Passenger Rail Security
Evaluating Foreign Security Practices and Risk Can Help Guide Security Efforts
Gao ID: GAO-06-557T March 29, 2006
The July 2005 bombing attacks on London's subway system dramatically revealed the vulnerability of passenger rail systems worldwide to terrorist attacks and demonstrated the need for an increased focus on security for these systems. This testimony, which is based primarily on GAO's September 2005 report on passenger rail security (GAO-05-851), provides information on (1) the security practices that domestic and selected foreign rail transit operators have implemented to mitigate risks and enhance security; (2) the Department of Homeland Security's (DHS) and the Department of Transportation's (DOT) funding of rail transit security and use of risk management in funding decisions; and (3) the steps DHS and DOT have taken to improve coordination on rail transit security matters. As part of its 2005 report, GAO contacted 32 U.S. rail transit operators and 13 passenger rail operators in seven European and Asian countries.
Domestic and foreign rail transit operators GAO contacted have taken similar actions to help secure their systems, including implementing customer awareness programs, increasing the number and visibility of their security personnel, and upgrading security technology. Also, both domestic and foreign operators have used risk assessments to guide security-related activities and spending. However, GAO also observed security practices that were used by certain foreign passenger rail operators, but were not employed in the United States at the time of GAO's review. For example, some foreign rail operators use covert testing to help keep employees alert to security threats or randomly screen passengers. Centralized clearinghouses on rail security technologies, such as chemical sensors, and best practices are also maintained in some foreign countries. While introducing any of these security practices into the U.S. rail system may pose political, legal, fiscal, and cultural challenges, the practices may nevertheless warrant further examination. Both DHS and DOT help fund rail transit security investments, and DHS has promoted risk-based funding decisions in the allocation of transit security grants. DHS's Office of Grants and Training is the primary source of security funding for passenger rail systems, providing over $320 million in grants to rail transit agencies for fiscal years 2003 to 2006. The Office of Grants and Training has leveraged its grant-making authority to promote risk-based funding decisions for passenger rail by requiring, for example, that operators complete a risk assessment to be eligible for a transit security grant. As we have noted in previous reports, using assessments of risk to target resources to the highest priority is especially critical given the competition for resources within the rail transit sector, and between the rail transit sector and the other modes of transportation. DOT's Federal Transit Administration (FTA) also helps fund rail transit security efforts by providing financial assistance to transit agencies and requiring that they spend 1 percent of their urbanized area formula funds on security improvements. To improve coordination on transportation security matters, including rail transit security, DHS and DOT signed a memorandum of understanding (MOU) in September 2004. DHS and DOT also signed a transit security annex to the MOU in September 2005 that delineates specific security-related roles, responsibilities, resources, and commitments for transit issues. In GAO's view, these actions are positive steps forward in addressing the coordination problems GAO previously identified. For instance, federal and rail industry officials raised questions about the feasibility of implementing and complying with TSA's May 2004 security directives, citing limited opportunities to collaborate with TSA to ensure that industry best practices were incorporated. Effective coordination between DHS and DOT will continue to be important as both departments move forward with existing programs and new security initiatives.
GAO-06-557T, Passenger Rail Security: Evaluating Foreign Security Practices and Risk Can Help Guide Security Efforts
This is the accessible text file for GAO report number GAO-06-557T
entitled 'Passenger Rail Security: Evaluating Foreign Security
Practices and Risk Can Help Guide Security Efforts' which was released
on March 29, 2006.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Testimony before the Committee on Transportation and Infrastructure,
Subcommittee on Highways, Transit, and Pipelines, House of
Representatives:
United States Government Accountability Office:
GAO:
For Release on Delivery Expected at 2:00 p.m. EST:
Wednesday, March 29, 2006:
Passenger Rail Security:
Evaluating Foreign Security Practices and Risk Can Help Guide Security
Efforts:
Statement of JayEtta Z. Hecker, Director, Physical Infrastructure
Issues:
GAO-06-557T:
GAO Highlights:
Highlights of GAO-06-557T, a testimony before the Committee on
Transportation and Infrastructure, Subcommittee on Highways, Transit,
and Pipelines, House of Representatives:
Why GAO Did This Study:
The July 2005 bombing attacks on London‘s subway system dramatically
revealed the vulnerability of passenger rail systems worldwide to
terrorist attacks and demonstrated the need for an increased focus on
security for these systems.
This testimony, which is based primarily on GAO‘s September 2005 report
on passenger rail security (GAO-05-851), provides information on (1)
the security practices that domestic and selected foreign rail transit
operators have implemented to mitigate risks and enhance security; (2)
the Department of Homeland Security‘s (DHS) and the Department of
Transportation‘s (DOT) funding of rail transit security and use of risk
management in funding decisions; and (3) the steps DHS and DOT have
taken to improve coordination on rail transit security matters. As part
of its 2005 report, GAO contacted 32 U.S. rail transit operators and 13
passenger rail operators in seven European and Asian countries.
What GAO Found:
Domestic and foreign rail transit operators GAO contacted have taken
similar actions to help secure their systems, including implementing
customer awareness programs, increasing the number and visibility of
their security personnel, and upgrading security technology. Also, both
domestic and foreign operators have used risk assessments to guide
security-related activities and spending. However, GAO also observed
security practices that were used by certain foreign passenger rail
operators, but were not employed in the United States at the time of
GAO‘s review. For example, some foreign rail operators use covert
testing to help keep employees alert to security threats or randomly
screen passengers. Centralized clearinghouses on rail security
technologies, such as chemical sensors, and best practices are also
maintained in some foreign countries. While introducing any of these
security practices into the U.S. rail system may pose political, legal,
fiscal, and cultural challenges, the practices may nevertheless warrant
further examination.
Both DHS and DOT help fund rail transit security investments, and DHS
has promoted risk-based funding decisions in the allocation of transit
security grants. DHS‘s Office of Grants and Training is the primary
source of security funding for passenger rail systems, providing over
$320 million in grants to rail transit agencies for fiscal years 2003
to 2006. The Office of Grants and Training has leveraged its grant-
making authority to promote risk-based funding decisions for passenger
rail by requiring, for example, that operators complete a risk
assessment to be eligible for a transit security grant. As we have
noted in previous reports, using assessments of risk to target
resources to the highest priority is especially critical given the
competition for resources within the rail transit sector, and between
the rail transit sector and the other modes of transportation. DOT‘s
Federal Transit Administration (FTA) also helps fund rail transit
security efforts by providing financial assistance to transit agencies
and requiring that they spend 1 percent of their urbanized area formula
funds on security improvements.
To improve coordination on transportation security matters, including
rail transit security, DHS and DOT signed a memorandum of understanding
(MOU) in September 2004. DHS and DOT also signed a transit security
annex to the MOU in September 2005 that delineates specific security-
related roles, responsibilities, resources, and commitments for transit
issues. In GAO‘s view, these actions are positive steps forward in
addressing the coordination problems GAO previously identified. For
instance, federal and rail industry officials raised questions about
the feasibility of implementing and complying with TSA‘s May 2004
security directives, citing limited opportunities to collaborate with
TSA to ensure that industry best practices were incorporated. Effective
coordination between DHS and DOT will continue to be important as both
departments move forward with existing programs and new security
initiatives.
What GAO Recommends:
GAO‘s September 2005 report on passenger rail security recommended,
among other things, that the Secretary of Homeland Security, in
collaboration with DOT, determine the feasibility of implementing
certain rail security practices used in foreign countries. DHS and DOT
generally agreed with the report‘s recommendations.
www.gao.gov/cgi-bin/getrpt?GAO-06-557T.
To view the full product, including the scope and methodology, click on
the link above. For more information, contact JayEtta Z. Hecker at
(202) 512-2834 or Cathleen A. Berrick (202) 512-3404.
[End of section]
Mr. Chairman and Members of the Subcommittee:
Thank you for inviting me to participate in today's hearing on rail
transit security. The London rail bombings that took place in July
2005--resulting in over 50 fatalities and more than 700 injuries--made
clear that even when a variety of security precautions are in place,
rail transit systems that move high volumes of passengers each day
remain vulnerable to terrorist attack. While securing the U.S. rail
transit system is a daunting task--a shared responsibility requiring
coordinated action on the part of federal, state, and local governments
and the private sector--it is important nonetheless to take the
necessary steps to identify and mitigate risks to rail transit systems.
As we have reported previously, the sheer number of stakeholders
involved in securing these systems can lead to communication
challenges, duplication of effort, and confusion about roles and
responsibilities. Key federal stakeholders with critical roles to play
within the rail sector include the Transportation Security
Administration (TSA), which is responsible for transportation security
overall, and the Office of Grants and Training,[Footnote 1]which
provides grant funds to rail operators and conducts risk assessments
for passenger rail agencies, both within the Department of Homeland
Security (DHS); and the Federal Transit Administration (FTA) and
Federal Railroad Administration (FRA), both within the Department of
Transportation (DOT). One of the critical challenges facing these
federal agencies, and the rail system operators they oversee or
support, is finding ways to protect rail systems from potential
terrorist attacks without compromising the accessibility and efficiency
of rail transit.
At the federal level, another significant challenge to securing rail
systems involves the allocation of resources. Rail transit systems
represent one of many modes of transportation--along with aviation,
maritime, and others--competing for limited federal security resources.
Within the rail transit sector itself, there is competition for
resources, as federal, state, and local agencies and rail operators
seek to identify and invest in appropriate security measures to
safeguard these systems while also investing in other capital and
operational improvements. Moreover, given competing priorities and
limited homeland security resources, difficult policy decisions have to
be made by Congress and the executive branch to prioritize security
efforts and direct resources to the areas of greatest risk within the
rail transit system, among all transportation modes, and across other
nationally critical sectors.
To help federal decision makers determine how to best allocate limited
resources, we have advocated, the National Commission on Terrorist
Attacks Upon the United States (the 9/11 Commission) has recommended,
and the subsequent Intelligence Reform and Terrorism Prevention Act of
2004 requires, that a risk management approach be employed to guide
security decision making.[Footnote 2] A risk management approach
entails a continuous process of managing risks through a series of
actions, including setting strategic goals and objectives, assessing
and quantifying risks, evaluating alternative security measures,
selecting which measures to undertake, and implementing and monitoring
those measures. In July 2005, in announcing his proposal for the
reorganization of DHS, the Secretary of Homeland Security declared that
as a core principle of the reorganization, the department must base its
work on priorities driven by risk.
My testimony will cover three areas: (1) the security practices that
domestic and selected foreign rail transit operators have implemented
to mitigate risks and enhance security, and any differences in these
practices; (2) DHS's and DOT's funding of rail transit security and use
of risk management in funding decisions; and (3) the steps DHS and DOT
have taken to improve coordination on rail transit security matters. My
comments today are based on our body of work on passenger rail security
issues, including our September 2005 report to the Chairman of the
House Transportation and Infrastructure's Subcommittee on Railroads,
Senators Snowe and Boxer, and Representative Castle.[Footnote 3] For
this report, we contacted 32 U.S. rail transit operators and 13
passenger rail operators in seven European and Asian countries. These
domestic and foreign rail agencies and the areas they serve are listed
in appendix I. All of the reports on which this statement is based were
prepared in accordance with generally accepted government auditing
standards.
In summary:
Domestic and foreign rail transit operators we contacted have taken
similar actions to help secure their systems, such as implementing
customer awareness programs, upgrading security technology, and
tightening access controls. Also, both domestic and foreign operators
have used risk assessments to guide security-related activities and
funding. However, we also observed rail security practices in foreign
countries that were not in use domestically at the time of our review.
For example, some foreign rail operators use covert testing to help
keep employees alert to security threats or randomly screen passengers.
In addition, centralized clearinghouses on rail security technologies,
such as chemical sensors, and best practices are maintained in some
foreign countries. While introducing any of these security practices
into the U.S. rail system may pose political, legal, fiscal, and
cultural challenges, the practices may nevertheless warrant further
examination. In our September 2005 report on passenger rail security,
we recommended, among other things, that the Secretary of Homeland
Security, in collaboration with DOT and the passenger rail industry,
determine the feasibility, in a risk management context, of
implementing certain rail security practices used in foreign countries,
including covert testing and random screening, an information
clearinghouse for security technologies and best practices, and
practices that integrate security into infrastructure design.[Footnote
4] DHS and DOT generally agreed with the report's recommendations.
* Both DHS and DOT help fund rail transit security investments, and DHS
has promoted risk-based funding decisions in the allocation of transit
security grants. DHS's Office of Grants and Training is the primary
source of security funding for passenger rail systems. From fiscal year
2003 through fiscal year 2006, the Office of Grants and Training
provided over $320 million in grants to rail transit agencies through
the Urban Area Security Initiative (UASI) and the Transit Security
Grant Programs. The Office of Grants and Training has leveraged its
grant-making authority to promote risk-based funding decisions for
passenger rail by requiring, for example, that operators complete a
risk assessment to be eligible for a transit security grant. Using
assessments of risk to target resources to the highest priority is
especially critical given the competition for resources within the rail
transit sector, and between the rail transit sector and the other modes
of transportation. Moreover, as the 2005 London rail bombings
dramatically illustrated, even when a variety of security precautions
are put in place, passenger rail systems remain vulnerable and
attractive targets given their open designs and the high volumes of
passengers they transport each day. Thus, it is important that limited
resources are targeted to security activities that have the greatest
impact on reducing overall risk. DOT's FTA also helps fund rail transit
security efforts through the financial assistance it provides to
transit agencies. In addition, FTA requires that a certain percentage
of federal funds be devoted to security activities. Specifically,
transit agencies are required to spend 1 percent of their urbanized
area formula funds on security improvements.[Footnote 5]
* To improve coordination on transportation security matters, including
rail transit security, DHS and DOT signed a memorandum of understanding
(MOU) in September 2004. The MOU defines broad areas of responsibility
for each department. The two departments also signed a transit security
annex to the MOU in September 2005 that delineates the specific
security-related roles, responsibilities, resources, and commitments
for transit issues. We believe these actions are positive steps forward
in addressing the coordination problems we have previously identified.
For instance, in 2004, TSA issued emergency security directives to
domestic rail operators after terrorist attacks on the rail system in
Madrid. However, federal and rail industry officials raised questions
about the feasibility of implementing and complying with these
directives, citing limited opportunities to collaborate with TSA to
ensure that industry best practices were incorporated. Effective
coordination between DHS and DOT will continue to be important as both
departments move forward with existing programs and new security
initiatives. For example, to avoid duplication and confusion, it will
be important that TSA coordinate the oversight activities of its rail
inspectors with those of the state auditors from FTA's State Safety
Oversight program and FRA's rail safety inspectors.
Background:
Each weekday, 11.3 million passengers in 35 metropolitan areas and 22
states use some form of rail transit--that is, heavy, commuter, and
light rail. Heavy rail systems--subway systems like New York City's
transit system and Washington, D.C.'s Metro--typically operate on fixed
rail lines within a metropolitan area and have the capacity for a heavy
volume of traffic. Commuter rail systems generally operate on railroad
tracks and provide regional service (e.g., between a central city and
adjacent suburbs)--and are traditionally associated with older
industrial cities, such as Boston, New York, and Chicago. Light rail
systems are typically characterized by lightweight passenger rail cars
that operate on track that is not separated from vehicular traffic for
much of the way. Figure 1 identifies the geographic location of rail
transit systems within the United States.
Figure 1: Geographic Distribution of Rail Transit Systems:
[See PDF for image]
[End of figure]
According to rail transit officials and experts, certain
characteristics of rail transit systems make them inherently vulnerable
to terrorist attacks and therefore difficult to secure. By design, rail
transit systems are open (i.e., have multiple access points, hubs
serving multiple carriers, and, in some cases, no barriers) so that
they can move large numbers of people quickly. In contrast, the U.S.
commercial aviation system is housed in closed and controlled locations
with few entry points. The openness of rail transit systems can leave
them vulnerable because operator personnel cannot completely monitor or
control who enters or leaves the systems. Other characteristics of some
rail transit systems--high ridership, expensive infrastructure,
economic importance, and location (e.g., large metropolitan areas or
tourist destinations)--also make them attractive targets for terrorists
because of the potential for mass casualties and economic damage and
disruption. Moreover, some of these same characteristics make rail
transit systems difficult to secure. For example, the numbers of riders
that pass through a subway system--especially during peak hours--may
make the sustained use of some security measures, such as metal
detectors, difficult because their use could result in long lines that
could disrupt scheduled service. In addition, multiple access points
along extended routes could make the cost of securing each location
prohibitive. Balancing the potential economic effects of security
enhancements with the benefits of such measures is a difficult
challenge.
Securing the nation's rail transit systems is a shared responsibility
requiring coordinated action on the part of federal, state, and local
governments; the private sector; and the passengers who ride these rail
systems. Since the September 11 attacks, the role of federal government
agencies in securing the nation's transportation systems, including
rail transit, have continued to evolve. Before September 11, DOT--
namely, FTA--was the primary federal entity involved in rail transit
security matters. In response to the attacks of September 11, Congress
passed the Aviation and Transportation Security Act (ATSA), which
created TSA within DOT and defined its primary responsibility as
ensuring security in all modes of transportation.[Footnote 6] The act
also gave TSA regulatory authority for security over all transportation
modes. ATSA does not specify TSA's roles and responsibilities in
securing the maritime and land transportation modes at the level of
detail it does for aviation security. Instead, the act broadly
identifies TSA as responsible for ensuring the security of all modes of
transportation. With the passage of the Homeland Security Act of 2002,
TSA was transferred, along with over 20 other agencies, to
DHS.[Footnote 7] While TSA is the lead federal agency for ensuring the
security of all transportation modes, FTA conducts nonregulatory safety
and security activities, including safety-and security-related
training, research, technical assistance, and demonstration projects.
In addition, FTA promotes safety and security through its grant-making
authority.
U.S. and Foreign Rail Transit Operators Have Taken Similar Actions to
Secure Rail Systems, and Opportunities for Additional Domestic Security
Actions May Exist:
U.S. rail transit operators have taken numerous actions to secure their
rail systems since the terrorist attacks of September 11, 2001, in the
United States and the March 11, 2004, attacks in Madrid. These actions
included both improvements to system operations and capital
enhancements to system facilities, such as track, buildings, and train
cars. All of the U.S. rail transit operators we contacted have
implemented some security measures--such as customer awareness programs
and more, and more visible, security personnel--that were generally
consistent with those we observed in Europe and Asia. We also
identified three rail security practices--covert testing, random
screening of passengers and their baggage, and maintaining a
centralized clearinghouse on rail security technologies--used in
foreign countries but not, at the time or our review,
domestically.[Footnote 8]
U.S. and Foreign Rail Operators Employ Similar Security Practices:
Both U.S. and foreign rail transit operators we contacted have
implemented similar improvements to enhance the security of their
systems. To guide security actions and spending, domestic and foreign
operators--even the privatized foreign systems--consider risk
assessments, budget constraints, and other factors. For example, one
foreign rail operator with a daily ridership of 2.3 million passengers
used a risk management methodology to assess risks, threats, and
vulnerabilities to rail in order to guide security spending. According
to the operator, the methodology employs a "risk informed" approach to
support management's business decision process regarding security. A
summary of domestic and foreign security practices follows.
Customer awareness: Customer awareness programs we observed used signs
and announcements to encourage riders to alert train staff if they
observed suspicious packages, persons, or behavior. Of the 32 domestic
rail operators we interviewed, 30 had implemented a customer awareness
program or made enhancements to an existing program. Foreign rail
operators we visited also attempt to enhance customer awareness. For
example, 11 of the 13 operators we interviewed had implemented a
customer awareness program. Similar to programs of U.S. operators,
these programs used signs, announcements, and brochures to inform
passengers and employees about the need to remain vigilant and report
any suspicious activities.
More, and more visible security personnel: Of the 32 U.S. rail
operators we interviewed, 23 had increased the number of security
personnel they used since September 11, to provide security throughout
their system or had taken steps to increase the visibility of their
security personnel. For example, several U.S. and foreign rail
operators we spoke with had instituted policies such as requiring their
security staff to wear brightly colored vests and patrol trains or
stations more frequently, so they are more visible to customers and
potential terrorists or criminals. These policies make it easier for
customers to contact security personnel in the event of an emergency,
or if they have spotted a suspicious item or person. At foreign sites
we visited, 10 of the 13 operators had increased the number of their
security officers throughout their systems in recent years because of
the perceived increase in the risk of a terrorist attack.
Increased use of canine teams: Of the 32 U.S. rail transit operators we
contacted, 21 had begun to use canine units, which include both dogs
and human handlers, to patrol their facilities or trains or had
increased their use of such teams. In foreign countries we visited,
rail transit operators' use of canine units varied. In some Asian
countries, dogs were not culturally accepted by the public and thus
were not used for rail security purposes. Most European rail transit
operators used canine units for explosives detection or as deterrents.
Employee training: All of the domestic and foreign rail operators we
interviewed had provided some type of security training to their staff,
either through in-house personnel or an external provider. In many
cases, this training consisted of ways to identify suspicious items and
persons and to respond to events once they occur. For example, the
London Underground and the British Transport Police developed the "HOT"
method for Underground employees to identify suspicious items in the
rail system. In the HOT method, employees are trained to look for
packages or items that are Hidden, Obviously suspicious, and not
Typical of the environment. If items meet all of these criteria,
employees are to notify station managers, who are to call in the
authorities and potentially shut down the station or take other action.
According to London Underground officials, the HOT method has
significantly reduced the number of system disruptions caused when a
suspicious item was identified. Several rail transit operators in the
United States and abroad have trained their employees in the HOT
method. It is important to note that such training is not designed to
prevent acts of terrorism like the July 2005 London attacks, in which
suicide bombers killed themselves rather than leaving bombs behind.
Passenger and baggage screening practices: Some domestic and foreign
rail operators have trained employees to recognize suspicious behavior
as a means of screening passengers. Eight U.S. rail transit operators
we contacted were using some form of behavioral screening. For example,
the Massachusetts Bay Transportation Authority (MBTA), which operates
Boston's T system, has adopted a behavioral screening system to
identify passengers exhibiting suspicious behavior. The Massachusetts
State Police train all MBTA personnel to be on the lookout for behavior
that may indicate someone has criminal intent, and to approach and
search such persons and their baggage when appropriate. Abroad, we
found that 4 of the 13 operators we interviewed had implemented forms
of behavioral screening similar to MBTA's system. All of the domestic
and foreign rail operators we contacted have ruled out an airport-style
screening system for daily use in heavy traffic. According to the
operators, such a system, in which each passenger and the passenger's
baggage are screened by a magnetometer or X-ray machine, raised
concerns about cost, staffing, and customer convenience, among other
factors.
Upgrading technology: Many rail operators we interviewed had embarked
on programs designed to upgrade their existing security technology. For
example, we found that 29 of the 32 U.S. operators had implemented a
form of closed-circuit television (CCTV) to monitor their stations,
yards, or trains. While these cameras cannot be monitored closely at
all times, because of the large number of staff the operators said
would be required, many rail operators told us the cameras act as a
deterrent, assist security personnel in determining how to respond to
incidents that have already occurred, and can be monitored if an
operator has received information that an incident may occur at a
certain time or place in a system. One rail operator, New Jersey
Transit, had installed "smart" cameras, which were programmed to alert
security personnel when suspicious activity occurred, such as if a
passenger left a bag in a certain location or a boat docked under a
bridge. According to the New Jersey Transit officials, this technology
was relatively inexpensive and not difficult to implement. Several
other operators said they were interested in exploring this technology.
Abroad, all 13 of the foreign rail operators we visited had CCTV
systems in place. As in the United States, foreign rail operators use
these cameras primarily to deter crime and to respond to incidents
after they occur, because they do not have enough staff to monitor all
the cameras continuously.
Most rail operators we spoke with had not installed equipment for
detecting chemical or biological agents because of the costs involved,
but a few operators had this equipment or were exploring its purchase.
For example, the Washington Metropolitan Area Transit Authority
(WMATA), in Washington, D.C., has installed these sensors in some of
its stations, thanks to a program jointly sponsored by DOT and the
Department of Energy that provided this equipment to WMATA because of
the high perceived likelihood of an attack in Washington, D.C. Also, at
the time of our review, at least three other domestic rail operators we
spoke with were exploring the possibility of partnering with federal
agencies to install such equipment in their facilities on an
experimental basis. Also, as in the United States, a few foreign
operators had implemented chemical or biological detection devices at
rail stations, but their use was not widespread. Two of the 13 foreign
operators we interviewed had implemented these sensors, and both were
doing so on an experimental basis. In addition, police officers from
the British Transport Police--responsible for policing the rail system
in the United Kingdom--were equipped with pagers to detect chemical,
biological, or radiological elements in the air, allowing them to
respond quickly in case of a terrorist attack using one of these
methods. The British Transit Police also have three vehicles carrying
devices to determine if unattended baggage contains explosives. These
vehicles patrol the system 24 hours per day.
Access control: Tightening access procedures at key facilities or
rights-of-way is another way many rail operators have attempted to
enhance security. A majority of domestic and selected foreign passenger
rail operators had invested in enhanced systems to control unauthorized
access at employee facilities and stations. Specifically, 23 of the 32
U.S. operators had installed a form of access control at key facilities
and stations. This often involved installing a system requiring
employees to swipe an access card to gain access to control rooms,
repair facilities, and other key locations. All 13 foreign operators
had implemented some system to control access to their critical
facilities or rights-of-way.
Rail system design and configuration: In an effort to reduce
vulnerabilities to terrorist attack and increase overall security, rail
transit operators in the United States and abroad have been, or are now
beginning to, incorporate security features into the design of new and
existing rail infrastructure, primarily rail stations. For example, of
the 32 domestic rail operators we contacted, 22 had removed their
conventional trash bins entirely, or replaced them with transparent or
bomb-resistant trash bins, as TSA directed in May 2004. Foreign rail
operators had taken steps to remove traditional trash bins from their
systems. Of the 13 operators we visited, 8 had either removed their
trash bins entirely or replaced them with blast-resistant cans or
transparent receptacles.
Many foreign rail operators are also incorporating aspects of security
into the design of their rail infrastructure. Of the 13 operators we
visited, 11 have attempted to design new facilities with security in
mind and have attempted to retrofit older facilities to incorporate
security-related modifications. For example, one foreign operator we
visited is retrofitting its train cars with windows that passengers can
open in the event of a chemical attack. In addition, the London
Underground, one of the oldest rail systems in the world, incorporates
security into the design of all its new stations as well as of
modifications to existing stations. We observed several security
features in the design of Underground stations, such as the use of
vending machines that have no holes that someone could use to hide a
bomb, and sloped tops to reduce the likelihood that a bomb can be
placed on top of the machine. In addition, stations are designed to
provide staff with clear lines of sight to all areas of the station,
such as underneath benches or ticket machines, and station designers
try to eliminate or restrict access to any recessed areas where a bomb
could be hidden.
In the United States, several rail transit operators said they were
taking security into account when designing new facilities or
remodeling older ones. Twenty-two of 32 rail operators we interviewed
told us that they were incorporating security into the design of new or
existing rail infrastructure. For example, New York City Transit and
Port Authority Trans-Hudson (PATH) officials told us they are
incorporating security into the design of its new stations, including
the redesigned Fulton Street station and the World Trade Center Hub
that were damaged or destroyed during the September 11 attacks. In
addition, in June 2005, FTA issued guidelines for use by the transit
industry encouraging the incorporation of particular security features
into the design of transit infrastructure. These guidelines include,
for example, increasing visibility for onboard staff, reducing the
areas where someone could hide an explosive device on a transit
vehicle, and enhancing emergency exits in transit stations. Figure 2
illustrates several security measures that we observed in rail transit
stations both in the United States and abroad. It should be noted that
this figure represents an amalgam of stations we visited, not any
particular station.
Figure 2: Composite of Selected Security Practices in the Rail Transit
Environment:
[See PDF for image]
[End of figure]
Three Foreign Rail Security Practices Are Not Currently Used in the
United States:
While many of the security practices we observed in foreign rail
systems are similar to those U.S. rail transit operators are
implementing, we encountered three practices in other countries that
were not currently in use among the domestic rail transit operators we
contacted as of June 2005, nor were they performed by the U.S.
government. These practices are discussed below.
Covert testing: Two of the 13 foreign rail systems we visited use
covert testing to keep employees alert about their security
responsibilities. Covert testing involves security staff staging
unannounced events to test the response of railroad staff to incidents
such as suspicious packages or alarms. In one European system, security
staff place suspicious items throughout their system to see how long it
takes operating staff to respond to the items. Similarly, one Asian
rail operator's security staff break security seals on fire
extinguishers and open alarmed emergency doors randomly to see how long
it takes staff to respond. Officials of these operators stated that
these tests are carried out daily and are beneficial because the staff
know they could be tested at any moment and are therefore more likely
to be vigilant about security.
Random screening: Of the 13 foreign operators we interviewed, 2
conducts some form of random screening of passengers and their baggage.
In the systems where this practice is used, security personnel can
approach passengers either in stations or on the trains and ask them to
submit their persons or their baggage to a search. Passengers declining
to cooperate must leave the system. For example, in Singapore, rail
agency officials rotate the stations where they conduct random searches
so that the searches are carried out at a different station each day.
Before the July 2005 London bombings, no rail transit operators in the
United States were randomly screening passengers or baggage every day.
However, during the Democratic National Convention in 2004, MBTA began
randomly screening every 11th passenger at certain stations and times
of the day, asking the passenger to provide his or her bags to be
screened. Those who refused were not allowed to ride the system. MBTA
officials recognized that it is impossible to implement such a system
comprehensively throughout the rail network without major staffing
increases, and that even doing random screening regularly would be a
drain on resources. However, officials stated that such a system is
workable during special events and times of heightened security but
would have to be designed very carefully to ensure that passengers'
civil liberties were not violated. After the July 2005 London bombings,
four rail transit operators--PATH, New York Metropolitan Transportation
Authority, New Jersey Transit, and Utah Transit Authority in Salt Lake
City--implemented limited forms of random baggage screening in their
system.
National government maintains clearinghouse on technologies and best
practices: According to passenger rail operators in five countries we
visited, their national governments have centralized the process for
performing research and developing passenger rail security technologies
and maintaining a clearinghouse on these technologies and security best
practices. According to these officials, this practice allows rail
operators to have one central source for information on the merits of a
particular passenger rail security technology, such as chemical
sensors, CCTVs, and intrusion detection devices. No federal agency has
compiled or disseminated best practices to rail operators to aid in
this process. Some U.S. rail operators we interviewed expressed
interest in there being a more active centralized federal research and
development authority in the United States to evaluate and certify
passenger rail security technologies and make that information
available to rail operators. We have also previously reported that
stakeholders have stated that the federal government should play a
greater role in testing transportation security technology and making
this information available to industry stakeholders.[Footnote 9]
Currently, many operators said they informally ask other rail operators
about their experiences with a certain technology, perform their own
research via the Internet or trade publications, or perform their own
testing. TSA and DOT agree that making the results of research testing
available to industry stakeholders could be a valuable use of federal
resources because it would reduce the need for multiple rail operators
to perform the same research and development efforts, but they have not
taken steps to implement this practice.[Footnote 10]
Implementing these three practices--covert testing, random screening,
and a government-sponsored clearinghouse for technologies and best
practices--in the United States could pose political, legal, fiscal,
and cultural challenges because of the differences between the United
States and these foreign nations. For instance, many foreign nations
have dealt with terrorist attacks on their public transportation
systems for decades, compared with the United States, where rail
transportation has not been specifically targeted during terrorist
attacks. According to foreign rail operators, these experiences have
resulted in greater acceptance of certain security practices, such as
random searches, which the U.S. public may view as a violation of their
civil liberties or which may discourage the use of public
transportation. The impact of security measures on passengers is an
important consideration for domestic rail transit operators, since most
passengers could choose another means of transportation, such as a
personal automobile. As such, security measures that limit
accessibility, cause delays, increase fares, or otherwise cause
inconvenience could push people away from transit and into their cars.
In contrast, the citizens of the European and Asian countries we
visited are more dependent on public transportation than most U.S.
residents and therefore, according to the rail operators we spoke with,
may be more willing to accept more intrusive security measures, simply
because they have no other choice for getting from place to place.
Nevertheless, in order to identify innovative security measures that
could help further mitigate terrorism-related risk to rail assets it is
important to at least consider assessing the feasibility and costs and
benefits of implementing in the United States the three rail security
practices we identified in foreign countries. Officials from DHS, DOT,
passenger rail industry associations, and rail systems we interviewed
told us that operators would benefit from such an evaluation.
Furthermore, the passenger rail association officials told us that such
an evaluation should include practices used by foreign rail operators
that integrate security into infrastructure design.
Differences in the business models and financial status of some foreign
rail operators could also affect the feasibility of adopting certain
security practices in the United States. Several foreign countries we
visited have privatized their passenger rail operations. Although most
of the foreign rail operators we visited--even the privatized systems-
-rely on their governments for some type of financial assistance, two
foreign rail operators generated significant revenue and profits in
other business endeavors, which they said allowed them to invest
heavily in security measures for their rail systems.
Another important difference between domestic and foreign rail
operators is the structure of their police forces. In particular,
England, France, Belgium, and Spain all have national police forces
patrolling rail systems in these countries. The use of a national
police force is a reflection that these foreign countries often have
one nationalized rail system, rather than over 30 rail transit systems
owned and operated by numerous state and local governments, as is the
case in the United States. For example, in France, the French National
Railway operates all intercity passenger rail services in the country,
and the French Railway police provide security. According to foreign
rail operators, the use of one national rail police force allows for
consistent policing and security measures throughout the country. In
the United States, by contrast, some transit agencies maintain
individual polices forces, while others rely on their city or county
police forces for security.
DHS and DOT Help Fund Security Efforts, and Some Funding Decisions Are
Risk-Based:
Both DHS and DOT help fund rail transit security investments, and DHS
has promoted risk-based funding decisions in the allocation of transit
security grants. DHS's Office of Grants and Training administers the
UASI and Transit Security grant programs. These programs have provided
over $320 million in grants to rail transit agencies for certain
security activities since fiscal year 2003. The Office of Grants and
Training has leveraged its grant-making authority to promote risk-based
funding decisions for passenger rail by requiring, for example, that
operators complete a risk assessment to be eligible for a transit
security grant. FTA also helps fund rail transit security efforts
through the financial assistance it provides to transit agencies, with
the stipulation that a certain percentage of federal funds be used for
security activities.
DHS and DOT Help Fund Rail Transit Security Efforts:
With the creation of DHS in 2002, one of its components, the Office of
Grants and Training, became the primary federal source for security
funding for passenger rail systems. The Office of Grants and Training
is the principal component of DHS responsible for preparing the United
States for acts of terrorism and has primary responsibility within the
executive branch for assisting and supporting DHS, in coordination with
other directorates and entities outside the department, in conducting
risk analysis and risk management activities for state and local
governments. In carrying out its mission, the Office of Grants and
Training provides training, funds for the purchase of equipment,
support for the planning and execution of exercises, technical
assistance, and other support to assist states, local jurisdictions,
and the private sector to prevent, prepare for, and respond to acts of
terrorism. Through the UASI grant program, the Office of Grants and
Training has provided grants to urban areas to help enhance their
overall security and preparedness level to prevent, respond to, and
recover from acts of terrorism. In 2003 and 2004, $65 million and $50
million, respectively, were allocated to rail transit agencies through
the UASI program. In addition, the DHS Appropriations Act of 2005
appropriated $150 million for rail transit, intercity passenger rail,
freight rail, and transit agency security grants.[Footnote 11] This
funding has allowed the Office of Grants and Training to build upon the
work under way through the UASI program and create and administer new
programs focused specifically on transportation security, including the
Transit Security Grant Program. This program provides financial
assistance to address security preparedness and enhancements for
transit (to include commuter, heavy, and light rail systems; intracity
buses, and ferries). Table 1 summarizes the funding provided to rail
transit providers through the UASI and Transit Security Grant Program
from 2003 through 2006.
Figure 3: Security Grants Provided by the Office of Grants and Training
to Rail Transit Providers, 2003 through 2006:
[See PDF for image]
Source: DHS Office of Grants and Training.
[End of figure]
Although FTA now plays a supporting role in rail transit security
matters since the creation of TSA, it remains an important partner in
funding security efforts. FTA provides financial assistance to rail
transit agencies to plan and develop new systems and operate, maintain,
and improve existing systems. Rail transit agencies can use some of
this funding for security activities, although the agencies have to
balance investments in security against other competing priorities. In
addition, FTA promotes safety and security through its grant-making
authority. FTA stipulates conditions of grants, such as certain safety
and security statutory and regulatory requirements, and FTA may
withhold funds for noncompliance with the conditions of a grant. For
example, transit agencies must spend 1 percent of their urbanized area
formula funds--which is FTA's largest grant program--on security
improvements.[Footnote 12]
Using Risk Management Approach Can Help Direct Federal Funds to Highest
Rail Transit Security Priorities:
In recent years, we, along with Congress, the executive branch, and the
9/11 Commission have required or advocated that federal agencies with
homeland security responsibilities use a risk management approach to
help ensure that finite national resources are dedicated to assets or
activities considered to have the highest security priority. A risk
management approach entails a continuous process of managing risk
through a series of actions, including setting strategic goals and
objectives, performing risk assessments, evaluating alternative actions
to reduce identified risks by preventing or mitigating their impact,
selecting actions to undertake by management, and implementing and
monitoring those actions. We have concluded that without a risk
management approach, there is limited assurance that programs designed
to combat terrorism are properly prioritized and focused. Targeting
resources to the highest priority is especially critical given the
competition for resources within the rail transit sector, and between
the rail transit sector and the other modes of transportation.
Moreover, as the 2005 London rail bombings dramatically illustrated,
even when a variety of security precautions are put in place, passenger
rail systems remain vulnerable and attractive targets given their open
designs and the high volumes of passengers they transport each day.
Thus, it is important that limited resources are targeted to security
activities that have the greatest impact on reducing overall risk.
DHS' Office of Grants and Training has leveraged its grant-making
authority to promote risk-based funding decisions for passenger rail.
For example, passenger rail operators must have completed a risk
assessment to be eligible for financial assistance through the fiscal
year 2005 Transit Security Grant program administered by the Office of
Grants and Training. To receive these funds, rail transit operators are
also required to have a security and emergency preparedness plan that
identifies how the operator intends to respond to security gaps
identified by risk assessments. This plan, along with a regional
transit security strategy prepared by regional transit stakeholders,
will serve as the basis for determining how the grant funds are to be
allocated.
Coordination between Federal Agencies Has Faced Challenges and Will
Continue to Be Important:
Prior to the creation of DHS, DOT modal agencies, such as FTA and FRA,
were the primary federal agencies involved in rail transit security
matters. Since Congress passed ATSA in 2001, creating TSA and giving it
regulatory authority over the security of all modes of transportation,
federal agencies have had some difficulty coordinating their activities
and communicating to industry stakeholders about their role and
responsibilities. In response to a GAO recommendation, DOT and DHS
entered into an MOU to better coordinate their activities and have
embarked on a number of initiatives to improve their coordination with
each other and with industry stakeholders. Coordination between DHS and
DOT will continue to be important as both departments move forward with
existing programs and new security initiatives, such as TSA's
deployment of its rail inspectors.
DHS and DOT Have Worked to Improve Coordination on Transit Security
Matters:
Although DOT modal administrations have played supporting roles in
transportation security matters since the creation of TSA, they remain
important partners in the federal government's efforts to improve rail
security, given DOT's role in funding and overseeing the safety of rail
transit systems. For example, as previously mentioned, FTA provides
financial assistance to rail transit agencies, and some of this funding
can, and in some cases must, be used for security activities. In
addition, FTA has regulatory authority for state safety oversight of
rail fixed-guideway systems and for a drug and alcohol program, and FRA
has regulatory authority for rail safety over commuter rail operators.
As we have previously reported, it could be difficult to distinguish
DOT's role in maintaining and improving transportation safety from
DHS's role in securing the transportation system because security is
often intertwined with safety.[Footnote 13] Moreover, FTA and FRA are
continuing their rail transit security efforts as TSA moves ahead with
its rail transit security initiatives.[Footnote 14]
We have previously reported that coordination between DHS and DOT, as
well as between DHS and rail transit stakeholders, could be improved.
For example, in our September 2005 report on rail security, we noted
that TSA provided limited opportunities for other federal agencies and
the rail industry to collaborate in the development of its passenger
rail security directives, which were issued in May 2004 to provide a
consistent baseline standard of protective measures for all passenger
rail operators.[Footnote 15] Federal and rail industry officials have
raised questions about the feasibility of implementing and complying
with the directives, noting, among other things, that the directives do
not reflect a complete understanding of the rail transit environment or
necessarily incorporate industry best practices. In addition, in 2003,
we noted that representatives from several associations told us that
they have received conflicting messages from the federal agencies
involved in transportation security, including rail transit.[Footnote
16] We further noted that representatives from several associations
also stated that their members were unclear about which agency to
contact for their various security concerns and which agency has
oversight for certain issues. We concluded that a lack of clearly
defined roles and responsibilities can lead to problems such as
duplication and conflicting efforts, gaps in preparedness, and
confusion. Moreover, a lack of coordination can strain
intergovernmental relationships, drain resources, and raise the
potential for problems in responding to terrorism. Therefore, we
recommended that DHS and DOT use a mechanism, such as a memorandum of
agreement, to clearly delineate their roles and responsibilities. At a
minimum, we recommended that this mechanism establish the
responsibilities of each entity in setting, administering, and
implementing security standards and regulations; determining funding
priorities; and interfacing with the transportation industry, as well
as define each entity's role in the inevitable overlap of some safety
and security activities.
In response to our 2003 recommendation, DHS and DOT signed a memorandum
of understanding (MOU) in September 2004 to develop procedures through
which the two departments could improve their cooperation and
coordination in promoting the safe, secure, and efficient movement of
people and goods throughout the transportation system. The MOU defines
broad areas of responsibility for each department. For example, it
states that DHS, in consultation with DOT and affected stakeholders,
will identify, prioritize, and coordinate the protection of critical
infrastructure. The MOU between DHS and DOT represents an overall
framework for cooperation that is to be supplemented by additional
signed agreements, or annexes, between the departments. These annexes
are to delineate the specific security-related roles, responsibilities,
resources, and commitments for mass transit, rail, research and
development, and other matters. The annex for mass transit security was
signed in September 2005.[Footnote 17] According to DHS and DOT
officials, this annex is intended to ensure that the programs and
protocols for incorporating stakeholder feedback and making
enhancements to security measures are coordinated. For example, the
annex requires that DHS and DOT consult on such matters as regulations
and directives that affect security. The annex also identifies points
of contact for coordinating this consultation.
In addition to their work on the MOU and related annexes, DHS and TSA
have taken other steps to improve collaboration with DOT and industry
stakeholders. In April 2005, DHS officials stated that better
collaboration with DOT and industry stakeholders was needed to develop
strategic security plans associated with various homeland security
presidential directives and statutory mandates, such as the
Intelligence Reform and Terrorism Prevention Act of 2004, which
required DHS to develop a national strategy for transportation security
in conjunction with DOT. Responding to the need for better
collaboration, DHS established a senior-level steering committee in
conjunction with DOT to coordinate the development of this national
strategy. In addition, senior DHS and TSA officials stated that
industry groups would also be involved in developing the national
strategy for transportation security and other strategic plans.
Moreover, according to TSA's assistant administrator for intermodal
programs, TSA intends to work with APTA and other industry stakeholders
in developing security standards for the rail transit
industry.[Footnote 18]
Coordination between Federal Agencies Will Continue to Be Important:
DOT's and DHS's efforts to enhance coordination between their agencies
and with industry stakeholders on security matters are welcome.
Effective coordination between the two departments will continue to be
important as both move forward in implementing existing programs as
well as new security initiatives. For example, FTA administers the
State Safety Oversight program, which mandates that state-designated
agencies oversee the safety of rail transit agencies. Although ATSA
gave TSA final regulatory authority over all modes of transportation,
including rail transit, in the program, FTA sets out minimum
requirements the state oversight agencies must ensure that transit
agencies meet. FTA's mandated minimum requirements include security
components, one of which directs rail transit agencies to maintain a
system security plan that includes controls to address employee and
passenger security and a process for conducting internal security
reviews. Several rail transit operators told us that they were confused
by having to answer to both FTA and TSA for transportation security
matters. We have ongoing work for the full Committee examining the
State Safety Oversight program--and, as part of this review, we will be
exploring the extent to which FTA and TSA work together in implementing
this program. We expect to issue our report later this summer.
Another area that will require continued coordination is DHS's and
DOT's security and safety oversight efforts. TSA has hired rail
inspectors to, among other things, monitor and enforce compliance with
its May 2004 passenger rail security directives. As of March 2006, TSA
had filled 99 of up to 100 inspector positions authorized by
Congress.[Footnote 19] However, TSA has not yet established processes
or criteria for determining and enforcing compliance. TSA has also not
determined how its rail inspectors will be used to enforce the
directives or how they will coordinate with existing FRA safety
inspectors or state oversight auditors involved in the State Safety
Oversight Program. The Director of TSA's Surface Transportation
Inspection Program, which oversees the rail inspectors, and a local
rail inspector program supervisor told us that they looked forward to
coordinating with FTA on the State Safety Oversight program and would
be open to a formalized role in the program, but had not held any
discussions with FTA about what that role would be. In fact, both the
Director and the local supervisor admitted that they were not familiar
with the program's requirements. In addition, the transit security
annex to the MOU between DHS and DOT does not explicitly mention the
State Safety Oversight program as a program for which the two agencies
will collaborate, and officials from several state oversight agencies
said they were unsure what their role would be in overseeing security
once the TSA rail inspectors began their duties. Also, FRA and TSA
officials told us that the details of how TSA rail inspectors will
coordinate with the approximately 400 existing FRA safety inspectors
and 160 state employees enforcing FRA passenger rail rules and
regulations remain to be determined. Both FRA and TSA stated that they
were committed to avoiding duplication of effort and would work to
communicate their respective roles and responsibilities to transit
agency officials.
Another area requiring continued coordination is the funding of rail
transit security activities. Specifically, the Safe, Accountable,
Flexible, Efficient Transportation Equity Act: A Legacy for Users
(SAFETEA-LU)[Footnote 20] included a provision mandating that DOT and
DHS collaborate on a joint rulemaking for the Transit Security Grant
Program. The joint rulemaking is to establish the characteristics of
and requirements for transit security grants, including funding
priorities, eligible activities, methods for awarding grants, and
limitations on administrative expenses. The rule is currently being
drafted, and officials from DHS' Office of Grants and Training told us
they expected it to be finalized in summer 2006.
Concluding Observations:
In conclusion, Mr. Chairman, the 2005 London rail bombings made clear
that even when a variety of security precautions are put in place, rail
transit systems that move high volumes of passengers daily remain
vulnerable to attack. Security cannot be guaranteed. Nevertheless, it
is important that we take steps to identify and mitigate risks to
passenger rail systems. While domestic rail agencies have implemented a
number of security practices that are generally consistent with those
of foreign rail operators, they have not adopted some practices used in
other countries, including covert testing, random screening, and
information clearinghouses for new security technologies and best
practices. Despite the potential political, legal, fiscal, and cultural
challenges that implementing these additional practices in the United
States could pose, we continue to believe that the practices may
warrant further examination, and we stand by our September 2005
recommendations that DHS, in collaboration with DOT and the passenger
rail industry, evaluate the feasibility of implementing them.
As we move forward with efforts to enhance rail transit security, it is
important that we do not examine rail transit security actions and
funding in isolation. Rail transit systems represent one of many modes
of transportation competing for limited federal security resources.
Given competing priorities and finite resources, difficult policy
decisions will have to be made by Congress and the executive branch to
prioritize security efforts and direct resources to the areas of
greatest risk within the passenger rail system, across all
transportation modes, and across other sectors of the economy. As we
have previously noted in past reports, adopting a risk management
approach can help guide and inform these difficult decisions--and help
ensure that finite national resources are dedicated to assets or
activities considered to have the highest security priority. DHS has
taken steps to adopt a risk management approach.
Finally, the sheer number of stakeholders involved in securing rail
transit systems can lead to communication challenges, duplication of
effort, and confusion about roles and responsibilities. With the
execution of the MOU and transit security annex, DHS and DOT have taken
important steps forward in improving coordination among the federal
entities involved in rail transit security matters. These new
agreements will be tested as both departments proceed with new security
initiatives and existing programs, such as FTA's State Safety Oversight
program. We stand ready to assist the Committee and Subcommittee in
monitoring these developments.
Mr. Chairman, this concludes my statement. I would be pleased to answer
any questions that you or other members of the Subcommittee may have at
this time.
Contact Information:
For further information on this testimony, please contact JayEtta Z.
Hecker at (202) 512-2834 or Cathleen A. Berrick at (202) 512-3404.
Individuals making key contributions to this testimony include Nikki
Clowers, Colin Fallon, Kirk Kiester, and Ray Sendejas.
Appendix I--Domestic and Foreign Rail Agencies GAO Contacted for GAO-05-
851:
Table 1: Domestic Passenger Rail Agencies We Visited or Interviewed:
Passenger rail agency: Altamont Commuter Express (ACE);
Urban area served: Stockton and San Jose, California.
Passenger rail agency: Alaska Railroad Corporation;
Urban area served: Anchorage and Fairbanks, Alaska.
Passenger rail agency: Bay Area Rapid Transit (BART);
Urban area served: San Francisco -Oakland, California.
Passenger rail agency: CALTRAIN;
Urban area served: San Francisco and San Jose, California.
Passenger rail agency: San Diego Transit Corp. (Coaster);
Urban area served: San Diego, California.
Passenger rail agency: Dallas Area Rapid Transit/Trinity Railway
Express (DART);
Urban area served: Dallas, Texas.
Passenger rail agency: Greater Cleveland Regional Transportation
Authority (GCRTA);
Urban area served: Cleveland, Ohio.
Passenger rail agency: Los Angeles County Metropolitan Transportation
Authority (LACMTA);
Urban area served: Los Angeles, California.
Passenger rail agency: Metropolitan Atlanta Rapid Transit Authority
(MARTA);
Urban area served: Atlanta, Georgia.
Passenger rail agency: Maryland Transit Administration (MTA);
Urban area served: Greater Washington, DC, and Maryland.
Passenger rail agency: Massachusetts Bay Transportation Authority
(MBTA);
Urban area served: Boston, Massachusetts.
Passenger rail agency: METRA Commuter Rail;
Urban area served: Chicago, Illinois.
Passenger rail agency: Southern California Regional Rail Authority
(Metrolink);
Urban area served: Greater Los Angeles, California.
Passenger rail agency: Long Island Railroad (LIRR);
Urban area served: New York, New York.
Passenger rail agency: Metro North Railroad (MNR);
Urban area served: New York, New York.
Passenger rail agency: New York City Transit (NYCT);
Urban area served: New York, New York.
Passenger rail agency: Staten Island Railway (SIR);
Urban area served: New York, New York.
Passenger rail agency: San Francisco Municipal Railway (MUNI);
Urban area served: San Francisco, California.
Passenger rail agency: Northern Indiana Commuter District;
Urban area served: Chicago, Illinois --Northern Indiana.
Passenger rail agency: Delaware River Port Authority (PATCO);
Urban area served: New Jersey and Philadelphia, Pennsylvania.
Passenger rail agency: Port Authority Trans Hudson (PATH);
Urban area served: New York, New York --New Jersey.
Passenger rail agency: San Diego Trolley;
Urban area served: San Diego, California.
Passenger rail agency: Southeastern Pennsylvania Transportation
Authority (SEPTA);
Urban area served: Philadelphia, Pennsylvania.
Passenger rail agency: South Florida Regional Transportation Authority
(SFRTA);
Urban area served: Miami, Florida.
Passenger rail agency: Connecticut Department of Transportation (Shore
Line East);
Urban area served: New Haven, Connecticut.
Passenger rail agency: Sound Transit (Sounder);
Urban area served: Seattle, Washington.
Passenger rail agency: TRIMET;
Urban area served: Portland, Oregon.
Passenger rail agency: Virginia Railway Express (VRE);
Urban area served: Northern Virginia, Greater Washington, D.C.
Passenger rail agency: Washington Metropolitan Area Transit Authority
(WMATA);
Urban area served: Washington, D.C.
Passenger rail agency: New Jersey Transit (NJT);
Urban area served: Newark, New Jersey --New York, New York.
Passenger rail agency: Miami Dade Transit;
Urban area served: Miami, Florida.
Passenger rail agency: Chicago Transit Authority (CTA);
Urban area served: Chicago, Illinois.
Source: National Transit Database:
[End of table]
Table 2: Foreign Passenger Agencies We Contacted:
Passenger rail agency: Paris Metro;
Area served: Paris, France.
Passenger rail agency: French National Railway;
Area served: France.
Passenger rail agency: London Underground;
Area served: London, United Kingdom.
Passenger rail agency: Network Rail;
Area served: United Kingdom.
Passenger rail agency: Channel Tunnel Rail Link;
Area served: United Kingdom/France.
Passenger rail agency: Belgian National Railway;
Area served: Belgium.
Passenger rail agency: Madrid Metro;
Area served: Madrid, Spain.
Passenger rail agency: RENFE (Spanish National Railway);
Area served: Spain.
Passenger rail agency: JR Central;
Area served: Japan.
Passenger rail agency: Tokyo Metro;
Area served: Tokyo, Japan.
Passenger rail agency: SBS Transit Corporation;
Area served: Singapore.
Passenger rail agency: Singapore Mass Rapid Transit;
Area served: Singapore.
Passenger rail agency: Hong Kong Mass Transit Railway;
Area served: Hong Kong.
Source: GAO:
[End of table]
FOOTNOTES
[1] DHS's Office of Grants and Training was formerly called the Office
of Domestic Preparedness.
[2] Pub. L. No. 108-458, 118 Stat. 3638. For more information on risk
management, see GAO, Transportation Security: Systematic Planning
Needed to Optimize Resources, GAO-05-357T (Washington, D.C.: Feb. 15,
2005); Homeland Security: A Risk Management Approach Can Guide
Preparedness Efforts, GAO-02-208T (Washington, D.C.: Oct. 31, 2001);
and Combating Terrorism: Threat and Risk Assessments Can Help
Prioritize and Target Program Investments, GAO/NSIAD-98-74 (Washington,
D.C.: Apr. 9, 1998).
[3] GAO, Passenger Rail Security: Enhanced Federal Leadership Needed to
Prioritize and Guide Security Efforts, GAO-05-851 (Washington, D.C.:
Sept. 9, 2005); GAO, Rail Security: Some Actions Taken to Enhance
Passenger and Freight Rail Security, but Significant Challenges Remain,
GAO-04-598T (Washington, D.C.: Mar. 24, 2004); GAO, Transportation
Security: Federal Action Needed to Help Address Security Challenges,
GAO-03-843 (Washington, D.C.: June 30, 2003); and GAO, Mass Transit:
Federal Actions Could Help Transit Agencies Address Security
Challenges, GAO-03-263 (Washington, D.C.: Dec. 13, 2002).
[4] GAO-05-851.
[5] FTA's urbanized area formula grant program provides federal funds
to urbanized areas (jurisdictions with populations of 50,000 or more)
for transit capital investments, operating expenses, and transportation-
related planning.
[6] Pub. L. No. 107-71, 115 Stat. 597 (2001).
[7] Pub. L. No. 107-296, 116 Stat. 2135 (2002).
[8] At the time we completed our work in June 2005, these three
practices were not utilized. However, as discussed later in this
testimony, some rail operators began using random screening in the
aftermath of the July bomb attacks on the London subway system and
others may have begun utilizing this or other security practices since
our report.
[9] GAO-03-843.
[10] GAO-03-843.
[11] Pub. L. No. 108-334, 118 Stat. 1298 (2004).
[12] FTA is to verify that agencies comply with the requirement to
spend 1 percent of their urbanized area formula funds on security
improvements and may withhold funding from agencies that it finds are
not in compliance. Agencies are not required to comply with this
spending rule if a valid justification can be documented, such as state
and local funds for security are inadequate or security trend data do
not warrant security spending.
[13] GAO-03-843.
[14] For information about TSA's, FTA's, and FRA's rail transit
security initiatives, see GAO-05-851.
[15] GAO-05-851.
[16] GAO-03-843.
[17] Congress required that an annex to the MOU be signed that would,
among other things, define and clarify the respective transit security
roles and responsibilities of each department. Pub. L. 109-59, § 3028
(2005).
[18] APTA is a standards development organization recognized by DOT
that has set standards for commuter rail, mass transit, and bus safety
and operations.
[19] These positions were funded through the DHS Appropriations Act of
2005 and its accompanying conference report, which provided TSA with
$12 million in funding for rail security activities.
[20] P.L. 109-59.