This is the accessible text file for GAO report number GAO-09-243 
entitled 'Freight Rail Security: Actions Have Been Taken to Enhance 
Security, but the Federal Strategy Can Be Strengthened and Security 
Efforts Better Monitored' which was released on May 21, 2009. 

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as part 
of a longer term project to improve GAO products' accessibility. Every 
attempt has been made to maintain the structural and data integrity of 
the original printed product. Accessibility features, such as text 
descriptions of tables, consecutively numbered footnotes placed at the 
end of the file, and the text of agency comment letters, are provided 
but may not exactly duplicate the presentation or format of the printed 
version. The portable document format (PDF) file is an exact electronic 
replica of the printed version. We welcome your feedback. Please E-mail 
your comments regarding the contents or accessibility features of this 
document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

Report to Congressional Requesters: 

United States Government Accountability Office: 
GAO: 

April 2009: 

Freight Rail Security: 

Actions Have Been Taken to Enhance Security, but the Federal Strategy 
Can Be Strengthened and Security Efforts Better Monitored: 

GAO-09-243: 

GAO Highlights: 

Highlights of GAO-09-243, a report to congressional requesters. 

Why GAO Did This Study: 

An attack on the U.S. freight rail system could be catastrophic because 
rail cars carrying highly toxic materials often traverse densely 
populated urban areas. The Department of Homeland Security’s (DHS) 
Transportation Security Administration (TSA) is the federal entity 
primarily responsible for securing freight rail. GAO was asked to 
assess the status of efforts to secure this system. This report 
discusses (1) stakeholder efforts to assess risks to the freight rail 
system and TSA’s development of a risk-based security strategy; (2) 
actions stakeholders have taken to secure the system since 2001, TSA’s 
efforts to monitor and assess their effectiveness, and any challenges 
to implementing future actions; and (3) the extent to which 
stakeholders have coordinated efforts. GAO reviewed documents, 
including TSA’s freight rail strategic plan; conducted site visits to 
seven U.S. cities with significant rail operations involving hazardous 
materials; and interviewed federal and industry officials. 

What GAO Found: 

Federal and industry stakeholders have completed a range of actions to 
assess risks to freight rail since September 2001, and TSA has 
developed a security strategy; however, TSA’s efforts have primarily 
focused on one threat, and its strategy does not fully address federal 
guidance or key characteristics of a successful national strategy. 
Specifically, TSA’s efforts to assess vulnerabilities and potential 
consequences to freight rail have focused almost exclusively on rail 
shipments of certain highly toxic materials, in part, because of 
concerns about their security in transit and limited resources. 
However, other federal and industry assessments have identified 
additional potential security threats, including risks to critical 
infrastructure and cybersecurity. Although many stakeholders agreed 
with TSA’s initial strategy, going forward TSA has agreed that 
including other identified threats in its freight rail security 
strategy is important, and reported that it is reconsidering its 
strategy to incorporate other threats. Additionally, in 2004, GAO 
reported that successful national strategies should identify 
performance measures with targets, among other elements. TSA’s security 
strategy could be strengthened by including targets for three of its 
four performance measures and revising its approach for the other 
measure to ensure greater consistency in how performance results are 
quantified. 

Federal and industry stakeholders have also taken a range of actions to 
secure freight rail, many of which have focused on securing certain 
toxic material rail shipments and have been implemented by industry 
voluntarily; however, TSA lacks a mechanism to monitor security actions 
and evaluate their effectiveness, and new requirements could pose 
challenges for future security efforts. GAO’s Standards for Internal 
Control in the Federal Government calls for controls to be designed to 
ensure ongoing monitoring. While the freight rail industry has taken 
actions to better secure shipments and key infrastructure, TSA has 
limited ability to assess the impacts of these actions because it lacks 
a mechanism to systematically track them and evaluate their 
effectiveness. Having such information could strengthen TSA’s efforts 
to efficiently target its resources to where actions have not been 
effective. New, mandatory security planning and procedural requirements 
will also necessitate additional federal and industry efforts and 
resources, and may pose some implementation challenges for both federal 
and industry stakeholders. 

Federal and industry stakeholders have also taken a number of steps to 
coordinate their freight rail security efforts; however, federal 
coordination can be enhanced by more fully leveraging the resources of 
all relevant federal agencies. GAO previously identified a number of 
leading practices for effective coordination that could help TSA 
strengthen coordination with federal and private sector stakeholders. 

What GAO Recommends: 

Among other things, GAO recommends that TSA reflect all security 
threats in strategy, strengthen its performance measures, better assess 
and track actions being taken, and more closely work with some federal 
stakeholders. DHS generally concurs with our recommendations and has 
initiated action on some; however, these actions will not fully address 
all of the recommendations. 

To view the full product, including the scope and methodology, click on 
[hyperlink, http://www.gao.gov/products/GAO-09-243]. For more 
information, contact Cathleen Berrick at (202) 512-3404 or 
berrickc@gao.gov. 

[End of section] 

Contents: 

Letter: 

Background: 

The Federal Government and Industry Have Assessed Threats, 
Vulnerabilities, and Consequences to Freight Rail, but TSA's Security 
Strategy Does Not Fully Address Identified Threats or Key Federal 
Guidance for National Strategies: 

Federal Efforts Have Guided Voluntary Industry Actions and Generally 
Focused on TIH, but New Requirements Could Pose Challenges: 

Stakeholders Have Implemented Several Strategies to Coordinate Their 
Efforts to Secure the Freight Rail System, but Opportunities Exist to 
Improve Coordination between Federal Stakeholders and Their Sector 
Partners: 

Conclusions: 

Recommendations for Executive Action: 

Agency Comments and Our Evaluation: 

Appendix I: Objectives, Scope, and Methodology: 

Appendix II: Federal and Industry Freight Rail Security Vulnerability 
and Consequence Assessment Activities Conducted since 2001: 

Appendix III: TSA Did Not Consistently Measure Results for Its Key 
Performance Measure: 

Appendix IV: Summary of Key Actions Taken to Secure Freight Rail: 

Appendix V: Federal and Industry Stakeholders Also Report Facing 
Technology Challenges to Enhancing the Security of TIH: 

Appendix VI: Summary of 9/11 Commission Act Requirements Pertaining to 
Freight Rail Security: 

Appendix VII: Comments from the Department of Homeland Security: 

Appendix VIII: GAO Contact and Staff Acknowledgments: 

Tables: 

Table 1: The NIPP Risk Management Framework: 

Table 2: Three Elements of Risk Assessment: 

Table 3: Federal and Rail Industry Assessments Conducted since 
September 11, 2001, to Determine Freight Rail Security Threats, 
Vulnerabilities, and Consequences: 

Table 4: Summary of Key Characteristics for a Successful National 
Strategy and Related Executive Order Factors: 

Table 5: Sector Goals and Freight Rail Subordinate Objectives to 
Complete Sector Goals: 

Table 6: Key Federal Security Actions Taken since September 11, 2001: 

Table 7: Key Rulemakings and Legislative Requirements Affecting Freight 
Rail Security: 

Table 8: Key Agreements Signed Involving Federal Agencies and Their 
Industry Partners: 

Table 9: Formal Committees and Other Entities Established by Federal 
and Industry Stakeholders to Facilitate Coordination: 

Table 10: Names and Locations of Organizations Contacted: 

Table 11: AAR Industrywide Security Management Plan's Four Alert 
Levels: 

Table 12: Key Provisions from the 9/11 Commission Act That Are Relevant 
to Freight Rail Security: 

Figures: 

Figure 1: Rail Yard in New Jersey Holding Numerous Hazardous Materials 
Tank Cars: 

Figure 2: Rail Bridge in Louisiana: 

Figure 3: View from Observation Tower at a Rail Yard: 

Figure 4: Camera System Located in the Upper-Right-Hand Corner of the 
Tunnel: 

Figure 5: Light Towers at a Rail Yard in Houston: 

Figure 6: Perimeter Fencing at a Rail Yard in Houston: 

Figure 7: TIH Rail Customer Facility with Barbed Wire Fencing around 
the Perimeter: 

[End of section] 

United States Government Accountability Office:
Washington, DC 20548: 

April 21, 2009: 

The Honorable Bennie G. Thompson: 
Chairman: 
Committee on Homeland Security: 
House of Representatives: 

The Honorable James L. Oberstar: 
Chairman: 
The Honorable John L. Mica: 
Ranking Member: 
Committee on Transportation and Infrastructure: 
House of Representatives: 

The Honorable Corrine Brown: 
Chair: 
The Honorable Bill Shuster: 
Ranking Member: 
Subcommittee on Railroads, Pipelines, and Hazardous Materials 
Committee on Transportation and Infrastructure: 
House of Representatives: 

The Honorable Elijah E. Cummings: 
House of Representatives: 

Freight railroads are a key component of the nation's transportation 
network, operating on more than 140,000 miles of track, traversing 
thousands of bridges and tunnels, and carrying millions of tons of 
freight annually. As a principal carrier of freight in the United 
States, freight railroads are vital to the U.S. economy, transporting 
nearly 13 percent of the nation's goods and generating $42 billion in 
annual revenues.[Footnote 1] Freight railroads carry many major 
commodities, including coal, grain and other agricultural products, 
food, steel, motor vehicles, and highly hazardous chemicals, such as 
chlorine and ammonia. Freight railroad companies are also the primary 
owners of the infrastructure and rail lines over which they operate and 
pay billions of dollars each year to construct, maintain, and renew 
their tracks and equipment, according to the Association of American 
Railroads (AAR).[Footnote 2] 

While there are currently no specific threats to U.S. freight rail, 
experts consider the U.S. rail system to be an attractive terrorist 
target because of its public accessibility, long stretches of open and 
unattended track, and the difficulty of securing a wide array of rail 
assets that are difficult to patrol. Further, an attack on the U.S. 
freight rail system could lead to catastrophic loss of life because the 
system often traverses densely populated urban areas carrying highly 
hazardous materials. According to the Department of Transportation 
(DOT), freight rail is the primary mode by which hazardous materials 
are transported throughout the nation, with railroads typically 
carrying from 1.7 million to 1.8 million carloads of hazardous 
materials annually.[Footnote 3] The category of hazardous materials 
considered to be the most dangerous to the public are Toxic Inhalation 
Hazards (TIH), which can be fatal if inhaled. TIH materials include 
chlorine (used in water treatment) and anhydrous ammonia (used in 
agriculture).[Footnote 4] In addition, shipments of TIH, especially 
chlorine, frequently move through densely populated areas to reach, for 
example, water treatment facilities that use these products. If 
released from a railcar in large quantities under certain atmospheric 
conditions, TIH materials could result in fatalities to the surrounding 
population.[Footnote 5] For example, an accidental train derailment in 
Graniteville, South Carolina, in 2005 unintentionally caused the 
release of several tons of TIH materials into the atmosphere, resulting 
in nine deaths, the treatment of 75 people for chlorine exposure, and 
the evacuation of over 5,400 people within a 1-mile radius for several 
days. As a result, concern exists that similar scenarios deliberately 
executed on a larger scale by terrorist groups could pose serious risks 
of fatalities and injuries. In addition to the potential for physical 
harm to the public caused by a hazardous materials release, concern 
also exists regarding the critical role that certain rail 
infrastructure plays in the efficient operation of the rail network, 
including the interdependency of passenger and freight rail networks as 
a result of shared infrastructure. As such, the degradation or 
destruction of critical rail infrastructure could potentially have 
negative economic consequences affecting both passenger and freight 
rail modes. 

Securing the nation's freight rail system is a shared responsibility 
requiring coordination between multiple stakeholders. Specifically, the 
Department of Homeland Security's (DHS) National Infrastructure 
Protection Plan (NIPP) identifies the Transportation Security 
Administration (TSA) as the sector-specific agency (SSA) responsible 
for securing all modes of surface transportation, including freight 
rail.[Footnote 6] Furthermore, in 2004, the Homeland Security Council 
(HSC) requested that DHS and DOT identify and mitigate the security 
risks associated with the rail transportation of TIH.[Footnote 7] 

You asked us to evaluate the status of federal and industry efforts to 
secure the freight rail system. In response, this report addresses the 
following questions: (1) To what extent have federal and industry 
freight rail stakeholders assessed the risks to the nation's freight 
rail network, and has TSA developed a risk-based strategy--consistent 
with applicable federal guidance and characteristics of a successful 
national strategy for securing the system? (2) What actions have 
federal and industry stakeholders taken to secure freight rail systems 
since September 11, 2001; to what extent has TSA monitored their status 
and effectiveness; and what, if any, challenges hinder the 
implementation of future actions? (3) To what extent have federal and 
industry stakeholders coordinated their efforts to secure the freight 
rail system? 

To assess the extent to which federal and industry freight rail 
stakeholders assessed risks to the freight rail system, we reviewed 
various threat, vulnerability, and consequence assessments prepared by 
DHS, DOT, and stakeholders outside of the federal government. Although 
DHS, DOT, and industry characterized these assessments as threat, 
vulnerability, and consequence assessments, we did not evaluate the 
quality of the assessments nor did we determine the extent to which the 
assessments were conducted consistent with requirements outlined in the 
NIPP as this analysis was outside the scope of our work. However, we 
did discuss the assessments' reported results with the respective 
agencies and private entities that conducted them to ascertain the 
efforts that were made to identify potential threats, vulnerabilities, 
and consequences associated with an attack on the freight rail system. 
We analyzed TSA's freight rail security strategy, or strategic plan-- 
the Freight Rail Modal Annex to the Transportation Sector-Specific Plan 
(TSSP)--to determine the extent to which it addressed the threats, 
vulnerabilities, and consequences identified in the assessments we 
reviewed.[Footnote 8] To determine the extent to which TSA has 
developed a risk-based strategy for securing freight rail, we compared 
TSA's strategy with requirements pertaining to freight rail security 
assessments in Executive Order 13416, Strengthening Surface 
Transportation Security;[Footnote 9] executive guidance, including the 
NIPP and the TSSP; and GAO's guidance on six desirable characteristics 
of an effective national strategy.[Footnote 10] We also analyzed the 
methodology and data TSA used to determine how the agency was meeting 
its main performance goal for freight rail. We had concerns about the 
reliability of these data, which we discuss later in this report. 

To determine federal and industry stakeholder actions taken to secure 
freight rail, we reviewed documentation, such as summary reports on the 
results of DHS and DOT freight rail security programs, and requirements 
in the Implementing Recommendations of the 9/11 Commission Act (9/11 
Commission Act).[Footnote 11] We also reviewed relevant TSA and DOT 
rail safety and security rulemakings at various stages of 
development.[Footnote 12] We conducted site visits in seven major U.S. 
cities where TSA has conducted freight rail security assessments or 
where railroads handle significant TIH rail shipments and interviewed 
federal and industry stakeholders about actions taken and the 
challenges they faced in implementing such actions. As part of our site 
visits, we also monitored all three phases of TSA's Corridor Review in 
Chicago, Illinois, to better understand the process and specific 
security actions taken through these reviews.[Footnote 13] During our 
site visits we also met with officials from the seven largest freight 
railroads.[Footnote 14] Because we selected a nonprobability sample of 
cities and railroads, the results from these visits cannot be 
generalized to all U.S. cities or used to make inferences about the 
views of all freight railroad officials. However, the results from 
these visits provided us with a broad perspective of the types of 
actions taken to secure freight rail and the challenges operators face 
in doing so. During our site visits, we also discussed specific actions 
individual railroads had taken to secure their shipments and 
infrastructure and any challenges they faced in implementing these as 
well as potential future actions. We also reviewed available agency 
documentation regarding the type and scope of federal and industry 
actions taken to secure freight rail, and we reviewed our Standards for 
Internal Control in the Federal Government to further assist us in 
evaluating TSA's efforts to monitor and evaluate the effectiveness of 
actions taken.[Footnote 15] To determine the extent to which freight 
rail stakeholders have been coordinating security efforts, we analyzed 
several memorandums of understanding (MOU) and cooperation that affect 
freight rail security as well as specific mechanisms stakeholders have 
implemented to coordinate their security efforts, and compared these 
actions with criteria for coordination included in the NIPP as well as 
leading practices for collaborating agencies.[Footnote 16] We also met 
with federal and industry officials to discuss their views on 
coordination among freight rail security stakeholders. 

We conducted this performance audit from February 2007 through April 
2009 in accordance with generally accepted government auditing 
standards. Those standards require that we plan and perform the audit 
to obtain sufficient, appropriate evidence to provide a reasonable 
basis for our findings and conclusions based on our audit objectives. 
We believe that the evidence obtained provides a reasonable basis for 
our findings and conclusions based on our audit objectives. Appendix I 
contains more details about our scope and methodology. 

Background: 

The Freight Rail System Is Inherently Vulnerable: 

Certain characteristics of the freight rail system make it inherently 
vulnerable and therefore difficult to secure. Specifically, America's 
rail network is an open system, with expanses of infrastructure spread 
over vast regions, and often traverses densely populated urban areas. 
In addition, railroads operate in large and small rail yards and along 
narrow rights-of-way containing thousands of miles of track that are 
generally unprotected by fences or other barriers. As a result, freight 
trains and individual railcars can be especially difficult to secure in 
transit as shipments move from their points of origin to their 
destinations. Trains and railcars often travel across multiple 
railroads and rail lines and sometimes sit for periods of time on rail 
tracks or in rail yards awaiting further shipment. At points of 
connection, freight cars will typically sit in rail yards until they 
can be moved into a train with the same destination as the freight. 
This can be of particular concern for railcars carrying hazardous 
materials, since many rail yards and storage locations are located 
close to densely populated areas and may contain dozens of loaded 
hazardous materials tank cars at any given time. Also, the difficulty 
and cost associated with physically securing rail yards can leave these 
cars accessible to trespassers. Figure 1 shows a rail yard holding 
numerous hazardous materials tank cars. 

Figure 1: Rail Yard in New Jersey Holding Numerous Hazardous Materials 
Tank Cars: 

[Refer to PDF for image: photograph] 

Source: GAO. 

[End of figure] 

Furthermore, the interdependency of freight and passenger rail 
infrastructure--including common bridges, tunnels, control centers, 
tracks, signals, and switches--increases the likelihood that incidents 
affecting highly critical assets could affect the entire system, 
including both freight and passenger rail carriers. Numerous passenger 
and commuter rail systems throughout the country operate at least 
partially over tracks or rights-of-way owned by freight railroads. For 
example, Amtrak--the sole provider of intercity passenger rail 
transportation in the United States--operates on more than 22,000 miles 
of track owned by freight railroads through operating agreements. 
[Footnote 17] As a result, certain assets are particularly critical to 
the operation of the rail system. For example, control centers are a 
key factor to the railroads' ability to manage their networks. Thus, an 
attack on a control center could have widespread consequences. 
Moreover, certain bridges, such as those over large rivers, play a key 
role in the national railroad system because capacity constraints limit 
options to reroute trains. As a result, incidents limiting or 
preventing their use could negatively affect the economy by severely 
delaying rail traffic for significant periods of time and causing 
transportation system delays and disruption. Figure 2 shows a key rail 
bridge in Louisiana, which is only one of a few rail bridges that go 
over the Mississippi River. 

Figure 2: Rail Bridge in Louisiana: 

[Refer to PDF for image: photograph] 

Source: DHS. 

[End of figure] 

Multiple Stakeholders Share Responsibility for Securing Freight Rail 
Systems: 

Securing the nation's freight rail system is a shared responsibility 
requiring coordination between multiple federal and industry 
stakeholders. 

Federal Government Stakeholders: 

Within the federal government, DHS and DOT share responsibility for 
securing the freight rail system. Prior to the terrorist attacks of 
September 11, 2001, DOT was the primary federal entity involved in 
regulating freight rail transportation. In response to the September 
11, 2001, attacks, Congress passed the Aviation and Transportation 
Security Act of 2001 (ATSA), which created and conferred upon TSA broad 
responsibility for securing all modes of transportation, including the 
freight rail system.[Footnote 18] Within TSA, the Transportation Sector 
Network Management (TSNM) office manages all surface transportation 
security issues, with divisions dedicated to each surface mode of 
transportation, including freight rail.[Footnote 19] In addition, TSA's 
Office of Intelligence (OI) is responsible for collecting and analyzing 
threat information for threats affecting the entire transportation 
network. In 2002, Congress passed the Homeland Security Act, which 
established DHS, transferred TSA from DOT to DHS, and assigned DHS 
responsibility for protecting the nation from terrorism, including 
securing the nation's transportation systems.[Footnote 20] Finally, in 
2007, the 9/11 Commission Act was signed into law, which requires DHS 
to establish several programs aimed at improving freight rail 
security.[Footnote 21] The law requires that DHS, among other things, 
identify high-risk railroads and issue regulations requiring high-risk 
railroads to conduct vulnerability assessments and develop security 
plans, establish a program for conducting security exercises for 
railroad carriers, and issue regulations for a security training 
program for frontline rail employees. 

Within DHS, the National Protection and Programs Directorate (NPPD), 
through the DHS Office of Infrastructure Protection (IP), is 
responsible for coordinating efforts to protect the nation's most 
critical assets across all 18 sectors, including the transportation 
sector.[Footnote 22] Within the transportation sector, DHS IP works 
with TSA to identify nationally critical freight rail assets. The 
Federal Emergency Management Agency (FEMA) is responsible for 
allocating and managing DHS grants for freight rail, primarily through 
the DHS IP Buffer Zone Protection Program (BZPP) and TSA's freight rail 
security grant program.[Footnote 23] While federal stakeholders play a 
role in facilitating risk-based infrastructure security efforts, 
implementation of asset-specific protective security measures remains 
the responsibility of individual asset owners/operators, mostly 
individual railroads. 

DHS funding for freight rail security consists of a general 
appropriation to TSA for its entire surface transportation security 
program, which includes commercial vehicle and highway infrastructure, 
rail and mass transit, pipeline, and freight rail security and 
appropriations to FEMA for its State Homeland Security Grant Program 
and Infrastructure Protection Program.[Footnote 24] Annual 
appropriations to TSA for its surface transportation security program 
were $36 million in fiscal year 2006, $37.2 million in fiscal year 
2007, $46.6 million in fiscal year 2008, and $49.6 million in fiscal 
year 2009. FEMA funding available under the two principal grant 
programs ranged from about $2 billion to $2.5 billion for each fiscal 
year from 2006 through 2009. 

Although TSA has primary responsibility for freight rail security, DOT 
maintains a regulatory role with respect to the transportation of 
hazardous materials via rail.[Footnote 25] Specifically, the Homeland 
Security Act clarified DOT's responsibility to include ensuring the 
security, as well as the safety, of the transportation of hazardous 
materials.[Footnote 26] Within DOT, the Pipeline and Hazardous 
Materials Safety Administration (PHMSA) is responsible for developing, 
implementing, and revising security plan requirements for hazardous 
materials carriers, while inspectors from the Federal Railroad 
Administration (FRA) enforce these regulations in the rail industry 
through periodic reviews of the content and implementation of these 
security plans.[Footnote 27] 

In 2003, PHMSA issued regulations intended to strengthen the security 
of the transportation of hazardous materials.[Footnote 28] The 
regulations require persons who transport or offer for transportation 
certain hazardous materials to develop and implement security 
plans.[Footnote 29] Security plans must assess the security risks 
associated with transporting these hazardous materials and include 
measures to address those risks.[Footnote 30] The regulations also 
require that all employees who directly affect hazardous materials 
transportation safety receive training that provides awareness of 
security risks associated with hazardous materials transportation and 
of methods designed to enhance transportation security. Such training 
is also to instruct employees on how to recognize and respond to 
possible security threats. Additionally, each employee of a firm 
required to have a security plan must be trained concerning the plan 
and its implementation. As described below, PHMSA issued a new 
regulation on November 26, 2008, to further enhance the security and 
safety of the rail movement of certain hazardous materials, including 
shipments of certain explosive, TIH, and radioactive materials. 
[Footnote 31] 

Industry Stakeholders: 

A number of national organizations and coordination groups exist to 
represent the broad composition of freight rail security stakeholders, 
which include seven national (Class I) railroads and hundreds of other 
railroad companies that operate over shorter distances, known as 
regional (Class II) or short line (Class III) railroads.[Footnote 32] 
In addition to the railroads, chemical companies, such as BASF and Dow 
Chemical, ship highly hazardous materials via U.S. rail networks and 
also play a role in ensuring the safety and security of their rail 
shipments. Some industry organizations also play a role in 
disseminating pertinent information, such as threat communications from 
DHS and DOT, to their members. For example, AAR has played a key role 
in representing the interests of member railroads by establishing a 
Rail Alert Network to coordinate security actions industrywide. AAR 
also routinely collaborates with federal entities to assist its members 
in enhancing freight rail security. 

In the freight rail industry, under many circumstances, rail carriers 
may be required to transport hazardous materials and bear many of the 
costs associated with ensuring the safety and security of these rail 
shipments. Under what is known as common carrier obligations, freight 
rail carriers must provide transportation or service upon reasonable 
request.[Footnote 33] While shipments of materials such as TIH account 
for about 1 percent of all railroad business, railroad representatives 
reported that insurance premiums associated with the transportation of 
TIH materials account for over 50 percent of their insurance costs. 
Chemical companies we met with also reported an increase in shipping 
rates associated with transporting TIH as well as other costs 
associated with implementing security measures to protect hazardous 
material rail shipments as required by the DHS Chemical Facility Anti- 
Terrorism Standards Program.[Footnote 34] 

A Risk-Based Approach to Freight Rail Security: 

In recent years, we, along with Congress (most recently through the 
Intelligence Reform and Terrorism Prevention Act of 2004), the 
executive branch (e.g., in presidential directives), and the 9/11 
Commission have required or advocated that federal agencies with 
homeland security responsibilities utilize a risk management approach 
to help ensure that finite national resources are dedicated to assets 
or activities considered to have the highest security priority. We have 
concluded that without a risk management approach, there is limited 
assurance that programs designed to combat terrorism can be properly 
prioritized and focused. Thus, risk management, as applied in the 
homeland security context, can help to more effectively and efficiently 
prepare defenses against acts of terrorism and other threats. 

Homeland Security Presidential Directive 7 (HSPD-7) directed the 
Secretary of Homeland Security to establish uniform policies, 
approaches, guidelines, and methodologies for integrating federal 
infrastructure protection and risk management activities. Recognizing 
that each sector possesses its own unique characteristics and risk 
landscape, HSPD-7 designates a federal government SSA for each of the 
critical infrastructure sectors that are to work with DHS to improve 
critical infrastructure security.[Footnote 35] On June 30, 2006, DHS 
released the NIPP, which created a risk-based framework for the 
development of SSA strategic plans, in accordance with HSPD-7.[Footnote 
36] As the SSA for transportation, TSA developed the TSSP in 2007 to 
document the process to be used in carrying out the national strategic 
priorities outlined in the NIPP and the National Strategy for 
Transportation Security (NSTS).[Footnote 37] The TSSP contains 
supporting modal implementation plans for each transportation mode, 
including the freight rail mode, which provides information on current 
efforts to secure freight rail as well as TSA's overall goals and 
objectives related to freight rail security. 

The NIPP defines roles and responsibilities for security partners in 
carrying out critical infrastructure and key resources protection 
activities through the application of risk management principles. Table 
1 provides details on the interrelated activities of the risk 
management framework as defined by the NIPP. 

Table 1: The NIPP Risk Management Framework: 

Set security goals: 
Define specific outcomes, conditions, end points, or performance 
targets that collectively constitute an effective protective posture. 

Identify assets, systems, networks, and functions: 
Develop an inventory of the assets, systems, and networks that 
comprises the nation's critical infrastructure, key resources, and 
critical functions. Collect information pertinent to risk management 
that takes into account the fundamental characteristics of each sector. 

Assess risks: 
Determine risk by combining potential direct and indirect consequences 
of a terrorist attack or other hazards (including seasonal changes in 
consequences and dependencies and interdependencies associated with 
each identified asset, system, or network), known vulnerabilities to 
various potential attack vectors, and general or specific threat 
information. 

Prioritize: 
Aggregate and analyze risk assessment results to develop a 
comprehensive picture of asset, system, and network risk; establish 
priorities based on risk; and determine protection and business 
continuity initiatives that provide the greatest mitigation of risk. 

Implement protective programs: 
Select sector-appropriate protective actions or programs to reduce or 
manage the risk identified, and secure the resources needed to address 
priorities. 

Measure effectiveness: 
Use metrics and other evaluation procedures at the national and sector 
levels to measure progress and assess the effectiveness of national 
CIKR. 

Sources: GAO and DHS. 

[End of table] 

The NIPP requires that federal agencies use information collected 
through the risk management framework to inform the selection of risk- 
based priorities and continuous improvement of security strategies and 
programs to protect people and critical infrastructure through the 
reduction of risks from acts of terrorism. Within the risk management 
framework, the NIPP also establishes baseline criteria for conducting 
risk assessments. According to the NIPP, risk assessments are a 
qualitative determination of the likelihood of an adverse event 
occurring, a quantitative determination of the likelihood of such and 
event, or both, and are a critical element of the NIPP risk management 
framework. Risk assessments help decision makers identify and evaluate 
potential risks so that countermeasures can be designed and implemented 
to prevent or mitigate the effects of the risks. The NIPP characterizes 
risk assessment as a function of three elements: threat, vulnerability, 
and consequence. Information from these elements can lead to a risk 
characterization and provide input for prioritizing security goals. 
Table 2 provides specific information on these three elements. 

Table 2: Three Elements of Risk Assessment: 

Threat: 
The likelihood that a particular asset, system, or network will suffer 
an attack or an incident. In the context of risk from terrorist attack, 
the estimate of this is based on the analysis of the intent and the 
capability of an adversary; in the context of natural disaster or 
accident, the likelihood is based on the probability of occurrence. 

Vulnerability: 
The likelihood that a characteristic of, or flaw in, an asset's, 
system's, or network's design, location, security posture, process, or 
operation renders it susceptible to destruction, incapacitation, or 
exploitation by terrorists or to other intentional acts, mechanical 
failures, and natural hazards. 

Consequence: 
The negative effects on public health and safety, the economy, public 
confidence in institutions, and the functioning of government, both 
direct and indirect, that can be expected if an asset, system, or 
network is damaged, destroyed, or disrupted by a terrorist attack, 
natural disaster, or other incident. 

Source: GAO. 

[End of table] 

The Federal Government and Industry Have Assessed Threats, 
Vulnerabilities, and Consequences to Freight Rail, but TSA's Security 
Strategy Does Not Fully Address Identified Threats or Key Federal 
Guidance for National Strategies: 

Federal and industry stakeholders have completed a range of threat, 
vulnerability, and consequence assessments for freight rail since 
September 11, 2001, and TSA has developed a strategy for securing 
freight rail.[Footnote 38] However TSA's efforts have largely focused 
exclusively on TIH rail shipments despite the identification of other 
potential threats to freight rail infrastructure and cybersecurity 
systems. TSA officials stated that the agency focused on securing TIH 
for several reasons, including limited resources and the HSC's decision 
in 2004 to prioritize TIH as a key risk requiring federal attention. 
While other federal and industry freight rail stakeholders have agreed 
that focusing on TIH was a sound initial strategy because it is a key 
potential rail security threat and an overall transportation safety 
concern, there are other security threats for TSA to consider and 
evaluate as its freight rail strategy matures, such as potential 
sabotage to critical infrastructure. In addition, TSA's security 
strategy does not fully address characteristics that we have previously 
identified as key practices for successful national strategies, such as 
having targeted performance measures to gauge results or related 
factors outlined in Executive Order 13416, such as the identification 
of lead, support, and partner roles. Specifically, three of the four 
performance measures in TSA's Freight Rail Modal Annex to the TSSP do 
not identify any specific targets to gauge the effectiveness of federal 
and industry programs in achieving the measures or the transportation 
sector security goals outlined in the annex. Moreover, TSA has been 
limited in its ability to measure the impact federal and industry 
efforts are having in achieving the agency's key performance measure 
for the freight rail program because the agency was unable to obtain 
critical data necessary to consistently measure results. 

Since 2001, Federal and Industry Stakeholders Have Conducted a Range of 
Threat, Vulnerability, and Consequence Assessments, but TSA's Security 
Efforts Have Largely Focused on TIH Rail Shipments: 

Since September 11, 2001, federal and industry stakeholders have 
conducted a range of threat, vulnerability, and consequence assessments 
for freight rail; however, of the federal assessment efforts completed 
to date, TSA's have focused almost exclusively on TIH, while others 
focused on more than just one threat. For example, federal threat 
assessments considered multiple capabilities and tactics an adversary 
may employ to attack the freight rail system, while the vulnerability 
and consequence assessments were mixed--TSA's focused exclusively on 
TIH as the threat, while other federal and industry assessments 
included other areas of risk, such as the vulnerabilities and 
consequences associated with critical infrastructure or cyberattacks. 
[Footnote 39] See table 3 for a summary of the various federal and 
industry assessments conducted since 2001. For more information on 
these assessments, see appendix II. 

Table 3: Federal and Rail Industry Assessments Conducted since 
September 11, 2001, to Determine Freight Rail Security Threats, 
Vulnerabilities, and Consequences: 

Threat assessments: 

Entity: TSA OI; 
Time frame: 2003-present; 
Description: Freight rail threat assessments: Analysis of threat 
information from relevant foreign and domestic sources; include 
discussions of plausible threat scenarios. These assessments are 
developed annually and provide an overview of threats, including 
possible attack tactics and targets to the freight rail system and its 
infrastructure (e.g., bridges and tunnels); 
Risk component: Threat: [Check]; 
Risk component: Vulnerability: [Empty]; 
Risk component: Consequences: [Empty]. 

Vulnerability and consequence assessments focusing on TIH: 

Entity: PHMSA; 
Time frame: 2003; 
Description: TIH Summary Report: Vulnerability and consequence 
assessment of 13 specific TIH materials. PHMSA chose these materials 
because of, among other things, the volume carried on the railroads and 
the toxicity of the 13 chemicals. The purpose of the assessment was to 
better define the potential harm that could result from an attack on a 
TIH railcar, and determine some of the general weaknesses of TIH 
railcars and how a terrorist may breach one; 
Risk component: Threat: [Empty]; 
Risk component: Vulnerability: [Check]; 
Risk component: Consequences: [Check]. 

Entity: TSA Freight Rail TSNM office; 
Time frame: 2004-present; 
Description: Rail Corridor Reviews: Assessments that determine the 
vulnerabilities and potential consequences posed by TIH cars in major 
urban areas by identifying locations within a city's rail network where 
TIH cars are vulnerable to a terrorist attack. TSA also developed a 
systematic methodology to quantitatively rate security risks at 
locations; 
Risk component: Threat: [Empty]; 
Risk component: Vulnerability: [Check]; 
Risk component: Consequences: [Check]. 

Entity: TSA Freight Rail TSNM office; 
Time frame: 2007-present; 
Description: TIH Rail Risk Reduction Program: Rail TIH transportation 
security assessment in 46 major urban areas that uses industry data 
about TIH car movements inside the urban area. TSA also audits the 
security status of the cars while at rail yards, and assesses potential 
consequences to the surrounding population; 
Risk component: Threat: [Empty]; 
Risk component: Vulnerability: [Check]; 
Risk component: Consequences: [Check]. 

Other vulnerability and consequence assessments: 

Entity: Freight rail industry; 
Time frame: 2001-2008; 
Description: Freight rail security assessment: Analysis of the railroad 
industry's vulnerabilities and consequences in five major areas: 
hazardous materials, critical infrastructure, information systems, 
military shipments, and rail operations; 
Risk component: Threat: [Empty]; 
Risk component: Vulnerability: [Check]; 
Risk component: Consequences: [Check]. 

Entity: TSA Freight Rail TSNM office; 
Time frame: 2007-present; 
Description: Corporate Security Reviews (CSR): Analysis of rail carrier 
security plans and corporate-level procedures to enhance domain 
awareness and identify vulnerabilities of Class I railroads, initially, 
and, subsequently, short line railroads; 
Risk component: Threat: [Empty]; 
Risk component: Vulnerability: [Check]; 
Risk component: Consequences: [Empty]. 

Entity: DHS IP; 
Time frame: 2006-present; 
Description: Prioritized critical infrastructure list: Identification 
of nation's CIKR across all sectors, including freight rail assets such 
as bridges, tunnels, and cyber-dispatch centers. Assets that appear on 
this list are chosen based on criteria established by DHS IP in concert 
with TSA; 
Risk component: Threat: [Empty]; 
Risk component: Vulnerability: [Empty]; 
Risk component: Consequences: [Check]. 

Entity: DHS IP; 
Time frame: 2006-present; 
Infrastructure vulnerability assessments: Assessments intended to 
provide DHS and other stakeholders with detailed vulnerabilities of 
infrastructure for all CIKR sectors (including freight rail 
infrastructure) to develop and prioritize mitigation efforts. 

Assessments are one of two categories: (1) Site Assistance Visit (SAV): 
Facility-level assessment conducted by DHS IP in partnership with asset 
owners (2) BZPP: Assessment conducted around the buffer area of the 
asset. BZPP reviews are conducted by local law enforcement in 
coordination with DHS IP. The assessments focus on identifying 
locations and weaknesses from which terrorists may conduct surveillance 
or launch an attack on an asset; 
Risk component: Threat: [Empty]; 
Risk component: Vulnerability: [Check]; 
Risk component: Consequences: [Empty]. 

Source: GAO analysis of DHS, DOT, and industry data. 

Note: TSA, DHS IP, and PHMSA characterize completed assessments as 
threat, vulnerability, and consequence assessments; we did not evaluate 
the quality of these assessments or the extent to which they were 
conducted consistent with requirements outlined in the NIPP. DHS also 
determined that the criteria and specific numbers related to the 
prioritized critical infrastructure list are "For Official Use Only." 
As a result, these data are not contained in this report. 

[End of table] 

TSA's Threat Assessments Have Identified Multiple Threats to Freight 
Rail: 

TSA's threat assessments have identified multiple potential threats to 
freight rail, such as attacks on TIH rail shipments or destruction of 
and sabotage to key infrastructure; however, TSA has previously 
reported that there was no specific information that extremist groups 
or individuals are planning to conduct an act of terrorism against the 
U.S. freight rail system. TSA's OI has conducted periodic threat 
assessments since 2003 and completed its most recent assessment in May 
2008. These assessments have mostly been scenario based, meaning they 
focus on potential attack scenarios that might be successful in 
destroying or exploiting freight rail assets or systems.[Footnote 40] 
According to TSA officials, this is the best available technique for 
conducting these threat assessments, given the lack of specific threat 
information related to freight rail. TSA officials also reported that 
the threat scenarios identified in the 2008 freight rail threat 
assessment primarily resulted from discussions and concerns about the 
potential consequences and vulnerabilities associated with the 
identified scenarios. Possible threats included hazardous materials 
attacks, such as the breaching of a TIH tank car; destruction of or 
sabotage to freight rail bridges and tunnels; and cyberattacks to the 
rail system that could disrupt or cause the degradation of railroads' 
signaling and dispatching systems. 

The NIPP guidance states that risk assessments should provide a means 
to estimate the likelihood of a threat occurring. However, TSA 
officials said that calculating these values for freight rail is 
difficult because of the lack of specific threat information. Despite 
the difficulties of doing so, it is important for TSA to use available 
information to attempt to estimate the likelihood of a threat occurring 
to the freight rail system because estimating the likelihood of various 
threats occurring, as directed by the NIPP, could provide TSA with 
additional information with which to assess overall risks to freight 
rail assets and systems.[Footnote 41]Although TSA has not estimated the 
likelihood of various threats occurring, the agency has prioritized 
certain threat scenarios as well as the overall threat to freight rail 
compared to other modes. TSA officials have concluded, based on their 
expert judgment and interpretation of available vulnerability and 
potential consequence information, that the threat of an attack to a 
TIH car in a high-threat urban area is the highest risk to freight 
rail.[Footnote 42] In addition, the HSC identified the rail 
transportation of TIH materials as a key security risk. According to a 
former Deputy Homeland Security Advisor to the President, this position 
was based on the inherent openness and vulnerability of the rail 
system, combined with the HSC's review of modeling studies that 
estimated the potential for significant public harm associated with a 
large TIH release in a highly populated area. TSA officials also told 
us that based upon available information, the overall threat of an 
attack to freight rail is relatively lower than the threat to other 
modes of transportation, including passenger rail, mass transit, and 
aviation modes. TSA reported that it based this conclusion primarily on 
the lack of specific threat information related to freight rail, expert 
judgment, and the lack of precedent for terrorist attacks using freight 
rail as compared to other modes. 

TSA and PHMSA Have Conducted Several Vulnerability and Consequence 
Assessments Focusing Exclusively on TIH Rail Shipments: 

Since 2003, both TSA and PHMSA have assessed the vulnerabilities and 
potential consequences associated with an attack on TIH rail shipments. 
According to TSA, it focused these assessments on TIH because the HSC 
identified TIH as a security risk that the government needed to address 
during 2002 and 2003. As directed by the HSC, in 2003, PHMSA conducted 
an assessment of the vulnerabilities and potential consequences 
associated with transporting certain TIH materials by rail.[Footnote 
43] For more information on this assessment, see appendix II. 

Shortly thereafter, in 2004, the HSC requested that TSA begin more 
specific assessments, called Corridor Reviews, which focused 
exclusively on identifying the vulnerabilities and potential 
consequences posed by TIH rail shipments in 9 major U.S. cities. 
[Footnote 44] As of March 2009, TSA had completed Corridor Reviews in 
12 cities, including all 9 cities originally selected for review in 
2004, and has reported that the agency will continue conducting these 
reviews in 48 additional cities that have TIH rail shipments. For a 
complete discussion of the Corridor Reviews, see appendix II. 

More recently, in 2007, TSA began further assessing the potential risk 
posed by TIH rail shipments in high-threat urban areas by gathering and 
quantifying vulnerability and consequence information through a project 
called the TIH Rail Risk Reduction Program. TSA officials stated that 
the agency developed this assessment program to measure the impact 
federal and industry efforts are having on achieving the agency's key 
performance measure for the freight rail security program, which is to 
reduce the risk associated with the transportation of TIH in major 
cities, identified as high-threat urban areas, by 50 percent by the end 
of 2008. According to TSA, this information also gives the agency a way 
to closely compare the vulnerabilities and consequences related to TIH 
transportation across various cities over time.[Footnote 45] For more 
information on this assessment, see appendix II. 

Federal and Industry Stakeholders Have Also Conducted Vulnerability and 
Consequence Assessments Associated with Other Threats: 

As discussed in table 3, federal and industry stakeholders have also 
conducted vulnerability and consequence assessments associated with 
other threats--such as attacks on rail critical infrastructure and 
cyberattacks. These assessments ranged from narrow assessments of one 
geographic area, specific asset, or rail carrier to broader assessments 
that reviewed and ranked critical assets and infrastructure nationwide. 
For more information on these assessments, see appendix II. 

Federal Assessment Efforts: 

DHS IP has conducted vulnerability and consequence assessments of 
freight rail assets that focused on security threats other than TIH. 
For example, DHS IP has developed a prioritized list of critical U.S. 
infrastructure, including freight rail assets, that if destroyed or 
disrupted, cause national or regional catastrophic effects.[Footnote 
46] While TSA and DHS IP work together to develop criteria for 
determining which assets belong on the list, TSA has not taken steps to 
assess the security preparedness of these assets. However, after we 
raised this issue in late 2008, TSA reported in February 2009 that it 
intends to do so. Further, DHS IP has also conducted more detailed 
assessments of some of these assets through the BZPP program. However, 
TSA has not used the results of these assessments to inform its 
security strategy. Using the results of these assessments could help 
TSA, as the SSA for freight rail, further inform and refine its freight 
rail security strategy to ensure the security preparedness of high- 
priority freight rail assets. TSA officials told us that they 
understand the importance of securing critical freight rail 
infrastructure from terrorist attack and are reconsidering the agency's 
approach for addressing threats to infrastructure in light of completed 
federal and industry assessments. 

In 2007, TSA conducted CSRs of all seven Class I railroads' security 
plans to determine their compliance with TSA guidelines.[Footnote 47] 
Unlike TSA's TIH-focused Corridor Reviews, a CSR is a broad review that 
assesses a railroad carrier's security plan and the level of 
implementation of security countermeasures in several key areas. While 
these reviews provide TSA with an opportunity to review railroad 
critical infrastructure information included in a company's security 
plan, they do not provide information on the security preparedness of 
specific freight rail infrastructure assets deemed nationally critical, 
particularly those that have been identified through DHS IP's efforts. 
TSA officials stated that they plan to eventually use the CSR results 
to compile a list of industry best practices and to develop security 
plan baseline standards for a future security plan regulation. 

Industry Assessment Efforts: 

In addition to federal assessment efforts, the freight rail industry 
has also taken steps to independently assess security risks to the rail 
network and its operations. The rail industry conducted the first 
freight rail risk assessment shortly after September 11, 2001, which 
identified security risks to the entire rail network. Although the 
assessment, led by AAR, identified specific hazardous materials that 
were the most dangerous, including TIH materials, it also identified 
other vulnerabilities and consequences--including those associated with 
the destruction or degradation of freight rail infrastructure, such as 
key bridges, tunnels, tracks, and operation centers that electronically 
direct and monitor train movements. In 2008, the rail industry updated 
its security assessment to account for changes in the railroads' 
operating environment since 2001, including the development of an 
updated list of critical infrastructure as well as cybersecurity 
vulnerabilities and concerns. The updated assessment resulted in the 
industry identifying and prioritizing over 1,000 of its rail assets, 
such as bridges, tunnels, and control centers.[Footnote 48] For more 
information on the rail industry risk assessment and assessments 
conducted by individual railroad companies, see appendix II. 

TSA's Freight Rail Security Strategy Focuses on One Threat and Does Not 
Fully Address Key Characteristics of a Successful National Strategy and 
Factors Outlined in Executive Order 13416: 

TSA's Freight Rail Strategy Focuses Almost Exclusively on TIH and Does 
Not Address Other Identified Threats: 

Since its inception, TSA's Freight Rail Program Office has focused its 
freight rail security strategy almost exclusively on the threats posed 
by TIH rail shipments, and the agency does not yet have a strategy for 
addressing other identified threats. TSA officials said that they 
intentionally focused on TIH transportation for a number of reasons. 
For example, TSA officials reported that in 2003, when TSA's freight 
rail office was first established, the HSC had recommended that DOT, 
TSA, and other federal agencies focus on securing TIH because the HSC 
had asserted that transporting TIH by rail was a significant public 
security risk. Additionally, TSA officials and other federal officials 
reported that studies had been conducted during that time identifying 
the transportation of TIH as a significant security risk to public 
health. For instance, a 2003 study conducted by the Naval Research Lab 
determined that up to 100,000 people could be injured or killed in 
Washington, D.C., if the contents of a chlorine tank car were released 
under worst-case conditions.[Footnote 49] While most officials that we 
interviewed questioned the severity of the study's casualty estimates, 
they agreed that a large TIH release in an urban setting could cause 
mass casualties. 

TSA program officials also reported on several other issues that also 
influenced how they set their early priorities for securing freight 
rail, such as heightened media coverage regarding the ease with which 
individuals could access TIH railcars and the possible public health 
impacts of a TIH release. Specifically, news sources in 2002 and 2003 
noted security concerns and vulnerabilities related to transporting TIH 
by railcars in urban areas. Environmental groups had also raised 
concerns regarding the possible dangers of shipping TIH chemicals by 
rail. Adding to TSA's concerns, which included managing its 
responsibility and authority for securing freight rail, around 2005 
several cities proposed legislation to reroute or limit the 
transportation of TIH in their jurisdictions. Specifically, cities such 
as Cleveland, Baltimore, Chicago, and Washington, D.C., had proposed 
legislation that would prohibit rail companies from carrying TIH 
through their jurisdictions. Given its legal authorities and 
responsibilities, TSA officials believed that the agency needed to act 
to preempt local jurisdictions from creating their own potentially 
conflicting regulations. Rail industry officials we spoke with said 
that they had supported this approach, having recognized that they 
would have to manage multiple requirements across the various 
jurisdictions that their trains carrying TIH traversed if local 
jurisdictions created their own regulations. According to TSA 
officials, the agency's ability to develop a broader strategy was also 
affected by the lack of personnel in its Freight Rail Program Office, 
which had only four permanent staff members assigned to it in 
2003.[Footnote 50] Given this staffing level, TSA officials said that 
they initially lacked the resources to develop a broader strategy that 
would include other risks, and that securing TIH shipments was a sound 
initial focus. Security officials we interviewed from six of the seven 
Class I railroads agreed that TIH security was a sound initial focus 
for TSA's freight rail security strategy, because TIH was a key 
security concern and remains a concern today.[Footnote 51] 

TSA describes its strategic focus on TIH in the Freight Rail Modal 
Annex, identifying the transportation of these commodities as having 
the greatest potential consequence to harm the public and the economy. 
However, while the annex has identified both the primary threat 
scenario and two systematic security gaps--namely, security awareness 
training and a lack of a robust, standardized corporate security 
planning for railroads--TSA has not addressed other risks that have 
been identified through threat, vulnerability, and consequence 
assessments. In particular, the annex does not contain an approach for 
mitigating threats to infrastructure, including major freight rail 
bridges, tunnels, and other assets, nor does it discuss cybersecurity 
risks, even though these risks have been identified collectively 
through TSA threat assessments, DHS IP vulnerability and consequence 
assessments, and the rail industry's nationwide rail risk assessment. 
For instance, freight rail stakeholders told us that if certain key 
bridges were destroyed, the flow of commerce could be severely 
affected, causing delays and shortages in the delivery of raw materials 
and other goods used for day-to-day living. Also, rail industry 
stakeholders said that replacing certain key bridges could take months 
and cost millions of dollars. Moreover, freight rail stakeholders told 
us that protecting computer networks and other information systems 
helps ensure that trains do not collide or switch lines improperly, 
which could cause derailments of hazardous materials and destruction of 
major infrastructure. Stakeholders also said that without restricting 
access to electronic information, such as waybills and other specific 
commodity information, terrorists could obtain this information to 
determine the location of TIH tank cars to target them and thereby 
maximize the impact of an attack on the surrounding population. 
[Footnote 52] 

The NIPP states that each SSA should consider threats, vulnerabilities, 
and consequences in developing its programs and activities. Moreover, 
since the Freight Rail Modal Annex's publication, the federal 
government enacted the 9/11 Commission Act, which specifies that the 
transportation modal security plan required under 49 U.S.C. § 114(s) 
(in this case, the Freight Rail Modal Annex) must include information 
on threats, vulnerabilities, and consequences for its respective mode. 
[Footnote 53] TSA has acknowledged that reflecting all identified 
threats to freight rail in the agency's strategy is important, and 
reported that the agency is in the process of reconsidering its 
security strategy to incorporate other threats as it updates its plan 
to meet the requirements of the NIPP.[Footnote 54] TSA officials stated 
that they intend to incorporate information from other security 
assessments that identify additional threats unrelated to TIH 
transportation, such as TSA OI's identification of cybersecurity as a 
potential target for a terrorist attack and DHS IP's prioritized 
critical infrastructure list. While TSA officials recognize that the 
focus of their actions has been limited to securing TIH shipments, they 
also told us that they understood their responsibility under ATSA for 
securing all aspects of the freight rail sector and were aware of the 
new requirements in the 9/11 Commission Act, which require the agency 
to take broader actions. As TSA matures and moves forward with its rail 
security efforts, a strategy that includes all threat, vulnerability, 
and consequence information will help the agency make more informed 
decisions and provide more comprehensive strategies. Furthermore, the 
9/11 Commission Act, signed into law in 2007, requires DHS to establish 
several programs aimed at strengthening freight rail security. These 
requirements will likely further influence TSA to expand its strategy 
and will also require the agency to have a greater regulatory oversight 
role.[Footnote 55] 

TSA's Freight Rail Modal Annex Does Not Fully Address Key 
Characteristics of a Successful National Strategy and Related Factors 
Outlined in Executive Order 13416: 

While TSA's Freight Rail Modal Annex contains some information that is 
consistent with our prior work on characteristics of a successful 
national strategy and that is called for by Executive Order 13416, it 
lacks other information that if incorporated, could strengthen the 
annex. Our prior work identified six key characteristics of successful 
national strategies, many of which are consistent with factors included 
in Executive Order 13416, which is directed specifically at 
strengthening surface transportation security.[Footnote 56] These 
characteristics can assist responsible parties, such as TSA, in further 
developing and implementing the nation's freight rail strategy, as well 
as enhancing its usefulness in resource and policy decisions to better 
ensure accountability. Where applicable, we also discuss relevant 
sections of Executive Order 13416 to highlight the importance of 
fulfilling these measures to strengthen the freight rail security 
national strategy. Table 4 briefly describes five of the national 
strategy characteristics and relevant Executive Order elements that are 
discussed further below.[Footnote 57] 

Table 4: Summary of Key Characteristics for a Successful National 
Strategy and Related Executive Order Factors: 

Purpose, scope, and methodology: 
Addresses why the strategy was produced, the scope of its coverage, and 
the process by which it was developed. A strategy might discuss the 
specific impetus that led to its creation, such as statutory 
requirements, executive mandates, or other events--like terrorist 
attacks. In addition to describing what it is meant to do and the major 
functions, mission areas, or activities it covers, a national strategy 
would ideally also outline its methodology, such as discussing the 
principles or theories that guided its development, what organizations 
or offices drafted the document, whether it was the result of a working 
group, or which parties were consulted in its development. 

Organizational roles, responsibilities, and coordination: 
Addresses which organizations will implement the strategy, their roles 
and responsibilities, and mechanisms for collaboration. This 
information considers who is in charge, not only during times of crisis 
but also during all phases of combating terrorism, including 
prevention, vulnerability reduction, and response and recovery. This 
entails identifying the specific federal entities involved and, where 
appropriate, the different levels of government or stakeholders, such 
as state and local governments and private entities. Executive Order 
13416 also calls for the Secretary of Homeland Security to develop 
modal annexes that include a description of the respective roles, 
responsibilities, and authorities of federal, state, local, and tribal 
governments. A strategy could also describe the organizations that will 
provide the overall framework for accountability and oversight, 
identify specific processes for collaboration, and address how any 
conflicts would be resolved. 

Goals, subordinate objectives, activities, and performance measures: 
Addresses what the strategy is trying to achieve, steps to achieve 
those results, as well as the priorities, milestones, and performance 
measures to gauge results. At the highest level, a strategy could 
provide a description of an ideal "end state," followed by a logical 
hierarchy of major goals, subordinate objectives, specific activities, 
and performance measures to achieve results.[A] Executive Order 13416 
directs TSA to evaluate the effectiveness and efficiency of current 
surface transportation security initiatives and calls for the annex to 
identify processes for assessing compliance with security guidelines 
and requirements and for assessing the need for revision of such 
guidelines and requirements to ensure their continuing effectiveness--
something that could be accomplished with defined performance measures. 

Resources, investments, and risk management: 
Addresses what the strategy will cost, the sources and types of 
resources and investments needed, and where resources and investments 
should be targeted based on balancing risk reductions with costs. 
Ideally, a strategy would identify criteria and appropriate mechanisms 
to allocate resources, such as grants, in-kind services, and loans, 
based on identified needs. Executive Order 13416 directs TSA to use 
security grants authorized by law to assist in implementing security 
requirements and guidelines issued pursuant to law. Pursuant to this 
characteristic, such grants may be included in the modal annex. 
Alternatively, the strategy might identify appropriate "tools of 
government," such as regulations, tax incentives, and standards, or 
stimulate nonfederal organizations to use their unique resources. 

Integration and implementation: 
Addresses how a national strategy relates to other strategies' goals, 
objectives, and activities and to subordinate levels of government and 
their plans to implement the strategy. For example, a national strategy 
could discuss how its scope complements, expands upon, or overlaps with 
other national strategies. Also, related strategies could highlight 
their common or shared goals, subordinate objectives, and activities. 
Executive Order 13416 requires that the modal annex identify existing 
security guidelines and requirements. A strategy could address its 
relationship to other agency strategies using relevant documents from 
implementing organizations, such as strategic plans, annual performance 
plans, or annual performance reports that the Government Performance 
and Results Act of 1993 (GPRA) requires of federal agencies. A strategy 
might also discuss, as appropriate, various strategies and plans 
produced by the state, local, or private sectors and could provide 
guidance, for example, on the development of national standards, to 
more effectively link the roles, responsibilities, and capabilities of 
the implementing parties. 

Source: GAO. 

[A] A goal (also known as a strategic goal or objective) constitutes a 
specific set of policy, programmatic, and management objectives for the 
programs and operations covered in the strategic plan, and serves as a 
framework from which the annual objectives and activities are derived. 
A goal is expressed in a manner that allows a future assessment to be 
made regarding whether the goal was or is being achieved. Subordinate 
objectives assist in focusing the mode's programs and activities to 
meet the goals. Activities are specific programs and actions to achieve 
the subordinate objectives. Performance measures are particular values 
or characteristics used to measure output or outcome of activities, 
objectives, and goals. 

[End of table] 

Purpose, Scope, and Methodology: 

Although TSA's Freight Rail Modal Annex identifies the purpose and 
scope of the annex and references several principal documents used to 
develop the annex--including the Freight Rail Government Coordinating 
Council (FRGCC) charter, the TSSP, and the NIPP--it does not describe 
the process or methodology that was used to develop the annex or who 
developed the annex. For example, the annex states that TSA's vision is 
to protect the nation's freight rail network from terrorist or criminal 
attacks and prevent terrorists or other criminals from using freight 
rail conveyances and their cargoes as weapons of mass effect to attack 
the public or critical infrastructure. The annex also discusses the 
scope and type of various federal and industry freight rail security 
efforts and aligns them with three broad DHS security goals for the 
transportation sector, as outlined in the TSSP.[Footnote 58] In 
addition, the TSSP also discusses the NIPP as the unifying structure 
for securing all of the various sectors, including transportation, and 
discusses several domestic and international terrorist attacks that 
have occurred as evidence of the various security risks to the 
transportation sector.[Footnote 59] However, the annex does not explain 
the methodology used in its development, as called for in our prior 
work on characteristics of a national strategy. For example, while the 
annex references the NIPP and TSSP as providing the principles or 
theories that guided its development, the annex does not describe the 
process and information that were used to develop the strategy or 
identify which organizations or entities contributed to its 
development, which could make the document more useful to the 
organizations responsible for implementing it, as well as to oversight 
organizations such as Congress. 

Organizational Roles, Responsibilities, and Coordination: 

The Freight Rail Modal Annex addresses this characteristic to only a 
limited degree. For example, while the annex identifies some 
stakeholder responsibilities, it does not identify lead, support, and 
partner roles as called for in Executive Order 13416. Specifically, the 
Freight Rail Modal Annex identifies some stakeholders' 
responsibilities, such as identifying FRGCC as the primary mechanism 
for establishing policies, guidelines, and standards, and that the 
council is to coordinate with industry through the Freight Rail Sector 
Coordinating Council (FRSCC). The annex also states that TSA, FRA, and 
PHMSA have signed MOUs to maintain good intragovernmental 
relationships, and identifies what entities were responsible for 
conducting past actions to secure freight rail. However, the annex does 
not identify the roles of federal and nonfederal stakeholders, such as 
the TSA Freight Rail Security Division, DHS IP, FRA, PHMSA, and the 
rail industry, in meeting identified freight rail security goals. The 
inclusion of these subjects in a freight rail security strategy could 
be useful to agencies and other stakeholders in fostering coordination 
and clarifying specific roles, particularly where responsibilities 
overlap or where there are security gaps. Defining specific roles and 
responsibilities is especially important given the multiple federal and 
industry stakeholders involved in securing freight rail and the scope 
and complexity of the rail network. 

Goals, Subordinate Objectives, Activities, and Performance Measures: 

In conformance with this characteristic, the Freight Rail Modal Annex 
identifies individual transportation sector-wide goals that apply to 
all modes of transportation, and it also identifies subordinate 
objectives to clarify how these goals will be met for the freight rail 
mode, as illustrated in table 5. For each subordinate objective, TSA 
presents information to explain what the agency, other federal 
components, or industry is doing to meet the subordinate objective. For 
instance, the agency identifies its Corridor Reviews and CSRs as 
activities to accomplish implementing flexible, layered, and effective 
security programs using risk management. 

Table 5: Sector Goals and Freight Rail Subordinate Objectives to 
Complete Sector Goals: 

Goals and objectives: Sector goal; 
Description: Prevent and deter acts of terrorism using or against the 
transportation system. 

Goals and objectives: Subordinate objectives; 
Description: 
* Implement flexible, layered, and effective security programs using 
risk management; 
* Increase vigilance of freight rail workers; 
* Enhance information and intelligence sharing among freight rail 
security partners. 

Goals and objectives: Sector goal; 
Description: Enhance resiliency of the U.S. transportation system. 

Goals and objectives: Subordinate objectives; 
Description: 
* Manage and reduce risk associated with key nodes, links, and flows 
within critical transportation systems to improve overall network 
survivability; 
* Enhance the capacity for rapid and flexible response and recovery to 
all-hazards events. 

Goals and objectives: Sector goal; 
Description: Improve the cost-effective use of resources for 
transportation security. 

Goals and objectives: Subordinate objectives; 
Description: 
* Align sector resources with the highest-priority security risks using 
both risk and economic analyses as decision criteria; 
* Ensure robust sector participation in the development and 
implementation of public sector programs for freight rail protection; 
* Ensure coordination and enhanced risk-based prioritization of 
research, development, testing, and evaluation efforts. 

Source: GAO analysis of TSA information. 

[End of table] 

While TSA has also developed performance measures for its freight rail 
program, their usefulness in helping the agency determine the extent to 
which its sector goals are being met is limited by the lack of key data 
to appropriately measure results and key elements typically associated 
with effective performance measures. Ensuring that all necessary data 
are included will help ensure that TSA is reporting consistent results, 
which could help the agency more effectively prioritize its and 
industry's resources for securing freight rail. In its Freight Rail 
Modal Annex, TSA includes an outcome measure--to cumulatively reduce 
the risk of TIH transportation in major cities by 50 percent by the end 
of 2008--that contains both a target, or goal, and a specific time 
frame for achieving the goal.[Footnote 60] The agency also established 
additional yearly targets for this measure to cumulatively reduce the 
risk of TIH by a total of 81 percent by the end of 2013.[Footnote 61] 
TSA considers this measure its key overall performance indicator for 
the freight rail security program, and has reported its progress in 
meeting this indicator to Congress on several occasions. However, we 
have concerns about this performance measure's reported results because 
TSA was unable to obtain critical data necessary to consistently 
calculate cumulative results for this measure over the time period for 
which it had calculated them--from 2005 to 2008. In particular, some 
baseline data needed to cumulatively calculate results for this measure 
are historical and could not be collected. As a result, the agency used 
a method for estimating risk for its baseline year that was different 
than what it used for calculating results for subsequent years. 

Although TSA made efforts to reconstruct the missing data as well as it 
could by conducting interviews with relevant rail officials and using 
its and industry's expert judgment to develop an estimated baseline, 
any results reported using this measure depend on the collective 
accuracy, judgment, and recollection of industry officials, rather than 
on the timely collection of the relevant data. Moreover, our analysis 
of the data that TSA collected for subsequent years (to calculate the 
changed condition in risk between the baseline and subsequent years) 
did not resolve our questions regarding the accuracy of the estimated 
baseline data. Specifically, in 2007, the first year TSA measured risk 
for this performance measure, the agency applied the same data estimate 
of 80 percent to 23 of the 45 cities assessed in place of the baseline 
2005 risk information it could not obtain.[Footnote 62] However, when 
TSA surface inspectors had conducted site visits to these same cities 
to gather this information, the data the inspectors gathered varied 
greatly by city raising questions regarding the validity of TSA's 
estimate and the appropriateness of applying the same estimate of risk 
uniformly to 23 cities. Furthermore, the agency was unable to account 
for any specific rail carrier actions that would explain why the data 
varied greatly by city and from the agency's original estimate. As a 
result, any cumulative results reported using this measure are of 
questionable accuracy because the agency did not calculate results 
consistently. This is particularly important because TSA has reported 
results from this measure to Congress--indicating that over a 60 
percent risk reduction had been achieved for freight rail from 2005 
through 2008. 

GPRA requires agencies to establish goals and targets to define the 
level of performance to be achieved by a program and express such goals 
in an objective, quantifiable, and measurable form.[Footnote 63] In 
addition, we have previously reported that to the greatest extent 
possible, performance measures should be reasonably free of significant 
bias or manipulation that would distort the accurate assessment of 
performance and should not allow subjective considerations or judgments 
to dominate the outcome of the measurement, which could distort the 
measure.[Footnote 64] Furthermore, performance measures should provide 
a reliable way to assess progress such that the same results would be 
achieved if applied repeatedly to the same situation. Likewise, errors 
in the accuracy of the data could skew the results and affect 
conclusions regarding the extent to which performance goals have been 
achieved. Therefore, the usefulness of agency performance information 
depends to a large degree on the reliability of performance data. While 
TSA had limited ability to collect some of the relevant data for its 
baseline year, the agency has been able to collect the relevant data in 
a timely manner since 2007. As a result, TSA would have the necessary 
data to consistently measure results on an annual basis and a 
cumulative basis--provided that the baseline year for any of these 
calculations is 2007 or later. This approach would allow TSA to produce 
reliable results for the key performance measure for its freight rail 
security program. Furthermore, while TSA made significant efforts to 
reconstruct and estimate the data it could not obtain, without more 
certainty about the data's accuracy and the resulting risk measures, 
TSA may not know the degree to which its and industry's security 
efforts have been effective. As a result, it may be less able to ensure 
the effective and efficient use of resources. Appendix III provides 
additional information on the data TSA was unable to obtain for this 
measure. 

In addition to concerns about measurable data for this performance 
measure, TSA lacks specific milestones or targets for its other three 
measures included in the Freight Rail Modal Annex and time frames for 
completing more long-term activities, such as TSA's reviews of freight 
railroad security plans and procedures. For example, one of the three 
performance measures listed in the annex is an output measure, the 
"number of completed Corridor Reviews in DHS-designated high-threat 
urban areas."[Footnote 65] However, TSA does not provide any targets or 
time frames for this measure to identify the number of Corridor Reviews 
the agency expects to complete or time frames to gauge progress toward 
completion. 

In addition, the subordinate objectives in the annex do not have 
performance measures associated with them to show progress in meeting 
the sector goals. For instance, as shown in table 5, TSA developed 
three subordinate objectives to show progress in meeting the third 
sector goal of improving the cost-effective use of resources for 
transportation security. However, the annex contains no performance 
measures or targets to link the effectiveness of these subordinate 
objectives in achieving the sector goal. We have previously reported 
that the linkage between long-term goals and subordinate objectives is 
important because without this linkage, agency managers and Congress 
may not be able to judge whether an agency is making annual progress 
toward achieving its long-term goals.[Footnote 66] GPRA also supports 
this point, stating that performance indicators are the reference 
markers used to measure whether a goal is being achieved and to measure 
output or outcome. 

Resources and Investments: 

While the Freight Rail Modal Annex has one section devoted to grant 
programs and identifies how the grants align with requirements in 
Executive Order 13416, it does not include freight rail security 
resources that originate in other programs, such as DHS IP's BZPP, 
which grants money to local authorities to protect critical 
infrastructure, nor does it identify priorities for allocating future 
grants. Including all resources and identifying priorities could help 
implementing parties allocate grants according to priorities and 
constraints, and could help stakeholders shift such investments and 
resources as appropriate. Such guidance would also assist Congress and 
the executive branch in developing more effective programs that 
leverage finite resources. 

Integration and Implementation: 

While the Freight Rail Modal Annex delineates mechanisms to facilitate 
stakeholder coordination, specifically the FRGCC and FRSCC, and 
discusses other relevant industry security plans, it does not address 
its relationship with strategic documents or activities of other 
federal agencies that have roles in freight rail security, such as 
those that guide DHS IP, whose responsibilities overlap with TSA's for 
protecting freight rail critical infrastructure.[Footnote 67] For 
example, the annex does not mention how DHS IP's initiatives, such as 
the BZPP and SAV assessments of freight rail assets, fit into TSA's 
overall strategy. In addition, the annex does not identify how it 
complements, relates to, or builds upon the NSTS required by the 
Intelligence Reform and Terrorism Prevention Act of 2004.[Footnote 68] 
Without such information in TSA's national strategy for freight rail 
security, the agency is missing opportunities to identify linkages with 
other developed strategies and other organizational roles and 
responsibilities and thus further clarify the relationships between 
various implementing parties, both vertically and horizontally, which, 
in turn, could foster more effective implementation. 

While TSA has addressed aspects of the executive order as well as key 
aspects of successful national strategies, more fully addressing the 
characteristics discussed above and taking steps to be more consistent 
with the provisions in Executive Order 13416 could assist TSA in 
further developing and strengthening its Freight Rail Security Modal 
Annex. These efforts could also enhance the strategy's usefulness in 
resource and policy decisions to better ensure accountability by making 
decision making more transparent and comprehensive. 

Federal Efforts Have Guided Voluntary Industry Actions and Generally 
Focused on TIH, but New Requirements Could Pose Challenges: 

Since September 11, 2001, federal and industry stakeholders have 
implemented a range of actions to secure the freight rail system, many 
of which have focused on securing TIH shipments and have been 
implemented by industry voluntarily. However, TSA's ability to assess 
the impact of various security efforts is limited because the agency 
lacks a mechanism to systematically track the actions being taken and 
evaluate their effectiveness. Furthermore, a variety of new regulations 
have recently been promulgated that will make some freight rail 
security actions mandatory. Implementing these new requirements as well 
as other security assessment and planning requirements stemming from 
the 9/11 Commission Act is expected to necessitate additional efforts 
and resources from both federal and industry stakeholders and may pose 
some implementation challenges, such as TSA's requirement for handlers 
of certain highly hazardous materials to implement steps to establish a 
secure chain of custody and control for railcars in their possession 
containing these materials. 

TSA and DOT Actions Have Been Primarily Focused on Mitigating TIH 
Threats and Have Been Presented to Industry as Voluntary Measures: 

In keeping with TSA's strategy, since September 11, 2001, most federal 
actions to enhance freight rail security have focused on mitigating the 
risk of transporting TIH materials over the freight rail system, and 
most of these efforts have been proposed as voluntary measures that 
industry could implement. Overall, federal agencies, including TSA, 
FRA, and PHMSA, have worked together and with the major private 
industry stakeholders, such as AAR and numerous individual rail and 
chemical companies, both large and small, to discuss, develop, and 
implement TIH risk-mitigating actions. For example, TSA worked closely 
with individual rail companies to develop and implement various 
voluntary risk mitigation strategies as part of its Corridor Reviews. 

TSA officials said that taking a voluntary approach allowed them to 
work collaboratively with industry to identify, tailor, and implement 
security actions in less time and with fewer resources than would have 
been needed to develop and implement TIH security regulations. For 
example, many of TSA's recommended actions provided to rail carriers 
through its Corridor Reviews were developed collaboratively with each 
rail carrier during TSA's on-site visits and were tailored to each 
carrier's specific operations. In addition, TSA's and DOT's voluntary 
security action items also provided rail carriers flexibility in their 
implementation and allowed rail carriers to adopt measures best suited 
to their particular circumstances. TSA officials told us that this 
approach allowed them to more quickly address identified security gaps, 
especially given the TIH risk and the open nature of the rail system. 
Both federal and industry officials acknowledged the inherent openness 
and accessibility of the rail system and also told us that it is 
extremely challenging to completely secure the rail system because of 
its size and the need for railcars to be able to continuously move on 
tracks and in and out of rail yards. Limited resources were also a 
factor in determining TSA's approach to working with the freight rail 
industry and heavy focus on TIH shipments, according to agency 
officials. As a result, agency officials reported focusing much of 
their time to finding ways to secure TIH rail shipments through 
implementing operational changes that required few resources. Key 
federal agency security actions taken since September 11, 2001, are 
summarized in table 6. Additional information is provided in appendix 
IV. 

Table 6: Key Federal Security Actions Taken since September 11, 2001: 

TSA Corridor Review recommendations: 
Through the Corridor Reviews, TSA identifies specific security actions 
that rail carriers can voluntarily adopt to reduce freight rail 
security risks involving TIH. TSA focuses its recommended actions at 
rail yards containing TIH, locations where TIH cars are exchanged, or 
other significant choke points where TIH railcars may stop and be 
vulnerable to tampering. TSA officials reported focusing more on 
recommending operational changes because they are often less costly for 
the railroads to implement than physical security upgrades. Generally, 
operational changes focus on reducing the amount of time TIH railcars 
remain on rail tracks or in rail yards located in major urban areas and 
on increasing the visibility of the cars by rail employees. 

Voluntary freight rail security action items for the rail 
transportation of TIH: 
TSA and DOT issued 24 action items in June 2006, which were developed 
in concert with key industry stakeholders and addressed system 
security, access controls, and en route security.[A] In November 2006, 
TSA and DOT issued an additional 3 action items, called supplemental 
security action items, which also focused on TIH rail shipments. TSA 
officials said that all 27 security action items were identified 
through the information and findings that TSA and DOT had gathered from 
previously conducted corridor reviews, site inspections, and security 
plan reviews. 

TSA surface transportation security inspectors (STSI): 
STSIs conduct on-site inspections of U.S. rail systems working 
collaboratively with freight rail carriers, the mass transit and 
passenger rail industry, and applicable local, state, and federal 
authorities to identify best security practices, evaluate security 
system performance, and discover and correct deficiencies and 
vulnerabilities in the industry's security systems, including 
noncompliance with mandatory security requirements.[B] For freight 
rail, STSIs have assessed the industry's implementation of 17 of the 
original 24 voluntary freight rail security action items, and have 
conducted site visits to rail yards in high-threat urban areas to 
assess the attended status of TIH railcars as part of TSA's TIH Rail 
Risk Monitoring Program. 

DHS grant funding: 
Since 2005, DHS has awarded a total of $7.5 million to the freight rail 
industry to develop a risk assessment tool intended to assist railroads 
in selecting safe and secure rail routes for their TIH shipments.[C] In 
addition, in 2008, DHS established the Freight Rail Security Grant 
Program (FRSGP), which provided $4.9 million in 2008 to six railroads, 
among other things, to provide for a training program and conduct 
vulnerability assessments.d Furthermore, through the end of 2008, FEMA 
officials told us that they have awarded about $4.6 million, through 
DHS IP's BZPP, for the purchase of security-related equipment to 
protect freight rail assets from terrorist attack.e DHS IP also created 
the National Capital Region Rail Pilot Project, which implemented a 
remote intelligent video security system through the Washington, D.C., 
rail corridor. DHS IP, TSA, and the rail industry plan to brief and 
demonstrate this project in other major cities to provide stakeholders 
with an overview the system's capabilities, and DHS intends to provide 
grant funding for installing similar systems in other cities. 

Source: GAO analysis of DHS, DOT, and industry data. 

[A] TSA and DOT coordinated with AAR and the American Short Line and 
Regional Railroad Association (ASLRRA) to develop the recommended 
security action items. System security and access control refer to 
practices affecting the security of the railroad and its property. En 
route security refers to the actual movement and handling of railcars 
containing TIH materials. 

[B] In response to a directive in the conference report accompanying 
the DHS appropriations act for fiscal year 2005, TSA established the 
Surface Transportation Security Inspection Program. This program works 
to build a collaborative working relationship with freight rail 
carriers, the mass transit and passenger rail industry, as well as 
applicable local, state, and federal authorities to identify best 
security practices, evaluate security system performance, and discover 
and correct deficiencies and vulnerabilities in the industry's security 
systems, including noncompliance with mandatory security requirements. 

[C] The Railroad Research Foundation, a not-for-profit research- 
oriented corporation, established in November 1999 and affiliated with 
AAR, has been overseeing the development of this project in 
coordination with federal stakeholders. 

[D] The FRSGP was created under the 9/11 Commission Act and is a new 
component of the Transit Security Grant Program. The FRSGP defines 
Security Sensitive Material as more than 2,268 kilograms in a single 
carload of a Division 1.1, 1.2, or 1.3 explosive; a tank car containing 
a TIH material, as defined in 49 C.F.R. § 171.8, including anhydrous 
ammonia, but excluding residue quantities of these materials; and a 
highway route-controlled quantity of a Class 7 (radioactive) materials 
as defined in 49 C.F.R. § 173.403. 

[E] Through BZPP, DHS provides grant money, through the states, to 
local law enforcement agencies, including railroad police, to purchase 
security-related equipment to protect rail assets. Examples of items 
purchased include chemical protective clothing, bulletproof vests, 
video surveillance equipment, and portable radios. Although DHS IP is 
responsible for the assessment, FEMA, as the final approver of the 
grant, ultimately awards the grant funding to the states. However, FEMA 
officials told us that they capture program expenditures differently 
than DHS IP. As a result, FEMA could not provide specific information 
for roughly $180,000 of the $4.8 million DHS IP officials told us had 
been disbursed through the program to protect freight rail assets. 

[End of table] 

While Many Industry Actions Focused on Securing TIH Rail Shipments, 
Other Actions Addressed Non-TIH-Related Security Threats: 

The freight rail and chemical industries have voluntarily taken various 
actions to secure TIH rail shipments even beyond what TSA has 
recommended, and some industry actions have addressed other identified 
freight rail security threats.[Footnote 69] For example, in addition to 
taking actions in response to TSA's recommendations resulting from the 
Corridor Reviews, some rail industry stakeholders we spoke with have 
implemented other types of operational and procedural changes to secure 
their TIH rail shipments, such as making modifications to procedures 
for how rail companies manage and schedule trains and railcars. These 
changes have largely focused on reducing the amount of time that TIH 
railcars remain on rail tracks or in rail yards located in major urban 
areas. Railroad officials we interviewed from six of the seven Class I 
railroads told us that they implemented these changes in response to 
TSA's and DOT's supplemental security action items--issued in November 
2006--and to address general federal, state, and local government 
concerns over the secure transportation of these materials. These 
railroad officials also stated that they had hoped their actions would 
preempt future local or state restrictions attempting to force them to 
reroute TIH and other highly hazardous materials rail shipments on to 
longer, less desirable rail routes. 

In addition, officials we met with from three railroads and two 
chemical companies stated that they had also taken steps to attempt to 
better track the movements of their TIH rail shipments by installing 
Global Positioning System technology on their locomotives and tank 
cars. The chemical industry is also leading an effort, in partnership 
with rail and federal stakeholders, to research ways to construct a 
rail tank car that is more resistant to rupture or breach in the event 
of a derailment or intentional attack. The most significant rail 
industry security action, however, has been the development of an 
industrywide security management plan. This plan, developed in 2001 by 
AAR in coordination with its member railroads and several chemical 
industry associations, did not exclusively focus on securing TIH but 
also addressed other threats, such as those to critical infrastructure 
and the security of critical railroad information. For example, the 
plan provides a ranking and prioritization of the industry's 
infrastructure that it deemed most critical, such as key bridges, 
tunnels, and operations centers. The plan also served as a template for 
individual railroads to follow in developing or modifying their own 
security plans. Individual rail and chemical companies have also 
undertaken efforts to implement various physical enhancements to their 
facilities, such as erecting fences and installing cameras at key rail 
yards, bridges, and tunnels. In addition to the security plan, AAR 
established the Rail Alert Network to coordinate alert-level security 
actions industrywide. These measures help to mitigate the risks not 
only from TIH, but other threats as well, for example, by helping to 
secure facilities and assets from destruction or sabotage, which could 
cause a degradation or shutdown of rail service. More information on 
the various security actions taken by industry since September 11, 
2001, is in appendix IV. 

While industry has taken a range of actions to better secure their rail 
networks, including making operational changes, furthering technology 
and research and development efforts, and implementing physical 
security upgrades at some facilities, industry stakeholders we met with 
stated that it is difficult to completely secure their networks because 
of the size and openness of the rail system.[Footnote 70] We also 
observed this inherent challenge during our site visits to various rail 
facilities. For example, while officials we interviewed from all seven 
Class I railroads and six short line railroads reported installing 
fencing at some of their rail facilities, such as intermodal yards and 
key business facilities, most of the rail yards we visited during our 
site visits did not have fencing, and most rail carriers told us that 
they did not consider fencing a cost-effective security measure. 
[Footnote 71] Specifically, larger rail yards, such as rail 
classification or switching yards where TIH cars would likely be 
located, can sometimes be over a mile or more in length, making them 
difficult to fence. Also, rail officials said that fencing is not a 
particularly difficult security measure to circumvent, and that it is 
difficult to completely fence a rail yard since trains need to be able 
to routinely move in and out.[Footnote 72] As a result, we observed 
rail carriers relying more heavily on other types of security measures 
at their larger facilities, such as surveillance cameras, enhanced 
lighting, random security patrols, promoting the awareness and 
vigilance of employees, and observation towers that could be used as 
security lookouts. However, although many of the larger yards we 
visited had observation towers, these towers sometimes did not provide 
a clear view of the entire yard. Figure 3 shows the view from an 
observation tower located in a rail yard we visited that regularly 
holds TIH railcars. 

Figure 3: View from Observation Tower at a Rail Yard: 

[Refer to PDF for image: photograph] 

Source: GAO. 

[End of figure] 

Although TSA Has Made Some Progress Measuring the Impact of Its 
Corridor Reviews, It Has Not Systematically Tracked or Assessed the 
Impact of Many Actions to Secure Freight Rail: 

While TSA has made some progress in measuring the degree to which rail 
carrier actions taken through the Corridor Reviews have reduced risks, 
it has not yet systematically tracked the full scope of actions being 
taken or assessed their impact on reducing risks. TSA recently 
implemented actions to determine the risk reduction achieved as a 
result of its recommendations made through the Corridor Reviews and 
subsequent railroad actions. For example, during its Chicago review in 
late 2007, TSA began documenting how rail carrier actions implemented 
at the time of TSA's Corridor Reviews have reduced risk by determining 
a risk score for each asset or location both before and after rail 
carrier actions were taken. In 2008, TSA reported that it began taking 
steps to follow up with rail carriers operating in some previously 
reviewed cities to identify any actions the carriers may have taken in 
response to prior Corridor Review recommendations, and to determine how 
those actions may have reduced risk for the corridor.[Footnote 73] 

However, TSA has not yet fully developed a process for systematically 
(1) following up with rail carriers about agency recommendations to 
determine the full scope of actions that rail carriers may have taken 
as a result of the Corridor Reviews, (2) documenting these actions, and 
(3) assessing their impacts on risk reduction. For example, officials 
at one Class I railroad we interviewed reported that they made an 
operational change in Buffalo, New York, to address a security 
vulnerability--involving loaded TIH cars being left unattended in a 
rail yard for up to 36 hours--that TSA identified during the Corridor 
Review in that region. However, TSA's Buffalo Corridor Review Summary 
Report developed after the Buffalo review did not explain the 
recommended action nor did it discuss any industry actions taken or 
their impact on reducing risk. While TSA officials reported being able 
to confirm some railroad actions though informal efforts--either 
through direct contact with railroad officials or through feedback from 
its STSIs during their visits to freight rail facilities--TSA has not 
established a formal process for agency program officials or inspectors 
to follow up on and track prior agency recommendations to determine if 
rail carriers had implemented them. Pursuant to Executive Order 13416, 
TSA is tasked with evaluating the effectiveness and efficiency of 
current federal government surface transportation security initiatives. 
In addition, Standards for Internal Control in the Federal Government 
calls for controls to be designed to ensure that an agency has relevant 
and reliable information about programs and that ongoing monitoring 
occurs.[Footnote 74] 

[Text box, separated from main report body: When we accompanied TSA's 
officials during their site visits to rail carriers in Chicago, we 
observed one rail carrier that prior to TSA's review, routinely stored 
loaded TIH railcars in an unmanned rail yard over the weekend to be 
delivered to a nearby customer facility on Monday mornings. As a 
result, the cars sat unattended for 2 days, posing a risk to the 
community. However, upon TSA's on-site recommendation, the railroad 
agreed to immediately change its operating procedures to store the cars 
during weekends at a yard that is manned 24 hours a day, 7 days a week. 
TSA then determined the degree to which this change reduced risk for 
the corridor.] 

TSA officials told us that implementing a process for following up on 
prior agency recommendations and confirming their implementation is a 
task that will likely be carried out by TSA's STSIs, as part of their 
new Corridor Review responsibilities in 2009. Specifically, TSA 
officials told us that STSIs are currently being trained to conduct 
future reviews in cities for which they already have inspection 
responsibilities. However, TSA officials told us that the STSIs are to 
lead reviews for cities with smaller rail networks, and that TSA 
headquarters officials are to remain the lead in conducting future 
reviews for cities with larger rail networks. TSA also said that 
headquarters officials are to continue to be the lead in conducting all 
future tabletop scoring sessions at the end of the reviews, which 
quantitatively score the risk posed by TIH rail shipments at various 
rail locations within a city. However, TSA said that it will likely be 
the STSIs' responsibility to follow up with rail carriers to confirm 
the implementation of agency recommendations resulting from the 
Corridor Reviews. While we believe that training the STSIs to take a 
more active role in future Corridor Reviews is a positive step toward 
better utilizing STSI local knowledge, it is too soon to know how 
effective the STSIs will be in this effort and in systematically 
determining the full scope of the actions being taken as a result of 
the Corridor Reviews and how those actions have reduced risk. 

TSA has also not yet assessed the impact of industry efforts to address 
identified security risks unrelated to TIH rail shipments as required 
by the NIPP. For example, railroads have taken action to better secure 
their bridges and tunnels, operations centers, and even their fuel 
depots, which, for example, contain millions of gallons of diesel fuel 
and are critical to railroad operations. Failing to protect these 
critical assets could impede the transportation of goods, possibly lead 
to loss of life, and have an economic impact, according to several 
industry officials we spoke with. Industry officials also reported that 
efforts to harden critical infrastructure are important to help reduce 
risk, and that some security enhancements they implemented were funded 
through DHS grants. While TSA has conducted CSR visits, which provide 
an opportunity to review railroad critical infrastructure information 
included in a company's security plan, these reviews do not provide the 
type of detailed information necessary to ensure that specific freight 
rail infrastructure assets, particularly those deemed nationally 
critical, are protected. For example, the DHS IP has taken action to 
identify freight rail assets that, if destroyed or disrupted, could 
cause national or regional catastrophic effects. However, TSA's CSRs do 
not provide any specific information on the level of overall security 
preparedness for these assets. Developing a mechanism to track the 
protective security measures being implemented and assess their impact 
on reducing risk could strengthen TSA's ability to determine the level 
of overall security preparedness within the system and use this 
information to effectively prioritize its resources. 

New Requirements Outline a Mandatory Approach for Securing Freight 
Rail, Which May Create Challenges for Some Stakeholders: 

While the majority of actions taken to secure freight rail have been 
taken on a voluntary basis, new TSA, PHMSA, and FRA regulations and the 
9/11 Commission Act herald a new approach that sets forth mandatory 
requirements, which may create challenges for both federal and industry 
stakeholders. On November 26, 2008, TSA, PHMSA, and FRA issued new 
regulations to enhance the security and safety of hazardous materials 
transportation via rail. PHMSA's regulation describes, among other 
things, steps that rail carriers must take to determine the safest and 
most secure routing of highly hazardous materials, while FRA's 
regulation describes the process the agency will follow in enforcing 
the PHMSA routing rule, TSA's regulation outlines steps that handlers 
of highly hazardous materials must take to establish a secure chain of 
custody and control for hazardous materials railcars in their 
possession. On April 1, 2008, PHMSA, in coordination with FRA, also 
proposed a regulation that would, if finalized, enhance safety 
performance standards for rail tank cars carrying certain highly 
hazardous materials, and on January 13, 2009, PHMSA, in coordination 
with FRA, issued a rule establishing interim standards for rail tank 
cars transporting TIH materials. TSA, PHMSA, and FRA officials with 
whom we spoke stated that many of the security-related requirements 
outlined in these rulemakings were derived from findings gathered 
during prior federal assessments and through federal inspections of 
rail carrier facilities. 

TSA officials also told us that their shift from a voluntary to a more 
regulatory approach for securing freight rail was the result of several 
factors, including the need to: 

* clarify federal authority with respect to rail security as well as 
authority for conducting security inspections at rail facilities; 

* preempt future state or local government efforts to regulate certain 
aspects of freight rail security, such as the routing of hazardous 
materials; 

* address certain rail carrier business operating practices that 
routinely created security vulnerabilities, such as how TIH railcars 
were exchanged; and: 

* formalize security measures that rail carriers had already 
implemented voluntarily and ensure that security measures are 
maintained by these companies and any others that enter the market. 

In addition, the 9/11 Commission Act provides a preview of other new 
requirements that federal and industry freight rail security 
stakeholders will face when these measures are implemented. Table 7 
summarizes these new and proposed requirements. More detailed 
information on these requirements and actions is contained in 
appendixes IV and VI. 

Table 7: Key Rulemakings and Legislative Requirements Affecting Freight 
Rail Security: 

PHMSA's rail safety and security rule: 
PHMSA's rule requires rail carriers, among other things, to take the 
following steps to enhance the safety and security of certain shipments 
of security-sensitive hazardous materials, including TIH: compile 
annual data on shipments of these materials; use the data to analyze 
safety and security risks along rail routes where those materials are 
transported; assess alternative routing options, including 
interchanging the traffic with other railroad carriers; seek 
information from state, local, and tribal officials regarding security 
risks to high-consequence targets along or in proximity to the routes; 
consider mitigation measures to reduce safety and security risks; and 
select the practicable routes that pose the least overall safety and 
security risks. FRA's enforcement rule discusses steps it may take to 
require a railroad to use an alternative route to the one selected by 
the railroad if FRA determines that the railroad's route analysis does 
not support the railroad's original selected route, that safety and 
security considerations establish a significant preference for an 
alternative route, and that the alternative route is commercially 
practicable. FRA's rule also establishes procedures to enable a 
railroad to challenge any rail routing decisions made by FRA.[A] 

PHMSA-proposed rail safety rule covering operations and tank car 
standards: 
PHMSA's proposed rail safety rule would enhance the performance 
standards for tank cars used to transport highly hazardous materials 
and implement operational restrictions to improve accident 
survivability and enhance the cars' resistance to rupture or puncture 
during a derailment. While this proposed regulation focused on safety, 
FRA officials we spoke with said that these enhancements would also 
have security benefits. Pending the completion of this rulemaking, 
PHMSA, in coordination with FRA, issued a rule on January 13, 2009, 
establishing enhanced performance standards for tank cars used to 
transport TIH and imposing a 50 miles per hour maximum speed 
restriction on all loaded TIH rail cars.[B] 

TSA rail security rule: 
TSA's rail security rule establishes general security requirements for 
rail entities and additional security requirements for entities dealing 
with certain hazardous materials, including TIH. The rule requires, 
among other things, certain rail carriers, shippers, and receivers to 
establish and provide for a secure chain of custody and control for 
railcars in their possession that contain the selected hazardous 
materials.[C] 

The 9/11 Commission Act: 
The act, signed into law on August 3, 2007, requires federal 
stakeholders to take several steps to further secure the freight rail 
system, including TIH shipments. For example, the act requires, among 
other things, that DHS complete a nationwide railroad risk assessment, 
assign each rail carrier to a tier of risk, and issue regulations 
requiring each carrier assigned to a high-risk tier to conduct a 
vulnerability assessment and implement a security plan. TSA must also 
establish standards and guidelines for developing and implementing 
these assessments and plans, and railroads assigned to a high-risk tier 
must submit the vulnerability assessments and security plans to TSA for 
approval. TSA must then review each assessment and plan, require 
amendments to any plan that does not meet the applicable requirements, 
and approve assessments and plans that meet the applicable 
requirements. The act also requires DHS to conduct a vulnerability 
assessment of railroad tank cars used to transport TIH materials and 
submit various progress reports to Congress.[D] 

Source: GAO analysis of DHS, DOT, TSA, and industry data. 

[A] Hazardous Materials: Enhancing Rail Transportation Safety and 
Security for Hazardous Materials Rail Shipments, 73 Fed. Reg. 72,182 
(Nov. 26, 2008); Railroad Safety Enforcement Procedures; Enforcement, 
Appeal and Hearing Procedures for Rail Routing Decisions, 73 Fed. Reg. 
72,194 (Nov. 26, 2008). 

[B] Hazardous Materials: Improving the Safety of Railroad Tank Car 
Transportation of Hazardous Materials, 73 Fed. Reg. 17,818 (Apr. 1, 
2008); 74 Fed. Reg. 1770 (Jan. 13, 2009). 

[C] Rail Transportation Security, 73 Fed. Reg. 72,130 (Nov. 26, 2008). 

[D] Specifically, the act requires that the NSTS include a 3-year and a 
10-year budget for federal transportation security programs that will 
achieve NSTS priorities, methods for linking the individual 
transportation modal security plans, and a plan for addressing 
intermodal transportation. 

[End of table] 

TSA's Rail Security Rule May Pose Challenges to Some Industry 
Stakeholders: 

Several industry stakeholders we spoke with raised concerns about TSA's 
requirement that certain rail carriers, shippers, and receivers of 
highly hazardous materials rail shipments implement operational 
procedures to provide for a secure transfer or chain of custody and 
control for these materials. Under this new rule, certain rail 
shippers, carriers, and receivers must take specific actions in certain 
circumstances, such as ensuring that a railcar is not left unattended 
while waiting for a transfer of custody, which, according to industry 
stakeholders, will likely create challenges for some rail carriers and 
receivers, particularly smaller ones. Officials from smaller rail and 
chemical companies that may be affected by this requirement expressed 
concern about the cost implications for their companies.[Footnote 75] 
For example, according to officials from smaller railroad and chemical 
companies, railroads typically do not run a set schedule, which can 
create problems in coordinating the exchanges of railcars between 
carriers and receivers. For those companies that do not operate on a 24-
hour schedule, the interchange or delivery of TIH cars during 
nonworking hours, or on holidays or weekends, can be problematic, and 
many of the smaller railroads and chemical companies do not operate on 
a 24-hour schedule, according to these officials. They also reported 
having limited staffing resources to coordinate these exchanges. 
Officials we spoke with from all seven Class I rail carriers commented 
that difficulties coordinating the exchanges of railcars with other 
carriers and customers will likely create resource and operational 
challenges for them as well. For example, officials stated that 
additional railroad personnel may have to be added to stay with the 
railcars until the exchanges can be made, or railcars may have to be 
returned to a local serving yard to ensure that they are attended, and 
these returned cars would then likely occupy track space until they 
could be redelivered at another time. This in turn could slow yard 
operations and the network, and railroad officials commented that 
railcars sitting idle in yards are not usually generating revenue for 
them. 

While industry officials with whom we spoke generally supported the 
secure chain of custody and control requirement in concept, officials 
from two Class I railroads we interviewed questioned its security 
benefit. Industry officials questioned the benefit in part because of 
the nature of railroad operations. For example, some trains can be up 
to a mile long, making it difficult for someone, or even a small group 
of people, to help secure railcars and respond to incidents. As a 
result, rail officials questioned whether this rule will significantly 
enhance the security of TIH railcars. However, TSA officials believe 
that loaded TIH railcars sitting unattended in highly populated areas 
present an unacceptable public risk. Furthermore, TSA's analyses, 
especially those derived from early Corridor Reviews, concluded that 
railroads, shippers, and receivers consistently lacked positive chain 
of custody and control procedures for railcars as they moved through 
the rail system and transferred from one entity to another. TSA 
officials stated that they had observed unattended TIH railcars, and in 
some cases trains, that rail carriers had left unattended for 
significant periods of time while awaiting eventual pickup by another 
rail carrier or the customer.[Footnote 76] Given the risk associated 
with TIH materials, TSA stated that requiring rail carriers to adopt 
this procedural change will mitigate this vulnerability during railcar 
exchanges and reduce risks to the public. 

Impact of PHMSA's Rule on Hazardous Material Route Selection Is 
Uncertain: 

It is uncertain what the impact of PHMSA's rule on enhancing the 
security and safety of certain hazardous materials rail shipments will 
be because the rule lacks direction and guidance for how rail carriers 
are to apply and weigh the risk criteria for conducting the required 
routing analysis. As a result, it is unclear to what degree rail 
carriers will consistently apply these criteria in conducting their 
analyses and making routing decisions. Specifically, the rule includes 
27 specific risk criteria, such as proximity to iconic targets and 
population density along the route, that rail carriers are required to 
consider and use when conducting their routing analyses. However, the 
rule does not contain any specific requirements, direction, or guidance 
for how rail carriers are to apply and weigh the 27 risk criteria when 
conducting their analyses. As a result, the impact of the required 
analysis and rule is uncertain, raising questions regarding how 
consistently the rail carriers will apply the criteria to their 
analyses or routing decisions to ensure that the safest and most secure 
rail routes are selected for their highly hazardous materials rail 
shipments. However, PHMSA officials stated that they rejected more 
prescriptive approaches to the routing analysis requirement because 
they believe that rail carriers are in the best position to identify 
and assess their systems and they expect carriers to make conscientious 
efforts to develop logical and defendable route selections using the 
criteria outlined in the rule. While PHMSA officials told us that they 
agree that how the criteria are weighted and used is an extremely 
important aspect of an overall safety and security risk assessment 
methodology, PHMSA officials believe that a one-size-fits-all approach 
to weighting the criteria provides insufficient flexibility for rail 
carriers to address unique local conditions or concerns.[Footnote 77] 

State and local governments and environmental groups have also raised 
concerns about the lack of definitive guidance in the rule on how to 
weigh the 27 criteria. Moreover, AAR stated that analyzing such factors 
as population density, venues, and proximity to iconic targets, as 
required under the rule, does not change the fact that railroad lines 
link cities and entities within some of these cities that require the 
delivery of some hazardous materials. As a result, the transportation 
of security-sensitive hazardous materials by rail will likely continue 
to occur on routes that pass through cities where people live and 
iconic targets exist regardless of the routing analysis results. For 
example, some chemical companies that use large amounts of TIH 
chemicals for their business processes are located in major cities, 
such as Newark, New Jersey. Also, many large rail-switching yards that 
break apart trains and rebuild new ones are also located in major 
cities. As such, many highly hazardous chemical railcars traverse major 
cities to either arrive at their final destinations, or are within 
major cities when added to trains headed to their final destinations. 

New Requirements in the 9/11 Commission Act and TSA's Regulations May 
Create Some Implementation and Resource Challenges for TSA: 

The new requirements under the 9/11 Commission Act are expected to 
create implementation and resource challenges for some federal and 
industry stakeholders given the extent of the requirements and, in some 
case, the short time frames required for their implementation. Many of 
the requirements fall under DHS's purview and several deadlines for 
implementing them have already passed. For example, the 9/11 Commission 
Act required TSA to complete a national railroad risk assessment by 
February 2008; however, TSA does not anticipate completing this 
requirement until the first quarter of 2009. Moreover, the 9/11 
Commission Act required TSA, by August 2008, to assign railroads to 
tiers of risk and issue regulations requiring each railroad carrier 
assigned to a high-risk tier to conduct a vulnerability assessment and 
then prepare, submit to the Secretary of Homeland Security for 
approval, and implement a security plan. However, TSA has not yet 
fulfilled this requirement. Officials said that because of the 
comprehensive scope of this and some other 9/11 Commission Act 
requirements, as well as the need to coordinate these actions with 
various entities as required by the legislation, many of the timetables 
provided in the 9/11 Commission Act have been difficult to meet. TSA 
officials also reported that for some of the requirements calling for 
TSA to develop and issue regulations, they are considering 
consolidating rulemakings across the freight rail, passenger rail, mass 
transit, and motor carrier modes, which will likely further increase 
the scope, complexity, and time required to complete these tasks. TSA 
officials told us that the scope of some of the requirements in the act 
and the short time frames they had in which to implement them were the 
primary reasons why the agency has missed some of the act's deadlines. 

The requirements in TSA's rail security rule and those included in the 
9/11 Commission Act may also create challenges for TSA's STSIs. 
Specifically, TSA program officials responsible for the STSI program as 
well as all three STSIs we met with during our site visits told us that 
their resources were already stretched thin, and new requirements for 
additional inspection activities would pose challenges. Although 
additional STSIs have been authorized and are expected to be added, 
given the STSIs' current responsibilities plus the future actions that 
may be required to enforce TSA's rule and the 9/11 Commission Act 
requirements for several surface transportation modes, TSA will likely 
face challenges prioritizing the STSIs' work to make the most efficient 
use of its personnel resources. For example, in addition to various 
freight rail security duties, STSIs' current responsibilities include 
carrying out various initiatives for passenger rail, such as conducting 
various on-site inspections of passenger rail facilities. Moreover, 
since 2006, TSA has significantly increased the frequency of its 
Visible Intermodal Protection and Response (VIPR) team operations, 
which the STSIs typically participate in and support.[Footnote 78] 
STSIs have seen their participation in these operations increase, 
thereby decreasing the time they have available to meet freight rail 
security requirements. However, TSA's rail security rule is expected to 
add to the STSIs' duties because they will likely be tasked with 
ensuring the freight rail carrier and chemical industries' compliance 
with the new secure chain of custody and control rule. In addition, 
STSIs may also be responsible for performing assessments of security 
plans, vulnerability assessments, and training programs required under 
the 9/11 Commission Act. Moreover, the 9/11 Commission Act requires TSA 
to conduct additional assessment activities on other surface modes, and 
TSA has reported that it plans to use its STSIs to conduct these 
activities as well. For example, STSIs are expected to be involved in 
the security reviews of the 100 most critical pipeline operators and to 
perform a number of highway-related activities, including documenting 
hazardous materials routes and tracking sensitive materials. 

The 9/11 Commission Act requires DHS to employ up to 150 STSIs in 
fiscal year 2008, up to 175 in fiscal year 2009, and up to 200 in 
fiscal years 2010 and 2011. While TSA reported that it met the 9/11 
Commission Act provision for hiring additional STSIs by the end of 
fiscal year 2008, many of its newly hired STSIs did not begin 
conducting field activities until early 2009, when they completed their 
training program. TSA also plans to dedicate a portion of its newly 
hired STSIs' workload to increased VIPR activities. Consequently, the 
additional manpower TSA plans to add to its STSI program may provide 
only limited relief to STSI field offices, which are already stretched 
thin according to some TSA officials. As a result, even with these 
additional resources, TSA's inspectors may face challenges in 
fulfilling their current and future responsibilities. 

Stakeholders Have Implemented Several Strategies to Coordinate Their 
Efforts to Secure the Freight Rail System, but Opportunities Exist to 
Improve Coordination between Federal Stakeholders and Their Sector 
Partners: 

While federal and industry partners responsible for freight rail 
security have improved coordination by implementing several agreements 
that clarify roles and responsibilities, and TSA has taken steps to 
ensure that key stakeholders are included in coordination activities, 
DHS can further enhance coordination activities by leveraging the 
resources of its other components. In addition, both federal and 
industry freight rail stakeholders have improved coordination by 
creating and participating in various information-sharing mechanisms, 
but FRA and TSA have not fully coordinated on some relevant inspection 
activities, which could potentially result in an inefficient use of 
already limited stakeholder resources. 

Federal and Industry Stakeholders Have Coordinated Activities and More 
Clearly Defined Roles and Responsibilities through Several Formal 
Agreements, but Coordination Challenges Remain: 

Multiple federal stakeholders have been working together since 2004 to 
define and agree on their respective roles and responsibilities for 
securing freight rail and have clarified their roles by establishing 
formal agreements; however, further coordination improvements can be 
made. In October 2005, we reported that agencies can strengthen their 
commitment to work collaboratively by articulating their agreements in 
formal documents, such as MOUs.[Footnote 79] DHS and DOT components 
have negotiated three annexes to the September 2004 MOU that better 
define their respective roles and responsibilities for securing freight 
rail, and have implemented strategies to facilitate the exchange of key 
security data and threat information. See table 8 for an overview of 
the agreements into which DHS, DOT, and industry have entered. 

Table 8: Key Agreements Signed Involving Federal Agencies and Their 
Industry Partners: 

DHS and DOT MOU: 
DHS and DOT signed an MOU in September 2004, followed by three annexes 
that better defined department and agency roles and responsibilities 
regarding freight rail security, among other things, and also described 
how the agencies would coordinate to fulfill their respective roles. 
The MOU stipulated that DHS has primary responsibility for 
transportation security, while DOT would assist DHS with implementation 
of DHS's security policies. 

Annex to DHS/DOT MOU related to TIH: 
In 2004, DHS and DOT signed the first annex, which described how each 
department and relevant component would implement the HSC's 2004 
recommendations regarding the safe transportation of TIH materials. 
Specifically, this annex states that DHS and DOT will, among other 
things, assess the vulnerabilities of high-population areas where TIH 
materials are moved by rail in significant quantities and work with 
industry to put measures in place to mitigate identified 
vulnerabilities. 

Annexes to DHS/DOT MOU related to TSA's coordination with FRA and 
PHMSA: 
In 2006, TSA signed two additional annexes to the MOU with FRA and 
PHMSA to better delineate areas of responsibility and promote 
coordination for hazardous materials transportation and freight rail 
security, respectively. Both annexes identify TSA as the lead federal 
agency for transportation security, including hazardous materials 
security. In addition, the annexes describe how TSA will coordinate 
with PHMSA and FRA, respectively, on certain program elements and 
initiatives to develop and implement a hazardous materials security 
strategy. Specifically, the annexes stipulate that the signatories 
agree to hold meetings as necessary at both headquarters and regional 
levels to discuss coordination of training for field inspectors, as 
well as coordination of inspection and enforcement actions to minimize 
disruption to entities being inspected and maximize inspector 
resources. 

Dow Chemical MOC: 
In 2006 and 2007, Dow Chemical Company initiated the execution of three 
memorandums of cooperation (MOC) to facilitate the joint development of 
a safer, yet cost-effective rail tank car for transporting hazardous 
materials. Dow Chemical is the lead for this project--called the Next 
Generation Tank Car project--and is working on it with FRA, TSA, 
Transport Canada,[A] Union Pacific, and Union Tank Car. According to 
Dow Chemical officials, the project is in the final phases of 
developing a prototype tank car that can withstand side impacts at four 
times greater speed than current tank cars, yet can hold equal volumes 
of material and travel under current track weight limits.b The MOC 
addresses how the stakeholders are to collaborate on the tank car's 
design. For example, the participants agree in the MOC to provide 
technical assistance for, and to participate in, various research 
tasks, and to share data, test results, and reports produced by the 
research with other participants. Dow Chemical is funding 75 percent of 
the project, while FRA is funding the remaining 25 percent. 

TSA's MOU with AAR and Railinc: 
In a separate collaboration effort between a federal agency and 
industry, TSA signed a 2007 MOU with AAR and Railinc, which stipulates 
that AAR and Railinc will provide industry data to TSA regarding the 
movements of TIH rail shipments inside major U.S. cities.[C] Access to 
these data has allowed TSA to measure the time period that loaded TIH 
railcars traverse or are located within a city's boundaries. TSA has 
been using these data since 2007 to assist in the agency's TIH Rail 
Risk Monitoring Program, which we discuss later in our report. 

Source: GAO analysis. 

[A] Transport Canada is the Canadian agency responsible for 
transportation safety and security. 

[B] Currently, track weight limits are 286,000 pounds on most railroad 
main lines. 

[C] Railinc is a wholly owned subsidiary of AAR, and maintains industry 
databases, applications, and services that are embedded in the rail 
industry's operations and financial systems. 

[End of table] 

DHS Agencies Can Do More to Leverage Other Component Agency Resources: 

While TSA has taken steps to coordinate various freight rail security 
efforts, some DHS component agencies still face challenges in 
effectively leveraging other components' resources. In October 2005, we 
reported that by assessing their relative strengths and limitations, 
collaborating agencies can identify opportunities to address resource 
needs by leveraging each other's resources, thus obtaining additional 
benefits that would not be available by working separately.[Footnote 
80] Under the NIPP, DHS IP has broad responsibility for coordinating 
critical infrastructure protection, and TSA, as the SSA for freight 
rail, has the lead in securing freight rail assets and systems and for 
developing the criteria that DHS IP uses to identify critical 
infrastructure for the transportation sector. However, DHS IP and the 
rail industry have completed much of the work assessing and securing 
freight rail infrastructure with little involvement from TSA. Although 
TSA and DHS IP coordinated their efforts for the 2006 Corridor Review 
and BZPP assessments in New Jersey, which resulted in some rail 
carriers obtaining funding under BZPP to implement some security 
actions in that city, TSA and DHS IP did not continue conducting these 
assessments collaboratively in other cities. TSA officials explained 
that DHS IP assessments focused on securing freight rail facilities and 
infrastructure while TSA Corridor Reviews focused on securing TIH rail 
shipments. However, some of the actions taken through DHS IP's 
assessments to secure freight rail yards may also have benefited the 
security status of TIH rail shipments being held in those yards. For 
example, through DHS IP's BZPP assessments in New Jersey, several 
railroads operating in New Jersey received funding for physical 
security enhancements, such as fencing and cameras, some of which were 
implemented at rail yards that routinely hold TIH. While TSA officials 
acknowledged the agency's responsibility for securing transportation 
infrastructure and said that they plan to develop ways to enhance 
freight rail infrastructure security, it is currently unclear how TSA 
will coordinate with DHS IP to balance this overlapping responsibility 
and ensure effective use of their respective resources. 

TSA and DHS IP also missed opportunities to leverage industry 
stakeholder resources concerning information on high-priority freight 
rail assets by not coordinating with relevant industry stakeholders, 
such as AAR. For example, although AAR reported sharing its 2001 
critical infrastructure list with DHS IP, AAR officials said that DHS 
IP did not share the list of freight rail assets included on its 
prioritized critical infrastructure list until 2008. According to DHS 
IP officials, this delay was due to their understanding that it was 
TSA's responsibility to share this information with industry 
stakeholders. Upon learning in 2008 that TSA was not doing this, DHS IP 
officials said that they decided to collaborate with industry 
stakeholders and at that time discovered that AAR's critical 
infrastructure list was different from its list. AAR also expressed 
concern that the DHS and industry lists did not agree; however, AAR 
officials said that they were not able to share the entire list with 
the federal government because of their concerns about the protection 
of this information as they had not yet resolved, with DHS IP, what the 
classification status of the AAR list would be once it is fully shared 
within the federal government. Additionally, the TSSP explicitly states 
TSA's responsibility for coordinating with the industry on identifying 
critical assets, and this lack of coordination between DHS and AAR 
affects their ability to jointly identify and agree on the most 
critical freight rail system assets. Establishing a coordination 
process to compare this information and reach consensus on the 
vulnerability and potential consequences associated with these assets 
could strengthen stakeholders' ability to effectively and efficiently 
enhance the security of these high-priority assets. 

Stakeholders Use Several Established Mechanisms to Share Threat and 
Other Security-Related Information, but TSA and FRA Have Not Conducted 
Joint Inspections: 

While both federal and industry stakeholders have used several 
established mechanisms to share threat and other security-related 
information, challenges remain in coordinating other efforts, including 
sharing inspection data and other information. A number of mechanisms 
have been established to share security-related information related to 
freight rail, such as the National Joint Terrorism Task Force, from 
which several of the railroad and chemical company officials we 
interviewed reported receiving freight rail security-related threat 
information. See table 9 for more details on the information-sharing 
mechanisms. However, TSA officials said that there is no specific 
threat against the freight rail system, which has resulted in their 
sharing limited freight rail security-related information with 
stakeholders. 

Despite these information-sharing mechanisms, FRA and TSA have not 
coordinated on sharing some key data, and TSA could better leverage 
FRA's resources related to information sharing. For example, TSA 
officials said that they do not request the data FRA collects through 
its rail carrier and chemical facility inspections because they believe 
these data are safety related and would not be useful. However, FRA 
officials stated that these data include deficiencies in security plans 
and training activities--information that could be particularly useful 
to TSA since the agency is currently developing a regulation to require 
high-risk rail carriers to develop and implement security plans and 
plans to continue conducting corporate security reviews of rail 
carriers' security plans in the future. Our past work has highlighted 
the need for agencies to share information regarding issues that cut 
across more than one agency, especially in high-risk areas, such as 
homeland security.[Footnote 81] Therefore, by not consulting FRA's 
data, TSA is missing an opportunity to better target its rulemaking 
efforts to areas where the railroads are more deficient. 

Although TSA and FRA signed an annex to the MOU in 2006 to improve 
coordination, in practice, TSA and FRA officials stated that 
coordination occurs more at the headquarters and regional levels and 
less at the field level. For example, both FRA and TSA field inspectors 
in four locations we visited told us that they do not conduct joint 
inspections with one another and are not regularly in contact with 
inspectors from the other agency. As both TSA and FRA inspectors will 
likely be responsible for enforcing their respective rules and 
conducting various other activities required under the 9/11 Commission 
Act, without effective coordination, they could miss opportunities to 
more efficiently conduct their work. However, after reviewing a draft 
copy of this report, FRA officials told us that they plan to conduct 
joint inspections with TSA in the future when FRA and TSA inspectors 
are fully trained on the new regulatory requirements recently issued by 
both PHMSA and TSA. 

Federal and Industry Stakeholders Have Developed Several Formal 
Committees and Other Entities to Coordinate Activities, and TSA Has 
Taken Steps to Include Key Stakeholders in These Activities: 

Industry stakeholders established multiple coordinating committees that 
have undertaken a range of issues of mutual concern, but not all 
relevant stakeholders participate in these committees. On the industry 
side, stakeholders, through several railroad and chemical industry 
associations, have taken the initiative to establish committees as 
recommended in the NIPP that provide opportunities for representatives 
from multiple organizations to discuss freight rail issues and share 
information. For example, both AAR and ASLRRA have established 
committees that focus on freight rail security issues. See table 9 for 
a description of the various formal committees and other established 
entities. 

Table 9: Formal Committees and Other Entities Established by Federal 
and Industry Stakeholders to Facilitate Coordination: 

AAR Railroad Security Task Force: 
AAR established this task force soon after the September 11, 2001, 
terrorist attacks. It comprised AAR members, including all Class I 
railroads; ASLRRA; and three chemical trade associations. It was 
responsible for development of the 2001 AAR industrywide security 
management plan. 

AAR Tank Car Committee (TCC): 
The TCC is responsible for developing and publishing mandatory 
specifications for the design, construction, maintenance, and safe 
operation of all rail tank cars used in North America. The TCC's 
membership includes representatives of AAR, AAR's member railroads, 
ASLRRA, the Railway Association of Canada, chemical industry 
associations, and tank car builders and owners. The TCC has authority 
to review applications for construction or modification of tank cars, 
and approve or deny them based on their consistency with DOT 
regulations. However, DOT has the authority to make all final policy 
judgments regarding any modifications.[A] 

Freight Rail Government Coordinating Council (FRGCC): 
TSA established FRGCC[B] in 2006 for federal freight rail security 
stakeholders to coordinate security strategies and activities; 
establish policies, guidelines, and standards; and develop program 
metrics and performance criteria.c FRGCC's membership includes TSA, 
DHS, FRA, and PHMSA, as well as the U.S. Coast Guard, U.S. Customs and 
Border Protection, the Surface Transportation Board (STB), the Federal 
Bureau of Investigation, and the Department of Defense (DOD). FRGCC 
meets quarterly, and has met approximately six times. One current FRGCC 
responsibility is to compile a nationwide risk assessment of rail 
carriers, as required by the 9/11 Commission Act. 

Freight Rail Sector Coordinating Council (FRSCC): 
The freight rail industry established FRSCC in 2005 as the private 
sector counterpart to FRGCC.[D] FRSCC is a self-organized, self-run, 
and self-governed council led by the presidents of AAR and ASLRRA. The 
council's membership consists of representatives of AAR, ASLRRA, all 
Class I rail carriers, Amtrak, four regional freight rail carriers, and 
two passenger railroads. According to AAR, FRSCC does not hold regular 
meetings because its membership duplicates a preexisting railroad 
industry security committee, which convenes regularly to discuss 
freight rail coordination. As a result, FRSCC's primary function is to 
convene formally to discuss freight rail security issues with FRGCC. 
While the committees have only met once jointly, a TSA official said 
that additional meetings will likely occur now that both TSA's and 
DOT's rail security rules have been finalized. 

Critical Infrastructure/Partnership Advisory Council: 
TSA established this council in 2006 in response to recommendations in 
the NIPP, and this advisory council was primarily a partnership between 
government and private sector CIKR owners and operators. Its purpose 
was to facilitate effective coordination of federal CIKR protection 
activities, such as planning, coordination, NIPP implementation, and 
operational activities, including incident response, recovery, and 
reconstitution. Its membership consisted of FRGCC members and 
representatives from AAR, ASLRRA, and all Class I railroads. However, 
the council's only activity was to develop the initial 24 security 
action items that TSA and DOT issued to enhance freight rail security. 

DHS Executive Steering Committee (ESC): 
DHS formed its ESC, comprising multiple federal agencies and DHS 
components, including DOT, the Department of Justice (DOJ), DOD, and 
TSA, to provide organizational oversight, guidance, and support to the 
DHS Freight Rail Security Program projects and pilot initiatives.[E] 
Activities under the program are to coordinate and support broader DHS 
security programs and objectives and assist government policymakers in 
making informed decisions to oversee the development and deployment of 
demonstration projects that offer the potential for long-term 
enhancement of freight rail security. According to DHS officials, input 
from the executive steering committee helped DHS to oversee the 
development of the rail corridor risk assessment tool.[F] 

Section 333 conference: 
Industry stakeholders have used this mechanism to discuss freight rail 
security for the purpose of coordinating rail carrier operations and 
facilities to achieve a more efficient, economical, and viable rail 
system.[G] The conference provides participants with immunity from 
antitrust liability for any discussions and agreements resulting from 
the conference that receive FRA approval. In November 2005, AAR and the 
American Chemistry Council (ACC) requested the first section 333 
conference to discuss ways to enhance the safe and secure transport of 
TIH materials. According to federal and industry officials, discussions 
have focused on TIH routing options and have included FRA, PHMSA, STB, 
DOJ, TSA, and railroad industry representatives. Chemical industry 
representatives have been involved in separate meetings. According to 
federal officials, although discussions have not resulted in routing 
changes that would enhance TIH shipment security, the railroads have 
made operational changes, such as improving the efficiency of their 
service. Section 333 meetings were suspended pending the issuance of 
DOT's final rule regarding the rail routing of TIH materials. 

Source: GAO analysis of DHS, DOT, and industry data. 

[A] 49 C.F.R. § 179.4 stipulates that the AAR TCC will review all 
proposed changes and specifications for tank cars, and the resulting 
recommendations will be considered by DOT in determining appropriate 
action. 

[B] Government coordinating councils comprise representatives of the 
SSAs; other federal departments and agencies; and state, local, and 
tribal governments. 

[C] As the SSA for freight rail security, TSA has primary 
responsibility for establishing formal mechanisms for coordinating on 
security issues, such as government coordinating councils and advisory 
councils, in accordance with the NIPP and TSSP. 

[D] According to AAR, FRSCC was created in March 2005; however, it was 
not officially recognized by DHS until August 2006. 

[E] The Freight Rail Security Program is a federally funded, DHS public-
private partnership dedicated to assessing policies and technologies 
for enhancing security throughout the freight rail industry. 

[F] See appendix IV for a full description of the Web-based security 
tool. 

[G] 49 U.S.C. § 333 authorizes the Secretary of Transportation, at the 
request of one or more railroads, to convene a conference on a proposed 
coordination or unification project. The law also relieves participants 
in such a conference from liability under antitrust laws for any 
discussions at the conference or agreements that are reached at the 
conference that are entered into with the approval of the Secretary. 
The Secretary has delegated this authority to the FRA Administrator. 

[End of table] 

While TSA has no official role in determining the membership of 
industry sector coordinating councils, TSA recognized the importance of 
including the chemical industry in FRGCC/FRSCC discussions about 
freight rail security and has attempted to encourage wider 
representation on FRSCC. FRSCC does not include chemical trade 
associations or companies in its membership, and AAR stated that the 
council's membership should not include the chemical industry as it is 
a railroad customer and the sector coordinating councils should remain 
separate to protect information that should remain discrete. However, 
according to AAR, in 2008, the FRSCC and the chemical sector 
coordinating council created a joint task force to address matters 
related to the security of hazardous materials transportation by rail. 
A chemical industry trade association representative has expressed an 
interest in being included in FRSCC's membership, stating that not 
allowing the chemical companies to participate in FRSCC limits their 
opportunities to discuss legitimate security concerns with freight rail 
companies. TSA invited representatives of rail shipper organizations, 
such as chemical trade associations, to serve as subject matter experts 
at the first joint meeting between the two councils in September 
2007.[Footnote 82] While the NIPP requires sector coordinating council 
membership to be representative of a broad base of owners, operators, 
associations, and other entities within a sector, the sector 
coordinating councils are organized and run by the private sector. 

In addition to establishing formal coordination mechanisms, DHS and DOT 
reported that they frequently coordinate informally with various 
industry and federal partners. For example, both TSA and DOT officials 
said that they have communicated informally by phone or e-mail several 
times a month as issues arose, and that they coordinated in developing 
their respective rail security rulemakings. Moreover, TSA officials 
reported that they have also coordinated informally with industry on 
several matters. For example, TSA reported coordinating with rail 
carriers on-site during rail facility inspections and during Corridor 
Review assessments to determine actions that rail carriers could 
implement to address identified vulnerabilities. In addition, TSA 
officials said that they coordinated with rail carriers to schedule and 
conduct agency reviews of rail carrier corporate security plans and 
procedures. Finally, TSA officials said that they often communicated 
informally with AAR through unscheduled phone calls to discuss relevant 
issues, and that they often received briefings from AAR on various 
industry activities. 

Conclusions: 

Because of its vast size and openness, securing the nation's freight 
rail network is a monumental task that requires a coordinated effort by 
numerous stakeholders, and we commend TSA for the efforts it has 
undertaken to address this security challenge. TSA's strategy for 
securing freight rail by reducing threats to TIH shipments has been a 
reasonable initial approach when considering the serious public harm 
that TIH materials potentially pose to the public, the results of early 
assessments, and the freight rail security program's limited resources. 
However, given the importance of the U.S. freight rail system to the 
national economy, the potential for other rail security risks to be 
exploited, and the new broadening legislative and regulatory 
requirements, TSA should expand its focus to threats beyond TIH. This 
effort should include developing estimates of the likelihood of various 
threats occurring to the freight rail system. In addition, while TSA's 
2007 Freight Rail Modal Annex represents a positive step toward better 
conveying TSA's strategy for securing the freight rail mode, it lacks 
important details needed to provide all stakeholders with a clear and 
measurable path forward. The inclusion of clearly defined stakeholder 
roles and responsibilities could be useful to agencies and other 
stakeholders in fostering coordination and in helping to ensure that 
certain roles are carried out, particularly where responsibilities 
overlap. Additionally, the weakness of one performance measure and the 
lack of targets for the others identified in the annex inhibit TSA's 
and others' ability to evaluate their progress in achieving the 
strategy's vision. The weakness in TSA's performance measure for 
reporting TIH risk reduction is of particular concern. While we 
recognize TSA's constructive efforts to develop its 2005 baseline data, 
we have concerns about data reliability and inconsistency in how TSA 
measured its risk reduction results. Since 2007, however, TSA has been 
able to collect the necessary data and has used them to develop a 
better approach--with a more consistent methodology--for measuring its 
progress and reporting results. We believe that TSA, the public, and 
Congress would be better informed if, going forward, TSA were to use 
this new approach with the 2007 data serving as its baseline measure. 
Although this limits TSA's ability to report on early actions taken to 
secure freight rail, under the new approach TSA could set new targets 
and have better assurance that the agency is more accurately measuring 
future progress in reducing TIH risks. Also, the lack of specific time 
frames in the annex for program completion hinders accountability by 
not clearly setting expectations for when security gaps should be 
addressed. Ensuring that the updated annex includes information on its 
development, including the entities that contributed to its development 
and the methodology they used, could also strengthen it and make it 
more useful to interested parties. 

In addition, TSA has not systematically tracked the various actions 
taken to secure freight rail, nor has it assessed the degree to which 
those actions have mitigated identified security risks. Developing a 
mechanism to track these actions and assess their impact on risk could 
strengthen TSA's ability to determine the level of overall security 
preparedness within the system and to use this information to 
effectively prioritize its resources. Additionally, TSA and industry's 
efforts thus far in voluntarily working together to secure freight rail 
in the absence of significant federal rail security regulations have 
been noteworthy. Although they did not initially include all relevant 
stakeholders, TSA's Corridor Reviews were a positive step toward 
enhancing awareness of the specific risks that TIH rail shipments posed 
in major cities. These reviews also strengthened relationships among 
rail stakeholders and resulted in industry actions that helped to 
secure TIH shipments. However, a significant transition lies ahead. The 
implementation of new federal requirements will alter the current 
approach for securing freight rail from a voluntary to a more 
regulatory approach, and it will be important for both TSA and industry 
stakeholders to manage this transition successfully. We also recognize 
the inherent challenge of securing nonfixed assets, such as TIH rail 
cars, as they travel throughout the United States. However, the 
implementation of new federal requirements will present new challenges 
for both TSA and industry stakeholders. To meet these challenges, it 
will be important for TSA to engage federal and industry partners in 
ensuring that the actions taken to secure freight rail are both 
effectively and efficiently targeted toward risk reduction. 

Finally, since multiple stakeholders share responsibility for securing 
freight rail, differences in missions, cultures, and established ways 
of doing business can impede coordination. The involvement of numerous 
stakeholders in securing freight rail highlights the importance of 
federal agencies working together to facilitate appropriate access to 
relevant information and resources to ensure efficiency and avoid 
duplication of efforts. While coordination efforts thus far have been 
generally positive, establishing a coordination process to ensure that 
all relevant threat, vulnerability, and consequence assessments are 
shared and field inspector resources are fully leveraged could 
strengthen the federal government's ability to ensure the security of 
freight rail. Given the additional responsibilities under the 9/11 
Commission Act and new regulations, federal and industry cooperative 
efforts remain important. 

Recommendations for Executive Action: 

To ensure that the federal government's strategy for securing the U.S. 
freight rail system fully addresses factors in Executive Order 13416 
and contains characteristics we identified as key to successful 
national strategies, and to better ensure that TSA is able to 
successfully prioritize its resources and assess the progress of 
federal and industry efforts to secure the freight rail system from 
acts of terrorism, we are recommending that DHS's Assistant Secretary 
for the Transportation Security Administration take the following five 
actions: 

* To ensure that the federal strategy to secure the freight rail system 
is comprehensive and considers a wider range of risk information, 
develop a plan for addressing identified security threats to freight 
rail other than TIH, such as destruction of or sabotage to freight rail 
bridges and tunnels and cyberattacks to the rail system, and 
incorporate this information and other related strategic updates into 
TSA's Freight Rail Modal Annex. As part of this effort, further 
evaluate methods for estimating the likelihood of various threats 
occurring and ensure that this information is also considered when 
developing future risk assessments and strategic updates. 

* To better ensure that relevant federal and industry partners 
effectively leverage their resources to achieve the strategic vision of 
TSA's Freight Rail Modal Annex, ensure that future updates to TSA's 
annex more comprehensively address factors contained in Executive Order 
13416 and identified key characteristics of a successful national 
strategy, including: 

- describing the methodology used to develop the strategy and which 
organizations and entities contributed to its development; 

- more clearly defining federal and industry roles and 
responsibilities; 

- ensuring that performance measures have defined targets and are 
linked to fulfilling goals and objectives; 

- more systematically addressing specific milestones for completing 
activities and measuring progress toward meeting identified goals; 

- more thoroughly identifying the resources and investments required to 
implement the strategy, including priorities for allocating future 
grants; and: 

- more comprehensively identifying linkages with other developed 
strategies, such as those that guide DHS IP, whose responsibilities 
overlap with TSA for protecting freight rail critical infrastructure. 

* To ensure that TSA is consistently and accurately measuring agency 
and industry performance in reducing the risk associated with TIH rail 
shipments in major cities, take steps to revise the baseline year 
associated with its TIH risk reduction performance measure to enable 
the agency to more accurately report results for this measure. 

* To ensure that TSA is able to more effectively assess the progress 
being made in securing freight rail, balance future activities against 
the various security risks to freight rail, and use its and industry's 
resources in the most cost-effective manner, take steps to more fully 
track and assess the implementation and effectiveness of security 
actions being taken to secure freight rail. 

* To better ensure that federal agencies are coordinating as 
effectively as possible, work with federal partners, such as DHS IP and 
FRA, to ensure that all relevant assessments and information are shared 
and TSA and FRA field inspector resources are fully leveraged. 

Agency Comments and Our Evaluation: 

We provided a draft of this report to DHS, DOT, and DOD on February 23, 
2009, for review and comment. DOD did not provide comments, and DOT 
provided technical comments that we incorporated as appropriate. DHS 
provided written comments on April 7, 2009, which are reprinted in 
appendix VII. In commenting on the report, DHS reported that it 
concurred with all five recommendations and discussed actions it has 
taken or planned to take to implement them. However, the actions DHS 
reported taking or planned to take, while relevant, do not fully 
address the intent of two of the five recommendations. DHS also 
provided summary information on freight rail security actions that it 
has taken in recent months or intends to take in the future. 

With regard to our first recommendation that TSA develop a plan for 
addressing identified security threats to freight rail other than TIH 
and further evaluate methods for estimating the likelihood of various 
threats occurring, DHS stated that it concurred with the 
recommendation. DHS also reported that it is currently developing an 
initiative to address the security of critical railroad infrastructure 
and to assist in this effort has developed a draft tool designed to 
measure the criticality and vulnerability of freight rail 
infrastructure. DHS added that it is coordinating this effort with and 
collecting input from freight rail industry stakeholders, which will be 
further developed through future updates to TSA's freight rail security 
strategy. We support TSA's efforts to expand its strategy beyond TIH by 
beginning to address the security of critical railroad infrastructure; 
however, these actions alone will not fully address the intent of our 
recommendation. We believe it is also important for TSA to address 
additional identified security threats in future updates to its 
strategy, such as cyberattacks to the rail system, and to further 
evaluate methods for estimating the likelihood of various identified 
security threats occurring. Without taking steps to more fully address 
other identified security threats, TSA cannot ensure a comprehensive 
freight rail security strategy moving forward, and finding ways to 
better estimate the actual likelihood of various freight rail security 
threats occurring, as directed by the NIPP, could help TSA better 
assess overall risks to freight assets and to the system. 

With regard to our second recommendation that TSA ensure that future 
updates to its Freight Rail Modal Annex more comprehensively address 
factors contained in Executive Order 13416 and those identified as key 
characteristics of a successful national strategy, DHS stated that it 
concurred with the recommendation. DHS also stated that it endorses the 
elements detailed in the recommendation and will incorporate them into 
future updates of its Freight Rail Modal Annex, which will be designed 
to more specifically address elements such as stakeholder roles and 
linkages, goal-oriented milestones, performance measures, and future 
resource requirements. We believe that incorporating these elements 
into DHS's updates of its Freight Rail Modal Annex will enhance its 
usefulness in resource and policy decisions and better ensure 
accountability by making decision making more transparent and 
comprehensive. 

With regard to our third recommendation that TSA take steps to revise 
the baseline year associated with its TIH risk reduction performance 
measure to ensure that the agency is consistently and accurately 
measuring its and industry performance in reducing the risk associated 
with TIH rail shipments in major cities, DHS stated that it concurred 
with the recommendation. DHS also reported that TSA recognizes the 
importance of establishing outcome-based performance measures and will 
establish a new 12-month baseline with empirical and quantified data, 
and that current year performance will be compared to the new baseline 
period and scored to determine variance from year to year. 
Additionally, in an effort to maintain consistency, and to discern the 
effectiveness of the voluntary security action items, DHS stated that 
TSA will also continue to measure and score current performance and 
compare it to the original baseline year (the 12-month period preceding 
the adoption of the security action items from June 2005 through May 
2006), but in doing so will provide sufficient information regarding 
possible data limitations. We recognize TSA's interest in capturing 
early efforts by agency and industry officials to secure TIH within the 
freight rail system and agree that given the potential limitations in 
these data and the resulting differences in how results are calculated 
from this initial baseline year compared to subsequent year 
calculations, that discussions of data limitations would be helpful. 
This type of disclosure would help to avoid potential confusion that 
could result from TSA using this additional measure, if TSA reports 
this measure externally. Such action would also be consistent with best 
practices in performance reporting. 

With regard to our fourth recommendation that TSA take steps to more 
fully track and assess the implementation and effectiveness of actions 
being taken to secure freight rail, DHS stated that it concurred with 
the recommendation. Specifically, DHS stated that TSA will continue to 
track industry adoption and implementation of the security action items 
and plans to gain additional perspective by measuring annual TIH risk 
reduction performance against the previous year to determine the 
efficacy of freight rail initiatives and actions as they are being 
implemented. In addition, DHS said that TSA's Corporate Security 
Reviews will also provide insights into improvements that freight 
railroads have implemented. While we support TSA's ongoing efforts to 
assess progress in reducing TIH risks in high-threat urban areas, these 
actions will not fully address the intent of our recommendation. We 
believe it is important for TSA to also assess the implementation and 
effectiveness of security actions resulting from its individual 
programs, such as the Corridor Reviews, which will allow the agency to 
better weigh the benefits and costs of the various programs that have 
been implemented to secure freight rail. Specifically, TSA should, for 
example, ensure that its and industry's efforts to develop and 
implement specific security actions through the Corridor Reviews be 
fully documented in TSA Corridor Review reports, which the agency has 
begun to do recently. Furthermore, while TSA's Corporate Security 
Reviews provide valuable insights into security improvements being 
implemented by freight railroad carriers, these reviews currently do 
not provide the type of detailed information necessary to ensure that 
specific freight rail assets, particularly those on DHS IP's 
prioritized critical infrastructure list, are effectively protected. As 
such, we believe that tracking the specific security measures being 
implemented for these high-priority freight rail assets is an important 
factor in determining the overall level of security preparedness within 
the system and should be addressed in future Corporate Security Reviews 
or other related efforts. 

With regard to our fifth recommendation that TSA more closely work with 
federal partners, such as DHS-IP and FRA, to ensure that all relevant 
assessments and information are shared and that TSA and FRA field 
inspector resources are fully leveraged, DHS concurred with the 
recommendation and said that the government coordination process 
continues to mature and develop and that it recognizes the importance 
of having and maintaining strong working relationships with other 
government agencies. DHS also stated that it recognizes the need to 
specifically define roles and responsibilities with all freight rail 
security stakeholders, including industry and federal, state, local, 
and tribal governments, and will use the Freight Rail Modal Annex to 
define specific stakeholder roles and responsibilities. In addition, 
FRA told us in its technical comments that it plans to conduct joint 
inspections with TSA in the future when FRA and TSA inspectors are 
fully trained on the new regulatory requirements recently issued by 
both PHMSA and TSA. We support TSA, DHS IP, and FRA efforts to better 
coordinate relevant information and inspector resources and better 
define stakeholder roles and responsibilities and believe that these 
efforts will help to ensure that relevant assessments and information 
are shared among key federal freight rail security stakeholders, TSA 
and FRA field inspector resources are fully leveraged, and specific 
stakeholder roles and responsibilities are better defined. 

As agreed with your offices, unless you publicly announce the contents 
of this report earlier, we plan no further distribution until 30 days 
from the report date. At that time, we will send copies to the 
Secretary of Homeland Security, the Secretary of Transportation, the 
Secretary of Defense, the Assistant Secretary of the Transportation 
Security Administration, and appropriate congressional committees. In 
addition, this report will be available at no charge on the GAO Web 
site at [hyperlink, http://www.gao.gov]. 

If you or your staff members have any questions about this report, 
please contact me at (202) 512-3404 or berrickc@gao.gov. Contact points 
for our Offices of Congressional Relations and Public Affairs may be 
found on the last page of this report. Key contributors to this report 
are listed in appendix VIII. 

Signed by: 

Cathleen A. Berrick: 
Managing Director: 
Homeland Security and Justice: 

[End of section] 

Appendix I: Objectives, Scope, and Methodology: 

Objectives: 

To assess the status of federal and industry efforts to secure the 
freight rail system, we addressed the following questions: (1) To what 
extent have federal and industry freight rail stakeholders assessed the 
risks to the nation's freight rail network, and has the Transportation 
Security Administration (TSA) developed a risk-based strategy-- 
consistent with applicable federal guidance and characteristics of a 
successful national strategy--for securing the system? (2) What actions 
have federal and industry stakeholders taken to secure freight rail 
systems since September 11, 2001; to what extent has TSA monitored 
their status and effectiveness; and what, if any, challenges hinder the 
implementation of future actions? (3) To what extent have federal and 
industry stakeholders coordinated their efforts to secure the freight 
rail system? 

Scope and Methodology: 

To collectively address all three questions, we reviewed freight rail 
security-related laws, regulations, and executive directives. We also 
reviewed reports on topics related to freight rail security that were 
previously issued by us, the Congressional Research Service, and 
federal and freight rail industry stakeholders. In addition, we 
reviewed reports we previously issued on government management 
requirements, best practices, and internal controls. We interviewed 
freight rail security stakeholders from federal, state, and local 
governments, as well as representatives from the freight rail industry. 
A complete list of the agencies and organizations visited and contacted 
are in table 10. Below the table, we outline the specific steps taken 
to answer each objective. 

Table 10: Names and Locations of Organizations Contacted: 

Federal agencies: 

Department of Homeland Security; 
* Transportation Security Administration, including the Office of 
Intelligence; Freight Rail Transportation Sector Network Management 
office; Surface Transportation Security Inspector Program officials in 
Washington, D.C.; and surface transportation security inspectors in New 
Orleans, Chicago, New Jersey, and Houston; 
* Office of Infrastructure Protection, Washington, D.C.; 
* Homeland Infrastructure Threat and Risk Analysis Center, Washington, 
D.C.; 
* Federal Emergency Management Agency Grants Programs Directorate, 
Washington, D.C. 

Department of Transportation; 
* Federal Railroad Administration in Washington, D.C. (including the 
Office of Safety Assurance and Compliance, Hazardous Materials 
Division, Office of Chief Counsel, and Federal Railroad Administration 
field inspectors in Newark, New Jersey, and Chicago); 
* Pipeline and Hazardous Materials Safety Administration, Office of 
Hazardous Materials Standards, Washington, D.C.; 
* Surface Transportation Board, Washington, D.C. 

State and local government: 

* National Association of Counties, Washington, D.C.; 
* National Conference of State Legislators, Washington, D.C.; 
* New Jersey Office of Homeland Security and Preparedness, Hamilton, 
New Jersey. 

Private sector: 

Railroad industry groups; 
* Association of American Railroads, Washington, D.C.; 
* American Short Line and Regional Railroad Association, Washington, 
D.C.; 
* Railroad Research Foundation, Washington, D.C. 

Railroads; 
* Burlington Northern Santa Fe Railroad Company, Houston, Texas; 
* Canadian National Railroad, Baton Rouge, Louisiana; 
* Canadian Pacific Railroad, Chicago, Illinois; 
* Conrail Shared Assets, Newark, New Jersey; 
* CSX Railroad, Baltimore, Maryland; 
* East Jersey Railroad Company, Bayonne, New Jersey; 
* Kansas City Southern Railway Company, Baton Rouge, Louisiana; 
* Morristown & Erie Railway, Morristown, New Jersey; 
* New Orleans and Gulf Coast Railway, Westwego, Louisiana; 
* New Orleans Public Belt Railroad, New Orleans, Louisiana; 
* New York New Jersey Railroad, West Seneca, New York; 
* Norfolk Southern Corporation, Atlanta, Georgia; 
* Port Terminal Railroad Association, Houston, Texas; 
* Union Pacific Railroad, Spring, Texas. 

Chemical company industry groups; 
* American Chemistry Council, Arlington, Virginia; 
* The Chlorine Institute, Arlington, Virginia; 
* The Fertilizer Institute, Washington, D.C. 

Chemical companies; 
* BASF Corporation, Florham Park, New Jersey; 
* Dow Chemical Company, Freeport, Texas; 
* Lyondell Chemical Company, Houston, Texas; 
* Monsanto Chemical Company, Luling, Louisiana; 
* Occidental Chemical Corporation, LaPorte, Texas; 
* PPG Industries, Inc., Lake Charles, Louisiana. 

Other stakeholders; 
* Aon Risk Services, insurance broker, Baltimore, Maryland; 
* Union Tank Car Company, tank car manufacturer. 

Source: GAO. 

[End of table] 

Objective I - Freight Rail Assessments of Risk and TSA's Security 
Strategy: 

To determine the extent to which the federal government and industry 
freight rail stakeholders assessed risks to the freight rail network, 
we analyzed federal and industry assessments to determine the nature 
and severity of the threats, vulnerabilities, and consequences of 
potential attacks to the freight rail system. Specifically, we analyzed 
federal security assessments that addressed components of risk (threat, 
vulnerability, and consequence) from the Department of Transportation 
(DOT), TSA, and the Department of Homeland Security (DHS) Office of 
Infrastructure Protection (IP). Although DHS, DOT, and industry 
characterized these assessments as threat, vulnerability, and 
consequence assessments, we did not evaluate the quality of the 
assessments nor did we determine the extent to which the assessments 
were conducted consistent with requirements outlined in the DHS 
National Infrastructure Protection Plan (NIPP) as this analysis was 
outside the scope of our work. However, we did discuss the assessments' 
reported results with the respective agencies and private entities that 
conducted them to ascertain the efforts that were made to identify 
potential threats, vulnerabilities, and consequences associated with an 
attack on the freight rail system. Since TSA identified the rail 
transportation of Toxic Inhalation Hazard (TIH) materials as the 
highest risk to the freight rail system, we focused our effort on 
understanding the vulnerabilities and consequences associated with this 
threat. We participated in TSA's rail Corridor Review risk assessment 
in Chicago to better understand the corridor review assessment process, 
which TSA officials told us was their key action to strengthen rail 
security. We also reviewed the 2001 industrywide risk assessment 
developed by the Association of American Railroads (AAR) and other 
freight rail industry stakeholders. Further, we discussed the findings 
of federal and industry assessments with the respective agencies and 
private entities responsible for them. 

To determine the extent to which TSA's strategy to secure freight rail 
was risk based, we identified TSA's strategic planning document--the 
Freight Rail Modal Annex to the Transportation Sector-Specific Plan 
(TSSP) issued in May 2007--and evaluated the extent to which this 
document was consistent with federal guidelines for a risk-based 
security strategy. Specifically, to determine the extent to which TSA's 
strategy conformed to requirements and best practices, we reviewed 
relevant statutory requirements of the Government Performance and 
Results Act of 1993 (GPRA) that included general requirements to 
establish government strategies and programs, and the Implementing 
Recommendations of the 9/11 Commission Act of 2007 (9/11 Commission 
Act), which included more specific requirements for establishing a 
security strategy. We reviewed executive directives, including Homeland 
Security Presidential Directives 1, 7, and 8 and Executive Order 13416, 
Strengthening Surface Transportation Security. We also reviewed 
documents to determine the best practices for effectively implementing 
a risk management framework and, in particular, risk assessment best 
practices. Specifically, we reviewed documents, such as the NIPP and 
TSSP. We also compared the Freight Rail Modal Annex to our guidance on 
six desirable characteristics of an effective national strategy. 
[Footnote 83] We reviewed other security strategy-related documents, 
such as a railroad security memorandum of understanding annex signed by 
both DHS and DOT that agreed to implement a work plan developed by the 
Homeland Security Council (HSC) in 2004. 

We also reviewed TSA's four metrics as presented in the annex and 
gathered detailed information from TSA on its methodology and data used 
to calculate its metric to reduce the risk associated with the 
transportation of TIH in major cities by 50 percent by the end of 2008. 
TSA provided us aggregated baseline data from June 1, 2005, to December 
31, 2005, prior to the implementation of the TIH Rail Risk Reduction 
Program and a second set of results for April 1, 2008, to June 30, 
2008, after its implementation for 46 TIH high-risk cities.[Footnote 
84] We met with TSA officials to understand their process and 
methodology for developing this measure and the data they collected. We 
also collected copies of completed inspection report sheets that TSA 
used to determine the relative security of TIH cars that were sampled 
to develop a risk score for each city. Also, we interviewed the private 
company that tracks the flow of railcars through cities about the 
reliability of its tracking devices. We discussed our concern with 
TSA's methodology earlier in this report. 

To obtain views of the federal government's current and future state of 
freight rail security strategic planning, we interviewed officials from 
relevant federal agencies to discuss the scope and methodologies of 
their risk assessments and their views of the identified risks. 
Specifically, we determined that TSA's Transportation Security Network 
Management (TSNM) office was responsible for implementing the freight 
rail security strategy. We then discussed the office's current and 
future efforts with respect to strategic planning and freight rail 
security assessments with TSNM officials. We also discussed other 
federal components' efforts to assess security risks to freight rail, 
including the Pipeline and Hazardous Materials Safety Administration's 
(PHMSA) vulnerability assessment with PHMSA officials to understand the 
scope, methodology, and results of their report. We discussed the Tier 
2 list and the policies and procedures for administering and conducting 
the Buffer Zone Protection Program (BZPP) and Site Assistance Visit 
(SAV) assessments with DHS IP officials responsible for developing 
these programs. We discussed freight rail threats with TSA's Office of 
Intelligence. We asked officials from the TSNM office for freight rail 
security how, if at all, they used completed assessments to develop 
their freight rail security strategy. We also interviewed a former 
executive official from the HSC who was familiar with HSC events during 
2004 that affected freight rail security. We discussed with him the 
actions leading up to the HSC's request that DHS and DOT identify and 
mitigate the security risks associated with the transportation of TIH. 

In addition, we interviewed numerous industry representatives to 
discuss their opinions of the threats, vulnerabilities, and 
consequences associated with freight rail and the assessments conducted 
to identify and mitigate those risks. Specifically, we spoke with 
officials from all 7 Class I railroads, which represent about 93 
percent of railroad freight revenue and 67 percent of the total U.S. 
rail mileage. According to DHS, DOT, and AAR officials we spoke with, 
these railroads collectively operate in most major cities in the United 
States where rail service is provided and have robust security plans in 
place. We also interviewed officials from 7 short line and regional 
railroads that operated in the same cities in which we conducted site 
visits, with a particular focus on those railroads that had 
participated in a prior TSA Corridor Review and carried TIH materials. 
Because we selected a nonprobability sample of short line and regional 
railroads, the results from our visits cannot be generalized to the 
entire population of over 500 railroads; however, we believe that 
obtaining information from these 7 railroads allowed us to better 
understand the views and unique operational challenges that short line 
and regional railroads face in the context of freight rail security. We 
also met with officials from the American Short Line and Regional 
Railroad Association (ASLRRA) to better understand short line and 
regional railroad operations. Further, we interviewed officials from 
six chemical companies that use rail services to ship TIH and other 
hazardous materials. We selected these companies based on their 
geographic proximity to the cities we conducted site visits in, and 
recommendations from chemical industry officials at the American 
Chemistry Council (ACC). Furthermore, two of the chemical companies we 
spoke with, Dow Chemical and BASF, are two of the largest in the world, 
according to several chemical industry officials we spoke with. We 
developed a data collection instrument to collect uniform information 
from the railroads and the chemical companies whose officials we 
interviewed and to characterize summarily these entities' views on the 
current and future state of freight rail security. While the results 
from these visits cannot be generalized to the entire population, we 
believe the results from these visits provided us with a broad 
perspective of the types of actions taken to secure freight rail and 
the challenges operators face in doing so. 

Objective II - Key Actions Taken and Challenges: 

To identify the key actions federal and industry stakeholders have 
taken or planned to mitigate identified risks, we reviewed TSA's 
Freight Rail Modal Annex and discussed the rail security actions 
outlined in the annex with several officials from DHS components, 
including TSA's TSNM office for freight rail; TSA's Office of Security 
Operations, the Surface Transportation Security Inspectors Program 
Office; the National Protection and Programs Directorate (NPPD)'s DHS 
IP; and the Federal Emergency Management Agency's (FEMA) Grants 
Programs Directorate. We also met with officials from DOT's Federal 
Railroad Administration (FRA) and PHMSA. During these reviews, we 
gathered information on several freight rail security initiatives, 
including TSA's Corridor Reviews, 27 joint TSA and DOT voluntary 
security action items, DHS IP's BZPP and SAVs, and DHS FEMA grant 
funding for freight rail security. We also reviewed PHMSA's and TSA's 
rulemakings on freight rail security (Notices of Proposed Rulemaking 
issued in December 2006, PHMSA's interim final rule issued in April 
2008, and final rules issued by both agencies in November 2008) and 
PHMSA's rulemakings on enhanced performance standards for rail 
hazardous materials tank cars (Notice of Proposed Rulemaking issued in 
April 2008, and final rule for TIH tank cars issued in January 2009). 
We also interviewed freight rail industry stakeholders, including 
representatives of major freight rail industry associations and select 
rail and chemical companies, to determine the actions they have taken 
to secure their facilities, operations, and shipments. We also reviewed 
AAR's rail security management plan, which was identified as the 
prominent action taken by the freight rail industry since September 11, 
2001, to secure freight rail and is a template for most railroad 
security plans in the United States. 

To observe actions taken to secure the freight rail system and to 
obtain the views of railroad and chemical company representatives, as 
well as federal field inspector officials, we conducted site visits to 
seven major cities. We chose these cities based on several factors, 
including that the cities have been the subject of or are expected to 
be the subject of a TSA Corridor Review and have rail networks that 
typically transport significant amounts of TIH materials. To determine 
the U.S. cities transporting the highest amounts of TIH materials by 
rail, we obtained a 3-month sample of rail industry information from 
TSA regarding the number TIH shipments traversing major cities for the 
year 2007. We compared the ranking of cities based on this information 
with aggregate data of the quantities of TIH being transported for the 
year 2000. We found the relative rankings of the major cities to be 
similar and selected cities that appeared high on these lists. We also 
solicited input from AAR on the appropriateness of the cities we 
selected to visit. During our site visits, we met with officials from 
all seven Class I railroads, seven short line and regional railroads, 
and six chemical companies in these cities because they carry, ship, or 
handle TIH materials over the rail system. We used a data collection 
instrument to collect uniform information from these entities on the 
actions taken to secure freight rail. We also met with federal 
government officials who work in the field, including TSA surface 
transportation security inspectors (STSI) at four locations and FRA 
officials at two locations we visited. As discussed earlier in this 
report, while the results from our visits cannot be generalized to the 
entire population of railroads, chemical facilities, and industry 
stakeholders, we believe that the observations obtained from these 
visits provided us with a greater understanding of the industry's 
operations and perspectives. 

To determine the extent to which TSA monitored the status and 
effectiveness of its programs, including how well the industry was 
complying with voluntary action items, we interviewed TSA officials 
responsible for these programs and reviewed available agency 
documentation on both federal and industry action taken to secure 
freight rail. Further, we reviewed GPRA program performance standards 
and GAO's Standards for Internal Control in the Federal Government to 
further assist us in evaluating TSA's efforts to monitor and evaluate 
the effectiveness of actions taken.[Footnote 85] 

To identify freight rail security challenges, we solicited information 
from federal, state, and local freight rail security stakeholders as 
well as industry stakeholders on pending and new freight rail security 
requirements. For instance, we reviewed the rail security requirements 
promulgated in the 9/11 Commission Act, and discussed any 
implementation and resource challenges associated with the act as well 
as TSA's and PHMSA's security rulemakings issued in 2008. In addition, 
we reviewed and analyzed over 100 public stakeholder comments to TSA's 
and PHMSA's notices of proposed rulemakings published in December 2006. 
These comments were from a wide range of organizations, including 
federal entities, several state and city organizations, industry 
associations, and individual rail and chemical companies. After 
reviewing the comments, we interviewed stakeholders that noted 
important challenges to implementing these new rules. We also solicited 
the opinion of other stakeholder parties about the challenges in 
securing freight rail transportation, including state and local 
government representatives and representatives from advocacy groups we 
identified through interviews or literature searches. We attended a 
session of the National Conference of State Legislatures' 
transportation committee to discuss the risk posed by transporting TIH 
by rail and other types of freight rail transportation and its effect 
on state governments. In addition, we interviewed representatives of 
the National Association of Counties to obtain similar views of TIH 
transportation risk and its effect on local governments. 

Objective III - The Extent to Which Federal and Industry Actions Are 
Coordinated and Challenges to Be Addressed: 

To determine the extent to which federal and industry stakeholders have 
coordinated their actions, we reviewed relevant requirements in laws 
and regulations and best practices. We analyzed federal and industry 
cooperative agreements, including DHS and DOT memorandums of 
understanding and freight rail industry and government memorandums of 
cooperation. In addition, we analyzed the public comments to TSA and 
PHMSA proposed rulemakings to determine the efforts that agencies made 
to coordinate their respective proposed rules. For PHMSA's interim 
final freight rail security rule, we reviewed the government's 
responses to stakeholders' comments to the rule. We also assessed 
federal coordination efforts using criteria we developed for effective 
collaboration between federal agencies as well as guidance established 
in the NIPP for effective collaboration with industry stakeholders. 
[Footnote 86] To determine the mechanisms that freight rail 
stakeholders use to coordinate and share information, we reviewed 
information provided by federal agencies, such as TSA's Freight Rail 
Modal Annex to the TSSP, information prepared by FRA, and documentation 
provided to us from industry stakeholders such as AAR and ACC. To 
obtain information about federal actions taken to coordinate through 
the Freight Rail Government Coordinating Council, we talked with four 
of its members, including officials from the TSA TSNM office for 
freight rail, which heads the council. To obtain information about the 
nature, scope, and effectiveness of the Freight Rail Sector 
Coordinating Council, we talked with officials representing the council 
chair--AAR--and discussed the extent to which the council had been used 
to coordinate with the federal government. To further obtain 
stakeholders' opinions on federal and industry cooperation, we met with 
DHS, TSA, and DOT officials responsible for various freight rail 
security-related programs and met with relevant representatives from 
the freight rail and chemical industry associations. During our site 
visits, we also met with federal inspectors and railroad industry 
representatives to discuss their specific efforts to coordinate. 

We conducted this performance audit from February 2007 through April 
2009 in accordance with generally accepted government auditing 
standards. Those standards require that we plan and perform the audit 
to obtain sufficient, appropriate evidence to provide a reasonable 
basis for our findings and conclusions based on our audit objectives. 
We believe that the evidence obtained provides a reasonable basis for 
our findings and conclusions based on our audit objectives. 

[End of section] 

Appendix II: Federal and Industry Freight Rail Security Vulnerability 
and Consequence Assessment Activities Conducted since 2001: 

The federal government and freight rail industry stakeholders have 
conducted a number of threat, vulnerability, and consequence 
assessments since 2001. Although DHS, DOT, and industry characterized 
these assessments as threat, vulnerability, and consequence 
assessments, we did not evaluate the quality of the assessments nor did 
we determine the extent to which the assessments were conducted 
consistent with requirements outlined in the NIPP as this analysis was 
outside the scope of our work. However, we did discuss the assessments' 
reported results with the agencies and private entities that conducted 
them to ascertain the efforts that were made to identify potential 
threats, vulnerabilities, and consequences associated with an attack on 
the freight rail system. While these assessments were wide-ranging, 
special attention was given to determining the security risks 
associated with the transportation of TIH materials. Below is a summary 
of these assessments, categorized by those activities that focused 
exclusively on TIH risks and those that included or focused on other 
risks. 

Assessments That Focused Exclusively on TIH Risks: 

PHMSA TIH Summary Report: 

PHMSA conducted the first federal security assessment of TIH in 2003, 
called the TIH Summary Report, at the request of the HSC. The study 
analyzed the transportation of 13 TIH materials to determine their 
vulnerabilities and potential consequences in the rail transportation 
system along with other modes of transportation, such as maritime and 
highway modes. PHMSA chose to focus on these 13 materials because of 
their high toxicity and the large volumes transported. Specifically, 
the report identified 3 TIH materials--chlorine, anhydrous ammonia, and 
ethylene oxide--that accounted for 90 percent of the total volume 
shipped via rail. 

TSA Rail Corridor Reviews: 

In 2004, TSA began conducting Corridor Reviews, which are detailed 
freight rail security assessments that focus on TIH rail shipments in 
individual cities. They are conducted by teams of TSA subject matter 
experts and are designed to evaluate the vulnerabilities and potential 
consequences posed by TIH freight rail shipments within each city. To 
conduct these reviews, TSA uses a systematic and quantitative 
assessment methodology, called the Hazard Analysis and Critical Control 
Point (HACCP), which enables the agency to identify specific locations 
within a city's rail system that pose a high risk for someone 
weaponizing a TIH railcar.[Footnote 87] As part of the assessment, TSA 
gathers information on the volume and traffic patterns of TIH railcars 
traveling in and through the city and analyzes these data to identify 
locations in the city where TIH railcars tend to sit unattended. 
[Footnote 88] These locations are often in freight rail yards or at 
interchange locations where railroads exchange railcars or break apart 
and build trains. Once the TSA subject matter experts identify these 
key locations for each city, they assess them against three risk 
factors:[Footnote 89] 

* the potential severity of an attack, such as how many people might be 
injured or killed by an attack on a TIH car at a location; 

* the number of TIH railcars at a specific location; and: 

* detection capability, such as the ability of police officers or 
railroad workers to detect an attack before it could be carried out. 

Using the HACCP tool and data gathered based on the three risk factors 
above, TSA calculates a numerical risk score for each location to 
identify areas on which to focus future security efforts and actions. 
[Footnote 90] However, TSA allows each rail carrier to provide input 
and clarification on each risk score at a tabletop session the agency 
holds with the rail carriers at the end of the each review. As of March 
2009, TSA completed Corridor Reviews in 12 cities, including the 9 
cities originally selected for review in 2004. TSA officials told us 
that they have assessments under way in 5 cities and plan to continue 
conducting these reviews in 43 additional U.S. cities that have TIH 
rail shipments transported through them. 

TIH Rail Risk Reduction Program: 

In 2007, TSA began further assessing the potential vulnerabilities and 
consequences posed by TIH railcars in major cities by gathering, 
monitoring, and quantifying risk information associated with TIH rail 
shipments traveling through 46 U.S. cities.[Footnote 91] TSA officials 
stated that the agency developed this assessment program to measure the 
progress federal and industry efforts are having in achieving the 
agency's key performance metric for the freight rail security program, 
which is to reduce the risk associated with the transportation of TIH 
in major cities--identified as high-threat urban areas--by 50 percent 
by the end of 2008. To do so, TSA collected both historical and current 
information on the number of TIH rail shipments in each city, security 
at rail yards holding TIH shipments in each city, and city populations. 
TSA then developed a formula to quantify a risk score for each city. 
This score is a relative measure, or indicator, of the TIH security 
risks within a city for a given time period. TSA used the historical 
information to develop a baseline risk score for each city and then 
collected later information to measure progress in reducing 
risk.[Footnote 92] Specifically, the agency compiled information for 
four factors: 

* Total hours TIH cars were present inside a city. TSA collected data 
from the rail industry's automated systems that record the movement and 
location of all railcars within the U.S. rail system by means of 
electronic identification tags. TSA used these data to quantify the 
amount of time TIH railcars are located within a city. 

* Security status of TIH cars. TSA collected this information through 
in-person visits conducted by TSA STSIs at over 200 rail yards located 
in major cities. 

* Population proximity to unsecured TIH cars. TSA used U.S. Census 
Bureau data to determine the population within a 1-mile radius of each 
TIH car that was sitting unattended and to rank each city's possible 
exposure based on this information. 

* City ranking. TSA prioritized the cities' importance on a scale of 1 
to 5 (5 being the highest) based on the population of each city. 

In 2007, TSA collected historical information on these risks factors 
from the time period June 1, 2005, to May 31, 2006, to establish a 
baseline risk score for each of the 46 U.S. cities, and then compared 
each baseline to information for the current year.[Footnote 93], 
[Footnote 94] Thus far, TSA has determined that nationally there was 
over a 60 percent reduction in risk from the baseline period to the end 
of December 2008. However, we have concerns about this performance 
measure's reported results, as discussed earlier in our report. To show 
results for this measure, TSA developed a national risk scorecard that 
ranks each city by risk score. Each Class I rail carrier also receives 
a unique scorecard, providing insight into its individual TIH risk 
scores. These scorecards then become the focus of discussions between 
TSA and individual carriers on how to further reduce risk. TSA 
officials also said that they may use the scorecards for, among other 
things, monitoring which cities or railroads have high-risk scores and 
focusing further assessment and security efforts on these cities or 
railroads. 

Assessments That Included Risks Other Than TIH: 

TSA Corporate Security Reviews: 

In 2007, TSA began conducting assessments, called Corporate Security 
Reviews (CSR), which evaluate potential vulnerabilities associated with 
a freight rail carrier's corporate security plan and procedures. The 
purpose of these reviews is to both increase the agency's domain 
awareness and identify possible vulnerabilities that individual 
railroad carriers may have because of unique operating procedures or 
other company-specific concerns. In 2007, TSA conducted CSRs of all 
seven Class I railroads and assessed their security plans and 
procedures against the following TSA guidelines: threat assessment and 
processing; vulnerability assessments; personnel security, auditing/ 
testing of plan; drills/exercises; infrastructure security; hazardous 
materials security; cybersecurity; and infrastructure security. 
[Footnote 95] The reviews essentially consist of an on-site visit to 
the carrier's corporate headquarters to interview rail officials on the 
procedures and processes included in the company's security management 
plan.[Footnote 96] After completing its data gathering and analysis, 
TSA develops a final report for each railroad and sends it to the 
carrier informing the company of the results. TSA officials told us 
that overall the Class I carriers have good security plans and 
procedures in place to respond to raised alert levels. In a few cases, 
TSA made recommendations for improvement, for example, for better 
documenting of security processes or protocols and better defining of 
departmental roles and responsibilities. In 2008, TSA performed CSRs on 
the three largest short line railroad holding companies that 
collectively control 89 short line railroads. In the immediate future, 
TSA intends to focus CSRs on terminal-switching railroads operating 
within high-threat urban areas. However, TSA has not yet developed a 
schedule for conducting these reviews. 

DHS List of Prioritized Critical Infrastructure: 

In 2006, DHS IP created a program to annually assess and identify the 
nation's most critical infrastructure and key resources. This effort 
results in a prioritized critical infrastructure list. DHS stated that 
assets on this list--which includes freight rail assets--if destroyed 
or disrupted could cause national or regional catastrophic effects. 
This list is used to inform incident management, vulnerability 
assessments, grants, and other risk management activities. To ensure 
that assessment resources are invested correctly, DHS IP officials said 
that DHS works closely with TSA to develop criteria used to determine 
which freight rail assets should appear on the list. They also use 
information provided from sector industry stakeholders and state 
homeland security offices.[Footnote 97] 

DHS IP Infrastructure Vulnerability Assessments: 

In 2004, DHS IP began two assessment programs to identify 
vulnerabilities associated with assets and infrastructure in the United 
States across all sectors of the economy, including freight rail 
assets. The two programs are BZPP and the SAV program. 

BZPP: 

BZPP is an assessment of an asset's perimeter "outside the fence" to 
identify potential vulnerabilities associated with these areas where a 
terrorists may launch an attack.[Footnote 98] Annually, DHS IP 
determines which assets and infrastructure are to be subjected to a 
BZPP assessment by using the DHS prioritized critical infrastructure 
list. These assets and infrastructure are prioritized by such factors 
as whether a BZPP assessment was recently conducted and if the asset 
belongs to a high-risk sector, such as dams or nuclear facilities. DHS 
IP officials stated that the agency coordinates roughly 200 BZPP 
assessments a year, and the agency has conducted 53 freight rail- 
related security assessments since the program's inception. DHS 
officials called protective security advisors (PSA) are responsible for 
coordinating BZPP assessments with state and industry stakeholders. 
These assessments are conducted on a voluntary basis, and the results 
can be used to obtain grant funding from FEMA for security 
enhancements. 

SAV: 

These are voluntary visits conducted at the request of an asset owner/ 
operator or the state government. However, PSAs are to solicit state 
homeland security advisors and major industry officials for SAVs where 
DHS believes an asset would benefit from the program. DHS officials 
stated that the agency targets SAVs on (1) a facility or sector that is 
under threat, (2) a facility that is highly consequential, (3) a 
facility that supports or is close to a national special security 
event, (4) a facility that is so complex that it would benefit from 
subsequent or concurrent BZPP activities, or (5) a facility whose 
owner/operator requests an SAV and the facility appears on the DHS 
prioritized critical infrastructure list. The main distinction between 
an SAV and a BZPP assessment are that BZPP assessments focus on the 
outside of the perimeter of an asset and are conducted largely by local 
law enforcement, while SAVs are conducted by PSAs and focus on 
vulnerabilities inside the perimeter. The results of the SAV are 
verbally briefed to the appropriate key staff members of the site upon 
completion, including any security measures to consider for 
implementation. However, SAVs are not used to award grants, and the 
asset owner/operator is not required to adopt any security measures DHS 
recommends. 

Industry Assessments: 

In 2001, AAR conducted the first nationwide security risk assessment of 
the freight rail system, which incorporated vulnerability and 
consequence criteria to evaluate multiple security risks to the freight 
rail industry.[Footnote 99] Overall, the assessment reviewed five 
critical areas to determine the railroad's security vulnerabilities and 
consequences: infrastructure, military operations, information 
technology and communications, train operations, and hazardous 
materials. For example, the assessment evaluated vulnerabilities and 
consequences associated with the destruction or degradation of freight 
rail infrastructure, such as key bridges, tunnels, tracks, and 
operation centers that electronically direct and monitor train 
movements.[Footnote 100] Key participants in the risk assessment 
included the Class I railroads; ASLRRA; and as appropriate, major 
chemical industry groups, whose member companies use the rail system to 
ship TIH commodities. 

Individual rail and chemical companies have also conducted assessments 
of their properties and operations. One impetus for these efforts is 
the 2003 PHMSA regulations, which require railroads that carry certain 
hazardous materials--including TIH--and chemical companies that ship 
these materials to develop security plans that include assessments of 
the risks of shipments of the covered hazardous materials and measures 
to mitigate those risks. Officials we interviewed at all 13 of the 
railroads stated that they had conducted these PHMSA-regulated security 
assessments. In addition to these required assessments, representatives 
we interviewed from the 7 Class I railroads stated that they conduct 
other assessments as well, including reviews of TIH operations and 
physical infrastructure assessments, which have helped them make 
decisions about business operations and determine where to make 
physical security upgrades in some cases. 

[End of section] 

Appendix III: TSA Did Not Consistently Measure Results for Its Key 
Performance Measure: 

TSA has made limited progress thus far in measuring the extent to which 
federal and industry efforts are achieving the agency's only 
performance metric with a target--to reduce the risk associated with 
TIH rail shipments in major cities by 50 percent by the end of 2008-- 
because the agency was unable to obtain key data needed to consistently 
measure results. According to TSA officials, this is the key 
performance metric for the agency's freight rail security program. 
Specifically, to measure progress in meeting this metric, TSA has 
collected limited vulnerability and consequence information from 2007 
and compared it with historical vulnerability and consequence 
information for 2005 and 2006. However, the agency was unable to obtain 
key information needed to accurately measure vulnerability in 2005 and 
2006. As a result, the agency developed a general estimate of this 
vulnerability using its and industry's expert judgment and inserted it 
into its calculation of risk for most cities in place of actual 
historical information that it could not obtain retrospectively. 
Therefore, the accuracy of this estimated vulnerability--and the 
associated 60 percent overall reduction in risk that TSA reports as 
being achieved through November 2008--is uncertain because it depends 
on the accuracy of the general estimate.[Footnote 101] More 
specifically, the key vulnerability risk factor that TSA measures as 
part of this performance metric is the amount of time that railcars 
containing TIH are unattended in major U.S. cities. However, TSA was 
unable to obtain information for this risk factor in 2005 and 2006 
because the agency did not begin conducting inspections at rail 
facilities to gather this information until 2007, yet it was using 2005 
and 2006 as its baseline period. Since the 2005 and 2006 vulnerability 
data were unavailable, agency officials made a broad estimate-- 
hypothesizing that TIH railcars sat unattended during the baseline 
year, June 2005 through May 2006, approximately 80 percent of the time. 
TSA officials reported that to develop this estimate, they relied 
primarily on the memory of railroad employees and their responses to 
standard questions when they were interviewed by TSA officials during 
the agency's 2007 inspections at rail facilities. TSA officials also 
reported that they relied on their expert judgment to develop this 
estimate. However, because this estimate was based on memories and 
certain assumptions about past activity rather than actual measurements 
of unattended cars, which is the type of data that TSA gathered in 
subsequent years, the improvements that TSA reports have been made in 
reducing risk depend on the validity of these assumptions and recall. 

In addition, we found empirical evidence suggesting that the 2005 and 
2006 baseline year data estimate of unattended cars may be inaccurate 
based on actual data that TSA collected in 2007. Specifically, in 
reviewing the 2007 data, we learned that the amount of time that TSA 
inspectors found TIH railcars to be unattended in 2007 varied greatly 
by city. For example, of the 45 cities that TSA inspected to measure 
TIH railcar attendance, data for 6 cities inspected in 2007 show cars 
as unattended 0 percent of the time, and data for 5 other cities show 
cars as unattended less than 20 percent of the time. Moreover, 18 other 
cities showed railcars as unattended over 80 percent of the time, 
including 9 cities showing railcars as unattended 100 percent of the 
time.[Footnote 102] However, the agency was unable to account for any 
specific actions taken that would explain why the unattended status of 
TIH railcars seemed to dramatically improve in some cities and slightly 
worsen in others compared to the agency's estimates. As a result, 
because TSA cannot resolve the uncertainties associated with its 2005 
and 2006 estimate, the accuracy of TSA's risk reduction calculations in 
subsequent years against the 2005 June through December baseline will 
likewise remain uncertain. Without being able to show demonstrable 
reduction in risk related to its only targeted performance measure, TSA 
does not know the degree to which its programs are effective and does 
not know which actions are most effective for future rail security 
efforts. Therefore, we are recommending in this report that TSA take 
steps to change the baseline measure associated with its TIH risk 
reduction performance metric to a measure that is more consistent with 
what has been used in subsequent years, or revise this performance 
metric to more consistently and accurately assess TIH risk reduction 
efforts in major cities over time. 

[End of section] 

Appendix IV: Summary of Key Actions Taken to Secure Freight Rail: 

The federal government and freight rail industry have taken a range of 
actions since September 11, 2001, to mitigate freight rail security 
risks. While many of these actions have focused on securing TIH rail 
shipments, some actions have addressed other security threats as well. 
In addition, new TSA and DOT rail security regulations for better 
securing TIH rail shipments will make some freight rail security 
actions mandatory. However, federal and industry stakeholders also face 
some technology challenges to further enhancing the security of TIH 
rail shipments. These challenges include designing stronger tank cars, 
developing more real-time railcar tracking and monitoring systems, and 
substituting highly hazardous materials with less dangerous chemicals. 
Below is a summary of these various actions, categorized as federal and 
industry. 

Key Federal Actions Taken: 

TSA Rail Corridor Review Actions: 

Since 2004, TSA has been assisting freight rail carriers in mitigating 
security vulnerabilities the agency identified during its Corridor 
Reviews. Specifically, during these reviews TSA works with individual 
rail carriers to identify site-specific risk mitigation strategies for 
areas that pose the greatest risk for weaponizing a loaded TIH railcar. 
Then, typically at the end of each review, TSA officials propose 
specific actions that railroads can then either implement at their 
facilities or as part of their operations to reduce risk. Examples of 
specific rail carrier actions taken as a result of TSA's reviews 
follow. 

* Following TSA's assessment in New Jersey, rail carriers implemented 
operational changes that permanently removed railcars containing TIH 
from three rail yards. 

* Also following TSA's assessment in New Jersey, rail carriers 
installed camera systems to monitor TIH railcars and perimeter fencing. 
One carrier also installed gates at certain road access points and high-
intensity lighting. Some carriers also increased security personnel and 
the frequency of security patrols at facilities.[Footnote 103] 

* Prior to TSA's review in Chicago, two rail carriers would interchange 
TIH cars at an unmanned location in the city. The lag time between one 
carrier's drop-off and the other's pickup resulted in loaded TIH cars 
sitting idle and unattended for significant periods of time in a 
populated area. As a result of TSA's concern, the two carriers decided 
to reroute the TIH cars to a different interchange point located 
outside the city. The rail carriers stated that after they analyzed 
several options for addressing this vulnerability, they chose to 
reroute the trains because it adequately addressed TSA's concerns and 
ended up being more cost effective for them operationally. 

TSA and DOT Voluntary Security Action Items: 

In June 2006, TSA and DOT issued 24 recommended security action items 
for the rail transportation of TIH materials that addressed system 
security, access controls, and en route security.[Footnote 104] 
Specific actions included the following: 

* designating an individual with overall responsibility for security 
planning, 

* identifying company critical infrastructure, 

* collaborating with other railroad security offices, 

* restricting access to information the railroad deems to be sensitive, 
and: 

* establishing procedures for background checks and safety and security 
training for contractor employees with unmonitored access to company- 
designated critical infrastructure. 

Then, in November 2006, TSA and DOT issued 3 supplemental security 
action items for the rail transportation of TIH materials designed to 
build upon the original 24 and recommended the following: 

* Rail carriers operating in high-threat urban areas should develop 
site-specific security plans that address the security of the 
transporting of TIH materials.[Footnote 105] 

* Rail carriers should not operate trains carrying TIH within a 
specified distance of public venues with national special security 
events in progress and as requested by the appropriate agency 
responsible for overall event security coordination. 

* In the security planning process, rail carriers should identify and 
select areas within their systems where cars containing TIH can be 
moved and held when threat conditions warrant. 

TSA Surface Transportation Inspection Activities: 

In addition to assisting TSA in measuring industry progress in 
achieving its 50 percent TIH risk reduction goal, STSIs have also 
assessed industry's implementation of some of the security action items 
that TSA and DOT issued in June 2006. Specifically, STSIs visited 
approximately 151 rail facilities from October through December 2006 
and interviewed 2,619 rail employees to assess rail carrier 
implementation for 7 seven security action items on a scale of high, 
medium, and low.[Footnote 106] When averaged across all carriers, TSA's 
results showed the level of implementation averaged in the low/medium 
to medium range. STSIs also conducted an additional set of visits to 
approximately 147 rail facilities from March through June 2007 to 
assess the degree to which rail carriers had implemented 10 other 
security action items.[Footnote 107] TSA officials told us that they 
selected these 10 items for review because they focused more on rail 
carrier security management practices than on field-level practices. 
[Footnote 108] TSA's results for these 10 items showed that railroads 
scored high in the areas of internal communication on threat conditions 
and establishing liaisons with federal, state, and local law 
enforcement, but lower in the areas of photo identification, background 
checks for employees, and intrusion deterrence and detection. While TSA 
has not conducted any additional surveys of rail carrier implementation 
of the security action items since 2007, TSA officials stated that item 
surveys will be an integral part of the 2009 inspection plan. In 
addition, TSA officials told us that they have conducted approximately 
4,000 surveys that provide some information on rail carrier 
implementation of Supplemental Security Action Item No. 1, which was 
issued in November 2006; these surveys were components of the TIH Rail 
Risk Reduction Program and will continue until 2013. 

DHS FEMA Grant Funding: 

Using the states' buffer zone plans and Vulnerability Reduction 
Purchasing Plan (VRPP) submissions under DHS IP's BZPP, DHS provides 
grant money, through the states, to local law enforcement agencies that 
purchase security-related equipment for reducing the risk of the asset 
assessed to a terrorist attack.[Footnote 109] The results of the BZPP 
assessments are used to develop VRPP, which identifies the spending 
plan, including the equipment to be purchased under BZPP. VRPP 
submissions are completed by the local jurisdiction responsible for 
securing the asset assessed. Once VRPP submissions are completed and 
submitted to the state administrative agency, DHS verifies that what is 
planned to be purchased is on the DHS authorized equipment list. As 
part of the review process, FEMA and DHS IP review the documentation to 
make sure it is completed appropriately; however, FEMA, as the final 
approver, ultimately determines whether the funding will be provided 
and when. Through the end of 2008, DHS told us that it provided $4.6 
million through the program to purchase security-related equipment to 
protect freight rail assets from terrorist attack. Examples of items 
purchased include chemical protective clothing, bulletproof vests, 
video surveillance equipment, and portable radios. 

National Capital Region Rail Pilot Project: 

DHS also developed a project to secure rail infrastructure within 
highly populated or otherwise critical locations. The National Capital 
Region was chosen for the initial pilot because of the proximity of 
D.C. rail lines to Congress, the Supreme Court, and other significant 
entities, monuments, and icons. The National Capital Region Rail Pilot 
Project (NCRRPP) was designed to address security concerns while 
maintaining efficient rail operations. NCRRPP is a remote intelligent 
video security system-based and sensor-based program that creates a 
virtual fence of video surveillance cameras along an 8.1 mile rail 
corridor through Washington, D.C. NCRRPP has two central features: a 
virtual fence surrounding the entire 8.1-mile D.C. corridor and virtual 
gates installed at each entry point. The virtual fence is made up of a 
network of video surveillance cameras covering the entire length of the 
D.C. corridor rail line. The virtual gate design uses nonintrusive 
remote detection technologies to provide advance notification of 
approaching train traffic and detect the presence of leaking hazardous 
and TIH materials. The system architecture allows for easy installation 
of this system at other critical rail infrastructures throughout the 
country and provides constant real-time video monitoring and hazardous 
material detection capabilities. The system also disseminates alarm 
information to first responders in the NCRRPP area, including the U.S. 
Capitol Police, Washington Metropolitan Police, U.S. Secret Service, 
White House Situation Room, Federal Bureau of Investigation, and others 
as determined necessary. 

Rail Routing Risk Assessment Tool: 

In 2005, DHS's Office of State and Local Government Coordination and 
Preparedness (SLGCP), Office for Domestic Preparedness (ODP), provided 
a $5 million grant to the Railroad Research Foundation (RRF) to oversee 
the development and implementation of three risk assessment tools 
intended to assist the rail industry and federal government in 
performing risk assessments, selecting safe and secure rail routes, and 
implementing a "safe haven" for carriers to use during transport and 
storage of TIH railcars so that security risks may be minimized. 
[Footnote 110] However, shortly after RRF began developing the tools, 
it, in coordination with DHS, elected to condense the three tools into 
a single Web-based tool that would analyze the safety and security 
risks along rail routes posed by TIH rail shipments. DHS and RRF 
officials we spoke with stated that the major factor contributing to 
this decision was PHMSA's 2006 proposed rail safety and security 
rulemaking, now a final rule, that requires rail carriers to analyze 
safety and security risks along the rail routes used to transport 
certain hazardous materials. RRF, DHS, and other involved stakeholders 
stated that the tool will provide rail carriers a common framework for 
conducting this analysis.[Footnote 111] RRF and its contractor 
completed initial development of the tool and held two demonstration 
briefings on it in November and December 2007. While officials from RRF 
and DHS and other federal officials we spoke with stated that the 
briefings effectively demonstrated the tool's ability to host the 
necessary data, additional funding and work was required to finalize it 
and make it deployable nationwide. As a result, DHS awarded an 
additional $2.5 million grant to RRF in 2008 to finish development of 
the tool.[Footnote 112] However, DHS officials also told us that they 
do not intend to fund any out-year maintenance or updates to the tool, 
and that it will be up to the rail industry to fund any remaining work. 

Although RRF and DHS expect the Rail Routing Risk Assessment Tool to be 
made available to the railroads in time for them to complete the 
routing analysis required under PHMSA's final rule, it is uncertain 
what the impact of this tool will be in making routing decisions 
because decisions made using the tool can be subjective--depending on 
the users and how they apply the results of the tool. For example, the 
contractors assisting RRF in developing the tool said that it is not a 
"decision-making" tool and it does not make decisions for users on 
which rail route to use, but rather provides them with a comprehensive 
set of data on each rail route being analyzed based on the 27 risk 
criteria outlined in PHMSA's rule. The data are then used to compute a 
risk score for each route in three categories: security, natural 
hazards, and accidents. Rail officials can then use the three 
categorical scores for each route to assist them in determining which 
routes present the lowest overall risk based on the three scores. 
However, it is ultimately the user's discretion that determines how the 
three scores are weighted and interpreted to make a routing decision. 
As a result, it is uncertain how consistently users of the tool will 
apply it in their decision making, and rail carriers may view the 
overall risk posed by commonly used routes differently. The potential 
differences in decision making--derived from the same tool--could also 
make it more difficult for FRA to consistently enforce compliance with 
the rule. Furthermore, the extent to which the tool will be used by the 
railroads is also uncertain because use of the tool is voluntary, and 
railroad user groups participating in its development have given mixed 
feedback on its utility for the analysis. 

PHMSA Final Rule: 

On November 26, 2008, PHMSA issued its final rule requiring rail 
carriers to compile annual data on certain shipments of explosive, TIH, 
and radioactive materials; use those data to analyze safety and 
security risks along rail routes where those materials are transported; 
assess alternative routing options; and make routing decisions based on 
those assessments.[Footnote 113] Included in the rule are 27 specific 
risk criteria rail carriers are required to consider and use when 
conducting this analysis; however, not all the criteria will be present 
on each route, and each route will have its own combination of factors 
to be considered. These criteria cover areas such as rail traffic 
density of the route, trip length, iconic targets, and population 
density along the route. Using the results of their analyses, rail 
carriers must select and use the practicable routes posing the lowest 
overall safety and security risks.[Footnote 114] In addition, the rule 
adopts a new requirement for rail carriers to inspect placarded 
hazardous materials railcars for signs of tampering or suspicious 
items, including improvised explosive devices (IED). The rule also 
clarifies rail carriers' responsibility to address in their security 
plans' issues related to en route storage and delays in transit. 
Specifically, the PHMSA rule requires covered entities to include, 
among other things, 

* measures to mitigate risk to population centers associated with in- 
transit storage; 

* procedures for notifying consignees of any significant unplanned 
delays affecting the delivery of the covered hazardous materials; and: 

* procedures under which rail carriers will consult with shippers and 
consignees to minimize the time a railcar containing one of the 
specified hazardous materials is placed on track awaiting pickup, 
delivery, or transfer. 

FRA plans to review the rail carriers' route analyses on behalf of DOT. 
FRA intends to have an FRA headquarters team of experts in the various 
safety disciplines conduct these reviews of the carriers' route 
analyses; this team is to consult with TSA on security aspects of these 
analyses. FRA officials indicated that regardless of the risk 
assessment methodology selected by a rail carrier, FRA is to look at 
the carrier's analysis for the following information: 

* The analysis must demonstrate that the railroad has included the 
required information, complied with the consultation and other 
requirements of the PHMSA rule, considered the criteria set out in 
Appendix D of the rule, and developed a rational explanation for 
criteria that it is relying on. 

* The characterizations of risks and of changes in the nature or 
magnitude of risks is qualitative and, to the extent possible given 
available data, quantitative. 

* The characterization of risk is broad enough to deduce a range of 
activities to reduce risks on the lines being analyzed. 

* All assumptions, their rationales, and their impact on the risk 
analysis are clearly set out. 

* The analysis considers the full population at risk, as well as 
subpopulations particularly susceptible to such risks, the populations 
more highly exposed, or both. 

* The analysis adopts consistent approaches to evaluating the risks 
posed by hazardous agents or events. 

* The analysis includes measures to minimize the safety and security 
vulnerabilities identified through the route analyses. 

FRA's enforcement rule sets out the process FRA is to follow if it 
identifies deficiencies in a railroad's risk analysis; this process 
includes full consultation with the railroads, PHMSA, TSA, and the 
Surface Transportation Board before any rerouting would be directed. 
PHMSA and FRA officials stated that since rail carriers have every 
incentive to choose routes posing the least overall safety and security 
risks for moving security-sensitive materials, officials anticipate 
that FRA will rarely have to overturn a rail carrier's routing 
decision; more likely, the discussion may center on mitigation measures 
a carrier can take to reduce the risks that are identified. 

PHMSA's Tank Car Safety Proposed Rule: 

On April 1, 2008, PHMSA and FRA issued a proposed rail safety rule to 
enhance the performance standards for tank cars used to transport 
highly hazardous materials, implement operational restrictions to 
improve accident survivability, and enhance the cars' resistance to 
rupture or puncture during a derailment.[Footnote 115] While this 
proposed rulemaking focused on safety, DOT officials we spoke with said 
that these enhancements would also have security benefits. Essentially, 
the revised standards are designed to improve the accident 
survivability of railroad tank cars and were developed in response to 
several rail tank car accidents occurring in recent years in which the 
tank car was breached and the hazardous product leaked into the 
atmosphere. Specifically, this rule proposes: 

* enhanced tank car performance standards for head and shell impacts, 
including expedited replacement of tank cars used for the 
transportation of TIH materials manufactured before 1989 with non- 
normalized steel head or shell construction; 

* operational restrictions for trains hauling tank cars containing TIH 
materials, such as a maximum speed limit of 50 miles per hour for all 
railroad tank cars used to transport TIH materials; 

* interim operational restrictions for trains hauling tank cars not 
meeting the enhanced performance standards, for example, a maximum 
speed limit of 30 miles per hour in nonsignaled (i.e., dark) territory 
for all railroad tank cars transporting TIH materials or the approval 
of a complete risk assessment and risk mitigation strategy establishing 
that operating conditions provide at least an equivalent level of 
safety as that provided by signaled track; and: 

* an allowance to increase the gross weight of tank cars that meet the 
enhanced tank-head and shell puncture-resistance systems. 

PHMSA's Tank Car Safety Final Rule: 

On January 13, 2009, PHMSA and FRA issued a final rule to prescribe 
enhanced safety measures for the transportation of TIH materials. 
[Footnote 116] Pending the issuance of the final rule proposed in April 
2008, the rule imposes interim design standards for newly manufactured 
tank cars. Specifically, this rule requires: 

* commodity-specific improvements in safety features and design 
standards, for shell and jacket thickness, for newly manufactured tank 
cars; 

* enhancements in top fittings protection systems and nozzle 
arrangements for newly manufactured tank cars; and: 

* a 50 mile per hour speed limit for all loaded rail tank cars used to 
transport TIH materials. 

TSA's Rail Transportation Security Rule: 

On November 26, 2008, TSA issued a rule establishing security 
requirements for freight railroad carriers; intercity, commuter, and 
short-haul passenger train service providers; rail transit systems; and 
rail operations at certain, fixed-site facilities that ship or receive 
specified hazardous materials by rail.[Footnote 117] The rule also 
codifies the scope of TSA's existing inspection program and requires 
regulated parties to allow TSA and DHS officials to enter, inspect, and 
test property, facilities, conveyances, and records relevant to rail 
security. The rule also requires that regulated parties designate rail 
security coordinators and report significant security concerns to DHS. 
This rule further requires that freight rail carriers and certain 
facilities handling specified hazardous materials be able to report 
location and shipping information to TSA upon request and to implement 
chain-of-custody requirements to ensure a positive and secure exchange 
of specified hazardous materials. TSA also clarifies and amends the 
sensitive security information (SSI) protections to cover certain 
information associated with rail transportation.[Footnote 118] 
Specifically, TSA's rule requires all rail carriers to: 

* designate a rail security coordinator and at least one alternate to 
be available to TSA on a 24-hour, 7-day per week basis to serve as the 
primary contact for receipt of intelligence information and other 
security-related activities; 

* immediately report incidents, potential threats, and significant 
security concerns to TSA's Freedom Center; and: 

* allow TSA officials and other DHS officials to enter and conduct 
inspections, copy records, perform tests, and conduct other activities 
necessary to carry out TSA's statutory and regulatory 
responsibilities.[Footnote 119] 

Specific requirements for freight rail carriers and facilities that 
ship or receive certain hazardous materials include the following: 
[Footnote 120] 

* Freight rail carriers and certain facilities that ship or receive 
certain hazardous materials by rail must provide to TSA, upon request, 
the location and shipping information of railcars within their physical 
custody or control that contain a specified category and quantity of 
hazardous materials. Class I freight railroad carriers must provide the 
information to TSA no later than 5 minutes (for one car) or 30 minutes 
(for two or more cars) after receiving the request. Other railroad 
operators and rail hazardous materials shipper and receiver facilities 
must provide the information for one or more cars within 30 minutes 
after receiving the request. 

* As discussed earlier in this report, the rule also requires certain 
rail carriers, shippers, and receivers to establish and provide for a 
"secure chain of custody and control" for railcars in their possession 
containing the selected hazardous materials, such as TIH. Rail 
carriers, shippers, and receivers are required to establish a secure 
chain of custody and control through several steps and processes. 
Specifically, shippers of these hazardous materials are required to 
perform a physical security inspection of railcars for signs of 
tampering or suspicious items, including IEDs.[Footnote 121] During pre-
transportation functions, the shipper is also required to store the 
cars in an area with physical security measures in place until the 
carrier arrives to pick up the car and assume physical custody of it. 
The shipper is also required to document the transfer of custody with 
the rail carrier either in writing or electronically. The rail carrier 
must also perform an inspection of the cars before leaving the 
shipper's facility, as required by DOT. When a carrier transfers a car 
transporting the hazardous materials to another carrier and the 
transfer occurs in a high-threat urban area or when the railcar may 
subsequently enter a high-threat urban area, the transferring carrier 
must ensure that the railcar is not left unattended at any time during 
the physical transfer of custody, perform a security inspection, and 
document the transfer of custody. When a railroad carrier transfers 
custody to a rail receiver in a high-threat urban area, the carrier 
must not leave the car unattended in a nonsecure area until the 
receiver accepts custody and must document the transfer of custody. In 
such a transfer, the receiver must ensure that either it or the carrier 
maintains positive control of the car during the transfer, document the 
transfer, and keep the car in a secure area until it is unloaded. As 
used in the regulations, a railcar is "attended" if an employee or 
authorized representative of the freight railroad carrier (1) is 
physically located on-site in reasonable proximity to the railcar; (2) 
is capable of promptly responding to unauthorized access or activity at 
or near the railcar, including immediately contacting law enforcement 
or other authorities; and (3) immediately responds to any unauthorized 
access or activity at or near the railcar either personally or by 
contacting law enforcement or other authorities. The rule also permits 
electronic monitoring so long as the responsible party is located on- 
site and can accomplish an equivalent level of surveillance, response, 
and notification.[Footnote 122] 

Key Industry Actions Taken: 

AAR Industrywide Security Management Plan: 

AAR's security plan, developed from the results of the industrywide 
risk assessment, comprises of four alert levels with specific security 
actions to be taken by the railroads at each alert level. As the alert 
level rises, as dictated by the AAR board of directors, the security 
actions and countermeasures progressively become more rigorous. These 
actions cover areas such as operations, communications and information 
technology, hazardous materials shipments, and critical infrastructure. 
AAR officials said that the primary benefit of the plan is that it 
allows the industry to tailor and regionalize security measures to the 
current threat environment, such as a specific geographic area, 
specific commodities, and so forth. AAR reported that having the 
ability to tailor security measures to the threat environment is 
critical because AAR estimates it would cost the rail industry $500,000 
a day to operate nationwide at Alert Level 4. In 2007, AAR began 
working with its member railroads to update the industrywide plan. 
[Footnote 123] According to AAR, these efforts generally involved 
restructuring some of the alert level actions and significantly 
increasing the total number of Alert Level 1 actions. Specifically, AAR 
reported that because the industry has historically operated at Alert 
Level 2, many of these actions have become institutionalized by the 
railroads into their normal day-to-day operations. As a result, the 
industry feels that moving many of the current Alert Level 2 actions to 
Alert Level 1 will better reflect the industry's current day-to-day 
operations. Table 11 contains a brief description of each alert level. 

Table 11: AAR Industrywide Security Management Plan's Four Alert 
Levels: 

Alert level: Level 1; 
Description: New normal day-to-day operations: Exists when a general 
threat of terrorist activity exists, but warrants routine security 
posture. Actions in effect at this level include conducting security 
training and awareness activities, restricting certain information to a 
need-to-know basis, restricting the ability of unauthenticated persons 
to trace sensitive materials, and periodically testing that security 
systems are operating as intended. 

Alert level: Level 2; 
Description: Heightened security awareness: Applies when there is a 
general nonspecific threat of terrorist activity. Actions in effect at 
this level include providing security and awareness briefings as part 
of daily job briefings, conducting content inspections of cars and 
containers, and increasing security at designated facilities. 

Alert level: Level 3; 
Description: A credible threat of an attack on the United States or 
railroad industry (continuously reevaluated): Exists in light of the 
specificity of the threat against railroad personnel and facilities. 
Examples of Level 3 actions include further restricting physical access 
and increasing security vigilance at control centers, communication 
hubs, and other designated facilities and requesting national guard 
security for certain critical assets. 

Alert level: Level 4; 
Description: A confirmed threat of attack against the railroad industry 
or actual attack in the United States (implemented up to 72 hours and 
reevaluated): Action taken at this level include stopping the services 
of non-mission-essential contractors with access to critical facilities 
and systems, increasing vigilance and scrutiny of railcars and 
equipment during mechanical inspections to look for unusual items, and 
providing a continuous guard presence at designated facilities and 
structures. 

Source: GAO. 

[End of table] 

Actions Taken by Individual Freight Rail Carriers: 

Rail carriers have also taken a variety of steps to enhance security at 
some of their facilities by, among other things, installing perimeter 
fencing, lighting, security cameras, and other monitoring equipment; 
restricting access through the use of key cards; increasing security 
awareness; providing security training; and increasing the frequency of 
security patrols at key yards and facilities. Several rail carriers we 
visited installed various types of security cameras and monitoring 
equipment at some of their key rail yards and facilities to better 
monitor the activities in and around these areas. In addition, some 
rail carriers had also installed cameras and other surveillance 
equipment at key bridges. One Class I railroad we met with installed 
cameras, electronic motion detectors, and sensors to detect a hazardous 
material release at each end of one of its key tunnels located in a 
major metropolitan area. Several rail carriers had also installed 
perimeter fencing and high-intensity lighting around key rail yards and 
facilities. Figure 4 shows the camera at the tunnel, figure 5 shows 
lighting that another rail carrier had installed at one of its key rail 
yards in Houston, and figure 6 shows perimeter fencing at a rail yard 
in Houston. 

Figure 4: Camera System Located in the Upper-Right-Hand Corner of the 
Tunnel: 

[Refer to PDF for image: photograph] 

Source: GAO. 

[End of figure] 

Figure 5: Light Towers at a Rail Yard in Houston: 

[Refer to PDF for image: photograph] 

Source: GAO. 

[End of figure] 

Figure 6: Perimeter Fencing at a Rail Yard in Houston: 

[Refer to PDF for image: photograph] 

Source: GAO. 

[End of figure] 

Several individual rail carriers we met with also indicated that they 
implemented other types of measures to better secure their facilities 
and operations, including creating backup and dual command centers to 
ensure little or no degradation of service in the event of an attack, 
requiring employees and contract employees to wear ID badges, 
installing firewalls and password protecting critical information, 
increasing the frequency of security patrols at facilities, installing 
security signage, restricting access to key buildings through the use 
of key cards, providing security training, and conducting security 
drills. 

Some rail carriers told us that specifically for TIH cars they have 
increased their temporary storage fees, which are the fees customers 
pay railroads to temporarily store their railcars at local rail yards 
if customers cannot accept the cars when the rail carriers offer them 
for delivery.[Footnote 124] For instance, one Class I carrier we met 
with sent a letter to its customers indicating that it was raising its 
temporary storage fees in 2007 for railcars containing certain 
hazardous materials, including TIH, to $500 for the first 24 hours of 
storage and increasing them to $1,000 per day for each day of storage 
thereafter. Another Class I rail carrier we met with is taking steps to 
require that its TIH customers located in DHS-designated high-threat 
urban areas accept TIH cars upon arrival. This carrier told us that 
this change will reduce the time TIH cars sit in its rail yards waiting 
to be delivered to the customer. However, the carrier also told us that 
it is providing daily service, including weekends, for some of its TIH 
customers located in high-threat urban areas to minimize any negative 
impacts this may have on customer operations. Another rail carrier told 
us that it is not renewing its fixed-lease track agreements with 
companies for temporary storage of certain hazardous materials, 
including TIH.[Footnote 125] Moreover, several rail carriers we met 
with said that they are encouraging their rail yard masters to reduce 
the amount of time TIH cars sit in yards. One carrier stated that its 
goal is to get all TIH cars processed and out of the high-threat urban 
areas in less than 24 hours and that any TIH cars that remain in its 
yards located in a high-threat urban area for more than 24 hours get 
flagged and get first priority for shipment. Some rail carriers we met 
with also stated that they have also taken steps to reroute or stop 
their trains carrying TIH during certain major events. For example, 
rail carriers we met with indicated that they stopped trains during 
World Series games, the Final Four basketball tournament, and NFL 
playoff games. 

Actions Taken by Individual Chemical Companies: 

Representatives we interviewed from all six chemical companies stated 
that they monitor TIH shipments to their destinations using the 
railroad Automatic Equipment Identification system (AEI) to ensure that 
cars are continually moving through the rail system.[Footnote 126] 
Additionally, see the following: 

* Two companies said that they are independently installing Global 
Positioning Systems (GPS) and other detection devices to their tank 
cars to constantly monitor the shipments and be notified if there is a 
potential breach in the car. 

* Some chemical companies have increased their facilities' security 
around rail yards, including increasing security guards and installing 
fencing, cameras, guards, and thermal detection devices around the 
entire perimeter and points of entry for their railroad infrastructure. 
[Footnote 127] 

* One large chemical company we visited in Houston that produces, 
ships, and receives large amounts of chlorine has completely fenced all 
of its rail facilities, installed cameras and motion detection sensors 
at yard entrances, and increased the amount of security lighting and 
frequency of security patrols. This company also told us that it has 
seals for its chlorine tank car shipments that require special cutters 
for removal.[Footnote 128] 

* During a site visit to a chemical company that routinely receives 
large quantities of chlorine, we observed several physical security 
measures that had been installed at the rail receiving facility, such 
as a crash resistant gate, two barbed wire fences, and several 
surveillance cameras.[Footnote 129] Figure 7 illustrates some of the 
fencing installed by this chemical customer. 

Figure 7: TIH Rail Customer Facility with Barbed Wire Fencing around 
the Perimeter: 

[Refer to PDF for image: photograph] 

Source: GAO. 

[End of figure] 

[End of section] 

Appendix V: Federal and Industry Stakeholders Also Report Facing 
Technology Challenges to Enhancing the Security of TIH: 

Federal and industry stakeholders identified three main technology 
challenges to better securing TIH shipments, which--if overcome--could 
improve the security of future TIH shipments. These challenges include 
designing stronger tank cars, developing more real-time railcar 
tracking and monitoring systems, and substituting highly hazardous 
materials with less dangerous chemicals. While federal and industry 
stakeholders are currently working to meet these challenges, it is too 
soon to know if these efforts will mitigate the outstanding security 
risks, as many of these efforts are still under way. 

While some federal and industry stakeholder officials we spoke with 
reported that designing stronger tank cars and better railcar tracking 
systems and substituting TIH chemicals with less dangerous ones are 
ways to reduce the security risks these materials pose in transit, they 
also described technology challenges associated with these efforts. 
However, stakeholders viewed some of these challenges as more difficult 
or costly to overcome than others. For example, some stakeholders we 
spoke with told us that it can be difficult to find substitutes for 
some chemicals, for example, chlorine, because it is a base product 
used to make other products. In addition, officials from all six of the 
chemical companies we met with told us that it can be expensive to 
switch to alternative chemicals because switching would require them to 
retrofit facilities to be able to make or use the alternate products 
and processes. However, while some industry stakeholders identified the 
challenge of tracking the real-time location or status of railcars 
while in transit, some stakeholders are finding more real-time ways to 
track hazardous railcar movements through the use of GPS. 

Furthermore, government and industry stakeholders reported that they 
have been engaged in research aimed at developing safer tank cars that 
could better withstand an accident or derailment and will be less 
likely to breach and release dangerous chemicals. However, some rail 
and chemical industry officials--as well as government officials-- 
reported that it is difficult to develop a tank car that would be 
resistant to all potential security threats, such as certain types of 
IEDs, yet would also be safe and have the capacity to carry sufficient 
amounts of product. Specifically, these stakeholder officials stated 
that it was difficult to design tank cars such that security 
improvements to the car--such as reinforcing its hull--do not 
simultaneously compromise the car's safety. According to these 
officials, adding layers to the hull of a tank car increases its 
weight, which can result in the car being too heavy for the tracks and 
thus increase the likelihood of its derailment and the resultant 
potential release of toxic materials. They also reported that they 
could mitigate the weight concern by decreasing the capacity of the 
car, but this would result in more tank cars being put on the rail 
system to carry the same amount of hazardous materials, thereby 
increasing the potential risk of an incident as well as congestion in 
the system. FRA and TSA are also investigating ways to overcome 
technological challenges, such as researching lightweight coatings that 
could potentially add ballistics penetration resistance to a tank car 
without substantially increasing the car's weight. FRA has also tested 
various products with self-sealant capabilities to protect against a 
large-caliber weapon creating a gaping hole in a tank car if it was 
penetrated by a bullet. These officials believe that they may be able 
to apply these materials to future tank cars, if their weight and costs 
are not too high, but this research is still under way. 

Another technology challenge that stakeholders face relates to 
developing more sophisticated railcar tracking systems. Currently, the 
technology most widely used in the rail industry to track railcar 
movements, AEI, does not provide the real-time location or status of 
railcars while in transit. Instead, AEI is a passive tracking system 
that tracks railcars by unique radio-frequency identification tags. 
When a railcar or train passes a reader, its location is recorded and 
sent to the railroad. However, the system cannot transmit the precise 
location of the car, only that it has passed a reader, and in some 
areas AEI readers could be 30 to 40 miles apart. As a result, some 
industry stakeholders, including certain chemical companies we 
contacted, are installing GPS on tank cars as an alternative method of 
tracking their tank cars from origin to destination.[Footnote 130] 
However, these chemical company officials noted that although GPS 
technology has clear benefits, it can have limitations, such as a 
limited battery life and problems with signal interference, for 
example, when a car travels through a tunnel. TSA is conducting a study 
comparing GPS to the current system, AEI. Results of these studies are 
expected in 2009. 

Lastly, industry stakeholders face technology challenges in attempting 
to substitute less toxic materials for the highly hazardous materials 
that currently traverse the freight rail system. While federal and 
industry officials we interviewed said that substituting highly toxic 
chemicals with less hazardous materials is one way to reduce risk, 
chemical industry officials told us that doing so can be expensive, and 
finding substitutes for some highly hazardous chemicals is especially 
difficult because these chemicals serve as the bases for other 
products--and thus do not currently have substitutes. For instance, 
chlorine is used to develop a wide array of products, including 
medicines, semiconductors, and paints, in addition to being used for 
water treatment. Anhydrous ammonia is most commonly used to develop 
fertilizers to enhance crop growth. While some water treatment 
facilities have started using chemicals other than chlorine to purify 
water, some chemical company officials we spoke with said that a 
substitute for some TIH chemicals has not been identified for all 
processes. In addition, chemical company officials we spoke with told 
us that product substitution can be expensive because switching to 
alternative chemicals would require them to retrofit facilities to be 
able to make or use the alternate products and processes. 

According to some industry stakeholders we spoke with, one alternative 
to developing substitute chemicals would be to move these materials by 
pipeline rather than rail or to colocate production and consumption 
facilities, thereby eliminating the need to transport them by rail. 
Some chemical industry officials reported that these options could also 
be potentially costly and would require some retrofitting of chemical 
facilities. Another alternative shipping option is to move these 
materials by truck. However, according to officials we spoke with from 
one large chemical company, the risk of shipping TIH materials by truck 
is significantly higher than the risk with rail shipments, and as a 
result, they have elected to not ship by truck. In contrast, some 
members of the rail industry we spoke with supported these 
alternatives, recognizing that these measures would reduce the volume 
of highly hazardous materials on the rail system and concurrently 
reduce their security risks and liability concerns. 

[End of section] 

Appendix VI: Summary of 9/11 Commission Act Requirements Pertaining to 
Freight Rail Security: 

The 9/11 Commission Act, signed into law on August 3, 2007, requires 
federal stakeholders to take several additional steps to further secure 
the freight rail system, including TIH shipments. Table 12 provides a 
listing of the key provisions in the act that are relevant to freight 
rail security. 

Table 12: Key Provisions from the 9/11 Commission Act That Are Relevant 
to Freight Rail Security: 

Provision: Sec. 1202: Transportation Security Strategic Planning; 
Description: 
* Specifies that the transportation modal security plan required under 
49 U.S.C. § 114(t) must include threats, vulnerabilities, and 
consequences; 
* Requires that the National Strategy for Transportation Security 
(NSTS) include a 3-year and a 10-year budget for federal transportation 
security programs that will achieve the priorities of the NSTS, methods 
for linking the individual transportation modal security plans and a 
plan for addressing intermodal transportation, and transportation modal 
security plans; 
* Requires the Secretary of Homeland Security, in addition to 
submitting an assessment of the progress made on implementing the NSTS, 
to submit an assessment of the progress made on implementing the 
transportation modal security plans; 
* Requires that the progress reports include an accounting of all 
grants for transportation security; funds requested in the President's 
budget for transportation security, by mode; personnel working on 
transportation security, by mode; and information on the turnover in 
the previous year among senior staff working on transportation security 
issues; 
* Requires that the NSTS include the TSSP required by Homeland Security 
Presidential Directive 7. 

Provision: Sec.1304: Surface Transportation Security Inspectors; 
Description: 
* Authorizes the Secretary to train, employ, and utilize STSIs; 
* Requires the Secretary to employ up to a total of: 
- 100 STSIs in fiscal year 2007; 
- 150 STSIs in fiscal year 2008; 
- 175 STSIs in fiscal year 2009, and; 
- 200 STSIs in fiscal years 2010 and 2011; 
* Requires the DHS Inspector General, not later than September 30, 
2008, to submit a report to the appropriate committees on the 
performance and effectiveness of STSIs, whether there is a need for 
additional inspectors, and other recommendations. 

Provision: Sec. 1511: Railroad Transportation Security Risk Assessment 
and National Strategy; 
Description: 
* Requires the Secretary to establish a federal task force to complete, 
within 6 months after enactment (Feb. 3, 2008), a nationwide risk 
assessment of a terrorist attack on railroad carriers; 
* Requires the Secretary to develop and implement, not later than 9 
months after enactment (May 3, 2008), the modal plan for railroad 
transportation, as required by 49 U.S.C. § 114(t); 
* Requires the Secretary to transmit to the appropriate congressional 
committees, not later than 1 year after enactment (Aug. 3, 2008), the 
assessment and national railroad strategy and an estimate of the cost 
to implement the strategy; 
* Consistent with the requirements of 49 U.S.C. § 114(t), requires the 
Secretary to update the assessment and strategy each year and submit a 
report containing the assessment and report; 
* Requires that $5 million out of the funds authorized by this act be 
made available to the Secretary for fiscal year 2008 to carry out this 
section. 

Provision: Sec. 1512: Railroad Carrier Assessments and Plans; 
Description: 
* Requires the Secretary to assign each railroad carrier to a risk-
based tier; 
* Authorizes the Secretary to establish a security program for railroad 
carriers not assigned to the high-risk tier; 
* Requires the Secretary, not later than 12 months after enactment 
(Aug. 3, 2008), to establish standards and guidelines for developing 
and implementing the vulnerability assessments and security plans for 
railroad carriers assigned to high-risk tiers; 
* Requires the Secretary, not later than 12 months after enactment 
(Aug. 3, 2008), to issue regulations that require each railroad carrier 
assigned to a high-risk tier to conduct a vulnerability assessment and 
prepare, submit to the Secretary for approval, and implement a security 
plan; 
* Requires railroad carriers assigned to a high-risk tier to submit 
vulnerability assessments and security plans to the Secretary for 
approval not later than 9 months after the date of issuance of the 
regulations; 
* Requires the Secretary to provide technical assistance and guidance 
to railroad carriers in conducting vulnerability assessments and to 
require that each vulnerability assessment include certain factors; 
* Requires the Secretary to provide technical assistance and guidance 
to railroad carriers in preparing and implementing security plans and 
to require that each security plan include certain factors; 
* Requires the Secretary to provide threat information that is relevant 
to the carrier to appropriate employees of a railroad carrier; 
* Requires the Secretary, within 6 months of receiving the assessments 
and security plans, to review each assessment and security plan, 
require amendments to any security plan that does not meet the 
applicable requirements, and approve any vulnerability assessment or 
security plan that meets the applicable requirements; 
* Authorizes the Secretary to require railroad carriers, during the 
period before the deadline for submitting the assessments and security 
plans, to submit a security plan to implement any necessary interim 
security measures essential to providing adequate security; 
* Authorizes the Secretary to determine that existing procedures, 
protocols, and standards meet all or part of the requirements of this 
section and authorizes the railroad carriers to comply with existing 
procedures, protocols, and standards that meet the requirements of this 
section; 
* Requires each railroad carrier that submitted a vulnerability 
assessment and security plan and is still assigned to the high-risk 
tier to submit to the Secretary an evaluation of the adequacy of the 
vulnerability assessment and security plan not later that 3 years after 
the vulnerability assessment and security plan are approved by the 
Secretary, and at least once every 5 years thereafter, and requires the 
Secretary to review the evaluation within 180 days of submission. 

Provision: Sec. 1513: Railroad Security Assistance; 
Description: 
* Authorizes the Secretary to make grants to railroad carriers, the 
Alaska Railroad, security-sensitive materials shippers that ship by 
railroad, owners of railroad cars used in the transportation of 
security-sensitive materials, state and local governments for railroad 
passenger facilities and infrastructure not owned by Amtrak, and Amtrak 
for specified intercity passenger railroad and freight railroad 
security improvements; 
* Establishes that any railroad carrier that has an approved 
vulnerability assessment and security plan and any carrier that uses 
the grant funds solely to develop an assessment or security plan is 
eligible for grant funds, and authorizes the Secretary, prior to the 
earlier of 1 year after the date of issuance of final regulations 
requiring vulnerability assessments and security plans or 3 years after 
the date of enactment (Aug. 3, 2010), to award grants to carriers based 
on vulnerability assessments and security plans that the Secretary 
deems are sufficient for the purposes of this section but that have not 
been approved by the Secretary; 
* Requires the Secretary to determine the requirements for recipients 
of grants, establish priorities for uses of funds for grant recipients, 
award the funds based on risk, take into account whether stations or 
facilities are used by commuter railroad passengers as well as 
intercity railroad passengers, encourage nonfederal financial 
participation in projects funded by grants, and not later than 5 
business days after awarding a grant to Amtrak, transfer grant funds to 
the Secretary of Transportation to be disbursed to Amtrak. 

Provision: Sec. 1516: Railroad Carrier Exercises; 
Description: 
* Requires the Secretary to establish a program for conducting security 
exercises for railroad carriers. 

Provision: Sec. 1517: Railroad Carrier Training Program; 
Description: 
* Requires the Secretary, not later than 6 months after enactment (Feb. 
3, 2008), to develop and issue regulations for a training program to 
prepare railroad frontline employees for potential security threats and 
conditions; 
* Requires each railroad carrier, not later than 90 days after the 
Secretary issues the regulations, to develop a security training 
program in accordance with the regulations and submit the program to 
the Secretary for approval; 
* Requires the Secretary, not later than 60 days after receiving a 
security training program, to approve the program or require the 
operator to make revisions; 
* Requires the carrier to respond to the Secretary's comments not later 
than 30 days after receiving them; 
* Requires the carrier, not later than 1 year after the Secretary 
approves a security training program, to complete the training of all 
railroad frontline employees who were hired more than 30 days preceding 
such date, and requires the carrier to complete training for employees 
employed less than 30 days preceding such date within their first 60 
days of employment; 
* Requires the Secretary to periodically review and update, as 
appropriate, the training regulations to reflect new or changing 
security threats; 
* Requires the Secretary, not later than 2 years after the issuance of 
the regulations, to review implementation of the training program of a 
representative sample of railroad carriers and frontline employees and 
submit a report to the appropriate committees. 

Provision: Sec. 1518: Railroad Security Research and Development; 
Description: 
* Requires the Secretary, acting through the Under Secretary for 
Science and Technology and the Administrator of TSA, to carry out a 
research and development program to improve the security of railroad 
transportation systems. 

Provision: Sec. 1519: Railroad Tank Car Security Testing; 
Description: 
* Requires the Secretary to conduct a vulnerability assessment of 
railroad tank cars used to transport TIH materials; 
* Requires the Secretary, acting through the National Infrastructure 
Simulation and Analysis Center, to conduct an air dispersion modeling 
analysis of release scenarios of TIH materials resulting from a 
terrorist attack on a loaded railroad tank car. 

Provision: Sec. 1520: Railroad Employee Security Threat Assessments; 
Description: 
* Requires the Secretary, not later than 1 year after enactment (Aug. 
3, 2008), to complete a name-based security background check against 
the consolidated terrorist watchlist and an immigration status check 
for all railroad frontline employees. 

Provision: Sec. 1522: Procedural Requirements for Railroad Employee 
Security Threat Assessments; 
Description: 
* Requires the Secretary, if the Secretary issues any guidance, 
recommendations, suggested action items, or any other widely 
disseminated voluntary action items related to security background 
checks of railroad employees, to include recommendations on the 
appropriate scope and application of a security background check and a 
redress process for adversely affected individuals; 
* Requires the Secretary, if the Secretary issues any rule, regulation, 
or directive requiring a railroad carrier to perform a security 
background check of employees, to prohibit the carrier from making an 
adverse employment decision unless the carrier determines that the 
employee has been convicted, has been found not guilty by reason of 
insanity, or is under want, warrant, or indictment for a permanent 
disqualifying criminal offense, as defined for the Transportation 
Worker Identification Credential (TWIC) program in 49 C.F.R. pt. 1572; 
was convicted or found not guilty by reason of insanity of an interim 
disqualifying offense, as defined for the TWIC program in 49 C.F.R. pt. 
1572, within 7 years of the date of the background check; or was 
incarcerated for an interim disqualifying offense and released from 
incarceration within 5 years of the date of the background check; 
* Requires the Secretary, if the Secretary issues any rule, regulation, 
or directive requiring a railroad carrier to perform a security 
background check of employees, to provide an adequate redress process 
for an employee subjected to an adverse employment decision that is 
consistent with the appeals and waiver process established for the TWIC 
program in 46 U.S.C. § 70105(c), and to have the authority to order an 
appropriate remedy if the Secretary determines that a carrier 
wrongfully made an adverse employment decision; 
* Prohibits a carrier from knowingly misrepresenting to an employee or 
other relevant person the scope, application, or meaning of any rules, 
regulations, directives, or guidance issued by the Secretary related to 
security background checks. 

Provision: Sec. 1524: International Railroad Security Program; 
Description: 
* Requires the Secretary to develop a system to detect both undeclared 
passengers and contraband, with a primary focus on the detection of 
nuclear and radiological materials entering the United States by 
railroad; 
* Requires the Secretary to identify and seek the submission of 
additional data elements for improving high-risk targeting of cargo 
prior to importation into the United States, utilize data collected and 
maintained by the Secretary of Transportation in the targeting of high-
risk cargo, and analyze the data to identify high-risk cargo for 
inspection; 
* Requires the Secretary to transmit to the appropriate committees a 
report that describes the progress of the system being developed. 

Provision: Sec. 1551: Railroad Routing of Security-Sensitive Materials; 
Description: 
* Requires the Secretary of Transportation, not later than 9 months 
after enactment (May 3, 2008), to publish a final rule based on PHMSA's 
Notice of Proposed Rulemaking published on December 21, 2006; 
* Requires the Secretary of Transportation to ensure that the final 
rule requires each railroad carrier transporting security-sensitive 
materials in commerce, not later than 90 days after the end of each 
calendar year, to compile security-sensitive materials commodity data; 
* Requires the Secretary of Transportation to ensure that the final 
rule requires each railroad carrier transporting security-sensitive 
materials in commerce to provide, for each calendar year, a written 
analysis of the safety and security risks for the transportation routes 
identified in the security-sensitive materials commodity data; 
* Requires the Secretary of Transportation to ensure that the final 
rule requires each railroad carrier transporting security-sensitive 
materials in commerce, for each calendar year, to identify practicable 
alternative routes over which the railroad carrier has authority to 
operate and perform a safety and security risk assessment of each 
alternative route; 
* Requires the Secretary of Transportation to ensure that the final 
rule requires each railroad carrier transporting security-sensitive 
materials in commerce to use the required analysis to select the safest 
and most secure route to be used in transporting security-sensitive 
materials; 
* Requires the Secretary of Transportation to ensure that the final 
rule requires each railroad carrier transporting security-sensitive 
materials in commerce, not less than once every 3 years, to analyze the 
route selection determinations required under this section to review 
all operational changes, infrastructure modifications, traffic 
adjustments, changes in the nature of high-consequence targets located 
along or in proximity to the route, or other changes affecting the 
safety and security of the movements of security-sensitive materials 
that were implemented since the previous analysis was completed. 

Provision: Sec. 1552: Railroad Security-Sensitive Material Tracking; 
Description: 
* Requires the Secretary to develop a program that will encourage the 
equipping of railroad cars transporting security-sensitive materials 
with technology that provides car position location and tracking 
capabilities and notification of railroad car depressurization, breach, 
unsafe temperature, or release of hazardous materials, as appropriate. 

Provision: Sec. 1555: Hazardous Materials Security Inspections and 
Study; 
Description: 
* Requires the Secretary of Transportation to consult with the 
Secretary of Homeland Security to limit, to the extent practicable, 
duplicative reviews of hazardous materials security plans; 
* Requires the Secretary of Transportation, in conjunction with the 
Secretary of Homeland Security, within 1 year after enactment (Aug. 3, 
2008), to study the extent to which insurance, security, and safety 
costs borne by railroad carriers, motor carriers, pipeline carriers, 
air carriers, and maritime carriers associated with the transportation 
of hazardous materials are reflected in the rates paid by offerors of 
such commodities as compared to the costs and rates for the 
transportation of nonhazardous materials. 

Source: GAO analysis of Pub. L. No. 110-53, 121 Stat. 266. (2007). 

[End of table] 

[End of section] 

Appendix VII: Comments from the Department of Homeland Security: 

U.S. Department of Homeland Security: 
Washington, DC 20528: 

April 7, 2009: 

Ms. Cathleen A. Berrick: 
Director, Homeland Security and Justice Issues: 
U.S. Government Accountability Office (GAO): 
441 G Street, NW: 
Washington, DC 20548: 

Dear Ms. Berrick: 

The Department of Homeland Security (DHS) would like to thank you for 
the opportunity to comment on the GAO-09-243 SU draft report titled, 
"Actions Have Been Taken to Enhance Security, but the Federal Strategy 
Can Be Strengthened and Security Efforts Better Monitored". The 
Transportation Security Administration (TSA) values the investigative 
team's comprehensive review of this Agency's progress in addressing 
freight rail security needs and intends to immediately implement its 
recommendations. TSA also wishes to express our appreciation for the 
professionalism demonstrated by GAO's team members in conducting this 
difficult and broad-ranging review. 

This letter responds to the recommendations made by the GAO and 
provides current information on the status of programs referred to in 
the draft report. The following activities have occurred within TSA 
since our last conversation with the GAO review team on December 10, 
2008. 

Corridor Assessments: 

In early 2004, the Homeland Security Council (HSC) requested that DHS 
and the U.S. Department of Transportation (DOT) conduct risk 
assessments specifically examining the movement of tank cars used for 
the bulk shipment of toxic inhalation hazard (TIH) materials in nine 
urban areas: Washington, DC, Northern New Jersey, Cleveland, New 
Orleans, Buffalo, Houston, Chicago, Philadelphia, and Los Angeles. 
These nine areas were part of a larger list of 46 High Threat Urban 
Areas (HTUAs) defined by DHS. These risk assessments are known as 
Freight Rail Comprehensive Reviews or Freight Rail Corridor Assessments 
(Comprehensive Review). TSA has conducted seven Comprehensive Reviews 
involving over a dozen railroad companies. 

A Comprehensive Review is comprised of three distinct phases. The first 
is the fact gathering phase. During this phase, TSA determines the 
distinct geographic area that comprises the Corridor under assessment. 
Once the Corridor area has been determined, the TSA team conducts 
research to determine the locations of shippers, receivers, and rail 
facilities that handle tank cars with TIH materials. A request for 
information is sent to the railroads operating within the Corridor to 
provide TSA staff with an overview of railroad operations in the area. 
Potential locations of interest, known as security control points 
(SCPs), are identified for inclusion in on-site evaluations that are 
conducted in phase two. 

The second phase is the analysis phase. During this phase, TSA, along 
with representatives of the participating railroads and other 
Government partners, conducts on-site security evaluations of locations 
identified in the fact gathering phase. Analysis of the information 
gathered during the on-site evaluations is used to identify gaps in 
preparedness and countermeasures. Locations initially identified as 
areas of concern may be removed as a result of information gathered 
during the on-site visits. Preliminary options for consideration are 
identified and noted during this phase. 

The third phase is the options for consideration phase. During this 
phase, a tabletop exercise is conducted with representatives from TSA, 
participating railroads, and other Government partners to review all 
SCPs visited during phase two. Options for consideration that are 
developed at the tabletop exercise are presented in a report and 
include countermeasures, security enhancements, and mitigation 
strategies based on team member observations and analysis of factual 
information. The railroads use this experience and information to 
develop and implement methods to continue this cooperative process in 
reducing vulnerabilities associated with TIH shipments moving through 
HTUAs. 

In addition to completing the risk assessments directed by the HSC in 
the nine metropolitan areas listed above, TSA has also completed 
assessments in Sacramento, Oklahoma City, and Baltimore. Additional 
assessments are currently underway in Denver, Milwaukee, Charlotte, 
Little Rock, and Atlanta. 

Between 2006 and 2008, the DHS Urban Area Security Initiative (UASI) 
list[Footnote 131] has grown from 46 to 60 locations. TSA has leveraged 
the resources of the Surface Transportation Security Inspectors (STSI) 
and plans to conduct assessments in the remainder of the 60 HTUAs as 
itemized in the 2009 DHS UASI list.[Footnote 132] 

STSI Program: 

The STSI program deploys 175 inspectors in 54 field offices to conduct 
surveys and inspections of freight rail and other surface 
transportation operations throughout the Nation. The efforts of the 
inspectors are focused on the HTUAs of highest risk in the freight rail 
industry. The inspection program is responsible for verifying 
implementation of voluntary security measures, conducting vulnerability 
assessments, and conducting regulatory compliance inspections. In 
addition to participating in Corridor Assessments, which feed 
recommendations to TSA leadership, the inspectors also act as local 
liaisons to railroad carriers and other Government agencies for 
emergency planning and response. This important component of layered 
security will expand in fiscal year (FY) 2009 to 225 inspectors 
nationwide. 

Corporate Security Reviews (CSR): 

CSRs evaluate and collect physical and operational preparedness 
information including critical asset and key point-of-contact lists; 
review emergency procedures and domain awareness training; and provide 
an opportunity to share industry best practices. Since the inception of 
the TSA Freight Rail Division in 2002, TSA has worked closely with 
railroad carriers to determine the level of security throughout the 
industry and to improve it. In coordination with freight rail 
stakeholders, TSA has issued guidelines and recommended protective 
measures to enhance freight rail security, particularly as it applies 
to the risk associated with the transportation by rail of TIH 
materials. Among other things, TSA's guidelines recommended that 
railroad carriers develop and implement security plans. Measures 
railroad carriers have taken through this voluntary program have 
resulted in an overall risk reduction of more than 60 percent, well 
above the target reduction of 50 percent. The CSR program not only 
assesses how a freight railroad carrier's security plan addresses the 
transportation of hazardous materials, but also reviews and assesses 
the effectiveness of those plans in the following areas: 

* Communication of Security Plan; 
* Audit of Security Plan; 
* Cyber Security; 
* Protection of Critical Assets; 
* Security Awareness Training; 
* Personnel Security; 
* Threat Assessment. 

In addition, the CSRs also provide carriers an opportunity to update 
TSA on system-wide improvements as they relate to the implementation of 
the security plan. 

In 2008, TSA updated the methodology and format of the CSRs to 
facilitate comparative scoring metrics that will enable TSA and 
industry stakeholders to identify best practices. In addition, TSA has 
conducted CSRs on railroad entities that exercise operating control 
over 98 short line, regional, and terminal railroads. During FY 2009, 
TSA plans to revisit Class I railroads utilizing the new methodology to 
assess the improvements and security enhancements that have taken place 
since the original CSRs were conducted in FY 2007. 

TSA Rail Security Rule: 

On November 26, 2008, TSA issued a final rule on rail transportation 
security aimed at strengthening the security of the Nation's freight 
and passenger rail systems, including reducing the risk associated with 
the transportation of security-sensitive materials, including TIH 
materials, 73 FR 72130. While TIH materials represent less than one 
percent of all hazardous materials rail shipments, these materials are 
potentially lethal and include essential chemicals such as chlorine and 
anhydrous ammonia. The final rule requires that freight railroad 
carriers, rail hazardous materials shippers, rail hazardous materials 
receivers, and passenger rail carriers (including passenger railroad 
carriers and rail transit systems) allow TSA and DHS officials to 
enter, inspect, and test property, facilities, conveyances, and records 
relevant to rail security. The regulated parties must also designate 
rail security coordinators and report significant security concerns to 
TSA. 

In the case of freight rail, the final rule requires freight railroad 
carriers and certain facilities handling specified hazardous materials 
to be able to report location and shipping information to TSA upon 
request, and implement chain of custody requirements to ensure a 
positive and secure exchange of rail security-sensitive materials. 

Information Sharing: 

In response to the statements on pages 64-65 of the report concerning 
information sharing by the Association of American Railroads (AAR) with 
the DHS Office of Infrastructure Protection (IP), we are confident that 
the Protected Critical Infrastructure Information (PCII) Program and 
the protections embodied in the Sensitive Security Information (SSI) 
law and regulations can meet the needs of AAR to protect the critical 
infrastructure information it shares with DHS. The PCII Program is a 
voluntary program that the private sector may use to protect its most 
sensitive information when shared with the Government. IP is currently 
in discussions with AAR on sharing their critical infrastructure list 
through PCII, but ultimately it is the association's decision whether 
the information will be submitted to DHS. Sensitive Security 
Information (SSI) is a specific category of information related to 
transportation security that requires protection against public 
disclosure. Although it is not classified national security 
information, SSI is a category of sensitive but unclassified 
information that, along with PCII, is specifically exempted by statute 
from release under the Freedom of Information Act (FOIA), and is to be 
disclosed only to covered persons on a need to know basis. While SSI 
may be shared with regulated entities, the public disclosure of 
information obtained or developed in the conduct of security activities 
is generally prohibited. 

Infrastructure Assessment: 

The TSA Freight Rail Division is developing an initiative to address 
the security of critical railroad infrastructure. As of March 2009, we 
have created a draft risk tool to identify critical freight rail 
infrastructure and measure the relative risk associated with it. The 
tool will first focus on railroad bridges, and then another version 
will be developed to measure relative risk to tunnels and other 
railroad infrastructure. The tool will be similar in design to HACCP 
(Hazard Analysis and Critical Control Point) which was developed to 
measure the relative risk of bulk TIH in densely populated areas. The 
TSA infrastructure tool will measure criticality and vulnerability. 

We have scheduled meetings with several Class I freight railroad 
carriers to seek their input and comment on the infrastructure tool. 
The first meeting of this type took place March 10, 2009. We plan to 
roll out our assessment tool at an Intermodal Security Training and 
Exercise Program (ISTEP) workshop with industry security partners in 
summer 2009. When the tool is finalized, we will begin assessing the 
railroad crossings over the Mississippi, Ohio, and Missouri rivers. 
Additionally, TSA STSIs will use the tool to assess critical railroad 
infrastructure in HTUAs in which they conduct Corridor Reviews. 

DHS Freight Rail Security Grant Program (FRSGP): 

The FRSGP was created as a new component of the Transit Security Grant 
Program (TSGP) in FY 2008. The TSGP is one of five DHS programs that 
focus on infrastructure protection activities with a primary focus on 
strengthening the Nation's critical infrastructure against terrorism. 
In FY 2008, the FRSGP provided $7.4M to railroad operators that 
transport security-sensitive materials through HTUAs. Class I freight 
railroad carriers whose annual operating revenues exceed $319.2 million 
may request funds to support security awareness and emergency response 
training for frontline employees provided they have completed an 
acceptable vulnerability assessment and security plan. Class II freight 
railroad carriers whose annual operating revenues are between $25.5M 
and $319.2M, and Class III freight railroad carriers whose annual 
operating revenues are less than $25.5M may request funds to conduct a 
vulnerability assessment and develop a security plan. The Class II and 
Class III freight railroad carriers may also request funds to support 
security awareness and emergency response training for frontline 
employees if they have completed an acceptable vulnerability assessment 
and security plan. 

The FY 2009 FRSGP applications are expected to be awarded the spring of 
2009. This year's $15M grant program builds on the FY 2008 programs 
regarding Security Plan, Vulnerability Assessments, and Frontline 
Railroad Employee Training. In addition to these important programs, 
TSA included a new program to encourage the railroad industry to start 
utilizing GPS-based tracking solutions to monitor their high risk 
assets as they move through HTUAs. The GPS program will provide the 
tank car owners and operators the resources to install GPS tracking 
devices on bulk-TIH tank car shipments, which will enhance the 
protection and visibility of these dangerous commodities. 

The following represents the Department of Homeland Security's response 
to the recommendations made by the GAO: 

Recommendation 1: To ensure that the Federal strategy to secure the 
freight rail system is comprehensive and considers a wider range of 
risk information, develop a plan for addressing identified security 
threats to freight rail other than toxic inhalation hazard (TIH such as 
the destruction of or sabotage to freight rail bridges and tunnels and 
cyber attacks to the rail system, and incorporate this information and 
other related strategic updates into its Freight Rail Modal Annex. As 
part of this effort, further evaluate methods for estimating the 
likelihood of various threats occurring and ensure that this 
information is also considered when developing future risk assessments 
and strategic updates. 

TSA Concurs: In accordance with Section 1511 of the Implementing 
Recommendations of the 9/11 Commission Act of 2007, TSA is collecting 
comments from railroad management, labor organizations representing 
railroad employees, owners or lessors of railroad cars used in the 
transport of hazardous material, emergency responders, offerors of 
security-sensitive materials and public safety officials regarding the 
National Strategy for Railroad Security. This stakeholder input was 
considered during the development of the national strategy and will 
provide additional guidance during its implementation. In addition, the 
TSA Freight Rail Division is developing an initiative to address the 
security of critical railroad infrastructure. TSA has created a draft 
risk tool designed to identify critical freight rail infrastructure and 
measure the relative risk associated with it. The tool will measure 
criticality and vulnerability and will initially focus on railroad 
bridges. Ensuing versions of the tool will be developed by TSA to 
measure relative risk to tunnels and other infrastructure. TSA has 
scheduled meetings with several Class I freight railroad carriers to 
seek their input and comment on the infrastructure tool. The first 
meeting of this type occurred on March 10, 2009. We plan to roll out 
our assessment tool at an ISTEP (Intermodal Security Training and 
Exercise Program) workshop with industry security partners in summer 
2009. When the tool is finalized, we will begin assessing the railroad 
crossings over the Mississippi, Ohio, and Missouri rivers. 
Additionally, TSA Surface Transportation Security Inspectors (STSIs) 
will use the tool to assess critical railroad infrastructure in High 
Threat Urban Areas as they conduct Corridor Reviews. 

Recommendation 2: To better ensure that relevant Federal and industry 
partners effectively leverage their resources to achieve the strategic 
vision of TSA's Freight Rail Modal Annex, TSA should ensure that future 
updates to its Annex more comprehensively address factors contained in 
Executive Order 13416 and identified key characteristics of a 
successful national strategy including: 

* describing the methodology used to develop the strategy and which 
organizations and entities contributed to its development; 

* more clearly defining Federal and industry roles and 
responsibilities; 

* ensuring that performance measures have defined targets and are 
linked to fulfilling goals and objectives; 

* more systematically addressing specific milestones for completing 
activities and measure progress toward meeting identified goals; 

* more thoroughly identifying the resources and investments required to 
implement the strategy, including priorities for allocating future 
grants; and; 

* more comprehensively identifying linkages with other developed 
strategies such as those that guide DHS IP, whose responsibilities 
overlap with TSA for protecting freight rail critical infrastructure. 

TSA Concurs: TSA endorses the elements detailed in recommendation 2. 
TSA incorporates many of those elements into the Freight Rail Modal 
Annex. Future updates of TSA's Freight Rail Modal Annex will be 
designed to more specifically address issues such as stakeholder roles 
and linkages, goal oriented milestones, performance measures, and 
future resource requirements. 

Recommendation 3: To ensure that TSA is consistently and accurately 
measuring agency and industry performance in reducing the risk 
associated with TIH rail shipments in major cities, take steps to 
revise the baseline year associated with its TIH risk reduction 
performance measure to enable the agency to more accurately report 
results for this measure. 

TSA Concurs: TSA recognizes the importance of establishing outcome-
based performance measures for any and all programs developed and 
implemented to strengthen security. TSA will establish a new 12-month 
baseline in which the data is empirical and qualified by TIH Risk 
Reduction Surveys. Current year performance will be compared to the new 
baseline period and scored to determine variance. In addition, in an 
effort to maintain consistency, provide historical perspective, and to 
discern the effectiveness of the voluntary Security Action Items (SAI), 
TSA will continue to measure and score current performance and compare 
it to the original baseline that is comprised of the 12-month period 
preceding the adoption of the SAIs, but in doing so, will provide 
sufficient information with regard to possible data limitations. 

Recommendation 4: To ensure that TSA is able to more effectively assess 
the progress being made in securing freight rail, balance future 
activities against the various security risks to freight rail, and use 
its and industry's resources in the most cost effective manner, take 
steps to more fully track and assess the implementation and 
effectiveness of security actions being taken to secure freight rail. 

TSA Concurs: TSA will continue to track the level of industry SAI 
adoption and implementation as well as compliance with 49 CFR part 1580 
through STSI inspections of railroad carrier locations and operations. 
The additional perspective gained by measuring TIH risk reduction 
performance against the previous year will enable TSA to determine the 
efficacy of freight rail initiatives and security actions as they are 
being implemented. TSA will continue to track TIH dwell time and assess 
the level of attendance for loaded TIH rail cars by High Threat Urban 
Area and by freight railroad carrier. In addition, Corporate Security 
Reviews will provide insights into system-wide improvements effected by 
freight railroad carriers as they occur and, when compared to the 
current assessments, shed light on the effectiveness of those 
improvements. 

Recommendation 5: To better ensure that Federal agencies are 
coordinating as effectively as possible, work with Federal partners, 
such as DHS-IP and the Federal Railroad Administration (FRA), to ensure 
that all relevant assessments and information are shared and TSA and 
FRA field inspector resources are fully leveraged. 

TSA Concurs: Recognizing the importance of having and maintaining 
strong working relationships with other Government agencies, as well as 
working through the Government Coordinating Council security 
partnership framework established in the National Infrastructure 
Protection Plan, TSA has established a Government coordination process 
that continues to mature and develop. TSA recognizes the need to 
specifically define roles and responsibilities with all freight rail 
security stakeholders, including industry and Federal, State, local, 
and tribal Governments. The appropriate document TSA is using to define 
roles and responsibilities, as well as describe communication methods 
and measurement efforts, is the Transportation Systems Sector Specific 
Plan modal annex. 

The DHS National Protection and Programs Directorate (NPPD) agrees that 
sharing assessments and information is a vital practice. NPPD will 
continue its efforts to appropriately coordinate with TSA. 

DHS appreciates the opportunity to review and comment on draft report 
GAO-09-243SU and we look forward to working with you on future homeland 
security issues. 

Sincerely, 

Signed by: 

Jerald E. Levine Director: 
Departmental DHS GAO/OIG Liaison Office: 

[End of section] 

Appendix VIII: GAO Contact and Staff Acknowledgments: 

GAO Contact: 

Cathleen A. Berrick, (202) 512-3404 or berrickc@gao.gov: 

Acknowledgments: 

In addition to the contact named above, Dawn Hoff, Assistant Director, 
and Chris Ferencik, Analyst-in-Charge, managed this assignment. Carissa 
Bryant, Jeremy Manion, and Gabriel Tonsil and made significant 
contributions to the work. William (Rudy) Chatlos assisted with design, 
methodology, and data analysis. Linda Miller provided assistance in 
report preparation, Tracey King provided legal support, and Greg Hanna 
provided expertise on freight rail issues. 

[End of section] 

Footnotes: 

[1] Transportation Security Administration, Transportation Systems 
Critical Infrastructure and Key Resources Sector-Specific Plan-Freight 
Rail Modal Annex, May 2007. 

[2] AAR is a trade association whose membership includes freight 
railroads that operate 67 percent of the industry's mileage, employ 93 
percent of the workers, and account for 95 percent of the freight 
revenue of all railroads in the United States, and passenger railroads 
that operate intercity passenger trains and provide commuter rail 
service. 

[3] Federal hazardous materials transportation law defines a hazardous 
material as a substance or material that the Secretary of 
Transportation has determined is capable of posing an unreasonable risk 
to health, safety, and property when transported in commerce. For 
emergency response purposes, railcars and containers containing of 
hazardous materials bear external markings and placards to identify 
which hazardous materials are being transported. Placards identify the 
type of hazard the material being shipped poses. 

[4] TIH materials are gases or liquids that are known or presumed on 
the basis of tests to be so toxic to humans that they pose a hazard to 
health in the event of a release during transportation. See 49 C.F.R. 
§§ 171.8, 173.115, and 173.132. 

[5] For example, chlorine is typically carried in tank cars that can 
hold up to 90 tons of material, which if released into the atmosphere, 
may have a lethal dispersal range of over 2 miles. 

[6] The NIPP, issued by DHS in June 2006 as a requirement of Homeland 
Security Presidential Directive 7, provides the unifying structure for 
the integration of critical infrastructure and key resources (CIKR) 
protection efforts into a single national partnership model. Critical 
infrastructure includes systems and assets, whether physical or 
virtual, so vital to the United States that their incapacity or 
destruction would have a debilitating impact on national security, 
national economic security, national public health or safety, or any 
combination of those matters. Key resources are publicly or privately 
controlled resources essential to minimal operations of the economy or 
government, including individual targets whose destruction would not 
endanger vital systems but could create a local disaster or profoundly 
damage the nation's morale or confidence. For purposes of this report, 
we will use the term critical infrastructure to also include key 
resources. Furthermore, the NIPP also outlines a comprehensive risk 
management framework that defines critical protection roles and 
responsibilities for DHS; federal SSAs; and other federal, state, 
local, tribal, and private sector partners to secure all sectors of the 
United States. 

[7] The HSC was established by the President to ensure the coordination 
of all homeland security-related activities among executive departments 
and agencies. 

[8] The NIPP obligates each sector to develop a sector-specific plan 
that describes strategies to protect the nation's CIKR under its 
purview, outline a coordinated approach to strengthen its security 
efforts, and determine the appropriate programmatic funding levels. The 
TSSP and its supporting modal implementation plans, or annexes, 
establish the Transportation Systems Sector's strategic approach based 
on the tenets outlined in the NIPP and the principles of Executive 
Order 13416, Strengthening Surface Transportation Security. 
Furthermore, each modal implementation plan, or modal annex, details 
how each distinct mode intends to achieve the sector's goals and 
objectives. 

[9] Exec. Order No. 13,416, 71 Fed. Reg. 71,033 (Dec. 5, 2006). 
Executive Order 13416 mandates that an annex shall be completed for 
each surface transportation mode in support of the TSSP. The Freight 
Rail Annex was developed to meet this mandate and is intended to meet 
the minimum content requirements set forth in this order. 

[10] GAO, Combating Terrorism: Evaluation of Selected Characteristics 
in National Strategies Related to Terrorism, [hyperlink, 
http://www.gao.gov/products/GAO-04-408T] (Washington, D.C.: Feb. 3, 
2004). 

[11] Pub. L. No. 110-53, 121 Stat. 266 (2007). 

[12] 73 Fed. Reg. 72,182 (Nov. 26, 2008); 73 Fed. Reg. 72,130 (Nov. 26, 
2008); 73 Fed. Reg. 20,752 (Apr. 16, 2008); 73 Fed. Reg. 17,818 (Apr. 
1, 2008); 71 Fed. Reg. 76,852 (Dec. 21, 2006); and 71 Fed. Reg. 76,834 
(Dec. 21, 2006). 

[13] TSA's Corridor Reviews are vulnerability assessments that focus on 
the security risks posed by TIH rail shipments in major cities. We 
discuss these assessments in detail later in our report. 

[14] These railroads are known as Class I railroads. A Class I railroad 
is defined by the U.S. Surface Transportation Board as a railroad 
company that earns adjusted annual revenue of $319.3 million or more. 
Class I freight railroads represent about 93 percent of railroad 
freight revenue and 69 percent of the total U.S. rail mileage. 
Currently, seven railroads in North America are classified as Class I 
railroads. They are CSX, BNSF, Canadian National, Canadian Pacific, 
Norfolk Southern, Union Pacific Railroad, and Kansas City Southern 
Railway. 

[15] GAO, Standards for Internal Control in the Federal Government, 
[hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1] 
(Washington, D.C.: November 1999). 

[16] GAO, Results-Oriented Government: Practices That Can Help Enhance 
and Sustain Collaboration among Federal Agencies, [hyperlink, 
http://www.gao.gov/products/GAO-06-15] (Washington, D.C.: Oct. 21, 
2005). 

[17] In addition, many commuter and light rail systems operate 
primarily or exclusively over tracks owned by freight railroads. 

[18] Pub. L. No. 107-71, § 101(a), 115 Stat. 597, 597 (2001). 

[19] The TSNM office was established in November 2005 following 
internal restructuring of the modal offices. Prior to 2005, freight 
rail security was addressed through the Freight Rail Division of the 
Intermodal Program Office. 

[20] Pub. L. No. 107-296, 116 Stat. 2135 (2002). 

[21] Implementing Recommendation of the 9/11 Commission Act of 2007, 
Pub. L. No.110-53, 121 Stat. 266 (2007). 

[22] The 18 industry sectors are agriculture and food, banking and 
finance, chemical, commercial facilities, communications, critical 
manufacturing, dams, defense industrial base, emergency services, 
energy, government facilities, information technology, national 
monuments and icons, nuclear, postal and shipping, public health and 
healthcare, transportation, and water. 

[23] The Post-Katrina Emergency Management Reform Act of 2006 was 
enacted as Title VI of the Department of Homeland Security 
Appropriations Act, 2007, and transferred many functions of the former 
Preparedness Directorate, including managing certain grant programs, to 
FEMA. Pub. L. No. 109-295, 120 Stat. 1355, 1394, 2006. We discuss BZPP 
and the freight rail security grant program later in the report. 

[24] The State Homeland Security Grant Program consists of three 
underlying programs that have been used, in part, to finance freight 
rail security enhancements--the State Homeland Security Program, the 
Urban Area Security Initiative, and the Law Enforcement Terrorism 
Prevention Program. The State Homeland Security Program provides funds 
to build capabilities at the state and local levels through planning, 
equipment, training, and exercise activities. The Urban Area Security 
Initiative focuses on the unique planning, equipment, training, and 
exercise needs of high-threat, high-density urban areas. The Law 
Enforcement Terrorism Prevention Program provides resources to law 
enforcement and public safety communities to support critical terrorism 
prevention activities, including establishing and enhancing fusion 
centers and collaborating with non-law enforcement partners, other 
government agencies, and the private sector. Under the Infrastructure 
Protection Program, freight rail security efforts have been funded 
through BZPP. BZPP is a targeted grant program that provides funding to 
states to purchase equipment that will enhance security measures around 
critical infrastructure facilities for all modes of transportation, 
which we discuss later in the report. 

[25] 49 U.S.C. § 5103. 

[26] Pub. L. No. 107-296, § 1711, 116 Stat. 2135, 2319-20 (2002) 
(codified at 49 U.S.C. § 5103). 

[27] FRA conducts freight rail-related inspections. FRA acts under the 
delegation of the Secretary of Transportation. 49 C.F.R. § 1.49(s). 

[28] 49 C.F.R. § 172.700-172.804. 

[29] Specifically, the subset of hazardous materials requiring security 
plans includes (1) a highway route-controlled quantity of a Class 7 
(radioactive) material; (2) more than 25 kilograms (55 pounds) of 
Division 1.1 (explosive with a mass explosion hazard), 1.2 (explosive 
with a projection hazard), or 1.3 (explosive with predominately a fire 
hazard) material; (3) more than 1 liters (1.06 quarts) per package of a 
TIH material of a specified concentration level; (4) a shipment of 
hazardous materials in bulk packaging having a capacity of 13,248 
liters (3,500 gallons) or more for liquids or gases or more than 13.24 
cubic meters (468 cubic feet) for solids; (5) a shipment in other than 
bulk packaging of 2,268 kilograms (5,000 pounds) gross weight or more 
of one class of hazardous materials for which placarding is required; 
(6) a select agent or toxin regulated by the Centers for Disease 
Control and Prevention; and (7) a quantity of hazardous materials that 
requires placarding. 49 C.F.R. § 172.800 (2007). PHMSA proposed a rule 
in September 2008 that would narrow the list of hazardous materials 
subject to the security plan regulations. 73 Fed. Reg. 52,558 (Sept. 9, 
2008). 

[30] At a minimum, a plan must include measures to (1) confirm 
information provided by job applicants hired for positions that involve 
access to and handling of hazardous materials covered by the security 
plan, (2) respond to the assessed risk that unauthorized persons may 
gain access to hazardous materials covered by the security plan, and 
(3) address the assessed risk associated with the shipment of hazardous 
materials covered by the security plan from origin to destination. 

[31] 73 Fed. Reg. 72,182 (Nov. 26, 2008). Specifically, carriers 
subject to the new regulations include those that ship (1) more than 
2,268 kilograms (5,000 lbs.) in a single carload of a Division 1.1, 
1.2, or 1.3 explosive; (2) a quantity of a material poisonous by 
inhalation in a single bulk packaging; and (3) a highway route- 
controlled quantity of a Class 7 (radioactive) material. 49 C.F.R. § 
172.820(a). 

[32] Class II and III railroads include a number of short line 
railroads that provide freight rail transportation. A short line is an 
independent railroad company that operates over a relatively short 
distance. Class II railroads earn annual revenue from $25.5 million to 
$319.3 million, and Class III railroads are those earning less than 
$25.5 million. Regional and short line railroads generally exist for 
one of three reasons: to link two industries requiring rail freight 
together; to interchange revenue traffic with other, usually larger, 
railroads; or to operate a tourist passenger train service. 

[33] Pursuant to law regarding common carrier obligations, rail 
carriers must provide transportation or service upon reasonable 
request. 49 U.S.C. § 11101. This obligation stems from, among other 
things, the concept that an entity that represents to the public that 
it provides transportation of certain goods and that such 
transportation is available to the general public has a duty to 
shippers and to the general public to receive and transport such goods. 

[34] The DHS Chemical Facility Anti-Terrorism Standards Program 
requires certain chemical facilities that are determined to be high 
risk to complete site security plans that include measures that satisfy 
DHS's risk-based performance standards. 

[35] DHS serves as the SSA for 11 sectors: information technology; 
communications; transportation systems; chemical; emergency services; 
nuclear reactors, material, and waste; postal and shipping; dams; 
government facilities; commercial facilities; and critical 
manufacturing. Other SSAs are the Departments of Agriculture, Defense, 
Energy, Health and Human Services, the Interior, and the Treasury and 
the Environmental Protection Agency. See GAO, Critical Infrastructure 
Protection: Sector Plans and Sector Councils Continue to Evolve, 
[hyperlink, http://www.gao.gov/products/GAO-07-706R] (Washington, D.C.: 
July 10, 2007). 

[36] HSPD-7 requires DHS and DOT to collaborate on all matters related 
to transportation security and transportation infrastructure 
protection. 

[37] The NSTS, mandated in the Intelligence Reform and Terrorism 
Prevention Act of 2004 (IRTPA), outlines the federal government 
approach--in partnership with state, local, and tribal governments and 
private industry--to securing the U.S. transportation system from 
terrorist threats and attacks. 

[38] Although federal and industry stakeholders categorized these 
efforts as threat, vulnerability, and consequence assessments, we did 
not evaluate them to determine whether they met the NIPP criteria for 
threat, vulnerability, and consequence assessments. As a result, we 
discuss them in this report using the terminology that federal and 
industry stakeholders used to identify them. 

[39] A threat scenario is a potential terrorist event that delineates 
the tactics and locations a terrorist may use, for example, to cause 
casualties or disrupt the economy, using expert judgment based on 
available risk information, including past attacks. 

[40] In addition to modal-specific threat assessments, TSA OI develops 
other threat-related products for groups inside and outside of TSA. For 
instance, the office leads daily Administrator's briefings to discuss 
current and ongoing threats to the transportation sector, including 
freight rail. Also, TSA OI collects and disseminates suspicious 
incidence reports to make stakeholders aware of recent suspicious 
activity that may be terrorism related. 

[41] In calculations for risk analysis, the term threat is an estimated 
value that approximates the likelihood that a specific asset, system, 
network, sector, or region will suffer an attack or an incident. This 
differs from "threat scenarios" or "threat analysis," which are 
generalized descriptions of potential methods of attack that are used 
to help inform consequence and vulnerability assessments. The NIPP also 
states that assessments should provide numerical values for estimated 
consequences, vulnerabilities, and threats whenever possible. 

[42] TSA uses the term high-threat urban area to describe geographic 
areas that warrant special consideration with respect to transportation 
security. TSA derived its list of high-threat urban areas from the 
Urban Areas Security Initiative (UASI) program. Under the UASI, 
program, DHS designates metropolitan areas as high-threat urban areas 
based on a consideration of the relative threat, vulnerability, and 
consequences from acts of terrorism faced by each metropolitan area. 
Specifically, DHS identified UASI areas as high-threat urban areas if 
they had populations greater than 100,000 and had reported threat data 
during the past fiscal year. 

[43] While TSA has determined the specific results of this assessment 
to be "For Official Use Only," the assessment generally concluded that 
transporting TIH materials by rail poses a risk in highly populated 
areas. 

[44] TSA officials told us that the initial 9 cities were chosen 
because they were large population centers with both large rail 
networks and significant quantities of TIH traveling through them by 
rail. TSA used aggregate data on city population and the quantities of 
TIH being transported in each city for the year 2000 to assist in 
selecting the cities. The 9 cities originally selected in 2004 for TSA 
Corridor Reviews were Buffalo, Chicago, Cleveland, Houston, Los 
Angeles, New Orleans, Newark, Philadelphia, and Washington, D.C. TSA 
officials said that they intend to conduct Corridor Reviews in all 
major cities that have TIH rail shipments and qualify for DHS's UASI 
grant program. Several agencies have participated in these security 
assessments, including DHS IP and DOT's FRA and PHMSA. 

[45] As of November 2008, TSA has reported measuring an overall 
reduction in risk of over 60 percent across all high-threat urban 
areas. However, we discuss concerns about the accuracy of this 
measurement later in this report. 

[46] Although this list informs the allocation of the BZPP grants, and 
the determination to conduct SAVs, informing those programs is not the 
primary reason DHS conducts the process. The department develops the 
list to fulfill legislative and NIPP requirements to do so, as well as 
to ensure the nation's leadership have standing lists of the country's 
most critical infrastructure for risk and incident management purposes. 

[47] These reviews assessed the security plans and procedures against 
the following TSA guidelines: threat assessment and processing; 
vulnerability assessments; personnel security, auditing/testing of 
plan; drills/exercises; infrastructure security; hazardous materials 
security; cybersecurity; and infrastructure security. TSA believes that 
at minimum, these elements must be in a security plan for industry to 
effectively respond to a security incident or event. 

[48] To prioritize railroad assets, the rail industry developed a 
formula to score the asset value, which is determined by quantifying 
the security vulnerabilities and consequences for each asset. Assets 
considered at most risk generally were those that were (1) difficult to 
repair or replace, (2) likely to affect a railroad's ability to 
operate, and (3) lacking effective countermeasures to reduce the 
likelihood of causing this damage. 

[49] Most officials that we interviewed questioned how realistic the 
results of this study would be in the event of a chlorine tank car 
breach because it used a worst-case scenario model. 

[50] According to TSA, the office has since expanded to 15 staff 
members in 2008. TSA's permanent staff assigned to freight rail 
security was 7 in 2004, 10 in 2005, 12 in 2006, and 15 in 2007. Prior 
to 2003, TSA organized its freight rail security division differently, 
but had 3 personnel assigned to freight rail security-related work. 

[51] One Class I railroad representative that we interviewed told us 
that securing critical freight rail infrastructure should have been 
TSA's initial focus. 

[52] A waybill is a shipping document that travels with a shipment; 
identifies the shipper, receiver, origin, and destination; describes 
the goods; and shows their weight and freight. 

[53] Pub. L. No. 110-53, § 1202(a), 121 Stat. 266, 381 (2007). 

[54] The NIPP requires sector-specific plans (which include the TSSP 
and the Freight Rail Modal Annex) to be reissued every 3 years 
concurrently with the NIPP, which was to be updated by March 2009. 

[55] For example, the law requires that DHS, among other things, 
identify high-risk railroads and issue regulations requiring high-risk 
railroads to develop vulnerability assessments and security plans; 
establish a program for conducting security exercises for railroad 
carriers; and issue regulations for a security training program for 
frontline rail employees. 

[56] [hyperlink, http://www.gao.gov/products/GAO-04-408T]. 

[57] The sixth characteristic is problem definition and risk 
assessment, which addresses the particular national problems and 
threats the strategy is directed toward mitigating. However, because we 
provided details earlier in our report on the steps federal and 
industry stakeholders have taken to assess risks to the freight rail 
system, we do not address this characteristic in this section of our 
report. 

[58] These sector goals are (1) prevent and deter acts of terrorism 
using or against the transportation system, (2) enhance the resiliency 
of the U.S. transportation system, and (3) improve the cost-effective 
use of resources for transportation security. 

[59] These incidents include, but are not limited to, the September 11, 
2001, attacks on the World Trade Center and the Pentagon; attacks on 
transportation targets in the 2005 London bombings; and coordinated 
attacks on four commuter trains in Madrid in 2004. 

[60] Outcome measures describe the intended result of carrying out a 
program or activity. They define an event or condition that is external 
to the program or activity and that is of direct importance to the 
intended beneficiaries, the public, or both. An output measure 
describes the level of activity to be provided over a period of time, 
including a description of the characteristics (e.g., timeliness) 
established as standards for the activity. 

[61] TSA established annual goals in its submission to the Office of 
Management and Budget Performance and Rating Tool for TSA's program to 
strengthen surface transportation security. TSA's goals by year are 55 
percent by 2009, 61 percent by 2010, 67 percent by 2011, 74 percent by 
2012, and 81 percent by 2013. 

[62] While TSA identified 46 high-threat urban areas in its Rail 
Security Notice of Proposed Rulemaking and Final Rail Security Rule, 
the agency only reported on 45 cities related to meeting its goal of 
reducing TIH risks in 2007. Additionally, 5 cities do not have TIH 
materials traveling through them by rail. As a result, TSA does not 
measure TIH risks in those cities. In addition, TSA's 80 percent 
estimate represents the estimated amount of time TIH railcars were 
unattended by rail employees during the baseline time period. 

[63] Pub. L. No. 103-62, 107. Stat 285 (1993). GPRA was intended to 
address several broad purposes, including strengthening the confidence 
of the American people in their government; improving federal program 
effectiveness, accountability, and service delivery; and enhancing 
congressional decision making by providing more objective information 
on program performance. 

[64] GAO, Tax Administration: IRS Needs to Further Refine Its Tax 
Filing Season Performance Measures, [hyperlink, 
http://www.gao.gov/products/GAO-03-143] (Washington, D.C.: Nov. 22, 
2002). In this report, GAO reported on nine key attributes of 
successful performance measures. Among these attributes are objectivity 
and reliability of measures. 

[65] TSA's remaining performance measures are (1) percentage of carrier-
adopted security action items and (2) percentage of employees who have 
received security awareness training. 

[66] GAO, Agencies' Annual Performance Plans Under the Results Act: An 
Assessment Guide to Facilitate Congressional Decisionmaking, 
[hyperlink, http://www.gao.gov/products/GAO/GGD/AIMD-10.1.18] 
(Washington, D.C.: February 1998). 

[67] DHS IP's mission is to lead the coordinated national effort to 
reduce the risk to critical infrastructures and key resources posed by 
acts of terrorism and strengthen national preparedness, timely 
response, and rapid recovery in the event of an attack, natural 
disaster, or other emergency. 

[68] The NSTS, required by section 4001 of IRTPA, is a national 
strategy for transportation security outlining the federal government's 
approach--in partnership with state, local, and tribal governments and 
private industry--to securing the U.S. transportation system from 
terrorist threats and attacks. 

[69] In addition to securing their TIH rail shipments, chemical 
companies have also taken various other security-related actions to 
secure their facilities. Certain chemical facilities are also subject 
to the DHS's Chemical Facility Anti-Terrorism Standards Program, which 
requires facilities that are determined to be high risk to complete 
site security plans that include measures that satisfy DHS risk-based 
performance standards. 

[70] For additional information on some of the specific technology 
challenges federal and industry stakeholders face in better securing 
TIH shipments, see appendix V. These challenges include designing 
stronger tank cars, developing more real-time railcar tracking and 
monitoring systems, and substituting highly hazardous materials with 
less dangerous chemicals. 

[71] An intermodal freight rail yard is a yard that handles the 
transportation of freight in containers that can be transported by 
multiple modes of transportation (rail, ship, and truck), without any 
handling of the freight itself when changing modes. Railroads told us 
that these yards often handle higher value goods that may be subject 
greater instances of theft. As a result, railroads told us that these 
yards are more frequently fenced. 

[72] Most large rail yards, often called classification and switching 
yards, are comprised of a complex series of rail tracks for storing, 
sorting, or loading/unloading railroad cars, locomotives, or both. 
Railcars in a yard may be sorted by numerous categories, including 
railroad company, whether they are loaded or unloaded, destination, car 
type, or whether they need repairs. The purpose of railroad yards is to 
store cars while they are not being loaded or unloaded or are waiting 
to be assembled into trains. Local serving yards are often smaller 
yards near local customers served by the railroad. 

[73] While TSA did not follow up with all rail carriers in cities it 
previously reviewed, it did focus its follow-up on cities that had 
large rail networks and large quantities of TIH rail shipments 
routinely traversing them. 

[74] [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1]. 

[75] TSA estimated that the 10-year cost of the regulation would range 
from $152.8 million to $173.9 million. It also stated that the 
regulation would have a yet-to-be-determined impact on small 
businesses. 

[76] In one instance TSA observed unattended, fully loaded TIH railcars 
left at rail track siding for 72 hours over the weekend. 

[77] For example, PHMSA stated that one or more criteria may need to be 
weighted more strongly than they would be for other areas or 
localities. Alternatively, some criteria may not apply to a given area 
or locality. See appendix IV for additional information on FRA's plans 
to enforce compliance with the rule. 

[78] In early 2006, TSA began deploying its STSIs to support VIPR 
deployment teams, which conduct single-or multi-day security operations 
at various mass transit and passenger rail systems to deter and protect 
against potential terrorist actions. The VIPR operations represent an 
ongoing effort to develop surge capacity to enhance security in the 
transportation sectors. 

[79] See [hyperlink, http://www.gao.gov/products/GAO-06-15]. 

[80] See [hyperlink, http://www.gao.gov/products/GAO-06-15]. 

[81] [hyperlink, http://www.gao.gov/products/GAO-06-15]. 

[82] FRSCC and the chemical sector coordinating council have not held a 
joint meeting since September 2007. 

[83] GAO, Combating Terrorism: Evaluation of Selected Characteristics 
in National Strategies Related to Terrorism, [hyperlink, 
http://www.gao.gov/products/GAO-04-408T] (Washington, D.C.: Feb. 3, 
2004). 

[84] TSA's TIH Rail Risk Reduction Program, which began in 2007, is a 
transportation security assessment in 46 major urban areas that uses 
industry data about TIH railcar movements inside the urban area. TSA 
also audits the security status of the cars while at rail yards, and 
assesses potential consequences associated with the surrounding 
population. As part of this program, TSA surface transportation 
security inspectors conduct site visits to rail yards in high-threat 
urban areas to assess whether TIH railcars are under surveillance. 

[85] GAO, Standards for Internal Control in the Federal Government, 
[hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1] 
(Washington, D.C.: November 1999). 

[86] GAO, Results-Oriented Government: Practices That Can Help Enhance 
and Sustain Collaboration among Federal Agencies, [hyperlink, 
http://www.gao.gov/products/GAO-06-15] (Washington, D.C.: Oct. 21, 
2005). 

[87] HACCP is a risk management tool used to guide the identification, 
evaluation, and control of hazards. A hazard is any condition that 
results in an adverse consequence detrimental to people, property, or 
the environment. In TSA's case, the hazard is the primary threat 
scenario. 

[88] For this program, TSA defines unattended railcars as those 
railcars that are in a train or on railroad-controlled leads or tracks 
with no crew on board and no personnel active in the area. "Personnel" 
includes railroad employees or agents, law enforcement officers, 
private security guards, and rail customer employees. 

[89] According to TSA, these risk factors are comparable to two of the 
three elements of risk identified in the NIPP. Specifically, TSA's 
potential severity variable corresponds to consequence, and together, 
the occurrence and detection variables correspond to vulnerability. TSA 
officials stated that they considered the threat of an attack to be 
relatively similar at all locations. 

[90] According to a TSA official responsible for the program, initial 
assessments were less focused on developing and storing data. Thus, TSA 
lacked summary documentation to ascertain specific information about 
identified vulnerabilities and consequences or recommendations for 
improvement. As a result, little information could be gleaned from the 
earliest assessments in five cities from 2004 to 2006. According to 
TSA, these limitations were a result of the lack of personnel to 
conduct these reviews early on. 

[91] TSA initially chose these 46 cities to correspond its rail 
security programs with DHS's Urban Area Security Initiative (UASI) 
grant program, and refers to these cities as high-threat urban areas. 
Since TSA's initial list in 2006, the number of high-threat urban areas 
for the UASI program has increased to 62 cities. 

[92] TSA collects rail commodity information on a continual basis, 
while the agency collects the rest of its information annually, 
including population proximities and the attended status of TIH 
railcars. 

[93] Because much of the information TSA uses to assess risk is 
automated, TSA was able to obtain much of the historical information 
required for each risk factor. For example, a TSA official responsible 
for the program told us that TSA determined information on population 
by obtaining U.S. Census Bureau data. Furthermore, hours of exposure, 
which is the amount of time the TIH cars are in a city's proximity, was 
gathered using industry computer commodity tracking data from the 
freight rail industry. 

[94] TSA chose to make its baseline year June 2005 through May 2006 
(prior to issuance of the first 24 freight rail security action items). 
TSA chose to make its baseline year the year before issuance of the 
action items because it wanted its baseline year to be established 
prior to implementation of any TSA freight rail security actions. 

[95] TSA first conducted CSRs in 2004; however, officials said that 
they do not use the results from these reviews because they changed the 
criteria used to evaluate the security plans. As such, they decided to 
reassess the Class I carriers previously evaluated in 2004. 

[96] During this step, TSA officials may also conduct site visits of 
various locations, including critical bridges, tunnels, operations 
centers, and yards. 

[97] DHS determined that the criteria and all numbers related to this 
list are "For Official Use Only." As a result, these data are not 
contained in this report. 

[98] According to DHS IP officials, there are three main objectives of 
BZPP: (1) create open communication and coordination among facilities, 
state and local agencies, and local responders for the protection of 
the asset; (2) use site-specific buffer zone plans to conduct a gap 
analysis of state and local capabilities and equipment staffing and 
training needs; and (3) identify the existing procedures to prevent a 
terrorist incident to the asset, enhance these procedures, or both. 

[99] AAR, established in 1935, is an organization that represents the 
Class I freight railroads, some smaller railroads, Amtrak, and some 
commuter railroads in the United States. AAR also sets the standards 
for rail operations through the association's committee structure. 

[100] In a 2008 update to this assessment, the rail industry also 
identified and prioritized around 1,000 assets, of which about 10 
percent were considered highly critical to railroad actions. 

[101] TSA measures risk associated with this metric by gathering and 
measuring vulnerability and consequence information for various U.S. 
cities, as discussed earlier in our report. The threat that the agency 
is measuring vulnerability and consequence against is the threat of 
someone weaponizing TIH railcars inside the city. 

[102] TSA provided TIH railcar unattended status information for 45 
cities in 2007. In addition to the cities discussed above, our analysis 
shows that 4 cities show cars as unattended from 20 to 50 percent of 
the time, and 7 cities show cars as unattended from 50 to 80 percent of 
the time. TSA reported that the remaining 5 cities did not have TIH 
travel in or through them. 

[103] Some physical security enhancements installed at rail facilities 
in New Jersey were implemented as a result of DHS IP's BZPP 
assessments. 

[104] System security and access control refer to practices affecting 
the security of the railroad and its property. En route security refers 
to the actual movement and handling of railcars containing TIH 
materials. 

[105] TSA recommended that each plan (1) reduce the number of hours TIH 
cars are held in yards, in terminals, and on railroad-controlled leased 
track in high-threat urban areas; (2) minimize the occurrence of 
unattended TIH cars in high-threat urban areas; (3) reduce potential 
exposure to surrounding people, property, and environment in high- 
threat urban areas with special emphasis on reducing potential exposure 
to hospitals, high-occupancy buildings, schools, and public venues; (4) 
reduce the occurrence of standing TIH trains in high-threat urban 
areas; (5) provide a procedure for the protection or surveillance of 
unattended TIH trains in high-threat urban areas; (6) ensure compliance 
with C.F.R. 49 Part 174.14 (48-hour rule); and (7) develop site- 
specific procedures for the positive and secure handoff of TIH cars at 
points of origin, destination, and interchange in high-threat urban 
areas. 

[106] Of the rail facilities TSA inspectors visited, about 80 percent 
were Class I facilities, and of the rail employees the inspectors 
interviewed, about 75 percent were actual frontline workers. The 
remaining employees interviewed were considered rail management. 

[107] The 10 items TSA selected for review were also part of the 
original 24 issued in June 2006. 

[108] The 10 items TSA selected for review were (1) communication of 
current threat information; (2) liaison activities with federal, state, 
and local law enforcement; (3) liaison activities with other railroad 
security offices; (4) contingency planning; (5) emergency response 
planning; (6) community safety and security outreach; (7) photo 
identification and background checks; (8) access control; (9) intrusion 
deterrence and detection; and (10) secure bridge operation procedures. 

[109] Because many rail carriers have their own police forces, BZPP 
funding was awarded directly to the railroads to purchase security- 
related equipment. 

[110] Since 2005, the DHS SLGCP, formerly the DHS Office of Grants and 
Training (OGT), has moved into FEMA's Grant Program Directorate, Grant 
Development and Administration Division. The DHS OGT originated within 
the Department of Justice's Office of Justice Programs in 1998 as the 
Office for Domestic Preparedness. Pursuant to the Homeland Security Act 
of 2002, this office was transferred to DHS in March 2003. See Pub. L. 
No. 107-296, § 403(5), 116 Stat. 2135, 2178 (codified at 6 U.S.C. § 
203(5)). In March 2004, the Secretary of Homeland Security consolidated 
ODP with the Office of State and Local Government Coordination to form 
SLGCP. SLGCP was created to provide a "one-stop shop" for the numerous 
federal preparedness initiatives applicable to state and local 
governments. Recently, SLGCP was incorporated under the Preparedness 
Directorate as OGT. Pursuant to the Department of Homeland Security 
Appropriations Act of 2007, OGT was transferred, along with certain 
other components of the Preparedness Directorate, into FEMA effective 
March 31, 2007. Pub. L. No. 109-295, § 611(13), 120 Stat. 1355, 1400 
(2006). 

[111] Other reasons DHS and RRF provided were that TSA and other 
federal stakeholders that were thought to be possible future users of 
the tools had indicated that they would not be using the tools because 
they already had developed their own tools for assessing freight rail 
risk. In addition, during initial development of the tools, RRF and its 
contractor determined that the tools were essentially using the same 
types of data inputs to conduct their analysis and could be easily 
combined. 

[112] DHS officials told us that the grant moneys will formally be 
awarded to CSX Railroad, which has submitted a written letter of intent 
to DHS stating that it intends to give the entire $2.5 million award to 
RRF. DHS said the 9/11 Commission Act required that the department only 
provide grant funds from the Freight Rail Security Grant Program 
directly to transportation agencies. As a result, DHS could not provide 
funding directly to RRF to complete the tool. However, because it was 
appropriate to have RRF complete the tool, CSX Railroad agreed to 
accept the grant, as required by law, and provide it to RRF. 

[113] Hazardous Materials: Enhancing Rail Transportation Safety and 
Security for Hazardous Materials Rail Shipments, 73 Fed. Reg. 72,182 
(Nov. 26, 2008). 

[114] Beginning January 1, 2009, rail carriers must compile information 
on the commodities they transport and the routes they use for the 6- 
month period from July 1, 2008, through December 31, 2008. Rail 
carriers must complete their data collection by March 1, 2009. Rail 
carriers may either complete the safety and security analyses of routes 
currently utilized and available alternatives and select the safest, 
most secure routes for transporting the specified explosive, TIH, and 
radioactive materials for the period from July 1, 2008, through 
December 31, 2008, by September 1, 2009, or may notify FRA in writing 
and complete the process by March 31, 2010, using data for all of 2008. 
Beginning January 1, 2010, and for subsequent years, rail carriers must 
compile information on the commodities they transport and the routes 
used for the previous calendar year and complete route assessments and 
selections by the end of the calendar year. 

[115] 73 Fed. Reg. 17,818 (Apr. 1, 2008). 

[116] 74 Fed. Reg. 1770 (Jan. 13, 2009). 

[117] 73 Fed. Reg. 72,130 (Nov. 26, 2008). 

[118] Section 114(r) of title 49 of the United States Code requires TSA 
to promulgate regulations governing the protection of SSI. SSI includes 
information that would be detrimental to transportation security if 
publicly disclosed. TSA's SSI regulation, 49 C.F.R. pt. 1520, 
establishes requirements for the recognition, identification, handling, 
and dissemination of SSI, including restrictions on disclosure and 
civil penalties for violations of those restrictions. Although 49 
C.F.R. pt. 1520 primarily covers aviation-and maritime security-related 
information, vulnerability assessments and threat information related 
to all modes of transportation are considered SSI under 49 C.F.R. §§ 
1520.5(b)(5) and 1520.5(b)(7) and must be protected and handled in 
accordance with 49 C.F.R. pt. 1520. However, because certain other 
information created in connection with TSA's rule would be detrimental 
to transportation security if publicly disclosed, TSA's rule amends 49 
C.F.R. pt. 1520 to more directly protect information related to the 
rail sector. Thus TSA's rule adds railroad carriers, rail hazardous 
materials shippers, rail hazardous materials receivers, and rail 
transit systems as covered parties under part 1520. 

[119] This will only be permitted providing that TSA inspectors, and 
DHS officials working with TSA, will present their credentials for 
examination at the request of the entity being inspected, with the 
understanding that the credentials may not be reproduced. 

[120] Transportation of these materials includes (1) a railcar 
containing more than 2,268 kilograms (5,000 pounds) of a Division 1.1, 
1.2, or 1.3 (explosive) material, as defined in 49 C.F.R. § 173.50; (2) 
a tank car containing a material poisonous by inhalation as defined in 
49 C.F.R. § 171.8, including anhydrous ammonia, Division 2.3 gases 
poisonous by inhalation as set forth in 49 C.F.R. § 173.115 (c), and 
Division 6.1 liquids meeting the defining criteria in 49 C.F.R. § 
173.132(a)(1)(iii) and assigned to hazard zone A or hazard zone B in 
accordance with 49 C.F.R. § 173.133(a), excluding residue quantities of 
these materials; and (3) a railcar containing a highway route- 
controlled quantity of a Class 7 (radioactive) material, as defined in 
49 C.F.R. § 173.403. 

[121] TSA also developed a training video to assist rail carriers in 
training their employees on how to identify improvised explosive 
devices and other possible security threats. 

[122] TSA's rule does not specify any particular category of individual 
needed to perform this job function and does not specify that a freight 
carrier would have to use a hazmat employee (as the term is used in 49 
C.F.R. § 171.8) to perform this job function. Moreover, to allow 
freight railroad carriers a maximum degree of flexibility in adopting 
and implementing procedures to meet the car attendance performance 
standard, TSA does not specify a maximum number of railcars permitted 
per attending employee (or authorized representative) or define how 
close that individual must be to the railcar while attending it. 

[123] AAR reported that many of the updates in its revised plan were 
identified from prior AAR tabletop exercises conducted in coordination 
with member railroads. According to AAR, in addition to identifying 
actions to implement at lower alert levels, the tabletops identified a 
need to implement and routinely test a better system of implementing 
the embargo process required at Alert Level 4; enable timely 
notification to all railroads, customer trade associations, law 
enforcement agencies, and federal government agencies of an Alert Level 
4 embargo action; and monitor passenger carriers' security plans for 
potential conflicts with freight rail security plans. 

[124] Once a car has been constructively placed at a local serving 
yard, which is a yard from which the railroad serves local customers, 
the rail carrier notifies the customer that the car is available for 
placement at the customer's facility. However, if the customer cannot 
take the car into its facility upon notification from the railroad, the 
customer is charged a "demurrage fee" by the railroad. This is a fee 
the customer pays the railroad for storing the car at the railroad 
serving yard until the customer can accept the car for final placement 
at its facility. The amount of money the customer pays in demurrage 
charges will typically depend on the length of time the car sits in the 
serving yard before it is accepted for final placement at the 
customer's facility. Some rail carriers we met with told us that this 
typically occurs when a customer does not have sufficient space in its 
facility to accept all the cars it ordered. As a result, it pays the 
railroad to temporarily store the cars until it has room to receive 
them in the facility. 

[125] Leased tracks are railroad tracks in rail yards or railroad 
sidings that manufacturers, such as chemical companies, lease from a 
railroad to temporarily store their commodities until needed. 

[126] The technology most widely used in the rail industry to track 
railcar movements is AEI, which is a passive tracking system that 
tracks each railcar in transit with a unique radio-frequency 
identification (RFID) tag. The rail industry has placed AEI readers in 
strategic locations throughout the rail system to detect each RFID tag 
as it passes the detector. When a railcar, or train, passes a reader, 
its location is recorded and sent to the railroad; however, the system 
only indicates that a car is located at a reader, and in some areas AEI 
readers could be 30 or 40 miles apart. The system provides key 
information on the trains, including milepost location; locomotives 
assigned; and consist and car information, such as lading, load status, 
car specification, origin, and destination. 

[127] Certain chemical facilities are also subject to the DHS Chemical 
Facility Anti-Terrorism Standards program, which requires facilities 
that are determined to be high risk to complete site security plans 
that include measures that satisfy DHS risk-based performance 
standards. 

[128] The company told us that each seal has a unique serial number, 
which the company provides to the receiver when shipping either a full 
or empty car to a customer. The company places two seals on the car, 
one on the outside and one on the inside for the receiver, when 
shipping the full or empty car back. As such, both the companies can 
tell if someone has tampered with a seal. Company officials stated that 
this is a standard in the chlorine industry. 

[129] According to railroad officials we spoke with, they have also 
worked with this company to establish better procedures for delivery 
and acceptance of TIH railcars. For example, rail officials told us 
that when they drop off a shipment of TIH, both railroad and chemical 
company employees are present, a visual inspection is conducted of the 
cars, and once that is completed, the gates are opened, the cars are 
moved inside, and then the gates are closed. 

[130] A GPS is a satellite-based system that can pinpoint any position 
on earth--any time and in any weather--and then use receivers to 
process the satellite signals to determine a location. 

[131] The UASI list includes areas eligible for DHS homeland security 
grants. 

[132] TSA has trained three STSI teams on Corridor Assessment 
methodology. TSA's Office of Transportation Sector Network Management 
plans to coordinate with the Office of Security Operations to train 
additional teams and will optimize the use of those teams during the 
conduct of the future assessments planned for the remainder of the 60 
HTUAs. 

GAO's Mission: 

The Government Accountability Office, the audit, evaluation and 
investigative arm of Congress, exists to support Congress in meeting 
its constitutional responsibilities and to help improve the performance 
and accountability of the federal government for the American people. 
GAO examines the use of public funds; evaluates federal programs and 
policies; and provides analyses, recommendations, and other assistance 
to help Congress make informed oversight, policy, and funding 
decisions. GAO's commitment to good government is reflected in its core 
values of accountability, integrity, and reliability. 

Obtaining Copies of GAO Reports and Testimony: 

The fastest and easiest way to obtain copies of GAO documents at no 
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each 
weekday, GAO posts newly released reports, testimony, and 
correspondence on its Web site. To have GAO e-mail you a list of newly 
posted products every afternoon, go to [hyperlink, http://www.gao.gov] 
and select "E-mail Updates." 

Order by Phone: 

The price of each GAO publication reflects GAO’s actual cost of
production and distribution and depends on the number of pages in the
publication and whether the publication is printed in color or black and
white. Pricing and ordering information is posted on GAO’s Web site, 
[hyperlink, http://www.gao.gov/ordering.htm]. 

Place orders by calling (202) 512-6000, toll free (866) 801-7077, or
TDD (202) 512-2537. 

Orders may be paid for using American Express, Discover Card,
MasterCard, Visa, check, or money order. Call for additional 
information. 

To Report Fraud, Waste, and Abuse in Federal Programs: 

Contact: 

Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: 
E-mail: fraudnet@gao.gov: 
Automated answering system: (800) 424-5454 or (202) 512-7470: 

Congressional Relations: 

Ralph Dawn, Managing Director, dawnr@gao.gov: 
(202) 512-4400: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7125: 
Washington, D.C. 20548: 

Public Affairs: 

Chuck Young, Managing Director, youngc1@gao.gov: 
(202) 512-4800: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7149: 
Washington, D.C. 20548: