Homeland Security

Actions Needed to Improve Security Practices at National Icons and Parks Gao ID: GAO-09-983 August 28, 2009

The September 11 terrorist attacks have heightened concerns about the security of the nation's icons and parks, which millions of people visit every year. The National Park Service (Park Service) within the Department of the Interior (Interior) is responsible for securing nearly 400 park units that include icons and other parks. In 2004, GAO identified a set of key protection practices that include: allocating resources using risk management, leveraging technology, information sharing and coordination, performance measurement and testing, and strategic management of human capital. As requested, GAO determined whether the Park Service's security efforts for national icons and parks reflected key practices. To meet this objective, GAO used its key practices as criteria, reviewed five icons and parks to gain firsthand knowledge, analyzed Interior documents, and interviewed Interior officials.

The Park Service has implemented a range of security improvements since the September 11 terrorist attacks and has worked to integrate security into its primary mission to preserve national icons and parks for the public's enjoyment. For example, it has established a senior-level security manager position and taken steps to strengthen security at the icons, and is developing a risk management program for small parks. These efforts exhibit some aspects of the key protection practices, but GAO found limitations in each of the areas. The Park Service does not allocate resources using risk management servicewide or cost-effectively leverage technology. While the Park Service, with assistance from Interior, has conducted risk assessments and implemented countermeasures to enhance security at the icons, some critical vulnerabilities remain. Moreover, the Park Service has not advanced this risk management approach for icons to the rest of its national parks. Without a servicewide risk management approach, the Park Service lacks assurance that security efforts are focused where they are needed. Furthermore, while icons and parks may use a variety of security technologies and other countermeasures, they do not have guidance for evaluating the cost-effectiveness of these investments, thus limiting assurances of efficiency and cost-effectiveness. Additionally, the Park Service faces limitations with sharing and coordinating information internally and lacks a servicewide approach for routine performance measurement and testing. Although the Park Service collaborates with external organizations, it lacks comparable arrangements for internal security communications and, as a result, parks are not equipped to share information with one another on common security problems and solutions. Furthermore, the Park Service has not established security performance measures and lacks an analysis tool that could be used to evaluate program effectiveness and inform an overall risk management strategy. Thus, icons and parks have little information on the status and performance of security that they can use to manage daily activities or that Park Service management can use to manage security throughout the organization. Finally, strategic human capital management is an area of concern because of the Park Service's lack of clearly defined security roles and a security training curriculum. For example, staff that are assigned security duties are generally not required to meet qualifications or undergo specialized training. Absent a security training curriculum, there is less assurance that staff are well-equipped to effectively identify and mitigate risks at national icons and parks.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-09-983, Homeland Security: Actions Needed to Improve Security Practices at National Icons and Parks This is the accessible text file for GAO report number GAO-09-983 entitled 'Homeland Security: Actions Needed to Improve Security Practices at National Icons and Parks' which was released on September 28, 2009. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to the Chairman, Committee on Homeland Security, House of Representatives: United States Government Accountability Office: GAO: August 2009: Homeland Security: Actions Needed to Improve Security Practices at National Icons and Parks: GAO-09-983: GAO Highlights: Highlights of GAO-09-983, a report to the Chairman, Committee on Homeland Security, House of Representatives. Why GAO Did This Study: The September 11 terrorist attacks have heightened concerns about the security of the nation‘s icons and parks, which millions of people visit every year. The National Park Service (Park Service) within the Department of the Interior (Interior) is responsible for securing nearly 400 park units that include icons and other parks. In 2004, GAO identified a set of key protection practices that include: allocating resources using risk management, leveraging technology, information sharing and coordination, performance measurement and testing, and strategic management of human capital. As requested, GAO determined whether the Park Service‘s security efforts for national icons and parks reflected key practices. To meet this objective, GAO used its key practices as criteria, reviewed five icons and parks to gain firsthand knowledge, analyzed Interior documents, and interviewed Interior officials. What GAO Found: The Park Service has implemented a range of security improvements since the September 11 terrorist attacks and has worked to integrate security into its primary mission to preserve national icons and parks for the public‘s enjoyment. For example, it has established a senior-level security manager position and taken steps to strengthen security at the icons, and is developing a risk management program for small parks. These efforts exhibit some aspects of the key protection practices, but GAO found limitations in each of the areas. The Park Service does not allocate resources using risk management servicewide or cost-effectively leverage technology. While the Park Service, with assistance from Interior, has conducted risk assessments and implemented countermeasures to enhance security at the icons, some critical vulnerabilities remain. Moreover, the Park Service has not advanced this risk management approach for icons to the rest of its national parks. Without a servicewide risk management approach, the Park Service lacks assurance that security efforts are focused where they are needed. Furthermore, while icons and parks may use a variety of security technologies and other countermeasures, they do not have guidance for evaluating the cost-effectiveness of these investments, thus limiting assurances of efficiency and cost-effectiveness. Additionally, the Park Service faces limitations with sharing and coordinating information internally and lacks a servicewide approach for routine performance measurement and testing. Although the Park Service collaborates with external organizations, it lacks comparable arrangements for internal security communications and, as a result, parks are not equipped to share information with one another on common security problems and solutions. Furthermore, the Park Service has not established security performance measures and lacks an analysis tool that could be used to evaluate program effectiveness and inform an overall risk management strategy. Thus, icons and parks have little information on the status and performance of security that they can use to manage daily activities or that Park Service management can use to manage security throughout the organization. Finally, strategic human capital management is an area of concern because of the Park Service‘s lack of clearly defined security roles and a security training curriculum. For example, staff that are assigned security duties are generally not required to meet qualifications or undergo specialized training. Absent a security training curriculum, there is less assurance that staff are well- equipped to effectively identify and mitigate risks at national icons and parks. What GAO Recommends: GAO is making six recommendations to the Secretary of the Interior. These include instructing the Park Service to develop a more comprehensive risk management approach, guidance and standards for leveraging technology, strategies to improve communications and to clearly define staff roles, and programs related to performance measurement, testing, and training. Interior concurred with the report‘ s recommendations. View [hyperlink, http://www.gao.gov/products/GAO-09-983] or key components. For more information, contact Mark L. Goldstein at (202) 512-2834 or goldsteinm@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: The Park Service Does Not Manage Risk Servicewide or Ensure the Best Return on Security Technology Investments: The Park Service Lacks a Servicewide Approach to Sharing Information Internally and Measuring Performance: Human Capital Management Lacks a Security Focus: Conclusions: Recommendations for Executive Action: Agency Comments and Our Evaluation: Appendix I: Objectives, Scope, and Methodology: Appendix II: Comments from the Department of the Interior: Appendix III: GAO Contact and Staff Acknowledgments: Tables: Table 1: Examples of Technologies and Other Countermeasures that Icons and Parks Use to Enhance Security: Table 2: Examples of Information Sharing and Coordination at Park Service Regions, Icons, and Parks: Table 3: Examples of Security-related Tests, Exercises, and Drills: Table 4: Security Positions at Regions, and Examples of Activities: Table 5: Security Positions at Icons and Parks, and Examples of Activities: Table 6: Security Training Examples: Figures: Figure 1: Perimeter Fencing at the African Burial Ground: Figure 2: Performance Measures, Uses, and Results: Abbreviations: African Burial Ground: African Burial Ground National Monument: DHS: Department of Homeland Security: FAA: Federal Aviation Administration: FBI: Federal Bureau of Investigation: FLETC: Federal Law Enforcement Training Center: FPS: Federal Protective Service: Gateway Arch: Jefferson National Expansion Memorial: Gettysburg: Gettysburg National Military Park: Grand Canyon: Grand Canyon National Park: GSA: General Services Administration: HSPD-7: Homeland Security Presidential Directive 7: IG: Inspector General: Interior: Department of the Interior: ISC: Interagency Security Committee: JTTF: Joint Terrorism Task Force: OLES: Office of Law Enforcement and Security: Park Service: National Park Service: Park Police: U.S. Park Police: Statue of Liberty: Statue of Liberty National Monument: Smithsonian: Smithsonian Institution: TSA: Transportation Security Administration: [End of section] United States Government Accountability Office: Washington, DC 20548: August 28, 2009: The Honorable Bennie G. Thompson: Chairman: Committee on Homeland Security: House of Representatives: Dear Mr. Chairman: The September 11 terrorist attacks have heightened concerns about the security of the nation's icons and parks, which millions of people visit every year. Attacks on these assets could have profound psychological and economic effects. The National Park Service (Park Service), within the Department of the Interior (Interior), is responsible for protecting close to 400 park units that include 5 units Interior has identified as national icons and other types of parks. [Footnote 1] While the Park Service has taken some steps to enhance security, especially at icons and parks along the southwest border, protecting these treasured assets can be a complex and contentious task for the agency, which must also ensure that the public has access to them. In 2002, the Secretary of the Interior established the Office of Law Enforcement and Security (OLES) to oversee Interior's security efforts and to ensure their consistent application across its bureaus and offices. OLES and the Park Service identified five national icons as critical assets as part of the government's homeland security initiatives. Additionally, the U.S. Park Police (Park Police) provides law enforcement and security services for icons and parks in Washington, D.C.; New York City; and San Francisco. We have reported on the challenges agencies face in protecting national icons. Such challenges include balancing security with public access, addressing jurisdictional issues and competing stakeholder interests, and leveraging limited resources.[Footnote 2] We have also identified a set of key protection practices--established from the collective practices of federal agencies and private sector entities--that can provide a framework for guiding agencies' efforts to protect physical assets, such as park properties and facilities, and address challenges. [Footnote 3] The key practices essentially form the foundation of a comprehensive, strategic approach to park protection. We have used these key practices as criteria to evaluate how the Department of Homeland Security (DHS)[Footnote 4] and the Smithsonian Institution [Footnote 5] (Smithsonian) secure their assets. Furthermore, the Interagency Security Committee[Footnote 6] (ISC), chaired by DHS, is using our key protection practices to guide its priorities and work activities. The following are the key practices we used for this review: * Allocation of resources using risk management: Identify threats, assess vulnerabilities, and determine critical assets to protect; use information on these and other elements to develop countermeasures; and prioritize the allocation of resources as conditions change. * Leveraging of technology: Select technologies to enhance asset security through methods like access control, detection, and surveillance systems. This involves not only using technology, but ensuring that there are positive returns on investment in the form of reduced vulnerabilities. * Information sharing and coordination: Establish means of coordinating and sharing security and threat information internally, within large organizations, and externally, with other government entities and the private sector. * Performance measurement and testing: Use metrics, such as implementation timelines, and active testing, such as unannounced on- site assessments, to ensure accountability for achieving program goals and improving security at facilities. * Strategic management of human capital: Manage human capital to maximize government performance and assure accountability in asset protection through, for example, recruitment of skilled staff, training, and retention. You requested that we determine whether the Park Service's approach to securing national icons and parks reflects key protection practices. In response, on June 19, 2009, we issued a sensitive but unclassified report. As that report contained information that was deemed to be either law enforcement sensitive or for official use only, this version of the report is intended to communicate our findings as related to each of the key protection practices that we reviewed and our recommendations while omitting sensitive information about icon and park security, including specific vulnerabilities, security breaches, and steps that Interior, Park Service, and Park Police have taken to address them. To meet the reporting objective, we used our key practices as a framework for assessing the Park Service's protection efforts. We interviewed Interior officials at the national, regional, and asset levels, including officials from the Office of the Inspector General (IG), OLES, Park Service, and Park Police. We reviewed five icons and parks to learn firsthand how the Park Service protects highly visible assets. We selected these assets because they have high public visitation, present other potential security considerations such as recent or planned facility construction, and are geographically diverse. We selected: * Two icons: the Statue of Liberty National Monument (Statue of Liberty) in New York City, and the Jefferson National Expansion Memorial (Gateway Arch) in St. Louis. * Three parks: the African Burial Ground National Monument (African Burial Ground) in New York, Gettysburg National Military Park (Gettysburg) in Pennsylvania, and Grand Canyon National Park (Grand Canyon) in Arizona.[Footnote 7] In doing our work, we also reviewed pertinent documents and policies, related directives, and prior and ongoing GAO studies. We conducted this performance audit from January 2008 through June 2009 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objective. Appendix I contains a more detailed discussion of our scope and methodology. Results in Brief: The Park Service has implemented a range of security program improvements since the September 11 terrorist attacks. As an important steward of America's highly valued national icons and parks, the Park Service has worked to integrate security into its primary mission to preserve the natural and cultural resources and values of the national park system for the enjoyment, education, and inspiration of those who visit them. For example, it has established a senior-level security manager position and taken steps to strengthen security at the icons, and it is developing a risk management program for small parks. These efforts exhibit some aspects of key protection practices, but also have limitations. More specifically: * The Park Service does not have a systematic approach for allocating resources using risk management throughout its vast and diverse inventory of national icons and parks to address security issues. The Park Service, with assistance from Interior's OLES, has assessed risks and implemented security improvements at the five icons and some border parks, although we noted some cases in which recommended security measures were not implemented at icons and vulnerabilities remain. At other parks, however, risk assessments are done on an ad-hoc basis and the Park Service has not conducted a servicewide assessment of vulnerabilities. Instead, officials at individual parks use their discretion to request risk assessments from the Park Service or obtain them from other sources. For example, officials at the Grand Canyon-- with more than 4 million visitors annually--independently obtained a risk assessment from an outside counterterrorism organization, but the chief ranger was concerned that it was not thorough and that vulnerabilities remain. Without a servicewide risk management approach, the Park Service lacks assurance that security efforts are adequate and focused where they are needed. Furthermore, without risk assessment tools and other security guidance, some Park Service officials at regional offices are developing their own approaches to risk management without leveraging best practices and lessons learned throughout the Park Service. * The Park Service does not have guidance or standards that officials at individual icons and parks can use to leverage technology by evaluating the cost-effectiveness of security countermeasures. As a result, there is limited assurance that technology investments produce the greatest security benefits. Without guidance and standards, officials at icons and parks may rely on other methods such as trial and error to identify systems and equipment that best suit their needs. For example, officials at the Statue of Liberty were planning to lease magnetometers and X-ray machines to screen visitors, while officials at the Gateway Arch intend to continue purchasing the same equipment. Officials at both icons were making these decisions based on preference without assessing which approach was more cost-effective. These alternative methods may lead to inefficient resource allocation since icon and park officials have competing resource demands and regular developments in technology necessitate upgrades. Officials from the two icons and one of the regions said that guidance for investing in technology would be helpful. * The Park Service has information sharing and coordination arrangements with external organizations at the national, regional, icon, and park levels. However, the Park Service lacks comparable arrangements for internal security communications, and as a result, officials at icons and parks are not equipped to share information with one another on common security problems and solutions. For example, there is no servicewide Web portal for sharing security information internally, an approach other organizations have established. Thus, while officials at the Gateway Arch said they have collaborated with other federal agencies--such as the Transportation Security Administration (TSA) to form a federal screeners group to share best practices and learn about new technologies--the Park Service is limited in its ability to leverage these lessons learned throughout the organization--an activity that a shared Web portal could enable. In the absence of a servicewide security Web portal, some regional offices are developing their own Web sites, but functionality, content, and usage vary from region to region. * The Park Service does not have a servicewide approach for routine performance measurement and testing of its security efforts. The Park Service has not established security performance measures and lacks an analysis tool that it could use to track performance measures such as the number of risk assessments conducted, change in the total number of security-related incidents, identified security staff, and security training courses provided and attended. Without an overarching performance measurement and testing framework, officials at each region, icon, and park take their own approach to identifying security performance measures and tests. However, this ad hoc approach provides little assurance that performance measures and tests are effective and adequate, and that lessons learned can be identified and leveraged throughout the Park Service. Moreover, officials at regions, icons, and parks use their own tracking tools to record and report security incidents limiting the extent to which such information can be consolidated, analyzed, and leveraged to enhance security throughout the park system. Because of the limited activity in this area, icon and park personnel have little information on the status and performance of security methods that they can use to manage day-to-day activities or that Park Service management can use to manage security efforts throughout the organization. * Strategic human capital management is an area of concern because of the Park Service's lack of clearly defined security roles and a security training curriculum. Although the Park Service requires regions to assign security responsibilities to law enforcement staff, and icon and park superintendents designate physical security coordinators, these staff do not have to meet any qualifications, demonstrate expertise, or undergo any specialized training, and oversight of their activities is limited. For example, at the time of our review, neither the Park Service nor the Park Police employed a full-time security manager at the Statue of Liberty, despite such recommendations from the Interior IG and OLES. Moreover, park officials have not designated a physical security coordinator, and instead, have distributed those duties among several Park Police managers. While officials from regions, icons, and parks told us that they coordinate and participate in a variety of security training sessions, there is no overarching Park Service-specific training program or curriculum. Instead, security training is decentralized and thus there is little assurance that Park Service employees have the knowledge, skills, and awareness needed to contribute to overall park security. In order to better oversee and more efficiently manage the protection of the vast and diverse inventory of national icons and parks, we are recommending that the Secretary of the Interior take six actions. Specifically, the Secretary should instruct the Director of the National Park Service, in consultation with OLES, to develop and implement: (1) a more comprehensive, routine risk management approach for security; (2) guidance and standards for leveraging security technology; (3) an internal communications strategy for security to address communications gaps, including a timeline for the development of a servicewide Web portal for security; (4) a servicewide performance management and testing program that includes specific measures and an evaluation component; (5) a strategy for more clearly defining security roles and responsibilities within the Park Service; and (6) a servicewide security training program and related curriculum. We provided a draft of this report to Interior for official review and comment. Interior agreed with our assessment that actions are needed to improve security practices at national icons and parks, and agreed with the report's recommendations. Interior also provided additional information--including general comments from the Park Police--which is discussed near the end of this letter. Interior's official comments are contained in appendix II. Additionally, the Park Police provided technical comments that we incorporated, where appropriate. Background: Interior is responsible for the safety and security of more than 67,000 employees, 280,000 volunteers, 1 million daily visitors, and 500 million acres of public lands that include national icons and parks. After September 11, the Secretary of the Interior took steps to address serious organizational and management problems in the law enforcement and security components of the department. Of particular concern, according to the Interior IG, was the lack of coordination among these components and the absence of a meaningful single point of contact that the Secretary and senior managers could depend upon for reliable information and advice.[Footnote 8] The Secretary approved a Deputy Assistant Secretary for Law Enforcement and Security in July 2002, and established OLES to oversee the department's law enforcement and security efforts and ensure their consistent application across Interior's bureaus and offices. Specific to icon protection, in 2003, Homeland Security Presidential Directive 7 (HSPD-7) designated Interior as the sector-specific agency for the National Monuments and Icons critical infrastructure sector, and Interior selected OLES to carry out sector responsibilities.[Footnote 9] To fulfill its duties, OLES officials developed a national monuments and icons sector-specific plan in which they defined national icons as: (1) monuments, physical structures, or objects; (2) recognized both nationally and internationally as representing the nation's heritage, traditions, and/ or values or are recognized for their national, cultural, religious, historical, or political significance; and (3) serve the primary purpose of memorializing or representing significant aspects of our nation's heritage, traditions, or values and serve as points of interest for visitors and educational activities.[Footnote 10] In accordance with its assigned duties, OLES officials also developed a uniform risk assessment and ranking methodology to quantify risk, identify needed security enhancements, and measure risk-reduction benefits at icons. OLES officials used this methodology to assess risks at the icons during 2004 and 2006. OLES has also issued sector annual reports and established a sector government coordinating council. The Park Service's mission is the unimpaired preservation of the natural and cultural resources and values of the national park system. The Park Service is responsible for managing the national icons and the national park system. In 2008, the Park Service welcomed almost 275 million visitors to its nearly 400 national park units throughout the United States, American Samoa, Guam, Puerto Rico, and the Virgin Islands. Within the Visitor and Resource Protection division of the Park Service, the Law Enforcement, Security, and Emergency Services branch provides policy formulation, oversight, support services, guidance, and leadership to assist park managers and law enforcement staff in accomplishing the Park Service's visitor protection goals and objectives. This branch is led by a chief and has one position dedicated to security and intelligence management. Park superintendents and rangers manage and provide security and law enforcement services at icons and parks throughout the United States in conjunction with their other duties. These other duties include the management of public use, dissemination of scientific and historical information, and protection and management of natural and cultural resources. The Park Police, which is a Park Service component, provides law enforcement and security services for national icons and parks in Washington, D.C.; New York City; and San Francisco. The Park Police has also staffed law enforcement specialists in four of seven Park Service regions including the National Capital, Northeast, Intermountain, and Pacific West regions.[Footnote 11] We have identified a set of six key protection practices from the collective practices of federal agencies to provide a framework for guiding agencies' protection efforts and addressing challenges. [Footnote 12] The following are the key practices we used for this review: * Allocation of resources using risk management: Identify threats, assess vulnerabilities, and determine critical assets to protect; use information on these and other elements to develop countermeasures; and prioritize the allocation of resources as conditions change. * Leveraging of technology: Select technologies to enhance asset security through methods like access control, detection, and surveillance systems. This involves not only using technology, but ensuring that there are positive returns on investment in the form of reduced vulnerabilities. * Information sharing and coordination: Establish means of coordinating and sharing security and threat information internally, within large organizations, and externally, with other government entities and the private sector. * Performance measurement and testing: Use metrics, such as implementation timelines, and active testing, such as unannounced on- site assessments, to ensure accountability for achieving program goals and improving security at facilities. * Strategic management of human capital: Manage human capital to maximize government performance and assure accountability in asset protection through, for example, recruitment of skilled staff, training, and retention. We have used the key practices to evaluate the efforts of the Smithsonian to protect its assets,[Footnote 13] DHS to protect its facilities,[Footnote 14] and federal agencies to protect icons and facilities on the National Mall.[Footnote 15] For example, in 2007, we found that while the Smithsonian follows key practices to protect its assets, it faces challenges related to ensuring that museum and facility directors are aware of information on security and funding constraints. Similarly, in 2005, we found that federal agencies[Footnote 16] on the National Mall--the Park Service, Smithsonian, National Gallery of Art, Department of Agriculture, and U.S. Botanic Garden--were using five of the six key practices to implement security enhancements. Also, in 2007, we reported that DHS had taken actions intended to improve the security of its facilities, but its efforts fell short in certain key areas, such as DHS components not fully implementing risk management. Moreover, the ISC--a body that addresses the quality and effectiveness of security requirements for federal facilities through developing and evaluating security standards for federal facilities--is using our key protection practices as key management practices to guide its priorities and work activities. For example, ISC established subcommittees for technology best practices and training, and working groups in the areas of performance measures and strategic human capital management. ISC also issued performance measurement guidance in 2009. [Footnote 17] The Park Service Does Not Manage Risk Servicewide or Ensure the Best Return on Security Technology Investments: While the Park Service, with the assistance of OLES, has assessed risks at the icons and southwest border parks, it has not adopted a servicewide approach to risk management, including policies, guidance, and tools to support risk assessments at the remaining parks. Furthermore, although icon and park officials have acquired a variety of technologies to enhance security, they do not have guidance to evaluate the cost-effectiveness of proposed or actual countermeasures. The Park Service Has Focused Risk Management Efforts on Icons and Border Parks but Vulnerabilities Remain: We have reported that most risk management approaches generally involve identifying the assets that are most critical to protect in terms of mission and significance, identifying potential threats, assessing vulnerabilities, and evaluating mitigation alternatives for their likely effect on risk and their cost.[Footnote 18] The Park Service and OLES generally employed such an approach in identifying five icons as critical assets to protect, assessing risks, and implementing countermeasures. Specifically, OLES conducted its first round of icon risk assessments during 2004, through which it identified vulnerabilities that the icons shared. Officials at the icons worked on implementing the assessments' recommendations; therefore OLES's 2006 icon risk assessments and 2007 compliance reviews noted significant security improvements, including new surveillance and monitoring equipment, some barriers installed to protect against vehicle explosions, and enhanced visitor screening stations and procedures. In addition to prioritizing icon security, during 2008 the Secretary of the Interior directed the Park Service to focus on border park security through its "Safe Borderlands" initiative, and as a result, the Park Service has also taken steps to balance security and public access at southwest border parks. About 41 percent of the land along the U.S. southwest border is under the control and custody of Interior's land management bureaus, including five parks that are under the Park Service. These border parks face security challenges related to drug smuggling and other unlawful activities in the area, which have also caused significant environmental damage. The Safe Borderlands initiative aims to strengthen Interior's--including the Park Service's- -law enforcement capabilities, improve its radio communications, and lessen the environmental impact of illegal activities. The Park Service and other Interior bureaus have assessed risks and increased staffing along the southwest border, and have installed security features, such as vehicle barricades and sensors at certain border locations, in an effort to prevent illegal aliens and drug smugglers from entering. According to Park Service officials from the Intermountain Region, all border parks in their region have ground sensors to detect illegal traffic and some have alarm systems. Despite the significant improvements made in icon security, we noted some cases in which recommended security countermeasures were not implemented and vulnerabilities remain.[Footnote 19] Park officials at the Statue of Liberty told us that the icon security plan had not been updated since its creation in 2002; however, later in our review, Park Police officials told us they updated this plan during 2008.[Footnote 20] Park officials at the Gateway Arch have also made notable security improvements, such as moving the dispatch center away from the arch. However, vulnerabilities still exist at the park, and security breaches have occurred. Officials from both icons told us that, while they identify and prioritize security needs, security projects compete with other operational needs, and these officials must prioritize and balance competing interests as best they can. The Park Service Lacks a Systematic Approach for Allocating Resources Using Risk Management: Park Service officials at the national, regional, icon, and park levels told us that security awareness has increased throughout the organization, largely because of Interior's initiative to assess security risks at the icons, and the resources the Park Service has allocated to address these concerns; yet the Park Service has not formally applied risk management principles for the rest of its national parks inventory. We have reported that allocating resources using risk management is a systematic and analytical process to consider the likelihood that a threat will endanger an asset-- structure, individual, or function--and identify, evaluate, select, and implement actions that reduce the risk or mitigate the consequences of an event.[Footnote 21] However, the Park Service does not require that other parks undergo risk assessments and therefore there has been no comprehensive servicewide assessment, prioritization, and mitigation of vulnerabilities. Instead, Park Service officials use their discretion to request risk assessments from the Park Service or another entity, and as a result, risk assessments can vary in their scope and methodology from park to park. Even if Park Service officials obtain risk assessments, they may not use them to guide park operations, or they may find it challenging to interpret and implement recommended actions because they are unfamiliar with the risk assessment process. Of the three parks we reviewed, only the African Burial Ground had received a comprehensive risk assessment because it is in a high- security federal facility that is under the control and custody of the General Services Administration (GSA) and is protected by the Federal Protective Service (FPS).[Footnote 22] The risk assessments of the other two parks were limited in scope. * The African Burial Ground is adjacent to a high security multitenant federal building in New York City and the visitor center is inside the building. Therefore, the Park Service authorized FPS to provide law enforcement and security services--such as conducting security assessments and recommending countermeasures through a memorandum of understanding. Furthermore, because the Park Service is a tenant in a GSA building, it receives certain protection services from GSA. For example, FPS, GSA, and the Park Service collaborated to identify perimeter fencing for GSA to install around the monument that maintained park aesthetics and provided protection based on FPS and GSA security standards (see figure 1). Also, according to the Northeast regional chief ranger, the former regional physical security specialist completed a risk assessment of the park in 2006. In accordance with the memorandum, FPS will continue to address security vulnerabilities at the African Burial Ground, such as visitor screening, in collaboration with the park. Figure 1: Perimeter Fencing at the African Burial Ground: [Refer to PDF for image: photograph] Source: GAO. [End of figure] * In 2008, the Gettysburg Foundation--a private, nonprofit educational organization working with the Park Service at Gettysburg--hired a security consulting firm to complete a risk assessment specifically for the new visitor center and museum that it constructed on its land within the park. The assessment included recommendations for protecting artifacts, infrastructure, visitors, and staff, and the Gettysburg Foundation implemented some of the countermeasures. For example, the Gettysburg Foundation purchased surveillance cameras, and Park Service rangers monitor them. The Park Service is responsible for protecting visitors and providing a safe environment for visitors and staff. Moreover, the risk assessment was only for the visitor center and museum, not the park as a whole. According to the chief ranger, the park faces security challenges from the numerous roads leading into it and its open borders. * In 2006, Park Service officials at the Grand Canyon--with more than 4 million visitors annually--requested a risk assessment through their participation in the Arizona Joint Terrorism Task Force (JTTF). [Footnote 23] The Arizona Counter Terrorism Information Center fulfilled the request and identified points of vulnerability and potential security improvements at the park. The center's assessment cited concerns with the location of the dispatch center and wiring system, and Park Service officials are taking steps to mitigate these risks, such as moving the dispatch center to a more secure location and upgrading the wiring. Additionally, Park Service officials enhanced security for the fee collection booths by having surveillance cameras installed. However, even though the assessment contained actionable items, the chief ranger told us it lacked details that would have made it more helpful. The chief ranger considered assigning a Park Service staff person to the center to learn more about the risk assessment methodology, but the time commitment was prohibitive. In addition to lacking a systematic approach for assessing risk throughout its inventory, the Park Service lacks guidance and tools that officials at icons and parks can use to develop risk management strategies. The Park Service's 40-chapter law enforcement manual, which was updated in 2008, focuses primarily on law enforcement policies and responsibilities. One chapter on physical security[Footnote 24] broadly outlines the duties of the physical security coordinator and delineates closed-circuit television policy, but does not include other guidance such as risk assessment procedures and how to use technology to enhance security. Park Service officials we spoke with had mixed views on the manual. Officials from three of the four regions we spoke with said the manual lacks comprehensive physical security information and guidance, while officials from the fourth region considered the manual to be useful. While officials at the Gateway Arch and Gettysburg told us that they used the manual and found it useful for physical security, officials at the Statue of Liberty and the Grand Canyon said they did not use the manual to guide park security operations. The superintendent at the African Burial Ground told us that other Park Service staff advising the park refer to the manual. Park Police officials told us that they do not use the Park Service's law enforcement manual. Instead, they rely on the Park Police law enforcement manual for security guidance at locations where the Park Police are responsible for physical security, such as the Statue of Liberty. The Park Service also relies on Interior's physical security manual which sets forth the policies designed to safeguard Interior personnel and facilities, including buildings, grounds, and other property. OLES developed the manual using the Department of Justice's facility security level standards and minimum security countermeasure standards. [Footnote 25] OLES officials told us that they adopted ISC's updated facility security level standards,[Footnote 26] and notified bureau security managers of changes. The Park Service's Acting Chief of the Law Enforcement, Security, and Emergency Services division and the Security and Intelligence Program Manager told us that they are developing a process for updating icons' and parks' individual facility security levels based on the revised standards. However, the department- level physical security manual is focused on general facility protection and officials from the regions, icons, and parks told us it would be more useful if it were tailored to park-specific security issues. For example, officials from two of the regions we spoke with found the manual unhelpful, though officials from the other two regions considered the manual the main driver for security policy. Park Service officials at the icons and parks we spoke with had mixed reviews as well. For example, officials at the Gateway Arch and Gettysburg told us that they used the manual and found it useful--much as they did the Park Service's law enforcement manual--while officials at the Statue of Liberty and the Grand Canyon said they did not use the manual to guide park security operations. While officials at icons and parks are required to develop and implement physical security plans and conduct physical security surveys, there is no standardized approach, tools, or guidance for carrying out these responsibilities. In the absence of a standardized approach, some Park Service officials from the regions are developing their own risk assessment tools and guidance for parks to use. Although officials from the regions are taking actions that could help parks allocate resources using risk management in accordance with the key practice, these initiatives are being developed independently without a servicewide strategy. * The Intermountain regional office has provided parks with a physical security plan template and workbook with guidance on how to assess risk and identify appropriate countermeasures. * The Midwest regional office is updating a small parks assessment program that it originally created during 2002 by developing a physical security assessment checklist for Park Service rangers to identify deficiencies at parks. * The Northeast regional office plans to create a team made up of rangers and cultural staff that they can send to parks to work with staff to assess security and develop strategies to mitigate vulnerabilities. At the national level, the Park Service recognizes that parks should have tools available to help them assess risks and that physical security plans and assessments should be standardized. Therefore, the Park Service is developing a physical security handbook to standardize physical assessment processes servicewide. Park Service officials are using a U.S. Geological Survey physical security handbook and Interior's physical security manual to develop the Park Service's physical security handbook. The Park Service is also developing a small park assessment program based on the Midwest Region's program, which it intends to test in one region before implementing it servicewide. However, the Park Service has not considered the other regions' approaches and is therefore missing an opportunity to leverage best practices and lessons learned, and create buy-in for a new security program. For example, the Acting Chief of the Law Enforcement, Security, and Emergency Services division and the Security and Intelligence Program Manager were unfamiliar with the Intermountain Region's physical security template and workbook, explaining that officials at each regional office take their own approach to physical security. Lacking a systematic approach for assessing risk throughout the Park Service's inventory of icons and parks has negative effects. First and foremost, the Park Service lacks assurance that decisions about security are based on an assessment of potential threats and countermeasures. Although highly visible icons are the most plausible terrorist targets, it is not unreasonable to presume that parks with high visitor volumes or other national parks, monuments, memorials, and facilities that have symbolic value may also be targets. Second, risk management practices provide the foundation for a comprehensive protection program. Hence, efforts in the other key practice areas-- leveraging technology, information sharing and coordination, performance measurement and testing, and human capital management--are diminished if they are not part of a risk management approach which can be the vehicle for using these practices. Lastly, as previously discussed, individual efforts by officials at regions, icons, and parks to develop risk management tools and security approaches in the absence of overarching guidance are not conducive to sharing lessons learned and leveraging efficiencies. The Park Service Does Not Have Guidance or Standards That Would Assist Icons and Parks in Leveraging Technology: Officials at icons and parks use a variety of technologies and other countermeasures--such as video and surveillance monitoring equipment, visitor screening equipment, vehicle barriers, and door locks--to enhance security operations (see table 1). We have reported that by efficiently using technology to supplement and reinforce other security measures, agencies can more effectively address vulnerabilities identified through the risk management process with appropriate countermeasures.[Footnote 27] Table 1: Examples of Technologies and Other Countermeasures that Icons and Parks Use to Enhance Security: Icon or park: African Burial Ground; Technologies and other countermeasures: The park worked with FPS and GSA to identify and install perimeter fencing that would balance security with the aesthetics of the monument. Icon or park: Gateway Arch; Technologies and other countermeasures: The park installed bollards for perimeter protection, some of which can be controlled at the entry points by entering a code into a keypad, or remotely by the dispatch center. The park is modernizing its dispatch center which will incorporate radio-over-Internet-protocol technology and software-driven security equipment, ensuring continued operations should the dispatch center be damaged during an emergency. Icon or park: Gettysburg; Technologies and other countermeasures: The Gettysburg Foundation implemented keyless lock technology for the park's new visitor center, and the Park Service programs electronic key cards for each employee, thus limiting access to an employee's area of responsibility. The Gettysburg Foundation implemented video surveillance equipment, such as closed-circuit television and motion detectors, and the Park Service operates it. Icon or park: Grand Canyon; Technologies and other countermeasures: The park purchased and installed video and surveillance equipment, such as digital video recording technology and closed-circuit television, to secure fee collection booths at park entrances. Icon or park: Statue of Liberty; Technologies and other countermeasures: The park installed temporary visitor screening stations at Battery Park in New York City and Liberty State Park in New Jersey. Visitors and their belongings must go through magnetometer and X-ray screening before boarding the ferries to Liberty Island. The park also installed a secondary screening station at Liberty Island for visitors who want to go to the observation deck level of the statue. In addition to magnetometers and X-ray machines, this station has radiation and explosives detection devices. Sources: GAO site visits and analysis of Park Service data. [End of table] Additionally, officials at icons we reviewed are partnering with other agencies to test and obtain security technologies. By pooling resources and sharing equipment, officials at icons are leveraging expertise and cost-effectively enhancing their security. As we have reported, technology implementation costs can be high, and the type of technology used should be carefully analyzed to ensure its effectiveness and efficiency.[Footnote 28] For example, at the Statue of Liberty, the U.S. Air Force used the park as a testing ground for emerging technologies, and the arrangement allowed the Park Service to keep the equipment. For example, according to Park Service officials, the U.S. Air Force has tested wireless cameras, weather stations, and chemical, radiological, biological, nuclear, and explosives detection systems on Liberty Island. Park Service and Park Police officials told us that the weather stations are particularly useful to them since the Federal Aviation Administration (FAA) requires weather data for fining aircraft that violate airspace rules near the Statue of Liberty. According to the Park Police, this partnership has been extended into 2010. Despite icon and park officials' use of various technologies and other countermeasures to enhance security, the Park Service has not developed guidance on how to evaluate the cost-effectiveness of proposed or actual security investments. We have recognized that having an approach that allows for cost-effectively leveraging technology to supplement and reinforce other measures would represent an advanced security approach in this area.[Footnote 29] Without such guidance, icon and park officials rely on other methods to identify systems and equipment that best suit their needs. This, however, is an inefficient way to enhance security, particularly in light of icon and park officials' competing resource demands and regular developments in technology that necessitate upgrades. For example, officials from two Park Service regions told us that parks contact them for assistance in identifying security equipment. Officials at the icons we reviewed cited instances of using a trial and error approach to identify cost-effective and suitable technologies. For example, officials at both the Statue of Liberty and the Gateway Arch use magnetometers and X-ray machines to screen visitors and their belongings. After several years of purchasing security equipment, Park Police officials at the Statue of Liberty have realized that they can acquire new and more effective space-saving visitor screening equipment faster through leasing agreements. Park Police officials told us that they intend to lease equipment in the future to stay current with emerging technologies and ensure equipment is maintained. Moreover, in its 2007 compliance review, OLES recommended that park officials lease equipment because such an approach would allow for quicker and less costly upgrades as new technology is developed. In contrast, Park Service officials at the Gateway Arch plan to continue purchasing this equipment. Officials at both icons have made these decisions based on preference without formal cost-benefit analysis. Officials from the Midwest Regional Office, Statue of Liberty, and Gateway Arch suggested that the Park Service could better assist icon and park officials in making informed decisions about security technologies and other countermeasures. The Park Service Lacks a Servicewide Approach to Sharing Information Internally and Measuring Performance: The Park Service has information sharing and coordination arrangements with external organizations at the national, regional, icon, and park levels, but lacks comparable arrangements for internal security communications that would allow icon and park officials to share information with one another on common security problems and solutions. In addition, officials at the regions, icons, and parks have discretion to implement security performance measures and testing, but the Park Service lacks a servicewide approach for measuring and testing the results of its security efforts. As a result, little consolidated performance information is available for icon and park officials to use in managing their day-to-day activities or for Park Service management to use in managing security efforts throughout the organization. The Park Service Shares Information and Coordinates with External Organizations, but Internal Coordination Is Limited: At the national, regional, icon, and park levels, the Park Service has made progress in sharing information and coordinating with other law enforcement, security, and emergency management entities. We have reported that information sharing and coordination among organizations is crucial to producing comprehensive and practical approaches and solutions to addressing terrorist threats directed at federal assets. [Footnote 30] By having a process in place to obtain and share information on potential threats to federal assets, agencies can better understand the risks they face and more effectively determine what preventive measures should be implemented.[Footnote 31] At the national level, the Park Service's Security and Intelligence Program Manager analyzes intelligence from various sources including the Federal Bureau of Investigation (FBI), DHS, and Interior, and disseminates this information to officials at regions, icons, and parks. This manager also attends department-level quarterly meetings of Interior's Security Advisory Council.[Footnote 32] According to OLES officials, meeting attendees are encouraged to disseminate information discussed at the meetings to pertinent staff within their respective bureaus and offices. By collaborating with area law enforcement, security, and emergency management entities, officials at regions, icons, and parks receive threat information and leverage security expertise (see table 2). For example, officials at the Gateway Arch said they are collaborating with area federal agencies such as TSA, the Federal Air Marshal Service, and FBI to form a federal screeners working group to share best practices and learn about new technologies. Table 2: Examples of Information Sharing and Coordination at Park Service Regions, Icons, and Parks: Region: Intermountain; Collaborates with DHS on border park protection and has a memorandum of understanding for the two entities to establish radio-sharing responsibilities; Coordinates with the Bureau of Reclamation to secure dams; Receives intelligence information from the area JTTF. Region: Midwest; Participates on the Nebraska Anti-Terrorism Advisory Council; Attends regular meeting of area chiefs of police, sheriffs, and other law enforcement officials; Coordinates with law enforcement officials in the vicinity of Mount Rushmore National Memorial. Region: Northeast; Collaborated with the Smithsonian Institution on a risk assessment of a Smithsonian asset; Collaborated with FBI, the J. Paul Getty Trust, and the Smithsonian Institution to develop a 3-day museum security awareness conference. Pacific West; Receives intelligence information from area JTTFs. Icon or park: African Burial Ground; Coordinates with the New York Police Department for park events; Maintains a memorandum of understanding with DHS, which outlines FPS's security responsibilities for the park. Icon or park: Gateway Arch; Forming a federal screeners working group with area agencies such as TSA, the Federal Air Marshal Service, and FBI to share best practices and learn about new technologies; Provides a backup terminal for the Department of Justice Interoperability Project which is intended to unify various radio communications to enhance agencies' emergency response; Member of the Illinois State Terrorism Intelligence Center. Icon or park: Gettysburg; Pays for a seat on the local dispatch center, which provides 24-hour access and linkage to the state emergency center. Icon or park: Grand Canyon; Coordinates with FBI to dispense annual training for the park, and in turn the park provides space for FBI to conduct training for FBI and other agencies; Coordinates with the U.S. Marshals Service for warrant services and prisoner transport. Icon or park: Statue of Liberty; Connected to FAA's Domestic Events Network, allowing dispatch center staff to track nearby aircraft; Coordinates with FBI and the U.S. Coast Guard for maritime security; Has a Park Police detective assigned to the New York City JTTF. Source: GAO analysis of Park Service data. [End of table] While collaboration with partner agencies has expanded, the Park Service has not fully leveraged information sharing and coordination mechanisms that could strengthen the ability of officials at regions, icons, and parks to share threat information and identify common security problems and solutions. We have reported that sharing information on threats and incidents that others have experienced can help an organization identify trends better, understand the risks it faces, and determine what countermeasures it should implement.[Footnote 33] Specifically, an information sharing practice that we have found to be an important success factor in protecting critical infrastructure is holding regularly scheduled meetings during which participants can share security management practices, discuss emerging technologies, and create committees to perform specific tasks such as policy setting. [Footnote 34] However, the Park Service's use of regularly scheduled security meetings is limited, and security discussions typically occur on an as-needed basis. The Park Service's Law Enforcement, Security, and Emergency Services branch holds a monthly conference call with regional chief rangers, which covers a variety of topics and is not solely focused on security. Regional officials we spoke with said they meet with icon and park officials to discuss security issues on an as- needed basis. Icon and park officials can contact Park Service regional law enforcement or even the Park Service's Intelligence and Security Program Manager for security assistance as needed. Icon and park officials could access needed information anytime through a Park Service security Web portal, but this tool does not exist servicewide and is instead under development. We have reported that secure Web portals are another important success factor in protecting critical infrastructure and can ensure effective and timely communication among an organization's members.[Footnote 35] Web portals can be used to (1) disseminate all types of information, including alerts, advisories, reports, and other analysis; (2) provide methods for members to ask each other about particular incidents, vulnerabilities, or potential solutions; and (3) share sensitive information.[Footnote 36] For example, GSA's security division is developing a Web portal to track incidents, share threat information, post security policies and other related documents, and enable virtual security discussions. The Park Service recognizes a need to improve its use of technology to disseminate security information through mechanisms such as a Web site and Web conferencing, thereby enhancing its application of the information sharing and coordination key practice. However, the Park Service's security Web portal is still under development without a timetable for completion. According to OLES officials, Interior's Office of Emergency Management maintains a secure Web site known as SAFETALK, where sensitive information and policies can be exchanged and stored. However, only authorized individuals are allowed to access the portal, and over the course of our review, no Park Service or Park Police officials we spoke to at the national, regional, icon, or park levels cited this Web site as a primary security information source. Without its own Web portal, the Park Service is limited in its ability to disseminate key icon and park- specific security information and guidance to icons and parks efficiently and raise security awareness overall. In the absence of a servicewide secure Web portal, some Park Service regional offices have developed law enforcement and security Web sites, but the functionality, content, and usage of these sites vary from region to region. For example, while officials from the Intermountain regional office said that they regularly update their Web site with security resources, officials from the Midwest and Pacific West regions said their law enforcement and security Web sites were used infrequently and not to their fullest extent. The Midwest regional chief ranger told us that officials from the region's icons and parks make limited use of the regional Web site, instead preferring to contact someone in the regional office for assistance or to obtain policy documents. Officials from the Midwest and Pacific West regions acknowledged that more could be done to enhance the content of their Web sites and promote greater usage. For example, the Pacific West regional chief ranger cited the inability of parks to communicate with one another as a limitation on the usefulness of the regional Web site as a tool for protecting visitors and resources. The Web site offers one-way communication from the region to the field, but the region is trying to increase the site's functionality and usage by adding discussion threads and message boards, and displaying successful park security strategies and plans. Also, the Northeast regional chief ranger told us the office is considering creating a Web site to post security-related lessons learned and security assessment templates. The Park Service Lacks a Servicewide Approach for Routine Performance Measurement and Testing: The Park Service--at the national level--has no standardized performance measures, evaluation mechanisms, or a testing program for security servicewide. We have reported that successful performance measures should (1) be linked to an agency's mission and goals; (2) be clearly stated; (3) have quantifiable targets or other measurable values; (4) be reasonably free of significant bias or manipulation that would distort the accurate assessment of performance; (5) provide a reliable way to assess progress; (6) sufficiently cover a program's core activities; (7) have limited overlap with other measures; (8) have balance, or not emphasize one or two priorities at the expense of others; and (9) address governmentwide priorities.[Footnote 37] Linking goals to a security program can be used to hold agencies and program offices accountable for achieving those goals. Furthermore, we reported that such alignment increases the usefulness of performance information to decision makers.[Footnote 38] Although the Park Service requires icon and park officials to report security incidents, it has no centralized reporting and analysis mechanism, thus these Park Service units have created their own incident-tracking tools. The Park Service began developing an incident reporting and analysis tool in 2003, but Interior decided to transfer the project to OLES and leverage it for the whole department. Interior's intent is that all bureaus--including the Park Service--will use the Incident Management Analysis and Reporting System for a variety of security performance measurement and management activities, such as reporting incidents, identifying training and resource needs, justifying resource requests and expenditures, measuring program performance, and tracking training. These functions coincide with some of the uses and results of performance measurement that we have recognized, such as assessing the change in the total number of security incidents to evaluate program effectiveness and inform the overall risk management approach, as shown in figure 2.[Footnote 39] However, Interior expects that this tool will not be available until 2011 or 2012, therefore, until the new system is implemented, the Park Service will continue to be limited in its ability to identify common threats and incidents--information which it could use to evaluate risk management strategies and countermeasures, identify problems, and develop solutions. Figure 2: Performance Measures, Uses, and Results: [Refer to PDF for image: illustration] Performance measure examples: * Risk assessments conducted; * Compliance with security policies; * Change in total number of security incidents; * Change in risk rating resulting from countermeasures deployed. Selected uses: * Ensure adequate protection; * Inform risk management; * Allocate security resources; * Hold employees accountable for security goals and objectives; * Evaluate program effectiveness. Potential results: * Improvement in physical security; * Physical security investments that justify costs; * Reduction in facilities‘ vulnerability to acts of terrorism and other forms of violence; * Prioritization of funding within and across agencies. Source: GAO. [End of figure] Regional officials may perform two to three park law enforcement operational evaluations annually by selecting parks for evaluation or responding to a park's request for an evaluation. These assessments have a small security component, but are not security evaluations. For example, the Midwest regional chief ranger examines the security of park fee collections and the types of locks on windows and doors of park facilities, according to this official. Officials from some of the icons and parks we reviewed recognized a need for standardized performance measures and testing. For example, Park Police officials at the Statue of Liberty told us they would like a standardized testing and evaluation program for security technologies, instead of solely relying on informal testing efforts such as the Park Police's collaboration with TSA to test visitor screening equipment. Similarly, Park Service officials from the Gateway Arch expressed an interest in coordinated reviews of the park's security that would incorporate markers for achievement. Because performance is measured and tested occasionally and inconsistently, officials from icons and parks have limited opportunities for sharing lessons learned or using performance data to manage security from a broader perspective. We have reported that performance measurement can help achieve broad program goals and improve security at the individual asset level. [Footnote 40] Without effective performance measurement data, decision makers may have insufficient information to evaluate whether their investments have improved security or reduced vulnerabilities to threats such as terrorism or crime. We have also reported that active testing, using methods such as on-site security assessments, can provide data on the effectiveness of efforts to reduce vulnerabilities. [Footnote 41] Because the Park Service's performance management and testing capability is limited, the agency has little information on the status and performance of security activities at the icons and parks it can use to manage day-to-day activities or that Park Service management can use to strategize security efforts throughout the organization. Absent a formal performance measurement system and testing program, officials at icons and parks individually identify security program components to test, such as focusing on equipment and procedural knowledge. We have reported that testing methods include conducting inspections to ensure that adequate levels of protection are employed, testing the effectiveness of security measures such as structural enhancements and physical barriers, and assessing preparedness through training exercises and drills.[Footnote 42] We found some examples of tests, exercises, and drills that park officials use to assess security performance at icons and parks (see table 3). For example, officials at the Grand Canyon said that they analyze law enforcement and security incidents to shape patrol strategies, and officials at the Statue of Liberty told us they hold emergency exercises with the New York Police Department and FBI. Table 3: Examples of Security-related Tests, Exercises, and Drills: Icon or park: African Burial Ground; Tests, exercises, and drills: FPS tests employee and visitor screening equipment. The park participates in biannual fire drills and annual shelter-in-place drills that GSA conducts for the facility. Icon or park: Gateway Arch; Tests, exercises, and drills: The park tests guards' operation of X-ray equipment for visitor screening daily. The park tests the arch's emergency power and fire alarm system annually. The park participated in continuity of operations and pandemic flu tabletop exercises and evaluations. Icon or park: Gettysburg; Tests, exercises, and drills: The chief ranger checked the effectiveness of the park's evacuation training by informally testing park staff on evacuation procedure recall. Icon or park: Grand Canyon; Tests, exercises, and drills: The park tests its evacuation plan biannually--one tabletop exercise and one drill of a component of the evacuation plan. Icon or park: Statue of Liberty; Tests, exercises, and drills: The guard service contractor has an internal audit program with four assigned program evaluators for the park to test security guards' performance. The park conducts several emergency exercises with the New York Police Department and FBI. The park participates in tabletop exercises with the New York and New Jersey Port Authority and the U.S. Coast Guard. Source: GAO analysis of Park Service data. [End of table] Human Capital Management Lacks a Security Focus: The Park Service assigns security duties to selected regional staff and requires that icon and park superintendents designate physical security coordinators, but it does not require these staff to have physical security experience or expertise, and it does not provide them with specialized security training. As a result, there is little assurance that staff are equipped to effectively identify and mitigate risks at icons and parks. Security Roles Are Not Well Defined and Training Is Limited: The Park Service has security staff at the national, regional, icon, and park levels that have a variety of security and other duties. We have reported that the strategic management of human capital is a key practice that can maximize the government's performance and ensure the accountability of its security-related efforts.[Footnote 43] At the national level, the Park Service has established a Security and Intelligence Program Manager position within its Law Enforcement, Security, and Emergency Services division. This position was created in 2003, in response to a 2002 Interior IG recommendation that Interior bureaus install full-time security managers.[Footnote 44] We have also recognized the importance of having a chief security officer position and the security industry maintains that such a position is essential in organizations with large numbers of mission-critical assets. [Footnote 45] Moreover, a security trade organization--ASIS International[Footnote 46]--has developed chief security officer guidance for organizations to use in developing a security leadership position that would establish a comprehensive, integrated security risk strategy.[Footnote 47] The Acting Chief of the Law Enforcement, Security, and Emergency Services division and the Security and Intelligence Program Manager told us that the Park Service has structured the manager position to disseminate and coordinate information among Park Service units, instead of establishing a managerial position that oversees and directs security activities at regions, icons, and parks. The Security and Intelligence Program Manager performs a variety of duties, such as liaising with DHS to improve security within the southwest border parks, coordinating with OLES to develop semiannual security workshops, conducting risk assessments when parks request them, and gathering, analyzing, and disseminating intelligence information. This official also oversees some of the national initiatives we have previously described, such as the small parks assessment program and the security Web portal. According to the Security and Intelligence Program Manager, as the Park Service has become more aware of this resource, the manager's activities have increased, especially in the area of physical security. At the regional level, security responsibilities are assigned to law enforcement staff that also have other duties in the areas of law enforcement and emergency management. Of the four regional offices we reviewed, only the Northeast Regional Office, had a full-time position dedicated to security. From 2002 to 2007, the regional office employed a physical security and intelligence specialist who performed a variety of activities such as conducting risk assessments, establishing technology-sharing relationships with other federal agencies, and analyzing and disseminating intelligence throughout the agency. This position was vacated in 2007, but the regional chief ranger is trying to staff this position again and is revising the position description to focus on physical security. Park Police law enforcement specialists are staffed to the National Capital, Northeast, Intermountain, and Pacific West regional offices and can provide security assistance. Regional Park Service and Park Police staff who have security responsibilities are available to help icons and parks that request their services. These staff may conduct risk assessments or help identify security technologies or other countermeasures, as shown in table 4. Table 4: Security Positions at Regions, and Examples of Activities: Region: Intermountain; Activities: The regional chief ranger and two Park Police captains have security duties. The Park Police captain advises parks on security equipment costs and quality. The region has promoted the practice of parks upgrading and implementing alarms and cameras which they report has reduced vandalism. Region: Midwest; Activities: The regional chief ranger and assistant chief ranger have security duties, and the office uses the physical security specialist from the Gateway Arch to conduct risk assessments at parks throughout the region. The assistant chief ranger manages fee collections security programs, supports security programs in parks that do not have rangers on staff, and advises park superintendents on security matters. Region: Northeast; Activities: The regional chief ranger and assistant chief ranger have security duties. The region employed a physical security specialist from 2002 until 2007, and is trying to fill the vacancy. This specialist established contacts and coordinated with external agencies to acquire security intelligence and training; conducted park risk assessments; and provided training in explosive devices and checkpoint security for rangers at icons and urban parks. A Park Police captain currently assigned to the region has a background in icon protection and has been involved with protection efforts at the Statue of Liberty. Region: Pacific West; Activities: The region relies on the Park Police at the San Francisco Field Office for security expertise. A Park Police sergeant assists with security assessments throughout the region and at times may visit a park to conduct a comprehensive review of the facilities. Source: GAO analysis of Park Service data. [End of table] The Park Service requires icon and park superintendents to designate physical security coordinators and expects them to develop and implement park physical security plans and conduct physical security surveys of all structures. Park Service officials told us that, typically, physical security coordinators are park rangers or maintenance managers, who have other duties and responsibilities in addition to security. Moreover, because of the small size of some parks, one person may serve as the physical security coordinator for several parks. For example, the Intermountain Regional Chief Ranger told us that the region has 41 physical security coordinators positioned at about 56 of its 78 parks. We found that physical security coordinators perform a variety of duties, such as overseeing dispatch center operations and reviewing video surveillance images, as shown in table 5. Additionally, Park Service law enforcement rangers and Park Police staff at icons and parks have some security responsibilities in addition to law enforcement duties. Table 5: Security Positions at Icons and Parks, and Examples of Activities: Icon or park: African Burial Ground; Activities: The Northeast Regional Park Police captain will fulfill the role of the physical security coordinator until fiscal year 2010, when the park is fully staffed. The former Northeast region physical security specialist participated in visitor center design discussions and coordinated FPS involvement, review, and approval of security systems. Icon or park: Gateway Arch; Activities: The physical security specialist is the designated physical security coordinator and has responsibility for the operations, planning, and supervision of the dispatch center and operation of physical security checkpoints. The assistant chief ranger maintains oversight of the physical security and anti-terrorism branch of the ranger activities division. Icon or park: Grand Canyon; Activities: A law enforcement ranger is the physical security coordinator. The physical security coordinator supervises the fee collections law enforcement group. Icon or park: Statue of Liberty; Activities: A Park Police lieutenant is the physical security coordinator. The former Northeast region physical security specialist and Park Police officials have overseen technology enhancements and maintained equipment. Source: GAO analysis of Park Service data. [End of table] Despite the range of security duties assigned to regional staff, physical security coordinators, law enforcement rangers, and Park Police staff, the Park Service does not provide them with specialized training. Moreover, senior Park Service officials told us that they do not have an inventory of all the physical security coordinators servicewide, and they do not track their duties. We have noted that the effectiveness of a risk management approach depends on the involvement of experienced and professional security personnel and that the chances of omitting major steps in the risk management process increase if personnel are not well trained in applying risk management.[Footnote 48] Without training for security staff, or evaluations of their security activities, there is little assurance that risks are identified and mitigated and that staff are held accountable for results. Though the Park Service lacks a physical security training program, it has partnered with OLES to organize security workshops at icons and other critical assets such as the Hoover Dam (see table 6). Park Service and Park Police staff are invited to attend, but attendance is contingent upon time and resource availability. For example, staff from the icons we reviewed and the regions we interviewed had attended some of these workshops, but no staff from the African Burial Ground, Gettysburg, or the Grand Canyon had attended. Officials at regions, icons, and parks may also develop security training internally or in collaboration with external agencies. We have reported that (1) training exercises are useful in assessing preparedness,(2) effective security entails having well-trained staff that follow and enforce policies and procedures, and (3) good training and practice are essential to successfully implementing policies by ensuring that personnel exercise good judgment in following security procedures. [Footnote 49] Table 6: Security Training Examples: Office: National; Types of training: The Park Service national office organizes security workshops in collaboration with OLES and other Interior bureaus. The workshops have been held at the Statue of Liberty in 2005, Hoover Dam in 2006, the Gateway Arch in 2007, and the Kennedy Space Center in 2009. In September 2009, the Park Police will host a critical infrastructure and key resource protection training program for the Park Police and some Park Service and Interior staff. Office: Region: Intermountain; Types of training: In 2005, the region hosted a chief ranger conference that focused on physical security. Participants received training in developing physical security plans, guidance for conducting security surveys, and a checklist to assess risks and countermeasures. Office: Region: Midwest; Types of training: Every 18 months, the region hosts a chief ranger conference in the Black Hills area of South Dakota. At the 2008 conference, an FBI official presented a session on icon and critical infrastructure and key resource protection. Office: Region: Northeast; Types of training: In 2008, the region hosted a museum and security conference, which focused on protecting cultural property, resources, and collections. Office: Region: Pacific West; Types of training: The region created an Operational Leadership Program, which targets safety and accident prevention. The program has started to gain national recognition and is the primary focus of the Park Service National Leadership Council. The region is training 100 facilitators for the program. Office: Icon or park: African Burial Ground; Types of training: The northeast region and FPS provide physical security training. Office: Icon or park: Gateway Arch; Types of training: The physical security specialist has undertaken a number of training activities including creating and dispensing a security awareness presentation to orient new staff, inviting a U.S. Postal Service inspector to dispense mail screening training for employees directly involved in handling mail, and regularly sending security awareness tips via e-mail to park staff. Office: Icon or park: Gettysburg; Types of training: The park's museum services supervisor served as a keynote speaker at the Northeast region's museum and security awareness training in September 2008. The supervisor addressed how park and museum staff can work together to ensure security of collections. Office: Icon or park: Grand Canyon; Types of training: FBI provides a training course annually for the park. Past FBI training has covered topics such as evidence recovery, behavioral profiling, and violent crimes. Office: Icon or park: Statue of Liberty; Types of training: Security awareness training is provided to Park Police personnel through roll call and in-service training. Depending on available space, the Park Police may open up training to some Park Service employees and partners such as concessions providers. Source: GAO analysis of Park Service data. [End of table] Additionally, Park Service rangers can try to enroll in two physical security courses that are offered at the Federal Law Enforcement Training Center (FLETC)[Footnote 50]--the physical security training program and the critical infrastructure protection training program. However, according to Park Service officials, space in the courses is limited--the Park Service receives one or two slots per class--the courses are offered on a limited basis, training and travel are subject to resource constraints, and the training is not specific to icons and parks. For example, the physical security specialist at the Gateway Arch tried to enroll in the physical security course for more than 18 months before gaining admission and completing the course in 2008. According to Park Service officials, this specialist may also be able to attend the critical infrastructure training. No park staff from the Statue of Liberty have completed the physical security course since 2001.[Footnote 51] Moreover, Park Service officials told us that no staff from the African Burial Ground, Gettysburg, or Grand Canyon have completed either of the two FLETC training courses. The Grand Canyon chief ranger tried to enroll the physical security coordinator in the physical security training course, but the application for enrollment was not accepted; as a result, the park lacks staff with experience and formal training in physical security. While various security training opportunities arise throughout the Park Service, training is inconsistent and lacks cohesion, and there is little assurance that Park Service employees have the knowledge, skills, and awareness needed to contribute to overall park security. With limited security expertise, the Park Service will face challenges in implementing the other key practices. The lack of physical security expertise affects icon and park officials' ability to develop strategies for identifying their security vulnerabilities and determining how to mitigate them effectively and efficiently with limited resources. Such strategies would ensure that the Park Service has the expertise and resources at the national and regional levels to oversee the implementation of security advancements and practices. Moreover, physical security expertise allows icon and park officials to determine what countermeasures fit their specific needs and how well these countermeasures enhance their security performance. Finally, because all icon and park staff have a role in security, increasing overall security awareness enhances the security of the park. Human Capital Challenges Are a Particular Concern at Icons: We noted earlier that officials at icons have made improvements in security since 2001; however, the Interior IG and OLES have concerns about icon security that are related to human capital issues, including security expertise and the management of security operations. We have reported that it is widely recognized that there is a need for competent professionals who can effectively manage complex security programs that are designed to reduce threats to people and assets. [Footnote 52] Clearly defining roles and responsibilities and ensuring that security personnel are adequately trained are central aspects of this key practice. In its 2008 assessment of the Park Police, the IG recommended that the Park Service hire a qualified senior-level certified security professional to oversee Park Service security operations at all icons, including those that are managed by the Park Police, but the Park Service does not believe such action is necessary. [Footnote 53] Senior Park Service officials told us that the agency works closely with the Park Police, especially in areas with shared responsibility. However, the Park Service relies on its Security and Intelligence Program Manager to oversee icon security for icons that do not have a Park Police presence--the Gateway Arch, Independence National Historic Park, and Mount Rushmore National Memorial. The Park Service relies on the Park Police for security program management at the national mall icons and the Statue of Liberty. As a result, the Park Service has no comprehensive program with centralized senior-level oversight of icon security. This is an inefficient approach, since the five icons--while distinct--have a need to manage similar issues including guard services, surveillance and screening equipment, vehicle and pedestrian barriers, access to intelligence information, staff trained in security awareness, and security performance measurement and testing procedures. Moreover, until recently, the Park Service Security and Intelligence Program Manager lacked specialized physical security expertise. Trained as a law enforcement special agent, this official was not certified in physical security until 2008. According to OLES officials, the Park Service security manager meets the minimum security training requirements for senior-level security managers that OLES established in 2009.[Footnote 54] The Interior IG also recognized that this manager has been through extensive physical security training.[Footnote 55] Although the Park Police created an Homeland Security Division in October 2008 and established a security manager position in accordance with the IG's 2002 recommendation,[Footnote 56] the IG reported in 2009 that the appointee to this position--a Deputy Chief--had no background in physical security and had only been through a basic 2 week critical infrastructure protection course at FLETC.[Footnote 57] According to the Park Police, the Deputy Chief is qualified for the position having (1) attended a 2 week DHS program on critical infrastructure and key resource protection in August 2008, (2) worked on icon protection issues for 4 years, (3) designed security upgrades at the Washington Monument, and, (4) over the course of 25 years, worked on security system alarm issues in Washington, D.C. and San Francisco. Furthermore, the Park Police told us that the Deputy Chief received a certification after completing DHS's Critical Infrastructure and Key Resources Protection course. OLES officials also told us that the Deputy Chief has met the department's minimum training requirements. The Interior IG and OLES officials are also concerned about the Park Service's management of security operations at individual icons. In its 2003 icon protection report, the IG suggested that icons with the most significant threat potential should have trained and certified security managers on-site,[Footnote 58] and in 2008, recommended that the Park Service install trained and certified security professionals at each icon park to work under the direction of the security manager the IG had recommended for all of the icons.[Footnote 59] In its 2006 icon risk assessment and 2007 icon compliance reviews, OLES recommended that Independence National Historic Park and the Statue of Liberty hire security managers. While officials at these two icons have identified hiring security managers as a priority, they had yet to fill the positions at the time of our review. While park officials at the Statue of Liberty have identified hiring a security manager as a top priority, they have not determined whether the Park Service or the Park Police will fund the position.[Footnote 60] In 2007, the Park Police hired a security manager for the National Capital Region. The Deputy Chief of the Icon Protection Division told us that the Park Police intends to hire a technical assistant for this manager who can, for example, repair security equipment. Of the five icons, only the Gateway Arch has a full-time physical security specialist--a need the park identified on its own and filled with a qualified professional. Park officials at the Gateway Arch created and staffed this position during 2006 and had to give up one law enforcement position to do so. The park's assistant chief rangers, who are law enforcement officers, told us they believe the tradeoff was justified and the specialist's efforts may increase awareness among staff. The physical security specialist has undertaken a number of initiatives, such as conducting a risk assessment of the facility where park officials wanted to locate its dispatch center, testing security alarms in the visitor center, sending park employees security awareness e-mails, and forming partnerships with area federal departments and agencies such as DHS, the Department of Justice, and the U.S. Postal Service to enhance surveillance capabilities, acquire interoperable communications technology, and assess mail handling. Moreover, the Midwest Region has leveraged the specialist's expertise to help the region develop a risk assessment tool for its small parks security program. OLES officials told us that of the five icons, the Gateway Arch had the highest security policy compliance rating in 2007, and although they did not attribute this rating to the physical security specialist's work, it is worthwhile to note that the Gateway Arch is the only icon that has a full-time position dedicated solely to physical security. Conclusions: In addition to its primary mission to preserve the natural and cultural resources and values of the national park system for the enjoyment, education, and inspiration of those who visit them, the Park Service has a critical role related to security at national icons and parks and has taken important steps to improve the security of nearly 400 national icons and parks. However, concerns persist that terrorists may attack the United States by targeting national icons such as the Statue of Liberty and the Gateway Arch, and by harming those who visit places emblematic of our nation's natural beauty and heritage, such as the Grand Canyon and Gettysburg. More emphasis on the key practices would provide greater assurance that Park Service assets are well protected and that Park Service resources are being used efficiently to improve protection. Critical to advancing the Park Service's security efforts, a more comprehensive risk management approach and related guidance-- which are currently lacking--would provide management with up-to-date information on threats and trends in security gaps and would allow management to target resources to address the greatest threats and vulnerabilities. Standards and guidance for technology investment, if developed, would provide better assurance that the Park Service's return on investment is maximized. In addition, a strategy for improving internal communication by, for example, expeditiously developing a security Web portal, could lead to more efficient information sharing and coordination. Implementing a more systematic performance measurement and testing program would inform risk management efforts and allow management to better gauge security performance. Finally, paying greater attention to the human capital component of security--by clearly defining security roles and responsibilities using risk management and establishing a security training program--would give Park Service staff the tools and awareness needed to protect the Park Service's assets and the people who visit them. Recommendations for Executive Action: In order to better oversee and more efficiently manage the protection of the vast and diverse inventory of national icons and parks, in the restricted version of this report, we recommended that the Secretary of the Interior take six actions. Specifically, the Secretary should instruct the Director of the National Park Service, in consultation with OLES, to develop and implement: 1. a more comprehensive, routine risk management approach for security that encompasses the Park Service's vast inventory of icons and parks, including developing guidance, standards, and procedures for conducting risk assessments at the icon and park level and for using the results to inform resource allocation decisions at the national, regional, icon, and park levels; 2. guidance and standards for leveraging security technology, including how to assess the costs and benefits of countermeasure alternatives while taking into account risk management results; 3. an internal communications strategy for security to address coordination gaps, including a timeline for the development of a servicewide Web portal for security; 4. a servicewide performance management and testing program that includes specific measures and an evaluation component, which can be used to inform broader risk management decision-making and to assess security performance; 5. a strategy for more clearly defining security roles and responsibilities within the Park Service, which should, among other things, ensure that the Park Service is well equipped at the national and regional levels to oversee security improvements; and: 6. a servicewide security training program and related curriculum to provide staff with the knowledge, skills, and awareness needed to improve Park Service security practices. Agency Comments and Our Evaluation: We provided a draft of the restricted version of this report to Interior for official review and comment. Interior agreed with our assessment that actions are needed to improve security practices at national icons and parks and agreed with the report's recommendations. Regarding the first recommendation to develop a more comprehensive, routine risk management approach for security, Interior cited the recent creation of a Homeland Security Division within the Park Police, stated that parks and regions have been working to develop a more comprehensive approach to security, and agreed to bring all of these efforts together in a more comprehensive, servicewide program. For the second recommendation to develop guidance and standards to leverage security technology, Interior cited some examples of the partnerships it has with other federal agencies and acknowledged that guidance and standards for leveraging technology, coupled with an effective communications strategy, would add to the effectiveness and efficiency of its security program for icons and parks. With respect to the third recommendation, Interior stated that a more formal internal communications strategy would enhance the effectiveness of its security program for icons and parks and noted that such a strategy should acknowledge the critical importance of the communication networks icons and parks establish at the asset level. For the fourth recommendation to develop and implement a servicewide performance management and testing program, Interior stated that while its current approach has been effective in some situations, applying a servicewide approach would benefit all icons and parks in the system. Regarding the fifth recommendation to develop and implement a strategy for more clearly defining security roles and responsibilities within the Park Service, Interior stated that it would continue to look for ways to leverage the expertise and experience of physical security staff and to clearly define their roles and responsibilities. Finally, for the sixth recommendation to develop and implement a servicewide security training program and related curriculum, Interior stated that a servicewide security training program and increased access to contemporary training on appropriate security subjects would be helpful and noted that it currently sends staff with security responsibilities to a variety of training programs within and outside of Interior, including the physical security training program offered through FLETC. While these other security courses may be helpful, as we reported, not all Park Service personnel that have security responsibilities are able to attend these training classes due to the space limitations of the entities offering these courses and resource constraints on the part of individual icons and parks. Furthermore, as we reported, the Park Service does not have a special training curriculum for its designated physical security coordinators. Therefore, it is important that the Park Service develop its own park- specific training program so that staff that have security responsibilities delegated to them can effectively carry out those duties and better ensure that icons and parks, and the people who visit and work at them, are well-protected. Interior's official comments are contained in appendix II. Interior also provided general and technical comments from the Park Police and we incorporated the technical comments where appropriate. In its general comments, the Park Police noted some of the security improvements it has made since September 11 for the icons under its purview in New York City and Washington, D.C. Specifically, the Park Police cited enhancements made to physical barriers, surveillance systems, visitor screening, and contract guard services. The Park Police also stated that in October 2008, it underwent its largest internal reorganization in 40 years and created a Homeland Security Division and added more officers and patrols to enhance icon protection efforts. Finally, with respect to information sharing and coordination, the Park Police stated that it has assigned three intelligence officers to enhance icon protection in Washington, D.C. and detectives to the JTTFs in New York City; Washington, D.C.; and San Francisco. Moreover, the Park Police has assigned a major to the Park Service's national office to liaise with the Park Service to protect all icons. As agreed with your office, unless you publicly announce the contents of this report, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the Secretary of the Interior and appropriate congressional committees. In addition, the report will be available at no charge on GAO's Web site at [hyperlink, http://www.gao.gov]. If you have any questions about this report, please contact me at (202) 512-2834 or goldsteinm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix III. Sincerely yours, Signed by: Mark L. Goldstein: Director, Physical Infrastructure Issues: [End of section] Appendix I: Objectives, Scope, and Methodology: Our objective was to determine whether the National Park Service's (Park Service) approach to security for national icons and parks reflects key protection practices. Through previous work, we identified a set of key protection practices from the collective practices of federal agencies and private sector entities that can provide a framework for guiding agencies' protection efforts and addressing challenges.[Footnote 61] The key practices essentially form the foundation of a comprehensive approach to asset protection and can be used to assess the management of security programs. We used our key protection practices as criteria to evaluate the Park Service's approach to security. Of the six key practices, we used the following as criteria: * Allocating resources using risk management. * Leveraging technology. * Information sharing and coordination. * Performance measurement and testing. * Strategic management of human capital. We did not consider the sixth key practice, aligning assets to mission, which focuses on realigning the federal real property inventory to better reflect agencies' missions. To examine the Park Service's application of key practices at the park level, we selected five icons and parks basing our selection on factors that included geographical diversity, high public visitation, and other potential security considerations such as recent or planned facility construction. To minimize duplication of effort, we considered our own and the Department of the Interior's (Interior) Office of the Inspector General's (IG) recent and ongoing work. For example, we did not select the national mall icons--the Washington Monument National Memorial, the Thomas Jefferson National Memorial, and the Lincoln National Memorial-- because the IG examined their security in 2008.[Footnote 62] We selected: * Two icons--the Statue of Liberty National Monument (Statue of Liberty) in New York City and the Jefferson National Expansion Memorial in St. Louis. * Three parks--the African Burial Ground National Monument in New York City, Gettysburg National Military Park in Pennsylvania, and Grand Canyon (Grand Canyon) National Park in Arizona. Collectively, the sites we selected illustrate a range of park protection practices applied by the Park Service. At each site, we interviewed Park Service officials with primary responsibility for security implementation, operation, and management. We also interviewed U.S. Park Police (Park Police) officials from the Statue of Liberty. We toured each site and observed the physical environment and the principal security elements to gain firsthand knowledge of the protection practices used at all the sites except the Grand Canyon where we used videoconferencing to interview Park Service officials. We reviewed and analyzed documents, when available, that contained site- specific information on security plans, policies, procedures, budgets, and staffing. Because we observed the Park Service's efforts to protect icons and parks at a limited number of sites, our observations of security issues at individual sites cannot be generalized to all the icons and parks that the Park Service is responsible for securing. To supplement these site visits, we interviewed Park Service regional chief rangers and other security officials from the three regions where we had selected icons and parks--the Northeast, Midwest, and Intermountain regions. We also interviewed the regional chief ranger from the Pacific West region because the Park Service once identified the Golden Gate Bridge as an icon and we wanted that region's perspective on icon and park protection. At the national level, we interviewed officials from the IG, Office of Law Enforcement and Security, Park Service, and Park Police. Furthermore, we collected supporting documentation including law enforcement and security manuals; IG reports on law enforcement, security, and icon protection; icon risk assessments and compliance reviews; and security plans, policies, procedures, budgets, and staffing information when available. We conducted this performance audit from January 2008 to June 2009 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objective. [End of section] Appendix II: Comments from the Department of the Interior: United States Department of the Interior Office Of The Secretary: Washington, D.C. 20240: June 12, 2009: Mr. Mark L. Goldstein: Director, Physical Infrastructure Issues: U.S. Government Accountability Office: 441 G Street, N.W. Washington, D.C. 20548: Dear Mr. Goldstein: Thank you for providing the Department of the Interior (DO[) the opportunity to review and comment on the U.S. Government Accountability Office Draft report entitled, "Homeland Security Actions Needed to Improve Security Practices at National Icons and Parks," (GAO-09-605). The National Park Service (NPS) and the Department of the Interior have reviewed the draft report and appreciate the diligent work of the team in helping us further improve the security program for icons and parks in the National Park System. We will continue to examine policy and procedures and make adjustments as necessary to protect critical infrastructure under our jurisdiction. We believe the GAO has produced an informative summation of the complex issues associated with risk management. Following are our comments on the six actions recommended in the draft report. 1) A more comprehensive, routine risk management approach for security: We concur that a more comprehensive approach to security would be beneficial to the Park Service. In our efforts to this end to date, the USPP has recently reorganized and created a Homeland Security Division. The many parks throughout the system and several regional offices not under the specific direction of the USPP have been and are continuing to develop a more comprehensive approach to security. We will continue to work toward bringing all of these efforts together in a more comprehensive, service-wide, program. 2) Guidance and standards for leveraging security technology: We concur that increased guidance and standards for leveraging technology would be valuable to our program. We currently enjoy technology assistance, information and advice from many partners, including FLETC, OLES, DHS, TSA-TSL Labs and many more. We have just recently learned that the USPP program with the USAF has been funded for another year. Guidance and standards for leveraging technology, coupled with an effective communications strategy (see (3) below) will help our security program become more effective and efficient. 3) An internal communications strategy for security to address communications gaps, including a time line for the development of a Park Service-wide Web portal for security: We concur that a more formal internal communications strategy for security concerns would be useful in helping to make our security program more effective. Currently, our senior-level Security and Intelligence program managers have regular contact with Icon Parks, non- Icon parks and regional office staff. Parks themselves, throughout the country, enjoy both internal and external contacts, with their respective regional office staff, Washington Office staff as well as many local, regional and state law enforcement and security contacts. These latter contacts, which are less apparent to central office staff, are key to success in many of our rural and isolated park settings. Overlaying a more formal communications strategy over the top of these many aforementioned contacts could assist in addressing communications gaps that may exist in the organization. It would be important for us, in crafting said strategy, to not imply that the ground-level contacts made by parks, throughout the system, are not critical to the success of park-level security programs. 4) A Park Service-wide performance management and testing program that includes specific measures and an evaluation component: We concur that exploring the option of an appropriate and effective performance management and testing program for security would be beneficial. Although imperfect, the "ad-hoc" approach, as described in the report, has been effective in pockets throughout the system. Reviews and assessment of Icon Park and non-Icon Park security programs take place periodically. A Park Service-wide approach, however, would likely yield more positive and all inclusive results, thereby benefiting all parks in the system. 5) A strategy for more clearly defining security roles and responsibilities within the Park Service: We concur that a strategy for defining security roles and responsibilities within the Park Service would be advantageous for a bureau-wide security program. Our two senior-level Security and Intelligence program managers for the NPS and the USPP are recognized and in-place today. These two positions are joined by several other key officials designated, including Captains and Lieutenants at the four Icon parks managed by the USPP. Additionally, parks and regions have their own designated Physical Security Coordinators in place today. We will continue to look for ways to leverage the expertise and experience of current physical security staff and to clearly define their roles and responsibilities. 6) A Park Service-wide security training program and related curriculum: We concur that Park Service-wide security training and increased access to contemporary training on appropriate security subjects will continue to be helpful to our program. However, we would like to note that we currently send staff with security responsibilities to a variety of excellent training programs including local, regional, state and federally sponsored options. DHS has excellent training that we have, and continue to take advantage of. We regularly use the Basic Physical Security Training Program at the Federal Law Enforcement Training Center as base-line training. This course is recognized nationally as an excellent introduction to the world of Physical Security. Further, we work closely with the DOI. OLES for further formal and contemporary security training programs that include exposure to real-world security. In September of 2009, the USPP will be hosting the new FLETC. 80-hour Critical Infrastructure and Key Resources Protection training to Washington DC whereupon all key officials from the USPP, NPS. 01-ES and others will have the opportunity to attend. Thank you for the opportunity to comment on this informative report. We have and will continue to place a high priority on Security throughout the National Park System. We will also continue to interweave security concerns in all aspects of risk management of our parks and Icons. We request that the vulnerabilities in park security programs stated in this report not be released to the public as we feel it could endanger visitors, employees, residents and facilities. Enclosed are specific itemized comments from the USPP, some of which have been previously addressed. We hope these comments will assist you in preparing the final report. If you have any questions, or need additional information, contact Acting Deputy Chief Kevin Hay, at 202-619-7085, or Chief, Division of Law Enforcement, Security, and Emergency Services, Lane Baker, at 202- 513-7084. Sincerely, Signed by: Pamela K. Haze: Deputy Assistant Secretary for Budget and Business Management: Enclosure: Hand written additional note: "Thank you for your help." [End of section] Appendix III: GAO Contact and Staff Acknowledgments: GAO Contact: Mark L. Goldstein, (202) 512-2834 or goldsteinm@gao.gov: Staff Acknowledgments: In addition to the contact named above, David Sausville, Assistant Director; Denise McCabe, Analyst-in-Charge; Anne Dilger; Elizabeth Eisenstadt; Brandon Haller; Robin Nye; Joshua Ormond; Susan Michal- Smith; and Adam Yu made key contributions to this report. [End of section] Footnotes: [1] The national park system is made up of close to 400 park units which include 5 national icons and 14 other types of parks such as monuments, national battlefields, and national parks. The park units that Interior considers to be national icons are: (1) the Statue of Liberty National Monument in New York City; (2) Independence National Historical Park in Philadelphia; (3) the Jefferson National Expansion Memorial in St. Louis; (4) Mount Rushmore National Memorial in South Dakota; and (5) the national mall icons--the Washington Monument National Memorial, the Thomas Jefferson National Memorial, and the Lincoln National Memorial in Washington, D.C. [2] GAO, Homeland Security: Actions Needed to Better Protect National Icons and Federal Office Buildings from Terrorism, [hyperlink, http://www.gao.gov/products/GAO-05-790] (Washington, D.C.: June 24, 2005). [3] GAO, Homeland Security: Further Actions Needed to Coordinate Federal Agencies' Facility Protection Efforts and Promote Key Practices, [hyperlink, http://www.gao.gov/products/GAO-05-49] (Washington, D.C.: Nov. 30, 2004). We excluded one key practice-- aligning assets to mission--from this review. This key practice underscores the need to realign the federal real property inventory so that it can better reflect agencies' missions. [4] GAO, Federal Real Property: DHS Has Made Progress, but Additional Actions Are Needed to Address Real Property Management and Security Challenges, [hyperlink, http://www.gao.gov/products/GAO-07-658] (Washington, D.C.: June 22, 2007). [5] GAO, Smithsonian Institution: Funding Challenges Affect Facilities' Conditions and Security, Endangering Collections, [hyperlink, http://www.gao.gov/products/GAO-07-1127] (Washington, D.C.: Sept. 28, 2007). [6] ISC was established by Executive Order 12977 in 1995 after the bombing of the Alfred P. Murrah Federal Building in Oklahoma City. [7] With the exception of the Grand Canyon--where we used videoconferencing to interview Park Service officials--we visited each of these sites. [8] U.S. Department of the Interior, Office of Inspector General, Disquieting State of Disorder: An Assessment of Department of the Interior Law Enforcement, Report 2002-I-0014 (Washington, D.C., January 2002). [9] HSPD-7 identified 17 critical infrastructure sectors and designated federal entities, called sector-specific agencies, to be responsible for coordinating asset protection within their sector throughout all levels of government and the private sector. In June 2008, an 18th sector was added--Critical Manufacturing. [10] Department of Homeland Security and Department of the Interior, National Monuments and Icons Sector-Specific Plan (Washington, D.C., May 2007). [11] The other three Park Service regions include the Southeast, Midwest, and Alaska regions. [12] [hyperlink, http://www.gao.gov/products/GAO-05-49]. We excluded one key practice--aligning assets to mission--from this review. This key practice underscores the need to realign the federal real property inventory so that it can better reflect agencies' missions. [13] [hyperlink, http://www.gao.gov/products/GAO-07-1127]. [14] [hyperlink, http://www.gao.gov/products/GAO-07-658]. [15] GAO, National Mall: Steps Identified by Stakeholders Facilitate Design and Approval of Security Enhancements, [hyperlink, http://www.gao.gov/products/GAO-05-518] (Washington, D.C.: June 14, 2005). [16] For the purposes of this report, we are referring to all of these entities as federal agencies. [17] ISC, Use of Physical Security Performance Measures, (Washington, D.C., June 16, 2009). [18] [hyperlink, http://www.gao.gov/products/GAO-05-49]. [19] This review did not include an assessment of security vulnerabilities at border parks. [20] According to the Park Police, it also updated icon protection plans for the national mall icons during 2008. [21] [hyperlink, http://www.gao.gov/products/GAO-05-49]. [22] FPS provides law enforcement and related security services to about 9,000 facilities under the control and custody of GSA. [23] JTTFs are chaired by the Federal Bureau of Investigation (FBI) and are composed of various federal, state, and local agencies. JTTFs aim to prevent, pre-empt, deter, and investigate terrorism and related activities affecting the United States and to apprehend terrorists. [24] Physical security is defined as physical or protective measures designed to safeguard personnel, facilities, national borders, and critical infrastructure and to prevent unauthorized access to material and documents, and to safeguard them against terrorism, espionage, sabotage, damage, weapons of mass destruction, and theft. [25] One day after the 1995 bombing of the Alfred P. Murrah Federal Building in Oklahoma City, the President directed the Department of Justice to assess the vulnerability of federal office buildings. In June 1995, DOJ issued a report entitled Vulnerability Assessment of Federal Facilities and the President directed that security at each federal facility be upgraded to the minimum security standards recommended by the study. [26] The Interagency Security Committee, Facility Security Level Determinations for Federal Facilities (Washington, D.C., Mar. 10, 2008). [27] [hyperlink, http://www.gao.gov/products/GAO-05-49]. [28] [hyperlink, http://www.gao.gov/products/GAO-05-49]. [29] [hyperlink, http://www.gao.gov/products/GAO-05-49]. [30] [hyperlink, http://www.gao.gov/products/GAO-05-49]. [31] [hyperlink, http://www.gao.gov/products/GAO-05-49]. [32] According to OLES officials, the Security Advisory Council meets quarterly to discuss emerging protection technology and security best practices, as well as recent security trends and policies. The council also reviews proposed changes to department security policy for sufficiency and impact. [33] GAO, Information Sharing: Practices That Can Benefit Critical Infrastructure Protection, [hyperlink, http://www.gao.gov/products/GAO-02-24] (Washington, D.C.: Oct. 15, 2001). [34] [hyperlink, http://www.gao.gov/products/GAO-02-24]. [35] [hyperlink, http://www.gao.gov/products/GAO-02-24]. [36] [hyperlink, http://www.gao.gov/products/GAO-02-24]. [37] GAO, Tax Administration: IRS Needs to Further Refine Its Tax Filing Season Performance Measures, [hyperlink, http://www.gao.gov/products/GAO-03-143] (Washington, D.C.: Nov. 22, 2002). [38] GAO, Managing for Results: Enhancing Agency Use of Performance Information for Management Decision Making, [hyperlink, http://www.gao.gov/products/GAO-05-927] (Washington, D.C.: Sept. 9, 2005). [39] GAO, Homeland Security: Guidance and Standards Are Needed for Measuring the Effectiveness of Agencies' Facility Protection Efforts, [hyperlink, http://www.gao.gov/products/GAO-06-612] (Washington, D.C.: May 31, 2006). [40] [hyperlink, http://www.gao.gov/products/GAO-05-49]. [41] [hyperlink, http://www.gao.gov/products/GAO-05-49]. [42] [hyperlink, http://www.gao.gov/products/GAO-05-49]. [43] [hyperlink, http://www.gao.gov/products/GAO-05-49]. [44] Interior IG Report 2002-I-0014. [45] [hyperlink, http://www.gao.gov/products/GAO-05-790]. [46] According to its Web site, ASIS International--an organization that reports to have more than 37,000 security industry members--is the pre-eminent international organization for professionals responsible for security, including managers and directors of security. [47] ASIS International, Chief Security Officer Guideline 2008. [48] [hyperlink, http://www.gao.gov/products/GAO-05-49]. [49] [hyperlink, http://www.gao.gov/products/GAO-05-49]. [50] FLETC serves as an interagency law enforcement training organization for more than 80 federal agencies and provides basic and advanced law enforcement training. The Park Service has assigned a superintendent to the FLETC campus in Glynco, Georgia to develop and manage basic and advanced training for Park Service law enforcement and line management, and to develop policy and guidelines for servicewide training and certification. [51] In its technical comments on a draft of this report, the Park Police stated that a USPP captain and a lieutenant from the Statue of Liberty attended a similar physical security course provided by the New York Police Department and that other officials in the New York Field Office have attended the police department's risk assessment course. Moreover, Park Police stated that dozens of its officers have taken the physical security course offered at FLETC. [52] [hyperlink, http://www.gao.gov/products/GAO-05-49]. [53] U.S. Department of the Interior, Office of the Inspector General, Assessment of the United States Park Police, Report PI-EV-NPS-0001-2007 (Washington, D.C., February 2008). [54] In March 2009, OLES issued a memorandum outlining minimum training requirements for bureau and office-level security managers and officers. [55] U.S. Department of the Interior, Office of the Inspector General, 3rd Progress Report on the Implementation of the Secretary's Directives for Law Enforcement Reform, PI-AT-MOA-0001-2008 (Washington, D.C., February 2009). [56] Interior IG Report 2002-I-0014. [57] Interior IG Report PI-AT-MOA-0001-2008. [58] U.S. Department of the Interior, Office of the Inspector General, Review of National Icon Park Security, Report 2003-I-0063 (Washington, D.C., August 2003). [59] Interior IG Report PI-EV-NPS-0001-2007. [60] In its technical comments on a draft of this report, the Park Police stated that a lieutenant has been serving as the security manager at the Statue of Liberty. [61] GAO, Homeland Security: Further Actions Needed to Coordinate Federal Agencies' Facility Protection Efforts and Promote Key Practices, [hyperlink, http://www.gao.gov/products/GAO-05-49] (Washington, D.C.: Nov. 30, 2004). [62] U.S. Department of the Interior, Office of the Inspector General, Assessment of the United States Park Police, Report PI-EV-NPS-0001-2007 (Washington, D.C., February 2008). [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Phone: The price of each GAO publication reflects GAO‘s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO‘s Web site, [hyperlink, http://www.gao.gov/ordering.htm]. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.