Skip to main content

Transportation Security: Comprehensive Risk Assessments and Stronger Internal Controls Needed to Help Inform TSA Resource Allocation

GAO-09-492 Published: Mar 27, 2009. Publicly Released: Apr 22, 2009.
Skip to Highlights

Highlights

The Department of Homeland Security (DHS) has called for using risk-informed approaches to help prioritize its investments, develop plans, and allocate resources in a way that balances security and commerce. Within DHS, the Transportation Security Administration (TSA) is responsible for making risk-informed investments to secure the transportation system. GAO evaluated to what extent TSA (1) implemented a risk management approach to inform the allocation of resources across the transportation sector and (2) followed internal control standards in its efforts to implement and use a risk management approach to inform resource allocation.

In conducting this work, GAO analyzed, among other things, DHS and TSA documents, such as TSA’s risk management methodology, and compared them to DHS’s risk management framework for infrastructure protection, compared TSA’s management activities to criteria in federal internal control standards, and interviewed DHS and TSA officials.

To promote effective use of risk management, GAO is recommending, among other things, that the Assistant Secretary, TSA, work with DHS to validate its risk management approach, conduct comprehensive risk assessments, and establish related internal controls. DHS concurred with all of our recommendations.

TSA has taken some actions but has not fully implemented a risk management approach to inform the allocation of resources across the transportation modes (aviation, mass transit, highway, freight rail, and pipeline). DHS’s risk management framework for infrastructure protection consists of six sequential steps that are used to systematically and comprehensively identify risk and establish risk-informed security priorities. TSA has taken some actions that the six steps require but has not conducted comprehensive risk assessments. For example, TSA collected information related to threat, vulnerability, and consequence within the transportation modes but has not conducted risk assessments that integrate these three components for each mode or the transportation sector as a whole. Identifying and prioritizing risk in this way is essential to efforts to allocate resources to address the highest priority risks. TSA developed an approach to prioritization based primarily on intelligence instead of comprehensive risk assessments. However, DHS has not reviewed or validated this methodology; thus, TSA lacks assurance that its approach provides the agency and DHS information needed to guide investment decisions to ensure resources are allocated to the highest risks. TSA also did not have a plan specifying the degree to which risk assessments are needed for the sector, the appropriate level of resources required to complete them, and time frames for completing its risk assessment efforts. Without a plan to identify the scope, resource requirements, and timeline for risk assessments, it will be difficult for TSA to ensure that it conducts timely and cost-effective risk assessments to inform resource allocation.

TSA has not followed federal internal control standards to assist it in implementing DHS’s risk management framework and informing resource allocation. Specifically, TSA lacked the following:

  • An organizational structure that allows the agency to direct and control operations to achieve agency objectives. Although TSA officials acknowledged that a focal point for TSA’s risk management activities is needed, the agency has not yet established such a focal point.
  • Policies, procedures, and guidance to assist its offices in ensuring that DHS’s National Infrastructure Protection Plan (NIPP) risk management framework and related activities, such as risk assessments, are implemented as DHS and TSA intended for the transportation sector and its individual modes.
  • A mechanism to monitor the quality of performance. While TSA reports to DHS on the implementation of its risk management activities, it did not discuss all of the steps necessary to implement DHS’s risk management framework, such as the status of efforts taken to complete risk assessment activities including threat, vulnerability, and consequence assessments.

Without effectively implementing such controls, TSA cannot provide reasonable assurance that its resources are being used effectively and efficiently to achieve security priorities and that accountability and oversight regarding the quality of risk management activities implemented exists.

Recommendations

Recommendations for Executive Action

Agency Affected Recommendation Status
Transportation Security Administration To promote the effective use of risk management at TSA, and to help provide assurances that resources are allocated to the highest priority risks across the transportation sector, the Assistant Secretary of TSA should better ensure that its risk management approach includes (1) adopting security goals that define specific outcomes, conditions, end points, and performance targets; and (2) conducting comprehensive risk assessments for the transportation sector that meet the NIPP criteria and combine individual assessments of threat, vulnerability, and consequence and analyzing these assessments to produce a comparative analysis of risk across the entire transportation sector to guide current and future investment decisions.
Closed – Implemented
In March 2009, we reported that the Transportation Security Administration (TSA) had taken some actions to implement a risk management approach, including conducting assessments of threat, vulnerability, and consequence within the major transportation modes, but it had not conducted comprehensive risk assessments that integrate these three components for each mode or the transportation sector as a whole, as called for by the National Infrastructure Protection Plan (NIPP) and the Transportation Systems Sector-Specific Plan (TSSP). We recommended that TSA conduct risk assessments that combine threat, vulnerability, and consequence to help the agency produce a comparative analysis of risk...
Transportation Security Administration To promote the effective use of risk management at TSA, the Assistant Secretary of TSA should establish an approach for gathering data on state and private sector security partners' investments in transportation security.
Closed – Not Implemented
In March 2009, we reported that the Transportation Security Administration's (TSA) annual report included information on federal spending but not on investments made by states or private sector security partners, making it difficult for TSA to avoid potentially redundant efforts in transportation security and to identify security gaps within the transportation sector that have not been addressed by federal, private sector, or state security investments. While TSA communicated with its partners through its government coordinating council (GCC) and modal sector coordinating councils (SCC), TSA did not use the GCC and SCCs to help identify these private and state transportation security...
Transportation Security Administration To promote the effective use of risk management at TSA, the Assistant Secretary of TSA should establish a plan and milestones for conducting risk assessments for the transportation sector that identify the scope of the assessments and resource requirements for completing them.
Closed – Implemented
In March 2009, we reported that Transportation Security Administration (TSA) officials told us that the agency uses an intelligence-driven approach to risk management to guide strategic investment decisions across the transportation sector because of concerns about the high cost of implementing the National Infrastructure Protection Plan's (NIPP) risk management framework and the methodological limitations of this approach. TSA officials cited that it is costly and time consuming to follow the NIPP's risk management framework - particularly in conducting comprehensive vulnerability and consequence assessments. However, TSA officials were not able to provide estimates of the time and...
Transportation Security Administration To promote the effective use of risk management at TSA, the Assistant Secretary of TSA should work with DHS to validate its risk management approach by establishing a plan and time frame for assessing the appropriateness of TSA's intelligence-driven risk management approach for managing risk at TSA and document the results of this review once completed.
Closed – Implemented
In March 2009, we reported that the Transportation Security Administration (TSA) had not worked with the Department of Homeland Security (DHS) to validate its risk management approach and therefore TSA lacked assurance that its approach would provide the agency and DHS information needed to guide investment decisions to ensure resources are allocated to the highest risks. We recommended that they establish a plan and time frame for assessing the appropriateness of TSA's intelligence-driven risk management approach. In July 2010, TSA officials stated that the agency worked with the National Protection and Programs Directorate's (NPPD) Office of Risk Management and Analysis during the...
Transportation Security Administration To promote the effective use of risk management at TSA, the Assistant Secretary of TSA should work with the Director of National Intelligence to determine the best approach for assigning uncertainty or confidence levels to analytic intelligence products and apply this approach to intelligence products.
Closed – Implemented
In March 2009, we reported that Transportation Security Administration (TSA) officials did not assign uncertainty or confidence levels to the intelligence information TSA used to identify threats and guide long-range planning and strategic investment, and recommended that TSA work with the Office of the Director of National Intelligence (ODNI) to determine the best approach for assigning uncertainty or confidence levels to analytic intelligence products and apply this approach to intelligence products. As part of its Transportation Sector Security Risk Assessment (TSSRA) effort, TSA officials stated in August 2009 that they were independently reviewing criteria that other intelligence...
Transportation Security Administration To promote the effective use of risk management at TSA, the Assistant Secretary of TSA should establish internal controls, including (1) a focal point and clearly defined roles and responsibilities for ensuring the risk management framework is implemented; (2) policies, procedures, and guidance that require the implementation of its framework and completion of related work activities; and (3) a system to monitor and improve how effectively the framework is being implemented.
Closed – Implemented
In March 2009, we reported that the Transportation Security Administration (TSA) could strengthen its internal controls to help implement the National Infrastructure Protection Plan's (NIPP) risk management framework. We recommended that they establish internal controls, including an organizational structure with a focal point and clearly defined roles and responsibilities to organize TSA's efforts to implement the framework; policies, procedures and guidance that require the use of the NIPP's risk management framework; and a mechanism to monitor the implementation of the NIPP's risk management framework to help ensure that results are achieved and performance improved. TSA established...

Full Report

Media Inquiries

Sarah Kaczmarek
Managing Director
Office of Public Affairs

Public Inquiries

Topics

Agency missionsClassified defense informationComputer securityCost analysisCost effectiveness analysisCritical infrastructureCritical infrastructure protectionEmergency preparednessHomeland securityInternal controlsQuality assuranceReporting requirementsRisk assessmentRisk managementSecurity assessmentsStrategic planningSystems analysisTerrorismTransportation industryTransportation planningTransportation safetyTransportation security