Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Security Protection: Standardization Issues Regarding Protection of Executive Branch Officials, Statement of Bernard L. Ungar, Director, Government Business Operations Issues, General Government Division and Robert H. Hast, Acting Assistant Comptroller General for Special Investigations, Testimony before the Subcommittee on Criminal Justice Oversight, Committee on the Judiciary, U.S. Senate
From fiscal years 1997 through 1999, 42 executive branch positions at 31 executive branch agencies--including all 14 Cabinet secretaries, four deputy or under secretaries, and 24 other high-ranking officials (mainly heads of agencies)--had security protection. Personnel from 27 different agencies protected them: 36 officials by their own agencies or departments and six from other agencies or departments, such as the Secret Service and the Marshals Service. Most agencies favored establishing a repository of protective intelligence to facilitate sharing of threat information about their officials. Also, agencies reported that their protective personnel received different amounts of protection training and from different sources. Most agencies opposed centralizing security protection under one agency. No single agency or official is responsible for handling issues relating to routine protection of executive branch officials. This fragmentation has serious implications because 14 of the protected officials are in the line of presidential succession. Moreover, the lack of thorough threat assessments documenting the level of protection needed makes it difficult to determine the basis for and reasonableness of protection being given. This testimony summarizes the July 2000 report, GAO/GGD/OSI-00-139.
United States. General Accounting Office
2000-07-27
-
Nonproliferation: Strategy Needed to Strengthen Multilateral Export Control Regimes
Multilateral export control regimes are consensus-based, voluntary arrangements of supplier countries that produce technologies useful in developing weapons of mass destruction or conventional weapons. GAO found weaknesses that impede the ability of the multilateral export control regimes to achieve their nonproliferation goals. The regimes cannot effectively limit or monitor efforts by countries of concern to acquire sensitive technology without more complete and timely reporting of licensing information and without information on when and how members adopt and implement agreed-upon export controls. The United
States seeks to improve the effectiveness of these regimes. GAO was asked to (1) assess weaknesses of the four regimes and (2) identify obstacles faced in
trying to strengthen them.
United States. General Accounting Office
2002-10-25
-
Coast Guard: Strategy Needed for Setting and Monitoring Levels of Effort for All Missions, Report to the Subcommittee on Oceans, Atmosphere, and Fisheries, Committee on Commerce, Science, and Transportation, U.S. Senate
The September 11th attacks affected the scope of activities of many federal agencies, including the Coast Guard. Homeland security, a long-standing but
relatively small part of the Coast Guard's duties, took center stage. Still, the Coast Guard remains responsible for many other missions, such as helping stem the flow of drugs and illegal migration, protecting important fishing
grounds, and responding to marine pollution. GAO was asked to review the Coast Guard's current efforts and future plans for balancing resource levels among its
many missions.
United States. General Accounting Office
2002-11-12
-
Chemical Weapons: Organization for the Prohibition of Chemical Weapons Needs Comprehensive Plan to Correct Budgeting Weaknesses. Report to the Ranking Minority Member, Committee on Foreign Relations, U.S. Senate
The Organization for the Prohibition of Chemical Weapons (OPCW) is responsible for implementing the Chemical Weapons Convention, which bans the use of chemical weapons and requires their elimination. In this report, GAO assessed the accuracy of the organization's budget and the impact of budget shortfalls on program activities. GAO also reviewed efforts to improve the organization's budget planning. Since its establishment in 1997, the ability of the Organization for the Prohibition of Chemical Weapons (OPCW) to carry out key inspection functions has been hindered by inaccurate budget projections and, more recently, budget deficits. Its budgets have recorded as income nearly $1 million in unpaid assessments owed by 30 member states. The budgets have also overestimated reimbursement payments for inspections conducted in member states with chemical weapons-related facilities. Weak budgeting practices and budget deficits have affected the organization's ability to perform inspection activities as mandated by the Chemical Weapons Convention. The organization had to reduce the number of inspections it conducted in 2001 and plans to reduce the number it conducts in 2002. Although the organization and the State Department have taken some steps to address the budget problems, the organization has not developed a comprehensive plan to overcome its inherent budgeting weaknesses. Unless the organization improves its planning, GAO believes budget shortfalls will continue to affect its ability to conduct inspections. Furthermore, the GAO recommends that the Secretary of State should: (1) work with the organization to develop a comprehensive plan to improve budget projections and income collection, and (2) report annually to Congress on the organization's progress in correcting its budgeting weaknesses.
United States. General Accounting Office
2002-10-24
-
Combating Terrorism: Actions Needed to Guide Services' Antiterrorism Efforts at Installations, Report to the Chairman, Special Oversight Panel on Terrorism, Committee on Armed Services, House of Representatives
After the September 11, 2001, terrorist attacks, domestic military installations increased their antiterrorism measures to their highest levels. These measures were reduced in the weeks following the attacks, but because of the persistent nature of the threat, the antiterrorism posture at domestic installations remains at a higher than normal level more than 1 year later. The Department of Defense's (DOD) budget request for fiscal year 2003 includes more than $10 billion for combating terrorism activities, which includes a substantial increase in funding for antiterrorism measures to safeguard personnel and strategic issues. The commands do not always require documentation of the assessments, and they do not periodically evaluate the assessment methodology used at each installation to determine the thoroughness of the analysis or the consistency with required assessment methodology.
United States. General Accounting Office
2002-11-01
-
Homeland Security: Department of Justice's Response to Its Congressional Mandate to Assess and Report on Chemical Industry Vulnerabilities
Congress passed the Chemical Safety Information, Site Security and Fuels Regulatory Relief Act after a number of testimonies expressing concerns about the vulnerability of chemical facilities to criminal and terrorist attacks. According to the Attorney General's interim report, chemical facilities visited generally had safety and emergency response measures that could mitigate the consequences of a terrorist attack. The interim report also contains nine preliminary findings that cumulatively address the other required reporting elements--the vulnerability of facilities to criminal and terrorist activity, current industry site security practices, and the security of chemicals being transported. These findings address the extent to which 11 facilities conducted facility security assessments, had the capability to respond to armed attacks, conducted emergency response exercises, conducted routine pre-employment background investigations, had secure process control systems, had secure chemical transportation containers, had adequate security measures over transportation of hazardous chemicals, received meaningful threat information, and had effective facility security systems.
United States. General Accounting Office
2002-10-10
-
Combating Terrorism: Selected Challenges and Related Recommendations, Report to Congressional Committees
As concerns about terrorism have grown, Executive Branch responsibilities and authorities have received greater attention, which led to the 1998 appointment of a national coordinator in the National Security Council. The President recently requested that the Vice President oversee a coordinated national effort to improve national preparedness, including efforts to combat terrorism.
Federal efforts to develop a national strategy to combat terrorism and related guidance have progressed, but key efforts remain incomplete. The first step toward developing a national strategy is to conduct a national threat and risk assessment. The Department of Justice and the Federal Bureau of Investigation have collaborated on such an assessment, but they have not formally coordinated with other departments and agencies on this task. Under current policy, the federal government also has improved its capabilities to respond to a domestic terrorist incident. The Federal Bureau of Investigation and the Federal Emergency Management Agency are tasked with leading federal efforts in their respective roles for managing a terrorist crisis and the consequences of an incident. Federal assistance to state and local governments to prepare for terrorist incidents has resulted in training for thousands of first responders--those state and local officials who would first respond at the scene of an incident. To protect computer systems and the critical operations and infrastructures they support, various efforts have been undertaken to implement a national strategy outlined in Presidential Decision Directive 63. Specifically, federal agencies have taken initial steps to develop critical infrastructure protection plans, but independent audits continue to identify persistent, significant information security weaknesses that place federal operations at high risk of tampering and disruption.
United States. General Accounting Office
2001-09-20
-
Critical Infrastructure Protection: Significant Challenges in Protecting Federal Systems and Developing Analysis and Warning Capabilities, Statement of Joel C. Willemssen, Managing Director, Information Technology Issues, Testimony before the Committee on Governmental Affairs, U.S. Senate
Federal computer systems are riddled with weaknesses that continue to put critical operations and assets at risk. New information security provisions introduced by Congress will be a major catalyst for federal agencies to improve their security program management. To help maintain the momentum that the new information security reform provisions have generated, federal agencies must act quickly to implement strong security program management. A key element of the strategy outlined in Presidential Decision Directive (PDD) 63 was establishing the National Infrastructure Protection Center as "a national focal point" for gathering information on threats and facilitating the federal government's response to computer-based incidents. The center has begun critical infrastructure protection efforts to establish a foundation for future governmentwide efforts. However, the analytical and information-sharing capabilities that PDD 63 asserts are needed to protect the nation's critical infrastructures have not yet been achieved.
United States. General Accounting Office
2001-09-12
-
Aviation Security: Vulnerabilities and Potential Improvements for the Air Cargo System, Report to Congressional Requesters
U.S. air carriers transport billions of tons of cargo each year in both passenger planes and all-cargo planes. Typically, about one-half of the hull of each passenger aircraft is filled with cargo. As a result, any vulnerabilities in the air cargo security system potentially threaten the entire air transport system. GAO agreed to determine the security vulnerabilities that have been identified in the air cargo system, the status of key recommendations that have been made since 1990 to improve air cargo security, and ways in which air cargo security can be improved in the near-and long-term.
Numerous government and industry studies have identified vulnerabilities in the air cargo system. These vulnerabilities occur in the security procedures of some air carriers and freight forwarders and in possible tampering with freight at various handoffs that occur from the point when cargo leaves a shipper to the point when it is loaded onto an aircraft. As a result, any weaknesses in this program could create security risks. FAA or the Transportation Security Administration (TSA), which now has responsibility for ensuring air cargo security, has implemented a number of key recommendations and mandates to improve air cargo security made since 1990 by numerous government organizations. For example, FAA and the air cargo industry developed security training guides for air carriers and ground personnel who handle air cargo. However, a few recommendations by those groups, such as conducting research and operational tests of technology to screen cargo for explosives, are ongoing and not yet completed by TSA, or have not been implemented. Federal reports, industry groups, and security experts have identified operational and technological measures that have the potential to improve air cargo security in the near-term. Examples of the measures include checking the identity of individuals making cargo deliveries and implementing a computerized cargo profiling system. In addition, long-term improvements, such as developing a comprehensive cargo-security plan, have been recommended by the above sources, but not implemented by TSA. Each potential improvement measure, however, needs to be weighed against other issues, such as costs and the effects on the flow of cargo. Without a comprehensive plan that incorporates a risk management approach and sets deadlines and performance targets, TSA and other federal decisionmakers cannot know whether resources are being deployed as effectively and efficiently as possible in implementing measures to reduce the risk and mitigate the consequences of a terrorist attack.
United States. General Accounting Office
2002-12-20
-
Information Security: Code Red, Code Red II, and SirCam Attacks Highlight Need for Proactive Measures, Statement of Keith A. Rhodes, Chief Technologist, Testimony before the Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations, Committee on Government Reform, House of Representatives
Organizations and individuals have recently had to contend with particularly vexing computer attacks. The most notable is Code Red, but potentially more damaging are Code Red II and SirCam. Together, these attacks have infected millions of computer users, shut down websites, slowed Internet service, and disrupted businesses and government operations. They have already caused billions of dollars of damage, and their full effects have yet to be completely assessed. Code Red and Code Red II are both "worms," which are attacks that propagate themselves through networks without any user intervention or interaction. Both take advantage of a flaw in a component of versions 4.0 and 5.0 of Microsoft's Internet Information Services Web server software. SirCam is a malicious computer virus that spreads primarily through E-mail. Once activated on an infected computer, the virus searches through a select folder and mails user files acting as a "Trojan horse" to E-mail addresses in the user's address book. In addition to spreading, the virus can delete a victim's hard drive or fill the remaining free space on the hard drive, making it impossible to save files or print. On July 19, 2001, the Code Red worm infected more than 250,000 systems in just nine hours, causing more than $2.4 billion in economic losses. SirCam is allegedly responsible for the leaking of secret documents from the Ukrainian government. U.S. government agencies do not have an effective information security program to prevent and respond to these attacks and often lack effective access controls to their computer resources and consequently cannot protect these assets against unauthorized modification, loss, and disclosure. However, several agencies have taken significant steps to redesign and strengthen their information security programs. Also, Congress recently enacted legislation to provide a comprehensive framework for establishing and ensuring the effectiveness of information security controls over information resources that support federal operations and assets.
United States. General Accounting Office
2001-08-29
-
Homeland Security: A Framework for Addressing the Nation's Efforts, Statement of David M. Walker, Comptroller General of the United States, Testimony before the Senate Committee on Governmental Affairs
The United States now faces increasingly diverse threats that put great destructive power into the hands of small states, groups, and individuals. These threats range from cyber attacks on critical infrastructure to terrorist incidents involving weapons of mass destruction or infectious diseases. Efforts to combat this threat will involve federal agencies as well as state and local governments, the private sector, and private citizens. GAO believes that the federal government must address three fundamental needs. First, the government needs clearly defined and effective leadership with a clear vision carry out and implement a homeland security strategy and the ability to marshal the necessary resources to get the job done. Second, a national homeland security strategy should be based on a comprehensive assessment of national threats and risks. Third, the many organizations that will be involved in homeland security must have clearly articulated roles, responsibilities, and accountability mechanisms. Any strategy for homeland security must reduce risk where possible, assess the nation's vulnerabilities, and identify the critical infrastructure most in need of protection. To be comprehensive, the strategy should include steps to use intelligence assets or other means to identify attackers and prevent attacks before they occur, harden potential targets to minimize the damage from an attack, and effectively manage the consequences of an incident.
United States. General Accounting Office
2001-09-21
-
Aviation Security: Terrorist Acts Demonstrate Urgent Need to Improve Security at the Nation's Airports, Statement of Gerald L. Dillingham, Director, Physical Infrastructure Issues, Testimony before the Committee on Commerce, Science, and Transportation, U.S. Senate
A safe and secure civil aviation system is a critical component of the nation's overall security, physical infrastructure, and economic foundation. Billions of dollars and myriad programs and policies have been devoted to achieving such a system. Although it is not fully known at this time what actually occurred or what all the weaknesses in the nation's aviation security apparatus are that contributed to the horrendous events on September 11, 2001, it is clear that serious weaknesses exist in our aviation security system and that their impact can be far more devastating than previously imagined. As reported last year, GAO's review of the Federal Aviation Administration's (FAA) oversight of air traffic control (ATC) computer systems showed that FAA had not followed some critical aspects of its own security requirements. Specifically, FAA had not ensured that ATC buildings and facilities were secure, that the systems themselves were protected, and that the contractors who access these systems had undergone background checks. Controls for limiting access to secure areas, including aircraft, have not always worked as intended. GAO's special agents used fictitious law enforcement badges and credentials to gain access to secure areas, bypass security checkpoints at two airports, and walk unescorted to aircraft departure gates. Tests of screeners revealed significant weaknesses as measured in their ability to detect threat objects located on passengers or contained in their carry-on luggage. Screening operations in Belgium, Canada, France, the Netherlands, and the United Kingdom--countries whose systems GAO has examined--differ from this country's in some significant ways. Their screening operations require more extensive qualifications and training for screeners, include higher pay and better benefits, and often include different screening techniques, such as "pat-downs" of some passengers.
United States. General Accounting Office
2001-09-20
-
Aviation Security: Weaknesses in Airport Security and Options for Assigning Screening Responsibilities, Statement of Gerald L. Dillingham Director, Physical Infrastructure Issues, Testimony before the Subcommittee on Aviation, Committee on Transportation and Infrastructure, House of Representatives
A safe and secure civil aviation system is a critical component of the nation's overall security, physical infrastructure, and economic foundation. Billions of dollars and a myriad of programs and policies have been devoted to achieving such a system. Some key security issues include airport access controls, passenger and carry-on baggage screening, and alternatives to current screening practices, including practices in selected other countries. Controls for limiting access to secure areas, including aircraft, have not always worked as intended. In May of 2000, special agents used counterfeit law enforcement badges and credentials to gain access to secure areas at two airports, bypassing security checkpoints and walking unescorted to aircraft departure gates. In June 2000, testing of screeners showed that significant, long-standing weaknesses--measured by the screeners' abilities to detect threat objects located on passengers or contained in their carry-on luggage--continue to exist.
United States. General Accounting Office
2001-09-21
-
Terrorism and Drug Trafficking: Technologies for Detecting Explosives and Narcotics, Report to Congressional Requesters
Aviation security and drug interdiction depend on a complex and costly mix of intelligence, procedures, and technologies. Since 1978, federal agencies have spent about $246 million for research and development on explosives detection technologies and nearly $100 million on narcotics detection technologies. Most of this spending has taken place since 1990, in response to congressional directives, and have been for technologies to screen checked baggage, trucks, and containers. Difficult trade-offs must be made when considering whether to use detection technologies for a given application--chief among them the extent to which intelligence-gathering and procedures can substitute for expensive technology. Some technologies are very effective and could be deployed today, but they are expensive, slow the flow of commerce, and raise issues of worker safety. Other technologies are more widely used but are less reliable, while still others are in the development stage and may not be available for years. Some countries have already deployed advanced explosive and narcotics detection equipment, and the United States may be able to learn from their experiences. The Federal Aviation Administration estimates that use of the best available procedures and technologies to beef up aviation security could cost as much as $6 billion during the next 10 years--the equivalent of a $1.30 surcharge on a one-way ticket.
United States. General Accounting Office
1996-09-04
-
Information Security: Computer Attacks at Department of Defense Pose Increasing Risks, Statement of Jack L. Brock, Jr., Director Defense Information and Financial Management Systems Accounting and Information Management Division, Testimony Before the Permanent Subcommittee on Investigations, Committee on Governmental Affairs, U.S. Senate
Computer attacks at the Defense Department (DoD) pose increasing risks of access to highly sensitive information. Recent data suggest that DoD may have experienced as many as 250,000 attacks last year. These attacks are often successful, and the number of attacks is doubling each year as Internet use increases and hackers become more sophisticated. At a minimum, these attacks are a multimillion dollar nuisance to the Pentagon. At worst, they pose a serious threat to national security. Attackers have seized control of entire DoD systems, some of which control critical functions, such as weapons system research and development, logistics, and finance. Attackers have also stolen, modified, and destroyed data and software. The potential for catastrophic damage is great. The DoD is taking steps to address this growing problem but faces major challenges in controlling unauthorized access to its computer systems. Moreover, the DoD is now trying to react to successful attacks as it learns of them, but it has no uniform policy for assessing risks, protecting its systems, responding to incidents, or assessing damage. Training of users and system and network administrators is haphazard and constrained by limited resources. Technical solutions, such as firewalls, smart cards, and network monitoring systems, should help, but their success depends on whether DoD implements them in tandem with better policy and personnel measures.
United States. General Accounting Office
1996-05-22
-
Chemical and Biological Defense: DoD Needs to Clarify Expectations in Medical Readiness, Report to the Chairman, Subcommittee on National Security, Veterans Affairs, and International Relations, Committee on Government Reform, House of Representatives
Public assessments by Department of Defense (DoD) officials have emphasized the seriousness of the military threat from chemical and biological (CB) weapons. However, neither DoD nor the services have systematically examined the adequacy of the current specialty mix of medical personnel for CB defense. Although some of the services have begun to review the adequacy of staffing of deployable medical units that would manage the consequences of chemical warfare scenarios, they have not done so for biological warfare scenarios. Joint protocols for treating CB casualties have recently been completed, but the services have not yet agreed on which health care providers should provide treatment. Relatively few military health care providers are trained to a standard of proficiency in providing care to CB casualties. The service surgeons general have begun integrating chemical and a few biological scenarios into their medical exercises, but no realistic field exercise of medical support for CB warfare had been concluded. DOD and the services have not fully addressed weaknesses and gaps in modeling, planning, training, tracking, or proficiency testing for the treatment of CB casualties. The resulting medical structure has not been rigorously tested for its capacity to deliver the required medical support. As a result, medical readiness for CB scenarios cannot be ensured.
United States. General Accounting Office
2001-10-19
-
Homeland Security: Challenges and Strategies in Addressing Short- and Long-Term National Needs, Statement of David M. Walker, Comptroller General of the United States, Testimony before the Committee on the Budget, House of Representatives
The United States now confronts a range of diffuse threats that put increased destructive power into the hands of small states, groups, and individuals. These threats include terrorist attacks on critical infrastructure and computer systems, the potential use of weapons of mass destruction, and the spread of infectious diseases. Addressing these challenges will require leadership to develop and implement a homeland security strategy in coordination with all relevant partners, and to marshal and direct the necessary resources. The recent establishment of the Office of Homeland Security is a good first step, but questions remain about how this office will be structured, what authority its Director will have, and how this effort can be institutionalized and sustained over time. Although homeland security is an urgent and vital national priority, the United States still must address short-term and long-term fiscal challenges that were present before September 11.
United States. General Accounting Office
2001-11-07
-
Combating Terrorism: Considerations for Investing Resources in Chemical and Biological Preparedness: Statement of Henry L. Hinton, Jr., Managing Director, Defense Capabilities and Management, Testimony before the Committee on Governmental Affairs, U.S. Senate
Since the attacks against the World Trade Center and the Pentagon, the terrorist threat has risen to the top of the national agenda. Preparing for all possible contingencies is impractical, so a risk management approach should be used. This would include a threat assessment to determine which chemical or biological agents are of greatest concern. The federal government has various programs to prepare for and respond to chemical and biological terrorism, including response teams, support laboratories, training and equipment programs, and research efforts. Evaluations of chemical and biological preparedness have identified several problems and their solutions. Congress faces competing demands for spending as it seeks to invest resources to better prepare our nation for chemical and biological terrorism. Given the uncertainty of the chemical and biological threat, Congress may want to initially invest resources in efforts with broad applicability rather than in those that are applicable to a specific type of chemical or biological attack.
United States. General Accounting Office
2001-10-17
-
Homeland Security: Need to Consider VA's Role in Strengthening Federal Preparedness, Statement of Cynthia A. Bascetta Director, Health Care--Veterans' Health and Benefits Issues, Testimony before the Committee on Veterans' Affairs, House of Representatives
The Department of Veterans Affairs (VA) aims to provide backup medical resources to the military health system and local communities. VA supports federal agencies that provide lead responsibilities for responding to disasters, including terrorism. The areas of responsibility also include disaster simulation exercises and maintaining medical stockpiles. VA's efforts in these areas have enhanced national emergency preparedness by improving medical response procedures and by strengthening the security of federal pharmaceutical stockpiles to ensure rapid response to local authorities. VA has resources that could play a role in future federal homeland security efforts. Its assets include the bricks, mortar, and human capital components of its health care system; graduate medical education programs; and expertise involving emergency backup and support activities. In managing large-scale medical emergencies arising from terrorist attacks, VA's emergency response capabilities have strengths and weaknesses. Determining how VA can best contribute to homeland security is especially timely given the extraordinary level of federal activity underway to manage large-scale disasters.
United States. General Accounting Office
2001-10-15
-
Homeland Security: Key Elements of a Risk Management Approach, Statement of Raymond J. Decker, Director Defense Capabilities and Management, Testimony before the Subcommittee on International Security, Veterans Affairs, and International Relations, House Committee on Government Reform
Risk management is a systematic and analytical process that weighs the likelihood that a threat will endanger an asset, individual, or function and identifies actions to reduce the risk and mitigate the consequences of an attack. A good risk management approach includes the following three assessments: a threat, a vulnerability, and a criticality. After these assessments have been completed and evaluated, key steps can be taken to better prepare the United States against potential terrorist attacks. Threat assessments alone are insufficient to support the key judgments and decisions that must be made. However, along with vulnerability and criticality assessments, leaders and managers will make better decisions using this risk management approach. If the federal government were to apply this approach universally and if similar approaches were adopted by other segments of society, the United States could more effectively and efficiently prepare in-depth defenses against terrorist acts.
United States. General Accounting Office
2001-10-12
-
Combating Terrorism: Observations on Crosscutting Issues: Statement of Richard Davis, Director, National Security Analysis, National Security and International Affairs Division, before the Subcommittee on National Security, International Affairs and Criminal Justice, Committee on Government Reform and Oversight, House of Representatives
This Government Accounting Office (GAO) report addresses the foreign and domestic terrorism threat in the United States, and U.S. policy principles and strategies to combat terrorism. The United States, for example, spends billions of dollars each year to combat terrorism, with few guarantees that federal funds are being channeled to the right programs or in the right amounts. Threat and risk assessments could help better target these funds, set priorities, and avoid duplication of effort. The government needs improved coordination among federal, state, and local agencies. Disagreement exists in the intelligence and scientific communities over the nature of the terrorist threat, particularly the potential for terrorist incidents involving weapons of mass destruction. Although conventional explosives and firearms continue to be the weapons of choice for terrorists, the likelihood that they may use chemical and biological weapons may increase during the coming decade, according to intelligence agencies.
United States. General Accounting Office
Davis, Richard A., 1942-
1998-04-23
-
Weaponry: .50 Caliber Rifle Crime
Pursuant to a congressional request, GAO provided information on how .50 caliber semiautomatic rifles have been used in domestic and international criminal activity.
GAO noted that: (1) GAO's investigation revealed that .50 caliber semiautomatic rifles have been linked to domestic and international criminal activity; (2) GAO has established a nexus to terrorist groups, outlaw motorcycle gangs, international drug cartels, domestic drug dealers, religious cults, militia groups, potential assassins, and violent criminals; (3) the Bureau of Alcohol, Tobacco, and Firearms (ATF) routinely conducts gun traces for law enforcement agencies; (4) the fact that a trace has been conducted does not necessarily mean that the firearm was involved in criminal activity; (5) ATF provided GAO with a list of 30 firearm trace requests generated between November 1992 and March 1999 concerning .50 caliber rifles; (6) however, 2 of the requests were duplicates, leaving 28 separate weapons on which traces were conducted; (7) all of the traces involved Barrett .50 caliber rifles, of which 27 were the semiautomatic model 82A1; (8) one trace request appeared to involve a Barrett model 90, but efforts to develop additional information on this trace were unsuccessful; (9) of the 27 traces involving Barrett semiautomatic model 82A1 rifles, GAO found that 18 were associated with criminal activity and 3 were not associated with criminal activity; (10) no determination could be made regarding 6 traces; (11) in some cases, GAO found that although the criminal activity involved more than one .50 caliber semiautomatic rifle, the law enforcement agency had initiated a trace on only one firearm; (12) GAO also developed information on two criminal cases involving .50 caliber semiautomatic rifles not reported in the ATF tracing information; and (13) the Barrett model 82A1 was the weapon identified in both cases.
United States. General Accounting Office
1999-08-04
-
Bioterrorism: Federal Research and Preparedness Activities, Report to Congressional Committees
The following Federal departments and agencies have been identified as responders to the public health and medical consequences of a bioterrorist attack on the civilian population: the Departments of Agriculture (USDA), Commerce, Defense (DOD), Energy (DOE), Health and Human Services (HHS), Justice (DOJ), Transportation (DOT), the Treasury, and Veterans Affairs (VA); the Environmental Protection Agency (EPA); and the Federal Emergency Management Agency (FEMA). Preparedness activities, for example, include (1) increasing federal, state, and local response capabilities; (2) developing response teams; (3) increasing the availability of medical treatments; (4) participating in and sponsoring exercises; (5) aiding victims; and (6) providing support at special events, such as presidential inaugurations and Olympic games. The coordination of federal terrorism research, preparedness, and response programs, however remain fragmented, which raises concern about the ability of states and localities to respond to a bioterrorist attack. In addition, issues include insufficient state and local planning and a lack of hospital participation in training on terrorism and emergency response planning.
United States. General Accounting Office
2001-09-28
-
Bioterrorism: Review of Public Health Preparedness Programs: Statement of Janet Heinrich Director, Health Care--Public Health Issues, Testimony before the Subcommittee on Oversight and Investigations, Committee on Energy and Commerce, House of Representatives
Research is currently being done to enable the rapid identification of
biological agents in a variety of settings; develop new or improved
vaccines, antibiotics, and antivirals to improve treatment and vaccination
for infectious diseases caused by biological agents; and develop and test
emergency response equipment such as respiratory and other personal
protective equipment. Federal agencies are developing interagency response plans, participating in various interagency work groups, and entering into formal agreements with each other to share resources and capabilities. The U.S. General Accounting Office (GAO), however, found that coordination of federal terrorism research, preparedness, and response programs is fragmented, which raises concerns about the ability of states and localities to respond to a bioterrorist attack. Issues include poor state and local planning and the lack of hospital participation in training on terrorism and emergency response planning. This report summarizes the September 2001 report (GAO-01-915).
United States. General Accounting Office
2001-10-10
-
Bioterrorism: Public Health and Medical Preparedness, Statement of Janet Heinrich, Director, Health Care--Public Health Issues, Testimony before the Subcommittee on Public Health, Committee on Health, Education, Labor, and Pensions, United States Senate
Twenty Federal departments and agencies have been identified as playing a role in responding to (and preparing for) the public health and medical consequences of a bioterrorist attack. The agencies have engaged in a number of efforts to coordinate activities, such as interagency work groups, on a formal and informal basis. Preparedness activities include (1) increasing federal, state, and local response capabilities; (2) developing response teams; (3) increasing the availability of medical treatments; (4) participating in and sponsoring exercises; (5) aiding victims; and (6) providing support at special events, such as presidential inaugurations and Olympic games. The US General Accounting Office (GAO) has found, however, that the coordination of Federal terrorism research, preparedness, and response programs is fragmented, which raises concern about the ability of states and localities to respond to a bioterrorist attack. Issues include poor state and local planning and the lack of hospital participation in training on terrorism and emergency response planning. This report summarizes the September 2001 report (GAO-01-915).
United States. General Accounting Office
2001-10-09
-
Bioterrorism: Coordination and Preparedness: Statement of Janet Heinrich Director, Health Care--Public Health Issues, Testimony before the Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations, Committee on Government Reform, House of Representatives
The U.S. General Accounting Office (GAO) has found that federal agencies are participating in research and preparedness activities, from improving the detection of biological agents to developing a national stockpile of pharmaceuticals to treat victims of disasters. Federal agencies coordinate these activities on a formal and informal basis; for example, interagency work groups facilitate the process. Despite the efforts, however, coordination between agencies remain fragmented. In addition, the GAO has found emerging concerns about the preparedness of state and local jurisdictions, including insufficient state and local planning for response to terrorist events, inadequate public health infrastructure, a lack of hospital participation in training on terrorism and emergency response planning, insufficient capabilities for treating mass casualties, and the timely availability of medical teams and resources in an emergency. This testimony summarizes the September 2001 report (GAO-01-915).
United States. General Accounting Office
2001-10-05
-
Terrorism and Drug Trafficking: Responsibilities for Developing Explosives and Narcotics Detection Technologies, Report to Congressional Requesters
The GAO examined how the U.S. government is organized to develop technologies for detecting explosives and narcotics. This report discusses (1) the roles, responsibilities, and authority of agencies that establish policy, provide funds or oversee funding requests, and develop explosives and narcotics detection technologies; (2) mechanisms used to coordinate the joint development of technologies; and (3) efforts to strengthen detection technology development. The FAA, Office of National Drug Control Policy, U.S. Customs Service, and DoD all play a part in the development of these detection technologies, however, the GAO found that these organization have yet to agree on standards for explosives detection systems, profiling and targeting systems, and deploying canine teams at airports. In addition, they have not agreed on how to resolve issues related to a joint-use strategy and liability. Moreover, key decisionmakers are not receiving periodic reports on efforts by the various government entities to develop and field explosives and narcotics detection technologies.
United States. General Accounting Office
1997-04-15
-
State Department: Efforts to Reduce Visa Fraud, Statement of Benjamin F. Nelson, Director, International Relations and Trade Issues, National Security and International Affairs Division, Testimony Before the Committee on the Judiciary, Subcommittee on Immigration and Claims, House of Representatives
At the time GAO issued its report in May 1996 (GAO/NSIAD-96-99), the State Department was attempting to make its visa-issuing process more efficient and less vulnerable to fraud by (1) issuing visas that were machine readable, (2) expanding automated name-check capability to all posts, (3) forming "lookout" committees to identify suspected terrorists and others ineligible for visas, and (4) strengthening compliance with management controls. Since then, the State Department's efforts to combat visa fraud at diplomatic posts by introducing a machine-readable visa system have been hampered by technical problems, a lack of cooperation from other government agencies, and weak management controls at many U.S. embassies.
United States. General Accounting Office
1997-05-20
-
Obstacles to U.S. Ability To Control and Track Weapons-Grade Uranium Supplied Abroad
Pursuant to a congressional request, GAO reviewed the ability of the United States to control and account for highly enriched, weapons-grade uranium supplied abroad. This report focuses on U.S. administrative controls, physical security reviews, international safeguards and the U.S. ability to keep track of exports of highly enriched uranium. Also addressed were U.S. efforts to develop a non-weapons-grade uranium fuel to be used as a substitute for highly enriched uranium.
The central computer system currently used by the Department of Energy (DOE) to track all U.S. highly enriched uranium exports to foreign countries is incomplete and inaccurate. Although DOE has been working to improve the information in the system, it has not used some readily available internal data. GAO believes that efforts to streamline and consolidate needed information are warranted. The United States attempts to regulate the exports of highly enriched uranium fuels with: (1) agreements for cooperation, (2) export licenses, and (3) subsequent arrangements made with other countries. To minimize the risks of having weapons-grade material accumulate abroad, DOE has the authority to accept returns of spent highly enriched uranium of U.S. origin from other nations. However, several factors relating to charges and shipping costs may be discouraging some nations from returning such fuel. The U.S. Government has become increasingly concerned with the physical security of highly enriched uranium due to the increase in terrorism. Current methods of conducting physical security reviews within nations receiving U.S. highly enriched uranium are inadequate due to the limitations placed on such reviews by foreign governments. However, officials stated that there is a growing effort to establish some universal safety standards. Nonproliferation efforts have centered around minimizing the use of highly enriched uranium by using a lower grade. GAO stated that a number of obstacles will have to be overcome if such a conversion is to occur.
United States. General Accounting Office
1982-08-02
-
Aviation Security: Registered Traveler Program Policy and Implementation Issues: Report to the Honorable Kay Bailey Hutchison, U.S. Senate
The aviation industry and business traveler groups have proposed the registered traveler concept as a way to reduce long waits in airport security lines caused by heightened security screening measures implemented after the September 11 terrorist attacks. The Aviation and Transportation Security Act of November 2001 allows the Transportation Security Administration (TSA) to consider developing a registered traveler program as a way to address these two issues. GAO completed this review to inform Congress and TSA of policy and implementation issues related to the concept of a registered traveler program. Under a variety of approaches related to the concept of a registered traveler program proposed by industry stakeholders, individuals who voluntarily provide personal background information and who clear background checks would be enrolled as registered travelers. Because these individuals would have been pre-screened through the program enrollment process, they would be entitled to expedited security screening procedures at the airport. Through a detailed literature review and interviews with stakeholders, GAO found that a registered traveler program is intended to reduce the inconvenience many travelers have experienced since September 11 and improve the quality and efficiency of airport security screening. Although GAO found support for this program among many stakeholders, GAO also found concerns that such a program could create new aviation security vulnerabilities.
United States. General Accounting Office
2002-11-22