This is the accessible text file for GAO report number GAO-06-557T 
entitled 'Passenger Rail Security: Evaluating Foreign Security 
Practices and Risk Can Help Guide Security Efforts' which was released 
on March 29, 2006. 

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as part 
of a longer term project to improve GAO products' accessibility. Every 
attempt has been made to maintain the structural and data integrity of 
the original printed product. Accessibility features, such as text 
descriptions of tables, consecutively numbered footnotes placed at the 
end of the file, and the text of agency comment letters, are provided 
but may not exactly duplicate the presentation or format of the printed 
version. The portable document format (PDF) file is an exact electronic 
replica of the printed version. We welcome your feedback. Please E-mail 
your comments regarding the contents or accessibility features of this 
document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

Testimony before the Committee on Transportation and Infrastructure, 
Subcommittee on Highways, Transit, and Pipelines, House of 
Representatives: 

United States Government Accountability Office: 

GAO: 

For Release on Delivery Expected at 2:00 p.m. EST: 

Wednesday, March 29, 2006: 

Passenger Rail Security: 

Evaluating Foreign Security Practices and Risk Can Help Guide Security 
Efforts: 

Statement of JayEtta Z. Hecker, Director, Physical Infrastructure 
Issues: 

GAO-06-557T: 

GAO Highlights: 

Highlights of GAO-06-557T, a testimony before the Committee on 
Transportation and Infrastructure, Subcommittee on Highways, Transit, 
and Pipelines, House of Representatives: 

Why GAO Did This Study: 

The July 2005 bombing attacks on London’s subway system dramatically 
revealed the vulnerability of passenger rail systems worldwide to 
terrorist attacks and demonstrated the need for an increased focus on 
security for these systems. 

This testimony, which is based primarily on GAO’s September 2005 report 
on passenger rail security (GAO-05-851), provides information on (1) 
the security practices that domestic and selected foreign rail transit 
operators have implemented to mitigate risks and enhance security; (2) 
the Department of Homeland Security’s (DHS) and the Department of 
Transportation’s (DOT) funding of rail transit security and use of risk 
management in funding decisions; and (3) the steps DHS and DOT have 
taken to improve coordination on rail transit security matters. As part 
of its 2005 report, GAO contacted 32 U.S. rail transit operators and 13 
passenger rail operators in seven European and Asian countries. 

What GAO Found: 

Domestic and foreign rail transit operators GAO contacted have taken 
similar actions to help secure their systems, including implementing 
customer awareness programs, increasing the number and visibility of 
their security personnel, and upgrading security technology. Also, both 
domestic and foreign operators have used risk assessments to guide 
security-related activities and spending. However, GAO also observed 
security practices that were used by certain foreign passenger rail 
operators, but were not employed in the United States at the time of 
GAO’s review. For example, some foreign rail operators use covert 
testing to help keep employees alert to security threats or randomly 
screen passengers. Centralized clearinghouses on rail security 
technologies, such as chemical sensors, and best practices are also 
maintained in some foreign countries. While introducing any of these 
security practices into the U.S. rail system may pose political, legal, 
fiscal, and cultural challenges, the practices may nevertheless warrant 
further examination. 

Both DHS and DOT help fund rail transit security investments, and DHS 
has promoted risk-based funding decisions in the allocation of transit 
security grants. DHS’s Office of Grants and Training is the primary 
source of security funding for passenger rail systems, providing over 
$320 million in grants to rail transit agencies for fiscal years 2003 
to 2006. The Office of Grants and Training has leveraged its grant-
making authority to promote risk-based funding decisions for passenger 
rail by requiring, for example, that operators complete a risk 
assessment to be eligible for a transit security grant. As we have 
noted in previous reports, using assessments of risk to target 
resources to the highest priority is especially critical given the 
competition for resources within the rail transit sector, and between 
the rail transit sector and the other modes of transportation. DOT’s 
Federal Transit Administration (FTA) also helps fund rail transit 
security efforts by providing financial assistance to transit agencies 
and requiring that they spend 1 percent of their urbanized area formula 
funds on security improvements. 

To improve coordination on transportation security matters, including 
rail transit security, DHS and DOT signed a memorandum of understanding 
(MOU) in September 2004. DHS and DOT also signed a transit security 
annex to the MOU in September 2005 that delineates specific security-
related roles, responsibilities, resources, and commitments for transit 
issues. In GAO’s view, these actions are positive steps forward in 
addressing the coordination problems GAO previously identified. For 
instance, federal and rail industry officials raised questions about 
the feasibility of implementing and complying with TSA’s May 2004 
security directives, citing limited opportunities to collaborate with 
TSA to ensure that industry best practices were incorporated. Effective 
coordination between DHS and DOT will continue to be important as both 
departments move forward with existing programs and new security 
initiatives. 

What GAO Recommends: 

GAO’s September 2005 report on passenger rail security recommended, 
among other things, that the Secretary of Homeland Security, in 
collaboration with DOT, determine the feasibility of implementing 
certain rail security practices used in foreign countries. DHS and DOT 
generally agreed with the report’s recommendations. 

www.gao.gov/cgi-bin/getrpt?GAO-06-557T. 

To view the full product, including the scope and methodology, click on 
the link above. For more information, contact JayEtta Z. Hecker at 
(202) 512-2834 or Cathleen A. Berrick (202) 512-3404. 

[End of section] 

Mr. Chairman and Members of the Subcommittee: 

Thank you for inviting me to participate in today's hearing on rail 
transit security. The London rail bombings that took place in July 
2005--resulting in over 50 fatalities and more than 700 injuries--made 
clear that even when a variety of security precautions are in place, 
rail transit systems that move high volumes of passengers each day 
remain vulnerable to terrorist attack. While securing the U.S. rail 
transit system is a daunting task--a shared responsibility requiring 
coordinated action on the part of federal, state, and local governments 
and the private sector--it is important nonetheless to take the 
necessary steps to identify and mitigate risks to rail transit systems. 

As we have reported previously, the sheer number of stakeholders 
involved in securing these systems can lead to communication 
challenges, duplication of effort, and confusion about roles and 
responsibilities. Key federal stakeholders with critical roles to play 
within the rail sector include the Transportation Security 
Administration (TSA), which is responsible for transportation security 
overall, and the Office of Grants and Training,[Footnote 1]which 
provides grant funds to rail operators and conducts risk assessments 
for passenger rail agencies, both within the Department of Homeland 
Security (DHS); and the Federal Transit Administration (FTA) and 
Federal Railroad Administration (FRA), both within the Department of 
Transportation (DOT). One of the critical challenges facing these 
federal agencies, and the rail system operators they oversee or 
support, is finding ways to protect rail systems from potential 
terrorist attacks without compromising the accessibility and efficiency 
of rail transit. 

At the federal level, another significant challenge to securing rail 
systems involves the allocation of resources. Rail transit systems 
represent one of many modes of transportation--along with aviation, 
maritime, and others--competing for limited federal security resources. 
Within the rail transit sector itself, there is competition for 
resources, as federal, state, and local agencies and rail operators 
seek to identify and invest in appropriate security measures to 
safeguard these systems while also investing in other capital and 
operational improvements. Moreover, given competing priorities and 
limited homeland security resources, difficult policy decisions have to 
be made by Congress and the executive branch to prioritize security 
efforts and direct resources to the areas of greatest risk within the 
rail transit system, among all transportation modes, and across other 
nationally critical sectors. 

To help federal decision makers determine how to best allocate limited 
resources, we have advocated, the National Commission on Terrorist 
Attacks Upon the United States (the 9/11 Commission) has recommended, 
and the subsequent Intelligence Reform and Terrorism Prevention Act of 
2004 requires, that a risk management approach be employed to guide 
security decision making.[Footnote 2] A risk management approach 
entails a continuous process of managing risks through a series of 
actions, including setting strategic goals and objectives, assessing 
and quantifying risks, evaluating alternative security measures, 
selecting which measures to undertake, and implementing and monitoring 
those measures. In July 2005, in announcing his proposal for the 
reorganization of DHS, the Secretary of Homeland Security declared that 
as a core principle of the reorganization, the department must base its 
work on priorities driven by risk. 

My testimony will cover three areas: (1) the security practices that 
domestic and selected foreign rail transit operators have implemented 
to mitigate risks and enhance security, and any differences in these 
practices; (2) DHS's and DOT's funding of rail transit security and use 
of risk management in funding decisions; and (3) the steps DHS and DOT 
have taken to improve coordination on rail transit security matters. My 
comments today are based on our body of work on passenger rail security 
issues, including our September 2005 report to the Chairman of the 
House Transportation and Infrastructure's Subcommittee on Railroads, 
Senators Snowe and Boxer, and Representative Castle.[Footnote 3] For 
this report, we contacted 32 U.S. rail transit operators and 13 
passenger rail operators in seven European and Asian countries. These 
domestic and foreign rail agencies and the areas they serve are listed 
in appendix I. All of the reports on which this statement is based were 
prepared in accordance with generally accepted government auditing 
standards. 

In summary: 

Domestic and foreign rail transit operators we contacted have taken 
similar actions to help secure their systems, such as implementing 
customer awareness programs, upgrading security technology, and 
tightening access controls. Also, both domestic and foreign operators 
have used risk assessments to guide security-related activities and 
funding. However, we also observed rail security practices in foreign 
countries that were not in use domestically at the time of our review. 
For example, some foreign rail operators use covert testing to help 
keep employees alert to security threats or randomly screen passengers. 
In addition, centralized clearinghouses on rail security technologies, 
such as chemical sensors, and best practices are maintained in some 
foreign countries. While introducing any of these security practices 
into the U.S. rail system may pose political, legal, fiscal, and 
cultural challenges, the practices may nevertheless warrant further 
examination. In our September 2005 report on passenger rail security, 
we recommended, among other things, that the Secretary of Homeland 
Security, in collaboration with DOT and the passenger rail industry, 
determine the feasibility, in a risk management context, of 
implementing certain rail security practices used in foreign countries, 
including covert testing and random screening, an information 
clearinghouse for security technologies and best practices, and 
practices that integrate security into infrastructure design.[Footnote 
4] DHS and DOT generally agreed with the report's recommendations. 

* Both DHS and DOT help fund rail transit security investments, and DHS 
has promoted risk-based funding decisions in the allocation of transit 
security grants. DHS's Office of Grants and Training is the primary 
source of security funding for passenger rail systems. From fiscal year 
2003 through fiscal year 2006, the Office of Grants and Training 
provided over $320 million in grants to rail transit agencies through 
the Urban Area Security Initiative (UASI) and the Transit Security 
Grant Programs. The Office of Grants and Training has leveraged its 
grant-making authority to promote risk-based funding decisions for 
passenger rail by requiring, for example, that operators complete a 
risk assessment to be eligible for a transit security grant. Using 
assessments of risk to target resources to the highest priority is 
especially critical given the competition for resources within the rail 
transit sector, and between the rail transit sector and the other modes 
of transportation. Moreover, as the 2005 London rail bombings 
dramatically illustrated, even when a variety of security precautions 
are put in place, passenger rail systems remain vulnerable and 
attractive targets given their open designs and the high volumes of 
passengers they transport each day. Thus, it is important that limited 
resources are targeted to security activities that have the greatest 
impact on reducing overall risk. DOT's FTA also helps fund rail transit 
security efforts through the financial assistance it provides to 
transit agencies. In addition, FTA requires that a certain percentage 
of federal funds be devoted to security activities. Specifically, 
transit agencies are required to spend 1 percent of their urbanized 
area formula funds on security improvements.[Footnote 5] 

* To improve coordination on transportation security matters, including 
rail transit security, DHS and DOT signed a memorandum of understanding 
(MOU) in September 2004. The MOU defines broad areas of responsibility 
for each department. The two departments also signed a transit security 
annex to the MOU in September 2005 that delineates the specific 
security-related roles, responsibilities, resources, and commitments 
for transit issues. We believe these actions are positive steps forward 
in addressing the coordination problems we have previously identified. 
For instance, in 2004, TSA issued emergency security directives to 
domestic rail operators after terrorist attacks on the rail system in 
Madrid. However, federal and rail industry officials raised questions 
about the feasibility of implementing and complying with these 
directives, citing limited opportunities to collaborate with TSA to 
ensure that industry best practices were incorporated. Effective 
coordination between DHS and DOT will continue to be important as both 
departments move forward with existing programs and new security 
initiatives. For example, to avoid duplication and confusion, it will 
be important that TSA coordinate the oversight activities of its rail 
inspectors with those of the state auditors from FTA's State Safety 
Oversight program and FRA's rail safety inspectors. 

Background: 

Each weekday, 11.3 million passengers in 35 metropolitan areas and 22 
states use some form of rail transit--that is, heavy, commuter, and 
light rail. Heavy rail systems--subway systems like New York City's 
transit system and Washington, D.C.'s Metro--typically operate on fixed 
rail lines within a metropolitan area and have the capacity for a heavy 
volume of traffic. Commuter rail systems generally operate on railroad 
tracks and provide regional service (e.g., between a central city and 
adjacent suburbs)--and are traditionally associated with older 
industrial cities, such as Boston, New York, and Chicago. Light rail 
systems are typically characterized by lightweight passenger rail cars 
that operate on track that is not separated from vehicular traffic for 
much of the way. Figure 1 identifies the geographic location of rail 
transit systems within the United States. 

Figure 1: Geographic Distribution of Rail Transit Systems: 

[See PDF for image] 

[End of figure] 

According to rail transit officials and experts, certain 
characteristics of rail transit systems make them inherently vulnerable 
to terrorist attacks and therefore difficult to secure. By design, rail 
transit systems are open (i.e., have multiple access points, hubs 
serving multiple carriers, and, in some cases, no barriers) so that 
they can move large numbers of people quickly. In contrast, the U.S. 
commercial aviation system is housed in closed and controlled locations 
with few entry points. The openness of rail transit systems can leave 
them vulnerable because operator personnel cannot completely monitor or 
control who enters or leaves the systems. Other characteristics of some 
rail transit systems--high ridership, expensive infrastructure, 
economic importance, and location (e.g., large metropolitan areas or 
tourist destinations)--also make them attractive targets for terrorists 
because of the potential for mass casualties and economic damage and 
disruption. Moreover, some of these same characteristics make rail 
transit systems difficult to secure. For example, the numbers of riders 
that pass through a subway system--especially during peak hours--may 
make the sustained use of some security measures, such as metal 
detectors, difficult because their use could result in long lines that 
could disrupt scheduled service. In addition, multiple access points 
along extended routes could make the cost of securing each location 
prohibitive. Balancing the potential economic effects of security 
enhancements with the benefits of such measures is a difficult 
challenge. 

Securing the nation's rail transit systems is a shared responsibility 
requiring coordinated action on the part of federal, state, and local 
governments; the private sector; and the passengers who ride these rail 
systems. Since the September 11 attacks, the role of federal government 
agencies in securing the nation's transportation systems, including 
rail transit, have continued to evolve. Before September 11, DOT--
namely, FTA--was the primary federal entity involved in rail transit 
security matters. In response to the attacks of September 11, Congress 
passed the Aviation and Transportation Security Act (ATSA), which 
created TSA within DOT and defined its primary responsibility as 
ensuring security in all modes of transportation.[Footnote 6] The act 
also gave TSA regulatory authority for security over all transportation 
modes. ATSA does not specify TSA's roles and responsibilities in 
securing the maritime and land transportation modes at the level of 
detail it does for aviation security. Instead, the act broadly 
identifies TSA as responsible for ensuring the security of all modes of 
transportation. With the passage of the Homeland Security Act of 2002, 
TSA was transferred, along with over 20 other agencies, to 
DHS.[Footnote 7] While TSA is the lead federal agency for ensuring the 
security of all transportation modes, FTA conducts nonregulatory safety 
and security activities, including safety-and security-related 
training, research, technical assistance, and demonstration projects. 
In addition, FTA promotes safety and security through its grant-making 
authority. 

U.S. and Foreign Rail Transit Operators Have Taken Similar Actions to 
Secure Rail Systems, and Opportunities for Additional Domestic Security 
Actions May Exist: 

U.S. rail transit operators have taken numerous actions to secure their 
rail systems since the terrorist attacks of September 11, 2001, in the 
United States and the March 11, 2004, attacks in Madrid. These actions 
included both improvements to system operations and capital 
enhancements to system facilities, such as track, buildings, and train 
cars. All of the U.S. rail transit operators we contacted have 
implemented some security measures--such as customer awareness programs 
and more, and more visible, security personnel--that were generally 
consistent with those we observed in Europe and Asia. We also 
identified three rail security practices--covert testing, random 
screening of passengers and their baggage, and maintaining a 
centralized clearinghouse on rail security technologies--used in 
foreign countries but not, at the time or our review, 
domestically.[Footnote 8] 

U.S. and Foreign Rail Operators Employ Similar Security Practices: 

Both U.S. and foreign rail transit operators we contacted have 
implemented similar improvements to enhance the security of their 
systems. To guide security actions and spending, domestic and foreign 
operators--even the privatized foreign systems--consider risk 
assessments, budget constraints, and other factors. For example, one 
foreign rail operator with a daily ridership of 2.3 million passengers 
used a risk management methodology to assess risks, threats, and 
vulnerabilities to rail in order to guide security spending. According 
to the operator, the methodology employs a "risk informed" approach to 
support management's business decision process regarding security. A 
summary of domestic and foreign security practices follows. 

Customer awareness: Customer awareness programs we observed used signs 
and announcements to encourage riders to alert train staff if they 
observed suspicious packages, persons, or behavior. Of the 32 domestic 
rail operators we interviewed, 30 had implemented a customer awareness 
program or made enhancements to an existing program. Foreign rail 
operators we visited also attempt to enhance customer awareness. For 
example, 11 of the 13 operators we interviewed had implemented a 
customer awareness program. Similar to programs of U.S. operators, 
these programs used signs, announcements, and brochures to inform 
passengers and employees about the need to remain vigilant and report 
any suspicious activities. 

More, and more visible security personnel: Of the 32 U.S. rail 
operators we interviewed, 23 had increased the number of security 
personnel they used since September 11, to provide security throughout 
their system or had taken steps to increase the visibility of their 
security personnel. For example, several U.S. and foreign rail 
operators we spoke with had instituted policies such as requiring their 
security staff to wear brightly colored vests and patrol trains or 
stations more frequently, so they are more visible to customers and 
potential terrorists or criminals. These policies make it easier for 
customers to contact security personnel in the event of an emergency, 
or if they have spotted a suspicious item or person. At foreign sites 
we visited, 10 of the 13 operators had increased the number of their 
security officers throughout their systems in recent years because of 
the perceived increase in the risk of a terrorist attack. 

Increased use of canine teams: Of the 32 U.S. rail transit operators we 
contacted, 21 had begun to use canine units, which include both dogs 
and human handlers, to patrol their facilities or trains or had 
increased their use of such teams. In foreign countries we visited, 
rail transit operators' use of canine units varied. In some Asian 
countries, dogs were not culturally accepted by the public and thus 
were not used for rail security purposes. Most European rail transit 
operators used canine units for explosives detection or as deterrents. 

Employee training: All of the domestic and foreign rail operators we 
interviewed had provided some type of security training to their staff, 
either through in-house personnel or an external provider. In many 
cases, this training consisted of ways to identify suspicious items and 
persons and to respond to events once they occur. For example, the 
London Underground and the British Transport Police developed the "HOT" 
method for Underground employees to identify suspicious items in the 
rail system. In the HOT method, employees are trained to look for 
packages or items that are Hidden, Obviously suspicious, and not 
Typical of the environment. If items meet all of these criteria, 
employees are to notify station managers, who are to call in the 
authorities and potentially shut down the station or take other action. 
According to London Underground officials, the HOT method has 
significantly reduced the number of system disruptions caused when a 
suspicious item was identified. Several rail transit operators in the 
United States and abroad have trained their employees in the HOT 
method. It is important to note that such training is not designed to 
prevent acts of terrorism like the July 2005 London attacks, in which 
suicide bombers killed themselves rather than leaving bombs behind. 

Passenger and baggage screening practices: Some domestic and foreign 
rail operators have trained employees to recognize suspicious behavior 
as a means of screening passengers. Eight U.S. rail transit operators 
we contacted were using some form of behavioral screening. For example, 
the Massachusetts Bay Transportation Authority (MBTA), which operates 
Boston's T system, has adopted a behavioral screening system to 
identify passengers exhibiting suspicious behavior. The Massachusetts 
State Police train all MBTA personnel to be on the lookout for behavior 
that may indicate someone has criminal intent, and to approach and 
search such persons and their baggage when appropriate. Abroad, we 
found that 4 of the 13 operators we interviewed had implemented forms 
of behavioral screening similar to MBTA's system. All of the domestic 
and foreign rail operators we contacted have ruled out an airport-style 
screening system for daily use in heavy traffic. According to the 
operators, such a system, in which each passenger and the passenger's 
baggage are screened by a magnetometer or X-ray machine, raised 
concerns about cost, staffing, and customer convenience, among other 
factors. 

Upgrading technology: Many rail operators we interviewed had embarked 
on programs designed to upgrade their existing security technology. For 
example, we found that 29 of the 32 U.S. operators had implemented a 
form of closed-circuit television (CCTV) to monitor their stations, 
yards, or trains. While these cameras cannot be monitored closely at 
all times, because of the large number of staff the operators said 
would be required, many rail operators told us the cameras act as a 
deterrent, assist security personnel in determining how to respond to 
incidents that have already occurred, and can be monitored if an 
operator has received information that an incident may occur at a 
certain time or place in a system. One rail operator, New Jersey 
Transit, had installed "smart" cameras, which were programmed to alert 
security personnel when suspicious activity occurred, such as if a 
passenger left a bag in a certain location or a boat docked under a 
bridge. According to the New Jersey Transit officials, this technology 
was relatively inexpensive and not difficult to implement. Several 
other operators said they were interested in exploring this technology. 
Abroad, all 13 of the foreign rail operators we visited had CCTV 
systems in place. As in the United States, foreign rail operators use 
these cameras primarily to deter crime and to respond to incidents 
after they occur, because they do not have enough staff to monitor all 
the cameras continuously. 

Most rail operators we spoke with had not installed equipment for 
detecting chemical or biological agents because of the costs involved, 
but a few operators had this equipment or were exploring its purchase. 
For example, the Washington Metropolitan Area Transit Authority 
(WMATA), in Washington, D.C., has installed these sensors in some of 
its stations, thanks to a program jointly sponsored by DOT and the 
Department of Energy that provided this equipment to WMATA because of 
the high perceived likelihood of an attack in Washington, D.C. Also, at 
the time of our review, at least three other domestic rail operators we 
spoke with were exploring the possibility of partnering with federal 
agencies to install such equipment in their facilities on an 
experimental basis. Also, as in the United States, a few foreign 
operators had implemented chemical or biological detection devices at 
rail stations, but their use was not widespread. Two of the 13 foreign 
operators we interviewed had implemented these sensors, and both were 
doing so on an experimental basis. In addition, police officers from 
the British Transport Police--responsible for policing the rail system 
in the United Kingdom--were equipped with pagers to detect chemical, 
biological, or radiological elements in the air, allowing them to 
respond quickly in case of a terrorist attack using one of these 
methods. The British Transit Police also have three vehicles carrying 
devices to determine if unattended baggage contains explosives. These 
vehicles patrol the system 24 hours per day. 

Access control: Tightening access procedures at key facilities or 
rights-of-way is another way many rail operators have attempted to 
enhance security. A majority of domestic and selected foreign passenger 
rail operators had invested in enhanced systems to control unauthorized 
access at employee facilities and stations. Specifically, 23 of the 32 
U.S. operators had installed a form of access control at key facilities 
and stations. This often involved installing a system requiring 
employees to swipe an access card to gain access to control rooms, 
repair facilities, and other key locations. All 13 foreign operators 
had implemented some system to control access to their critical 
facilities or rights-of-way. 

Rail system design and configuration: In an effort to reduce 
vulnerabilities to terrorist attack and increase overall security, rail 
transit operators in the United States and abroad have been, or are now 
beginning to, incorporate security features into the design of new and 
existing rail infrastructure, primarily rail stations. For example, of 
the 32 domestic rail operators we contacted, 22 had removed their 
conventional trash bins entirely, or replaced them with transparent or 
bomb-resistant trash bins, as TSA directed in May 2004. Foreign rail 
operators had taken steps to remove traditional trash bins from their 
systems. Of the 13 operators we visited, 8 had either removed their 
trash bins entirely or replaced them with blast-resistant cans or 
transparent receptacles. 

Many foreign rail operators are also incorporating aspects of security 
into the design of their rail infrastructure. Of the 13 operators we 
visited, 11 have attempted to design new facilities with security in 
mind and have attempted to retrofit older facilities to incorporate 
security-related modifications. For example, one foreign operator we 
visited is retrofitting its train cars with windows that passengers can 
open in the event of a chemical attack. In addition, the London 
Underground, one of the oldest rail systems in the world, incorporates 
security into the design of all its new stations as well as of 
modifications to existing stations. We observed several security 
features in the design of Underground stations, such as the use of 
vending machines that have no holes that someone could use to hide a 
bomb, and sloped tops to reduce the likelihood that a bomb can be 
placed on top of the machine. In addition, stations are designed to 
provide staff with clear lines of sight to all areas of the station, 
such as underneath benches or ticket machines, and station designers 
try to eliminate or restrict access to any recessed areas where a bomb 
could be hidden. 

In the United States, several rail transit operators said they were 
taking security into account when designing new facilities or 
remodeling older ones. Twenty-two of 32 rail operators we interviewed 
told us that they were incorporating security into the design of new or 
existing rail infrastructure. For example, New York City Transit and 
Port Authority Trans-Hudson (PATH) officials told us they are 
incorporating security into the design of its new stations, including 
the redesigned Fulton Street station and the World Trade Center Hub 
that were damaged or destroyed during the September 11 attacks. In 
addition, in June 2005, FTA issued guidelines for use by the transit 
industry encouraging the incorporation of particular security features 
into the design of transit infrastructure. These guidelines include, 
for example, increasing visibility for onboard staff, reducing the 
areas where someone could hide an explosive device on a transit 
vehicle, and enhancing emergency exits in transit stations. Figure 2 
illustrates several security measures that we observed in rail transit 
stations both in the United States and abroad. It should be noted that 
this figure represents an amalgam of stations we visited, not any 
particular station. 

Figure 2: Composite of Selected Security Practices in the Rail Transit 
Environment: 

[See PDF for image] 

[End of figure] 

Three Foreign Rail Security Practices Are Not Currently Used in the 
United States: 

While many of the security practices we observed in foreign rail 
systems are similar to those U.S. rail transit operators are 
implementing, we encountered three practices in other countries that 
were not currently in use among the domestic rail transit operators we 
contacted as of June 2005, nor were they performed by the U.S. 
government. These practices are discussed below. 

Covert testing: Two of the 13 foreign rail systems we visited use 
covert testing to keep employees alert about their security 
responsibilities. Covert testing involves security staff staging 
unannounced events to test the response of railroad staff to incidents 
such as suspicious packages or alarms. In one European system, security 
staff place suspicious items throughout their system to see how long it 
takes operating staff to respond to the items. Similarly, one Asian 
rail operator's security staff break security seals on fire 
extinguishers and open alarmed emergency doors randomly to see how long 
it takes staff to respond. Officials of these operators stated that 
these tests are carried out daily and are beneficial because the staff 
know they could be tested at any moment and are therefore more likely 
to be vigilant about security. 

Random screening: Of the 13 foreign operators we interviewed, 2 
conducts some form of random screening of passengers and their baggage. 
In the systems where this practice is used, security personnel can 
approach passengers either in stations or on the trains and ask them to 
submit their persons or their baggage to a search. Passengers declining 
to cooperate must leave the system. For example, in Singapore, rail 
agency officials rotate the stations where they conduct random searches 
so that the searches are carried out at a different station each day. 
Before the July 2005 London bombings, no rail transit operators in the 
United States were randomly screening passengers or baggage every day. 
However, during the Democratic National Convention in 2004, MBTA began 
randomly screening every 11th passenger at certain stations and times 
of the day, asking the passenger to provide his or her bags to be 
screened. Those who refused were not allowed to ride the system. MBTA 
officials recognized that it is impossible to implement such a system 
comprehensively throughout the rail network without major staffing 
increases, and that even doing random screening regularly would be a 
drain on resources. However, officials stated that such a system is 
workable during special events and times of heightened security but 
would have to be designed very carefully to ensure that passengers' 
civil liberties were not violated. After the July 2005 London bombings, 
four rail transit operators--PATH, New York Metropolitan Transportation 
Authority, New Jersey Transit, and Utah Transit Authority in Salt Lake 
City--implemented limited forms of random baggage screening in their 
system. 

National government maintains clearinghouse on technologies and best 
practices: According to passenger rail operators in five countries we 
visited, their national governments have centralized the process for 
performing research and developing passenger rail security technologies 
and maintaining a clearinghouse on these technologies and security best 
practices. According to these officials, this practice allows rail 
operators to have one central source for information on the merits of a 
particular passenger rail security technology, such as chemical 
sensors, CCTVs, and intrusion detection devices. No federal agency has 
compiled or disseminated best practices to rail operators to aid in 
this process. Some U.S. rail operators we interviewed expressed 
interest in there being a more active centralized federal research and 
development authority in the United States to evaluate and certify 
passenger rail security technologies and make that information 
available to rail operators. We have also previously reported that 
stakeholders have stated that the federal government should play a 
greater role in testing transportation security technology and making 
this information available to industry stakeholders.[Footnote 9] 
Currently, many operators said they informally ask other rail operators 
about their experiences with a certain technology, perform their own 
research via the Internet or trade publications, or perform their own 
testing. TSA and DOT agree that making the results of research testing 
available to industry stakeholders could be a valuable use of federal 
resources because it would reduce the need for multiple rail operators 
to perform the same research and development efforts, but they have not 
taken steps to implement this practice.[Footnote 10] 

Implementing these three practices--covert testing, random screening, 
and a government-sponsored clearinghouse for technologies and best 
practices--in the United States could pose political, legal, fiscal, 
and cultural challenges because of the differences between the United 
States and these foreign nations. For instance, many foreign nations 
have dealt with terrorist attacks on their public transportation 
systems for decades, compared with the United States, where rail 
transportation has not been specifically targeted during terrorist 
attacks. According to foreign rail operators, these experiences have 
resulted in greater acceptance of certain security practices, such as 
random searches, which the U.S. public may view as a violation of their 
civil liberties or which may discourage the use of public 
transportation. The impact of security measures on passengers is an 
important consideration for domestic rail transit operators, since most 
passengers could choose another means of transportation, such as a 
personal automobile. As such, security measures that limit 
accessibility, cause delays, increase fares, or otherwise cause 
inconvenience could push people away from transit and into their cars. 
In contrast, the citizens of the European and Asian countries we 
visited are more dependent on public transportation than most U.S. 
residents and therefore, according to the rail operators we spoke with, 
may be more willing to accept more intrusive security measures, simply 
because they have no other choice for getting from place to place. 
Nevertheless, in order to identify innovative security measures that 
could help further mitigate terrorism-related risk to rail assets it is 
important to at least consider assessing the feasibility and costs and 
benefits of implementing in the United States the three rail security 
practices we identified in foreign countries. Officials from DHS, DOT, 
passenger rail industry associations, and rail systems we interviewed 
told us that operators would benefit from such an evaluation. 
Furthermore, the passenger rail association officials told us that such 
an evaluation should include practices used by foreign rail operators 
that integrate security into infrastructure design. 

Differences in the business models and financial status of some foreign 
rail operators could also affect the feasibility of adopting certain 
security practices in the United States. Several foreign countries we 
visited have privatized their passenger rail operations. Although most 
of the foreign rail operators we visited--even the privatized systems-
-rely on their governments for some type of financial assistance, two 
foreign rail operators generated significant revenue and profits in 
other business endeavors, which they said allowed them to invest 
heavily in security measures for their rail systems. 

Another important difference between domestic and foreign rail 
operators is the structure of their police forces. In particular, 
England, France, Belgium, and Spain all have national police forces 
patrolling rail systems in these countries. The use of a national 
police force is a reflection that these foreign countries often have 
one nationalized rail system, rather than over 30 rail transit systems 
owned and operated by numerous state and local governments, as is the 
case in the United States. For example, in France, the French National 
Railway operates all intercity passenger rail services in the country, 
and the French Railway police provide security. According to foreign 
rail operators, the use of one national rail police force allows for 
consistent policing and security measures throughout the country. In 
the United States, by contrast, some transit agencies maintain 
individual polices forces, while others rely on their city or county 
police forces for security. 

DHS and DOT Help Fund Security Efforts, and Some Funding Decisions Are 
Risk-Based: 

Both DHS and DOT help fund rail transit security investments, and DHS 
has promoted risk-based funding decisions in the allocation of transit 
security grants. DHS's Office of Grants and Training administers the 
UASI and Transit Security grant programs. These programs have provided 
over $320 million in grants to rail transit agencies for certain 
security activities since fiscal year 2003. The Office of Grants and 
Training has leveraged its grant-making authority to promote risk-based 
funding decisions for passenger rail by requiring, for example, that 
operators complete a risk assessment to be eligible for a transit 
security grant. FTA also helps fund rail transit security efforts 
through the financial assistance it provides to transit agencies, with 
the stipulation that a certain percentage of federal funds be used for 
security activities. 

DHS and DOT Help Fund Rail Transit Security Efforts: 

With the creation of DHS in 2002, one of its components, the Office of 
Grants and Training, became the primary federal source for security 
funding for passenger rail systems. The Office of Grants and Training 
is the principal component of DHS responsible for preparing the United 
States for acts of terrorism and has primary responsibility within the 
executive branch for assisting and supporting DHS, in coordination with 
other directorates and entities outside the department, in conducting 
risk analysis and risk management activities for state and local 
governments. In carrying out its mission, the Office of Grants and 
Training provides training, funds for the purchase of equipment, 
support for the planning and execution of exercises, technical 
assistance, and other support to assist states, local jurisdictions, 
and the private sector to prevent, prepare for, and respond to acts of 
terrorism. Through the UASI grant program, the Office of Grants and 
Training has provided grants to urban areas to help enhance their 
overall security and preparedness level to prevent, respond to, and 
recover from acts of terrorism. In 2003 and 2004, $65 million and $50 
million, respectively, were allocated to rail transit agencies through 
the UASI program. In addition, the DHS Appropriations Act of 2005 
appropriated $150 million for rail transit, intercity passenger rail, 
freight rail, and transit agency security grants.[Footnote 11] This 
funding has allowed the Office of Grants and Training to build upon the 
work under way through the UASI program and create and administer new 
programs focused specifically on transportation security, including the 
Transit Security Grant Program. This program provides financial 
assistance to address security preparedness and enhancements for 
transit (to include commuter, heavy, and light rail systems; intracity 
buses, and ferries). Table 1 summarizes the funding provided to rail 
transit providers through the UASI and Transit Security Grant Program 
from 2003 through 2006. 

Figure 3: Security Grants Provided by the Office of Grants and Training 
to Rail Transit Providers, 2003 through 2006: 

[See PDF for image] 

Source: DHS Office of Grants and Training. 

[End of figure] 

Although FTA now plays a supporting role in rail transit security 
matters since the creation of TSA, it remains an important partner in 
funding security efforts. FTA provides financial assistance to rail 
transit agencies to plan and develop new systems and operate, maintain, 
and improve existing systems. Rail transit agencies can use some of 
this funding for security activities, although the agencies have to 
balance investments in security against other competing priorities. In 
addition, FTA promotes safety and security through its grant-making 
authority. FTA stipulates conditions of grants, such as certain safety 
and security statutory and regulatory requirements, and FTA may 
withhold funds for noncompliance with the conditions of a grant. For 
example, transit agencies must spend 1 percent of their urbanized area 
formula funds--which is FTA's largest grant program--on security 
improvements.[Footnote 12] 

Using Risk Management Approach Can Help Direct Federal Funds to Highest 
Rail Transit Security Priorities: 

In recent years, we, along with Congress, the executive branch, and the 
9/11 Commission have required or advocated that federal agencies with 
homeland security responsibilities use a risk management approach to 
help ensure that finite national resources are dedicated to assets or 
activities considered to have the highest security priority. A risk 
management approach entails a continuous process of managing risk 
through a series of actions, including setting strategic goals and 
objectives, performing risk assessments, evaluating alternative actions 
to reduce identified risks by preventing or mitigating their impact, 
selecting actions to undertake by management, and implementing and 
monitoring those actions. We have concluded that without a risk 
management approach, there is limited assurance that programs designed 
to combat terrorism are properly prioritized and focused. Targeting 
resources to the highest priority is especially critical given the 
competition for resources within the rail transit sector, and between 
the rail transit sector and the other modes of transportation. 
Moreover, as the 2005 London rail bombings dramatically illustrated, 
even when a variety of security precautions are put in place, passenger 
rail systems remain vulnerable and attractive targets given their open 
designs and the high volumes of passengers they transport each day. 
Thus, it is important that limited resources are targeted to security 
activities that have the greatest impact on reducing overall risk. 

DHS' Office of Grants and Training has leveraged its grant-making 
authority to promote risk-based funding decisions for passenger rail. 
For example, passenger rail operators must have completed a risk 
assessment to be eligible for financial assistance through the fiscal 
year 2005 Transit Security Grant program administered by the Office of 
Grants and Training. To receive these funds, rail transit operators are 
also required to have a security and emergency preparedness plan that 
identifies how the operator intends to respond to security gaps 
identified by risk assessments. This plan, along with a regional 
transit security strategy prepared by regional transit stakeholders, 
will serve as the basis for determining how the grant funds are to be 
allocated. 

Coordination between Federal Agencies Has Faced Challenges and Will 
Continue to Be Important: 

Prior to the creation of DHS, DOT modal agencies, such as FTA and FRA, 
were the primary federal agencies involved in rail transit security 
matters. Since Congress passed ATSA in 2001, creating TSA and giving it 
regulatory authority over the security of all modes of transportation, 
federal agencies have had some difficulty coordinating their activities 
and communicating to industry stakeholders about their role and 
responsibilities. In response to a GAO recommendation, DOT and DHS 
entered into an MOU to better coordinate their activities and have 
embarked on a number of initiatives to improve their coordination with 
each other and with industry stakeholders. Coordination between DHS and 
DOT will continue to be important as both departments move forward with 
existing programs and new security initiatives, such as TSA's 
deployment of its rail inspectors. 

DHS and DOT Have Worked to Improve Coordination on Transit Security 
Matters: 

Although DOT modal administrations have played supporting roles in 
transportation security matters since the creation of TSA, they remain 
important partners in the federal government's efforts to improve rail 
security, given DOT's role in funding and overseeing the safety of rail 
transit systems. For example, as previously mentioned, FTA provides 
financial assistance to rail transit agencies, and some of this funding 
can, and in some cases must, be used for security activities. In 
addition, FTA has regulatory authority for state safety oversight of 
rail fixed-guideway systems and for a drug and alcohol program, and FRA 
has regulatory authority for rail safety over commuter rail operators. 
As we have previously reported, it could be difficult to distinguish 
DOT's role in maintaining and improving transportation safety from 
DHS's role in securing the transportation system because security is 
often intertwined with safety.[Footnote 13] Moreover, FTA and FRA are 
continuing their rail transit security efforts as TSA moves ahead with 
its rail transit security initiatives.[Footnote 14] 

We have previously reported that coordination between DHS and DOT, as 
well as between DHS and rail transit stakeholders, could be improved. 
For example, in our September 2005 report on rail security, we noted 
that TSA provided limited opportunities for other federal agencies and 
the rail industry to collaborate in the development of its passenger 
rail security directives, which were issued in May 2004 to provide a 
consistent baseline standard of protective measures for all passenger 
rail operators.[Footnote 15] Federal and rail industry officials have 
raised questions about the feasibility of implementing and complying 
with the directives, noting, among other things, that the directives do 
not reflect a complete understanding of the rail transit environment or 
necessarily incorporate industry best practices. In addition, in 2003, 
we noted that representatives from several associations told us that 
they have received conflicting messages from the federal agencies 
involved in transportation security, including rail transit.[Footnote 
16] We further noted that representatives from several associations 
also stated that their members were unclear about which agency to 
contact for their various security concerns and which agency has 
oversight for certain issues. We concluded that a lack of clearly 
defined roles and responsibilities can lead to problems such as 
duplication and conflicting efforts, gaps in preparedness, and 
confusion. Moreover, a lack of coordination can strain 
intergovernmental relationships, drain resources, and raise the 
potential for problems in responding to terrorism. Therefore, we 
recommended that DHS and DOT use a mechanism, such as a memorandum of 
agreement, to clearly delineate their roles and responsibilities. At a 
minimum, we recommended that this mechanism establish the 
responsibilities of each entity in setting, administering, and 
implementing security standards and regulations; determining funding 
priorities; and interfacing with the transportation industry, as well 
as define each entity's role in the inevitable overlap of some safety 
and security activities. 

In response to our 2003 recommendation, DHS and DOT signed a memorandum 
of understanding (MOU) in September 2004 to develop procedures through 
which the two departments could improve their cooperation and 
coordination in promoting the safe, secure, and efficient movement of 
people and goods throughout the transportation system. The MOU defines 
broad areas of responsibility for each department. For example, it 
states that DHS, in consultation with DOT and affected stakeholders, 
will identify, prioritize, and coordinate the protection of critical 
infrastructure. The MOU between DHS and DOT represents an overall 
framework for cooperation that is to be supplemented by additional 
signed agreements, or annexes, between the departments. These annexes 
are to delineate the specific security-related roles, responsibilities, 
resources, and commitments for mass transit, rail, research and 
development, and other matters. The annex for mass transit security was 
signed in September 2005.[Footnote 17] According to DHS and DOT 
officials, this annex is intended to ensure that the programs and 
protocols for incorporating stakeholder feedback and making 
enhancements to security measures are coordinated. For example, the 
annex requires that DHS and DOT consult on such matters as regulations 
and directives that affect security. The annex also identifies points 
of contact for coordinating this consultation. 

In addition to their work on the MOU and related annexes, DHS and TSA 
have taken other steps to improve collaboration with DOT and industry 
stakeholders. In April 2005, DHS officials stated that better 
collaboration with DOT and industry stakeholders was needed to develop 
strategic security plans associated with various homeland security 
presidential directives and statutory mandates, such as the 
Intelligence Reform and Terrorism Prevention Act of 2004, which 
required DHS to develop a national strategy for transportation security 
in conjunction with DOT. Responding to the need for better 
collaboration, DHS established a senior-level steering committee in 
conjunction with DOT to coordinate the development of this national 
strategy. In addition, senior DHS and TSA officials stated that 
industry groups would also be involved in developing the national 
strategy for transportation security and other strategic plans. 
Moreover, according to TSA's assistant administrator for intermodal 
programs, TSA intends to work with APTA and other industry stakeholders 
in developing security standards for the rail transit 
industry.[Footnote 18] 

Coordination between Federal Agencies Will Continue to Be Important: 

DOT's and DHS's efforts to enhance coordination between their agencies 
and with industry stakeholders on security matters are welcome. 
Effective coordination between the two departments will continue to be 
important as both move forward in implementing existing programs as 
well as new security initiatives. For example, FTA administers the 
State Safety Oversight program, which mandates that state-designated 
agencies oversee the safety of rail transit agencies. Although ATSA 
gave TSA final regulatory authority over all modes of transportation, 
including rail transit, in the program, FTA sets out minimum 
requirements the state oversight agencies must ensure that transit 
agencies meet. FTA's mandated minimum requirements include security 
components, one of which directs rail transit agencies to maintain a 
system security plan that includes controls to address employee and 
passenger security and a process for conducting internal security 
reviews. Several rail transit operators told us that they were confused 
by having to answer to both FTA and TSA for transportation security 
matters. We have ongoing work for the full Committee examining the 
State Safety Oversight program--and, as part of this review, we will be 
exploring the extent to which FTA and TSA work together in implementing 
this program. We expect to issue our report later this summer. 

Another area that will require continued coordination is DHS's and 
DOT's security and safety oversight efforts. TSA has hired rail 
inspectors to, among other things, monitor and enforce compliance with 
its May 2004 passenger rail security directives. As of March 2006, TSA 
had filled 99 of up to 100 inspector positions authorized by 
Congress.[Footnote 19] However, TSA has not yet established processes 
or criteria for determining and enforcing compliance. TSA has also not 
determined how its rail inspectors will be used to enforce the 
directives or how they will coordinate with existing FRA safety 
inspectors or state oversight auditors involved in the State Safety 
Oversight Program. The Director of TSA's Surface Transportation 
Inspection Program, which oversees the rail inspectors, and a local 
rail inspector program supervisor told us that they looked forward to 
coordinating with FTA on the State Safety Oversight program and would 
be open to a formalized role in the program, but had not held any 
discussions with FTA about what that role would be. In fact, both the 
Director and the local supervisor admitted that they were not familiar 
with the program's requirements. In addition, the transit security 
annex to the MOU between DHS and DOT does not explicitly mention the 
State Safety Oversight program as a program for which the two agencies 
will collaborate, and officials from several state oversight agencies 
said they were unsure what their role would be in overseeing security 
once the TSA rail inspectors began their duties. Also, FRA and TSA 
officials told us that the details of how TSA rail inspectors will 
coordinate with the approximately 400 existing FRA safety inspectors 
and 160 state employees enforcing FRA passenger rail rules and 
regulations remain to be determined. Both FRA and TSA stated that they 
were committed to avoiding duplication of effort and would work to 
communicate their respective roles and responsibilities to transit 
agency officials. 

Another area requiring continued coordination is the funding of rail 
transit security activities. Specifically, the Safe, Accountable, 
Flexible, Efficient Transportation Equity Act: A Legacy for Users 
(SAFETEA-LU)[Footnote 20] included a provision mandating that DOT and 
DHS collaborate on a joint rulemaking for the Transit Security Grant 
Program. The joint rulemaking is to establish the characteristics of 
and requirements for transit security grants, including funding 
priorities, eligible activities, methods for awarding grants, and 
limitations on administrative expenses. The rule is currently being 
drafted, and officials from DHS' Office of Grants and Training told us 
they expected it to be finalized in summer 2006. 

Concluding Observations: 

In conclusion, Mr. Chairman, the 2005 London rail bombings made clear 
that even when a variety of security precautions are put in place, rail 
transit systems that move high volumes of passengers daily remain 
vulnerable to attack. Security cannot be guaranteed. Nevertheless, it 
is important that we take steps to identify and mitigate risks to 
passenger rail systems. While domestic rail agencies have implemented a 
number of security practices that are generally consistent with those 
of foreign rail operators, they have not adopted some practices used in 
other countries, including covert testing, random screening, and 
information clearinghouses for new security technologies and best 
practices. Despite the potential political, legal, fiscal, and cultural 
challenges that implementing these additional practices in the United 
States could pose, we continue to believe that the practices may 
warrant further examination, and we stand by our September 2005 
recommendations that DHS, in collaboration with DOT and the passenger 
rail industry, evaluate the feasibility of implementing them. 

As we move forward with efforts to enhance rail transit security, it is 
important that we do not examine rail transit security actions and 
funding in isolation. Rail transit systems represent one of many modes 
of transportation competing for limited federal security resources. 
Given competing priorities and finite resources, difficult policy 
decisions will have to be made by Congress and the executive branch to 
prioritize security efforts and direct resources to the areas of 
greatest risk within the passenger rail system, across all 
transportation modes, and across other sectors of the economy. As we 
have previously noted in past reports, adopting a risk management 
approach can help guide and inform these difficult decisions--and help 
ensure that finite national resources are dedicated to assets or 
activities considered to have the highest security priority. DHS has 
taken steps to adopt a risk management approach. 

Finally, the sheer number of stakeholders involved in securing rail 
transit systems can lead to communication challenges, duplication of 
effort, and confusion about roles and responsibilities. With the 
execution of the MOU and transit security annex, DHS and DOT have taken 
important steps forward in improving coordination among the federal 
entities involved in rail transit security matters. These new 
agreements will be tested as both departments proceed with new security 
initiatives and existing programs, such as FTA's State Safety Oversight 
program. We stand ready to assist the Committee and Subcommittee in 
monitoring these developments. 

Mr. Chairman, this concludes my statement. I would be pleased to answer 
any questions that you or other members of the Subcommittee may have at 
this time. 

Contact Information: 

For further information on this testimony, please contact JayEtta Z. 
Hecker at (202) 512-2834 or Cathleen A. Berrick at (202) 512-3404. 
Individuals making key contributions to this testimony include Nikki 
Clowers, Colin Fallon, Kirk Kiester, and Ray Sendejas. 

Appendix I--Domestic and Foreign Rail Agencies GAO Contacted for GAO-05-
851: 

Table 1: Domestic Passenger Rail Agencies We Visited or Interviewed: 

Passenger rail agency: Altamont Commuter Express (ACE); 
Urban area served: Stockton and San Jose, California. 

Passenger rail agency: Alaska Railroad Corporation; 
Urban area served: Anchorage and Fairbanks, Alaska. 

Passenger rail agency: Bay Area Rapid Transit (BART); 
Urban area served: San Francisco -Oakland, California. 

Passenger rail agency: CALTRAIN; 
Urban area served: San Francisco and San Jose, California. 

Passenger rail agency: San Diego Transit Corp. (Coaster); 
Urban area served: San Diego, California. 

Passenger rail agency: Dallas Area Rapid Transit/Trinity Railway 
Express (DART); 
Urban area served: Dallas, Texas. 

Passenger rail agency: Greater Cleveland Regional Transportation 
Authority (GCRTA); 
Urban area served: Cleveland, Ohio. 

Passenger rail agency: Los Angeles County Metropolitan Transportation 
Authority (LACMTA); 
Urban area served: Los Angeles, California. 

Passenger rail agency: Metropolitan Atlanta Rapid Transit Authority 
(MARTA); 
Urban area served: Atlanta, Georgia. 

Passenger rail agency: Maryland Transit Administration (MTA); 
Urban area served: Greater Washington, DC, and Maryland. 

Passenger rail agency: Massachusetts Bay Transportation Authority 
(MBTA); 
Urban area served: Boston, Massachusetts. 

Passenger rail agency: METRA Commuter Rail; 
Urban area served: Chicago, Illinois. 

Passenger rail agency: Southern California Regional Rail Authority 
(Metrolink); 
Urban area served: Greater Los Angeles, California. 

Passenger rail agency: Long Island Railroad (LIRR); 
Urban area served: New York, New York. 

Passenger rail agency: Metro North Railroad (MNR); 
Urban area served: New York, New York. 

Passenger rail agency: New York City Transit (NYCT); 
Urban area served: New York, New York. 

Passenger rail agency: Staten Island Railway (SIR); 
Urban area served: New York, New York. 

Passenger rail agency: San Francisco Municipal Railway (MUNI); 
Urban area served: San Francisco, California. 

Passenger rail agency: Northern Indiana Commuter District; 
Urban area served: Chicago, Illinois --Northern Indiana. 

Passenger rail agency: Delaware River Port Authority (PATCO); 
Urban area served: New Jersey and Philadelphia, Pennsylvania. 

Passenger rail agency: Port Authority Trans Hudson (PATH); 
Urban area served: New York, New York --New Jersey. 

Passenger rail agency: San Diego Trolley; 
Urban area served: San Diego, California. 

Passenger rail agency: Southeastern Pennsylvania Transportation 
Authority (SEPTA); 
Urban area served: Philadelphia, Pennsylvania. 

Passenger rail agency: South Florida Regional Transportation Authority 
(SFRTA); 
Urban area served: Miami, Florida. 

Passenger rail agency: Connecticut Department of Transportation (Shore 
Line East); 
Urban area served: New Haven, Connecticut. 

Passenger rail agency: Sound Transit (Sounder); 
Urban area served: Seattle, Washington. 

Passenger rail agency: TRIMET; 
Urban area served: Portland, Oregon. 

Passenger rail agency: Virginia Railway Express (VRE); 
Urban area served: Northern Virginia, Greater Washington, D.C. 

Passenger rail agency: Washington Metropolitan Area Transit Authority 
(WMATA); 
Urban area served: Washington, D.C. 

Passenger rail agency: New Jersey Transit (NJT); 
Urban area served: Newark, New Jersey --New York, New York. 

Passenger rail agency: Miami Dade Transit; 
Urban area served: Miami, Florida. 

Passenger rail agency: Chicago Transit Authority (CTA); 
Urban area served: Chicago, Illinois. 

Source: National Transit Database: 

[End of table] 

Table 2: Foreign Passenger Agencies We Contacted: 

Passenger rail agency: Paris Metro; 
Area served: Paris, France. 

Passenger rail agency: French National Railway; 
Area served: France. 

Passenger rail agency: London Underground; 
Area served: London, United Kingdom. 

Passenger rail agency: Network Rail; 
Area served: United Kingdom. 

Passenger rail agency: Channel Tunnel Rail Link; 
Area served: United Kingdom/France. 

Passenger rail agency: Belgian National Railway; 
Area served: Belgium. 

Passenger rail agency: Madrid Metro; 
Area served: Madrid, Spain. 

Passenger rail agency: RENFE (Spanish National Railway); 
Area served: Spain. 

Passenger rail agency: JR Central; 
Area served: Japan. 

Passenger rail agency: Tokyo Metro; 
Area served: Tokyo, Japan. 

Passenger rail agency: SBS Transit Corporation; 
Area served: Singapore. 

Passenger rail agency: Singapore Mass Rapid Transit; 
Area served: Singapore. 

Passenger rail agency: Hong Kong Mass Transit Railway; 
Area served: Hong Kong. 

Source: GAO: 

[End of table] 

FOOTNOTES 

[1] DHS's Office of Grants and Training was formerly called the Office 
of Domestic Preparedness. 

[2] Pub. L. No. 108-458, 118 Stat. 3638. For more information on risk 
management, see GAO, Transportation Security: Systematic Planning 
Needed to Optimize Resources, GAO-05-357T (Washington, D.C.: Feb. 15, 
2005); Homeland Security: A Risk Management Approach Can Guide 
Preparedness Efforts, GAO-02-208T (Washington, D.C.: Oct. 31, 2001); 
and Combating Terrorism: Threat and Risk Assessments Can Help 
Prioritize and Target Program Investments, GAO/NSIAD-98-74 (Washington, 
D.C.: Apr. 9, 1998). 

[3] GAO, Passenger Rail Security: Enhanced Federal Leadership Needed to 
Prioritize and Guide Security Efforts, GAO-05-851 (Washington, D.C.: 
Sept. 9, 2005); GAO, Rail Security: Some Actions Taken to Enhance 
Passenger and Freight Rail Security, but Significant Challenges Remain, 
GAO-04-598T (Washington, D.C.: Mar. 24, 2004); GAO, Transportation 
Security: Federal Action Needed to Help Address Security Challenges, 
GAO-03-843 (Washington, D.C.: June 30, 2003); and GAO, Mass Transit: 
Federal Actions Could Help Transit Agencies Address Security 
Challenges, GAO-03-263 (Washington, D.C.: Dec. 13, 2002). 

[4] GAO-05-851. 

[5] FTA's urbanized area formula grant program provides federal funds 
to urbanized areas (jurisdictions with populations of 50,000 or more) 
for transit capital investments, operating expenses, and transportation-
related planning. 

[6] Pub. L. No. 107-71, 115 Stat. 597 (2001). 

[7] Pub. L. No. 107-296, 116 Stat. 2135 (2002). 

[8] At the time we completed our work in June 2005, these three 
practices were not utilized. However, as discussed later in this 
testimony, some rail operators began using random screening in the 
aftermath of the July bomb attacks on the London subway system and 
others may have begun utilizing this or other security practices since 
our report. 

[9] GAO-03-843. 

[10] GAO-03-843. 

[11] Pub. L. No. 108-334, 118 Stat. 1298 (2004). 

[12] FTA is to verify that agencies comply with the requirement to 
spend 1 percent of their urbanized area formula funds on security 
improvements and may withhold funding from agencies that it finds are 
not in compliance. Agencies are not required to comply with this 
spending rule if a valid justification can be documented, such as state 
and local funds for security are inadequate or security trend data do 
not warrant security spending. 

[13] GAO-03-843. 

[14] For information about TSA's, FTA's, and FRA's rail transit 
security initiatives, see GAO-05-851. 

[15] GAO-05-851. 

[16] GAO-03-843. 

[17] Congress required that an annex to the MOU be signed that would, 
among other things, define and clarify the respective transit security 
roles and responsibilities of each department. Pub. L. 109-59, § 3028 
(2005). 

[18] APTA is a standards development organization recognized by DOT 
that has set standards for commuter rail, mass transit, and bus safety 
and operations. 

[19] These positions were funded through the DHS Appropriations Act of 
2005 and its accompanying conference report, which provided TSA with 
$12 million in funding for rail security activities. 

[20] P.L. 109-59.