This is the accessible text file for GAO report number GAO-08-48T entitled 'Aviation Security: Vulnerabilities Exposed Through Covert Testing of TSA's Passenger Screening Process' which was released on November 15, 2007. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Testimony: Before the Committee on Oversight and Government Reform, House of Representatives: United States Government Accountability Office: GAO: For Release on Delivery Expected at 10:00 a.m. EST: Thursday, November 15, 2007: Aviation Security: Vulnerabilities Exposed Through Covert Testing of TSA's Passenger Screening Process: Statement of Gregory D. Kutz, Managing Director: Forensic Audits and Special Investigations: John W. Cooney, Assistant Director: Forensic Audits and Special Investigations: This testimony was revised on November 16, 2007, to include a link to digital video. This digital video shows test footage of the improvised explosive devices (IED) and improvised incendiary device (IID) that GAP investigators successfully brought through airport security checkpoints. A link has been added in the Creating Functioning IED and IID Devices section on page 6. GAO-08-48T: GAO Highlights: Highlights of GAO-08-48T, a testimony before the Committee on Oversight and Government Reform, House of Representatives. Why GAO Did This Study: In August 2006, the Transportation Security Administration (TSA) substantially modified its passenger screening policies based on the alleged transatlantic bomb plot uncovered by British authorities. With the aim of closing security gaps revealed by the alleged plot, the revised policies severely restricted the amount of liquids, gels, and aerosols TSA allowed passengers to bring through the checkpoint. At the Committee’s request, GAO tested whether security gaps exist in the passenger screening process. To perform this work, GAO attempted to (1) obtain the instructions and components needed to create devices that a terrorist might use to cause severe damage to an airplane and threaten the safety of passengers and (2) test whether GAO investigators could pass through airport security checkpoints undetected with all the components needed to create the devices. GAO conducted covert testing at a nonrepresentative selection of 19 airports across the country. After concluding its tests, GAO provided TSA with two timely briefings to help it take corrective action. In these briefings, GAO suggested that TSA consider several actions to improve its passenger screening program, including aspects of human capital, processes, and technology. GAO is currently performing a more systematic review of these issues and expects to issue a comprehensive public report with recommendations for TSA in early 2008. What GAO Found: GAO investigators succeeded in passing through TSA security screening checkpoints undetected with components for several improvised explosive devices (IED) and an improvised incendiary device (IID) concealed in their carry-on luggage and on their persons. The components for these devices and the items used to conceal the components were commercially available. Specific details regarding the device components and the methods of concealment GAO used during its covert testing are classified by TSA; as such, they are not discussed in this testimony. Using publicly available information, GAO investigators identified two types of devices that a terrorist could use to cause severe damage to an airplane and threaten the safety of passengers. The first device was an IED made up of two parts—a liquid explosive and a low-yield detonator. Although the detonator itself could function as an IED, investigators determined that it could also be used to set off a liquid explosive and cause even more damage. In addition, the second device was an IID created by combining commonly available products (one of which is a liquid) that TSA prohibits in carry-on luggage. Investigators obtained the components for these devices at local stores and over the Internet for less than $150. Tests that GAO performed at a national laboratory in July 2007, in addition to prior tests in February 2006 that GAO performed in partnership with a law enforcement organization in the Washington, D.C., metro area, clearly demonstrated that a terrorist using these devices could cause severe damage to an airplane and threaten the safety of passengers. Investigators then devised methods to conceal the components for these devices from TSA transportation security officers, keeping in mind TSA policies related to liquids and other items, including prohibited items. By using concealment methods for the components, two GAO investigators demonstrated that it is possible to bring the components for several IEDs and one IID through TSA checkpoints and onto airline flights without being challenged by transportation security officers. In most cases, transportation security officers appeared to follow TSA procedures and used technology appropriately; however, GAO uncovered weaknesses in TSA screening procedures and other vulnerabilities as a result of these tests. For example, although transportation security officers generally enforced TSA’s policies, investigators were able to bring a liquid component of the IID undetected through checkpoints by taking advantage of weaknesses identified in these policies. These weaknesses were identified based on a review of public information. TSA determined that specific details regarding these weaknesses are sensitive security information and are therefore not discussed in this testimony. GAO did not notice any difference between the performance of private screeners and transportation security officers during our tests. To view the full product, including the scope and methodology, click on [hyperlink, http://www.GAO-08-48T]. For more information, contact Gregory D. Kutz at (202) 512-6722 or kutzg@gao.gov. [End of section] Mr. Chairman and Members of the Committee: Thank you for the opportunity to discuss our latest test of airport security. In March 2006, we reported on the results of covert security vulnerability testing at 21 airports across the country. These tests clearly demonstrated that our nation's airlines were vulnerable to a suicide bomber using commercially available materials to detonate an explosive device onboard an airplane. During these covert tests, our investigators passed through airport security checkpoints carrying prohibited explosive components without being caught by Transportation Security Administration (TSA) security officers.[Footnote 1] Later that year, in August 2006, British authorities uncovered the alleged transatlantic bomb plot. The discovery of this bomb plot, in which terrorists allegedly sought to detonate improvised explosive devices (IED)[Footnote 2] in airplanes as they crossed the Atlantic Ocean, caused TSA to substantially modify its screening procedures--all liquids, gels, and aerosols with some exceptions were banned from being carried through passenger screening checkpoints and onto aircraft until the plot was further investigated. These restrictions were later relaxed to allow small amounts of liquids, gels, and aerosols through the checkpoint. This report responds to your request that we test whether security vulnerabilities exist in the TSA passenger screening process. To perform this work, we attempted to (1) obtain the instructions and components needed to create devices that a terrorist might use to cause severe damage to an airplane and threaten the safety of passengers and (2) test whether investigators could pass through airport security checkpoints undetected with all the components needed to create the devices. To obtain instructions on creating devices a terrorist might use, we reviewed publicly available information and performed Internet searches. We obtained components for these devices at local stores and over the Internet. We devised methods to conceal the prohibited components using public information about TSA policies and procedures and obtained items to conceal the components at local stores and over the Internet. We then conducted our covert tests at a nonrepresentative selection of 19 airports across the country. The criteria we used to select the airports resulted in our testing a variety of U.S. commercial airports, some of which employed private screeners.[Footnote 3] Our work was not intended to evaluate the overall design and effectiveness of TSA's airport security program, which contains multiple layers of security. Rather, our work was performed to test specific security vulnerabilities related to the three major elements of TSA's passenger screening process--human capital (i.e., people), processes, and technology employed at the checkpoint. We tested the effectiveness of our explosive device at a national laboratory in July 2007. We had previously tested the effectiveness of less powerful explosive and incendiary devices in the Washington, D.C., metro area with help of a local law enforcement organization. We conducted work for this investigation from March 2007 through July 2007 in accordance with quality standards for investigations as set forth by the President's Council on Integrity and Efficiency. Summary: Our investigators succeeded in passing through TSA security screening checkpoints undetected with components for several IEDs and an improvised incendiary device (IID)[Footnote 4] concealed in their carry- on luggage and on their persons. The components for these devices and the items used to conceal the components were commercially available. Specific details regarding the device components and the methods of concealment we used during our covert testing are classified by TSA; as such, they are not discussed in this testimony. Using publicly available information, our investigators identified two types of devices that a terrorist could use to cause severe damage to an airplane and threaten the safety of passengers. The first device was an IED made up of two parts--a liquid explosive and a low-yield detonator. Although the detonator itself could function as an IED, investigators determined that it could also be used to set off a liquid explosive and cause even more damage. In addition, the second device was an IID created by combining commonly available products (one of which is a liquid) that TSA prohibits in carry-on luggage. Investigators obtained the components for these devices at local stores and over the Internet for less than $150. Tests that we performed at a national laboratory in July 2007, in addition to prior tests in February 2006 that we performed in partnership with a law enforcement organization in the Washington, D.C., metro area, clearly demonstrated that a terrorist using these devices could cause severe damage to an airplane and threaten the safety of passengers. Investigators then devised methods to conceal the components for these devices from TSA transportation security officers, keeping in mind TSA policies related to liquids and other items, including prohibited items. By using concealment methods for the components, two investigators demonstrated that it is possible to bring the components for several IEDs and one IID through TSA checkpoints and onto airline flights without being challenged by transportation security officers. In most cases, transportation security officers appeared to follow TSA procedures and used technology appropriately; however, we uncovered weaknesses in TSA screening procedures and other vulnerabilities as a result of these tests. For example, although transportation security officers generally enforced TSA's policies, investigators were able to bring a liquid component of the IID undetected through checkpoints by taking advantage of weaknesses identified in these policies. These weaknesses were identified based on a review of public information. TSA determined that specific details regarding these weaknesses are sensitive security information and are therefore not discussed in this testimony. We did not notice any difference between the performance of private screeners and transportation security officers during our tests. We provided TSA officials with two timely briefings to help them take corrective action. While we understand that TSA faces a significant challenge in balancing security concerns with efficient passenger movement, we are recommending that the Secretary of Homeland Security consider several actions to improve aspects of TSA's passenger screening program, including elements of human capital, processes, and technology. Background: TSA is responsible for securing all modes of transportation while facilitating commerce and freedom of movement for the traveling public. In performing its responsibilities, TSA is guided by risk-based planning, which generally involves a consideration of threats, vulnerabilities, and the criticality or consequence of an attack if it were to be carried out. Specifically, in its approach to securing the domestic aviation sector, TSA maintains numerous programs that provide a layered approach to security, including intelligence gathering and analysis, checking passenger manifests against watch lists, and assigning undercover air marshals to certain flights. The general public associates TSA mainly with its security effort at airport passenger checkpoints. One primary goal of the passenger checkpoint screening program is to provide for the safety and security of persons and property on an aircraft against the introduction of an unauthorized weapon, explosive, or incendiary.[Footnote 5] As we reported in April 2007, TSA continues to modify its checkpoint screening program based on a number of factors including passenger feedback, risk-based planning, and its own internal review and testing process.[Footnote 6] TSA's well- publicized recent policy change in response to the alleged transatlantic bomb plot of August 2006 is an important example of risk- based planning. Known as the 3-1-1 rule, this procedural change prohibits liquid, gel, or aerosol items over 3.4 fluid ounces in carry- on luggage; in addition, all liquid and gels should be placed in a 1- quart bag, and only one 1-quart bag is allowed per passenger. Passenger Screening Process: TSA focuses on the checkpoint screening process as a primary means of detecting prohibited items. Items that TSA has prohibited passengers from bringing aboard an aircraft include, among other things, firearms and knives; gasoline and lighter fluid; disabling chemicals, including chlorine and liquid bleach; and many additional items that may be seemingly harmless but could be used as weapons. During the passenger screening process, transportation security officers follow standard operating procedures and utilize technology such as walk-through metal detectors and X-ray machines to detect prohibited items either on a passenger's person or in his or her carry-on luggage. The passenger checkpoint screening process is composed of the following three elements: * Transportation security officers (also known as TSOs) screen all passengers and their carry-on luggage prior to allowing passengers access to their departure gates. Among other responsibilities, transportation security officers attempt to detect prohibited items that passengers may try to carry beyond the security checkpoint. * Technology is used during the screening process, which primarily consists of walk-through metal detectors, X-ray machines, handheld metal detectors, and explosive trace detection (ETD) equipment.[Footnote 7] * Standard operating procedures establish the process and standards by which transportation security officers are to screen passengers and their carry-on items at screening checkpoints. The process of screening a passenger who continues to alarm the walk- through metal detector provides an example of how these three elements intersect. According to TSA's Screening Checkpoint Standard Operating Procedures manual, a passenger who continues to alarm the walk-through metal detector must be screened using a hand-wand search. Passengers may alternatively request a full-body pat-down search. The manual describes the process that transportation security officers are to follow during the additional screening, which includes the use of ETD swabbing and a pat-down of the passenger to detect any irregularities in their body contour that could represent concealed items. TSA Efforts to Improve the Passenger Screening Process: TSA faces a significant challenge in balancing security concerns with efficient passenger movement. In our April 2007 report, we described how TSA monitors transportation security officer compliance with passenger checkpoint screening procedures through its performance accountability and standards system and through testing.[Footnote 8] Compliance assessments include quarterly observations of transportation security officers' ability to perform particular screening functions in the operating environment, quarterly quizzes to assess their knowledge of procedures, and an annual knowledge and skills assessment. TSA conducts tests to evaluate, in part, the extent to which transportation security officers are able to detect simulated threat items hidden in accessible property or concealed on a person. TSA modifies its standard operating procedures based on the professional judgment of TSA senior- level officials and program-level staff, daily experiences of airport staff, complaints and concerns raised by the traveling public, and an analysis of risks to the aviation system. For example, in December 2005, TSA modified its prohibited items list to allow passengers to carry certain scissors and tools as long as they did not exceed a certain length. TSA's stated purpose in removing certain scissors and tools from the prohibited items list was to shift the focus of transportation security officers from items considered by TSA to pose a low threat to items considered to pose a high threat. Creating Functioning IED and IID Devices: Investigators found instructions on the Internet for creating both an IED and IID and purchased the components from the Internet and from a local store for approximately $150. The IED was conceived as a two-part device--a detonator component that, on its own, could function as an IED, and a mixture of fuel and oxidizer that would require the explosion of the detonator.[Footnote 9] Although the detonator component could be considered an IED, for the purposes of this report, we are referring to the combination of the detonator and the liquid explosive as a single IED. Information about liquid explosives was publicly available on several Web sites and discussed in media articles related to various terror plots, including the failed London subway bombing of July 21, 2005, and the transatlantic bomb plot of August 2006. In addition, we obtained information about creating an IID from the Internet. We also found videos on the Internet of the intense fire resulting from an IID. One of the components for the IID is a liquid that TSA prohibits passengers from bringing through security checkpoints. Specific details regarding the device components and the methods of concealment we used during our covert testing are classified by TSA; as such, they are not discussed in this testimony. A group of tests conducted in February 2006 and July 2007 show that the IED proposed for this investigation functions as intended.[Footnote 10] In 2006, within the scope of our original covert testing report, we worked with a law enforcement organization in the Washington, D.C., metro area to confirm that the detonator would function as an IED. A test performed by local law enforcement officials confirmed that the detonator would cause damage to an aircraft and threaten the safety of passengers. Because our proposed IED for this investigation was composed of two parts (the detonator and the liquid explosive), in July 2007 we sought assistance to confirm that this more complex IED would function as intended. Several tests conducted at a national laboratory demonstrated that this IED can function as intended, with the initial explosion by the detonator successfully causing the liquid explosive to detonate in several tests. Explosion data indicate that this device exploded with a force sufficient to cause severe damage to an aircraft. The IID is a far simpler device. Our work with a law enforcement organization in the Washington, D.C., metro area in February 2006 confirmed that the components of the IID (one of which is a liquid) could function as intended, causing damage to an aircraft and threatening the safety of passengers. Testing at 19 Airport Security Checkpoints: Our investigators devised methods that would allow them to conceal the prohibited components for these devices from transportation security officers. During this planning phase, they considered publicly advertised TSA policies related to liquids and other items, including prohibited items. They also judged that some components could be hidden in either their carry-on luggage or on their persons. They developed covert test procedures to challenge TSA screening measures using these components and methods. Specific details regarding the methods of concealment we used are classified by TSA; as such, these details are not discussed in this testimony. By using various concealment methods, our investigators demonstrated that it is possible to bring the components for several functioning IEDs and one functioning IID through checkpoints and onto airline flights without being challenged by transportation security officers. In most cases, transportation security officers appeared to follow TSA procedures and used technology appropriately; however, we uncovered weaknesses in TSA screening procedures and other vulnerabilities as a result of these tests. For example, although transportation security officers generally enforced TSA's 3-1-1 rule, we were able to bring a liquid component of the IID undetected through checkpoints by taking advantage of weaknesses we identified in TSA's policies based on a review of public information. TSA determined that specific details regarding these weaknesses are sensitive security information and are therefore not discussed in this testimony. We did not notice any difference between the performance of private screeners and transportation security officers during our tests. Covert Test Series One: From March 19 through March 23, 2007, two investigators tested the TSA checkpoint screening process at a number of U.S. airports. Transportation security officers did not interact with our investigators at every airport. Interactions that did occur included the following: * On March 19 and March 20, 2007, transportation security officers advised our investigators to use a 1-quart clear plastic bag rather than the larger bags they were using, but did not require them to do so before passing through the checkpoint. * Also at another airport, on March 23, 2007, a transportation security officer did not allow one investigator to bring a small, unlabeled bottle of medicated shampoo through the checkpoint. This was a legitimate toiletry item used by one of our investigators. The officer cited TSA policy and stated that since the bottle was not labeled, "it could contain acid." She did not allow our investigator to bring the unlabeled medicated shampoo bottle through the checkpoint. However, a liquid component of the IID--despite being prohibited by TSA--was allowed to pass undetected through the checkpoint. We had identified this weakness based on a review of public information before performing our tests. Covert Test Series Two: From May 7 through May 9, 2007, two investigators tested the TSA checkpoint screening process at a number of U.S. airports. Transportation security officers did not interact with our investigators aside from the following: * On May 8, 2007, one investigator deliberately placed coins in his pockets to ensure that he would receive a secondary inspection. The transportation security officer used a hand-wand and performed a pat- down search of our investigator. However, the transportation security officer did not detect any of the prohibited items our investigator brought through the checkpoint. Covert Test Series Three: From June 5 through June 8, 2007, two investigators tested the TSA checkpoint screening process at a number of U.S. airports. Transportation security officers did not interact with our investigators at every airport. Interactions that did occur included the following: * Inclement weather forced our investigators to change their flight plans at one airport. After changing their plans, they were selected for secondary inspection at the TSA security checkpoint. Transportation security officers performed pat-downs at the checkpoint. However, the transportation security officers did not detect any of the prohibited items our investigators brought through the checkpoint. Corrective Action Briefings: We briefed TSA officials on August 16, 2007, and September 5, 2007, to discuss our findings. Officials from TSA's Security Operations Office were present during our second briefing. At these briefings, we suggested that TSA consider how the results of our covert testing should affect its risk-based approach to airport security. This could include implementing one or more measures to reduce the likelihood that terrorists could successfully bring IED and IID components through checkpoints using a similar methodology to ours in the future. The specific nature of our suggestions to TSA is considered sensitive security information. Put generally, we suggested that, among other things, TSA (1) establish, depending on airport capacity, one or more special passenger screening lines to screen individuals based on risk and individuals with special needs; (2) introduce more aggressive, visible, and unpredictable deterrent measures into the passenger screening process at airports nationwide, to potentially include the implementation of enhanced individual search procedures (e.g., pat- downs and hand-wand screening) to detect concealed components; and (3) continue to develop and deploy new technology to be used at passenger screening checkpoints that would be able to better detect concealed components. TSA officials indicated that they did not disagree with our suggestions in principle and that they would examine them closely to determine whether and how they should be implemented. They acknowledged vulnerabilities in human capital, processes, and technology. They also indicated that they are deploying additional specialized personnel to enhance security at existing checkpoints and that they are exploring methods for enhancing transportation security officer training and transforming the culture of their workforce. Regarding standard operating procedures, officials said that they are continuously revisiting and revising their policies. They also indicated that they were moving forward to develop a "checkpoint of the future" that would incorporate new and emerging technology to address terror threats. Such technology could include innovative imaging techniques. Conclusion: Our tests clearly demonstrate that a terrorist group, using publicly available information and few resources, could cause severe damage to an airplane and threaten the safety of passengers by bringing prohibited IED and IID components through security checkpoints. Given our degree of success, we are confident that our investigators would have been able to evade transportation security officers at additional airports had we decided to test them. We understand the challenges TSA faces in balancing security risks with the efficient movement of passengers; however, from a strict security standpoint, current policies allowing substantial carry-on luggage and related items through TSA checkpoints increases the risk of a terrorist successfully bringing an IED, an IID, or both onto an aircraft undetected. Even if current carry-on luggage policies are left unchanged, our testing shows that risks can be reduced through improvements in human capital, improved processes, and continued advances in technology. GAO is currently performing a more systematic review of these issues and expects to issue a comprehensive public report with recommendations for TSA in early 2008. Mr. Chairman and Members of the committee, this concludes our statement. We would be pleased to answer any questions that you or other members of the committee may have at this time. GAO Contacts: For further information about this testimony, please contact Gregory D. Kutz at (202) 512-6722 or kutzg@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this testimony. [End of section] Footnotes: [1] Our March 2006 report is classified, but TSA has authorized this limited discussion. [2] An IED is an apparatus or contraption placed or fabricated without detailed manufacturing that incorporates destructive, lethal, noxious, pyrotechnic, or incendiary chemicals and is designed to destroy, incapacitate, or distract through high-speed projectiles and overpressure. [3] Specific details about which airports employed private screeners as opposed to transportation security officers are considered sensitive security information and are not included in this testimony. Therefore, the term transportation security officer is used throughout this testimony, but may, in some cases, also refer to private screeners that we tested. [4] A IID is an apparatus or contraption placed or fabricated without detailed manufacturing that incorporates destructive, lethal, noxious, pyrotechnic, or incendiary chemicals and is designed to destroy, incapacitate, or distract by creating intense heat or fire. [5] 49 C.F.R. §§ 1542.101, 1540.107, and 1540.111. [6] GAO, Aviation Security: Risk, Experience, and Customer Concerns Drive Changes to Airline Passenger Screening Procedures, but Evaluation and Documentation of Proposed Changes Could Be Improved, GAO-07-634 (Washington, D.C.: Apr. 16, 2007). [7] ETD works by detecting explosive vapors and residue. Human operators collect samples by rubbing swabs along an object, such as a carry-on suitcase. They then place the swabs in an ETD machine. The ETD machine chemically analyzes the swab to identify traces of explosive materials. [8] GAO-07-634. [9] Many chemical explosives consist of a mixture of oxidizer and fuel. When heat is added to the mixture, an explosion occurs. [10] This testimony was revised on November 16, 2007, to include a link to digital video. This digital video shows test footage of the IEDs and IID that GAO investigators successfully brought through airport security checkpoints. The video was shot during the 2006 and 2007 tests: [hyperlink, http://www.gao.gov/media/video/gao-08-48t/]. GAO's Mission: The Government Accountability Office, the audit, evaluation, and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office: 441 G Street NW, Room LM: Washington, DC 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Gloria Jarmon, Managing Director, jarmong@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, DC 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office 441 G Street NW, Room 7149: Washington, DC 20548: