This is the accessible text file for GAO report number GAO-05-327 
entitled 'Protection of Chemical and Water Infrastructure: Federal 
Requirements, Actions of Selected Facilities, and Remaining Challenges' 
which was released on April 4, 2005. 

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as part 
of a longer term project to improve GAO products' accessibility. Every 
attempt has been made to maintain the structural and data integrity of 
the original printed product. Accessibility features, such as text 
descriptions of tables, consecutively numbered footnotes placed at the 
end of the file, and the text of agency comment letters, are provided 
but may not exactly duplicate the presentation or format of the printed 
version. The portable document format (PDF) file is an exact electronic 
replica of the printed version. We welcome your feedback. Please E-mail 
your comments regarding the contents or accessibility features of this 
document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

Report to the Honorable Robert C. Byrd, Ranking Member, Subcommittee on 
Homeland Security, Committee on Appropriations, U.S. Senate: 

United States Government Accountability Office: 

GAO: 

March 2005: 

Protection of Chemical and Water Infrastructure: 

Federal Requirements, Actions of Selected Facilities, and Remaining 
Challenges: 

GAO-05-327: 

GAO Highlights: 

Highlights of GAO-05-327, a report to the Honorable Robert C. Byrd, 
Ranking Member, Subcommittee on Homeland Security, Committee on 
Appropriations, U.S. Senate: 

Why GAO Did This Study: 

The National Strategy for Homeland Security grouped critical 
infrastructure into 13 sectors which include assets that if attacked by 
terrorists could have a debilitating impact on the nation. Two of these 
13 sectors are the chemical and water sectors. The total number of 
chemical sector facilities is not clear. DHS estimates that there are 
4,000 chemical manufacturing facilities that produce, use, or store 
more than threshold amounts of chemicals that EPA has estimated pose 
the greatest risk to human health and the environment. There are 
approximately 53,000 community water systems and more than 2,900 
maritime facilities that are required to comply with security 
regulations under the Maritime Transportation Security Act (MTSA). This 
report provides information about what federal requirements exist for 
the chemical and water sectors to secure their facilities, what federal 
efforts were taken by the lead agencies for these sectors to facilitate 
sectors' actions, what actions selected facilities within these sectors 
have taken and whether they reflect a risk management approach, what 
obstacles they say they faced in implementing enhancements, and what 
are the Coast Guard's results from its inspection of regulated maritime 
facilities' security enhancements. 

What GAO Found: 

Few federal requirements address the security of the chemical and water 
sectors. However, the Department of Homeland Security (DHS) and the 
Environmental Protection Agency (EPA) have taken actions to assist the 
chemical and water sectors to implement security enhancements including 
providing financial assistance in the form of grants, threat 
information and guidance, training and exercises, and infrastructure 
protection initiatives, as well as setting security requirements for 
some facilities and reviewing actions by maritime facilities to 
determine compliance with MTSA. Except for facilities covered by MTSA, 
the chemical sector's security efforts are not regulated. The water 
sector is regulated by the Bioterrorism Act of 2002, which, among other 
things, requires community water systems to perform vulnerability 
analyses of their facilities. 

Chemical facilities and community water systems reported making 
security improvements separate from federal requirements. The chemical 
industry's two principal trade associations require their members to 
follow a security code that includes elements of a risk management 
framework such as completing vulnerability assessments and taking 
actions based on those assessments. Officials at all 10 chemical 
facilities GAO visited reported making significant progress in 
implementing the trade associations' security code. However, the 
proportion of total chemical facilities covered by the code is 
uncertain. The 8 water systems GAO visited reported completing their 
required vulnerability assessments, which is one element of a risk 
management framework. Although community water systems are not required 
to take any risk reduction measures under the Bioterrorism Act, these 8 
water systems reported implementing a number of enhancements, such as 
increasing access controls. 

Officials representing 8 of the 10 chemical facilities and 8 community 
water systems GAO visited reported encountering obstacles in making 
security enhancements and maintaining a level of security consistent 
with their needs. Officials at 3 chemical facilities reported 
experiencing difficulties, such as delays, in obtaining permits or 
other approvals needed from federal authorities to install fences to 
better protect the perimeter of their facilities. Officials at 6 of the 
community water systems GAO visited reported economic constraints, such 
as balancing the need for rate increases to fund security enhancements 
with efforts to keep rates low. 

MTSA's security requirements cover more than 2,900 maritime facilities, 
including chemical facilities. The Coast Guard found that 97 percent of 
these facilities complied with MTSA and its implementing regulations. 
The Coast Guard took 312 enforcement actions against 98 facility owners 
and operators and imposed operational controls on 29 facilities across 
the more than 2,900 MTSA-regulated facilities. DHS and EPA generally 
concurred with the contents of the report. 

What GAO Recommends: 

Because GAO has previously made recommendations on the key issues 
discussed in this report, we are not making any new recommendations. 

www.gao.gov/cgi-bin/getrpt?GAO-05-327. 

To view the full product, including the scope and methodology, click on 
the link above. For more information, contact William O. Jenkins, Jr., 
(202) 512-8777, or jenkinswo@gao.gov. 

[End of section]

Contents: 

Letter: 

Results in Brief: 

Background: 

Few Federal Security Requirements Exist for the Chemical and Water 
Sectors, but Other Federal Actions Have Facilitated these Sectors' 
Efforts to Enhance Security: 

Chemical Facilities and Water Systems Reported Taking Actions to 
Address Security Vulnerabilities but Said They Faced Obstacles in 
Implementing Security Measures: 

The Chemical and Water Sectors Have Incorporated Some Elements of a 
Risk Management Framework to Address Their Security Vulnerabilities: 

Officials at Chemical Facilities and Water Systems We Visited Agreed in 
Part about What the Federal Government's Role Should Be: 

The U.S. Coast Guard Completed Its Compliance Inspections and Plans to 
Review the Effectiveness of the Process: 

Agency Comments: 

Appendix I: Scope and Methodology: 

Appendix II: Number of Community Water Systems: 

Appendix III: Chemical Industry Trade Associations' Implementation of 
the Responsible Care® Security Code: 

Appendix IV: Enforcement Actions Taken by the Coast Guard against MTSA- 
Regulated Facilities: 

Appendix V: Acknowledgments of Agency and Private Sector Contributors: 

Appendix VI: Comments from the Department of Homeland Security: 

Appendix VII: GAO Contacts and Staff Acknowledgments: 

GAO Contacts: 

Acknowledgments: 

Related GAO Products: 

Tables: 

Table 1: Type of Security Enhancements the 10 Chemical and 8 Water 
Facilities We Visited Reported Making Since September 11: 

Table 2: Existing Industry Initiatives and Federal Security 
Requirements Imposed on Chemical, Water, and Maritime Facilities: 

Table 3: Number of Community Water Systems by Ownership and Population 
Service Category for Fiscal Year 2004: 

Table 4: Responsible Care® Security Code Deadlines for ACC Facilities: 

Table 5: Responsible Care® Security Code Deadlines for SOCMA 
Facilities: 

Table 6: Enforcement Actions Taken between July 1, 2004, and December 
31, 2004, by Regulatory Citation Topic: 

Figures: 

Figure 1: A Chemical Facility: 

Figure 2: A Community Water System: 

Figure 3: A Maritime Facility: 

Figure 4: Examples of Perimeter and Access Controls Chemical Facilities 
Reported Implementing: 

Figure 5: A Risk Management Cycle: 

Abbreviations: 

ACC: American Chemistry Council: 

AMWA: Association of Metropolitan Water Agencies: 

DHS: Department of Homeland Security: 

EPA: Environmental Protection Agency: 

MTSA: Maritime Transportation Security Act of 2002: 

NAWC: National Association of Water Companies: 

NRWA: National Rural Water Association: 

SOCMA: Synthetic Organic Chemical Manufacturers Association: 

United States Government Accountability Office: 

Washington, DC 20548: 

March 28, 2005: 

The Honorable Robert C. Byrd: 
Ranking Member, Subcommittee on Homeland Security: 
Committee on Appropriations: 
United States Senate: 

Dear Senator Byrd: 

The USA PATRIOT Act defined critical infrastructure as those "systems 
and assets . . . so vital to the United States that the incapacity or 
destruction of such systems and assets would have a debilitating impact 
on security, national economic security, national public health or 
safety, or any combination of those matters."[Footnote 1] We often take 
these systems for granted because they are so basic in our daily lives 
that we generally only notice them when their service is disrupted. The 
National Strategy for Homeland Security grouped the critical 
infrastructure of the United States into 13 sectors--agriculture, 
banking and finance, chemical, defense industrial base, emergency 
services, energy, food, government, information and telecommunications, 
postal and shipping, public health, transportation, and water sectors. 
Further, the President designated a lead agency for each of the 13 
sectors to coordinate interaction between the federal government and 
the private sectors. The lead agency for the chemical sector is the 
Department of Homeland Security (DHS) and the lead agency for the water 
sector is the Environmental Protection Agency (EPA). 

In this report, we focus on the chemical and water sectors and on 
maritime facilities within the transportation sector. These three 
sectors include a variety of vital assets. Although the total number of 
chemical sector facilities is not clear, there are many facilities that 
manufacture chemicals. There are about 15,000 facilities--including 
chemical, water, energy, and other sector facilities--that produce, 
use, or store more than threshold amounts of chemicals the EPA has 
estimated pose the greatest risk to human health and the environment. 
Of these 15,000 facilities, DHS estimates there are about 4,000 
chemical manufacturing facilities. There are approximately 53,000 
community drinking water systems and more than 2,900 maritime 
facilities that are required to comply with certain provisions of the 
Maritime Transportation Security Act of 2002 (MTSA).[Footnote 2]

Terrorist attacks, such as the theft of certain chemicals or 
contamination of our water at chemical, water, or maritime critical 
infrastructure facilities, could have a significant impact on the 
health and safety of millions of Americans and result in environmental 
damage or disruption to the economy. This report responds to your 
request that we describe the actions that the private sector is taking 
to secure its critical assets in chemical, water, and maritime 
facilities. We are providing information on the following questions: 
(1) What federal requirements exist for the chemical and water sectors 
to secure their facilities and what federal efforts were taken by the 
lead agencies for the chemical and water sectors to facilitate these 
sectors' actions? (2) What actions have the chemical and water sectors 
reported taking to address security vulnerabilities and what, if any, 
obstacles did they say they faced in implementing security measures? 
(3) To what extent do the chemical and water sectors' actions reflect a 
risk management approach? (4) How do the chemical and water sectors 
perceive the role of the federal government in protecting these 
facilities? (5) What are the results of the Coast Guard's compliance 
inspection program to ensure that maritime facilities implemented 
security enhancements as required by the MTSA and what actions has the 
Coast Guard taken to ensure that its program is effective?

To address our five objectives, we reviewed pertinent federal 
legislation, implementing regulations, and agency guidance on facility 
security and met with DHS and EPA officials. We also met with industry 
representatives from the American Chemistry Council (ACC) and the 
Synthetic Organic Chemical Manufacturers Association (SOCMA),[Footnote 
3] the two principal U.S. chemical industry associations; the 
Association of Metropolitan Water Agencies (AMWA),[Footnote 4] 
representing public water systems; 10 chemical facilities that were 
members of ACC or SOCMA; and 8 community water systems, 5 public and 3 
private. We also obtained information from the National Association of 
Water Companies (NAWC), which represents privately owned water systems 
and the National Rural Water Association (NRWA).[Footnote 5] In 
conducting our work in the water sector, we focused on community water 
systems--public water systems that supply water to the same population 
year-round--since the primary focus of critical infrastructure efforts 
in the water sector is on these systems. Seven of the 10 chemical 
facilities we visited are located on navigable waterways and are also 
regulated by the Coast Guard under the MTSA. We included chemical 
facilities from which a chemical release, resulting from an attack, 
could have a severe impact on surrounding communities. To assist us in 
selecting these facilities, we relied upon assessments completed by ACC 
and SOCMA members regarding the impact of a potential chemical release 
at its facilities. In conducting our work on the chemical sector, we 
focused on actions taken to strengthen security at a selected facility. 
We did not address actions taken by facility personnel to protect the 
transport of chemicals from the facility to other locations by way of 
various transport mechanisms such as rail cars or tank trucks nor did 
we address actions taken by facility personnel to prevent the sale of 
hazardous chemicals to terrorists masquerading as bona fide customers. 
The 8 community water systems we chose served a range of populations 
and were selected from systems that were subject to drinking water 
security and safety requirements of the Public Health Security and 
Bioterrorism Response Act of 2002 (Bioterrorism Act).[Footnote 6] We 
also interviewed Coast Guard officials in headquarters and five local 
Coast Guard Marine Safety Offices and reviewed Coast Guard data and 
documents regarding the Coast Guard's efforts to complete compliance 
inspections of facilities covered by MTSA, enforcement actions and 
operational controls taken, and efforts to ensure the effectiveness of 
the inspection program. Information gathered from the 10 chemical and 8 
water facilities we visited are illustrative, are not statistically 
representative of their respective industry as a whole, and therefore 
should not be considered to represent the views of the sectors as a 
whole. 

We conducted our work in accordance with generally accepted government 
auditing standards from October 2004 through March 2005. Appendix I 
includes more detailed information on our scope and methodology. 

Results in Brief: 

Few federal requirements address security in the chemical and water 
sectors. However, the government has provided financial and other types 
of assistance to help these sectors implement security improvements. 
The federal government has enacted some legislation in these sectors to 
help prevent accidental releases of hazardous materials. For example, 
the Emergency Planning and Community Right to Know Act requires, in 
general, certain facilities to participate with local emergency 
planning committees that develop emergency response plans in the event 
of an accidental release of hazardous material.[Footnote 7] With the 
enactment of the Bioterrorism Act of 2002, the federal government 
provided legislation to secure community water systems that serve more 
than 3,300 people, including systems that store various chemicals, 
against intentional attacks. This act requires operators of community 
water systems to perform vulnerability analyses of their facilities and 
to prepare or update an existing emergency response plan. MTSA and its 
implementing regulations require maritime facility owners and 
operators, including chemical facilities, to conduct assessments of 
their facilities to identify vulnerabilities, develop security plans to 
mitigate these vulnerabilities, and implement the measures discussed in 
the security plans. Other federal actions taken by DHS and EPA to 
assist the chemical and water sectors include providing financial 
assistance in the form of grants, threat information and guidance, 
training and exercises, and infrastructure protection initiatives, as 
well as setting security requirements for some facilities and reviewing 
actions by maritime facilities to determine compliance with MTSA. 

Chemical facilities and community water systems reported making 
security improvements separate from federal requirements. The chemical 
industry's principal trade associations, the American Chemistry Council 
and the Synthetic Organic Chemical Manufacturers Association, adopted 
the Responsible Care® Security Code in 2002; it requires their member 
companies to perform vulnerability assessments, develop plans to 
mitigate vulnerabilities, take actions to implement the plans, and 
undergo a third-party verification that facilities implemented 
identified physical security enhancements. All 10 of the chemical 
facilities we visited reported making significant progress in 
fulfilling the requirements of the security code. Other facilities that 
use chemicals also have developed security initiatives on their own, 
some of which are modeled after the Responsible Care® Security Code. 
Although the water sector has not generated a specific industry code, 
the eight community water systems we visited were all regulated under 
the Bioterrorism Act, which requires systems to, among other things, 
perform vulnerability analyses of their facilities and prepare or 
update an existing emergency response plan with respect to intentional 
attacks. All eight of the community water systems we visited reported 
that they had completed their vulnerability assessments as well as 
implemented additional enhancements not required under the Bioterrorism 
Act, such as increasing access controls. Despite progress being made to 
enhance security, officials at both the chemical facilities and 
community water systems we visited reported encountering obstacles in 
making security enhancements and maintaining a level of security 
consistent with their needs. For example, officials at three chemical 
facilities reported experiencing difficulties, such as delays in 
obtaining permits or other approvals needed from federal authorities to 
install fences to better protect the perimeter of their chemical 
facilities. Officials at six of the community water systems we visited 
reported economic constraints, such as balancing the need for rate 
increases to fund security enhancements with efforts to keep rates low. 

Through federal regulations and private sector efforts, chemical 
facilities that are members of the chemical industry's principal trade 
associations and the drinking water sector have incorporated some 
elements of a risk management framework to improve their security since 
September 11. A risk management framework includes assessing risk, 
evaluating alternatives for reducing risks, prioritizing which of those 
alternatives to implement, monitoring their implementation, and 
continually using new information to adjust actions taken. Information 
about risks is central to determining which security enhancements 
should be implemented based on available resources. Although the 
chemical sector's security efforts are not regulated, the chemical 
industry's principal trade associations require their members, as a 
condition of membership, to follow a security code. While the code 
incorporates elements of a risk management framework, the proportion of 
total chemical facilities within the chemical sector that adhere to the 
code is uncertain. About 2,300 ACC and SOCMA chemical manufacturing 
facilities follow the Responsible Care® Security Code; 1,100 of which 
are among the 15,000 facilities--including chemical, water, energy, and 
other sector facilities--that produce, use, or store more than 
threshold amounts of chemicals that EPA has estimated pose the greatest 
risk to human health and the environment. Within these 15,000 
facilities, DHS estimates there are about 4,000 chemical manufacturing 
facilities. In March 2003, we recommended that the Secretary of 
Homeland Security and the Administrator of EPA jointly develop, in 
consultation with the Office of Homeland Security a comprehensive 
national chemical security strategy to include, among other things, 
information on industry security preparedness and a legislative 
proposal to require chemical facilities to expeditiously assess their 
vulnerability to terrorist attacks and, where necessary, require these 
facilities to take corrective action.[Footnote 8] At that time, DHS and 
EPA agreed that legislation requiring chemical facilities to assess and 
address vulnerabilities to terrorist attack should be enacted. 

The water sector is regulated by the Bioterrorism Act of 2002, which 
requires community water systems serving more than 3,300 people to, 
among other things, perform vulnerability analyses of their facilities. 
The community water systems we visited implemented enhancements not 
required under the act, although actions were limited by their own 
resource constraints. The nation's drinking water systems are not 
required to implement any risk reduction actions based on their 
vulnerability assessments or report to EPA on measures that have been 
implemented. Thus, the extent of the actions taken by these water 
systems is unknown. However, the Conference Report accompanying the 
Department of Homeland Security Appropriations Act for fiscal year 2005 
calls for DHS to analyze whether it should require private sector 
entities to provide it with information concerning these entities' 
security measures and vulnerabilities to improve DHS's ability to 
evaluate critical infrastructure protections nationwide.[Footnote 9] 
This report also mandates that GAO review DHS's analysis when it is 
complete. A DHS official has told us that it preliminarily expects to 
complete this analysis in December 2005. 

In February 2005, DHS released its interim National Infrastructure 
Protection Plan, which we have not fully evaluated. This plan outlines 
a risk management framework to guide future efforts to identify and 
protect critical infrastructure and defines the roles of federal, 
state, local, and tribal agencies and the private sector using elements 
of this framework. 

Operators of chemical manufacturing facilities and community water 
systems we contacted agreed that the federal role should include 
communicating threat information but had different views with respect 
to the need for the government to enact additional regulation to 
enhance security protection. Officials at 8 of the 10 of the chemical 
facilities we visited reported that the federal government should 
introduce regulations comparable to the Responsible Care® Security Code 
for the entire chemical sector to follow. Officials at 3 of the 
facilities we visited stated that those facilities that do not adhere 
to the Responsible Care® Security Code may have a competitive advantage 
over those facilities that do adhere to the code. In comparison, the 
majority of officials at the community water systems we visited 
reported that the federal government should provide technical support 
and guidance to help the water sector in developing and implementing 
security enhancements. The majority of officials we interviewed also 
supported the need for the federal government to expand financial 
support for security enhancements in the water sector by providing 
funding designated for community water systems. 

The Coast Guard has found that the vast majority, or approximately 97 
percent, of maritime facilities are in compliance with MTSA 
requirements. However, the Coast Guard has not yet determined the 
effectiveness of its MTSA compliance inspection process. The Coast 
Guard reported inspecting all of the more than 2,900 regulated 
facilities between July 1, 2004, and December 31, 2004, and taking 312 
enforcement actions against facility owners or operators for 
noncompliance with MTSA requirements. In addition to taking the 312 
enforcement actions, the Coast Guard imposed operational controls on 29 
MTSA facilities, such as suspending certain facility operations. The 
Coast Guard has taken some actions to facilitate the effectiveness of 
its compliance program, such as developing detailed checklists for 
facility inspections and training its inspectors. However, because of 
the high priority given to complete inspections at all regulated 
facilities by December 31, 2004, the Coast Guard said it has not 
completed an evaluation of the overall effectiveness of the compliance 
inspections, but plans to incorporate lessons learned from such an 
evaluation in the future. In June 2004, we issued a report on the 
status of the Coast Guard's strategy for monitoring and overseeing the 
implementation requirements of MTSA. At that time, we recommended that 
the Coast Guard evaluate its initial compliance inspection efforts upon 
completion and use the results to strengthen the compliance process for 
its long-term strategy.[Footnote 10] The Coast Guard agreed with our 
recommendation. 

We provided a draft of this report to DHS and EPA for review and 
comment. DHS and EPA generally concurred with the contents of the 
report. A copy of DHS's letter commenting on the report is presented in 
appendix VI. EPA did not provide a formal letter. 

Background: 

The National Strategy for Homeland Security and the National Strategy 
for the Physical Protection of Critical Infrastructures and Key Assets 
identified the private sector as the owner of 85 percent of the 
nation's critical infrastructure and recognized that the owners of this 
infrastructure bear primary responsibility for protecting their 
facilities from deliberate acts of terrorism. The National Strategy for 
the Physical Protection of Critical Infrastructures and Key Assets 
specifically designated the role of the federal government, "to 
coordinate the complementary efforts and capabilities of government and 
private institutions to raise our level of protection over the long 
term." Moreover, the President issued a directive emphasizing the 
federal government's role by designating the Secretary of Homeland 
Security to identify, prioritize, and coordinate the protection of 
critical infrastructure and key resources with an emphasis on those 
that could be exploited to cause catastrophic health effects or mass 
casualties.[Footnote 11] The directive requires the Secretary to 
collaborate with other federal departments and agencies to develop a 
program to map critical infrastructure and key resources; model the 
potential implications of terrorist exploitation of vulnerabilities 
within the critical infrastructure and key resources; and develop a 
national indications and warnings architecture, among other things, to 
help identify indicators and precursors to an attack. This directive 
also required DHS to produce a comprehensive integrated National Plan 
for Critical Infrastructure and Key Resources Protection to outline 
national goals, objectives, milestones, and key initiatives by December 
17, 2004. 

Our report focuses on efforts in the chemical and water sectors and the 
maritime segment of the transportation sector. The chemical sector is 
diverse in that its facilities produce, use, or store a multitude of 
products including (1) basic chemicals used to manufacture other 
products such as plastics, fertilizers, and synthetic fibers; (2) 
specialty chemicals used for a specific purpose such as a functional 
ingredient or as a processing aid in the manufacture of a diverse range 
of products such as adhesives and solvents, coatings, industrial gases, 
industrial cleaners, and water management chemicals; (3) life science 
chemicals consisting of pharmaceuticals and pesticides; and (4) 
consumer products such as hair and skin care products and cosmetics. To 
produce and deliver these products, the sector depends on raw 
materials, manufacturing plants and processes, and distribution 
systems, as well as research facilities and supporting infrastructure 
services, such as transportation and electricity. Because many 
chemicals are inherently hazardous, the release of chemicals or the 
risk of contamination at chemical facilities poses a potential threat 
to public health and the economy. Figure 1 depicts a chemical facility. 

Figure 1: A Chemical Facility: 

[See PDF for image]

[End of figure]

The water sector consists of two basic components: freshwater supply 
and wastewater collection and treatment. As we previously mentioned, we 
focused on community water systems within supply since the primary 
focus of critical infrastructure efforts is on these systems. According 
to EPA data, in 2004, there were approximately 53,000 community water 
systems in the United States.[Footnote 12] EPA's data reflect that 
ownership of these systems is evenly split--about half are publicly 
owned by state and local authorities and about half are privately 
owned.[Footnote 13] According to EPA, the majority of the U.S. 
population gets its water from publicly owned systems (see app. II for 
more details on the number of community water systems in the United 
States). Community water systems vary by size and other factors but 
most typically include a supply source, such as a reservoir; a 
treatment facility, which stores and uses chemicals, such as chlorine, 
to eliminate biological contaminants; and a distribution system, which 
includes water towers, piping grids, pumps, and other components to 
deliver treated water to consumers. Community water systems often 
contain thousands of miles of pipes and numerous access points that can 
be vulnerable to terrorist attack. Figure 2 reflects a community water 
system. 

Figure 2: A Community Water System: 

[See PDF for image]

[End of figure]

Maritime facilities include a number of waterfront facilities such as 
container terminals, factories, and shipping terminals, which may 
contain hazardous materials, as well as passenger terminals. In 
addition to possessing the potential for being used as a conduit for 
smuggling weapons of mass destruction or other dangerous materials into 
the country, maritime facilities present attractive targets of 
opportunity for terrorists to impact the nation's economy. Figure 3 
depicts a maritime facility. 

Figure 3: A Maritime Facility: 

[See PDF for image]

[End of figure]

Few Federal Security Requirements Exist for the Chemical and Water 
Sectors, but Other Federal Actions Have Facilitated these Sectors' 
Efforts to Enhance Security: 

Currently, few federal requirements specifically address the security 
of chemical or drinking water systems from terrorism. Some federal 
requirements have been enacted to help prevent and mitigate accidental 
releases of hazardous chemicals. For example, the Emergency Planning 
and Community Right to Know Act requires, in general, certain 
facilities to participate with local emergency planning committees that 
develop emergency response plans in the event of an accidental release 
of hazardous material. Additionally, the 1990 Clean Air Act 
Amendments[Footnote 14] require certain chemical facilities to develop 
risk management plans to help prevent accidental releases of hazardous 
air pollutants. Under this act, EPA requires that about 15,000 
facilities--including chemical, water, energy, and other sector 
facilities--that produce, use, or store more than threshold amounts of 
chemicals posing the greatest risk to human health and the environment 
take a number of steps to prevent and prepare for an accidental 
chemical release.[Footnote 15] Specifically, EPA regulations 
implementing the Clean Air Act require that the owners and operators of 
chemical facilities include a facility hazard assessment, an accident 
prevention program, and an emergency response program as part of their 
risk management plans. The Bioterrorism Act was enacted to specifically 
help secure community water systems that provide water to more than 
3,300 people, including such systems' storage of various chemicals, 
against purposeful attacks.[Footnote 16] It requires operators of 
community water systems to perform vulnerability analyses of their 
facilities and to prepare or update an existing emergency response 
plan. MTSA and its implementing regulations require maritime facility 
owners and operators to conduct assessments of certain at-risk 
facilities to identify vulnerabilities, develop security plans to 
mitigate these vulnerabilities, and implement the measures discussed in 
the security plans. 

Although the federal government does not have primary responsibility 
for implementing security enhancements at privately owned critical 
infrastructure, DHS and EPA--the lead agencies for the chemical and 
water sectors respectively--have taken some actions to try to 
facilitate private sector security improvements by (1) providing 
financial assistance, (2) providing information and guidance, (3) 
providing training and exercises, (4) developing infrastructure 
protection initiatives, (5) setting security requirements for some 
facilities and related deadlines for taking required measures, and (6) 
reviewing actions taken at those facilities. 

* Providing financial assistance: The federal government has provided 
financial assistance through several grant programs such as port 
security grants,[Footnote 17] EPA's security planning grant program for 
vulnerability assessments,[Footnote 18] and the Homeland Security Grant 
Program[Footnote 19] for infrastructure security. For example, 4 of the 
10 chemical facilities we visited reported receiving port security 
grants ranging from $265,000 to $1.8 million that helped to defray the 
costs they incurred in implementing security enhancements since 
September 11, which ranged from $2.3 million to $10 million.[Footnote 
20]

* Information sharing and guidance: DHS and EPA partner with the 
chemical and water sectors' Information Sharing and Analysis Centers to 
coordinate and establish information-sharing mechanisms on critical 
infrastructure protection that includes threat information.[Footnote 
21] As we reported in January 2005, DHS is also seeking to enhance 
communication between critical infrastructure sectors, like the 
chemical and water sectors, with the government.[Footnote 22] For 
example, it established a Water Sector Coordinating Council that 
consists of representative members of the water sector community and is 
charged with identifying information and other needs of the sector, 
including the appropriate use of and the relationships among the Water 
Information Sharing and Analysis Center, the Water Security Channel, 
and the Homeland Security Information Network--a national communication 
mechanism that is to provide the water sector with a suite of 
information and communication tools to share critical information 
within the sector, across other sectors, and with DHS.[Footnote 23] 
According to a DHS official, the department is assembling a Government 
Coordinating Council made up of federal, state, and local officials to 
assess impacts across critical infrastructure sectors, including the 
water sector. A DHS official also told us that a similar Government 
Coordinating Council for the chemical sector was formed on March 17, 
2005. For maritime facilities, the Coast Guard established local port 
security committees known as Area Maritime Security Committees to, 
among other things, serve as a link for communicating threats and 
disseminating appropriate security information to port stakeholders 
such as facility owners or operators. Required under MTSA, these 
committees are headed by a Coast Guard officer and are composed of a 
wide range of port stakeholders including members from law enforcement 
agencies, maritime industry (which could include chemical facilities on 
the waterfront), and federal, state, and local governments. DHS and EPA 
have also provided guidance to the chemical and water sectors, 
respectively, for conducting risk assessments.[Footnote 24] In 
addition, EPA provides technical assistance to the water sector to help 
ensure the continued security of the nation's drinking water. For 
example, trained environmental professionals, scientists, and engineers 
provide information on technological advances in water security. EPA 
prepared voluntary guidelines--the Interim Final Response Protocol 
Toolbox: Planning for and Responding to Contamination Threats to 
Drinking Water Systems--for drinking water systems to use to help plan 
for and respond to intentional threats and incidents related to water 
contamination. EPA also established a Water Security Working Group made 
up of 16 members from the wastewater and drinking water utilities and 
environmental and rate-setting organizations. The group advises the 
National Drinking Water Advisory Council (NDWAC)[Footnote 25] on ways 
to address several specific security needs of the sector. The working 
group is to identify features of an active and effective security 
program and ways to measure the adoption of these practices and provide 
recommendations to NDWAC by the spring of 2005. The working group is 
also charged with identifying incentives for the voluntary adoption of 
an active and effective security program in the drinking water and 
wastewater sector. In turn, NDWAC provides advice and recommendations 
to EPA related to drinking water quality, including water security and 
emerging issues on drinking water. 

* Training and exercises: DHS and EPA have also provided a series of 
specialized security training courses to assist the private sector in 
protecting its critical assets. For instance, DHS has provided training 
programs to first responders and facility security officers to better 
equip these personnel with appropriate skills to prevent and protect 
against continuing and emerging threats to the nation's critical 
infrastructure. Additionally, EPA has sponsored a variety of training 
courses, meetings, workshops, and webcasts to help enhance the security 
and emergency response capabilities of drinking water facilities. DHS 
has also initiated several security exercises with individual 
facilities and held portwide exercises or drills initiated by the Coast 
Guard to help these facilities react appropriately in the event of a 
terrorist attack. 

* Infrastructure protection initiatives: Two initiatives that DHS has 
under way to facilitate efforts by the private sector to enhance 
critical infrastructure protection are the Buffer Zone Protection 
Program and Site Assistance Visits. As part of the Buffer Zone 
Protection Program--a program designed to reduce specific 
vulnerabilities by developing protective measures that extend from the 
critical infrastructure site to the surrounding community--DHS provides 
advice and guidance to state and local partners as they prioritize 
specific vulnerability reduction efforts. DHS also conducts site 
assistance visits at critical infrastructure sites nationwide to 
address key areas of concern at facilities requiring security 
enhancements. DHS subject matter experts in the area of physical 
security measures, system/interdependencies, and terrorist attack 
planning conduct these visits (which generally last 1 to 3 days) in 
which, among other things, the vulnerabilities of the site or facility 
are identified and mitigation options are discussed. The site 
assistance visits also provide insight into threats that pertain to the 
sector based on DHS's access to threat information. 

* Setting security requirements and deadlines: In October 2003, the 
Coast Guard issued regulations to enforce MTSA's security requirements 
for maritime facilities, including some chemical facilities in 
proximity to waters subject to U.S. jurisdiction. These regulations 
established a process and related deadlines for maritime facilities to 
follow in assessing their security risks and preparing related plans to 
include actions mitigating any identified vulnerabilities. 

* Reviewing actions taken: In 2004, the Coast Guard began a compliance 
inspection program with on-site inspections and spot checks to help 
ensure compliance by MTSA-regulated facilities. 

As part of its efforts to coordinate with the chemical sector to 
enhance critical infrastructure protection as discussed above, DHS 
gathered data on actions taken by some chemical facilities. However, 
DHS officials told us that these data do not reflect actions taken by 
the entire chemical industry. In addition, EPA officials told us that 
while engaged in meetings and technical assistance or training sessions 
with community water systems, they received information on actions 
taken by some community water systems. However, they also stated that 
this information was anecdotal and does not reflect actions taken by 
the entire water sector. 

Chemical Facilities and Water Systems Reported Taking Actions to 
Address Security Vulnerabilities but Said They Faced Obstacles in 
Implementing Security Measures: 

One of the chemical industry's principal trade associations, ACC, set 
policy for its members to follow that was designed to strengthen 
infrastructure protection at its members' facilities, whereas, the 
water sector followed the requirements of legislation. While the 
chemical and water facilities we visited reported taking a variety of 
actions to strengthen the security of their facilities; they also 
identified obstacles both in making these enhancements and in 
maintaining them. 

Chemical Facilities and Water Systems We Visited Reported Making 
Security Enhancements Separate from Federal Regulations: 

After September 11, the chemical and water sectors reported taking a 
variety of actions to strengthen the security of their facilities. 
Prior to September 11, ACC, SOCMA, and the Chlorine Institute initiated 
the development of Site Security Guidelines for its members to help 
facility managers make decisions on appropriate security measures based 
on risk that were subsequently published in October 2001. In 2002, ACC 
adopted a security code to accompany its Responsible Care Management 
System®.[Footnote 26] As a condition of membership, ACC requires its 
members to adhere to its Responsible Care® Security Code. Under the 
Responsible Care® Security Code, member companies are to perform 
vulnerability assessments, develop plans to mitigate vulnerabilities, 
take actions to implement the plans, and undergo third-party 
verification that the facilities implemented identified physical 
security enhancements. While the Responsible Care® Security Code does 
not require third parties to verify that a vulnerability assessment was 
conducted appropriately or that actions taken by a facility adequately 
address security risks, the Responsible Care Management System® 
certification requirements do require member companies to periodically 
conduct independent third-party audits that include an assessment of 
their security programs and processes and implementation of corrective 
actions. SOCMA also adopted the Responsible Care® Security Code, 
requiring its members to adhere to it as well. (For more details 
regarding the Responsible Care® Security Code and the status of ACC and 
SOCMA members' actions, see app. III). 

In June, 2004, the chemical industry confirmed to DHS that it had 
established the Chemical Sector Council to act as a coordination 
mechanism for the chemical sector to identify, prioritize, and 
coordinate the protection of critical infrastructure and key resources; 
and to facilitate sharing of information about physical and cyber 
threats, vulnerabilities, incidents, potential protective measures and 
best practices. The Chemical Sector Council is composed of 15 sector 
associations: ACC, the American Forest and Paper Association, the 
Chemical Producers and Distributors Association, the Chlorine Chemistry 
Council, the Compressed Gas Association, Crop Life America, the 
Institute of Makers of Explosives, the International Institute of 
Ammonia Refrigeration, the National Association of Chemical 
Distributors, the National Paint and Coatings Association, SOCMA, the 
Adhesive and Sealant Council, the Chlorine Institute, the Fertilizer 
Institute, and the Society of the Plastics Industry, Inc. 

In March 2003, we reported that other facilities that use chemicals, 
including fertilizer suppliers, petroleum and natural gas facilities, 
food storage facilities, water treatment facilities, and wastewater 
treatment facilities, have developed their own security initiatives. 
[Footnote 27] For example, the Fertilizer Institute, which represents 
fertilizer manufacturers and fertilizer retail and distribution 
facilities, developed a security code modeled after ACC's Responsible 
Care® Security Code. The Fertilizer Institute's code encourages 
facilities to develop vulnerability assessments and implement plans 
based on the assessments. 

However, because the total number of facilities within the chemical 
sector is uncertain, it is difficult to determine the proportion of all 
chemical sector facilities that are not members of ACC or SOCMA and 
thus are not required to adhere to the Responsible Care® Security Code. 
For example, there are approximately 2,300 ACC and SOCMA facilities, 
1,100 of which are among the15,000 facilities--including, chemical, 
water, energy, and other sector facilities--that produce, use, or store 
more than threshold amounts of chemicals that EPA has estimated pose 
the greatest risk to human health and the environment. Within these 
15,000 facilities, DHS estimates that there are about 4,000 chemical 
manufacturing facilities. A DHS official told us that the department is 
working with Argonne National Laboratory on the development of a 
taxonomy--a list of the types of facilities that should be included-- 
for each critical infrastructure sector, including the chemical sector. 

Although the water sector has not generated a specific industry code, 
all community water systems that serve more than 3,300 people are 
subject to the drinking water security and safety requirements of the 
Bioterrorism Act. According to EPA data, in fiscal year 2004, there 
were approximately 53,000 community water systems in the United States, 
of which about 8,600 (16 percent) were required by the Bioterrorism Act 
to prepare vulnerability assessments for their systems. According to 
EPA officials, as of February 23, 2005, all community water systems 
that serve 50,000 or more people have submitted their vulnerability 
assessments to EPA; whereas, 92 percent of the smaller systems (those 
serving between 3,301 and 49,999 people) have submitted their 
vulnerability assessments. Under the Bioterrorism Act, community water 
systems that serve 100,000 or more people were required to submit their 
vulnerability assessments to EPA by March 31, 2003; those systems that 
served between 50,000 and 99,999 people were required to submit their 
vulnerability assessments to EPA by December 31, 2003; and those that 
served between 3,301 and 49,999 people were required to submit their 
assessments by June 30, 2004. 

The actions the facilities we visited reported taking reflect, in many 
ways, the security initiatives issued from trade industry associations 
and legislation enacted by the federal government. For example, all 10 
of the chemical facilities we visited reported fulfilling the steps 
under the Responsible Care® Security Code by completing their 
vulnerability assessments and developing plans to mitigate 
vulnerabilities.[Footnote 28] Eight of those facilities reported that 
they have fully implemented their planned enhancements. The remaining 
two chemical facilities reported making significant progress on planned 
enhancements. However, they also reported implementing alternative 
measures for some enhancements, such as adding guards for additional 
patrols while permanent barriers are being constructed. In the water 
sector, officials at eight community water systems that we visited 
reported that they completed their vulnerability assessments in 
accordance with the Bioterrorism Act. Even though not specifically 
required by the Bioterrorism Act, officials at the eight community 
water systems we visited told us they implemented a number of 
enhancements, such as increasing access controls by establishing an 
electronic key control system that assigns keys to individual staff 
members and tracks their use. Table 1 provides additional information 
on the types of enhancements the chemical and water facilities reported 
taking since September 11, and figure 4 provides examples of some of 
these enhancements. 

Table 1: Type of Security Enhancements the 10 Chemical and 8 Water 
Facilities We Visited Reported Making Since September 11: 

Type of security enhancement: Increasing perimeter control; 
Number of chemical facilities: 10; 
Number of community water systems: 8; 
Examples of enhancements: Fencing, gates, cameras, and signs. 

Type of security enhancement: Increasing access control; 
Number of chemical facilities: 10; 
Number of community water systems: 8; 
Examples of enhancements: Turnstiles, access control cards, and 
changing outer locks. 

Type of security enhancement: Enhancing monitoring; 
Number of chemical facilities: 10; 
Number of community water systems: 7; 
Examples of enhancements: Motion detectors and contamination detectors. 

Type of security enhancement: Establishing system redundancies; 
Number of chemical facilities: 5; 
Number of community water systems: 5; 
Examples of enhancements: Backup pumps, power systems, and storage 
capacity. 

Type of security enhancement: Increasing automated (cyber) system 
protections; 
Number of chemical facilities: 9; 
Number of community water systems: 7; 
Examples of enhancements: Separation of business and control process 
networks and firewalls. 

Type of security enhancement: Increasing facility precautions; 
Number of chemical facilities: N/A; 
Number of community water systems: 7; 
Examples of enhancements: Shredding old facility maps. 

Type of security enhancement: Making process or inventory changes; 
Number of chemical facilities: 7; 
Number of community water systems: N/A; 
Examples of enhancements: Reducing the inventory of hazardous chemicals 
stored on site. 

Source: GAO analysis of enhancements the chemical facilities and 
community water systems reported taking. 

[End of table]

Figure 4: Examples of Perimeter and Access Controls Chemical Facilities 
Reported Implementing: 

[See PDF for image]

Note: From left to right: entrance barricades, card-code turnstile, and 
closed-circuit camera. 

[End of figure]

Chemical Facilities and Water Systems Said They Faced Several Obstacles 
in Making and Maintaining Security Enhancements: 

In making security enhancements and in maintaining a level of security 
consistent with their needs, officials at the chemical facilities and 
community water systems we visited told us that they faced several 
obstacles. However, the obstacles varied by sector. Three chemical 
facility operators told us that they experienced difficulties in 
obtaining permits or approval from the U.S. Army Corps of Engineers to 
install fences to better protect the perimeter of their chemical 
facilities. Officials at one facility stated that they did not obtain a 
permit from the Army Corps of Engineers to install a fence on wetlands 
in a timely manner, while an official at another chemical facility said 
that they moved the planned location of their fenceline rather than go 
through a permitting process. The official representing the third 
chemical facility told us that they moved their fence line because the 
Corps of Engineers refused to allow them to install fences on the Corps-
managed property. One of the United States Army Corps of Engineers' 
missions is to preserve wetlands. Project proponents who seek to fill 
in wetlands or waters are required under federal law to obtain a permit 
from the Army Corps of Engineers before they can undertake such 
activities. According to the Army Corps of Engineers, the agency 
requires permit applicants to avoid, minimize, or mitigate impacts to 
wetlands or waters in most cases.[Footnote 29]

Officials from two other chemical companies we visited said that they 
were experiencing continuing difficulties in gaining cooperation from 
railroads to maintain security when railroad personnel made deliveries 
or picked up products from the chemical facilities' premises. An 
official from one of these chemical companies said that the railroads 
followed security standards that were lower than the chemical company's 
standards and often took actions that compromised the chemical 
facility's security. Officials representing two of the chemical 
facilities we visited also stated that they were challenged in 
obtaining contractors, such as crews hired to perform major system 
maintenance in the facilities, with an appropriate level of background 
screening. 

Officials at six of the eight community water systems we visited stated 
that they faced economic constraints in addressing security issues, 
including insufficient financial resources to implement security 
enhancements and determining how best to use available funds given 
competing priorities such as nonsecurity-related infrastructure 
upgrades. Officials at six of these systems told us that they are 
challenged to balance the need for rate increases to fund security 
enhancements with efforts to keep water rates low. Furthermore, 
officials at two community water systems stated that first responders 
such as police and firefighters were generally given priority to use 
DHS grant funds awarded to states in relation to homeland security. As 
a result, these community water officials said that within their 
states, the first responders typically consumed all of the grant funds 
and nothing remained for the utilities' use. DHS awards of homeland 
security grant funds, in general, have provided states with a certain 
measure of flexibility with respect to how grant funds are to be 
allocated and used by the states in support of their State Homeland 
Security Strategies. 

Four of the eight community water systems we visited also stated that 
instituting a cultural change that stresses the importance of security 
was another challenge they needed to address. For example, an official 
at one of these systems said that its employees are not always diligent 
about carrying out security enhancements, such as ensuring that doors 
stay locked during shift changes. An official at another system noted 
that the public in his locality did not perceive the water system to be 
at risk and, if it was, the public believed that little could be done 
to prevent a terrorist attack, making it difficult for the community 
water system to obtain budget increases to pay for security 
enhancements. Officials at two of the eight community water systems we 
visited reported that sufficient technology was not available to ensure 
an appropriate level of security enhancements. For instance, one large 
community water system reported that while technology is currently 
available to allow a system to test its water supply for contaminants 
at a specific point in time, a readily accessible technology does not 
exist for continuously monitoring the supply that would alert a system 
immediately upon a contaminant's entry into the water. As reported in 
the fiscal year 2006 President's Budget, the Administration requested 
$44 million to fund the Water Sentinel Initiative as a pilot program in 
five major cities. Under this initiative, the federal government would 
commence the development of a water surveillance system designed to 
enhance security of the nation's water supply by providing an early 
warning mechanism for possible contaminants, including chemical or 
biological agents, entering the water supply. 

The Chemical and Water Sectors Have Incorporated Some Elements of a 
Risk Management Framework to Address Their Security Vulnerabilities: 

The chemical and drinking water sectors have incorporated some elements 
of a risk management framework to protect their critical 
infrastructure. As shown in figure 5, a risk management framework 
represents a series of analytical and managerial steps, basically 
sequential, that can be used to assess risk, assess alternatives for 
reducing risks, choose among those alternatives, implement the 
alternatives, monitor their implementation, and continually use new 
information to adjust and revise the assessments and actions, as 
needed. Adoption of a risk management framework can aid in assessing 
risk by determining which vulnerabilities should be addressed in what 
ways within available resources. 

Figure 5: A Risk Management Cycle: 

[See PDF for image]

[End of figure]

Assessing risks for specific assets--such as community water systems or 
chemical plants on navigable waterways--is defined by two conditions: 
(1) probability, the likelihood, quantitative or qualitative, that an 
adverse event would occur; and (2) consequences, the damage resulting 
from the event, should it occur. 

Thus, the most severe risks are those that have both the greatest 
probability of occurring and would cause the greatest damage. Actual 
risk reflects the combination of the two factors. Risks may be managed 
by reducing the probability, the consequence, or, where possible, both. 

As this suggests, identifying threats and vulnerabilities (e.g., 
weaknesses in structure or security operations) in existing 
infrastructure is necessary but not sufficient to fully manage the 
risks to the infrastructure. Assessing the vulnerability of 
infrastructure to damage or destruction should be coupled with an 
assessment of the probability that the vulnerability will be exploited 
and the consequences that would result if it were exploited. Several 
risks, each with equally serious potential consequences, may not be 
equally likely to occur. In addition, private entities may benefit from 
assistance in the form of risk information from intelligence or law 
enforcement agencies to assess the types of risks faced and the 
probability that these risks would result in an adverse event. Because 
it is unlikely that sufficient resources will be available to address 
all risks, it becomes necessary to prioritize both risks and the 
actions taken to reduce those risks, taking cost into consideration. 
For example, which actions will have the greatest net potential benefit 
in reducing one or more risks?

The information we obtained from our site visits and discussions with 
national chemical and water associations suggests that some elements of 
a risk management framework have been incorporated into the assessments 
and actions taken by both chemical and community water facilities. The 
chemical facilities we visited were all members of the ACC or SOCMA and 
subscribe to the Responsible Care® Security Code, which those 
associations require their members to follow. 

Of the 2,300 ACC and SOCMA chemical facilities affected by the 
Responsible Care® Security Code, 1,100 are among the 15,000 facilities-
-including, chemical, water, energy, and other sector facilities--that 
produce, use, or store more than threshold amounts of chemicals that 
EPA has estimated pose the greatest risk to human health and the 
environment. As we previously mentioned, it is difficult to determine 
the proportion of chemical facilities that follow the Responsible Care® 
Security Code because even though DHS estimates that there are about 
4,000 chemical manufacturing facilities within the 15,000 facilities, 
the total number of chemical facilities in the chemical sector is 
uncertain. In our March 2003 report, we recommended that the Secretary 
of Homeland Security and the Administrator of EPA jointly develop, in 
consultation with the Office of Homeland Security, a comprehensive 
national chemical security strategy to include, among other things, 
information on industry security preparedness and a legislative 
proposal to require chemical facilities to expeditiously assess their 
vulnerability to terrorist attacks and, where necessary, require these 
facilities to take corrective action.[Footnote 30] DHS and EPA agreed 
that legislation requiring chemical facilities to assess and address 
vulnerabilities to terrorist attack should be enacted.[Footnote 31]

Similar to the Responsible Care® Security Code, under MTSA and its 
implementing regulations, more than 2,900 maritime facilities 
(including some chemical) are required to assess risks, develop 
security plans to mitigate them, and implement those security plans. 
The Coast Guard is responsible for inspecting facilities for 
compliance. 

The Bioterrorism Act requires all community water systems that serve 
populations of 3,300 or more to prepare vulnerability assessments and 
update or prepare emergency plans based on those assessments. EPA 
guidance for these vulnerability assessments calls for them to include 
(1) a characterization of the water system, (2) the identification of 
possible consequences of malevolent acts, (3) the critical assets 
subject to malevolent acts, (4) an assessment of the threat of 
malevolent acts, (5) an evaluation of countermeasures, and (6) a plan 
for risk reduction. However, as shown in table 2, community water 
systems are not subject to federal requirements to implement any risk 
reduction actions based on the completed vulnerability assessments or 
report to EPA on measures that have been implemented in a manner 
similar to that required of port facilities by MTSA. For those systems 
we visited, the actions taken reflected the systems' own risk 
assessments and resource constraints. Some systems have had more 
resources to devote to risk reduction than others. 

Yet, the extent of actions taken by community water systems is unknown. 
The Conference Report accompanying the Department of Homeland Security 
Appropriations Act for fiscal year 2005 calls for DHS to analyze 
whether it should require private sector entities to provide it with 
information concerning these entities' security measures and 
vulnerabilities to improve DHS's ability to evaluate critical 
infrastructure protections nationwide. This report also mandates that 
GAO review DHS's analysis when it is complete. A DHS official has 
preliminarily told us that the Department expects to complete this 
analysis in December 2005. 

Table 2: Existing Industry Initiatives and Federal Security 
Requirements Imposed on Chemical, Water, and Maritime Facilities: 

Security requirements: Chemical Industry--ACC Responsible Care® 
Security Code[A]; 
Elements of risk management: Vulnerability assessment: Yes; 
Elements of risk management: Security or risk reduction plan: Yes; 
Elements of risk management: Implementation of measures: Yes; 
Elements of risk management: Third-party verification or compliance 
inspection: Yes[B]. 

Security requirements: Bioterrorism Act[C]; 
Elements of risk management: Vulnerability assessment: Yes; 
Elements of risk management: Security or risk reduction plan: [D]; 
Elements of risk management: Implementation of measures: No; 
Elements of risk management: Third-party verification or compliance 
inspection: No. 

Security requirements: MTSA and the Coast Guard's implementing 
regulations[E]; 
Elements of risk management: Vulnerability assessment: Yes; 
Elements of risk management: Security or risk reduction plan: Yes; 
Elements of risk management: Implementation of measures: Yes; 
Elements of risk management: Third-party verification or compliance 
inspection: Yes. 

Source: GAO analysis of above-mentioned legislation, guidance, and 
trade association code. 

[A] This code applies to chemical facilities that are members of ACC 
and SOCMA. 

[B] The Responsible Care® Security Code does not require that third 
parties verify that the vulnerability assessment was conducted 
appropriately or that actions taken by a facility adequately address 
security risks. 

[C] This act and guidance apply to community water systems that serve 
more than 3,300 people. The act also requires such systems to prepare 
or update existing emergency response plans. 

[D] Although not specifically required by the Bioterrorism Act, EPA 
guidance related to the preparation of vulnerability assessments 
required under the Bioterrorism Act calls for community water systems 
to include, among other things, a plan for risk reduction in their 
vulnerability assessments. 

[E] This act, as implemented, generally applies to maritime facilities 
in proximity to navigable waters including facilities that handle 
explosive or other dangerous cargos, liquefied natural gas or liquefied 
hazardous gas, or transfer oil or other hazardous materials; facilities 
that receive vessels certified to carry more than 150 passengers; 
facilities that receive certain passenger and cargo ships engaged in 
international voyages; facilities that receive certain foreign cargo 
vessels; and commercial barge fleeting facilities. 

[End of table]

In February 2005, DHS released its Interim National Infrastructure 
Protection Plan, whose purpose is to "prioritize protection across 
[infrastructure] sectors, so that resources are applied where they 
offer the most benefit for reducing vulnerability, deterring threats, 
and minimizing consequences of attacks." Because we just recently 
received the plan, we have not fully evaluated it. However, the plan 
outlines (1) a risk management framework to guide future efforts to 
identify and protect critical physical infrastructure and (2) the roles 
of federal, state, local, tribal, and private agencies and entities in 
implementing this framework. 

Under this approach, risks are to be managed in response to (1) 
specific threats and (2) plausible threats. Specific threats are 
situations where there is intelligence regarding targeted locations, 
sectors, or assets, or when there is suspected activity by groups known 
to favor attacks on certain types of assets. The likelihood of the 
threat would drive short-term protective measures. Plausible threats 
are those "that could logically occur and that would have negative 
consequences on a particular asset." Plausible threats are treated as 
if all are equally likely to occur--that is, they result from the 
general threat environment. Thus, plausible threats focus protective 
efforts on the inherent vulnerabilities of different assets and the 
potential consequences of an attack, rather than the likelihood of a 
particular event. 

The plan also outlines the roles and responsibilities of federal, 
state, local, and tribal agencies, and the private sector using 
elements of a risk management framework. The federal government's role 
would include setting standards for identifying critical assets, 
assessing the most critical assets, developing consistent approaches 
and tools for identifying and assessing vulnerabilities, analyzing and 
disseminating threat information, promoting cross-sector best 
practices, tracking program implementation, and reporting on the 
national status of infrastructure assessment and protection. The role 
of state, local, and tribal agencies would include helping to identify 
assets, conducting and sharing assessments with the federal government, 
supplementing private sector capabilities in response to threats, 
developing state or local level strategies and best practices, and 
tracking performance where applicable. The private sector would play a 
role similar to that of state, local, and tribal agencies plus help to 
develop incentive programs for private entities. 

Officials at Chemical Facilities and Water Systems We Visited Agreed in 
Part about What the Federal Government's Role Should Be: 

Operators of 4 of the 10 chemical manufacturing facilities and seven of 
the eight community water systems we visited agreed that the federal 
role in protecting their facilities should include the transmittal of 
threat information. As we previously reported, to effectively 
communicate risks, experts suggest that threat information should be 
consistent, accurate, clear, and provided repeatedly through multiple 
methods; it should be provided in a timely fashion; and to the greatest 
extent possible, it should be specific about the potential 
threat.[Footnote 32]

Officials representing the chemical facilities and community water 
systems we visited had fundamentally different views on other roles for 
the federal government. Officials representing 8 of the 10 chemical 
facilities we visited expressed the view that the federal government 
should introduce regulations and standards comparable to the 
Responsible Care® Security Code for the entire chemical sector to 
follow. Officials representing 3 of these facilities stated that those 
facilities that do not adhere to the Responsible Care® Security Code 
may have a competitive advantage over those facilities that do adhere 
to the code. 

In comparison, only one of the eight water system operators we spoke 
with suggested the need for additional federal regulation. Rather, 
officials at four community water systems said they would like the 
federal government to establish security standards to guide actions for 
the water sector. Officials representing seven of the community water 
systems we visited said that they would like the federal government to 
expand support for security enhancements in the water sector by 
providing funding designated for community water systems. Moreover, 
officials at six of the community water systems we met with suggested 
that the federal government consistently emphasize the need for 
security for the sector and provide technical guidance on security 
planning. However, officials at four of the community water systems we 
met with said that they would prefer the federal government to refrain 
from issuing unfunded mandates. These officials elaborated that funding 
currently provided by the federal government was not sufficient to 
support federal requirements that the water companies complete 
vulnerability assessments. For example, officials at one large 
community water system said that their system received an EPA grant 
that offset approximately 7 percent of the cost it incurred to perform 
its mandated vulnerability assessment.[Footnote 33]

The U.S. Coast Guard Completed Its Compliance Inspections and Plans to 
Review the Effectiveness of the Process: 

The U.S. Coast Guard has found that the vast majority, approximately 97 
percent, of maritime facility owners or operators are meeting MTSA 
requirements. The Coast Guard reported completing compliance 
inspections at all 2,924 regulated facilities by December 31, 2004, 
resulting in 312 enforcement actions and operational controls imposed 
on 29 facilities. The Coast Guard reported taking these 312 enforcement 
actions against 98 facility owners or operators for violations. The 
most frequently cited deficiencies related to insufficient access 
controls; noncompliance by the owner or operator to ensure that the 
facility is operating in compliance with its facility's security 
requirements; noncompliance with facility security officer 
requirements, such as possessing the required security knowledge or 
carrying out all duties as assigned; and insufficient security measures 
for restricted areas. The Coast Guard's enforcement actions included 
issuing letters of warning or assessing monetary penalties for 
noncompliance. See appendix IV for more details on these enforcement 
actions. In addition to taking enforcement actions, the Coast Guard 
imposed operational controls, such as suspending certain facility 
operations, on 29 MTSA regulated facilities between July 1, 2004, and 
December 31, 2004, for identified deficiencies. 

The Coast Guard has taken some actions to facilitate the effectiveness 
of its compliance inspection program for MTSA-regulated facilities, but 
it has not yet determined the overall effectiveness of the program. 
Some of the actions taken by the Coast Guard include conducting 
unscheduled spot checks in addition to scheduled inspections, 
developing detailed checklists for the inspectors to use during 
facility inspections, conducting reviews at both the local and national 
levels of the enforcement actions taken by the inspectors, and 
providing training for inspectors. However, Coast Guard officials said 
that because their priority was to complete the initial compliance 
inspections by December 31, 2004, they have not completed an evaluation 
of the effectiveness of the compliance actions for lessons learned that 
could be used to improve the inspection program in the future. The 
Coast Guard said that now that the initial surge of inspections has 
been completed, it plans to begin a systematic effort to evaluate the 
effectiveness of the compliance inspection program. 

The Marine Safety Offices we visited also reported that evaluations of 
their compliance efforts have not yet been completed at the local 
level. Officials at these Marine Safety Offices stated that they 
anticipate taking a closer look at the results of the initial 
inspections to determine what improvements to make. Some of the 
measures they mentioned as ways to track the effectiveness of their 
compliance inspection activities included the recurrence of 
deficiencies previously identified during initial inspections or spot 
checks, the number of deficiencies identified during inspections or 
spot checks, and an index that tracks a facility's level of risk. In 
June 2004, we issued a report on the status of the Coast Guard's 
strategy for monitoring and overseeing the implementation requirements 
of MTSA. At that time, we recommended that the Coast Guard evaluate its 
initial compliance inspection efforts upon completion and use the 
results to strengthen the compliance process for its long-term 
strategy, clearly define inspector qualifications, and consider 
including unscheduled and unannounced inspections and covert 
testing.[Footnote 34] The Coast Guard agreed with this recommendation. 

Agency Comments: 

We provided a draft of this report to DHS and EPA for review and 
comment. DHS provided formal written comments on a draft of this report 
on March 16, 2005, which are presented in appendix VI. In commenting on 
the draft report, DHS noted that it generally concurred with the 
report's contents and that the report presented generally valuable and 
useful information. DHS observed that the report did not mention 
efforts currently under way to improve government and private sector 
infrastructure protection coordination efforts through the formation of 
Government Coordinating Councils and Sector Coordinating Councils. We 
revised our report to include a discussion of the chemical and water 
sector Government Coordinating Councils and Sector Coordinating 
Councils. We are currently conducting another review of chemical 
facility security for the Subcommittee on National Security, Emerging 
Threats, and International Relations, House Committee on Government 
Reform, and are focusing on actions that DHS and other federal agencies 
have taken to improve chemical facilities' security. As part of this 
review, we are identifying the efforts taken by the Chemical Sector 
Coordinating Council and the related Government Coordinating Council 
and will report on these issues at a later date. 

EPA did not submit a formal letter but did provide comments. The 
comments expressed general agreement with the contents of the report. 
We also provided excerpts from our draft report to ACC, SOCMA, AMWA, 
NAWC, and NRWA for review and comment. DHS, EPA, ACC, SOCMA, and NAWC 
also offered specific technical comments and suggestions, which have 
been incorporated as appropriate. 

We plan no further distribution of this report until seven days after 
the date of this report. At that time, we will send copies of this 
report to the Senate Committee on Homeland Security and Governmental 
Affairs; Chairman, Subcommittee on Homeland Security, Senate Committee 
on Appropriations; House Committee on Government Reform; House 
Committee on Homeland Security; Subcommittee on Homeland Security, 
House Committee on Appropriations; the Secretary of Homeland Security, 
the Administrator of EPA, the Director, Office of Management and Budget 
and other interested parties. We will also make copies available to 
others on request. 

In addition, this report will be available on GAO's Web site at 
http://www.gao.gov. If you or your staff have any questions about this 
report, please contact me at (202) 512-8777 or by e-mail at 
jenkinswo@gao.gov or Debra Sebastian at (202) 512-9385 or by e-mail at 
sebastiand@gao.gov. GAO contacts and staff acknowledgments are listed 
in appendix VII. 

Sincerely yours,

Signed by: 

William O. Jenkins, Jr.: 

Director, Homeland Security and Justice Issues: 

[End of section]

Appendix I: Scope and Methodology: 

To determine federal security requirements for the chemical and water 
sectors and the efforts taken by the federal government to facilitate 
private sector protection of its critical assets, we met with 
Department of Homeland Security (DHS) and Environmental Protection 
Agency (EPA) officials, as well as representatives from the American 
Chemistry Council (ACC), the Synthetic Organic Chemical Manufacturers 
Association (SOCMA), the American Metropolitan Water Association 
(AMWA), 10 chemical facilities and 8 community water systems (the 
criteria used to select these facilities and systems are described 
below). We also obtained information from the National Association of 
Water Companies (NAWC) and the National Rural Water Association (NRWA). 
In addition, we reviewed pertinent federal legislation and implementing 
regulations and agency guidance on facility security for these sectors. 

To determine actions officials in the chemical sector reported taking 
to enhance security of their facilities since September 11, the 
obstacles they faced in making such enhancements, and their perceptions 
of the role of the federal government in securing chemical facilities, 
we met with officials from ACC and SOCMA, and with officials from 10 
chemical manufacturing facilities. We selected these facilities from 
those operated by members of ACC or SOCMA. To ensure that the 
facilities we visited were at greatest risk, and hence had the greatest 
need for security, we generally selected facilities from which a 
chemical release, stemming from an attack, would have a severe impact 
on surrounding communities. To assist us in selecting these facilities, 
we relied upon assessments completed by ACC and SOCMA members regarding 
the impact of a potential chemical release at its facilities. The 
facilities we selected produce petrochemicals, building block 
chemicals,[Footnote 35] inorganic chemicals, plastics, and industrial 
gases. We also selected chemical facilities that were regulated by the 
Coast Guard under the Maritime Transportation Security Act (MTSA) and 
facilities that were not regulated to observe differences among these 
types of facilities. All facilities we selected were ACC or SOCMA 
members that volunteered to meet with us. We used a structured 
interview guide when questioning officials during our visits to these 
facilities. We did not verify that the security enhancements reported 
to us by the chemical facilities were actually taken. In conducting our 
work on the chemical sector, we focused on actions taken to strengthen 
security at a selected facility. We did not address actions taken by 
facility personnel to protect the transport of chemicals from the 
facility to other locations by way of various transport mechanisms such 
as rail cars or tank trucks nor did we address actions taken by 
facility personnel to prevent the sale of hazardous chemicals to 
terrorists masquerading as bona fide customers. 

To determine actions the water sector officials reported taking to 
enhance security of their facilities since September 11, the obstacles 
they faced in making such enhancements, and their perceptions of the 
role of the federal government in securing community water facilities, 
we met with officials from the AMWA and with operators of eight 
community water systems.[Footnote 36] We also obtained information from 
NAWC and NRWA. We selected systems from those that were regulated under 
the Bioterrorism Act--a federal law that addresses security matters 
with respect to community water systems. Three of the systems we 
selected were privately owned systems and five were publicly owned 
systems. For the publicly owned systems, we varied our selection to 
include systems that served a range of population sizes. Specifically, 
we selected three systems from those that served 100,000 or more 
people, one from those that served 50,000 to 99,999 people, and one 
from those that served 3,301 to 49,999 people. For the private sector 
systems, we selected one system that served approximately 3,500 people 
and two that served 100,000 or more.[Footnote 37] In conducting our 
work in this area, we focused on water supply systems rather than 
wastewater treatment systems.[Footnote 38] We did not verify that the 
security enhancements reported to us by the water systems were actually 
taken. While we were in the process of determining which community 
water systems to select, three systems contacted us and volunteered to 
participate in our study. Because they met our criteria, we included 
these systems as part of our selection. We used a structured interview 
guide when questioning officials during our visits to these systems. 

We are not disclosing the names or other identifying information 
relating to the individual chemical companies, facilities, or community 
water systems to ensure that security-related information is not 
unintentionally disclosed. Because we limited our review to 10 chemical 
facilities and 8 community water systems, the comments discussed in 
this report are illustrative, are not statistically representative of 
the chemical and water sectors, and should not be considered to 
represent the views of the sectors as a whole. 

To determine the extent to which the chemical and water sectors' 
actions reflected a risk management approach, we reviewed provisions of 
the Responsible Care® Security Code, the Bioterrorism Act, and MTSA 
that the chemical and water sectors are to follow. We then compared 
these provisions with elements of a risk management framework to 
determine which elements the sectors have incorporated and to identify 
those elements that were missing.[Footnote 39]

To determine the results of the Coast Guard's compliance inspection 
program, we reviewed Coast Guard documents, such as inspection 
guidance, facility inspector checklists, and navigation and vessel 
information circulars regarding the procedures used to conduct the 
compliance inspections and the enforcement actions and operational 
controls available to the Coast Guard to address any deficiencies found 
during the inspection process. We also analyzed national compliance 
data provided by Coast Guard from its Marine Information for Safety and 
Law Enforcement (MISLE). To assess the reliability of these data, we 
examined the data for obvious errors and inconsistencies, reviewed 
existing documentation about their system and data, and examined 
responses the Coast Guard provided to a questionnaire we sent it 
requesting information on the administration and oversight of the 
system. We determined the compliance data to be sufficiently reliable 
as general indicators of the results of the Coast Guard's inspection 
program. 

To determine what actions the Coast Guard reported taking agencywide to 
ensure the effectiveness of the inspection program, we interviewed 
Coast Guard officials at headquarters with responsibilities for the 
compliance inspection process. To supplement this national-level 
perspective, we visited five local Coast Guard offices in locations 
that reflected diversity in strategic importance, geographic location, 
and local characteristics. The offices we visited were located in 
Charleston, South Carolina; Huntington, West Virginia; New Orleans, 
Louisiana; Houston, Texas; and Seattle, Washington. We conducted our 
work from October 2004 through March 2005 in accordance with generally 
accepted government auditing standards. 

[End of section]

Appendix II: Number of Community Water Systems: 

The Safe Drinking Water Information System is EPA's national database 
of public drinking water systems. Information from this system, 
presented in table 3, provides information on the number of community 
water systems in place during fiscal year 2004 by population service 
category and ownership. 

Table 3: Number of Community Water Systems by Ownership and Population 
Service Category for Fiscal Year 2004: 

Ownership: Private; 
Size of population served: 100 or less: 11,484; 
Size of population served: 101-500: 9,995; 
Size of population served: 501-3,300: 3,480; 
Size of population served: 3,301-10,000: 569; 
Size of population served: 10,001-50,000: 331; 
Size of population served: 50,001-100,000: 66; 
Size of population served: 100,001-500,000: 43; 
Size of population served: Over 500,000: 9; 
All sizes: 25,977. 

Ownership: Public; 
Size of population served: 100 or less: 2,025; 
Size of population served: 101-500: 6,010; 
Size of population served: 501- 3,300: 10,501; 
Size of population served: 3,301-10,000: 3,986; 
Size of population served: 10,001-50,000: 2,623; 
Size of population served: 50,001-100,000: 413; 
Size of population served: 100,001-500,000: 279; 
Size of population served: Over 500,000: 40; 
All sizes: 25,877. 

Ownership: Unknown; 
Size of population served: 100 or less: 257; 
Size of population served: 101-500: 235; 
Size of population served: 501- 3,300: 231; 
Size of population served: 3,301-10,000: 152; 
Size of population served: 10,001-50,000: 103; 
Size of population served: 50,001-100,000: 5; 
Size of population served: 100,001-500,000: 0; 
Size of population served: Over 500,000: 1; 
All sizes: 984. 

Total; 
Size of population served: 100 or less: 13,766; 
Size of population served: 101-500: 16,240; 
Size of population served: 501- 3,300: 14,212; 
Size of population served: 3,301-10,000: 4,707; 
Size of population served: 10,001-50,000: 3,057; 
Size of population served: 50,001-100,000: 484; 
Size of population served: 100,001-500,000: 322; 
Size of population served: Over 500,000: 50; 
All sizes: 52,838. 

Source: U.S. Environmental Protection Agency's Safe Drinking Water 
Information System. 

Note: The information in this chart is presented to provide context on 
the number of community water systems in the United States. GAO has not 
verified this data. 

[End of table]

As reflected in the table, ownership of these systems is evenly split; 
about half are publicly owned and about half are privately owned. EPA 
does not have data on the ownership of approximately 2 percent, or 984, 
of these systems. 

[End of section]

Appendix III: Chemical Industry Trade Associations' Implementation of 
the Responsible Care® Security Code: 

The Responsible Care® Security Code calls for ACC's approximate 140 
member companies to perform security vulnerability assessments of their 
approximately 2,000 facilities, develop and implement plans to mitigate 
the vulnerabilities, and obtain third-party verification that the 
planned physical security enhancements were completed. The Security 
Code sets milestones for facilities to complete these steps based on 
the level of potential impact a chemical release stemming from a 
facility would have on surrounding communities. ACC members assigned 
their facilities to "tiers" based on their assessment of this level of 
impact. A chemical release stemming from tier 1 facilities could have 
the greatest impact on surrounding communities, whereas a chemical 
release from tier 4 facilities would have no significant off-site 
impacts. The milestones for completion of these steps by each tier 
facility are depicted in table 4 below. ACC members operate 
approximately 100 tier 1 facilities, 350 tier 2 facilities, 550 tier 3 
facilities, and 1,000 tier 4 facilities. Approximately 1,000 of ACC's 
facilities are among the 15,000 facilities--including, chemical, water, 
energy, and other sector facilities--that produce, use, or store more 
than threshold amounts of chemicals that EPA has estimated pose the 
greatest risk to human health and the environment. 

Table 4: Responsible Care® Security Code Deadlines for ACC Facilities: 

Actions required under the Responsible Care® Security Code: Complete 
facility security vulnerability assessment; 
Tier 1: 12/31/02; 
Tier 2: 6/30/03; 
Tier 3: 12/31/03; 
Tier 4: 12/31/03. 

Actions required under the Responsible Care® Security Code: Complete 
implementation of facility security enhancements; 
Tier 1: 12/31/03; 
Tier 2: 6/30/04; 
Tier 3: 12/31/04; 
Tier 4: 12/31/04. 

Actions required under the Responsible Care® Security Code: Complete 
third-party verification of physical security enhancements; 
Tier 1: 3/31/04; 
Tier 2: 9/30/04; 
Tier 3: 3/31/05; 
Tier 4: [A]. 

Source: American Chemistry Council. 

[A] Because tier 4 facilities do not have potential significant off- 
site consequences, third-party verification is not required. 

[End of table]

ACC reported that as of May 2004, all of its 2,000 facilities have 
completed security vulnerability assessments. ACC does not require its 
member companies to report the status of security enhancements until 
they report completion of third-party verification. ACC told us that 
based on the verification reports its members submitted, all tier 1 
facilities have completed their security enhancements and their third- 
party verifications. Additionally, ACC told us that approximately 90 
percent of its members, with tier 2 facilities have completed security 
enhancements and the enhancements have been verified. As of March 7, 
2005, 10 percent of ACC member companies are still working to complete 
their tier 2 verification requirements. ACC told us that it is in 
contact with these companies to provide any needed assistance, to 
monitor progress, and to ensure completion of these requirements as 
soon as possible. 

SOCMA's 160 members also follow the provisions of the Responsible Care® 
Security Code. As members, they are expected to perform security 
vulnerability assessments of their facilities, develop and implement 
plans to mitigate the vulnerabilities found in the assessments, and 
obtain third-party verification that the planned physical security 
enhancements were completed. Thirty-six of SOCMA's member companies are 
also members of ACC and follow the Responsible Care® Security Code and 
related milestones as administered by ACC. The remaining 124 SOCMA 
companies are responsible for implementing the Responsible Care® 
Security Code under a SOCMA-established timetable as presented in table 
5. These 124 companies operate 273 facilities--of which 77 are among 
the 15,000 facilities--including, chemical, water, energy, and other 
sector facilities--that produce, use, or store more than threshold 
amounts of chemicals that EPA has estimated pose the greatest risk to 
human health and the environment in the event of a release (risk 
management plan, or RMP, facilities). 

Table 5: Responsible Care® Security Code Deadlines for SOCMA 
Facilities: 

Actions required under the Responsible Care® Security Code: Complete 
facility security vulnerability assessment; 
RMP facilities: 6/30/03; 
Non-RMP facilities: 12/31/03. 

Actions required under the Responsible Care® Security Code: Complete 
Implementation of facility security enhancements; 
RMP facilities: 12/31/04; 
Non-RMP facilities: 12/31/04. 

Actions required under the Responsible Care® Security Code: Complete 
verification of enhancements; 
RMP facilities: 3/31/05; 
Non-RMP facilities: [A]. 

Source: Synthetic Organic Chemical Manufacturers Association. 

[A] Non-RMP facilities are not required to have third-party 
verification. 

[End of table]

SOCMA officials told us that all of its member companies have reported 
completing vulnerability assessments at their 273 facilities. SOCMA 
also reports that 98 percent of these member companies reported 
completing implementation of security enhancements at their facilities. 

[End of section]

Appendix IV: Enforcement Actions Taken by the Coast Guard against MTSA- 
Regulated Facilities: 

The type of enforcement action the Coast Guard takes against maritime 
facilities for noncompliance with MTSA regulations depends on the type 
of deficiencies, the severity of the deficiencies, and the number of 
times a given facility has been cited for a deficiency. The enforcement 
actions taken by the Coast Guard against facility owners or operators 
include: 

* Letter of warning: A letter of warning is issued for deficiencies 
that can usually be immediately corrected but are severe enough to 
warrant documentation of noncompliance. A letter of warning can also be 
issued when the Coast Guard has previously informed a facility owner or 
operator of a less severe deficiency and the owner or operator has not 
yet addressed the deficiency upon a subsequent Coast Guard visit or 
spot check. Letters of warning document the deficiencies so that the 
Coast Guard has a case file in the event a more severe penalty is 
needed in the future to enforce compliance. 

* Notice of violation: A notice of violation is issued when the 
deficiency requires additional investigation and a monetary penalty or 
when the Coast Guard has previously issued a letter of warning for the 
same deficiency but the facility owner or operator has not yet 
addressed the deficiency. With a notice of violation, the inspector 
issues a citation that provides the facility owner or operator 
immediate notification of the alleged violations and the penalty amount 
proposed by the Coast Guard. The owner or operator has the option of 
accepting the notice and paying the penalty amount or can decline the 
notice. If the owner or operator decides to decline, the case becomes a 
standard civil penalty (see below for explanation). 

* Civil penalty: A civil penalty is used when a facility has several 
instances of noncompliance with the regulations. Typically initiated by 
a local Coast Guard unit, the civil penalty is submitted to the Coast 
Guard Hearing Office to determine if there is sufficient evidence to 
support the charges. Once the owner or operator has had an opportunity 
to respond to the charges, the Hearing Office issues its finding and 
the penalty, if any, is imposed on the owner or operator. The owner or 
operator may then appeal the decision to the Coast Guard Commandant. 

The consequences are essentially the same for notices of violation as 
for standard civil penalty cases, because in both situations the Coast 
Guard assesses a civil penalty that becomes part of a facility owner or 
operator's violation history. The primary difference lies in the 
severity of the sanction, with the proposed penalty amounts for notices 
of violation generally lower than the recommended penalty levels for 
standard civil penalty cases. In addition, the Coast Guard will not 
issue a notice of violation for more than $10,000, whereas the maximum 
civil penalty amount allowed by MTSA is $25,000 for each violation, 
using the regular civil penalty process. 

Table 6 shows the number of enforcement actions the Coast Guard 
reported taking against owners or operators of maritime facilities 
between July 1, 2004, and December 31, 2004, for noncompliance with 
MTSA regulations to implement their security plans. The specific 
regulatory cite topics in the table are listed in descending order of 
the total number of enforcement actions taken. 

Table 6: Enforcement Actions Taken between July 1, 2004, and December 
31, 2004, by Regulatory Citation Topic: 

Citation: 33 CFR 105.255; 
Description of area of noncompliance: Security measures for access 
control; 
Number of enforcement actions taken: 89. 

Citation: 33 CFR 105.200; 
Description of area of noncompliance: Failure of facility owner or 
operator to ensure the facility operates in compliance with security 
requirements; 
Number of enforcement actions taken: 38. 

Citation: 33 CFR 105.205; 
Description of area of noncompliance: Facility Security Officer 
requirements; 
Number of enforcement actions taken: 34. 

Citation: 33 CFR 105.260; 
Description of area of noncompliance: Security measures for restricted 
areas; 
Number of enforcement actions taken: 31. 

Citation: 33 CFR 105.225; 
Description of area of noncompliance: Failure of facility owner or 
operator to make the required records available to the Coast Guard; 
Number of enforcement actions taken: 20. 

Citation: 33 CFR 105.405; 
Description of area of noncompliance: Failure to ensure proper format 
and content of the Facility Security Plan; 
Number of enforcement actions taken: 13. 

Citation: 33 CFR 105.210; 
Description of area of noncompliance: Facility personnel with security 
duties; 
Number of enforcement actions taken: 11. 

Citation: 33 CFR 105.125; 
Description of area of noncompliance: Failure of facility owner or 
operator to notify cognizant Captain of the Port of temporary 
deviations; 
Number of enforcement actions taken: 9. 

Citation: 33 CFR 105.275; 
Description of area of noncompliance: Failure to implement security 
measures for monitoring as specified in the Facility Security Plan; 
Number of enforcement actions taken: 9. 

Citation: 33 CFR 105.265; 
Description of area of noncompliance: Failure to implement security 
measures for handling cargo; 
Number of enforcement actions taken: 8. 

Citation: 33 CFR 105.245; 
Description of area of noncompliance: Failure of a facility owner or 
operator to complete Declaration of Security; 
Number of enforcement actions taken: 7. 

Citation: 33 CFR 105.235; 
Description of area of noncompliance: Failure to meet facility 
communications requirements; 
Number of enforcement actions taken: 6. 

Citation: 33 CFR 105.215; 
Description of area of noncompliance: Security training for all other 
facility personnel; 
Number of enforcement actions taken: 6. 

Citation: 33 CFR 105.250; 
Description of area of noncompliance: Failure to meet security systems 
and equipment maintenance requirements; 
Number of enforcement actions taken: 5. 

Citation: 33 CFR 105.270; 
Description of area of noncompliance: Failure to implement security 
measures for delivery of vessel stores and bunkers; 
Number of enforcement actions taken: 5. 

Citation: 33 CFR 105.220; 
Description of area of noncompliance: Failure of facility owner or 
operator to meet security drill requirements; 
Number of enforcement actions taken: 4. 

Citation: 33 CFR 105.285; 
Description of area of noncompliance: Failure to meet additional 
requirements for passenger and ferry facilities; 
Number of enforcement actions taken: 4. 

Citation: 33 CFR 105.400; 
Description of area of noncompliance: Failure to develop and implement 
a Facility Security Plan; 
Number of enforcement actions taken: 4. 

Citation: 33 CFR 105.120; 
Description of area of noncompliance: Failure to provide compliance 
documentation; 
Number of enforcement actions taken: 2. 

Citation: 33 CFR 105.295; 
Description of area of noncompliance: Failure to meet additional 
requirements for Certain Dangerous Cargo (CDC) facilities; 
Number of enforcement actions taken: 2. 

Citation: 33 CFR 105.140; 
Description of area of noncompliance: Alternative Security Program; 
Number of enforcement actions taken: 1. 

Citation: 33 CFR 105.230; 
Description of area of noncompliance: Maritime Security (MARSEC) Level 
coordination and implementation; 
Number of enforcement actions taken: 1. 

Citation: 33 CFR 105.240; 
Description of area of noncompliance: Procedures for interfacing with 
vessels; 
Number of enforcement actions taken: 1. 

Citation: 33 CFR 105.290; 
Description of area of noncompliance: Failure to meet additional 
requirements for cruise ship terminals; 
Number of enforcement actions taken: 1. 

Citation: 33 CFR 105.305; 
Description of area of noncompliance: Failure of facility owner or 
operator to conduct a Facility Security Assessment; 
Number of enforcement actions taken: 1. 

Total; 
Number of enforcement actions taken: 312. 

Source: Coast Guard. 

[End of table]

[End of section]

Appendix V: Acknowledgments of Agency and Private Sector Contributors: 

We would like to acknowledge the time and effort made by federal 
agencies, trade associations, and security directors and other 
officials representing the chemical facilities, community water 
systems, and marine safety offices that provided information and talked 
with us during our site visits. 

Federal Agencies: 

* Department of Homeland Security: 

* Environmental Protection Agency: 

Trade Associations: 

American Chemistry Council: 
Synthetic Organic Chemical Manufactures Association: 
Association of Metropolitan Water Agencies: 
National Association of Water Companies: 
National Rural Water Association: 

[End of section]

Appendix VI: Comments from the Department of Homeland Security: 

U.S. Department of Homeland Security: 
Washington, DC 20528:

March 16, 2005:

Mr. William O. Jenkins:
Director, Homeland Security and Justice Issues: 
Government Accountability Office: 
Washington, DC 20548:

Dear Mr. Jenkins:

Re: Draft Report GAO-05-327, Protection of Chemical and Water 
Infrastructure: Federal Requirements, Actions of Selected Facilities, 
and Remaining Challenges (GAO Job Code 440362):

Thank you for the opportunity to review your draft report. We concur 
with the purpose of the report and generally concur with its contents. 
Your report effectively discusses many of the regulatory and difficult 
financial challenges facing the chemical and water sectors in 
strengthening the security of their infrastructures. 

Any such report can only represent a snapshot in time. In that context, 
it is understandable that the report does not fully reflect all the 
activities currently ongoing in this area. For example, the report does 
not mention the efforts currently underway to improve government and 
private sector infrastructure protection coordination efforts through 
the formation of Government Coordinating Councils and Sector 
Coordinating Councils. The report also notes that GAO did not have time 
to fully evaluate the Interim National Infrastructure Protection Plan 
(NIPP). DHS agrees that a rigorous risk management approach is central 
to an effective infrastructure protection program and believes that the 
NIPP lays out an effective risk management framework. These 
observations do not alter our view that the report presents generally 
valuable and useful information. 

A technical comment will be sent under separate cover. We thank you 
again for the opportunity to review the report and provide comments. 

Sincerely,

Signed by: 

Steven J. Pecinovsky: 
Acting Director, Departmental GAO/OIG Liaison Office: 

[End of section]

Appendix VII: GAO Contacts and Staff Acknowledgments: 

GAO Contacts: 

William O. Jenkins, Jr. (202) 512-8777; 
Debra B. Sebastian (202) 512- 9385: 

Acknowledgments: 

In addition to the individuals named above, David P. Alexander, 
Jonathan T. Bachman, Fredrick D. Berry, Beatriz Cuartas, Grace A. 
Coleman, Dorian R. Dunbar, Michele C. Fejfar, Geoffrey R. Hamilton, 
Christopher Hatscher, Sara R. Margraf, and Diane B. Raynes made key 
contributions to this report. 

[End of section]

Related GAO Products: 

High-Risk Series: An Update. GAO-05-207. Washington, D.C. January 1, 
2005. 

Wastewater Facilities: Experts' Views on How Future Federal Funds 
Should Be Spent to Improve Security. GAO-05-165. Washington, D.C.: 
January 31, 2005. 

Homeland Security: Agency Plans, Implementation, and Challenges 
Regarding the National Strategy for Homeland Security. GAO-05-33. 
Washington, D.C.: January 14, 2005. 

Drinking Water: Experts' Views on How Federal Funding Can Best Be Spent 
to Improve Security. GAO-04-1098T. Washington, D.C.: September 30, 
2004. 

Public Key Infrastructure: Examples of Risks and Internal Control 
Objectives Associated with Certification Authorities. GAO-04-1023R. 
Washington, D.C.: August 10, 2004. 

Maritime Security: Substantial Work Remains to Translate New Planning 
Requirements into Effective Port Security. GAO-04-838. Washington, 
D.C.: June 30, 2004. 

Critical Infrastructure Protection: Improving Information Sharing with 
Infrastructure Sectors. GAO-04-780. Washington, D.C.: July 9, 2004. 

Critical Infrastructure Protection: Establishing Effective Information 
Sharing with Infrastructure Sectors. GAO-04-699T. Washington, D.C.: 
April 21, 2004. 

Critical Infrastructure Protection: Challenges and Efforts to Secure 
Control Systems. GAO-04-628T. Washington, D.C.: March 30, 2004. 

Rail Security: Some Actions Taken to Enhance Passenger and Freight Rail 
Security, but Significant Challenges Remain. GAO-04-598T. Washington, 
D.C.: March 23, 2004. 

Homeland Security: Summary of Challenges Faced in Targeting Oceangoing 
Cargo Containers for Inspection. GAO-04-557T. Washington, D.C.: March 
31, 2004. 

Homeland Security: Federal Action Needed to Address Security Challenges 
at Chemical Facilities. GAO-04-482T. Washington, D.C.: February 23, 
2004. 

Critical Infrastructure Protection: Challenges and Efforts to Secure 
Control Systems.GAO-04-354. Washington, D.C.: March 15, 2004. 

Technology Assessment: Cybersecurity for Critical Infrastructure 
Protection. GAO-04-321. Washington, D.C.: May 28, 2004. 

Terrorism Insurance: Implementation of the Terrorism Risk Insurance Act 
of 2002. GAO-04-307. Washington, D.C.: April 23, 2004. 

Posthearing Questions from the September 17, 2003, Hearing on 
Implications of Power Blackouts for the Nation's Cybersecurity and 
Critical Infrastructure Protection: The Electric Grid, Critical 
Interdependencies, Vulnerabilities, and Readiness. GAO-04-300R. 
Washington, D.C.: December 8, 2003. 

Drinking Water: Experts' Views on How Future Federal Funding Can Best 
Be Spent to Improve Security. GAO-04-29. Washington, D.C.: October 31, 
2003. 

Critical Infrastructure Protection: Challenges in Securing Control 
Systems. GAO-04-140T. Washington, D.C.: October 1, 2003. 

Information Security: Progress Made, but Challenges Remain to Protect 
Federal Systems and the Nation's Critical Infrastructures. GAO-03-564T. 
Washington, D.C.: April 8, 2003. 

Homeland Security: EPA's Management of Clean Air Act Chemical Facility 
Data. GAO-03-509R. Washington, D.C.: March 14, 2003. 

Transportation Security Research: Coordination Needed in Selecting and 
Implementing Infrastructure Vulnerability Assessments.GAO-03-502. 
Washington, D.C.: May 1, 2003. 

Homeland Security: Voluntary Initiatives Are Under Way at Chemical 
Facilities, but the Extent of Security Preparedness Is Unknown. GAO-03- 
439. Washington, D.C.: March 14, 2003. 

Critical Infrastructure Protection: Challenges for Selected Agencies 
and Industry Sectors. GAO-03-233. Washington, D.C.: February 28, 2003. 

Critical Infrastructure Protection: Efforts of the Financial Services 
Sector to Address Cyber Threats. GAO-03-173. Washington, D.C.: January 
30, 2003. 

High-Risk Series: Protecting Information Systems Supporting the Federal 
Government and the Nation's Critical Infrastructures. GAO-03-121. 
Washington, D.C.: January 1, 2003. 

Homeland Security: Department of Justice's Response to Its 
Congressional Mandate to Assess and Report on Chemical Industry 
Vulnerabilities. GAO-03-24R. Washington, D.C.: October 10, 2002. 

Critical Infrastructure Protection: Significant Challenges Need to Be 
Addressed. GAO-02-961T. Washington, D.C.: July 24, 2002. 

Critical Infrastructure Protection: Significant Homeland Security 
Challenges Need to Be Addressed. GAO-02-918T. Washington, D.C.: July 9, 
2002. 

Chemical Safety: Emergency Response Community Views on the Adequacy of 
Federally Required Chemical Information. GAO-02-799. Washington, D.C.: 
July 31, 2002. 

Critical Infrastructure Protection: Federal Efforts Require a More 
Coordinated and Comprehensive Approach for Protecting Information 
Systems. GAO-02-474. Washington, D.C.: July 15, 2002. 

Homeland Security: A Risk Management Approach Can Guide Preparedness 
Efforts, GAO-02-208T. Washington, D.C.: October 31, 2001. 

Key Elements of a Risk Management Approach. GAO-02-150T. Washington, 
D.C.: Oct. 12, 2001. 

Critical Infrastructure Protection: Significant Challenges in 
Safeguarding Government and Privately Controlled Systems from Computer- 
Based Attacks. GAO-01-1168T. Washington, D.C.: September 26, 2001. 

FOOTNOTES

[1] Uniting and Strengthening America by Providing Appropriate Tools 
Required to Intercept and Obstruct Terrorism Act of 2001, Pub. L. No. 
107-56, 115 Stat. 272, 401 (2001). 

[2] Pub. L. No. 107-295, 116 Stat. 2064 (2002). According to the Coast 
Guard, 238 MTSA-regulated maritime facilities handle "bulk liquid 
chemicals."

[3] The ACC is a trade association that represents approximately 140 
companies that operate approximately 2,000 facilities that encompass 
more than 85 percent of the productive capacity for the manufacture of 
basic chemicals in the United States. SOCMA is a trade association that 
represents approximately 160 companies that manufacture specialty or 
custom chemicals in the United States. Thirty-six of SOCMA's member 
companies are also members of the ACC. The remaining 124 SOCMA members 
operate 273 facilities in the United States. Both associations require 
their members to abide by the Responsible Care® Security Code, which 
lays out a process for facility operators to help secure against the 
threat of terrorism. ACC has also lobbied Congress regarding the need 
for federal regulation for chemical plant security. 

[4] AMWA has nearly 200 member agencies that collectively serve 120 
million Americans. AMWA functions as the voice for the largest publicly 
owned drinking water systems on regulatory, legislative, and security 
issues. 

[5] NAWC is the only national trade association representing the 
private and investor-owned water utility industry that provides 
drinking water to 22 million Americans. NAWC serves as a mechanism for 
its members to respond to federal legislative and state regulatory 
initiatives that broadly affect the industry, including security- 
related initiatives. NRWA is a nonprofit federation of state rural 
water associations that provides support services to more than 24,550 
water and wastewater utilities. NRWA's Board of Directors is composed 
of elected board members from each state association. NRWA programs 
include technical assistance to rural and small community water systems 
(1) on the design and implementation of ground water source water 
protection plans, (2) Safe Drinking Water Act compliance issues, (3) 
health protection related to public-drinking water, and (4) other 
managerial, financial and operational issues. 

[6] Pub L. No. 107-188, 116 Stat. 594 (2002). Provisions of this act 
require drinking water systems serving more than 3,300 people to 
complete vulnerability assessments by certain dates depending upon the 
population size served. For example, systems serving a population 
greater than 3,300 but less than 50,000 were to complete such 
assessments by June 30, 2004. The act further required systems to 
prepare or revise an emergency response plan incorporating the results 
of the vulnerability assessment within 6 months after completing the 
assessment. 

[7] Pub. L. No. 99-499, 110 Stat. 1728 (1986). 

[8] See GAO, Homeland Security: Voluntary Initiatives Are Under Way at 
Chemical Facilities, but the Extent of Security Preparedness Is 
Unknown, GAO-03-439 (Washington, D.C.: March 2003). 

[9] H.R. Conf. Rep. No. 108-774, at 75 (2004) accompanying H.R. 4567, 
ultimately enacted into law as Pub. L. No. 108-334, 118 Stat. 1298 
(2004). 

[10] See GAO, Maritime Security: Substantial Work Remains to Translate 
New Planning Requirements into Effective Port Security, GAO-04-838 
(Washington, D.C.: June 2004). 

[11] Homeland Security Presidential Directive Number 7 (Washington, 
D.C.: December 17, 2003). 

[12] EPA provided data on the number of drinking water systems in the 
United States, including those subject to the Bioterrorism Act, by 
extracting information from the agency's national database called the 
Safe Drinking Water Information System. EPA does not have data on the 
ownership of approximately 2 percent of these systems. 

[13] According to EPA's data, a very small portion of community water 
systems (less than 1 percent) are federally owned. 

[14] Pub. L. No. 101-549, 104 Stat. 2399 (1990). 

[15] These facilities are known as Risk Management Plan, or RMP, 
facilities. The federal government has identified 140 toxic and 
flammable chemicals that, in certain amounts, would pose the greatest 
risk to human health and the environment if they were accidentally 
released into the air. See GAO-03-439 (Washington, D.C.: March 2003) 
for a more complete listing of the provisions related to an accidental 
release under the Clean Air Act. 

[16] In 2003, EPA officials stated that approximately 2,000 Risk 
Management Plan chemical facilities may be covered under the 
Bioterrorism Act. 

[17] Port security grants are awarded to critical national seaports and 
facilities to enhance facility and operational security. They were 
originally administered by the Transportation Security Administration 
(TSA) in coordination with the Maritime Administration and the Coast 
Guard. These grants are currently administered by the Office of State 
and Local Government Coordination and Preparedness in DHS. 

[18] Security planning grants were administered by EPA through August 
2002 to provide assistance to publicly and privately owned community 
drinking water systems serving 100,000 people or more. Under this 
program, EPA allowed up to $115,000 to each utility to develop or 
revise a vulnerability assessment, emergency response or operating 
plan, security enhancement plans and designs, or a combination of these 
efforts. In commenting on this report, EPA officials also told us that 
they used $20 million from their 2002 supplemental appropriation to 
provide funds to (1) states to facilitate small and medium-sized 
community water systems' (that is, that served more than 3,300 but less 
than 100,000 people) efforts to obtain technical assistance related to 
the development of vulnerability assessments and emergency response 
plans as required by the Bioterrorism Act and (2) to organizations 
providing such assistance. 

[19] Homeland security grants are a series of grants designed to 
support critical state and local missions, including the preparedness 
of first responders and citizens, public health, infrastructure 
security, and other public safety activities. These grants are 
administered by the Office of State and Local Government Coordination 
and Preparedness, the Federal Emergency Management Agency, and TSA. 

[20] The 10 chemical facilities we visited reported spending between $1 
million and $10 million to enhance security since September 11. 

[21] See GAO, Critical Infrastructure Protection: Improving Information 
Sharing with Infrastructure Sectors, GAO-04-780 (Washington, D.C.: July 
2004). 

[22] See GAO, Wastewater Facilities: Experts' Views on How Federal 
Funds Should Be Spent to Improve Security, GAO-05-165 (Washington, 
D.C.: January 2005). 

[23] In November 2004, the Water Information Sharing and Analysis 
Center launched a free security advisory system known as the Water 
Security Channel to distribute federal advisories on security threats 
via e-mail to the water sector. 

[24] EPA also developed guidance for community water systems to use in 
developing or revising their emergency response plans as required by 
the Bioterrorism Act. 

[25] The council is made up of 15 members who are appointed by EPA's 
Office of Ground Water and Drinking Water, and serve staggered 3-year 
terms. 

[26] In 1988, the ACC initiated Responsible Care®, which is a 
comprehensive management system for its members to follow to 
continuously improve safety performance; to increase communication; and 
to protect employees, communities, and the environment. 

[27] See GAO-03-439. 

[28] The Responsible Care® Security Code directs chemical companies to 
perform vulnerability assessments of their facilities using 
methodologies developed by either Sandia National Laboratories or the 
Center for Chemical Process Safety (or another equivalent methodology). 
Sandia National Laboratories are multiprogram oriented and primarily 
address national defense issues. Sandia security experts developed the 
risk-based assessment methodology under sponsorship from the Department 
of Justice. The Center for Chemical Process Safety is a component of 
the American Institute of Chemical Engineers that, as part of its work 
on chemical safety, has developed vulnerability assessment methodology 
and offers courses and a certificate in security vulnerability 
analysis. SOCMA also developed a Chemical Site Security Vulnerability 
Analysis Model to provide chemical facilities with another mechanism 
for conducting site vulnerability analysis. 

[29] In 2004, we reported that the Army Corps of Engineers approves 
virtually all such permit applications. See GAO, Waters and Wetlands: 
Corps of Engineers Needs to Evaluate Its District Office Practices in 
Determining Jurisdiction, GAO-04-297 (Washington, D.C.: February 2004). 

[30] See GAO-03-439. 

[31] At the time of this report, EPA was still the lead agency for the 
chemical sector. However, as previously mentioned, DHS is now the lead 
agency for the chemical sector. 

[32] See GAO, Homeland Security: Communication Protocols and Risk 
Communication Principles Can Assist in Refining the Advisory System, 
GAO-04-682 (Washington, D.C. June 2004). 

[33] Officials at seven of the eight community water systems we visited 
reported tracking some cost information related to security 
enhancements implemented since September 11 that ranged from 
approximately $23,000 to $19 million. However, the cost information 
these officials provided is not precise, and as they told us it does 
not represent all costs incurred. Thus, the data should not be used to 
determine the cumulative costs incurred across all community water 
systems. 

[34] See GAO-04-838. 

[35] Building block chemicals are intermediary chemicals that are 
produced from raw materials and used in the production of other 
chemicals. 

[36] We interviewed operators of community water systems within the 
supply component of the water sector since critical infrastructure 
efforts within this sector have focused on community water systems. 

[37] According to an EPA official, the smaller private systems are 
primarily owned and operated by a relatively few companies that also 
own and operate much larger private systems. Therefore, we focused on 
the larger systems to obtain an adequate perspective of privately held 
water systems. 

[38] In January of 2005, we issued a report on experts' views regarding 
how federal funds should be spent to improve security. In this report, 
we stated that the vast majority of experts suggested that wastewater 
utilities serving critical infrastructure should be given the highest 
priority when allocating federal wastewater security funds. 
Furthermore, the activity that experts most frequently cited as 
deserving of federal funds to improve wastewater facilities security 
was the replacement of gaseous chemicals used in the disinfection 
process with less hazardous alternatives. See GAO-05-165. 

[39] GAO has consistently called for a risk management approach to 
homeland security issues, See GAO, Homeland Security: A Risk Management 
Approach Can Guide Preparedness Efforts, GAO-02-208T (Washington, D.C.: 
October 12, 2001); Homeland Security: Key Elements of a Risk Management 
Approach, GAO-02-150T (Washington, D.C.: Oct. 12, 2001); Homeland 
Security: Summary of Challenges Faced in Targeting Oceangoing Cargo 
Containers for Inspection, GAO-04-557T (Washington, D.C., Mar. 31, 
2004); and Rail Security: Some Actions Taken to Enhance Passenger and 
Freight Rail Security, but Significant Challenges Remain, GAO-04-598T 
(Washington, D.C.: Mar. 23, 2004). 

GAO's Mission: 

The Government Accountability Office, the investigative arm of 
Congress, exists to support Congress in meeting its constitutional 
responsibilities and to help improve the performance and accountability 
of the federal government for the American people. GAO examines the use 
of public funds; evaluates federal programs and policies; and provides 
analyses, recommendations, and other assistance to help Congress make 
informed oversight, policy, and funding decisions. GAO's commitment to 
good government is reflected in its core values of accountability, 
integrity, and reliability. 

Obtaining Copies of GAO Reports and Testimony: 

The fastest and easiest way to obtain copies of GAO documents at no 
cost is through the Internet. GAO's Web site ( www.gao.gov ) contains 
abstracts and full-text files of current reports and testimony and an 
expanding archive of older products. The Web site features a search 
engine to help you locate documents using key words and phrases. You 
can print these documents in their entirety, including charts and other 
graphics. 

Each day, GAO issues a list of newly released reports, testimony, and 
correspondence. GAO posts this list, known as "Today's Reports," on its 
Web site daily. The list contains links to the full-text document 
files. To have GAO e-mail this list to you every afternoon, go to 
www.gao.gov and select "Subscribe to e-mail alerts" under the "Order 
GAO Products" heading. 

Order by Mail or Phone: 

The first copy of each printed report is free. Additional copies are $2 
each. A check or money order should be made out to the Superintendent 
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or 
more copies mailed to a single address are discounted 25 percent. 
Orders should be sent to: 

U.S. Government Accountability Office

441 G Street NW, Room LM

Washington, D.C. 20548: 

To order by Phone: 

	

Voice: (202) 512-6000: 

TDD: (202) 512-2537: 

Fax: (202) 512-6061: 

To Report Fraud, Waste, and Abuse in Federal Programs: 

Contact: 

Web site: www.gao.gov/fraudnet/fraudnet.htm

E-mail: fraudnet@gao.gov

Automated answering system: (800) 424-5454 or (202) 512-7470: 

Public Affairs: 

Jeff Nelligan, managing director,

NelliganJ@gao.gov

(202) 512-4800

U.S. Government Accountability Office,

441 G Street NW, Room 7149

Washington, D.C. 20548: