority New York City Transit; Urban area served[A]: New York, New York-Newark, New Jersey- Connecticut. Public transit agency: Montgomery County Transit; Urban area served[A]: Washington, D.C., Virginia, Maryland. Public transit agency: New Jersey Transit; Urban area served[A]: Newark, New Jersey-New York, New York. Public transit agency: New York Department of Transportation-Staten Island Ferry; Urban area served[A]: New York, New York-Newark, New Jersey- Connecticut. Public transit agency: Northeast Illinois Regional Commuter Railroad Corporation-METRA; Urban area served[A]: Chicago, Illinois-Indiana. Public transit agency: Northern Indiana Commuter Transportation District; Urban area served[A]: Chicago, Illinois-Indiana. Public transit agency: Orange County Transportation Authority; Urban area served[A]: Los Angeles-Long Beach-Santa Ana, California. Public transit agency: Pace - Suburban Bus Division; Urban area served[A]: Chicago, Illinois-Indiana. Public transit agency: Port Authority Trans-Hudson Corporation-PATH; Urban area served[A]: New York, New York-New Jersey. Public transit agency: San Francisco Municipal Railway-MUNI; Urban area served[A]: San Francisco-Oakland, California. Public transit agency: Southern California Regional Rail Authority- Metrolink; Urban area served[A]: Los Angeles-Long Beach-Santa Ana, California. Public transit agency: Washington Metropolitan Area Transit Authority; Urban area served[A]: Washington, D.C., Virginia, Maryland. Source: GAO: [A] The urban area served is consistent with the information contained in the National Transit Database. [End of table] To assess the satisfaction of public transit agencies with federal security-related information-sharing efforts and related opportunities for improvement, in March and April 2010, we surveyed 96 of the of the 694 U.S. public transit agencies as of 2008, by ridership statistics, on their satisfaction with information-sharing efforts.[Footnote 58] The 96 public transit agencies surveyed represent about 91 percent of total 2008 ridership. For the purposes of this survey, we defined the six aspects of quality security-related information as (1) relevance (i.e., is the information sufficiently relevant to be of value to a public transit agency?); (2) validity (i.e., is the information accurate?); (3) timeliness (i.e., is information received in a timely manner?); (4) completeness (i.e., does the information contain all the necessary details?); (5) actionability (i.e., would the information allow a public transit agency to change its security posture, if such a change was warranted?); and (6) access/ease of use (i.e., is information available through this mechanism easy to obtain?). To develop the survey instrument, we conducted pretest interviews with four public transit agencies and obtained input from GAO experts. Out of the original population of 96 transit agencies, we received completed questionnaires from 80 respondents--a response rate of 83 percent; however, not all respondents provided answers to every question. The final instrument, reproduced in an e-supplement we are issuing concurrent with this report--GAO-10-896SP--displays the counts of responses received for each question. The questionnaire asked those public transit officials responsible for security operations to identify the modes of transportation they provide, the extent to which they house their own law enforcement component, the mechanisms they use to obtain security information, and their satisfaction with each of these mechanisms. While we surveyed 96 agencies of the largest U.S. public transit agencies, and thus our data are not subject to sampling error, the practical difficulties of conducting any survey may introduce other errors in our findings. We took steps to minimize errors of measurement, nonresponse, and data processing. In addition to the questionnaire development and testing activities described above, we made multiple follow-up attempts by E-mail and telephone to reduce the level of nonresponse throughout the survey period. Finally, analysis programs and other data analyses were independently verified. To further address this question, we assessed relevant documentation, including interagency agreements between TSA and FTA, as well as marketing materials on the Transportation Security Information Sharing and Analysis Center (TS-ISAC). We also interviewed American Public Transportation Association (APTA), Public Transportation Information Sharing and Analysis Center (PT-ISAC), TSA, FBI, FTA, and DHS Operations, Coordination, and Planning Directorate officials to discuss efforts to streamline existing information-sharing mechanisms, oversee the results of the PT-ISAC, and conduct outreach on various information-sharing mechanisms. We compared these efforts to internal control standards, as well as our previous work on the need to consolidate redundant information systems and target outreach efforts. In addition, we interviewed select public transit agencies and included questions in our Web-based survey of public transit agencies on the various information-sharing mechanisms available to them. To assess the extent to which DHS has identified goals for sharing information with public transit agencies and developed measures to gauge its progress in meeting those goals, we reviewed DHS's Annual Performance Report, TSA's Transportation Security Information Sharing Plan (TSISP), and available performance data and measures for fiscal years 2007 through 2010 related to information-sharing efforts with public transit agencies and compared them to leading management practices and our previous work on program assessments. We also interviewed relevant DHS and TSA officials to obtain information on their efforts to revise and develop performance measures and goals for this area of information sharing, as well as their efforts to obtain feedback from public transit agencies on their satisfaction with the security-related information they receive. In addition, we compared TSA's efforts to evaluate their information-sharing efforts with guidance on performance measurement contained in our previous reports. We conducted this performance audit from August 2009 through September 2010 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. [End of section] Appendix II: National Strategies, Plans, and Reports Designed to Enhance Information Sharing: Since the terrorist attacks on September 11, 2001, the federal government has developed strategies to enhance the sharing of terrorism-related information among federal, state, local, and tribal agencies, and the private sector. These strategies include the following: * National Strategy for Information Sharing: Issued in October 2007, this strategy identifies the federal government's information sharing responsibilities. These responsibilities include gathering and documenting the information that state, local, and tribal agencies need to enhance their situational awareness of terrorist threats. The strategy also calls for authorities at all levels of government to work together to obtain a common understanding of the information needed to prevent, deter, and respond to terrorist attacks. Specifically, the strategy discusses the need to improve the two-way sharing of terrorism-related information on incidents, threats, consequences, and vulnerabilities, including enhancing the quantity and quality of specific, timely, and actionable information provided by the federal government to critical infrastructure sectors.[Footnote 59] * DHS Information Sharing Strategy: Issued in April 2008, this strategy describes the guiding principles for DHS's efforts to share information within the department, across the federal government, and with state, local, tribal, territorial, private sector, and international partners. Among other things, the strategy notes that DHS must take steps to ensure that the right information gets to the right people at the right time. The strategy also discusses the department's need to institute performance measures to provide an accurate assessment of the department's progress towards meeting its information-sharing goals. * The National Infrastructure Protection Plan (NIPP): Updated in 2009, the NIPP is intended to provide the framework for a coordinated national approach to address the full range of physical, cyber, and human threats and vulnerabilities that pose risks to the nation's critical infrastructure.[Footnote 60] Among other things, the NIPP names TSA as the primary federal agency responsible for coordinating critical infrastructure protection efforts within the transportation sector and emphasizes the importance and benefits of sharing security- related information with critical sector partners. * Transportation Security Information Sharing Plan (TSISP): Established by TSA in July 2008 pursuant to the 9/11 Commission Act and subsequently updated in December 2009.[Footnote 61] The stated purpose of the TSISP is to establish a foundation for sharing transportation security information between all entities that have a stake in protecting the nation's transportation system, including federal, state, local, and tribal agencies and governments, the private sector, and foreign partners. * Surface Transportation Security Priority Assessment: Issued in March 2010 by the Administration's Transborder Security Interagency Policy Committee, Surface Transportation Subcommittee. The study identified 10 issue areas to examine, obtained input from surface transportation sector stakeholders, and analyzed the responses to reach a consensus set of priorities and recommendations related to surface transportation. Among other things, the assessment included a recommendation that TSA collaborate with DHS and the Department of Transportation (DOT) to more effectively share transportation security information. [End of section] Appendix III: Public Transit Agencies' General Satisfaction with the 12 Most Frequently-Cited Information-Sharing Mechanisms: The table below illustrates, for the public transit agencies we surveyed, the general satisfaction along 6 quality dimensions with the 12 most frequently-cited information-sharing mechanisms.[Footnote 62] The quality dimensions rated for level of satisfaction were: relevance (i.e., is the information sufficiently relevant to be of value to a public transit agency?); validity (i.e., is the information accurate?); timeliness (i.e., is information received in a timely manner?); completeness (i.e., does the information contain all the necessary details?); actionability (i.e., would the information allow a public transit agency to change its security posture, if such a change was warranted?); and access/ease of use (i.e., is information available through this mechanism easy to obtain?). The numbers in parentheses below each mechanism represent the number of agencies in our survey that indicated they use this mechanism to receive security- related information. For each mechanism and quality dimension, the table indicates (1) the number of agencies that indicated they were either "very satisfied" or "somewhat satisfied" with the information they receive through the mechanism (or, in the case of "access/ease of use," the mechanism itself); (2) the total number of agencies that provided a response to the question; and (3) the percentage of responding agencies that were generally satisfied. The mechanisms are organized in the order they were presented in the survey. Table 9: Public Transit Agencies' Survey Responses Regarding Satisfaction with 12 Information-Sharing Mechanisms Along 6 Dimensions of Quality: Number and percentage of public transit agencies indicating general satisfaction along 6 quality dimensions[A]: Mechanism (number of agencies that use mechanism): PT-ISAC (49); Relevance: 37/49; (76%); Validity: 40/49; (82%); Timeliness: 36/49; (73%); Completeness: 35/49; (71%); Actionability: 30/49; (61%); Access/ease of use: 38/49; (78%); Overall general satisfaction: 37/49; (76%). Mechanism (number of agencies that use mechanism): HSIN (34)[B]; Relevance: 19/34; (56%); Validity: 19/34; (56%); Timeliness: 18/33; (55%); Completeness: 15/34; (44%); Actionability: 15/34; (44%); Access/ease of use: 16/34; (47%); Overall general satisfaction: 19/33; (58%). Mechanism (number of agencies that use mechanism): JTTF (53); Relevance: 38/45; (84%); Validity: 34/45 (76%); Timeliness: 32/45; (71%); Completeness: 34/45; (76%); Actionability: 30/44; (68%); Access/ease of use: 34/45; (76%); Overall general satisfaction: 34/44; (77%). Mechanism (number of agencies that use mechanism): Fusion Centers (39); Relevance: 30/34; (88%); Validity: 29/34; (85%); Timeliness: 27/34; (79%); Completeness: 26/34; (76%); Actionability: 23/34; (68%); Access/ease of use: 26/33; (79%); Overall general satisfaction: 27/34; (79%). Mechanism (number of agencies that use mechanism): Transportation Security Operations Center (TSOC) (41); Relevance: 27/36; (75%); Validity: 26/36; (72%); Timeliness: 21/36; (58%); Completeness: 21/36; (58%); Actionability: 22/35; (63%); Access/ease of use: 23/36; (64%); Overall general satisfaction: 22/36; (61%). Mechanism (number of agencies that use mechanism): Transit Security & Safety Roundtables (44); Relevance: 32/36; (89%); Validity: 32/36; (89%); Timeliness: 28/36; (78%); Completeness: 29/35; (83%); Actionability: 28/36; (78%); Access/ease of use: 31/35; (89%); Overall general satisfaction: 33/36; (92%). Mechanism (number of agencies that use mechanism): Other public transit systems (48); Relevance: 31/35; (89%); Validity: 31/35; (89%); Timeliness: 26/35; (74%); Completeness: 27/35; (77%); Actionability: 28/33; (85%); Access/ease of use: 26/34; (76%); Overall general satisfaction: 28/35; (80%). Mechanism (number of agencies that use mechanism): FTA E-mails (65); Relevance: 47/53; (89%); Validity: 48/53; (91%); Timeliness: 44/50; (88%); Completeness: 45/52; (87%); Actionability: 42/53; (79%); Access/ease of use: 44/52; (85%); Overall general satisfaction: 42/51; (82%). Mechanism (number of agencies that use mechanism): TSA E-mails (56); Relevance: 41/46; (89%); Validity: 40/45; (89%); Timeliness: 39/45; (87%); Completeness: 38/44; (86%); Actionability: 39/46; (85%); Access/ease of use: 38/45; (84%); Overall general satisfaction: 38/46; (83%). Mechanism (number of agencies that use mechanism): Industry association (e.g., APTA) (44); Relevance: 23/30; (77%); Validity: 23/30; (77%); Timeliness: 19/30; (63%); Completeness: 22/30; (73%); Actionability: 16/30; (53%); Access/ease of use: 21/30; (70%); Overall general satisfaction: 21/30; (70%). Mechanism (number of agencies that use mechanism): Regional information sharing mechanism (47); Relevance: 28/34; (82%); Validity: 29/34; (85%); Timeliness: 27/33; (82%); Completeness: 28/34; (82%); Actionability: 24/34; (71%); Access/ease of use: 30/34; (88%); Overall general satisfaction: 27/34; (79%). Mechanism (number of agencies that use mechanism): Regional emergency operations center (38); Relevance: 25/28; (89%); Validity: 25/27; (93%); Timeliness: 26/28; (93%); Completeness: 21/27; (78%); Actionability: 20/28; (71%); Access/ease of use: 23/28; (82%); Overall general satisfaction: 22/28; (79%). Source: GAO analysis of survey results. [A] We use the term generally satisfied to describe agencies that indicated they were either "very satisfied" or "somewhat satisfied" with the information they receive. Similarly, we use the term generally dissatisfied to describe agencies that indicated they were either "very dissatisfied" or "somewhat dissatisfied" with the information they receive. [B] For HSIN, the number in parentheses represents the 34 agencies that indicated they had log-in access to HSIN and had not lost or forgotten their password. Of these 34 agencies, 17 indicated they access the system less than once a month to obtain security-related information. [End of table] [End of section] Appendix IV: Comments from the Department of Homeland Security: U.S. Department of Homeland Security: Washington, DC 20528: September 15, 2010: Stephen M. Lord: Director, Homeland Security and Justice: 441 G Street, NW: U.S. Government Accountability Office: Washington, DC 20548: Dear Mr. Lord: RE: Response to Draft Report GAO-10-895, Public Security Information Sharing: DHS Could Improve Information Sharing Through Streamlining and Increased Outreach: Thank you for the opportunity to review and comment on the Government Accountability Office's (GAO) draft report referenced above (Job Code 440815). The Department of Homeland Security (DHS) concurs with the five recommendations in the draft report. DHS and the Transportation Security Administration (TSA) value GAO's comprehensive review of efforts in addressing transit and passenger rail security, and we intend to immediately implement its recommendations. We appreciate the professionalism demonstrated by GAO's team members in conducting this review. TSA and DHS also appreciate GAO's finding that our stakeholders are generally satisfied with the existing information sharing efforts. The Implementing Recommendations of the 9/11 Commission Act of 2007 highlighted the importance of improving information sharing efforts and provided additional tools to achieve this. TSA funding for the Public Transportation Information Sharing and Analysis Center (PT- ISAC) will allow for broader use of the ISAC in this effort and will provide the Sector Coordinating Council (SCC)/Government Coordinating Council (GCC) Information Sharing Working Group an opportunity to shape a more effective program and outcome-oriented metrics. The progress of the existing information sharing program to date has been achieved through effective public-private partnerships in the mass transit and passenger rail mode and TSA's close coordination with other Federal agencies, particularly the Department of Transportation/Federal Transit Authority and the Department of Homeland Security ”Infrastructure Protection. The Mass Transit SCC has also played a significant role in strengthening information sharing, and we believe the SCC will continue its efforts. The combined efforts of these organizations will produce an enhanced information sharing program. TSA looks forward to implementing plans developed with its partners to further integrate intelligence information and to conduct operational pilots of a daily intelligence summary. We offer the following responses to the recommendations: Recommendation I: To help strengthen information sharing with public transit agencies, GAO recommends that the Secretary of Homeland Security direct the Assistant Secretary for the Transportation Security Administration in coordination with FTA and public transit agencies establish timeframes for the GCC/SCC Information Sharing Working Group to develop options for improving information sharing to public transit agencies and complete this effort, including the Working Group's efforts to: * Assess opportunities to streamline existing information sharing mechanisms that target similar user groups with similar information to reduce overlap, where appropriate; and; * Conduct targeted outreach efforts to increase awareness of the PT- ISAC and HSIN among agencies that are not currently using or aware of these systems. Response: DHS concurs with this recommendation. TSA continues to work with members of the Information Sharing Working Group to identify options on how best to streamline information flow. The working group has identified at least one operating model that appears to match the needs of both the stakeholders and those who produce these products. This particular model would "push out" periodic two page summaries to the stakeholders and also post them on appropriate websites. A library would house the principle documents from which the summaries are taken. TSA is currently taking steps to improve targeted outreach through collaboration of the Surface Transportation ISAC (ST-ISAC) and the PT- ISAC in the development of periodic intelligence summaries. ST-ISAC information on the freight rail community's threat posture will be provided to both the mass transit and passenger rail communities through these intelligence summaries. As passenger trains run on freight rail tracks, this represents a significant security information sharing expansion. TSA will work with both ISACs as well as with DHS to ensure further outreach is conducted to these stakeholder communities and that additional capabilities are approved and incorporated into the Homeland Security Information Network (HSIN) portal. TSA Mass Transit and Passenger Rail Division will also designate a specific point of contact to oversee this activity. In the end, it is the stakeholders who will determine which information system fits their needs. Therefore, it is incumbent upon the government entities to stay connected to the stakeholders and their concerns. The Transit Policing and Security Peer Advisory Group (PAG) and the Mass Transit and Passenger Rail GCCISCC components of the mode will play critical roles in this effort. Recommendation 2: To help ensure that the PT-ISAC is meeting its objectives for sharing security-related information with public transit agencies, GAO recommends that the Secretaries of Homeland Security and Transportation direct the Assistant Secretary of Transportation Security Administration and Administrator of the Federal Transit Administration to take the following action: * Take steps to ensure the PT-ISAC fulfills its responsibilities and completes agreed-upon responsibilities and tasks. Response: DHS concurs with this recommendation. The purpose for including HSIN-PT content management and the other elements currently in the contract with APTA/PT-ISAC was to fill gaps in the information sharing process used by the mass transit and passenger rail community. TSA's intention in doing this was to use all the tools available to establish an effective information sharing regime and organize the flow of information in such a way as to maximize the overall efficiency.TSA intends to ensure compliance with the contract elements by phasing in PT-ISAC contributions and requirements to achieve maximum effectiveness. Our goal is to maximize the PT-ISAC's role in information sharing and make them an integral part of this program. The elements contained in the PT-ISAC contract were designed to support this development and long- term vision. Recommendation 3: To help strengthen DHS's efforts to share security- related information with public transit agencies, GAO recommends that the Secretary of Homeland Security take the following action: * Take steps to ensure that public transit agencies can access and readily utilize HSIN and that the HSIN-PT sub-portal contains security- related information that is of value to public transit agencies. Response: DHS concurs with this recommendation. The HSIN website contains important information for all critical sectors. An effective, easy to use, well populated HSIN-PT sub portal enhances the amount of critical information that is shared (and can be shared) with the transit and passenger rail stakeholder community. We support changes to the HSIN website and intensification of efforts to expand use of this important Government site for the broader range of transit and passenger rail agencies. In Fiscal Year 2010, the HSIN Program increased Outreach efforts five-fold to raise the awareness of HSIN through a targeted marketing strategy. The Outreach Team implemented a HSIN State and Local Mission Integration program by placing team members in key regional locations throughout the country and arranging speaking engagements for key HSIN leadership members at national and regional conferences. The HSIN Program's refined requirements management process and operator representation on the HSIN Mission Operators Committee (MOC) governance board will ensure that Public Transit Sector requirements are assessed, prioritized, and implemented. Stakeholders provided generally positive responses regarding overall information sharing in the mass transit and passenger rail area, and DHS and TSA support further improvements to inform public transit agencies regarding the threats that exist and mitigation measures to take to protect the traveling public. According to the DHS Office of Infrastructure Protection, July 2010 HSIN-CS User Statistics data sheet, Mass Transit and Passenger Rail is one of the most active users of HSIN among the transportation modes and that use appears to be expanding. Recommendation 4: To help strengthen DIFIS's efforts to share security- related information with public transit agencies, GAO recommends that the Secretary of Homeland Security take the following action: * Once the SCC/GCC Information Sharing Working Group has developed options for improving information sharing with public transit agencies, establish timeframe for developing goals and related outcome- oriented measures specific to the PT-ISAC, HSIN-PT, and TS-ISAC. Response: DHS concurs with this recommendation. Developing outcome-oriented metrics for information sharing is an important element in establishing a program that has continuous improvement as one of its goals. TSA will work with DHS, APTA and the PT-ISAC to develop a series of goals and measures to assess effectiveness. Such metrics can be expected to evolve and improve over time as systematic improvements are made. Feedback will be an important part of this effort. Updates to the HSIN platform will enable DHS to efficiently capture usage measures. Once we have developed a set of measures, we will share them with our stakeholder groups such as the PAG and the Mass Transit SCC to obtain their comments. Recommendation 5: To help strengthen DHS's efforts to share security- related information with public transit agencies, GAO recommends that the Secretary of Homeland Security take the following action: * Develop a process for systematically gathering feedback on public transit agencies' satisfaction with the PT-ISAC and HSIN-PT. Response: DHS concurs with this recommendation. The TS-ISAC currently includes a survey on the materials posted and distributed. This survey will continue to be used with the stakeholders. The Mass Transit and Passenger Rail Security Awareness Messages also contain information about HSIN-PT access and will incorporate a feedback mechanism similar to that of the TS-ISACs. Designing additional stakeholder feedback mechanisms will require collaboration between TSA, DHS, and DOT as well as with the transit industry stakeholders. The positive stakeholder feedback provided by GAO for this report has set a standard that we will strive to continue. TSA will do its part in ensuring stakeholder feedback mechanisms are in place to collect the important thoughts and comments of those we serve. Updates to the HSIN platform will enable DHS to efficiently capture user feedback. Once again, thank you for the opportunity to comment on this draft report. We look forward to working with you on future homeland security issues. Sincerely, Signed by: Jerald E. Levine: Director: Departmental GAO/OIG Liaison Office: [End of section] Appendix V: GAO Contact and Staff Acknowledgments: GAO Contact: Stephen M. Lord, (202) 512-4379: Acknowledgments: In addition to the contact named above, Jessica Lucas-Judy, Assistant Director, managed this assignment. Vanessa Dillard, Jeff C. Jensen, Nancy Meyer, Octavia Parks, and Meg Ullengren made significant contributions to the work. Tracey King provided significant legal support and analysis. Stanley J. Kostyla assisted with design and methodology. Carl Ramirez and Joanna Chan assisted with the survey design, implementation, and data analysis. Christopher Currie, Lara Miklozek, and Debbie Sebastian provided assistance in report preparation. Tina Cheng and Robert Robinson developed the report graphic. [End of section] Footnotes: [1] A passenger trip is defined as the number of passengers who board public transportation vehicles. Passengers are counted each time they board vehicles no matter how many vehicles they use to travel from their origin to their destination. Ridership data were reported by the American Public Transportation Association (APTA) for calendar year 2009. This figure does not include those passengers who rode passenger ferries during calendar year 2009. [2] For the purposes of this report, we define security-related information as information that provides: (1) details on various security threats, including a terrorist attack; terrorist, cyber, and technical threats, or other security incident or suspicious activity pertaining to a specific entity or industry; (2) analysis of the threat and instructions and recommendations on security measures an entity should take to protect its people and resources from a terrorist attack, threat, or other security incident; (3) awareness of the threat environment, notably capabilities, tactics, and techniques; (4) awareness of system vulnerabilities and consequences of a terrorist attack or other security incident; or (5) U.S. and international security practices and lessons learned. TSA and APTA both agreed with this definition. [3] See Pub. L. No. 107-296, § 201, 116 Stat. 2135, 2145-49 (2002); Pub. L. No. 110-53, title V, 121 Stat. 266, 306-35 (2007). Among other things, the 9/11 Commission Act mandates that DHS require all public transit agencies considered to be high risk to participate in the PT- ISAC and encourage all other transit agencies to use it. [4] For additional information on the strategies, plans, and reports designed to enhance the sharing of terrorism-related information among federal, state, local, and tribal agencies, and the private sector, see appendix II. [5] APTA's members serve more than 90 percent of persons using public transportation in the United States and Canada. APTA is also responsible for setting policy, directing activity, validating membership, and advocating for the value of the PT-ISAC. [6] The PT-ISAC is funded by the federal government through a cooperative agreement with APTA. The 9/11 Commission Act requires DHS to fund the PT-ISAC. However, because FTA already had a process in place to provide funds to the PT-ISAC, TSA signed an interagency agreement with FTA to reimburse its PT-ISAC expenses. The TSA/FTA interagency agreement also contained several tasks for the PT-ISAC, including managing the content, controlling access, enhancing the user- friendliness of the public transit subportal on the Homeland Security Information Network (HSIN-PT), and providing TSA with quarterly operational and financial reports. APTA agreed to fulfill these additional responsibilities by signing its cooperative agreement with FTA. In 2009, DHS provided $600,000 for the PT-ISAC to operate for a period of 18 months. [7] See, for example, GAO, Information Sharing: Federal Agencies Are Sharing Border and Terrorism Information with Local and Tribal Law Enforcement Agencies, but Additional Efforts Are Needed, [hyperlink, http://www.gao.gov/products/GAO-10-41] (Washington, D.C: Dec. 2009), Information Sharing: The Federal Government Needs to Establish Policies and Processes for Sharing Terrorism-Related and Sensitive but Unclassified Information, [hyperlink, http://www.gao.gov/products/GAO-06-385] (Washington, D.C.: Mar. 2006), and Information Sharing Environment: Definition of the Results to Be Achieved in Improving Terrorism-Related Information Sharing Is Needed to Guide Implementation and Assess Progress, [hyperlink, http://www.gao.gov/products/GAO-08-492] (Washington, D.C.: June 2008). [8] GAO, High Risk Series: An Update, [hyperlink, http://www.gao.gov/products/GAO-09-271] (Washington, D.C.: Jan. 2009). [9] Pub. L. No. 110-53, § 1410(c), 121 Stat. 266, 413 (2007). [10] We did not include Amtrak in the scope of this review because federal transportation law excludes Amtrak in its definition of public transportation. 49 U.S.C. § 5302. [11] The total number of public transit agencies reflects those agencies that reported data to the National Transit Database in 2008. We surveyed 96 of the top 100 agencies as measured by fiscal year 2008 ridership. We omitted two agencies after learning these two entities are each comprised of multiple smaller transit agencies that, for ease of reporting, consolidate their annual ridership totals in the National Transit Database. In addition, we omitted two other agencies after learning that the security points-of-contact at these two agencies were also responsible for security at two other top-100 agencies and consequently already received our survey. [12] We developed these six dimensions of quality in consultation with GAO methodologists as well as public transit agency officials during survey pretests. [13] See GAO, Executive Guide: Effectively Implementing the Government Performance and Results Act, [hyperlink, http://www.gao.gov/products/GAO/GGD-96-118] (Washington, D.C.: June 1996). [14] GAO, Highway Infrastructure: Federal Efforts to Strengthen Security Should Be Better Coordinated and Targeted on the Nation's Most Critical Highway Infrastructure, [hyperlink, http://www.gao.gov/products/GAO-09-57] (Washington, D.C.: Jan. 2009), Defense Logistics: Improving Customer Feedback Program Could Enhance DLA's Delivery of Services, [hyperlink, http://www.gao.gov/products/GAO-02-776] (Washington, D.C.: Sept. 2002). [15] See Pub. L. No. 107-296, § 102(c), 116 Stat. 2135, 2143 (2002). The Homeland Security Act also transferred TSA from DOT to DHS. [16] Aviation and Transportation Security Act, Pub. L. No. 107-71, § 101(a), 115 Stat. 597 (2001). [17] Sector-specific agencies are the federal departments or agencies responsible for infrastructure protection activities in a designated critical infrastructure sector or key resources category. [18] According to DHS, HSIN offers a number of capabilities, including 24/7 access, document libraries, incident reporting, situational awareness and analysis, and discussion boards. [19] Other HSIN communities of interest include, but are not limited to: Continuity of Operations, Federal Department Agency Planning, and International. [20] There are 18 critical infrastructure sectors, including Agriculture and Food; Banking and Finance; Chemical; Commercial Facilities; Communications; Critical Manufacturing; Dams; Defense Industrial Base; Emergency Services; Energy; Government Facilities; Information Technology; National Monuments and Icons; Nuclear Reactors, Materials and Waste; Postal and Shipping; Public Health and Healthcare; Transportation Systems; and Water. The HSIN-CS portal contains subportals, including the TS-ISAC and HSIN-PT. [21] In figure 1, the category "regional/local information sharing mechanisms" includes both "regional/state/local information sharing mechanism" and "regional/state/local emergency operations center," as each was identified as a source of security-related information by over 40 percent of survey respondents. [22] We included six other mechanisms in our survey that were used by less than 40 percent of public transit agencies. These mechanisms were Law Enforcement Online, DHS Protective Security Advisors, the National Open Source Center, the Federal Protective Service portal, the Regional Information Sharing System-Automated Trusted Information Exchange, and the Transportation Information Sharing System. [23] JTTFs are small groups of trained, locally based investigators, analysts, linguists, and other specialists from U.S. law enforcement and intelligence agencies. [24] According to TSA, the major functions of the TS-ISAC include: (1) dissemination of TSA-OI products; (2) e-mail alerts when new information is available on the site; (3) repository of transportation security information; and (4) collaboration with stakeholders. The TS- ISAC was not fully implemented when we conducted our electronic survey of public transit agencies, and therefore data were not collected on this mechanism. [25] According to DHS IP, HSIN-PT users are automatically users of the TS-ISAC, as well as HSIN-CS. [26] Although 80 public transit agencies responded to our survey, not all respondents provided answers to every question. We use the term generally satisfied to describe agencies that indicated they were either "very satisfied" or "somewhat satisfied" with the information they receive. Similarly, we use the term generally dissatisfied to describe agencies that indicated they were either "very dissatisfied" or "somewhat dissatisfied" with the information they receive. [27] For the purpose of this report, large agencies are defined as agencies in our survey sample that had at least 99 million riders in fiscal year 2008. Large agencies had a mean ridership of 400 million in fiscal year 2008, with a range of 99.6 million to 3.34 billion. Midsized agencies are defined as agencies in our survey sample for which fiscal year 2008 ridership was less than 99 million. Midsized agencies had a mean ridership of 29.0 million in fiscal year 2008, with a range of 9.85 million to 87.2 million. We did not survey small agencies (i.e., agencies with less than 9.85 million riders in fiscal year 2008), so they are not included in our analysis. [28] Transit Security and Safety Roundtables are generally open to the nation's largest mass transit and passenger rail agencies. As such, not all of the agencies we surveyed had access to these meetings. [29] "Cross-sector information" is information that directly pertains to (1) critical infrastructure sectors outside of the transportation sector, or (2) other transportation modes within the transportation sector that also could be relevant to public transit agencies. [30] Two rail agencies did not provide a response to this question. [31] TSA developed the Transportation Systems Sector-Specific Plan in 2007 to document the process to be used in carrying out the national strategic priorities outlined in the NIPP and the National Strategy for Transportation Security, which outlines the federal government approach to secure the U.S. transportation system from terrorist threats and attacks. The Transportation Systems Sector-Specific Plan contains supporting modal implementation plans for each transportation mode--including mass transit and passenger rail, which provides information on current efforts to secure mass transit and passenger rail--as well as TSA's overall goals and objectives related to mass transit and passenger rail security. [32] GAO, Interagency Collaboration: Key Issues for Congressional Oversight of National Security Strategies, Organizations, Workforce, and Information Sharing, [hyperlink, http://www.gao.gov/products/GAO-09-904SP] (Washington, D.C.: Sept. 2009). [33] Formed in 2009, the SCC/GCC Information Sharing Working Group is focused on determining the security-related information needs of public transit agencies, reviewing the current information sharing mechanisms available to these agencies, and identifying services and a format to share information that would best serve their needs. This working group is to develop options for a security-related information sharing system that would be of value to public transit agencies. [34] The PT-ISAC also distributes other information products, including a 3 to 4 page cybersecurity information product based on open-source information and the DHS Daily Open-Source Infrastructure Report (which is also available through DHS's Web site). In addition, according to PT-ISAC officials, the PT-ISAC also offers its members a searchable library of government and private security documents, as well as access to a consolidated database of information and guidance pertaining to security technology products that are applicable to the public transit industry. [35] We will continue to review these information sharing mechanisms as part of our efforts to address a statutory mandate to identify federal programs and initiatives with duplicative goals and activities. We expect to issue the results of this additional work early in calendar year 2011. See Pub. L. No. 111-139, § 21, 124 Stat. 8, 29-30 (2010). [36] GAO, Standards for Internal Control in the Federal Government, [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1] (Washington, D.C.: Nov. 1999). [37] The PT-ISAC's HSIN-related responsibilities are described in a TSA/FTA interagency agreement. APTA agreed to fulfill these requirements by signing its cooperative agreement with FTA. [38] The PT-ISAC's reporting requirements are described in a TSA/FTA interagency agreement. As noted above, APTA agreed to fulfill these requirements by signing its cooperative agreement with FTA. [39] GAO, Food Stamp Program: Steps Have Been Taken to Increase Participation of Working Families, but Better Tracking of Efforts Is Needed, [hyperlink, http://www.gao.gov/products/GAO-04-346] (Washington, D.C.: March 2004); [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1]. [40] Our survey results are consistent with the information we obtained through interviews with public transit agencies. Although the majority of the 27 agencies we interviewed receive information from the PT-ISAC, 8 agencies said they do not receive information from this mechanism, and 5 had never heard of it. [41] According to DHS officials, some critical infrastructure sectors are more active on the HSIN platform than others, but the transportation sector, which includes public transit, historically has not been an active user of HSIN. These officials added that enhancing HSIN's value to transportation users by posting useful content and improving accessibility is necessary before outreach efforts can succeed. [42] DHS officials told us that if APTA and TSA do not increase their outreach efforts for the HSIN-PT subportal, the Office of Infrastructure Protection would assume this responsibility for them. [43] [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1]. [44] Although the majority of agencies we interviewed (19 of 27) did not indicate they had experienced problems accessing HSIN, this is in part because less than half (11 of 27) indicated they use the system to receive security-related information. [45] In our survey, 34 public transit agencies indicated they (1) have access to HSIN and (2) have not lost or forgotten their passwords. Of these 34 agencies, half (17) use the system less than once a month or never. [46] In October 2008, we reported that DHS needed to strengthen program management controls for HSIN Next Generation and recommended that the agency should, among other activities, staff the program office appropriately; ensure user requirements are gathered, analyzed, and validated; and identify key project risks and develop risk mitigation plans. We further recommended that DHS implement these controls before it moves HSIN users (such as public transit agencies) to HSIN Next Generation. As of July 2010, DHS had fully implemented one of our six recommendations (identifying staff roles and responsibilities) and had taken some action to implement the others. See GAO, Information Technology: Management Improvements Needed on the Department of Homeland Security's Next Generation Information Sharing System, [hyperlink, http://www.gao.gov/products/GAO-09-40], (Washington, D.C.: Oct. 2008). [47] Performance measures can be classified as output, process/input, or outcome oriented. Output measures focus on the quantity of direct products and services a program delivers. Process/input measures address the type or level of program activity an organization conducts and the resources used by the program. Outcome measures offer information on the results of the direct products and services a program has delivered. [48] As of July 2010, DHS I&A officials reported that they have updated their performance measures related to information sharing. However, I&A did not provide us with any additional details on these measures. [49] GAO, Aviation Security: A National Strategy and Other Actions Would Strengthen TSA's Efforts to Secure Commercial Airport Perimeters and Access Controls, [hyperlink, http://www.gao.gov/products/GAO-09-399] (Washington, D.C.: Sept. 2009). [50] For example, see GAO, Managing for Results: Enhancing Agency Use of Performance Information for Management Decision Making, [hyperlink, http://www.gao.gov/products/GAO-05-927] (Washington, D.C.: Sept. 2005); Program Evaluation: Studies Helped Agencies Measure or Explain Program Performance, [hyperlink, http://www.gao.gov/products/GAO/GGD- 00-204] (Washington, D.C.: Sept. 2000); Agency Performance Plans: Examples of Practices That Can Improve Usefulness to Decisionmakers, [hyperlink, http://www.gao.gov/products/GAO/GGD/AIMD-99-69] (Washington, D.C.: Feb. 1999); and Managing for Results: Strengthening Regulatory Agencies' Performance Management Practices, [hyperlink, http://www.gao.gov/products/GAO/GGD-00-10] (Washington, D.C.: Oct. 1999). [51] GAO, Homeland Security: Guidance and Standards Are Needed for Measuring Effectiveness of Agencies' Facility Protection Efforts, [hyperlink, http://www.gao.gov/products/GAO-06-612] (Washington, D.C.: May 2006). [52] According to APTA officials, the Information Sharing Working Group has focused its current efforts on improving the PT-ISAC's transportation security products, and, to date, has not focused on developing a performance measurement system for this mechanism. [53] TSA-OI officials stated that the focus of their information- sharing activities for the TS-ISAC is based on the information-sharing requirements in the 9/11 Commission Act. [54] [hyperlink, http://www.gao.gov/products/GAO-02-776]. [55] GAO, Information Sharing: Federal Agencies Are Sharing Border and Terrorism Information with Local and Tribal Law Enforcement Agencies, but Additional Efforts Are Needed, [hyperlink, http://www.gao.gov/products/GAO-10-41] (Washington, D.C.: Dec. 2009). [56] [hyperlink, http://www.gao.gov/products/GAO-02-776]. [57] We did not include Amtrak in the scope of this review because federal transportation law excludes Amtrak in its definition of public transportation. 49 U.S.C. § 5302. [58] The total number of public transit agencies reflects those agencies that reported data to the National Transit Database in 2008. We surveyed 96 of the top 100 agencies as measured by fiscal year 2008 ridership. We omitted two agencies after learning these two entities are each comprised of multiple smaller transit agencies that, for ease of reporting, consolidate their annual ridership totals in the National Transit Database. In addition, we omitted two other agencies after learning that the security points-of-contact at these two agencies were also responsible for security at two other top-100 agencies and consequently already received our survey. [59] There are 18 critical infrastructure sectors, including Agriculture and Food; Banking and Finance; Chemical; Commercial Facilities; Communications; Critical Manufacturing; Dams; Defense Industrial Base; Emergency Services; Energy; Government Facilities; Information Technology; National Monuments and Icons; Nuclear Reactors, Materials and Waste; Postal and Shipping; Public Health and Healthcare; Transportation Systems; and Water. [60] The first version of the NIPP was issued in June 2006. [61] The TSISP was established in accordance with section 1203 of the 9/11 Commission Act. Pub. L. No. 110-53, § 1203(a), 121 Stat. 266, 383- 85 (2007). According to the Transportation Security Administration Office of Intelligence (TSA-OI), the TSISP will be updated again by October 2010. [62] We use the term generally satisfied to describe agencies that indicated they were either "very satisfied" or "somewhat satisfied" with the information they receive. Similarly, we use the term generally dissatisfied to describe agencies that indicated they were either "very dissatisfied" or "somewhat dissatisfied" with the information they receive. [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Phone: The price of each GAO publication reflects GAO‘s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO‘s Web site, [hyperlink, http://www.gao.gov/ordering.htm]. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.