Maritime Security

Progress Made, but Further Actions Needed to Secure the Maritime Energy Supply Gao ID: GAO-11-883T August 24, 2011

The nation's economy and security are heavily dependent on oil, natural gas, and other energy commodities. Al-Qa'ida and other groups with malevolent intent have targeted energy tankers and offshore energy infrastructure because of their importance to the nation's economy and national security. The U.S. Coast Guard--a component of the Department of Homeland Security (DHS)--is the lead federal agency for maritime security, including the security of energy tankers and offshore energy infrastructure. The Federal Bureau of Investigation (FBI) also has responsibilities for preventing and responding to terrorist incidents. This testimony discusses the extent to which (1) the Coast Guard and the FBI have taken actions to address GAO's prior recommendations to prevent and respond to a terrorist incident involving energy tankers and (2) the Coast Guard has taken actions to assess the security risks to offshore energy infrastructure and related challenges. This testimony is based on products issued from December 2007 through March 2011 and recently completed work on the Coast Guard's actions to assess security risks. GAO reviewed documents from the Coast Guard's risk model and relevant laws, regulations, policies, and procedures; and interviewed Coast Guard officials.

The Coast Guard and the FBI have made progress implementing prior recommendations GAO made to enhance energy tanker security. In 2007, GAO made five recommendations to address challenges in ensuring the effectiveness of federal agencies' actions to protect energy tankers and implement response plans. The Coast Guard and the FBI have implemented two recommendations, specifically: (1) the Coast Guard, in coordination with U.S. Customs and Border Protection, developed protocols for facilitating the recovery and resumption of trade following a disruption to the maritime transportation system, and (2) the Coast Guard and the FBI participated in local port exercises that executed multiple response plans simultaneously. The Coast Guard has made progress on a third recommendation through work on a national strategy for the security of certain dangerous cargoes. It also plans to develop a resource allocation plan, starting in April 2012, which may help address the need to balance security responsibilities. However, the Coast Guard and the FBI have not yet taken action on a fourth recommendation to develop an operational plan to integrate the national spill and terrorism response plans. According to DHS, it plans to revise the National Response Framework, but no decision has been made regarding whether the separate response plans will be integrated. Also, DHS has not yet taken action on the final recommendation to develop explicit performance measures for emergency response capabilities and use them in risk-based analyses to set priorities for acquiring needed response resources. According to DHS, it is revising its emergency response grant programs, but does not have specific plans to develop performance measures as part of this effort. The Coast Guard has taken actions to assess the security risks to offshore energy infrastructure, which includes Outer Continental Shelf (OCS) facilities (facilities that are involved in producing oil or natural gas) and deepwater ports (facilities used to transfer oil and natural gas from tankers to shore), but improvements are needed. The Coast Guard has used its Maritime Security Risk Analysis Model (MSRAM) to examine the security risks to OCS facilities and deepwater ports. To do so, the Coast Guard has coordinated with the intelligence community and stakeholders, such as the Department of the Interior's Bureau of Ocean Energy Management, Regulation and Enforcement. However, the Coast Guard faces complex and technical challenges in assessing risks. For example, the Coast Guard does not have data on the ability of an OCS facility to withstand an attack. The Coast Guard generally recognizes these challenges and has actions underway to study or address them. Further, GAO determined that as of May 2011, the Coast Guard had not assessed security risks for 12 of the 50 security-regulated OCS facilities that are to be subjected to such assessments. Coast Guard officials later determined that they needed to add these OCS facilities to MSRAM for assessment and have completed the required assessments. However, while the list of security-regulated facilities may change each year based on factors such as production volume, the Coast Guard's current policies and procedures do not call for Coast Guard officials to provide an annual updated list of regulated OCS facilities to MSRAM analysts. Given the continuing threat to such offshore facilities, revising its procedures could help ensure that the Coast Guard carries out its risk assessment requirements for security-regulated OCS facilities. GAO is recommending that the Coast Guard revise policies and procedures to ensure its analysts receive the annual updated list of regulated offshore energy facilities to ensure risk assessments are conducted on those facilities. The Coast Guard concurred with this recommendation.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Stephen L. Caldwell Team: Government Accountability Office: Homeland Security and Justice Phone: (202) 512-9610


GAO-11-883T, Maritime Security: Progress Made, but Further Actions Needed to Secure the Maritime Energy Supply This is the accessible text file for GAO report number GAO-11-883T entitled 'Maritime Security: Progress Made, but Further Actions Needed to Secure the Maritime Energy Supply' which was released on August 24, 2011. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. United States Government Accountability Office: GAO: Testimony: Before the Subcommittee on Oversight, Investigations, and Management, Committee on Homeland Security, House of Representatives: For Release on Delivery: Expected at 10:00 a.m. CDT: Wednesday, August 24, 2011: Maritime Security: Progress Made, but Further Actions Needed to Secure the Maritime Energy Supply: Statement of Stephen L. Caldwell: Director: Homeland Security and Justice Issues: GAO-11-883T: GAO Highlights: Highlights of GAO-11-883T, a testimony before the Subcommittee on Oversight, Investigations, and Management; Committee on Homeland Security; House of Representatives. Why GAO Did This Study: The nation‘s economy and security are heavily dependent on oil, natural gas, and other energy commodities. Al-Qa‘ida and other groups with malevolent intent have targeted energy tankers and offshore energy infrastructure because of their importance to the nation‘s economy and national security. The U.S. Coast Guard”a component of the Department of Homeland Security (DHS)”is the lead federal agency for maritime security, including the security of energy tankers and offshore energy infrastructure. The Federal Bureau of Investigation (FBI) also has responsibilities for preventing and responding to terrorist incidents. This testimony discusses the extent to which (1) the Coast Guard and the FBI have taken actions to address GAO‘s prior recommendations to prevent and respond to a terrorist incident involving energy tankers and (2) the Coast Guard has taken actions to assess the security risks to offshore energy infrastructure and related challenges. This testimony is based on products issued from December 2007 through March 2011 and recently completed work on the Coast Guard‘s actions to assess security risks. GAO reviewed documents from the Coast Guard‘s risk model and relevant laws, regulations, policies, and procedures; and interviewed Coast Guard officials. What GAO Found: The Coast Guard and the FBI have made progress implementing prior recommendations GAO made to enhance energy tanker security. In 2007, GAO made five recommendations to address challenges in ensuring the effectiveness of federal agencies‘ actions to protect energy tankers and implement response plans. The Coast Guard and the FBI have implemented two recommendations, specifically: (1) the Coast Guard, in coordination with U.S. Customs and Border Protection, developed protocols for facilitating the recovery and resumption of trade following a disruption to the maritime transportation system, and (2) the Coast Guard and the FBI participated in local port exercises that executed multiple response plans simultaneously. The Coast Guard has made progress on a third recommendation through work on a national strategy for the security of certain dangerous cargoes. It also plans to develop a resource allocation plan, starting in April 2012, which may help address the need to balance security responsibilities. However, the Coast Guard and the FBI have not yet taken action on a fourth recommendation to develop an operational plan to integrate the national spill and terrorism response plans. According to DHS, it plans to revise the National Response Framework, but no decision has been made regarding whether the separate response plans will be integrated. Also, DHS has not yet taken action on the final recommendation to develop explicit performance measures for emergency response capabilities and use them in risk-based analyses to set priorities for acquiring needed response resources. According to DHS, it is revising its emergency response grant programs, but does not have specific plans to develop performance measures as part of this effort. The Coast Guard has taken actions to assess the security risks to offshore energy infrastructure, which includes Outer Continental Shelf (OCS) facilities (facilities that are involved in producing oil or natural gas) and deepwater ports (facilities used to transfer oil and natural gas from tankers to shore), but improvements are needed. The Coast Guard has used its Maritime Security Risk Analysis Model (MSRAM) to examine the security risks to OCS facilities and deepwater ports. To do so, the Coast Guard has coordinated with the intelligence community and stakeholders, such as the Department of the Interior‘s Bureau of Ocean Energy Management, Regulation and Enforcement. However, the Coast Guard faces complex and technical challenges in assessing risks. For example, the Coast Guard does not have data on the ability of an OCS facility to withstand an attack. The Coast Guard generally recognizes these challenges and has actions underway to study or address them. Further, GAO determined that as of May 2011, the Coast Guard had not assessed security risks for 12 of the 50 security-regulated OCS facilities that are to be subjected to such assessments. Coast Guard officials later determined that they needed to add these OCS facilities to MSRAM for assessment and have completed the required assessments. However, while the list of security- regulated facilities may change each year based on factors such as production volume, the Coast Guard‘s current policies and procedures do not call for Coast Guard officials to provide an annual updated list of regulated OCS facilities to MSRAM analysts. Given the continuing threat to such offshore facilities, revising its procedures could help ensure that the Coast Guard carries out its risk assessment requirements for security-regulated OCS facilities. What GAO Recommends: GAO is recommending that the Coast Guard revise policies and procedures to ensure its analysts receive the annual updated list of regulated offshore energy facilities to ensure risk assessments are conducted on those facilities. The Coast Guard concurred with this recommendation. View [hyperlink, http://www.gao.gov/products/GAO-11-883T] or key components. For more information, contact Stephen Caldwell at (202) 512-9610 or caldwells@gao.gov. [End of section] Chairman McCaul, Ranking Member Keating, and Members of the Subcommittee: [End of section] I am pleased to be here today to discuss federal efforts to ensure the security of energy tankers and the offshore energy infrastructure that produces, transports, or receives oil and natural gas. The nation's economy and security are heavily dependent on oil, natural gas, and other energy commodities. Further, it is fitting that today's hearing is in Houston because the city and the surrounding area play a central role in the maritime energy sector. Houston is home to hundreds of energy companies and many of these companies are involved in exploring for and producing oil and natural gas in the Gulf of Mexico and transporting it from sea to shore. In addition, energy tankers sail through the Houston Ship Channel, and major facilities for refining oil are located along or near the channel. Al-Qa'ida and other groups with malevolent intent continue to target energy tankers and offshore energy infrastructure because of their importance to the nation's economy and national security. In May 2011, the Department of Homeland Security (DHS) issued a press statement that intelligence information showed that throughout 2010 there was continuing interest by members of al-Qa'ida in targeting oil tankers and commercial oil infrastructure at sea. While a terrorist attack on energy tankers or offshore energy infrastructure has not occurred in the United States, other countries have experienced such attacks. Additionally, while it was not the result of an attack, the Deepwater Horizon explosion in April 2010 showed that the consequences of an incident on offshore energy infrastructure could be significant. The explosion resulted in 11 deaths, serious injuries, and the largest oil spill in the history of the United States. The response to the incident encountered numerous challenges, and by the time the well was sealed nearly 3 months later, over 4 million barrels of oil had spilled into the Gulf. The spill created significant environmental damage and had an adverse impact on workers and businesses, with an estimated cost to compensate for these damages totaling billions of dollars. The U.S. Coast Guard--a component of DHS--is the lead federal agency for maritime security, including security of energy tankers and offshore energy infrastructure. The FBI--an agency in the Department of Justice (DOJ)--shares responsibility with the Coast Guard for preventing and responding to terrorist incidents in the maritime environment, including incidents involving energy tankers. In December 2007, we issued a report that examined Coast Guard and FBI efforts to prevent and respond to an incident involving energy tankers and we made several recommendations to the Coast Guard and the FBI to improve efforts in these areas.[Footnote 1] My testimony today will address two main objectives: * the extent to which the Coast Guard and the FBI have taken actions to address our prior recommendations to prevent and respond to terrorist incidents involving energy tankers, and: * the extent to which the Coast Guard has taken actions to assess the security risks to offshore energy infrastructure and the challenges, if any, in conducting such assessments. My statement is based on our past work on energy tankers issued in December 2007 and recently completed work on actions the Coast Guard has taken to assess security risks in the maritime environment. [Footnote 2] To obtain information on the first objective, we reviewed our prior reports on energy tankers, and asked the Coast Guard and the FBI to provide us an update, along with supporting documentation, on any actions that they have taken to address our recommendations from the December 2007 report. To provide additional information on threats to energy tankers, we also reviewed our recent work on piracy. [Footnote 3] More detailed information on the scope and methodology used for our past reviews appears in those reports. To address the second objective, we interviewed officials in Coast Guard headquarters and field offices in New Orleans, Louisiana and Boston, Massachusetts because these officials were knowledgeable about how the Coast Guard uses the Maritime Security Risk Analysis Model (MSRAM)--a tool that the Coast Guard uses to assess the security risks to vessels and offshore energy infrastructure.[Footnote 4] Moreover, the New Orleans and Boston field offices are the only offices presently conducting assessments of offshore energy infrastructure. We also reviewed Coast Guard documents on MSRAM, such as Coast Guard guidance to its field units and the MSRAM training manual. In addition, we reviewed relevant laws and regulations, policies and procedures, and other documents related to security risk assessments. For example, we reviewed the DHS Quadrennial Review,[Footnote 5] the National Infrastructure Protection Plan,[Footnote 6] and a National Research Council report on risk assessments at DHS.[Footnote 7] We also reviewed our prior report on risk assessment efforts carried out by the Coast Guard.[Footnote 8] In addition, we compared the Coast Guard's policies and procedures regarding security actions with criteria in Standards for Internal Control in the Federal Government. [Footnote 9] Further, we interviewed representatives from two companies that together operate 18 of the 50 Outer Continental Shelf facilities, a type of offshore energy infrastructure, regulated for security in 2011. While the information obtained from these interviews is not generalizable to the offshore energy industry as a whole, it provided insights into owners' and operators' concerns regarding security and actions they have taken to address such concerns. This testimony concludes our work on Coast Guard efforts to assess security risks for offshore energy infrastructure.[Footnote 10] We conducted this performance audit from October 2010 through August 2011 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Background: The nation's economy and security are heavily dependent on oil, natural gas, and other energy commodities. Nearly half of the nation's oil is transported from overseas by tankers. For example, about 49 percent of the nation's crude oil supply--one of the main sources of gasoline, jet fuel, heating oil, and many other petroleum products-- was transported by tanker into the United States in 2009.[Footnote 11] The remaining oil and natural gas used in the United States comes from Canada by pipeline or is produced from domestic sources in areas such as offshore facilities in the Gulf of Mexico. With regard to these domestic sources, the area of federal jurisdiction--called the Outer Continental Shelf (OCS)[Footnote 12]--contains an estimated 85 million barrels of oil, more than all onshore resources and those in shallower state waters combined.[Footnote 13] In addition, the Louisiana Offshore Oil Port (LOOP), a deepwater port, is responsible for transporting about 10 percent of imported oil into the United States. Federal Agency Roles: As the lead federal agency for maritime security, the Coast Guard seeks to mitigate many kinds of security challenges in the maritime environment. Doing so is a key part of its overall security mission and a starting point for identifying security gaps and taking actions to address them. Carrying out these responsibilities is a difficult and challenging task because energy tankers often depart from foreign ports and are registered in countries other than the United States, which means the United States has limited authority to oversee the security of such vessels until they enter U.S. waters. Offshore energy infrastructure also presents its own set of security challenges because some of this infrastructure is located many miles from shore. The FBI shares responsibility with the Coast Guard for preventing and responding to terrorist incidents in the maritime environment, including incidents involving energy tankers. Risks to Energy Tankers: Energy tankers face risks from various types of attack. We identified three primary types of attack methods against energy tankers in our 2007 report, including suicide attacks, armed assaults by terrorists or armed bands, and launching a "standoff" missile attack using a rocket or some other weapon fired from a distance. In recent years, we have issued reports that discussed risks energy tankers face from terrorist attacks and attacks from other criminals, such as pirates. Terrorists have attempted--and in some cases carried out--attacks on energy tankers since September 11, 2001. To date, these attacks have included attempts to damage tankers or their related infrastructure at overseas ports. For example, in 2002, terrorists conducted a suicide boat attack against the French supertanker Limburg off the coast of Yemen, and in 2010, an incident involving another supertanker, the M/V M. Star, in the Strait of Hormuz is suspected to have been a terrorist attack. Our work on energy tankers identified three main places in which tankers may be at risk of an attack: (1) at foreign ports; (2) in transit, especially at narrow channels, or chokepoints; and (3) at U.S. ports. For example, foreign ports, where commodities are loaded onto tankers, may vary in their levels of security, and the Coast Guard is limited in the degree to which it can bring about improvements abroad when security is substandard, in part because its activities are limited by conditions set by host nations. In addition, while tankers are in transit, they face risks because they travel on direct routes that are known in advance and, for part of their journey, they may have to travel through waters that do not allow them to maneuver away from possible attacks. According to the Energy Information Administration, chokepoints along a route make tankers susceptible to attacks. Further, tankers remain at risk upon arrival in the United States because of the inherent risks to port facilities. For example, port facilities are generally accessible by land and sea and are sprawling installations often close to population centers. Beyond the relatively rare threat of terrorist attacks against tankers, the threat of piracy has become relatively common.[Footnote 14] In particular, piracy threatens tankers transiting one of the world's busiest shipping lanes near key energy corridors and the route through the Suez Canal. The vast areas at risk for piracy off the Horn of Africa, combined with the small number of military ships available for patrolling them, make protecting energy tankers difficult. According to the International Maritime Bureau, 30 percent (490 of 1,650) of vessels reporting pirate attacks worldwide from 2006 through 2010 were identified as tankers.[Footnote 15] See table 1 for a summary of tankers attacked by pirates during 2006 through 2010. Table 1: Number of Tankers Attacked by Pirates, 2006 - 2010: Type of commodity transported: Bitumen[A]; 2006: 0; 2007: 1; 2008: 0; 2009: 2; 2010: 2. Type of commodity transported: Chemical/Product[B]; 2006: 35; 2007: 52; 2008: 55; 2009: 69; 2010: 96. Type of commodity transported: Crude Oil; 2006: 9; 2007: 25; 2008: 30; 2009: 41; 2010: 43. Type of commodity transported: Liquefied Natural Gas; 2006: 0; 2007: 1; 2008: 0; 2009: 1; 2010: 1. Type of commodity transported: Liquefied Petroleum Gas; 2006: 4; 2007: 5; 2008: 6; 2009: 5; 2010: 7. Type of commodity transported: Totals; 2006: 48; 2007: 84; 2008: 91; 2009: 118; 2010: 149. Source: International Maritime Bureau, Piracy and Armed Robbery Against Ships Annual Report (United Kingdom, 2010): [A] Bitumen is a heavy black viscous oil often used in paving materials and sealants. [B] This category includes tankers that transport chemicals or oil products other than crude oil. [End of table] As shown in the table, pirate attacks against tankers have tripled in the last 5 years, and the incidence of piracy against tankers continues to rise. From January through June 2011, 100 tankers were attacked, an increase of 37 percent compared to tankers attacked from January through June 2010. Figure 1 shows one of the recent suspected pirate attacks. In addition, tankers are fetching increasing ransom demands from Somali pirates. Media reports indicate a steady increase in ransoms for tankers, from $3 million in January 2009 for the Saudi tanker Sirius Star, to $9.5 million in November 2010 for the South Korean tanker Samho Dream, to $12 million in June 2011 for the Kuwaiti tanker MV Zirku. The U.S. Maritime Administration and the Coast Guard have issued guidance for commercial vessels to stay 200 miles away from the Somali coast. However, pirates have adapted and increased their capability to attack and hijack vessels to more than 1,000 miles from Somalia using mother ships, from which they launch smaller boats to conduct the attacks.[Footnote 16] To address the growing concern over piracy, the Coast Guard has issued a directive with guidelines for U.S. vessels operating in high-risk waters. This directive provides vessel owners and operators with direction for responding to emerging security risks. Figure 1: Sailors from the U.S. Navy's USS Philippine Sea Rescue Crew of the Tanker VLCC Brilliante Virtuoso in Response to a Suspected Attack by Pirates, June 2011: [Refer to PDF for image: photograph] Source: U.S. Navy. [End of figure] Risks to Offshore Energy Infrastructure: Offshore energy infrastructure also faces risks from various types of attacks. For example, in 2004, a terrorist attacked an offshore oil terminal in Iraq using speedboats packed with explosives, killing two U.S. Navy sailors and a U.S. Coast Guardsman. Potential attack methods against offshore energy infrastructure identified by the Coast Guard or owners and operators include crashing an aircraft into it; using a submarine vessel, diver, or other means of attacking it underwater; ramming it with a vessel; and sabotage by an employee. Offshore energy infrastructure may face security risks because this infrastructure is located in open waters and generally many miles away from Coast Guard assets and personnel. In addition to our work on energy tankers, we have recently completed work involving Coast Guard efforts to assess security risks and ensure the security of offshore energy infrastructure. Specifically, our work focused on two main types of offshore energy infrastructure that the Coast Guard oversees for security. The first type are facilities that operate on the OCS and are generally described as facilities temporarily or permanently attached to the subsoil or seabed of the OCS that engage in exploration, development, or production of oil, natural gas, or mineral resources.[Footnote 17] As of September 2010, there were about 3,900 such facilities, and if a facility of this type meets or exceeds any one of three thresholds for production or personnel, it is subject to 33 C.F.R. part 106 security requirements. [Footnote 18] In this testimony, we focus on the 50 facilities that, in 2011, are regulated for security because they meet or exceed the threshold criteria. We refer to these security-regulated facilities as OCS facilities. The second type of offshore energy infrastructure are deepwater ports, which are fixed or floating manmade structures used or intended for use as a port or terminal for the transportation, storage, or handling of oil or natural gas to any state and includes the transportation of oil or natural gas from the United States' OCS. [Footnote 19] There are currently four licensed deepwater ports--two in the Gulf of Mexico and two in Massachusetts Bay.[Footnote 20] Unlike OCS facilities, which are involved in the production of oil or natural gas, deepwater ports enable tankers to offload oil or liquefied natural gas for transport to land by underwater pipelines. Progress Made Addressing Our Recommendations, but Additional Actions Could Help Improve Tanker Security: In 2007, we assessed Coast Guard and FBI efforts to ensure the security of energy tankers and respond to terrorist incidents involving energy tankers.[Footnote 21] We found that actions were being taken, internationally and domestically, to protect tankers and port facilities at which tankers would be present. For example, the Coast Guard visits foreign exporting ports to assess the effectiveness of the anti-terrorism measures in place. Additionally, port stakeholders in the United States have taken steps to address vulnerabilities at domestic ports. For example, the Houston Ship Channel Security District is a public-private partnership that was established to increase preparedness and response capabilities with the goal of improving security and safety for facilities, employees, and communities surrounding the Houston Ship Channel. The security district has installed technology, such as night vision and motion- activated detection equipment, and conducts patrols on land and in the water. However, we also reported on challenges that remained in (1) making federal agencies' protective actions more effective and (2) implementing plans for a response to an attack, if a terrorist attack were to succeed despite the protective measures in place. We made five recommendations in our 2007 report, three of which were directed to the Secretary of Homeland Security and two of which were directed jointly to the Secretary of Homeland Security and the Attorney General. The departments concurred or partially concurred with all of the recommendations. The Coast Guard and the FBI have made progress in implementing these recommendations--two have been implemented, and the Coast Guard is in the process of implementing a third--but actions have not yet been taken to address the remaining two recommendations. See table 2 for a summary of our findings, recommendations, and the current status of agency efforts to implement our recommendations. Table 2: Status of GAO Recommendations on Tanker Security from GAO-08- 141: Findings: Resource allocation. Based on Coast Guard records, we found that Coast Guard field units in several energy-related ports had been unable to accomplish many of the port security responsibilities called for in Coast Guard guidance. According to the data we obtained and our discussions with field unit officials, we determined that resource shortfalls were the primary reasons for not meeting these responsibilities. Furthermore, the Coast Guard had not yet developed a plan for addressing new liquefied natural gas (LNG) security resource demands; Recommendation and Status: Recommendation: We recommended that the Coast Guard develop a national resource allocation plan that would balance the need to meet new LNG security responsibilities with existing security responsibilities and other Coast Guard missions; Status: In progress. The Coast Guard has begun work on a national strategy for reducing the maritime security risks present in the bulk transportation and transfer of certain dangerous cargoes, including LNG. Coast Guard officials expect to finalize the strategy in April 2012 at which point they expect to develop a resource allocation plan to implement the strategy. In the interim, the Coast Guard has published guidance to clarify the timing and scope of the process that is necessary to ensure full consideration is given to safety and security of the port, the facility, and the vessels transporting LNG. Findings: Guidance for helping to mitigate economic consequences. We reported that the economic consequences of a terrorist attack on a tanker could be significant, particularly if one or more ports are closed. We identified some ports that, on their own initiative, were incorporating economic recovery considerations into their port-level plans, but at the time of our review in 2007, there was no national- level guidance for use by local ports; Recommendation and Status: Recommendation: We recommended that the Coast Guard develop guidance that ports could use to plan for helping to mitigate economic consequences, particularly in the case of port closures; Status: Implemented. The Coast Guard and U.S. Customs and Border Protection (CBP) have developed Joint Protocols for the Expeditious Recovery of Trade. These protocols establish a communications process and describe how the Coast Guard and CBP will coordinate with other federal agencies and the maritime industry to facilitate recovery and resumption of trade following an event that causes a major disruption to the maritime transportation system. Findings: Integration of spill and terrorism response at the national level. We found that while national-and port-level plans exist to address spill response or terrorism response, federal agencies and ports could face challenges in using them effectively. We reported that the separate spill and terrorism response plans should be integrated for responding to an attack on an energy commodities tanker; Recommendation and Status: Recommendation: We recommended that the Coast Guard and the FBI coordinate at the national level to help ensure that a detailed operational plan be developed that integrates the different spill and terrorism sections of the National Response Plan; Status: Not implemented. The different spill and terrorism response sections of the National Response Plan remain separate annexes in the renamed National Response Framework. According to the Coast Guard, the National Response Framework is currently under revision, but no decision has been made regarding the spill and terrorism response annexes. Pending that decision, the FBI has not taken any action to implement this recommendation. Findings: Integration of spill and terrorism response at the local level. In addition to the need for operational plans as noted above, we reported that agencies should conduct joint exercises that simulate an attack and the agencies' responses. Without such exercises, it would be questionable whether joint Coast Guard and FBI activities would proceed as planned; Recommendation and Status: Recommendation: We recommended that the Coast Guard and FBI coordinate at the local level to help ensure that spill and terrorism response activities are integrated for the best possible response by maximizing the integration of spill and terrorism response planning and exercises at ports that receive energy commodities where attacks on tankers pose a significant threat; Status: Implemented. In April 2008, the Coast Guard updated guidance which states that the ability to simultaneously execute multiple plans, including federal, state, and local response and recovery plans, should be part of an overall exercise and preparedness program. In accordance with this guidance, the Coast Guard, along with the FBI and other stakeholders, has conducted exercises that address an integrated spill and terrorism response. Findings: Performance measures for emergency response. We found that some ports had reported difficulty in securing response resources to carry out planned actions and decisions about the need for more response capabilities were hindered by a lack of performance measures tying resource needs to effectiveness in response; Recommendation and Status: Recommendation: We recommended that the Secretary of Homeland Security work with federal, state, and local stakeholders to develop explicit performance measures for emergency response capabilities and use them in risk-based analyses to set priorities for acquiring needed response resources; Status: Not implemented. DHS has not yet developed explicit performance measures for emergency response capabilities. According to DHS, it is revising its grant programs, but performance measures have not yet been developed as part of this effort. Source: GAO. [End of table] Regarding our recommendation that the Coast Guard and the FBI coordinate to help ensure that a detailed operational plan be developed that integrates the different spill and terrorism sections of the National Response Framework, DHS is in the process of revising this document and did not have further information regarding whether or how the spill and terrorism response annexes may be revised. Further, the FBI has not taken independent action to implement this recommendation, in part because it did not concur with the need to develop a separate operational plan. In the event of a successful attack on an energy tanker, ports would need to provide an effective, integrated response to (1) protect public safety and the environment, (2) conduct an investigation, and (3) restore shipping operations in a timely manner. Consequently, clearly defined and understood roles and responsibilities for all essential stakeholders are needed to ensure an effective response, and operational plans for the response should be explicitly linked. Regarding our recommendation that DHS develop performance measures for emergency response capabilities, DHS has begun to revise its grant programs, but it is too early in that process to determine whether and how performance measures will be incorporated into those revisions. Performance measures would allow DHS to set priorities for funding on the basis of reducing overall risk, thereby helping ports obtain resources necessary to respond. We continue to believe that the recommendations not yet addressed have merit and should be fully implemented. Coast Guard Had Not Assessed Risks to All OCS Facilities: In accordance with federal statutes and presidential directives, the Coast Guard assesses security risks as part of its responsibilities for ensuring the security of OCS facilities and deepwater ports. In doing so, the Coast Guard, among other things, uses a tool called the Maritime Security Risk Analysis Model (MSRAM). Coast Guard units throughout the country use this tool to assess security risks to about 28,000 key infrastructure in and around the nation's ports and waterways. For example, MSRAM examines security risks to national monuments, bridges, and oil and gas terminals. The Coast Guard's efforts to assess security risks to OCS facilities and deepwater ports are part of a broader effort by DHS to protect critical infrastructure and key resources.[Footnote 22] To further guide this effort, in 2009 DHS issued an updated version of the 2006 National Infrastructure Protection Plan which describes the department's strategic approach to infrastructure protection.[Footnote 23] The plan placed an increased emphasis on risk management and it centered attention on going beyond assessments of individual assets by extending the scope of risk assessments to systems or networks. [Footnote 24] For example, while the 2006 plan focused on assessing the vulnerability of facilities, the 2009 plan discussed efforts to conduct systemwide vulnerability assessments. Progress Made Assessing Offshore Security Risks: The Coast Guard has taken a number of actions in assessing security risks to OCS facilities and deepwater ports. The Coast Guard has used MSRAM to, among other things, examine security risks to OCS facilities and deepwater ports by assessing three main factors--threats, vulnerabilities, and consequences.[Footnote 25] First, Coast Guard analysts use MSRAM to assess security risks against such energy infrastructure by examining potential scenarios terrorists may use to attack OCS facilities or deepwater ports. For example, MSRAM assesses attack scenarios, such as an attack by a hijacked vessel, a small boat attack, sabotage, or an attack by a swimmer or diver. Second, the analysts use MSRAM to evaluate vulnerabilities of OCS facilities and deepwater ports by examining the probability of a successful attack by assessing factors such as the ability of key stakeholders, including the owner, operator, or law enforcement, to interdict an attack and the ability of a target to withstand an attack. Third, the analysts use MSRAM to evaluate potential consequences of an attack, such as deaths or injuries and economic and environmental impacts.[Footnote 26] MSRAM's output produces a risk index number for each maritime target--such as an OCS facility or deepwater port--that allows Coast Guard officials at the local, regional, and national levels to compare and rank critical infrastructure for the purpose of informing security decisions. According to Coast Guard officials, based on MSRAM's output, which is a relative risk ranking, OCS facilities are not considered to be high-risk targets. To inform analysts' inputs into MSRAM, the Coast Guard has coordinated efforts with the intelligence community and key stakeholders. For example, the Coast Guard's Intelligence Coordination Center inputs threat assessment data into MSRAM. Coast Guard analysts also use information from other stakeholders, such as reports produced by the Department of the Interior's Bureau of Ocean Energy Management, Regulation and Enforcement (BOEMRE), which contain oil and gas production data, to inform their evaluations of vulnerabilities and consequences. Based on the assessments of threats, vulnerabilities, and consequences, MSRAM produces a risk index number for each OCS facility and deepwater port. The Coast Guard has also taken actions to supplement MSRAM by, among other things, (1) including new data fields on the frequency with which tankers visit a port and (2) adding additional threat scenarios, such as a threat involving a cyber attack, to its data set. While MSRAM has been applied to deepwater ports, Coast Guard officials have also used an independent risk assessment to assess security risks as part of the application process for recently constructed deepwater ports. For example, in December 2006, as part of the application process for a proposed deepwater port in the Massachusetts Bay, the Coast Guard, the owner and operator, and other stakeholders collectively identified and assessed threat scenarios as well as the potential consequences and vulnerabilities of each scenario. Based on this assessment, stakeholders identified and agreed to carry out security measures to mitigate the risks, such as installing camera systems and increasing radar coverage. Challenges in Data and Scope Hinder Risk Assessments: The Coast Guard faces complex and technical challenges in assessing security risks. The Coast Guard recognizes these challenges and generally has actions underway to study or address them. Coast Guard officials noted that some of these challenges are not unique to the Coast Guard's risk assessment model and that these challenges are faced by others in the homeland security community involved in conducting risk assessments. Specific challenges are detailed below. Challenges in Data: * Vulnerability-related data: The Coast Guard does not have data on the ability of an OCS facility to withstand an attack, which is defined in MSRAM as target hardness. The Coast Guard recognizes that target hardness is an important consideration in assessing the vulnerability of OCS facilities. However, MSRAM analysts described challenges in assessing target hardness because empirical data are not available or research has not been conducted to do so. For example, research on whether a hijacked boat or an underwater attack could sink an offshore oil or natural gas platform would give the Coast Guard and owners and operators a clearer sense of whether this attack scenario could result in major consequences. Coast Guard officials and corporate security officers with whom we spoke indicated that such research would advance knowledge about the vulnerabilities of OCS facilities and deepwater ports. Gaining a better understanding of target hardness of these and other threat scenarios could improve the quality of the output from MSRAM. According to Coast Guard's MSRAM Program Manager, the Coast Guard may recommend conducting more research on the vulnerability to and consequences of attack scenarios as a result of a study it is currently conducting on OCS facilities in the Gulf of Mexico. The Coast Guard initiated this study in the fall of 2010 after the Deepwater Horizon incident. The study initially reviewed the "lessons learned" from Deepwater Horizon and how those lessons could be used to improve MSRAM. During the course of our review, Coast Guard officials stated that the scope of the study has been expanded to include OCS facilities and that the Coast Guard expects to issue its report in the fall of 2011. * Consequences-related data: The input for secondary economic impacts [Footnote 27] can have a substantial effect on how MSRAM's output ranks a facility relative to other potential targets. Undervaluing secondary economic impacts could result in a lower relative risk ranking that underestimates the security risk to a facility, or inversely, overvaluing secondary economic impacts could result in overestimating the security risk to a facility. However, the Coast Guard has limited data for assessing secondary economic impacts from an attack on OCS facilities or deepwater ports. Coast Guard analysts stated that gathering these data is a challenge because there are few models or guidance available for doing so. During the course of our review, the Coast Guard started using a tool, called "IMPLAN," that helps inform judgments of secondary economic impacts by showing what the impact could be for different terrorist scenarios.[Footnote 28] The tool, however, has limits in that it should not be used where the consequences of a terrorist attack are mainly interruption to land or water transportation. Enhancing DHS's and the Coast Guard's ability to assess secondary economic impacts could improve a MSRAM analyst's accuracy in assessing the relative risk of a particular target. Coast Guard officials added that they are working with DHS's Office of Risk Management and Analysis in studying ways to improve how it assesses secondary economic impacts. Challenges in Scope: * Challenges in assessing security risks to OCS facilities: We determined that the Coast Guard did not conduct MSRAM assessments for all 50 of the OCS facilities that are subject to federal security requirements in 2011. Coast Guard guidance calls for MSRAM analysts to identify and assess all significant targets that fall within a unit's area of responsibility, which includes all security-regulated OCS facilities. Specifically, as of May 2011, we found that MSRAM did not include 12 of the 50 OCS facilities operating at that time. Coast Guard officials generally agreed with our finding and they have since incorporated these 12 facilities into MSRAM and completed the required risk assessments. While the Coast Guard plans to update its policies and procedures for inspecting and ensuring the security of OCS facilities in the future, the current set of policies and procedures do not call for an updated list of OCS facilities to be provided to MSRAM analysts to assess the security risks to such facilities annually. Coast Guard officials acknowledged that their policies and procedures did not include this requirement. Revising policies and procedures to include such a requirement is important in that the number of OCS facilities could change each year. For example, some facilities may drop below the production or personnel thresholds described earlier in this statement, thereby falling outside the scope of 33 C.F.R. part 106, or other facilities could meet or exceed such thresholds, thereby rendering them subject to part 106. Standards for Internal Control in the Federal Government state that policies and procedures enforce management directives and help ensure that actions are taken to address risks.[Footnote 29] In addition, internal control standards state that such control activities are an integral part of an entity's planning, implementing, reviewing, and accountability for stewardship of government resources and for achieving effective results. Developing such procedures could help ensure that the Coast Guard carries out its risk assessment requirements for such security- regulated OCS facilities. * Challenges in assessing security risks to offshore energy infrastructure that is not subject to security requirements: With respect to OCS facilities, analysts only use MSRAM to assess security risks associated with those OCS facilities that are regulated for security under 33 C.F.R. part 106. For example, the Deepwater Horizon did not meet the threshold criteria subjecting it to regulation under part 106, and therefore, MSRAM was not used to assess its security risks (see figure 2 for a photo of the Deepwater Horizon explosion). According to Coast Guard officials, mobile offshore drilling units (MODUs), such as the Deepwater Horizon, do not generally pose a risk of a terrorist attack since there is little chance of an oil spill when these units are drilling and have not struck oil.[Footnote 30] However, the officials noted that there is a brief period of time when a drilling unit strikes a well, but the well has yet to be sealed prior to connecting it to a production facility. The Deepwater Horizon was in this stage when it resulted in such a large oil spill. During that period of time, MODUs could be at risk of a terrorist attack that could have significant consequences despite a facility not meeting the production or personnel thresholds. For example, such risks could involve the reliability of blowout preventer valves--specialized valves that prevent a well from spewing oil in the case of a blowout. Gaining a fuller understanding of the security risks associated with MODUs, such as the Deepwater Horizon, could improve the quality of program decisions made by Coast Guard managers on whether actions may be needed to ensure the security of this type of facility. According to Coast Guard officials, they are studying the "lessons learned" from the Deepwater Horizon incident and part of the study involves examining whether analysts should use MSRAM to assess MODUs in the future. Figure 2: Explosion of the Deepwater Horizon Drilling Unit in the Gulf of Mexico, April 2010: [Refer to PDF for image: photograph] Source: U.S. Coast Guard. [End of figure] * Challenges in assessing systemic or network risks: MSRAM does not assess systemic or network risks because, according to Coast Guard officials, these types of assessments are beyond the intended use of MSRAM. The 2009 National Infrastructure Protection Plan, 2010 DHS Quadrennial Review,[Footnote 31] and a National Research Council evaluation of DHS risk assessment efforts[Footnote 32] have determined that gaining a better understanding of network risks would help to understand multiplying consequences of a terrorist attack or simultaneous attacks on key facilities. Understanding "network" risks involves gaining a greater understanding of how a network is vulnerable to a diverse range of threats. Examining how such vulnerabilities create strategic opportunities for intelligent adversaries with malevolent intent is central to this understanding. For example, knowing what damage a malicious adversary could achieve by exploiting weaknesses in an oil-distribution network offers opportunities for improving the resiliency of the network within a given budget.[Footnote 33] How the Coast Guard assesses offshore infrastructure within the broader set of networks is important. The findings of the National Commission on the BP Deepwater Horizon Oil Spill incident illustrate how examining networks or systems from a safety or engineering perspective can bring greater knowledge of how single facilities intersect with broader systems.[Footnote 34] The report noted that "complex systems almost always fail in complex ways" and cautioned that attempting to identify a single cause for the Deepwater Horizon incident would provide a dangerously incomplete picture of what happened. As a result, the report examined the Deepwater Horizon incident with an expansive view toward the role that industry and government sectors played in assessing vulnerabilities and the impact the incident had on economic, social, and environmental systems. Enhancing knowledge about the vulnerabilities of networks or systems with which OCS facilities and deepwater ports intersect could improve the quality of information that informs program and budget decisions on how to best ensure security and use scarce resources in a constrained fiscal environment. Doing so would also be consistent with DHS's Quadrennial Review and other DHS guidance and would provide information to decision makers that could minimize the likelihood of being unprepared for a potential attack. Coast Guard officials agreed that assessing "network effects" is a challenge and they are examining ways to meet this challenge. However, the Coast Guard's work is this area is in its infancy and there is uncertainty regarding the way in which the Coast Guard will move forward in measuring "network effects." Conclusions: The threat of terrorism against energy tankers and offshore energy infrastructure highlights the importance of the Coast Guard having policies and procedures in place to better ensure the security of energy tankers, OCS facilities, and deepwater ports. The Coast Guard has taken steps to implement prior GAO recommendations to enhance energy tanker security, and it continues to work towards implementing the three outstanding recommendations. Improvements in security could help to prevent a terrorist attack against this infrastructure, which could have significant consequences, such as those resulting from the Deepwater Horizon incident. While the Coast Guard does not consider OCS facilities that it has assessed in MSRAM to be high risk, it is important to assess all OCS facilities as required by Coast Guard guidance. Since May 2011, when we determined that some OCS facilities were not assessed, the Coast Guard has completed its assessments for the previously omitted facilities. However, given that the list of security-regulated facilities may change each year based on factors such as production volume, it is important to ensure that any facilities added to the list in the future will be assessed for security risks in MSRAM. By revising policies and procedures to help ensure that an updated list of OCS facilities is provided to MSRAM analysts on an annual basis, the Coast Guard would be better positioned to ensure that all risk assessments for facilities requiring such assessments be conducted in a manner consistent with the law and presidential directive. Recommendations for Executive Action: To strengthen the Coast Guard's efforts to assess security risks and ensure the security of OCS facilities, we recommend that the Commandant of the Coast Guard revise policies and procedures to ensure that MSRAM analysts receive the annual updated list of security- regulated OCS facilities to ensure that risk assessments have been conducted on all such OCS facilities. Agency Comments and Our Evaluation: We provided a draft of this testimony to DHS and DOJ for comment. The Coast Guard concurred with our recommendation to revise policies and procedures to ensure that MSRAM analysts receive the annual updated list of security-regulated OCS facilities. DHS and DOJ provided oral and technical comments, which we incorporated as appropriate. Chairman McCaul, Ranking Member Keating, and Members of the Subcommittee, this concludes my prepared statement. This testimony concludes our work on Coast Guard efforts to assess security risks for offshore energy infrastructure. However, we will continue our broader work looking at the security of offshore energy infrastructure, including Coast Guard security inspections and other challenges. Our evaluation will focus on Coast Guard security inspections and other measures to better secure OCS facilities and deepwater ports.[Footnote 35] We will continue to work with the Coast Guard to develop solutions to ensure that inspections of OCS facilities are completed as required. I would be happy to respond to any questions you may have. GAO Contact and Staff Acknowledgments: Key contributors to this testimony were Christopher Conrad, Assistant Director; Neil Asaba, Analyst-in-Charge; Alana Finley; Christine Kehr; Colleen McEnearney; Erin O'Brien; Jodie Sandel; and Suzanne Wren. Chuck Bausell contributed economics expertise, Pamela Davidson assisted with design and methodology, Tom Lombardi provided legal support, and Jessica Orr provided assistance in testimony preparation. [End of section] Related GAO Products: Maritime Security: Updating U.S. Counterpiracy Action Plan Gains Urgency as Piracy Escalates off the Horn of Africa. [hyperlink, http://www.gao.gov/products/GAO-11-449T]. Washington, D.C.: March 15, 2011. Quadrennial Homeland Security Review: 2010 Reports Addressed Many Required Elements, but Budget Planning Not Yet Completed. [hyperlink, http://www.gao.gov/products/GAO-11-153R]. Washington, D.C.: December 16, 2010. Maritime Security: DHS Progress and Challenges in Key Areas of Port Security. [hyperlink, http://www.gao.gov/products/GAO-10-940T]. Washington, D.C.: July 21, 2010. Maritime Security: Actions Needed to Assess and Update Plan And Enhance Collaboration among Partners Involved in Countering Piracy off the Horn of Africa. [hyperlink, http://www.gao.gov/products/GAO-10-856]. Washington, D.C.: September 24, 2010. Critical Infrastructure Protection: Update to National Infrastructure Protection Plan Includes Increased Emphasis on Risk Management and Resilience. [hyperlink, http://www.gao.gov/products/GAO-10-296]. Washington, D.C.: March 5, 2010. Maritime Security: Federal Efforts Needed to Address Challenges in Preventing and Responding to Terrorist Attacks on Energy Commodity Tankers. [hyperlink, http://www.gao.gov/products/GAO-08-141]. Washington, D.C.: December 10, 2007. Risk Management: Further Refinements Needed to Assess Risks and Prioritize Protective Measures at Ports and Other Critical Infrastructure. [hyperlink, http://www.gao.gov/products/GAO-06-91]. Washington, D.C.: December 15, 2005. [End of section] Footnotes: [1] GAO, Maritime Security: Federal Efforts Needed to Address Challenges in Preventing and Responding to Terrorist Attacks on Energy Commodity Tankers, [hyperlink, http://www.gao.gov/products/GAO-08-141] (Washington, D.C.: Dec. 10, 2007). [2] [hyperlink, http://www.gao.gov/products/GAO-08-141]. [3] GAO, Maritime Security: Actions Needed to Assess and Update Plan And Enhance Collaboration among Partners Involved in Countering Piracy off the Horn of Africa, [hyperlink, http://www.gao.gov/products/GAO-10-856] (Washington, D.C.: Sept. 24, 2010); and Maritime Security: Updating U.S. Counterpiracy Action Plan Gains Urgency as Piracy Escalates off the Horn of Africa, [hyperlink, http://www.gao.gov/products/GAO-11-449T] (Washington, D.C.: Mar. 15, 2011). [4] In looking at the Coast Guard's assessments of risks, we focused on security risks--risks emanating from terrorists or others that would purposely attack or sabotage offshore energy infrastructure. We did not focus on accidental risks to such infrastructure. However, we have ongoing work to assess industry plans for developing new methods or technologies to control and contain blowouts occurring in subsea environments. We are conducting this work at the request of the Ranking Member of the House Committee on Energy and Commerce. We expect to issue this related report in the winter of 2012. We are also conducting broader work examining the Coast Guard's use of MSRAM for the Chairman of the Senate Committee on Commerce, Science, and Transportation; the Ranking Member of the Senate Committee on Homeland Security and Governmental Affairs; and the Chairwoman of the House Homeland Security Committee, Subcommittee on Border and Maritime Security. We expect to issue this report later in 2011. [5] The DHS Quadrennial Review outlines a strategic framework for stakeholders, including federal, state, local, tribal, territorial, nongovernmental, and private-sector entities, in responding to security threats. For more information about the DHS Quadrennial Review, see GAO, Quadrennial Homeland Security Review: 2010 Reports Addressed Many Required Elements, but Budget Planning Not Yet Completed, [hyperlink, http://www.gao.gov/products/GAO-11-153R] (Washington, D.C.: Dec. 16, 2010). [6] The National Infrastructure Protection Plan represents a strategy for protecting critical infrastructure and key resources, and it offers a framework for assessing risk. For more information about the National Infrastructure Protection Plan, see GAO, Critical Infrastructure Protection: Update to National Infrastructure Protection Plan Includes Increased Emphasis on Risk Management and Resilience, [hyperlink, http://www.gao.gov/products/GAO-10-296] (Washington, D.C.: Mar. 5, 2010). [7] National Research Council: Review of the Department of Homeland Security's Approach to Risk Analysis (Washington, D.C.: 2010). [8] GAO, Risk Management: Further Refinements Needed to Assess Risks and Prioritize Protective Measures at Ports and Other Critical Infrastructure, [hyperlink, http://www.gao.gov/products/GAO-06-91] (Washington, D.C.: Dec. 15, 2005) and Maritime Security: DHS Progress and Challenges in Key Areas of Port Security, [hyperlink, http://www.gao.gov/products/GAO-10-940T] (Washington, D.C.: July 21, 2010). [9] GAO, Standards for Internal Control in the Federal Government, [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1] (Washington, D.C.: November 1999). [10] We will continue our broader work looking at the security of offshore energy infrastructure, including Coast Guard security inspections and other challenges. [11] This figure is based on the most recently available data for a full year from the U.S. Energy Information Administration. [12] The OCS is a designation for all submerged lands of which the subsoil and seabed are outside the territorial jurisdiction of a U.S. state, but within U.S. jurisdiction and control. [13] Based on an estimate from the National Commission on the BP Deepwater Horizon Oil Spill and Offshore Drilling, Deep Water: The Gulf Oil Disaster and the Future of Offshore Drilling (Washington, D.C.: January 2011). [14] The motivation behind an attack may distinguish piracy from terrorism. For example, the motivation for piracy is often monetary, whereas terrorism is politically motivated. [15] The International Chamber of Commerce's International Maritime Bureau operates a Piracy Reporting Center that collects data on pirate attacks worldwide. [16] For more information on U.S. government efforts to combat piracy, see [hyperlink, http://www.gao.gov/products/GAO-10-856], which discusses the Coast Guard's and other agencies' progress in implementing efforts to prevent piracy attacks. This report contains recommendations to improve U.S. government efforts to combat piracy. [17] See 33 C.F.R. § 106.105. [18] Facilities meeting any of the threshold criteria are often referred to as Maritime Transportation and Security Act (MTSA)- regulated facilities. The production or personnel thresholds for determining whether an OCS facility will be subject to security requirements in accordance with 33 C.F.R. part 106 are: (1) producing greater than 100,000 barrels of oil a day, (2) producing more than 200 million cubic feet of natural gas per day, or (3) hosting more than 150 persons for 12 hours or more in each 24 hour period continuously for 30 days or more. According to 33 C.F.R. § 140.10, production means those activities which take place after the successful completion of any means for the removal of minerals, including, but not limited to, such removal, field operations, transfer of minerals to shore, operation monitoring, maintenance, and workover. According to the Coast Guard, the statement; "transfer of minerals to shore" encompasses fixed facilities that operate as "Transmission Facilities." Production quantities shall be calculated as the sum of all sources of production from wells on the primary and any attending platform(s), including the throughput of other pipelines transferring product across the same platform(s). [19] See 33 C.F.R. § 148.5. Although deepwater ports are generally not regulated for security in accordance with MTSA, owners and operators generally carry out similar measures to those carried out for OCS facilities by, among other things, developing security plans comparable to those implemented by OCS facilities pursuant to part 106. See 33 C.F.R. § 150.15(x). [20] According to the Coast Guard, one of the Gulf of Mexico deepwater ports is expected to be decommissioned in the near future. [21] [hyperlink, http://www.gao.gov/products/GAO-08-141]. [22] The Homeland Security Act of 2002, enacted the same day as MTSA (November 25, 2002), established DHS and gave the department wide- ranging responsibilities for, among other things, leading and coordinating the overall national critical infrastructure protection effort. Title II of the Homeland Security Act, as amended, primarily addresses the department's responsibilities for critical infrastructure protection. According to DHS, there are thousands of facilities in the United States that if degraded or destroyed by a manmade or natural disaster could cause some combination of significant casualties, major economic losses, or widespread and long- term disruptions to national well-being and governance capacity. [23] DHS, National Infrastructure Protection Plan, Partnering to Enhance Protection and Resiliency (Washington, D.C: January 2009). This plan represents a strategy for protecting critical infrastructure and key resources and it offers a framework for assessing risk. DHS issued the original plan in June 2006. [24] Network effects involve the ripple effect of an incident or simultaneous incidents on key sectors of the economy. For example, production facilities, pipelines, transfer stations, and refineries are part of the oil and natural gas network in and around the Gulf of New Mexico. Assessing network effects could involve determining whether a terrorist attack on a few key assets would have a disproportionate effect on the performance of this network. Such an assessment could examine the degree to which such an incident could disrupt the flow of oil or natural gas to industries that use these types of energy as inputs to their production functions. [25] DHS defines threat as a natural or manmade occurrence, individual, entity, or action that has or indicates the potential to harm life, information, operations, the environment, and/or property. For the purpose of calculating risk, the threat of an intentional hazard is generally estimated as the likelihood of an attack being attempted by an adversary; for other hazards, threat is generally estimated as the likelihood that a hazard will manifest itself. In the case of terrorist attacks, the threat likelihood is estimated based on the intent and capability of the adversary. DHS defines vulnerability as a physical feature or operational attribute that renders an entity open to exploitation or susceptible to a given hazard. In calculating the risk of an intentional hazard, a measure of vulnerability is the likelihood that an attack is successful, given that it is attempted. DHS defines consequence as the effect of an event, incident, or occurrence; reflects the level, duration, and nature of the loss resulting from the incident. For the purposes of the National Infrastructure Protection Plan, consequences are divided into four main categories: public health and safety (i.e., loss of life and illness); economic (direct and indirect); psychological; and governance/mission impacts. [26] MSRAM assesses consequences of six factors: (1) deaths and injuries, (2) primary economic impact, (3) environmental impact, (4) national security impacts, (5) symbolic impacts, and (6) secondary economic impacts. [27] According to the Coast Guard, secondary economic impacts are a factor representing a description of follow-on economic effects of a successful attack. [28] IMPLAN stands for IMpact Analysis for PLANning. It is a tool that assesses economic relationships between primary economic impacts and secondary economic impacts. [29] [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1]. [30] MODUs engage in drilling rather than production. [31] U.S. Department of Homeland Security: Quadrennial Homeland Security Review Report: A Strategic Framework for a Secure Homeland (Washington D.C.: February 2010). [32] National Research Council: Review of the Department of Homeland Security's Approach to Risk Analysis (Washington D.C.: 2010). [33] See Gerald G. Brown, W. Matthew Carlyle, Javier Salmerón, and Kevin Wood, Operations Research Department, Naval Postgraduate School: Analyzing the Vulnerability of Critical Infrastructure to Attack and Planning Defenses (Monterrey, California: 2005). According to DHS, resiliency is the ability to resist, absorb, recover from, or successfully adapt to adversity or a change in conditions. [34] National Commission on the BP Deepwater Horizon Oil Spill and Offshore Drilling, Deep Water: The Gulf Oil Disaster and the Future of Offshore Drilling (Washington D.C.: January 2011). [35] We are conducting this work for the Chairman of the Senate Committee on Commerce, Science, and Transportation; the Ranking Member of the Senate Committee of Homeland Security and Governmental Affairs; the House Committee on Energy and Commerce; the Chairman of the House Committee on Transportation and Infrastructure; the Ranking Member of the House Committee on Homeland Security; and the Ranking Member of the House Committee on Natural Resources; and the Chairman of the House Homeland Security Committee's Subcommittee on Oversight, Investigations, and Management. [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Phone: The price of each GAO publication reflects GAO‘s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO‘s Web site, [hyperlink, http://www.gao.gov/ordering.htm]. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.