Protection of Chemical and Water Infrastructure

Federal Requirements, Actions of Selected Facilities, and Remaining Challenges Gao ID: GAO-05-327 March 28, 2005

The National Strategy for Homeland Security grouped critical infrastructure into 13 sectors which include assets that if attacked by terrorists could have a debilitating impact on the nation. Two of these 13 sectors are the chemical and water sectors. The total number of chemical sector facilities is not clear. DHS estimates that there are 4,000 chemical manufacturing facilities that produce, use, or store more than threshold amounts of chemicals that EPA has estimated pose the greatest risk to human health and the environment. There are approximately 53,000 community water systems and more than 2,900 maritime facilities that are required to comply with security regulations under the Maritime Transportation Security Act (MTSA). This report provides information about what federal requirements exist for the chemical and water sectors to secure their facilities, what federal efforts were taken by the lead agencies for these sectors to facilitate sectors' actions, what actions selected facilities within these sectors have taken and whether they reflect a risk management approach, what obstacles they say they faced in implementing enhancements, and what are the Coast Guard's results from its inspection of regulated maritime facilities' security enhancements.

Few federal requirements address the security of the chemical and water sectors. However, the Department of Homeland Security (DHS) and the Environmental Protection Agency (EPA) have taken actions to assist the chemical and water sectors to implement security enhancements including providing financial assistance in the form of grants, threat information and guidance, training and exercises, and infrastructure protection initiatives, as well as setting security requirements for some facilities and reviewing actions by maritime facilities to determine compliance with MTSA. Except for facilities covered by MTSA, the chemical sector's security efforts are not regulated. The water sector is regulated by the Bioterrorism Act of 2002, which, among other things, requires community water systems to perform vulnerability analyses of their facilities. Chemical facilities and community water systems reported making security improvements separate from federal requirements. The chemical industry's two principal trade associations require their members to follow a security code that includes elements of a risk management framework such as completing vulnerability assessments and taking actions based on those assessments. Officials at all 10 chemical facilities GAO visited reported making significant progress in implementing the trade associations' security code. However, the proportion of total chemical facilities covered by the code is uncertain. The 8 water systems GAO visited reported completing their required vulnerability assessments, which is one element of a risk management framework. Although community water systems are not required to take any risk reduction measures under the Bioterrorism Act, these 8 water systems reported implementing a number of enhancements, such as increasing access controls. Officials representing 8 of the 10 chemical facilities and 8 community water systems GAO visited reported encountering obstacles in making security enhancements and maintaining a level of security consistent with their needs. Officials at 3 chemical facilities reported experiencing difficulties, such as delays, in obtaining permits or other approvals needed from federal authorities to install fences to better protect the perimeter of their facilities. Officials at 6 of the community water systems GAO visited reported economic constraints, such as balancing the need for rate increases to fund security enhancements with efforts to keep rates low. MTSA's security requirements cover more than 2,900 maritime facilities, including chemical facilities. The Coast Guard found that 97 percent of these facilities complied with MTSA and its implementing regulations. The Coast Guard took 312 enforcement actions against 98 facility owners and operators and imposed operational controls on 29 facilities across the more than 2,900 MTSA-regulated facilities. DHS and EPA generally concurred with the contents of the report.



GAO-05-327, Protection of Chemical and Water Infrastructure: Federal Requirements, Actions of Selected Facilities, and Remaining Challenges This is the accessible text file for GAO report number GAO-05-327 entitled 'Protection of Chemical and Water Infrastructure: Federal Requirements, Actions of Selected Facilities, and Remaining Challenges' which was released on April 4, 2005. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to the Honorable Robert C. Byrd, Ranking Member, Subcommittee on Homeland Security, Committee on Appropriations, U.S. Senate: United States Government Accountability Office: GAO: March 2005: Protection of Chemical and Water Infrastructure: Federal Requirements, Actions of Selected Facilities, and Remaining Challenges: GAO-05-327: GAO Highlights: Highlights of GAO-05-327, a report to the Honorable Robert C. Byrd, Ranking Member, Subcommittee on Homeland Security, Committee on Appropriations, U.S. Senate: Why GAO Did This Study: The National Strategy for Homeland Security grouped critical infrastructure into 13 sectors which include assets that if attacked by terrorists could have a debilitating impact on the nation. Two of these 13 sectors are the chemical and water sectors. The total number of chemical sector facilities is not clear. DHS estimates that there are 4,000 chemical manufacturing facilities that produce, use, or store more than threshold amounts of chemicals that EPA has estimated pose the greatest risk to human health and the environment. There are approximately 53,000 community water systems and more than 2,900 maritime facilities that are required to comply with security regulations under the Maritime Transportation Security Act (MTSA). This report provides information about what federal requirements exist for the chemical and water sectors to secure their facilities, what federal efforts were taken by the lead agencies for these sectors to facilitate sectors' actions, what actions selected facilities within these sectors have taken and whether they reflect a risk management approach, what obstacles they say they faced in implementing enhancements, and what are the Coast Guard's results from its inspection of regulated maritime facilities' security enhancements. What GAO Found: Few federal requirements address the security of the chemical and water sectors. However, the Department of Homeland Security (DHS) and the Environmental Protection Agency (EPA) have taken actions to assist the chemical and water sectors to implement security enhancements including providing financial assistance in the form of grants, threat information and guidance, training and exercises, and infrastructure protection initiatives, as well as setting security requirements for some facilities and reviewing actions by maritime facilities to determine compliance with MTSA. Except for facilities covered by MTSA, the chemical sector's security efforts are not regulated. The water sector is regulated by the Bioterrorism Act of 2002, which, among other things, requires community water systems to perform vulnerability analyses of their facilities. Chemical facilities and community water systems reported making security improvements separate from federal requirements. The chemical industry's two principal trade associations require their members to follow a security code that includes elements of a risk management framework such as completing vulnerability assessments and taking actions based on those assessments. Officials at all 10 chemical facilities GAO visited reported making significant progress in implementing the trade associations' security code. However, the proportion of total chemical facilities covered by the code is uncertain. The 8 water systems GAO visited reported completing their required vulnerability assessments, which is one element of a risk management framework. Although community water systems are not required to take any risk reduction measures under the Bioterrorism Act, these 8 water systems reported implementing a number of enhancements, such as increasing access controls. Officials representing 8 of the 10 chemical facilities and 8 community water systems GAO visited reported encountering obstacles in making security enhancements and maintaining a level of security consistent with their needs. Officials at 3 chemical facilities reported experiencing difficulties, such as delays, in obtaining permits or other approvals needed from federal authorities to install fences to better protect the perimeter of their facilities. Officials at 6 of the community water systems GAO visited reported economic constraints, such as balancing the need for rate increases to fund security enhancements with efforts to keep rates low. MTSA's security requirements cover more than 2,900 maritime facilities, including chemical facilities. The Coast Guard found that 97 percent of these facilities complied with MTSA and its implementing regulations. The Coast Guard took 312 enforcement actions against 98 facility owners and operators and imposed operational controls on 29 facilities across the more than 2,900 MTSA-regulated facilities. DHS and EPA generally concurred with the contents of the report. What GAO Recommends: Because GAO has previously made recommendations on the key issues discussed in this report, we are not making any new recommendations. www.gao.gov/cgi-bin/getrpt?GAO-05-327. To view the full product, including the scope and methodology, click on the link above. For more information, contact William O. Jenkins, Jr., (202) 512-8777, or jenkinswo@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: Few Federal Security Requirements Exist for the Chemical and Water Sectors, but Other Federal Actions Have Facilitated these Sectors' Efforts to Enhance Security: Chemical Facilities and Water Systems Reported Taking Actions to Address Security Vulnerabilities but Said They Faced Obstacles in Implementing Security Measures: The Chemical and Water Sectors Have Incorporated Some Elements of a Risk Management Framework to Address Their Security Vulnerabilities: Officials at Chemical Facilities and Water Systems We Visited Agreed in Part about What the Federal Government's Role Should Be: The U.S. Coast Guard Completed Its Compliance Inspections and Plans to Review the Effectiveness of the Process: Agency Comments: Appendix I: Scope and Methodology: Appendix II: Number of Community Water Systems: Appendix III: Chemical Industry Trade Associations' Implementation of the Responsible CareŽ Security Code: Appendix IV: Enforcement Actions Taken by the Coast Guard against MTSA- Regulated Facilities: Appendix V: Acknowledgments of Agency and Private Sector Contributors: Appendix VI: Comments from the Department of Homeland Security: Appendix VII: GAO Contacts and Staff Acknowledgments: GAO Contacts: Acknowledgments: Related GAO Products: Tables: Table 1: Type of Security Enhancements the 10 Chemical and 8 Water Facilities We Visited Reported Making Since September 11: Table 2: Existing Industry Initiatives and Federal Security Requirements Imposed on Chemical, Water, and Maritime Facilities: Table 3: Number of Community Water Systems by Ownership and Population Service Category for Fiscal Year 2004: Table 4: Responsible CareŽ Security Code Deadlines for ACC Facilities: Table 5: Responsible CareŽ Security Code Deadlines for SOCMA Facilities: Table 6: Enforcement Actions Taken between July 1, 2004, and December 31, 2004, by Regulatory Citation Topic: Figures: Figure 1: A Chemical Facility: Figure 2: A Community Water System: Figure 3: A Maritime Facility: Figure 4: Examples of Perimeter and Access Controls Chemical Facilities Reported Implementing: Figure 5: A Risk Management Cycle: Abbreviations: ACC: American Chemistry Council: AMWA: Association of Metropolitan Water Agencies: DHS: Department of Homeland Security: EPA: Environmental Protection Agency: MTSA: Maritime Transportation Security Act of 2002: NAWC: National Association of Water Companies: NRWA: National Rural Water Association: SOCMA: Synthetic Organic Chemical Manufacturers Association: United States Government Accountability Office: Washington, DC 20548: March 28, 2005: The Honorable Robert C. Byrd: Ranking Member, Subcommittee on Homeland Security: Committee on Appropriations: United States Senate: Dear Senator Byrd: The USA PATRIOT Act defined critical infrastructure as those "systems and assets . . . so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters."[Footnote 1] We often take these systems for granted because they are so basic in our daily lives that we generally only notice them when their service is disrupted. The National Strategy for Homeland Security grouped the critical infrastructure of the United States into 13 sectors--agriculture, banking and finance, chemical, defense industrial base, emergency services, energy, food, government, information and telecommunications, postal and shipping, public health, transportation, and water sectors. Further, the President designated a lead agency for each of the 13 sectors to coordinate interaction between the federal government and the private sectors. The lead agency for the chemical sector is the Department of Homeland Security (DHS) and the lead agency for the water sector is the Environmental Protection Agency (EPA). In this report, we focus on the chemical and water sectors and on maritime facilities within the transportation sector. These three sectors include a variety of vital assets. Although the total number of chemical sector facilities is not clear, there are many facilities that manufacture chemicals. There are about 15,000 facilities--including chemical, water, energy, and other sector facilities--that produce, use, or store more than threshold amounts of chemicals the EPA has estimated pose the greatest risk to human health and the environment. Of these 15,000 facilities, DHS estimates there are about 4,000 chemical manufacturing facilities. There are approximately 53,000 community drinking water systems and more than 2,900 maritime facilities that are required to comply with certain provisions of the Maritime Transportation Security Act of 2002 (MTSA).[Footnote 2] Terrorist attacks, such as the theft of certain chemicals or contamination of our water at chemical, water, or maritime critical infrastructure facilities, could have a significant impact on the health and safety of millions of Americans and result in environmental damage or disruption to the economy. This report responds to your request that we describe the actions that the private sector is taking to secure its critical assets in chemical, water, and maritime facilities. We are providing information on the following questions: (1) What federal requirements exist for the chemical and water sectors to secure their facilities and what federal efforts were taken by the lead agencies for the chemical and water sectors to facilitate these sectors' actions? (2) What actions have the chemical and water sectors reported taking to address security vulnerabilities and what, if any, obstacles did they say they faced in implementing security measures? (3) To what extent do the chemical and water sectors' actions reflect a risk management approach? (4) How do the chemical and water sectors perceive the role of the federal government in protecting these facilities? (5) What are the results of the Coast Guard's compliance inspection program to ensure that maritime facilities implemented security enhancements as required by the MTSA and what actions has the Coast Guard taken to ensure that its program is effective? To address our five objectives, we reviewed pertinent federal legislation, implementing regulations, and agency guidance on facility security and met with DHS and EPA officials. We also met with industry representatives from the American Chemistry Council (ACC) and the Synthetic Organic Chemical Manufacturers Association (SOCMA),[Footnote 3] the two principal U.S. chemical industry associations; the Association of Metropolitan Water Agencies (AMWA),[Footnote 4] representing public water systems; 10 chemical facilities that were members of ACC or SOCMA; and 8 community water systems, 5 public and 3 private. We also obtained information from the National Association of Water Companies (NAWC), which represents privately owned water systems and the National Rural Water Association (NRWA).[Footnote 5] In conducting our work in the water sector, we focused on community water systems--public water systems that supply water to the same population year-round--since the primary focus of critical infrastructure efforts in the water sector is on these systems. Seven of the 10 chemical facilities we visited are located on navigable waterways and are also regulated by the Coast Guard under the MTSA. We included chemical facilities from which a chemical release, resulting from an attack, could have a severe impact on surrounding communities. To assist us in selecting these facilities, we relied upon assessments completed by ACC and SOCMA members regarding the impact of a potential chemical release at its facilities. In conducting our work on the chemical sector, we focused on actions taken to strengthen security at a selected facility. We did not address actions taken by facility personnel to protect the transport of chemicals from the facility to other locations by way of various transport mechanisms such as rail cars or tank trucks nor did we address actions taken by facility personnel to prevent the sale of hazardous chemicals to terrorists masquerading as bona fide customers. The 8 community water systems we chose served a range of populations and were selected from systems that were subject to drinking water security and safety requirements of the Public Health Security and Bioterrorism Response Act of 2002 (Bioterrorism Act).[Footnote 6] We also interviewed Coast Guard officials in headquarters and five local Coast Guard Marine Safety Offices and reviewed Coast Guard data and documents regarding the Coast Guard's efforts to complete compliance inspections of facilities covered by MTSA, enforcement actions and operational controls taken, and efforts to ensure the effectiveness of the inspection program. Information gathered from the 10 chemical and 8 water facilities we visited are illustrative, are not statistically representative of their respective industry as a whole, and therefore should not be considered to represent the views of the sectors as a whole. We conducted our work in accordance with generally accepted government auditing standards from October 2004 through March 2005. Appendix I includes more detailed information on our scope and methodology. Results in Brief: Few federal requirements address security in the chemical and water sectors. However, the government has provided financial and other types of assistance to help these sectors implement security improvements. The federal government has enacted some legislation in these sectors to help prevent accidental releases of hazardous materials. For example, the Emergency Planning and Community Right to Know Act requires, in general, certain facilities to participate with local emergency planning committees that develop emergency response plans in the event of an accidental release of hazardous material.[Footnote 7] With the enactment of the Bioterrorism Act of 2002, the federal government provided legislation to secure community water systems that serve more than 3,300 people, including systems that store various chemicals, against intentional attacks. This act requires operators of community water systems to perform vulnerability analyses of their facilities and to prepare or update an existing emergency response plan. MTSA and its implementing regulations require maritime facility owners and operators, including chemical facilities, to conduct assessments of their facilities to identify vulnerabilities, develop security plans to mitigate these vulnerabilities, and implement the measures discussed in the security plans. Other federal actions taken by DHS and EPA to assist the chemical and water sectors include providing financial assistance in the form of grants, threat information and guidance, training and exercises, and infrastructure protection initiatives, as well as setting security requirements for some facilities and reviewing actions by maritime facilities to determine compliance with MTSA. Chemical facilities and community water systems reported making security improvements separate from federal requirements. The chemical industry's principal trade associations, the American Chemistry Council and the Synthetic Organic Chemical Manufacturers Association, adopted the Responsible CareŽ Security Code in 2002; it requires their member companies to perform vulnerability assessments, develop plans to mitigate vulnerabilities, take actions to implement the plans, and undergo a third-party verification that facilities implemented identified physical security enhancements. All 10 of the chemical facilities we visited reported making significant progress in fulfilling the requirements of the security code. Other facilities that use chemicals also have developed security initiatives on their own, some of which are modeled after the Responsible CareŽ Security Code. Although the water sector has not generated a specific industry code, the eight community water systems we visited were all regulated under the Bioterrorism Act, which requires systems to, among other things, perform vulnerability analyses of their facilities and prepare or update an existing emergency response plan with respect to intentional attacks. All eight of the community water systems we visited reported that they had completed their vulnerability assessments as well as implemented additional enhancements not required under the Bioterrorism Act, such as increasing access controls. Despite progress being made to enhance security, officials at both the chemical facilities and community water systems we visited reported encountering obstacles in making security enhancements and maintaining a level of security consistent with their needs. For example, officials at three chemical facilities reported experiencing difficulties, such as delays in obtaining permits or other approvals needed from federal authorities to install fences to better protect the perimeter of their chemical facilities. Officials at six of the community water systems we visited reported economic constraints, such as balancing the need for rate increases to fund security enhancements with efforts to keep rates low. Through federal regulations and private sector efforts, chemical facilities that are members of the chemical industry's principal trade associations and the drinking water sector have incorporated some elements of a risk management framework to improve their security since September 11. A risk management framework includes assessing risk, evaluating alternatives for reducing risks, prioritizing which of those alternatives to implement, monitoring their implementation, and continually using new information to adjust actions taken. Information about risks is central to determining which security enhancements should be implemented based on available resources. Although the chemical sector's security efforts are not regulated, the chemical industry's principal trade associations require their members, as a condition of membership, to follow a security code. While the code incorporates elements of a risk management framework, the proportion of total chemical facilities within the chemical sector that adhere to the code is uncertain. About 2,300 ACC and SOCMA chemical manufacturing facilities follow the Responsible CareŽ Security Code; 1,100 of which are among the 15,000 facilities--including chemical, water, energy, and other sector facilities--that produce, use, or store more than threshold amounts of chemicals that EPA has estimated pose the greatest risk to human health and the environment. Within these 15,000 facilities, DHS estimates there are about 4,000 chemical manufacturing facilities. In March 2003, we recommended that the Secretary of Homeland Security and the Administrator of EPA jointly develop, in consultation with the Office of Homeland Security a comprehensive national chemical security strategy to include, among other things, information on industry security preparedness and a legislative proposal to require chemical facilities to expeditiously assess their vulnerability to terrorist attacks and, where necessary, require these facilities to take corrective action.[Footnote 8] At that time, DHS and EPA agreed that legislation requiring chemical facilities to assess and address vulnerabilities to terrorist attack should be enacted. The water sector is regulated by the Bioterrorism Act of 2002, which requires community water systems serving more than 3,300 people to, among other things, perform vulnerability analyses of their facilities. The community water systems we visited implemented enhancements not required under the act, although actions were limited by their own resource constraints. The nation's drinking water systems are not required to implement any risk reduction actions based on their vulnerability assessments or report to EPA on measures that have been implemented. Thus, the extent of the actions taken by these water systems is unknown. However, the Conference Report accompanying the Department of Homeland Security Appropriations Act for fiscal year 2005 calls for DHS to analyze whether it should require private sector entities to provide it with information concerning these entities' security measures and vulnerabilities to improve DHS's ability to evaluate critical infrastructure protections nationwide.[Footnote 9] This report also mandates that GAO review DHS's analysis when it is complete. A DHS official has told us that it preliminarily expects to complete this analysis in December 2005. In February 2005, DHS released its interim National Infrastructure Protection Plan, which we have not fully evaluated. This plan outlines a risk management framework to guide future efforts to identify and protect critical infrastructure and defines the roles of federal, state, local, and tribal agencies and the private sector using elements of this framework. Operators of chemical manufacturing facilities and community water systems we contacted agreed that the federal role should include communicating threat information but had different views with respect to the need for the government to enact additional regulation to enhance security protection. Officials at 8 of the 10 of the chemical facilities we visited reported that the federal government should introduce regulations comparable to the Responsible CareŽ Security Code for the entire chemical sector to follow. Officials at 3 of the facilities we visited stated that those facilities that do not adhere to the Responsible CareŽ Security Code may have a competitive advantage over those facilities that do adhere to the code. In comparison, the majority of officials at the community water systems we visited reported that the federal government should provide technical support and guidance to help the water sector in developing and implementing security enhancements. The majority of officials we interviewed also supported the need for the federal government to expand financial support for security enhancements in the water sector by providing funding designated for community water systems. The Coast Guard has found that the vast majority, or approximately 97 percent, of maritime facilities are in compliance with MTSA requirements. However, the Coast Guard has not yet determined the effectiveness of its MTSA compliance inspection process. The Coast Guard reported inspecting all of the more than 2,900 regulated facilities between July 1, 2004, and December 31, 2004, and taking 312 enforcement actions against facility owners or operators for noncompliance with MTSA requirements. In addition to taking the 312 enforcement actions, the Coast Guard imposed operational controls on 29 MTSA facilities, such as suspending certain facility operations. The Coast Guard has taken some actions to facilitate the effectiveness of its compliance program, such as developing detailed checklists for facility inspections and training its inspectors. However, because of the high priority given to complete inspections at all regulated facilities by December 31, 2004, the Coast Guard said it has not completed an evaluation of the overall effectiveness of the compliance inspections, but plans to incorporate lessons learned from such an evaluation in the future. In June 2004, we issued a report on the status of the Coast Guard's strategy for monitoring and overseeing the implementation requirements of MTSA. At that time, we recommended that the Coast Guard evaluate its initial compliance inspection efforts upon completion and use the results to strengthen the compliance process for its long-term strategy.[Footnote 10] The Coast Guard agreed with our recommendation. We provided a draft of this report to DHS and EPA for review and comment. DHS and EPA generally concurred with the contents of the report. A copy of DHS's letter commenting on the report is presented in appendix VI. EPA did not provide a formal letter. Background: The National Strategy for Homeland Security and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets identified the private sector as the owner of 85 percent of the nation's critical infrastructure and recognized that the owners of this infrastructure bear primary responsibility for protecting their facilities from deliberate acts of terrorism. The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets specifically designated the role of the federal government, "to coordinate the complementary efforts and capabilities of government and private institutions to raise our level of protection over the long term." Moreover, the President issued a directive emphasizing the federal government's role by designating the Secretary of Homeland Security to identify, prioritize, and coordinate the protection of critical infrastructure and key resources with an emphasis on those that could be exploited to cause catastrophic health effects or mass casualties.[Footnote 11] The directive requires the Secretary to collaborate with other federal departments and agencies to develop a program to map critical infrastructure and key resources; model the potential implications of terrorist exploitation of vulnerabilities within the critical infrastructure and key resources; and develop a national indications and warnings architecture, among other things, to help identify indicators and precursors to an attack. This directive also required DHS to produce a comprehensive integrated National Plan for Critical Infrastructure and Key Resources Protection to outline national goals, objectives, milestones, and key initiatives by December 17, 2004. Our report focuses on efforts in the chemical and water sectors and the maritime segment of the transportation sector. The chemical sector is diverse in that its facilities produce, use, or store a multitude of products including (1) basic chemicals used to manufacture other products such as plastics, fertilizers, and synthetic fibers; (2) specialty chemicals used for a specific purpose such as a functional ingredient or as a processing aid in the manufacture of a diverse range of products such as adhesives and solvents, coatings, industrial gases, industrial cleaners, and water management chemicals; (3) life science chemicals consisting of pharmaceuticals and pesticides; and (4) consumer products such as hair and skin care products and cosmetics. To produce and deliver these products, the sector depends on raw materials, manufacturing plants and processes, and distribution systems, as well as research facilities and supporting infrastructure services, such as transportation and electricity. Because many chemicals are inherently hazardous, the release of chemicals or the risk of contamination at chemical facilities poses a potential threat to public health and the economy. Figure 1 depicts a chemical facility. Figure 1: A Chemical Facility: [See PDF for image] [End of figure] The water sector consists of two basic components: freshwater supply and wastewater collection and treatment. As we previously mentioned, we focused on community water systems within supply since the primary focus of critical infrastructure efforts is on these systems. According to EPA data, in 2004, there were approximately 53,000 community water systems in the United States.[Footnote 12] EPA's data reflect that ownership of these systems is evenly split--about half are publicly owned by state and local authorities and about half are privately owned.[Footnote 13] According to EPA, the majority of the U.S. population gets its water from publicly owned systems (see app. II for more details on the number of community water systems in the United States). Community water systems vary by size and other factors but most typically include a supply source, such as a reservoir; a treatment facility, which stores and uses chemicals, such as chlorine, to eliminate biological contaminants; and a distribution system, which includes water towers, piping grids, pumps, and other components to deliver treated water to consumers. Community water systems often contain thousands of miles of pipes and numerous access points that can be vulnerable to terrorist attack. Figure 2 reflects a community water system. Figure 2: A Community Water System: [See PDF for image] [End of figure] Maritime facilities include a number of waterfront facilities such as container terminals, factories, and shipping terminals, which may contain hazardous materials, as well as passenger terminals. In addition to possessing the potential for being used as a conduit for smuggling weapons of mass destruction or other dangerous materials into the country, maritime facilities present attractive targets of opportunity for terrorists to impact the nation's economy. Figure 3 depicts a maritime facility. Figure 3: A Maritime Facility: [See PDF for image] [End of figure] Few Federal Security Requirements Exist for the Chemical and Water Sectors, but Other Federal Actions Have Facilitated these Sectors' Efforts to Enhance Security: Currently, few federal requirements specifically address the security of chemical or drinking water systems from terrorism. Some federal requirements have been enacted to help prevent and mitigate accidental releases of hazardous chemicals. For example, the Emergency Planning and Community Right to Know Act requires, in general, certain facilities to participate with local emergency planning committees that develop emergency response plans in the event of an accidental release of hazardous material. Additionally, the 1990 Clean Air Act Amendments[Footnote 14] require certain chemical facilities to develop risk management plans to help prevent accidental releases of hazardous air pollutants. Under this act, EPA requires that about 15,000 facilities--including chemical, water, energy, and other sector facilities--that produce, use, or store more than threshold amounts of chemicals posing the greatest risk to human health and the environment take a number of steps to prevent and prepare for an accidental chemical release.[Footnote 15] Specifically, EPA regulations implementing the Clean Air Act require that the owners and operators of chemical facilities include a facility hazard assessment, an accident prevention program, and an emergency response program as part of their risk management plans. The Bioterrorism Act was enacted to specifically help secure community water systems that provide water to more than 3,300 people, including such systems' storage of various chemicals, against purposeful attacks.[Footnote 16] It requires operators of community water systems to perform vulnerability analyses of their facilities and to prepare or update an existing emergency response plan. MTSA and its implementing regulations require maritime facility owners and operators to conduct assessments of certain at-risk facilities to identify vulnerabilities, develop security plans to mitigate these vulnerabilities, and implement the measures discussed in the security plans. Although the federal government does not have primary responsibility for implementing security enhancements at privately owned critical infrastructure, DHS and EPA--the lead agencies for the chemical and water sectors respectively--have taken some actions to try to facilitate private sector security improvements by (1) providing financial assistance, (2) providing information and guidance, (3) providing training and exercises, (4) developing infrastructure protection initiatives, (5) setting security requirements for some facilities and related deadlines for taking required measures, and (6) reviewing actions taken at those facilities. * Providing financial assistance: The federal government has provided financial assistance through several grant programs such as port security grants,[Footnote 17] EPA's security planning grant program for vulnerability assessments,[Footnote 18] and the Homeland Security Grant Program[Footnote 19] for infrastructure security. For example, 4 of the 10 chemical facilities we visited reported receiving port security grants ranging from $265,000 to $1.8 million that helped to defray the costs they incurred in implementing security enhancements since September 11, which ranged from $2.3 million to $10 million.[Footnote 20] * Information sharing and guidance: DHS and EPA partner with the chemical and water sectors' Information Sharing and Analysis Centers to coordinate and establish information-sharing mechanisms on critical infrastructure protection that includes threat information.[Footnote 21] As we reported in January 2005, DHS is also seeking to enhance communication between critical infrastructure sectors, like the chemical and water sectors, with the government.[Footnote 22] For example, it established a Water Sector Coordinating Council that consists of representative members of the water sector community and is charged with identifying information and other needs of the sector, including the appropriate use of and the relationships among the Water Information Sharing and Analysis Center, the Water Security Channel, and the Homeland Security Information Network--a national communication mechanism that is to provide the water sector with a suite of information and communication tools to share critical information within the sector, across other sectors, and with DHS.[Footnote 23] According to a DHS official, the department is assembling a Government Coordinating Council made up of federal, state, and local officials to assess impacts across critical infrastructure sectors, including the water sector. A DHS official also told us that a similar Government Coordinating Council for the chemical sector was formed on March 17, 2005. For maritime facilities, the Coast Guard established local port security committees known as Area Maritime Security Committees to, among other things, serve as a link for communicating threats and disseminating appropriate security information to port stakeholders such as facility owners or operators. Required under MTSA, these committees are headed by a Coast Guard officer and are composed of a wide range of port stakeholders including members from law enforcement agencies, maritime industry (which could include chemical facilities on the waterfront), and federal, state, and local governments. DHS and EPA have also provided guidance to the chemical and water sectors, respectively, for conducting risk assessments.[Footnote 24] In addition, EPA provides technical assistance to the water sector to help ensure the continued security of the nation's drinking water. For example, trained environmental professionals, scientists, and engineers provide information on technological advances in water security. EPA prepared voluntary guidelines--the Interim Final Response Protocol Toolbox: Planning for and Responding to Contamination Threats to Drinking Water Systems--for drinking water systems to use to help plan for and respond to intentional threats and incidents related to water contamination. EPA also established a Water Security Working Group made up of 16 members from the wastewater and drinking water utilities and environmental and rate-setting organizations. The group advises the National Drinking Water Advisory Council (NDWAC)[Footnote 25] on ways to address several specific security needs of the sector. The working group is to identify features of an active and effective security program and ways to measure the adoption of these practices and provide recommendations to NDWAC by the spring of 2005. The working group is also charged with identifying incentives for the voluntary adoption of an active and effective security program in the drinking water and wastewater sector. In turn, NDWAC provides advice and recommendations to EPA related to drinking water quality, including water security and emerging issues on drinking water. * Training and exercises: DHS and EPA have also provided a series of specialized security training courses to assist the private sector in protecting its critical assets. For instance, DHS has provided training programs to first responders and facility security officers to better equip these personnel with appropriate skills to prevent and protect against continuing and emerging threats to the nation's critical infrastructure. Additionally, EPA has sponsored a variety of training courses, meetings, workshops, and webcasts to help enhance the security and emergency response capabilities of drinking water facilities. DHS has also initiated several security exercises with individual facilities and held portwide exercises or drills initiated by the Coast Guard to help these facilities react appropriately in the event of a terrorist attack. * Infrastructure protection initiatives: Two initiatives that DHS has under way to facilitate efforts by the private sector to enhance critical infrastructure protection are the Buffer Zone Protection Program and Site Assistance Visits. As part of the Buffer Zone Protection Program--a program designed to reduce specific vulnerabilities by developing protective measures that extend from the critical infrastructure site to the surrounding community--DHS provides advice and guidance to state and local partners as they prioritize specific vulnerability reduction efforts. DHS also conducts site assistance visits at critical infrastructure sites nationwide to address key areas of concern at facilities requiring security enhancements. DHS subject matter experts in the area of physical security measures, system/interdependencies, and terrorist attack planning conduct these visits (which generally last 1 to 3 days) in which, among other things, the vulnerabilities of the site or facility are identified and mitigation options are discussed. The site assistance visits also provide insight into threats that pertain to the sector based on DHS's access to threat information. * Setting security requirements and deadlines: In October 2003, the Coast Guard issued regulations to enforce MTSA's security requirements for maritime facilities, including some chemical facilities in proximity to waters subject to U.S. jurisdiction. These regulations established a process and related deadlines for maritime facilities to follow in assessing their security risks and preparing related plans to include actions mitigating any identified vulnerabilities. * Reviewing actions taken: In 2004, the Coast Guard began a compliance inspection program with on-site inspections and spot checks to help ensure compliance by MTSA-regulated facilities. As part of its efforts to coordinate with the chemical sector to enhance critical infrastructure protection as discussed above, DHS gathered data on actions taken by some chemical facilities. However, DHS officials told us that these data do not reflect actions taken by the entire chemical industry. In addition, EPA officials told us that while engaged in meetings and technical assistance or training sessions with community water systems, they received information on actions taken by some community water systems. However, they also stated that this information was anecdotal and does not reflect actions taken by the entire water sector. Chemical Facilities and Water Systems Reported Taking Actions to Address Security Vulnerabilities but Said They Faced Obstacles in Implementing Security Measures: One of the chemical industry's principal trade associations, ACC, set policy for its members to follow that was designed to strengthen infrastructure protection at its members' facilities, whereas, the water sector followed the requirements of legislation. While the chemical and water facilities we visited reported taking a variety of actions to strengthen the security of their facilities; they also identified obstacles both in making these enhancements and in maintaining them. Chemical Facilities and Water Systems We Visited Reported Making Security Enhancements Separate from Federal Regulations: After September 11, the chemical and water sectors reported taking a variety of actions to strengthen the security of their facilities. Prior to September 11, ACC, SOCMA, and the Chlorine Institute initiated the development of Site Security Guidelines for its members to help facility managers make decisions on appropriate security measures based on risk that were subsequently published in October 2001. In 2002, ACC adopted a security code to accompany its Responsible Care Management SystemŽ.[Footnote 26] As a condition of membership, ACC requires its members to adhere to its Responsible CareŽ Security Code. Under the Responsible CareŽ Security Code, member companies are to perform vulnerability assessments, develop plans to mitigate vulnerabilities, take actions to implement the plans, and undergo third-party verification that the facilities implemented identified physical security enhancements. While the Responsible CareŽ Security Code does not require third parties to verify that a vulnerability assessment was conducted appropriately or that actions taken by a facility adequately address security risks, the Responsible Care Management SystemŽ certification requirements do require member companies to periodically conduct independent third-party audits that include an assessment of their security programs and processes and implementation of corrective actions. SOCMA also adopted the Responsible CareŽ Security Code, requiring its members to adhere to it as well. (For more details regarding the Responsible CareŽ Security Code and the status of ACC and SOCMA members' actions, see app. III). In June, 2004, the chemical industry confirmed to DHS that it had established the Chemical Sector Council to act as a coordination mechanism for the chemical sector to identify, prioritize, and coordinate the protection of critical infrastructure and key resources; and to facilitate sharing of information about physical and cyber threats, vulnerabilities, incidents, potential protective measures and best practices. The Chemical Sector Council is composed of 15 sector associations: ACC, the American Forest and Paper Association, the Chemical Producers and Distributors Association, the Chlorine Chemistry Council, the Compressed Gas Association, Crop Life America, the Institute of Makers of Explosives, the International Institute of Ammonia Refrigeration, the National Association of Chemical Distributors, the National Paint and Coatings Association, SOCMA, the Adhesive and Sealant Council, the Chlorine Institute, the Fertilizer Institute, and the Society of the Plastics Industry, Inc. In March 2003, we reported that other facilities that use chemicals, including fertilizer suppliers, petroleum and natural gas facilities, food storage facilities, water treatment facilities, and wastewater treatment facilities, have developed their own security initiatives. [Footnote 27] For example, the Fertilizer Institute, which represents fertilizer manufacturers and fertilizer retail and distribution facilities, developed a security code modeled after ACC's Responsible CareŽ Security Code. The Fertilizer Institute's code encourages facilities to develop vulnerability assessments and implement plans based on the assessments. However, because the total number of facilities within the chemical sector is uncertain, it is difficult to determine the proportion of all chemical sector facilities that are not members of ACC or SOCMA and thus are not required to adhere to the Responsible CareŽ Security Code. For example, there are approximately 2,300 ACC and SOCMA facilities, 1,100 of which are among the15,000 facilities--including, chemical, water, energy, and other sector facilities--that produce, use, or store more than threshold amounts of chemicals that EPA has estimated pose the greatest risk to human health and the environment. Within these 15,000 facilities, DHS estimates that there are about 4,000 chemical manufacturing facilities. A DHS official told us that the department is working with Argonne National Laboratory on the development of a taxonomy--a list of the types of facilities that should be included-- for each critical infrastructure sector, including the chemical sector. Although the water sector has not generated a specific industry code, all community water systems that serve more than 3,300 people are subject to the drinking water security and safety requirements of the Bioterrorism Act. According to EPA data, in fiscal year 2004, there were approximately 53,000 community water systems in the United States, of which about 8,600 (16 percent) were required by the Bioterrorism Act to prepare vulnerability assessments for their systems. According to EPA officials, as of February 23, 2005, all community water systems that serve 50,000 or more people have submitted their vulnerability assessments to EPA; whereas, 92 percent of the smaller systems (those serving between 3,301 and 49,999 people) have submitted their vulnerability assessments. Under the Bioterrorism Act, community water systems that serve 100,000 or more people were required to submit their vulnerability assessments to EPA by March 31, 2003; those systems that served between 50,000 and 99,999 people were required to submit their vulnerability assessments to EPA by December 31, 2003; and those that served between 3,301 and 49,999 people were required to submit their assessments by June 30, 2004. The actions the facilities we visited reported taking reflect, in many ways, the security initiatives issued from trade industry associations and legislation enacted by the federal government. For example, all 10 of the chemical facilities we visited reported fulfilling the steps under the Responsible CareŽ Security Code by completing their vulnerability assessments and developing plans to mitigate vulnerabilities.[Footnote 28] Eight of those facilities reported that they have fully implemented their planned enhancements. The remaining two chemical facilities reported making significant progress on planned enhancements. However, they also reported implementing alternative measures for some enhancements, such as adding guards for additional patrols while permanent barriers are being constructed. In the water sector, officials at eight community water systems that we visited reported that they completed their vulnerability assessments in accordance with the Bioterrorism Act. Even though not specifically required by the Bioterrorism Act, officials at the eight community water systems we visited told us they implemented a number of enhancements, such as increasing access controls by establishing an electronic key control system that assigns keys to individual staff members and tracks their use. Table 1 provides additional information on the types of enhancements the chemical and water facilities reported taking since September 11, and figure 4 provides examples of some of these enhancements. Table 1: Type of Security Enhancements the 10 Chemical and 8 Water Facilities We Visited Reported Making Since September 11: Type of security enhancement: Increasing perimeter control; Number of chemical facilities: 10; Number of community water systems: 8; Examples of enhancements: Fencing, gates, cameras, and signs. Type of security enhancement: Increasing access control; Number of chemical facilities: 10; Number of community water systems: 8; Examples of enhancements: Turnstiles, access control cards, and changing outer locks. Type of security enhancement: Enhancing monitoring; Number of chemical facilities: 10; Number of community water systems: 7; Examples of enhancements: Motion detectors and contamination detectors. Type of security enhancement: Establishing system redundancies; Number of chemical facilities: 5; Number of community water systems: 5; Examples of enhancements: Backup pumps, power systems, and storage capacity. Type of security enhancement: Increasing automated (cyber) system protections; Number of chemical facilities: 9; Number of community water systems: 7; Examples of enhancements: Separation of business and control process networks and firewalls. Type of security enhancement: Increasing facility precautions; Number of chemical facilities: N/A; Number of community water systems: 7; Examples of enhancements: Shredding old facility maps. Type of security enhancement: Making process or inventory changes; Number of chemical facilities: 7; Number of community water systems: N/A; Examples of enhancements: Reducing the inventory of hazardous chemicals stored on site. Source: GAO analysis of enhancements the chemical facilities and community water systems reported taking. [End of table] Figure 4: Examples of Perimeter and Access Controls Chemical Facilities Reported Implementing: [See PDF for image] Note: From left to right: entrance barricades, card-code turnstile, and closed-circuit camera. [End of figure] Chemical Facilities and Water Systems Said They Faced Several Obstacles in Making and Maintaining Security Enhancements: In making security enhancements and in maintaining a level of security consistent with their needs, officials at the chemical facilities and community water systems we visited told us that they faced several obstacles. However, the obstacles varied by sector. Three chemical facility operators told us that they experienced difficulties in obtaining permits or approval from the U.S. Army Corps of Engineers to install fences to better protect the perimeter of their chemical facilities. Officials at one facility stated that they did not obtain a permit from the Army Corps of Engineers to install a fence on wetlands in a timely manner, while an official at another chemical facility said that they moved the planned location of their fenceline rather than go through a permitting process. The official representing the third chemical facility told us that they moved their fence line because the Corps of Engineers refused to allow them to install fences on the Corps- managed property. One of the United States Army Corps of Engineers' missions is to preserve wetlands. Project proponents who seek to fill in wetlands or waters are required under federal law to obtain a permit from the Army Corps of Engineers before they can undertake such activities. According to the Army Corps of Engineers, the agency requires permit applicants to avoid, minimize, or mitigate impacts to wetlands or waters in most cases.[Footnote 29] Officials from two other chemical companies we visited said that they were experiencing continuing difficulties in gaining cooperation from railroads to maintain security when railroad personnel made deliveries or picked up products from the chemical facilities' premises. An official from one of these chemical companies said that the railroads followed security standards that were lower than the chemical company's standards and often took actions that compromised the chemical facility's security. Officials representing two of the chemical facilities we visited also stated that they were challenged in obtaining contractors, such as crews hired to perform major system maintenance in the facilities, with an appropriate level of background screening. Officials at six of the eight community water systems we visited stated that they faced economic constraints in addressing security issues, including insufficient financial resources to implement security enhancements and determining how best to use available funds given competing priorities such as nonsecurity-related infrastructure upgrades. Officials at six of these systems told us that they are challenged to balance the need for rate increases to fund security enhancements with efforts to keep water rates low. Furthermore, officials at two community water systems stated that first responders such as police and firefighters were generally given priority to use DHS grant funds awarded to states in relation to homeland security. As a result, these community water officials said that within their states, the first responders typically consumed all of the grant funds and nothing remained for the utilities' use. DHS awards of homeland security grant funds, in general, have provided states with a certain measure of flexibility with respect to how grant funds are to be allocated and used by the states in support of their State Homeland Security Strategies. Four of the eight community water systems we visited also stated that instituting a cultural change that stresses the importance of security was another challenge they needed to address. For example, an official at one of these systems said that its employees are not always diligent about carrying out security enhancements, such as ensuring that doors stay locked during shift changes. An official at another system noted that the public in his locality did not perceive the water system to be at risk and, if it was, the public believed that little could be done to prevent a terrorist attack, making it difficult for the community water system to obtain budget increases to pay for security enhancements. Officials at two of the eight community water systems we visited reported that sufficient technology was not available to ensure an appropriate level of security enhancements. For instance, one large community water system reported that while technology is currently available to allow a system to test its water supply for contaminants at a specific point in time, a readily accessible technology does not exist for continuously monitoring the supply that would alert a system immediately upon a contaminant's entry into the water. As reported in the fiscal year 2006 President's Budget, the Administration requested $44 million to fund the Water Sentinel Initiative as a pilot program in five major cities. Under this initiative, the federal government would commence the development of a water surveillance system designed to enhance security of the nation's water supply by providing an early warning mechanism for possible contaminants, including chemical or biological agents, entering the water supply. The Chemical and Water Sectors Have Incorporated Some Elements of a Risk Management Framework to Address Their Security Vulnerabilities: The chemical and drinking water sectors have incorporated some elements of a risk management framework to protect their critical infrastructure. As shown in figure 5, a risk management framework represents a series of analytical and managerial steps, basically sequential, that can be used to assess risk, assess alternatives for reducing risks, choose among those alternatives, implement the alternatives, monitor their implementation, and continually use new information to adjust and revise the assessments and actions, as needed. Adoption of a risk management framework can aid in assessing risk by determining which vulnerabilities should be addressed in what ways within available resources. Figure 5: A Risk Management Cycle: [See PDF for image] [End of figure] Assessing risks for specific assets--such as community water systems or chemical plants on navigable waterways--is defined by two conditions: (1) probability, the likelihood, quantitative or qualitative, that an adverse event would occur; and (2) consequences, the damage resulting from the event, should it occur. Thus, the most severe risks are those that have both the greatest probability of occurring and would cause the greatest damage. Actual risk reflects the combination of the two factors. Risks may be managed by reducing the probability, the consequence, or, where possible, both. As this suggests, identifying threats and vulnerabilities (e.g., weaknesses in structure or security operations) in existing infrastructure is necessary but not sufficient to fully manage the risks to the infrastructure. Assessing the vulnerability of infrastructure to damage or destruction should be coupled with an assessment of the probability that the vulnerability will be exploited and the consequences that would result if it were exploited. Several risks, each with equally serious potential consequences, may not be equally likely to occur. In addition, private entities may benefit from assistance in the form of risk information from intelligence or law enforcement agencies to assess the types of risks faced and the probability that these risks would result in an adverse event. Because it is unlikely that sufficient resources will be available to address all risks, it becomes necessary to prioritize both risks and the actions taken to reduce those risks, taking cost into consideration. For example, which actions will have the greatest net potential benefit in reducing one or more risks? The information we obtained from our site visits and discussions with national chemical and water associations suggests that some elements of a risk management framework have been incorporated into the assessments and actions taken by both chemical and community water facilities. The chemical facilities we visited were all members of the ACC or SOCMA and subscribe to the Responsible CareŽ Security Code, which those associations require their members to follow. Of the 2,300 ACC and SOCMA chemical facilities affected by the Responsible CareŽ Security Code, 1,100 are among the 15,000 facilities- -including, chemical, water, energy, and other sector facilities--that produce, use, or store more than threshold amounts of chemicals that EPA has estimated pose the greatest risk to human health and the environment. As we previously mentioned, it is difficult to determine the proportion of chemical facilities that follow the Responsible CareŽ Security Code because even though DHS estimates that there are about 4,000 chemical manufacturing facilities within the 15,000 facilities, the total number of chemical facilities in the chemical sector is uncertain. In our March 2003 report, we recommended that the Secretary of Homeland Security and the Administrator of EPA jointly develop, in consultation with the Office of Homeland Security, a comprehensive national chemical security strategy to include, among other things, information on industry security preparedness and a legislative proposal to require chemical facilities to expeditiously assess their vulnerability to terrorist attacks and, where necessary, require these facilities to take corrective action.[Footnote 30] DHS and EPA agreed that legislation requiring chemical facilities to assess and address vulnerabilities to terrorist attack should be enacted.[Footnote 31] Similar to the Responsible CareŽ Security Code, under MTSA and its implementing regulations, more than 2,900 maritime facilities (including some chemical) are required to assess risks, develop security plans to mitigate them, and implement those security plans. The Coast Guard is responsible for inspecting facilities for compliance. The Bioterrorism Act requires all community water systems that serve populations of 3,300 or more to prepare vulnerability assessments and update or prepare emergency plans based on those assessments. EPA guidance for these vulnerability assessments calls for them to include (1) a characterization of the water system, (2) the identification of possible consequences of malevolent acts, (3) the critical assets subject to malevolent acts, (4) an assessment of the threat of malevolent acts, (5) an evaluation of countermeasures, and (6) a plan for risk reduction. However, as shown in table 2, community water systems are not subject to federal requirements to implement any risk reduction actions based on the completed vulnerability assessments or report to EPA on measures that have been implemented in a manner similar to that required of port facilities by MTSA. For those systems we visited, the actions taken reflected the systems' own risk assessments and resource constraints. Some systems have had more resources to devote to risk reduction than others. Yet, the extent of actions taken by community water systems is unknown. The Conference Report accompanying the Department of Homeland Security Appropriations Act for fiscal year 2005 calls for DHS to analyze whether it should require private sector entities to provide it with information concerning these entities' security measures and vulnerabilities to improve DHS's ability to evaluate critical infrastructure protections nationwide. This report also mandates that GAO review DHS's analysis when it is complete. A DHS official has preliminarily told us that the Department expects to complete this analysis in December 2005. Table 2: Existing Industry Initiatives and Federal Security Requirements Imposed on Chemical, Water, and Maritime Facilities: Security requirements: Chemical Industry--ACC Responsible CareŽ Security Code[A]; Elements of risk management: Vulnerability assessment: Yes; Elements of risk management: Security or risk reduction plan: Yes; Elements of risk management: Implementation of measures: Yes; Elements of risk management: Third-party verification or compliance inspection: Yes[B]. Security requirements: Bioterrorism Act[C]; Elements of risk management: Vulnerability assessment: Yes; Elements of risk management: Security or risk reduction plan: [D]; Elements of risk management: Implementation of measures: No; Elements of risk management: Third-party verification or compliance inspection: No. Security requirements: MTSA and the Coast Guard's implementing regulations[E]; Elements of risk management: Vulnerability assessment: Yes; Elements of risk management: Security or risk reduction plan: Yes; Elements of risk management: Implementation of measures: Yes; Elements of risk management: Third-party verification or compliance inspection: Yes. Source: GAO analysis of above-mentioned legislation, guidance, and trade association code. [A] This code applies to chemical facilities that are members of ACC and SOCMA. [B] The Responsible CareŽ Security Code does not require that third parties verify that the vulnerability assessment was conducted appropriately or that actions taken by a facility adequately address security risks. [C] This act and guidance apply to community water systems that serve more than 3,300 people. The act also requires such systems to prepare or update existing emergency response plans. [D] Although not specifically required by the Bioterrorism Act, EPA guidance related to the preparation of vulnerability assessments required under the Bioterrorism Act calls for community water systems to include, among other things, a plan for risk reduction in their vulnerability assessments. [E] This act, as implemented, generally applies to maritime facilities in proximity to navigable waters including facilities that handle explosive or other dangerous cargos, liquefied natural gas or liquefied hazardous gas, or transfer oil or other hazardous materials; facilities that receive vessels certified to carry more than 150 passengers; facilities that receive certain passenger and cargo ships engaged in international voyages; facilities that receive certain foreign cargo vessels; and commercial barge fleeting facilities. [End of table] In February 2005, DHS released its Interim National Infrastructure Protection Plan, whose purpose is to "prioritize protection across [infrastructure] sectors, so that resources are applied where they offer the most benefit for reducing vulnerability, deterring threats, and minimizing consequences of attacks." Because we just recently received the plan, we have not fully evaluated it. However, the plan outlines (1) a risk management framework to guide future efforts to identify and protect critical physical infrastructure and (2) the roles of federal, state, local, tribal, and private agencies and entities in implementing this framework. Under this approach, risks are to be managed in response to (1) specific threats and (2) plausible threats. Specific threats are situations where there is intelligence regarding targeted locations, sectors, or assets, or when there is suspected activity by groups known to favor attacks on certain types of assets. The likelihood of the threat would drive short-term protective measures. Plausible threats are those "that could logically occur and that would have negative consequences on a particular asset." Plausible threats are treated as if all are equally likely to occur--that is, they result from the general threat environment. Thus, plausible threats focus protective efforts on the inherent vulnerabilities of different assets and the potential consequences of an attack, rather than the likelihood of a particular event. The plan also outlines the roles and responsibilities of federal, state, local, and tribal agencies, and the private sector using elements of a risk management framework. The federal government's role would include setting standards for identifying critical assets, assessing the most critical assets, developing consistent approaches and tools for identifying and assessing vulnerabilities, analyzing and disseminating threat information, promoting cross-sector best practices, tracking program implementation, and reporting on the national status of infrastructure assessment and protection. The role of state, local, and tribal agencies would include helping to identify assets, conducting and sharing assessments with the federal government, supplementing private sector capabilities in response to threats, developing state or local level strategies and best practices, and tracking performance where applicable. The private sector would play a role similar to that of state, local, and tribal agencies plus help to develop incentive programs for private entities. Officials at Chemical Facilities and Water Systems We Visited Agreed in Part about What the Federal Government's Role Should Be: Operators of 4 of the 10 chemical manufacturing facilities and seven of the eight community water systems we visited agreed that the federal role in protecting their facilities should include the transmittal of threat information. As we previously reported, to effectively communicate risks, experts suggest that threat information should be consistent, accurate, clear, and provided repeatedly through multiple methods; it should be provided in a timely fashion; and to the greatest extent possible, it should be specific about the potential threat.[Footnote 32] Officials representing the chemical facilities and community water systems we visited had fundamentally different views on other roles for the federal government. Officials representing 8 of the 10 chemical facilities we visited expressed the view that the federal government should introduce regulations and standards comparable to the Responsible CareŽ Security Code for the entire chemical sector to follow. Officials representing 3 of these facilities stated that those facilities that do not adhere to the Responsible CareŽ Security Code may have a competitive advantage over those facilities that do adhere to the code. In comparison, only one of the eight water system operators we spoke with suggested the need for additional federal regulation. Rather, officials at four community water systems said they would like the federal government to establish security standards to guide actions for the water sector. Officials representing seven of the community water systems we visited said that they would like the federal government to expand support for security enhancements in the water sector by providing funding designated for community water systems. Moreover, officials at six of the community water systems we met with suggested that the federal government consistently emphasize the need for security for the sector and provide technical guidance on security planning. However, officials at four of the community water systems we met with said that they would prefer the federal government to refrain from issuing unfunded mandates. These officials elaborated that funding currently provided by the federal government was not sufficient to support federal requirements that the water companies complete vulnerability assessments. For example, officials at one large community water system said that their system received an EPA grant that offset approximately 7 percent of the cost it incurred to perform its mandated vulnerability assessment.[Footnote 33] The U.S. Coast Guard Completed Its Compliance Inspections and Plans to Review the Effectiveness of the Process: The U.S. Coast Guard has found that the vast majority, approximately 97 percent, of maritime facility owners or operators are meeting MTSA requirements. The Coast Guard reported completing compliance inspections at all 2,924 regulated facilities by December 31, 2004, resulting in 312 enforcement actions and operational controls imposed on 29 facilities. The Coast Guard reported taking these 312 enforcement actions against 98 facility owners or operators for violations. The most frequently cited deficiencies related to insufficient access controls; noncompliance by the owner or operator to ensure that the facility is operating in compliance with its facility's security requirements; noncompliance with facility security officer requirements, such as possessing the required security knowledge or carrying out all duties as assigned; and insufficient security measures for restricted areas. The Coast Guard's enforcement actions included issuing letters of warning or assessing monetary penalties for noncompliance. See appendix IV for more details on these enforcement actions. In addition to taking enforcement actions, the Coast Guard imposed operational controls, such as suspending certain facility operations, on 29 MTSA regulated facilities between July 1, 2004, and December 31, 2004, for identified deficiencies. The Coast Guard has taken some actions to facilitate the effectiveness of its compliance inspection program for MTSA-regulated facilities, but it has not yet determined the overall effectiveness of the program. Some of the actions taken by the Coast Guard include conducting unscheduled spot checks in addition to scheduled inspections, developing detailed checklists for the inspectors to use during facility inspections, conducting reviews at both the local and national levels of the enforcement actions taken by the inspectors, and providing training for inspectors. However, Coast Guard officials said that because their priority was to complete the initial compliance inspections by December 31, 2004, they have not completed an evaluation of the effectiveness of the compliance actions for lessons learned that could be used to improve the inspection program in the future. The Coast Guard said that now that the initial surge of inspections has been completed, it plans to begin a systematic effort to evaluate the effectiveness of the compliance inspection program. The Marine Safety Offices we visited also reported that evaluations of their compliance efforts have not yet been completed at the local level. Officials at these Marine Safety Offices stated that they anticipate taking a closer look at the results of the initial inspections to determine what improvements to make. Some of the measures they mentioned as ways to track the effectiveness of their compliance inspection activities included the recurrence of deficiencies previously identified during initial inspections or spot checks, the number of deficiencies identified during inspections or spot checks, and an index that tracks a facility's level of risk. In June 2004, we issued a report on the status of the Coast Guard's strategy for monitoring and overseeing the implementation requirements of MTSA. At that time, we recommended that the Coast Guard evaluate its initial compliance inspection efforts upon completion and use the results to strengthen the compliance process for its long-term strategy, clearly define inspector qualifications, and consider including unscheduled and unannounced inspections and covert testing.[Footnote 34] The Coast Guard agreed with this recommendation. Agency Comments: We provided a draft of this report to DHS and EPA for review and comment. DHS provided formal written comments on a draft of this report on March 16, 2005, which are presented in appendix VI. In commenting on the draft report, DHS noted that it generally concurred with the report's contents and that the report presented generally valuable and useful information. DHS observed that the report did not mention efforts currently under way to improve government and private sector infrastructure protection coordination efforts through the formation of Government Coordinating Councils and Sector Coordinating Councils. We revised our report to include a discussion of the chemical and water sector Government Coordinating Councils and Sector Coordinating Councils. We are currently conducting another review of chemical facility security for the Subcommittee on National Security, Emerging Threats, and International Relations, House Committee on Government Reform, and are focusing on actions that DHS and other federal agencies have taken to improve chemical facilities' security. As part of this review, we are identifying the efforts taken by the Chemical Sector Coordinating Council and the related Government Coordinating Council and will report on these issues at a later date. EPA did not submit a formal letter but did provide comments. The comments expressed general agreement with the contents of the report. We also provided excerpts from our draft report to ACC, SOCMA, AMWA, NAWC, and NRWA for review and comment. DHS, EPA, ACC, SOCMA, and NAWC also offered specific technical comments and suggestions, which have been incorporated as appropriate. We plan no further distribution of this report until seven days after the date of this report. At that time, we will send copies of this report to the Senate Committee on Homeland Security and Governmental Affairs; Chairman, Subcommittee on Homeland Security, Senate Committee on Appropriations; House Committee on Government Reform; House Committee on Homeland Security; Subcommittee on Homeland Security, House Committee on Appropriations; the Secretary of Homeland Security, the Administrator of EPA, the Director, Office of Management and Budget and other interested parties. We will also make copies available to others on request. In addition, this report will be available on GAO's Web site at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8777 or by e-mail at jenkinswo@gao.gov or Debra Sebastian at (202) 512-9385 or by e-mail at sebastiand@gao.gov. GAO contacts and staff acknowledgments are listed in appendix VII. Sincerely yours, Signed by: William O. Jenkins, Jr.: Director, Homeland Security and Justice Issues: [End of section] Appendix I: Scope and Methodology: To determine federal security requirements for the chemical and water sectors and the efforts taken by the federal government to facilitate private sector protection of its critical assets, we met with Department of Homeland Security (DHS) and Environmental Protection Agency (EPA) officials, as well as representatives from the American Chemistry Council (ACC), the Synthetic Organic Chemical Manufacturers Association (SOCMA), the American Metropolitan Water Association (AMWA), 10 chemical facilities and 8 community water systems (the criteria used to select these facilities and systems are described below). We also obtained information from the National Association of Water Companies (NAWC) and the National Rural Water Association (NRWA). In addition, we reviewed pertinent federal legislation and implementing regulations and agency guidance on facility security for these sectors. To determine actions officials in the chemical sector reported taking to enhance security of their facilities since September 11, the obstacles they faced in making such enhancements, and their perceptions of the role of the federal government in securing chemical facilities, we met with officials from ACC and SOCMA, and with officials from 10 chemical manufacturing facilities. We selected these facilities from those operated by members of ACC or SOCMA. To ensure that the facilities we visited were at greatest risk, and hence had the greatest need for security, we generally selected facilities from which a chemical release, stemming from an attack, would have a severe impact on surrounding communities. To assist us in selecting these facilities, we relied upon assessments completed by ACC and SOCMA members regarding the impact of a potential chemical release at its facilities. The facilities we selected produce petrochemicals, building block chemicals,[Footnote 35] inorganic chemicals, plastics, and industrial gases. We also selected chemical facilities that were regulated by the Coast Guard under the Maritime Transportation Security Act (MTSA) and facilities that were not regulated to observe differences among these types of facilities. All facilities we selected were ACC or SOCMA members that volunteered to meet with us. We used a structured interview guide when questioning officials during our visits to these facilities. We did not verify that the security enhancements reported to us by the chemical facilities were actually taken. In conducting our work on the chemical sector, we focused on actions taken to strengthen security at a selected facility. We did not address actions taken by facility personnel to protect the transport of chemicals from the facility to other locations by way of various transport mechanisms such as rail cars or tank trucks nor did we address actions taken by facility personnel to prevent the sale of hazardous chemicals to terrorists masquerading as bona fide customers. To determine actions the water sector officials reported taking to enhance security of their facilities since September 11, the obstacles they faced in making such enhancements, and their perceptions of the role of the federal government in securing community water facilities, we met with officials from the AMWA and with operators of eight community water systems.[Footnote 36] We also obtained information from NAWC and NRWA. We selected systems from those that were regulated under the Bioterrorism Act--a federal law that addresses security matters with respect to community water systems. Three of the systems we selected were privately owned systems and five were publicly owned systems. For the publicly owned systems, we varied our selection to include systems that served a range of population sizes. Specifically, we selected three systems from those that served 100,000 or more people, one from those that served 50,000 to 99,999 people, and one from those that served 3,301 to 49,999 people. For the private sector systems, we selected one system that served approximately 3,500 people and two that served 100,000 or more.[Footnote 37] In conducting our work in this area, we focused on water supply systems rather than wastewater treatment systems.[Footnote 38] We did not verify that the security enhancements reported to us by the water systems were actually taken. While we were in the process of determining which community water systems to select, three systems contacted us and volunteered to participate in our study. Because they met our criteria, we included these systems as part of our selection. We used a structured interview guide when questioning officials during our visits to these systems. We are not disclosing the names or other identifying information relating to the individual chemical companies, facilities, or community water systems to ensure that security-related information is not unintentionally disclosed. Because we limited our review to 10 chemical facilities and 8 community water systems, the comments discussed in this report are illustrative, are not statistically representative of the chemical and water sectors, and should not be considered to represent the views of the sectors as a whole. To determine the extent to which the chemical and water sectors' actions reflected a risk management approach, we reviewed provisions of the Responsible CareŽ Security Code, the Bioterrorism Act, and MTSA that the chemical and water sectors are to follow. We then compared these provisions with elements of a risk management framework to determine which elements the sectors have incorporated and to identify those elements that were missing.[Footnote 39] To determine the results of the Coast Guard's compliance inspection program, we reviewed Coast Guard documents, such as inspection guidance, facility inspector checklists, and navigation and vessel information circulars regarding the procedures used to conduct the compliance inspections and the enforcement actions and operational controls available to the Coast Guard to address any deficiencies found during the inspection process. We also analyzed national compliance data provided by Coast Guard from its Marine Information for Safety and Law Enforcement (MISLE). To assess the reliability of these data, we examined the data for obvious errors and inconsistencies, reviewed existing documentation about their system and data, and examined responses the Coast Guard provided to a questionnaire we sent it requesting information on the administration and oversight of the system. We determined the compliance data to be sufficiently reliable as general indicators of the results of the Coast Guard's inspection program. To determine what actions the Coast Guard reported taking agencywide to ensure the effectiveness of the inspection program, we interviewed Coast Guard officials at headquarters with responsibilities for the compliance inspection process. To supplement this national-level perspective, we visited five local Coast Guard offices in locations that reflected diversity in strategic importance, geographic location, and local characteristics. The offices we visited were located in Charleston, South Carolina; Huntington, West Virginia; New Orleans, Louisiana; Houston, Texas; and Seattle, Washington. We conducted our work from October 2004 through March 2005 in accordance with generally accepted government auditing standards. [End of section] Appendix II: Number of Community Water Systems: The Safe Drinking Water Information System is EPA's national database of public drinking water systems. Information from this system, presented in table 3, provides information on the number of community water systems in place during fiscal year 2004 by population service category and ownership. Table 3: Number of Community Water Systems by Ownership and Population Service Category for Fiscal Year 2004: Ownership: Private; Size of population served: 100 or less: 11,484; Size of population served: 101-500: 9,995; Size of population served: 501-3,300: 3,480; Size of population served: 3,301-10,000: 569; Size of population served: 10,001-50,000: 331; Size of population served: 50,001-100,000: 66; Size of population served: 100,001-500,000: 43; Size of population served: Over 500,000: 9; All sizes: 25,977. Ownership: Public; Size of population served: 100 or less: 2,025; Size of population served: 101-500: 6,010; Size of population served: 501- 3,300: 10,501; Size of population served: 3,301-10,000: 3,986; Size of population served: 10,001-50,000: 2,623; Size of population served: 50,001-100,000: 413; Size of population served: 100,001-500,000: 279; Size of population served: Over 500,000: 40; All sizes: 25,877. Ownership: Unknown; Size of population served: 100 or less: 257; Size of population served: 101-500: 235; Size of population served: 501- 3,300: 231; Size of population served: 3,301-10,000: 152; Size of population served: 10,001-50,000: 103; Size of population served: 50,001-100,000: 5; Size of population served: 100,001-500,000: 0; Size of population served: Over 500,000: 1; All sizes: 984. Total; Size of population served: 100 or less: 13,766; Size of population served: 101-500: 16,240; Size of population served: 501- 3,300: 14,212; Size of population served: 3,301-10,000: 4,707; Size of population served: 10,001-50,000: 3,057; Size of population served: 50,001-100,000: 484; Size of population served: 100,001-500,000: 322; Size of population served: Over 500,000: 50; All sizes: 52,838. Source: U.S. Environmental Protection Agency's Safe Drinking Water Information System. Note: The information in this chart is presented to provide context on the number of community water systems in the United States. GAO has not verified this data. [End of table] As reflected in the table, ownership of these systems is evenly split; about half are publicly owned and about half are privately owned. EPA does not have data on the ownership of approximately 2 percent, or 984, of these systems. [End of section] Appendix III: Chemical Industry Trade Associations' Implementation of the Responsible CareŽ Security Code: The Responsible CareŽ Security Code calls for ACC's approximate 140 member companies to perform security vulnerability assessments of their approximately 2,000 facilities, develop and implement plans to mitigate the vulnerabilities, and obtain third-party verification that the planned physical security enhancements were completed. The Security Code sets milestones for facilities to complete these steps based on the level of potential impact a chemical release stemming from a facility would have on surrounding communities. ACC members assigned their facilities to "tiers" based on their assessment of this level of impact. A chemical release stemming from tier 1 facilities could have the greatest impact on surrounding communities, whereas a chemical release from tier 4 facilities would have no significant off-site impacts. The milestones for completion of these steps by each tier facility are depicted in table 4 below. ACC members operate approximately 100 tier 1 facilities, 350 tier 2 facilities, 550 tier 3 facilities, and 1,000 tier 4 facilities. Approximately 1,000 of ACC's facilities are among the 15,000 facilities--including, chemical, water, energy, and other sector facilities--that produce, use, or store more than threshold amounts of chemicals that EPA has estimated pose the greatest risk to human health and the environment. Table 4: Responsible CareŽ Security Code Deadlines for ACC Facilities: Actions required under the Responsible CareŽ Security Code: Complete facility security vulnerability assessment; Tier 1: 12/31/02; Tier 2: 6/30/03; Tier 3: 12/31/03; Tier 4: 12/31/03. Actions required under the Responsible CareŽ Security Code: Complete implementation of facility security enhancements; Tier 1: 12/31/03; Tier 2: 6/30/04; Tier 3: 12/31/04; Tier 4: 12/31/04. Actions required under the Responsible CareŽ Security Code: Complete third-party verification of physical security enhancements; Tier 1: 3/31/04; Tier 2: 9/30/04; Tier 3: 3/31/05; Tier 4: [A]. Source: American Chemistry Council. [A] Because tier 4 facilities do not have potential significant off- site consequences, third-party verification is not required. [End of table] ACC reported that as of May 2004, all of its 2,000 facilities have completed security vulnerability assessments. ACC does not require its member companies to report the status of security enhancements until they report completion of third-party verification. ACC told us that based on the verification reports its members submitted, all tier 1 facilities have completed their security enhancements and their third- party verifications. Additionally, ACC told us that approximately 90 percent of its members, with tier 2 facilities have completed security enhancements and the enhancements have been verified. As of March 7, 2005, 10 percent of ACC member companies are still working to complete their tier 2 verification requirements. ACC told us that it is in contact with these companies to provide any needed assistance, to monitor progress, and to ensure completion of these requirements as soon as possible. SOCMA's 160 members also follow the provisions of the Responsible CareŽ Security Code. As members, they are expected to perform security vulnerability assessments of their facilities, develop and implement plans to mitigate the vulnerabilities found in the assessments, and obtain third-party verification that the planned physical security enhancements were completed. Thirty-six of SOCMA's member companies are also members of ACC and follow the Responsible CareŽ Security Code and related milestones as administered by ACC. The remaining 124 SOCMA companies are responsible for implementing the Responsible CareŽ Security Code under a SOCMA-established timetable as presented in table 5. These 124 companies operate 273 facilities--of which 77 are among the 15,000 facilities--including, chemical, water, energy, and other sector facilities--that produce, use, or store more than threshold amounts of chemicals that EPA has estimated pose the greatest risk to human health and the environment in the event of a release (risk management plan, or RMP, facilities). Table 5: Responsible CareŽ Security Code Deadlines for SOCMA Facilities: Actions required under the Responsible CareŽ Security Code: Complete facility security vulnerability assessment; RMP facilities: 6/30/03; Non-RMP facilities: 12/31/03. Actions required under the Responsible CareŽ Security Code: Complete Implementation of facility security enhancements; RMP facilities: 12/31/04; Non-RMP facilities: 12/31/04. Actions required under the Responsible CareŽ Security Code: Complete verification of enhancements; RMP facilities: 3/31/05; Non-RMP facilities: [A]. Source: Synthetic Organic Chemical Manufacturers Association. [A] Non-RMP facilities are not required to have third-party verification. [End of table] SOCMA officials told us that all of its member companies have reported completing vulnerability assessments at their 273 facilities. SOCMA also reports that 98 percent of these member companies reported completing implementation of security enhancements at their facilities. [End of section] Appendix IV: Enforcement Actions Taken by the Coast Guard against MTSA- Regulated Facilities: The type of enforcement action the Coast Guard takes against maritime facilities for noncompliance with MTSA regulations depends on the type of deficiencies, the severity of the deficiencies, and the number of times a given facility has been cited for a deficiency. The enforcement actions taken by the Coast Guard against facility owners or operators include: * Letter of warning: A letter of warning is issued for deficiencies that can usually be immediately corrected but are severe enough to warrant documentation of noncompliance. A letter of warning can also be issued when the Coast Guard has previously informed a facility owner or operator of a less severe deficiency and the owner or operator has not yet addressed the deficiency upon a subsequent Coast Guard visit or spot check. Letters of warning document the deficiencies so that the Coast Guard has a case file in the event a more severe penalty is needed in the future to enforce compliance. * Notice of violation: A notice of violation is issued when the deficiency requires additional investigation and a monetary penalty or when the Coast Guard has previously issued a letter of warning for the same deficiency but the facility owner or operator has not yet addressed the deficiency. With a notice of violation, the inspector issues a citation that provides the facility owner or operator immediate notification of the alleged violations and the penalty amount proposed by the Coast Guard. The owner or operator has the option of accepting the notice and paying the penalty amount or can decline the notice. If the owner or operator decides to decline, the case becomes a standard civil penalty (see below for explanation). * Civil penalty: A civil penalty is used when a facility has several instances of noncompliance with the regulations. Typically initiated by a local Coast Guard unit, the civil penalty is submitted to the Coast Guard Hearing Office to determine if there is sufficient evidence to support the charges. Once the owner or operator has had an opportunity to respond to the charges, the Hearing Office issues its finding and the penalty, if any, is imposed on the owner or operator. The owner or operator may then appeal the decision to the Coast Guard Commandant. The consequences are essentially the same for notices of violation as for standard civil penalty cases, because in both situations the Coast Guard assesses a civil penalty that becomes part of a facility owner or operator's violation history. The primary difference lies in the severity of the sanction, with the proposed penalty amounts for notices of violation generally lower than the recommended penalty levels for standard civil penalty cases. In addition, the Coast Guard will not issue a notice of violation for more than $10,000, whereas the maximum civil penalty amount allowed by MTSA is $25,000 for each violation, using the regular civil penalty process. Table 6 shows the number of enforcement actions the Coast Guard reported taking against owners or operators of maritime facilities between July 1, 2004, and December 31, 2004, for noncompliance with MTSA regulations to implement their security plans. The specific regulatory cite topics in the table are listed in descending order of the total number of enforcement actions taken. Table 6: Enforcement Actions Taken between July 1, 2004, and December 31, 2004, by Regulatory Citation Topic: Citation: 33 CFR 105.255; Description of area of noncompliance: Security measures for access control; Number of enforcement actions taken: 89. Citation: 33 CFR 105.200; Description of area of noncompliance: Failure of facility owner or operator to ensure the facility operates in compliance with security requirements; Number of enforcement actions taken: 38. Citation: 33 CFR 105.205; Description of area of noncompliance: Facility Security Officer requirements; Number of enforcement actions taken: 34. Citation: 33 CFR 105.260; Description of area of noncompliance: Security measures for restricted areas; Number of enforcement actions taken: 31. Citation: 33 CFR 105.225; Description of area of noncompliance: Failure of facility owner or operator to make the required records available to the Coast Guard; Number of enforcement actions taken: 20. Citation: 33 CFR 105.405; Description of area of noncompliance: Failure to ensure proper format and content of the Facility Security Plan; Number of enforcement actions taken: 13. Citation: 33 CFR 105.210; Description of area of noncompliance: Facility personnel with security duties; Number of enforcement actions taken: 11. Citation: 33 CFR 105.125; Description of area of noncompliance: Failure of facility owner or operator to notify cognizant Captain of the Port of temporary deviations; Number of enforcement actions taken: 9. Citation: 33 CFR 105.275; Description of area of noncompliance: Failure to implement security measures for monitoring as specified in the Facility Security Plan; Number of enforcement actions taken: 9. Citation: 33 CFR 105.265; Description of area of noncompliance: Failure to implement security measures for handling cargo; Number of enforcement actions taken: 8. Citation: 33 CFR 105.245; Description of area of noncompliance: Failure of a facility owner or operator to complete Declaration of Security; Number of enforcement actions taken: 7. Citation: 33 CFR 105.235; Description of area of noncompliance: Failure to meet facility communications requirements; Number of enforcement actions taken: 6. Citation: 33 CFR 105.215; Description of area of noncompliance: Security training for all other facility personnel; Number of enforcement actions taken: 6. Citation: 33 CFR 105.250; Description of area of noncompliance: Failure to meet security systems and equipment maintenance requirements; Number of enforcement actions taken: 5. Citation: 33 CFR 105.270; Description of area of noncompliance: Failure to implement security measures for delivery of vessel stores and bunkers; Number of enforcement actions taken: 5. Citation: 33 CFR 105.220; Description of area of noncompliance: Failure of facility owner or operator to meet security drill requirements; Number of enforcement actions taken: 4. Citation: 33 CFR 105.285; Description of area of noncompliance: Failure to meet additional requirements for passenger and ferry facilities; Number of enforcement actions taken: 4. Citation: 33 CFR 105.400; Description of area of noncompliance: Failure to develop and implement a Facility Security Plan; Number of enforcement actions taken: 4. Citation: 33 CFR 105.120; Description of area of noncompliance: Failure to provide compliance documentation; Number of enforcement actions taken: 2. Citation: 33 CFR 105.295; Description of area of noncompliance: Failure to meet additional requirements for Certain Dangerous Cargo (CDC) facilities; Number of enforcement actions taken: 2. Citation: 33 CFR 105.140; Description of area of noncompliance: Alternative Security Program; Number of enforcement actions taken: 1. Citation: 33 CFR 105.230; Description of area of noncompliance: Maritime Security (MARSEC) Level coordination and implementation; Number of enforcement actions taken: 1. Citation: 33 CFR 105.240; Description of area of noncompliance: Procedures for interfacing with vessels; Number of enforcement actions taken: 1. Citation: 33 CFR 105.290; Description of area of noncompliance: Failure to meet additional requirements for cruise ship terminals; Number of enforcement actions taken: 1. Citation: 33 CFR 105.305; Description of area of noncompliance: Failure of facility owner or operator to conduct a Facility Security Assessment; Number of enforcement actions taken: 1. Total; Number of enforcement actions taken: 312. Source: Coast Guard. [End of table] [End of section] Appendix V: Acknowledgments of Agency and Private Sector Contributors: We would like to acknowledge the time and effort made by federal agencies, trade associations, and security directors and other officials representing the chemical facilities, community water systems, and marine safety offices that provided information and talked with us during our site visits. Federal Agencies: * Department of Homeland Security: * Environmental Protection Agency: Trade Associations: American Chemistry Council: Synthetic Organic Chemical Manufactures Association: Association of Metropolitan Water Agencies: National Association of Water Companies: National Rural Water Association: [End of section] Appendix VI: Comments from the Department of Homeland Security: U.S. Department of Homeland Security: Washington, DC 20528: March 16, 2005: Mr. William O. Jenkins: Director, Homeland Security and Justice Issues: Government Accountability Office: Washington, DC 20548: Dear Mr. Jenkins: Re: Draft Report GAO-05-327, Protection of Chemical and Water Infrastructure: Federal Requirements, Actions of Selected Facilities, and Remaining Challenges (GAO Job Code 440362): Thank you for the opportunity to review your draft report. We concur with the purpose of the report and generally concur with its contents. Your report effectively discusses many of the regulatory and difficult financial challenges facing the chemical and water sectors in strengthening the security of their infrastructures. Any such report can only represent a snapshot in time. In that context, it is understandable that the report does not fully reflect all the activities currently ongoing in this area. For example, the report does not mention the efforts currently underway to improve government and private sector infrastructure protection coordination efforts through the formation of Government Coordinating Councils and Sector Coordinating Councils. The report also notes that GAO did not have time to fully evaluate the Interim National Infrastructure Protection Plan (NIPP). DHS agrees that a rigorous risk management approach is central to an effective infrastructure protection program and believes that the NIPP lays out an effective risk management framework. These observations do not alter our view that the report presents generally valuable and useful information. A technical comment will be sent under separate cover. We thank you again for the opportunity to review the report and provide comments. Sincerely, Signed by: Steven J. Pecinovsky: Acting Director, Departmental GAO/OIG Liaison Office: [End of section] Appendix VII: GAO Contacts and Staff Acknowledgments: GAO Contacts: William O. Jenkins, Jr. (202) 512-8777; Debra B. Sebastian (202) 512- 9385: Acknowledgments: In addition to the individuals named above, David P. Alexander, Jonathan T. Bachman, Fredrick D. Berry, Beatriz Cuartas, Grace A. Coleman, Dorian R. Dunbar, Michele C. Fejfar, Geoffrey R. Hamilton, Christopher Hatscher, Sara R. Margraf, and Diane B. Raynes made key contributions to this report. [End of section] Related GAO Products: High-Risk Series: An Update. GAO-05-207. Washington, D.C. January 1, 2005. Wastewater Facilities: Experts' Views on How Future Federal Funds Should Be Spent to Improve Security. GAO-05-165. Washington, D.C.: January 31, 2005. Homeland Security: Agency Plans, Implementation, and Challenges Regarding the National Strategy for Homeland Security. GAO-05-33. Washington, D.C.: January 14, 2005. Drinking Water: Experts' Views on How Federal Funding Can Best Be Spent to Improve Security. GAO-04-1098T. Washington, D.C.: September 30, 2004. Public Key Infrastructure: Examples of Risks and Internal Control Objectives Associated with Certification Authorities. GAO-04-1023R. Washington, D.C.: August 10, 2004. Maritime Security: Substantial Work Remains to Translate New Planning Requirements into Effective Port Security. GAO-04-838. Washington, D.C.: June 30, 2004. Critical Infrastructure Protection: Improving Information Sharing with Infrastructure Sectors. GAO-04-780. Washington, D.C.: July 9, 2004. Critical Infrastructure Protection: Establishing Effective Information Sharing with Infrastructure Sectors. GAO-04-699T. Washington, D.C.: April 21, 2004. Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems. GAO-04-628T. Washington, D.C.: March 30, 2004. Rail Security: Some Actions Taken to Enhance Passenger and Freight Rail Security, but Significant Challenges Remain. GAO-04-598T. Washington, D.C.: March 23, 2004. Homeland Security: Summary of Challenges Faced in Targeting Oceangoing Cargo Containers for Inspection. GAO-04-557T. Washington, D.C.: March 31, 2004. Homeland Security: Federal Action Needed to Address Security Challenges at Chemical Facilities. GAO-04-482T. Washington, D.C.: February 23, 2004. Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems.GAO-04-354. Washington, D.C.: March 15, 2004. Technology Assessment: Cybersecurity for Critical Infrastructure Protection. GAO-04-321. Washington, D.C.: May 28, 2004. Terrorism Insurance: Implementation of the Terrorism Risk Insurance Act of 2002. GAO-04-307. Washington, D.C.: April 23, 2004. Posthearing Questions from the September 17, 2003, Hearing on Implications of Power Blackouts for the Nation's Cybersecurity and Critical Infrastructure Protection: The Electric Grid, Critical Interdependencies, Vulnerabilities, and Readiness. GAO-04-300R. Washington, D.C.: December 8, 2003. Drinking Water: Experts' Views on How Future Federal Funding Can Best Be Spent to Improve Security. GAO-04-29. Washington, D.C.: October 31, 2003. Critical Infrastructure Protection: Challenges in Securing Control Systems. GAO-04-140T. Washington, D.C.: October 1, 2003. Information Security: Progress Made, but Challenges Remain to Protect Federal Systems and the Nation's Critical Infrastructures. GAO-03-564T. Washington, D.C.: April 8, 2003. Homeland Security: EPA's Management of Clean Air Act Chemical Facility Data. GAO-03-509R. Washington, D.C.: March 14, 2003. Transportation Security Research: Coordination Needed in Selecting and Implementing Infrastructure Vulnerability Assessments.GAO-03-502. Washington, D.C.: May 1, 2003. Homeland Security: Voluntary Initiatives Are Under Way at Chemical Facilities, but the Extent of Security Preparedness Is Unknown. GAO-03- 439. Washington, D.C.: March 14, 2003. Critical Infrastructure Protection: Challenges for Selected Agencies and Industry Sectors. GAO-03-233. Washington, D.C.: February 28, 2003. Critical Infrastructure Protection: Efforts of the Financial Services Sector to Address Cyber Threats. GAO-03-173. Washington, D.C.: January 30, 2003. High-Risk Series: Protecting Information Systems Supporting the Federal Government and the Nation's Critical Infrastructures. GAO-03-121. Washington, D.C.: January 1, 2003. Homeland Security: Department of Justice's Response to Its Congressional Mandate to Assess and Report on Chemical Industry Vulnerabilities. GAO-03-24R. Washington, D.C.: October 10, 2002. Critical Infrastructure Protection: Significant Challenges Need to Be Addressed. GAO-02-961T. Washington, D.C.: July 24, 2002. Critical Infrastructure Protection: Significant Homeland Security Challenges Need to Be Addressed. GAO-02-918T. Washington, D.C.: July 9, 2002. Chemical Safety: Emergency Response Community Views on the Adequacy of Federally Required Chemical Information. GAO-02-799. Washington, D.C.: July 31, 2002. Critical Infrastructure Protection: Federal Efforts Require a More Coordinated and Comprehensive Approach for Protecting Information Systems. GAO-02-474. Washington, D.C.: July 15, 2002. Homeland Security: A Risk Management Approach Can Guide Preparedness Efforts, GAO-02-208T. Washington, D.C.: October 31, 2001. Key Elements of a Risk Management Approach. GAO-02-150T. Washington, D.C.: Oct. 12, 2001. Critical Infrastructure Protection: Significant Challenges in Safeguarding Government and Privately Controlled Systems from Computer- Based Attacks. GAO-01-1168T. Washington, D.C.: September 26, 2001. FOOTNOTES [1] Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001, Pub. L. No. 107-56, 115 Stat. 272, 401 (2001). [2] Pub. L. No. 107-295, 116 Stat. 2064 (2002). According to the Coast Guard, 238 MTSA-regulated maritime facilities handle "bulk liquid chemicals." [3] The ACC is a trade association that represents approximately 140 companies that operate approximately 2,000 facilities that encompass more than 85 percent of the productive capacity for the manufacture of basic chemicals in the United States. SOCMA is a trade association that represents approximately 160 companies that manufacture specialty or custom chemicals in the United States. Thirty-six of SOCMA's member companies are also members of the ACC. The remaining 124 SOCMA members operate 273 facilities in the United States. Both associations require their members to abide by the Responsible CareŽ Security Code, which lays out a process for facility operators to help secure against the threat of terrorism. ACC has also lobbied Congress regarding the need for federal regulation for chemical plant security. [4] AMWA has nearly 200 member agencies that collectively serve 120 million Americans. AMWA functions as the voice for the largest publicly owned drinking water systems on regulatory, legislative, and security issues. [5] NAWC is the only national trade association representing the private and investor-owned water utility industry that provides drinking water to 22 million Americans. NAWC serves as a mechanism for its members to respond to federal legislative and state regulatory initiatives that broadly affect the industry, including security- related initiatives. NRWA is a nonprofit federation of state rural water associations that provides support services to more than 24,550 water and wastewater utilities. NRWA's Board of Directors is composed of elected board members from each state association. NRWA programs include technical assistance to rural and small community water systems (1) on the design and implementation of ground water source water protection plans, (2) Safe Drinking Water Act compliance issues, (3) health protection related to public-drinking water, and (4) other managerial, financial and operational issues. [6] Pub L. No. 107-188, 116 Stat. 594 (2002). Provisions of this act require drinking water systems serving more than 3,300 people to complete vulnerability assessments by certain dates depending upon the population size served. For example, systems serving a population greater than 3,300 but less than 50,000 were to complete such assessments by June 30, 2004. The act further required systems to prepare or revise an emergency response plan incorporating the results of the vulnerability assessment within 6 months after completing the assessment. [7] Pub. L. No. 99-499, 110 Stat. 1728 (1986). [8] See GAO, Homeland Security: Voluntary Initiatives Are Under Way at Chemical Facilities, but the Extent of Security Preparedness Is Unknown, GAO-03-439 (Washington, D.C.: March 2003). [9] H.R. Conf. Rep. No. 108-774, at 75 (2004) accompanying H.R. 4567, ultimately enacted into law as Pub. L. No. 108-334, 118 Stat. 1298 (2004). [10] See GAO, Maritime Security: Substantial Work Remains to Translate New Planning Requirements into Effective Port Security, GAO-04-838 (Washington, D.C.: June 2004). [11] Homeland Security Presidential Directive Number 7 (Washington, D.C.: December 17, 2003). [12] EPA provided data on the number of drinking water systems in the United States, including those subject to the Bioterrorism Act, by extracting information from the agency's national database called the Safe Drinking Water Information System. EPA does not have data on the ownership of approximately 2 percent of these systems. [13] According to EPA's data, a very small portion of community water systems (less than 1 percent) are federally owned. [14] Pub. L. No. 101-549, 104 Stat. 2399 (1990). [15] These facilities are known as Risk Management Plan, or RMP, facilities. The federal government has identified 140 toxic and flammable chemicals that, in certain amounts, would pose the greatest risk to human health and the environment if they were accidentally released into the air. See GAO-03-439 (Washington, D.C.: March 2003) for a more complete listing of the provisions related to an accidental release under the Clean Air Act. [16] In 2003, EPA officials stated that approximately 2,000 Risk Management Plan chemical facilities may be covered under the Bioterrorism Act. [17] Port security grants are awarded to critical national seaports and facilities to enhance facility and operational security. They were originally administered by the Transportation Security Administration (TSA) in coordination with the Maritime Administration and the Coast Guard. These grants are currently administered by the Office of State and Local Government Coordination and Preparedness in DHS. [18] Security planning grants were administered by EPA through August 2002 to provide assistance to publicly and privately owned community drinking water systems serving 100,000 people or more. Under this program, EPA allowed up to $115,000 to each utility to develop or revise a vulnerability assessment, emergency response or operating plan, security enhancement plans and designs, or a combination of these efforts. In commenting on this report, EPA officials also told us that they used $20 million from their 2002 supplemental appropriation to provide funds to (1) states to facilitate small and medium-sized community water systems' (that is, that served more than 3,300 but less than 100,000 people) efforts to obtain technical assistance related to the development of vulnerability assessments and emergency response plans as required by the Bioterrorism Act and (2) to organizations providing such assistance. [19] Homeland security grants are a series of grants designed to support critical state and local missions, including the preparedness of first responders and citizens, public health, infrastructure security, and other public safety activities. These grants are administered by the Office of State and Local Government Coordination and Preparedness, the Federal Emergency Management Agency, and TSA. [20] The 10 chemical facilities we visited reported spending between $1 million and $10 million to enhance security since September 11. [21] See GAO, Critical Infrastructure Protection: Improving Information Sharing with Infrastructure Sectors, GAO-04-780 (Washington, D.C.: July 2004). [22] See GAO, Wastewater Facilities: Experts' Views on How Federal Funds Should Be Spent to Improve Security, GAO-05-165 (Washington, D.C.: January 2005). [23] In November 2004, the Water Information Sharing and Analysis Center launched a free security advisory system known as the Water Security Channel to distribute federal advisories on security threats via e-mail to the water sector. [24] EPA also developed guidance for community water systems to use in developing or revising their emergency response plans as required by the Bioterrorism Act. [25] The council is made up of 15 members who are appointed by EPA's Office of Ground Water and Drinking Water, and serve staggered 3-year terms. [26] In 1988, the ACC initiated Responsible CareŽ, which is a comprehensive management system for its members to follow to continuously improve safety performance; to increase communication; and to protect employees, communities, and the environment. [27] See GAO-03-439. [28] The Responsible CareŽ Security Code directs chemical companies to perform vulnerability assessments of their facilities using methodologies developed by either Sandia National Laboratories or the Center for Chemical Process Safety (or another equivalent methodology). Sandia National Laboratories are multiprogram oriented and primarily address national defense issues. Sandia security experts developed the risk-based assessment methodology under sponsorship from the Department of Justice. The Center for Chemical Process Safety is a component of the American Institute of Chemical Engineers that, as part of its work on chemical safety, has developed vulnerability assessment methodology and offers courses and a certificate in security vulnerability analysis. SOCMA also developed a Chemical Site Security Vulnerability Analysis Model to provide chemical facilities with another mechanism for conducting site vulnerability analysis. [29] In 2004, we reported that the Army Corps of Engineers approves virtually all such permit applications. See GAO, Waters and Wetlands: Corps of Engineers Needs to Evaluate Its District Office Practices in Determining Jurisdiction, GAO-04-297 (Washington, D.C.: February 2004). [30] See GAO-03-439. [31] At the time of this report, EPA was still the lead agency for the chemical sector. However, as previously mentioned, DHS is now the lead agency for the chemical sector. [32] See GAO, Homeland Security: Communication Protocols and Risk Communication Principles Can Assist in Refining the Advisory System, GAO-04-682 (Washington, D.C. June 2004). [33] Officials at seven of the eight community water systems we visited reported tracking some cost information related to security enhancements implemented since September 11 that ranged from approximately $23,000 to $19 million. However, the cost information these officials provided is not precise, and as they told us it does not represent all costs incurred. Thus, the data should not be used to determine the cumulative costs incurred across all community water systems. [34] See GAO-04-838. [35] Building block chemicals are intermediary chemicals that are produced from raw materials and used in the production of other chemicals. [36] We interviewed operators of community water systems within the supply component of the water sector since critical infrastructure efforts within this sector have focused on community water systems. [37] According to an EPA official, the smaller private systems are primarily owned and operated by a relatively few companies that also own and operate much larger private systems. Therefore, we focused on the larger systems to obtain an adequate perspective of privately held water systems. [38] In January of 2005, we issued a report on experts' views regarding how federal funds should be spent to improve security. In this report, we stated that the vast majority of experts suggested that wastewater utilities serving critical infrastructure should be given the highest priority when allocating federal wastewater security funds. Furthermore, the activity that experts most frequently cited as deserving of federal funds to improve wastewater facilities security was the replacement of gaseous chemicals used in the disinfection process with less hazardous alternatives. See GAO-05-165. [39] GAO has consistently called for a risk management approach to homeland security issues, See GAO, Homeland Security: A Risk Management Approach Can Guide Preparedness Efforts, GAO-02-208T (Washington, D.C.: October 12, 2001); Homeland Security: Key Elements of a Risk Management Approach, GAO-02-150T (Washington, D.C.: Oct. 12, 2001); Homeland Security: Summary of Challenges Faced in Targeting Oceangoing Cargo Containers for Inspection, GAO-04-557T (Washington, D.C., Mar. 31, 2004); and Rail Security: Some Actions Taken to Enhance Passenger and Freight Rail Security, but Significant Challenges Remain, GAO-04-598T (Washington, D.C.: Mar. 23, 2004). GAO's Mission: The Government Accountability Office, the investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through the Internet. GAO's Web site ( www.gao.gov ) contains abstracts and full-text files of current reports and testimony and an expanding archive of older products. The Web site features a search engine to help you locate documents using key words and phrases. You can print these documents in their entirety, including charts and other graphics. Each day, GAO issues a list of newly released reports, testimony, and correspondence. GAO posts this list, known as "Today's Reports," on its Web site daily. The list contains links to the full-text document files. To have GAO e-mail this list to you every afternoon, go to www.gao.gov and select "Subscribe to e-mail alerts" under the "Order GAO Products" heading. Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Public Affairs: Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.