This is the accessible text file for GAO report number GAO-02-474 
entitled 'Critical Infrastructure Protection: Federal Efforts Require a 
More Coordinated and Comprehensive Approach for Protecting Information 
Systems' which was released on July 15, 2002. 

This text file was formatted by the U.S. General Accounting Office 
(GAO) to be accessible to users with visual impairments, as part of a 
longer term project to improve GAO products’ accessibility. Every 
attempt has been made to maintain the structural and data integrity of 
the original printed product. Accessibility features, such as text 
descriptions of tables, consecutively numbered footnotes placed at the 
end of the file, and the text of agency comment letters, are provided 
but may not exactly duplicate the presentation or format of the printed 
version. The portable document format (PDF) file is an exact electronic 
replica of the printed version. We welcome your feedback. Please E-mail 
your comments regarding the contents or accessibility features of this 
document to Webmaster@gao.gov. 

Report to the Committee on Governmental Affairs, U.S. Senate: 

July 2002: 

Critical Infrastructure Protection: 

Federal Efforts Require a More Coordinated and Comprehensive Approach 
for Protecting Information Systems: 

GAO-02-474: 

Contents: 

Letter: 

Results in Brief: 

Background: 

At Least 50 Federal Organizations Derive Their Cyber CIP 
Responsibilities from a Variety of Sources: 

Relationships among Cyber CIP Organizations Are Not Consistently 
Established: 

CIP Funds Are Not Separately Appropriated for Most
Organizations, and Precise Levels of Spending Cannot Be Ascertained: 

Conclusions: 

Recommendation: 

Agency Comments and Our Evaluation: 

Appendixes: 

Appendix I: Objectives, Scope, and Methodology: 

Appendix II: Federal Organizations Involved in National or Multiagency
Cyber CIP Efforts: 

Federal Advisory Committees: 

Executive Office of the President: 

Chief Information Officers Council: 

National Communications System: 

Federal Communications Commission: 

U.S. Department of Commerce: 

U.S. Department of Defense: 

Director of Central Intelligence: 

U.S. Department of Energy: 

U.S. Department of Justice: 

U.S. Department of Transportation: 

Environmental Protection Agency: 

Federal Emergency Management Agency: 

U.S. General Services Administration: 

Department of Health and Human Services: 

National Science Foundation: 

U.S. Department of State: 

U.S. Department of the Treasury: 

Appendix III: Components of Executive Departments or Agencies and 
Their Primary Activities Related to Cyber CIP: 

Appendix IV: Comments from the Department of Justice: 

Appendix V: Comments from the Special Advisor to the President for
Cyberspace Security: 

Appendix VI: Comments from the Office of Science and Technology Policy: 

Appendix VII: Comments from the Federal Emergency Managament Agency: 

Appendix VIII: Comments from the Department of State: 

Appendix IX: GAO Contact and Staff Acknowledgements: 

GAO Contact: 

Acknowledgments: 

Tables: 

Table 1: Observed Threats to Critical Infrastructure: 

Table 2: Key Executive Orders, Presidential Decision Directives, Acts, 
and Directives That Mention Activities Related to Cyber CIP: 

Table 3: Office of Homeland Security Fiscal Year 2002 and 2003 CIP 
Funding: 

Table 4: Executive Department or Agency Components and Their Primary 
Activities Related to Cyber CIP: 

Figures: 

Figure 1: Information Security Incidents Reported to Carnegie-Mellon’s 

CERT®, Coordination Center: 1990-2001: 

Figure 2: Organizations with CIP Responsibilities as Outlined by PDD 63: 

Figure 3: Overview of National or Multiagency Federal Cyber CIP 
Organizations: 

Figure 4: Components of Executive Departments or Agencies and Their 
Primary Activities Related to Cyber CIP (as indicated by the Color-
Coded Legend Below): 

CIAO: Critical Infrastructure Assurance Office: 

CIP: critical infrastructure protection: 

DOD: Department of Defense: 

ECIE: Executive Council on Integrity and Efficiency : 

FBI: Federal Bureau of Investigation: 

FedCIRC: Federal Computer Incident Response Center: 

FEMA: Federal Emergency Management Agency: 

GSA: General Services Administration: 

ISAC: information sharing and analysis center: 

NIAC: National Infrastructure Assurance Council: 

NIPC: National Infrastructure Protection Center: 

NIST: National Institute of Standards and Technology: 

NSA: National Security Agency: 

OMB: Office of Management and Budget: 

OSTP: Office of Science and Technology Policy: 

PCIE: President’s Council on Integrity and Efficiency: 

PDD: Presidential Decision Directive: 

R&D: research and development: 

TSA: Transportation Security Administration: 

Letter: 

July 15, 2002: 

The Honorable Joseph I. Lieberman: 
Chairman: 
The Honorable Robert F. Bennett:  
Committee on Governmental Affairs: 
United States Senate: 

Since the early 1990s, an explosion in computer interconnectivity, most 
notably growth in the use of the Internet, has revolutionized the way 
that our government, nation, and much of the world communicate and 
conduct business. However, this widespread interconnectivity also poses 
enormous risks to our computer systems and, more importantly, to the 
critical operations and infrastructures they support, such as 
telecommunications, power distribution, national defense, law 
enforcement, and critical government services. Because potential 
adversaries--be they nation-states, cyber terrorist groups, criminal 
organizations, or disgruntled insiders--can develop cyber-attack 
capabilities to attempt to exploit these risks, it is essential that 
our critical infrastructures be adequately protected.
Concerns about computer-based vulnerabilities have been reported 
repeatedly during the 1990s. Since 1997--most recently in January 
2001--we, in reports to the Congress,[Footnote 1] have designated 
information security a governmentwide high-risk area. In addition, in 
its October 1997 report,[Footnote 2] the President’s Commission on 
Critical Infrastructure Protection described, from a national 
perspective, the potentially devastating implications of poor 
information security.

In May 1998, Presidential Decision Directive 63 was issued in response 
to the commission’s report. The directive called for a range of actions 
intended to improve federal agency security programs, establish a 
partnership between the government and the private sector, and improve 
the nation’s ability to detect and respond to serious computer-based 
attacks. Critical infrastructure protection (CIP) involves activities 
that enhance the security of our nation’s cyber and physical public and 
private infrastructures that are essential to national security, 
national economic security, and/or national public health and safety. 

On October 16, 2001, President Bush issued Executive Order 13231, 
“Critical Infrastructure Protection in the Information Age,” which 
continues many Presidential Decision Directive 63 activities by 
focusing on cyberthreats to critical infrastructures, and also created 
the President’s Critical Infrastructure Protection Board to coordinate 
federal cybersecurity efforts.

In response to your request, we reviewed federal organizations involved 
in national or multiagency cyber CIP activities. Specifically, our 
objectives were to (1) identify the federal civilian, defense, and 
intelligence organizations involved in protecting critical 
infrastructures from computer-based attacks, and their 
responsibilities, current organizational placement, and source of 
authority; (2) identify the organizations’ relationships with each 
other; and (3) determine appropriated CIP funds for each organization. 
As agreed with your staff, we concentrated on federal organizations 
identified in Presidential Decision Directive 63 or Executive Order 
13231 that have a national or multiagency cyber CIP focus and did not 
address organizations involved solely in CIP activities specific to 
their department or agency, such as the agencies’ critical 
infrastructure assurance offices. For example, although organizations 
such as the Federal Aviation Administration, the Centers for Disease 
Control, the Financial Management Service, and the National Weather 
Service are responsible for the security of critical cyber systems, 
they do not have national cyber CIP responsibilities outside their 
agencies. In addition, other information security organizations that 
receive federal funding were not included in our review. Further 
details on our objectives, scope, and methodology are provided in 
appendix I.

Results in Brief: 

At least 50 federal organizations are involved in national or 
multiagency cyber CIP activities that include setting policy, analyzing 
vulnerabilities and intelligence information, disseminating alerts and 
warnings on potential and actual infrastructure attacks, developing 
remediation plans, responding to incidents, and performing research and 
development. These organizations are primarily located within 13 major 
departments and agencies mentioned in Presidential Decision Directive 
63. In addition to most of these organizations’ noting that Directive 
63 and Executive Order 13231 were the primary sources dictating their 
current cyber CIP roles and responsibilities, many identified other 
preexisting laws, directives, and orders that levy related 
requirements. Nevertheless, current cyber CIP efforts do not 
specifically address all potentially relevant critical infrastructure 
sectors or federal agencies. For example, Directive 63 excludes some 
key infrastructure areas and their respective federal agencies, such as 
those associated with chemical manufacturing and food safety. The chair 
of the President’s Critical Infrastructure Protection Board, as well as 
officials from the Critical Infrastructure Assurance Office, 
acknowledged that our nation’s critical infrastructures are currently 
being redefined and could be expanded in view of the events of 
September 11, 2001. Such an effort is critical to ensuring that we are 
comprehensively addressing our nation’s critical infrastructures.
Although most organizations could identify their relationships with 
other key cyber CIP entities, relationships among all organizations 
performing similar activities (e.g., policy development or analysis and 
warning) were not consistently established. The President’s Critical 
Infrastructure Protection Board is intended to coordinate federal 
efforts and programs related to protecting critical infrastructures. 

However, an underlying challenge in this coordination is that a 
detailed strategy is still being developed. Without a strategy that 
identifies responsibilities and relationships for all cyber CIP 
efforts, our nation risks not knowing whether we have the appropriate 
structure to deal with the growing threat of computer-based attacks on 
its critical infrastructure. The President’s Critical Infrastructure 
Protection Board is currently developing a proposed national strategy 
in coordination with the private sector. It is essential that this 
strategy define the roles, responsibilities, and relationships among 
the various federal organizations involved in cyber CIP activities.

Most of the organizations in our review do not receive appropriations 
specifically designated for cyber CIP and, therefore, do not have a 
process to track these funds. A complicating factor in tracking funds 
spent on cyber CIP activities is that organizational totals often 
include funds spent on physical, cyber, and agency-specific CIP 
spending. A few selected organizations can readily identify their CIP 
funding since the majority, and in some cases all, of their operations 
are related to such activities. Overall, on the basis of agency input 
submitted to the Office of Management and Budget (OMB), the executive 
branch estimated that $3.9 billion was requested for CIP for fiscal 
year 2003. However, this total involves both physical and cyber CIP, 
and detailed breakdowns of these funds are not available. OMB plans to 
provide a more detailed breakdown in the future.

We are recommending that when developing the strategy to guide federal 
cyber CIP efforts, senior executive branch officials ensure that the 
strategy, among other things, includes all relevant sectors, defines 
the key federal agencies’ roles and responsibilities associated with 
each of these sectors, and defines the relationships among the key 
cyber CIP organizations.

In providing written comments on a draft of this report, the Department 
of Justice generally concurred with our findings and recommendations; 
the Special Advisor to the President for Cyberspace Security and the 
Department of State did not indicate whether they agreed or disagreed; 
the Federal Emergency Management Agency requested that we add an 
additional organization, and the Office of Science and Technology 
Policy (OSTP) disagreed with our statement that none of the R&D 
organizations coordinated with them. Specifically, on the basis of 
additional information the Federal Emergency Management Agency provided 
in an attachment, we added the Office of the Chief Information Officer 
and Information Technology Services Directorate and also incorporated 
additional technical comments, as appropriate. OSTP stated that it is 
inaccurate for us to imply that consultations are not occurring with 
the agencies with research and development (R&D); however, when we 
asked the R&D organizations who they coordinate with, none indicated 
that they coordinated with OSTP, nor did any of these organizations 
comment on this statement in our draft report that OSTP took exception 
to. We also received oral comments from nine agencies that have been 
incorporated into the report, as appropriate. Although the written and 
oral comments varied in scope and detail, they were primarily limited 
to technical comments on the description of their responsibilities 
described in appendix II. We have incorporated these changes in the 
report as appropriate. The Department of Transportation had no 
comments, and we did not receive comments from the Department of 
Commerce.

Background: 

The risks associated with our nation’s reliance on interconnected 
computer systems are substantial and varied. By launching attacks 
across a span of communications systems and computers, attackers can 
effectively disguise their identity, location, and intent, thereby 
making them difficult and time-consuming to trace. Such attacks could 
severely disrupt computer-supported operations, compromise the 
confidentiality of sensitive information, and diminish the integrity of 
critical data. A significant concern is that terrorists or hostile 
foreign states could launch computer-based attacks on critical systems 
to severely damage or disrupt national defense or other critical 
operations or steal sensitive data, resulting in harm to the public 
welfare. According to the National Security Agency (NSA), foreign 
governments already have or are developing computer attack 
capabilities, and potential adversaries are developing a body of 
knowledge about U.S. systems and about methods to attack these systems. 
The threat to these infrastructures was highlighted by the Special 
Advisor to the President for Cyberspace Security in a Senate briefing 
when he stated that although to date none of the traditional terrorists 
groups such as al Qaeda have used the Internet to launch a known 
assault on the U.S.’s infrastructure, information on computerized water 
systems was recently discovered on computers found in al Qaeda camps in 
Afghanistan. Table 1 summarizes the key threats to our critical 
infrastructures.

Table 1: Observed Threats to Critical Infrastructure: 

Threat: Criminal groups; 
Description: There is an increased use of cyber intrusions by criminal 
groups who attack systems for purposes of monetary gain.

Threat: Foreign intelligence services; 
Description: Foreign intelligence services use cyber tools as part of 
their information gathering and espionage activities. 

Threat: Hackers; 
Description: Hackers sometimes crack into networks for the thrill of 
the challenge or for bragging rights in the hacker community. While 
hacking once required a fair amount of skill or computer knowledge, 
hackers can now download attack scripts and protocols from the 
Internet and launch them against victim sites. Thus, while attack 
tools have become more sophisticated, they have also become easier to 
use.

Threat: Hacktivists; 
Description: Hacktivism refers to politically motivated attacks on 
publicly accessible Web pages or e-mail servers. These groups and 
individuals overload e-mail servers and hack into Web sites to send a 
political message.

Threat: Information warfare; 
Description: Several nations are aggressively working to develop 
information warfare doctrine, programs, and capabilities. Such 
capabilities enable a single entity to have a significant and serious 
impact by disrupting the supply, communications, and economic 
infrastructures that support military power--impacts that, according 
to the Director of Central Intelligence,[A] can affect the daily lives 
of Americans across the country.

Threat: Insider threat; 
Description: The disgruntled organization insider is a principal 
source of computer crimes. Insiders may not need a great deal of 
knowledge about computer intrusions because their knowledge of a 
victim system often allows them to gain unrestricted access to cause 
damage to the system or to steal system data.

Threat: Virus writers; 
Description: Virus writers are posing an increasingly serious threat. 
Several destructive computer viruses and “worms” have harmed files and 
hard drives, including the Melissa Macro, the CIH (Chernobyl), and 
Nimda viruses and the Explore.Zip and CodeRed worms.

[A] Prepared Statement of George J. Tenet, director of central 
intelligence, before the Senate Select Committee on Intelligence, 
February 2, 2000.

Source: Federal Bureau of Investigation.

[End of table]

The number of reported cyber-based incidents is increasing. Complete 
summary data are not available because many incidents are not reported. 
Nevertheless, the number of reported incidents handled by the 
Carnegie-Mellon University CERT®‚ Coordination Center[Footnote 3] 
continues to increase dramatically. For example, the number of 
incidents reported to the CERT®‚ Coordination Center during the first 
quarter of 2002 is more than half the number of incidents reported for 
all of 2001. Figure 1 shows the number of incidents reported to the 
CERT®‚ Coordination Center from 1990 through 2001.

Figure 1: Information Security Incidents Reported to Carnegie-Mellon’s 

CERT‚ Coordination Center: 1990-2001: 

[See PDF for image]

Source: Carnegie-Mellon’s CERT‚ Coordination Center.

[End of figure]

The events of September 11, 2001, underscore the need to protect 
America’s critical infrastructures against potentially disastrous 
cyberattacks--attacks that could also be coordinated to coincide with 
physical terrorist attacks to maximize the impact of both.
Critical Infrastructure Protection Policy Has Been Evolving Since the 
Mid-1990’s: 

Federal awareness of the importance of securing our nation’s cyber 
critical infrastructures, which underpin our society, economy, and 
national security, has been evolving since the mid-1990’s. Over the 
years, a variety of working groups have been formed, special reports 
written, federal policies issued, and organizations created to address 
the issues that have been raised. In June 1995, a Critical 
Infrastructure Working Group, led by the Attorney General, was formed 
to (1) identify critical infrastructures and assess the scope and 
nature of threats to them, (2) survey existing government mechanisms 
for addressing these threats, and (3) propose options for a full-time 
group to consider long-term government response to threats to critical 
infrastructures. The working group recommended creating a commission to 
further investigate the issues. In response to this recommendation, the 
President’s Commission on Critical Infrastructure Protection was 
established in July 1996 to study the nation’s vulnerabilities to both 
cyber and physical threats.

In October 1997, the President’s Commission issued its report, which 
described the potentially devastating implications of poor information 
security from a national perspective. The report recommended several 
measures to achieve a higher level of critical infrastructure 
protection, including infrastructure protection through industry 
cooperation and information sharing, a national organization structure, 
a revised program of research and development, a broad program of 
awareness and education, and reconsideration of laws related to 
infrastructure protection. The report stated that a comprehensive 
effort would need to “include a system of surveillance, assessment, 
early warning, and response mechanisms to mitigate the potential for 
cyberthreats.” It said that the Federal Bureau of Investigation (FBI) 
had already begun to develop warning and threat analysis capabilities 
and urged it to continue in these efforts. In addition, the report 
noted that the FBI could serve as the preliminary national warning 
center for infrastructure attacks and provide law enforcement, 
intelligence, and other information needed to ensure the highest 
quality analysis possible.

The President subsequently issued Presidential Decision Directive (PDD) 
63, in 1998, which describes a strategy for cooperative efforts by 
government and the private sector to protect critical, computer-
dependent operations. PDD 63 called for a range of actions intended to 
improve federal agency security programs, improve the nation’s ability 
to detect and respond to serious computer-based attacks, and establish 
a partnership between the government and the private sector. The 
directive called on the federal government to serve as a model of how 
infrastructure assurance is best achieved and designated lead agencies 
to work with private-sector and government organizations. Further, it 
established critical infrastructure protection as a national goal, and 
stated that, by the close of 2000, the United States was to have 
achieved an initial operating capability to protect the nation’s 
critical infrastructures from intentional destructive acts and, no 
later than 2003, an enhanced capability.

To accomplish its goals, PDD 63 designated and established 
organizations to provide central coordination and support, including: 

* the Critical Infrastructure Assurance Office (CIAO), an interagency 
office housed in the Department of Commerce, which was established to 
develop a national plan for CIP on the basis of infrastructure plans 
developed by the private sector and federal agencies;

* the National Infrastructure Protection Center (NIPC), an organization 
within the FBI, which was expanded to address national-level threat 
assessment, warning, vulnerability, and law enforcement investigation 
and response; and: 

* the National Infrastructure Assurance Council (NIAC), which was 
established to enhance the partnership of the public and private 
sectors in protecting our critical infrastructures.[Footnote 4]
To ensure coverage of critical sectors, PDD 63 also identified eight 
private-sector infrastructures and five special functions. The 
infrastructures are (1) information and communications; (2) banking and 
finance; (3) water supply; (4) aviation, highway, mass transit, 
pipelines, rail, and waterborne commerce; (5) emergency law 
enforcement; (6) emergency fire services and continuity of government; 
(7) electric power and oil and gas production and storage; and (8) 
public health services. The special functions are (1) law enforcement 
and internal security, (2) intelligence, (3) foreign affairs, (4) 
national defense, and (5) research and development. For each of the 
infrastuctures and functions, the directive designated lead federal 
agencies to work with their counterparts in the private-sector. For 
example, the Department of the Treasury is responsible for working with 
the banking and finance sector, and the Department of Energy is 
responsible for working with the electrical power industry. Similarly, 
regarding special function areas, the Department of Defense (DOD) is 
responsible for national defense, and the Department of State is 
responsible for foreign affairs.

To facilitate private-sector participation, PDD 63 also encouraged the 
creation of information sharing and analysis centers (ISAC) that could 
serve as mechanisms for gathering, analyzing, and appropriately 
sanitizing and disseminating information to and from infrastructure 
sectors and the federal government through the NIPC. In September 2001, 
we reported that six ISACs within five infrastructures had been 
established to gather and share information about vulnerabilities, 
attempted intrusions, and attacks within their respective 
infrastructures and to meet specific sector objectives.[Footnote 5] 

Three of the ISACs--for the telecommunications and electric power 
industries and emergency fire services segment--were based on groups 
that had existed previously. The other three--for the financial 
services, information technology, and emergency law enforcement 
sectors--had been established since October 1999. In addition, at that 
time, we reported that the formation of at least three more ISACs for 
various infrastructure sectors were being discussed. Figure 2 displays 
a high-level overview of the organizations with CIP responsibilities as 
outlined by PDD 63.

Figure 2: Organizations with CIP Responsibilities as Outlined by PDD 63: 

[See PDF for image]

Note: In February 2001, the Critical Infrastructure Coordination Group 
was replaced with the Information Infrastructure Protection and 
Assurance Group under the Policy Coordinating Committee on Counter-
terrorism and National Preparedness. In October 2001, the National 
Infrastructure Assurance Council was replaced with the National 
Infrastructure Advisory Council, and cyber CIP functions performed by 
the national coordinator were assigned to the chair of the President’s 
Critical Infrastructure Protection Board.

Source: CIAO.

[End of figure]

In response to PDD 63, in January 2000 the White House issued its 
“National Plan for Information Systems Protection.”[Footnote 6] The 
national plan provided a vision and framework for the federal 
government to prevent, detect, respond to, and protect the nation’s 
critical cyber-based infrastructure from attack and reduce existing 
vulnerabilities by complementing and focusing existing federal computer 
security and information technology requirements. Subsequent versions 
of the plan were expected to (1) define the roles of industry and state 
and local governments working in partnership with the federal 
government to protect privately owned physical and cyber-based 
infrastructures from deliberate attack and (2) examine the 
international aspects of CIP.

The most recent federal cyber CIP guidance was issued in October 2001, 
when President Bush signed Executive Order 13231, establishing the 
President’s Critical Infrastructure Protection Board to coordinate 
cyber-related federal efforts and programs associated with protecting 
our nation’s critical infrastructures. The Special Advisor to the 
President for Cyberspace Security chairs the board. Executive Order 
13231 tasks the board with recommending policies and coordinating 
programs for protecting CIP-related information systems. The executive 
order also established 10 standing committees to support the board’s 
work on a wide range of critical information infrastructure efforts. 
The board is intended to coordinate with the Office of Homeland 
Security in activities relating to the protection of and recovery from 
attacks against information systems for critical infrastructure, 
including emergency preparedness communications that were assigned to 
the Office of Homeland Security by Executive Order 13228, dated October 
8, 2001. The board recommends policies and coordinates programs for 
protecting information systems for critical infrastructure, including 
emergency preparedness communications, and the physical assets that 
support such systems. In addition, the chair coordinates with the 
Assistant to the President for Economic Policy on issues relating to 
private-sector systems and economic effects and with the Director of 
OMB on issues relating to budgets and the security of federal computer 
systems.

Effective Federal Information Security Programs Are Critical to CIP: 
At the federal level, cyber CIP activities are a component, perhaps the 
most critical, of a federal department or agency’s overall information 
security program. Since September 1996, we have reported that poor 
information security is a widespread federal government problem with 
potentially devastating consequences.[Footnote 7] These information 
security programs include efforts to protect critical cyber assets 
owned by the federal government. Although agencies have taken steps to 
redesign and strengthen their information system security programs, our 
analyses of information security at major federal agencies have shown 
that federal systems were not being adequately protected from computer-
based threats, even though these systems process, store, and transmit 
enormous amounts of sensitive data and are indispensable to many 
federal agency operations. In addition, in 1998, 2000, and 2002, we 
analyzed audit results for 24 of the largest federal agencies and found 
that all 24 had significant information security weaknesses.[Footnote 
8] As a result of these analyses, we have identified information 
security as a governmentwide high-risk issue in reports to the Congress 
since 1997--most recently in January 2001.[Footnote 9]

In March of this year, when we testified on the efforts by the federal 
government to implement provisions for Government Information Security 
Reform Act that were enacted as part of the National Defense 
Authorization Act for Fiscal Year 2001,[Footnote 10] we highlighted the 
fact that each agencywide information security program is required to 
ensure the integrity, confidentiality, and availability of systems and 
data supporting the agency’s critical operations and assets (e.g., CIP 
assets).[Footnote 11] At that time, of 24 of the largest agencies, 15 
had not implemented an effective methodology to identify their critical 
assets,[Footnote 12] and 7 had not determined the priority for 
restoring these assets should a disruption in critical operations 
occur. OMB indicated that it was to direct all agencies to identify and 
prioritize their critical assets.

Our testimony was consistent with what the President’s Council on 
Integrity and Efficiency and the Executive Council on Integrity and 
Efficiency (PCIE/ECIE) reported last year on the federal government’s 
compliance with PDD 63. It concluded that the federal government could 
improve its planning and assessment activities for cyber-based critical 
infrastructures. Specifically, the council stated that (1) many agency 
infrastructure plans were incomplete; (2) most agencies had not 
identified their mission-critical infrastructure assets; and (3) few 
agencies had completed vulnerability assessments of mission-critical 
assets or developed remediation plans.

At Least 50 Federal Organizations Derive Their Cyber CIP 
Responsibilities from a Variety of Sources: 

At least 50 organizations are involved in national or multiagency cyber 
CIP efforts and derive their responsibilities from PDD 63 and Executive 
Order 13231, as well as various other federal laws, directives, and 
orders. These organizations are involved in many cyber CIP activities, 
including policy development, vulnerability assessment, and research 
and development. However, current cyber CIP efforts do not specifically 
address all potentially relevant sectors and their respective federal 
agencies. The chair of the President’s Critical Infrastructure 
Protection Board, as well as officials from the CIAO, acknowledged that 
our nation’s critical infrastructures are currently being reexamined 
and could be expanded.

Many Organizations Have National or Multiagency Cyber CIP 
Responsibility: 

Protecting the nation’s critical infrastructure against information 
attacks is a complicated process involving many organizations within 
many government agencies. At least 50 organizations are involved in 
national or multiagency cyber CIP efforts. These entities include 5 
advisory committees; 6 Executive Office of the President organizations; 
38 executive branch organizations associated with departments, 
agencies, or intelligence organizations; and 3 other organizations. 
These organizations are primarily located within 13 major departments 
and agencies mentioned in PDD 63.[Footnote 13] Several departments, 
including DOD, Treasury, and Commerce have multiple organizations 
involved in cyber CIP activities. For example, we identified 7 
organizations within DOD involved in national or multiagency cyber CIP 
efforts. Appendix II identifies each of the organizations, provides a 
high-level description of their cyber CIP responsibilities, and 
identifies their source(s) of authority.

Although each organization described a wide range of cyber CIP-related 
activities, collectively they described activities related to the 
following five categories: 

* policy development, including advising on policy issues, coordinating 
and planning CIP activities, issuing standards and best practices, 
providing input to the national CIP plan, developing education and 
outreach programs with governmental and private sector organizations, 
and coordinating internationally;

* analysis and warning, including conducting vulnerability analyses, 
gathering intelligence information, coordinating and directing 
activities to detect computer-based attacks, disseminating information 
to alert organizations of potential and actual infrastructure attacks, 
and facilitating the sharing of security-related information;

* compliance, including overseeing implementation of cyber CIP 
programs, ensuring that policy is adhered to and remedial plans are 
developed, and investigating cyberattacks on critical infrastructures;

* response and recovery, including reconstituting minimum required 
capabilities, isolating and minimizing damage, and coordinating the 
necessary actions to restore functionality; and: 

* research and development, including coordinating federally sponsored 
research and development in support of infrastructure protection.

On the following page, figure 3 displays a high-level overview of the 
organizational placement of the 5 advisory committees; 6 Executive 
Office of the President organizations; 13 executive branch departments 
and agencies; and several other organizations involved in national or 
multiagency cyber CIP efforts. For departments and agencies, figure 4 
provides further detail on component organizations’ involvement, but 
does not illustrate the internal relationships within each agency. For 
all figures, organizations’ cyber CIP-related activities are identified 
in one or more of the five general categories discussed above. Appendix 
III displays in tabular format the entities and their activities. 
[Footnote 14]

Figure 3: Overview of National or Multiagency Federal Cyber CIP 
Organizations: 

[See PDF for image]

Note: Major agencies or departments are highlighted in yellow here and 
in figure 4. The organizations are color-coded to correspond to one or 
more of the five general activities related to cyber CIP (see legend).

[End of figure]

Figure 4: Components of Executive Departments or Agencies and Their 
Primary Activities Related to Cyber CIP (as indicated by the Color-
Coded Legend Below): 

[See PDF for image]

[End of figure]

The President’s recent proposal to create a cabinet-level Department of 
Homeland Security states that “currently, at least twelve different 
government entities oversee the protection of our critical 
infrastructure.” As our analysis shows, at least 50 organizations are 
involved in national cyber CIP efforts.

Federal Organizations Derive Their Cyber CIP Responsibilities from a 
Variety of Laws, Regulations, and Federal Policy Documents: 
In addition to PDD 63 and Executive Order 13231, agencies derive and 
justify their cyber CIP efforts from a variety of laws, regulations, 
and federal policy documents. Various laws and regulations also address 
the need to secure federal systems, including the Government 
Information Security Reform Act; the Clinger-Cohen Act; the Computer 
Security Act; and Appendix III to OMB Circular A-130, Security of 
Federal Automated Information Resources. In addition to the overarching 
legislation mentioned above, table 2 below summarizes the key executive 
orders, presidential decision directives, and other acts and directives 
that mention activities related to cyber CIP.

Table 2: Key Executive Orders, Presidential Decision Directives, Acts, 
and Directives That Mention Activities Related to Cyber CIP: 
Executive orders: 

Law or regulation: Executive Order 12472, “Assignment of National 
Security and Emergency Preparedness Telecommunications Functions”; 
Description: Executive orders: Signed in 1984, this order established 
the National Communication Systems and assigns national security 
emergency preparedness responsibilities for telecommunications.

Law or regulation: Executive Order 12656, “Assignment of Emergency 
Preparedness Responsibilities”; 
Description: Executive orders: Signed in 1988, this order assigns 
federal national security emergency preparedness responsibilities to 
federal departments and agencies for various sectors.

Law or regulation: Executive Order 13231, “Critical Infrastructure 
Protection in the Information Age”; 
Description: Executive orders: Signed in October 2001, this order 
establishes the President’s Critical Infrastructure Protection Board 
to coordinate the federal efforts and programs associated with 
protecting our nation’s critical infrastructures. A special advisor to 
the President for cyberspace security chairs the board. This order 
also tasks the board to recommend policies and coordinate programs for 
protecting information systems for critical infrastructure protection. 
The executive order also established 10 standing committees to support 
the board’s work on a wide range of critical information 
infrastructure efforts.

Law or regulation: Executive Order 13228, “Establishing the Office of 
Homeland Security and the Homeland Security Council”; 
Description: Executive orders: Signed in October 2001, this order 
establishes the Office of Homeland Security, whose mission is to 
develop and coordinate the implementation of a comprehensive national 
strategy to secure the United States from terrorist threats or 
attacks. The office will coordinate the executive branch’s efforts to 
detect, prepare for, prevent, protect against, respond to, and recover 
from terrorist attacks within the United States.
Presidential decision directives: 

Law or regulation: PDD 39, “Presidential Decision Directive on 
Terrorism”; 
Description: Executive orders: Signed in 1995, this directive sets 
forth the U.S. general policy to use all appropriate means to deter, 
defeat, and respond to all terrorist attacks against U.S. interests. 
More specifically, PDD 39 directs federal departments to take various 
measures to (1) reduce the vulnerabilities to terrorism, (2) deter and 
respond to terrorism, and (3) develop effective capabilities to 
prevent and manage the consequences of terrorist use of weapons of 
mass destruction. The directive charges the FBI as the lead 
investigative agency to reduce U.S. vulnerabilities to terrorism.

Law or regulation: PDD 62 “Combating Terrorism”; 
Description: Executive orders: Signed in 1998, this directive 
established the Office of the National Coordinator for Security, 
Infrastructure Protection and Counter-Terrorism. PDD 62 also 
reinforces the mission of many of the agencies charged with roles in 
defending terrorism by codifying and clarifying their activities in 
the range of counter-terrorism programs including the protection of 
the computer-based systems that support critical infrastructure sectors.

Law or regulation: PDD 63, “Protecting America’s Critical 
Infrastructures”; 
Description: Executive orders: Signed in 1998, this directive expanded 
the NIPC at the FBI, and established ISACs in cooperation with the 
federal government, private sector, and the CIAO to support work in 
developing a national plan.

Law or regulation: PDD 67, “Enduring Constitutional Government and 
Continuity of Government Operations”; 
Description: Executive orders: Signed in 1998, this directive required 
federal agencies to develop continuity of operations plans for 
essential operations.

Law or regulation: PDD 75, “U.S. Counterintelligence Effectiveness - 
Counterintelligence for the 21st Century”; 
Description: Executive orders: Signed in 2001, this directive 
establishes a counterintelligence board of directors, the National 
Security Council Deputies Committee, and a National 
Counterintelligence Executive.

Other directive/acts: 

Law or regulation: National Security Directive 42, National Policy for 
the Security of National Security Systems; 
Description: Executive orders: Signed in 1990, this directive 
designates the Director, NSA the national manager for national 
security telecommunications and information systems security and calls 
upon him or her to promote and coordinate defense efforts against 
threats to national security systems.

Law or regulation: The Stafford Act; 
Description: Executive orders: Enacted in 1974, this act enables the 
Federal Emergency Management Agency (FEMA) to provide supplementary 
federal assistance to individuals, state and local governments, and 
certain private nonprofit organizations to assist them in recovering 
from the devastating effects of major disasters.

Law or regulation: The USA PATRIOT Act; 
Description: Executive orders: Enacted in 2001, this act enables law 
enforcement entities to apply modern surveillance capabilities to new 
technologies, such as the Internet, and execute these devices in 
multiple jurisdictions anywhere in the United States.

Law or regulation: The Aviation and Transportation Security Act; 
Description: Executive orders: Enacted in 2001, this act created the 
Transportation Security Administration (TSA) in the Department of 
Transportation. The act gives TSA direct responsibility for aviation 
and all other transportation security.

[End of table]

As demonstrated by the type and number of sources cited, many cyber CIP 
activities are related to, and overlap with, other aspects of agencies’ 
national security efforts, including homeland security, information 
security, national security emergency preparedness telecommunications, 
and continuity of government operations.

Additional Federal Organizations Have CIP-related Responsibilities: 
Current cyber CIP efforts do not specifically address all potentially 
relevant critical infrastructure sectors or federal agencies. As 
mentioned previously, PDD 63 identifies eight sector infrastructures 
with 13 lead agencies associated with the eight sectors and five 
special functions. However, PDD 63 and Executive Order 13231 does not 
specifically address other possible critical sectors such as food 
supply, chemical manufacturing, and delivery services and their 
respective federal agency counterparts.

Although important agencies and sectors may not be officially addressed 
in PDD 63 or Executive Order 13231, a few organizations have stepped 
forward to address these gaps. For example, the Department of 
Agriculture, with responsibilities for food safety, recently 
established a Homeland Security Council, a departmentwide council with 
the mission of protecting the food supply and agricultural production. 
Also, a food ISAC has been recently formed by the Food Marketing 
Institute in conjunction with NIPC. In addition, officials from the 
designated private-industry sectors for both electricity and water have 
identified the need to coordinate with the Department of the Interior. 
These sectors have an interest in the physical and cyber safeguards for 
dams under Interior’s control, because of the water and electrical 
power they produce. Officials from both sectors noted that this 
coordination with Interior was just initiated at the beginning of 2002.
Administration officials acknowledge that PDD 63 and Executive Order 
13231 are under review for the possible inclusion of additional 
sectors. The chair of the President’s Critical Infrastructure 
Protection Board told a Senate subcommittee that the critical 
infrastructure sectors were being reviewed after the September 11 
attacks and the subsequent anthrax attacks on the U.S. Capitol. 

According to the special advisor, industries such as chemical 
processing, pharmaceuticals, and colleges and universities need to be 
reevaluated as critical infrastructures. Additionally, officials at the 
CIAO noted that the concept of critical infrastructures is being 
reviewed as part of the development of a national strategy, and that 
additional government functions are being considered for inclusion.
In addition, the proposal to create a Department of Homeland Security 
also refers to the need to consider additional sectors. According to 
the proposal, “the Department would be responsible for comprehensively 
evaluating the vulnerabilities of America’s critical infrastructure, 
including food and water systems, agriculture, health systems and 
emergency services, information and telecommunications, banking and 
finance, energy (electrical, nuclear, gas and oil, dams), 
transportation (air, road, rail, ports, waterways), the chemical and 
defense industries, postal and shipping entities, and national 
monuments and icons.” This proposal is referring to both cyber and 
physical aspects of our national infrastructure. 

Until all relevant infrastructure sectors and lead agencies are 
clarified, our existing policies for, and possibly our nation’s 
approach to, cyber CIP remain incomplete. The opportunity for ensuring 
that all relevant organizations are addressed exists in the development 
of the new national strategy.

Relationships among Cyber CIP Organizations Are Not Consistently 
Established: 

Most organizations were able to identify their relationships and 
coordination activities. This information is presented in appendix II 
for each organization that could provide it. 

However, in reviewing the reported coordination of organizations with 
key lead entities identified under PDD 63 and Executive Order 13231, we 
identified that relationships among all organizations performing 
similar activities (e.g., policy development, analysis and warning) 
were not consistently established. For example, under PDD 63, the CIAO 
was set up to integrate the national CIP plan, coordinate a national 
education and awareness program, and coordinate legislative affairs. 
Nevertheless, of the organizations conducting policy development 
activities, only about one-half reported that they coordinated with the 
CIAO. Of the organizations with research and development functions, 
none mentioned the OSTP, which was designated the lead coordinator for 
research and development in both PDD 63 and Executive Order 13231. 

Our prior work on the FBI’s NIPC, the lead for analysis and warning, is 
consistent with these examples. Specifically, in April 2001, we 
reported that NIPC’s role had not been clearly articulated and was not 
being consistently interpreted.[Footnote 15] PDD 63 describes general 
goals and provides an outline of the responsibilities assigned to the 
NIPC. However, discussions with officials in the defense, intelligence, 
and civilian agencies involved in CIP, and with OMB and the National 
Security Council, showed that their views of NIPC’s roles and 
responsibilities differed from one another and, in some cases, from 
those outlined in PDD 63. Several expressed an opinion that this lack 
of consensus had hindered NIPC’s progress and diminished support from 
other federal agencies. 

In recognition of the inconsistent coordination among organizations 
involved in cyber CIP, President Bush issued Executive Order 13231, 
“Critical Infrastructure Protection in the Information Age,” which 
acknowledged the need for additional coordination by creating the 
President’s Critical Infrastructure Protection Board to coordinate 
federal efforts and programs related to the protection of critical 
infrastructures. Among the board’s activities stated in the order are 
(1) outreach to the private sector and state and local governments; (2) 
information sharing; (3) incident coordination and crisis response; (4) 
recruitment, retention, and training of executive branch security 
professionals; (5) research and development; (6) law enforcement 
coordination with national security components; (7) international 
information infrastructure protection; (8) legislation; and (9) 
coordination with the Office of Homeland Security. The order 
established 10 standing committees to support the board’s work, 
including committees on incident response coordination and research and 
development. According to the Office of Homeland Security, the mission 
of these committees, within the larger mission of the board, is to 
coordinate programs across government in order to minimize duplication 
of efforts, create synergies, and maximize resources. 

More recently, the Assistant to the President for Homeland Security, in 
an April 10, 2002, letter to the chairman of the Senate Governmental 
Affairs Committee, to address a March request from the committee 
seeking information on homeland security efforts, discussed the need 
for increased coordination among several key national cyber CIP 
organizations. The assistant stated that plans for developing a 
cybersecurity information coordination center are under consideration 
and that it would be possible for the President’s Critical 
Infrastructure Protection Board, the outreach and awareness component 
of the NIPC, and the CIAO to be collocated there to better coordinate 
each organization’s duties and responsibilities related to outreach to 
private industry.

National Strategy to Ensure Coordination Is Being Developed: 

A missing requirement for implementing the President’s Critical 
Infrastructure Protection Board and improving coordination continues to 
be the lack of a national strategy that defines organizational roles 
and relationships. We have been recommending such a strategy for 
several years, having first identified the need for a detailed plan in 
1998. At that time, we reported that developing a governmentwide 
strategy that clearly defined and coordinated the roles and new and 
existing federal entities was important to ensure governmentwide 
cooperation and support for PDD 63.[Footnote 16] At that time, we 
recommended that OMB ensure such coordination. 

As mentioned previously, in January 2000, the White House issued its 
“National Plan for Information Systems Protection” as a first major 
element of a more comprehensive strategy to be developed. At that time, 
we reiterated the importance of defining and clarifying organizational 
roles and responsibilities, noting that numerous federal organizations 
were collecting, analyzing, and disseminating data or guidance on 
computer security vulnerabilities and incidents and that clarification 
would help ensure a common understanding of (1) how the activities of 
these many organizations interrelate, (2) who should be held 
accountable for their success or failure, and (3) whether such 
activities will effectively and efficiently support national goals. 
[Footnote 17]

In September 2001, we continued to report that an underlying deficiency 
in the implementation of PDD 63 has been the lack of an adequate 
national strategy that delineates interim objectives and the specific 
roles and responsibilities of federal and nonfederal organizations 
involved in CIP.[Footnote 18] At that time, among other 
recommendations, we recommended that the Assistant to the President for 
National Security Affairs ensure that the federal government’s strategy 
to address computer-based threats defines specific roles and 
responsibilities of organizations involved in CIP and related 
information security activities. In commenting on a draft of the 
report, Commerce noted that the administration is reviewing the 
organizational structures for CIP to ensure coordination of federal 
government efforts and that it is developing a new national plan.
The national strategy for cyber CIP is still being developed and is now 
planned to be issued in September 2002. A key contributor to the 
national strategy will be input from the Partnership for Critical 
Infrastructure Security, an organization that grew out of PDD 63, 
consisting of over 60 private-sector companies and associations and 13 
federal government agencies. Also contributing to the national plan 
will be responses to 53 questions categorized into five critical areas 
of home user and small business, major enterprises, sectors of the 
national information infrastructure, national-level institutions and 
policies, and global issues. The questions deal with key computer 
information issues, including awareness, best practices and standards, 
accountability, funding, personnel, information sharing, warning, 
analysis, and incident response and recovery. The President’s Critical 
Infrastructure Protection Board recently distributed the questions over 
the Internet.

A clearly defined strategy is essential for defining the relationships 
among the various cyber CIP organizations, integrating cyber CIP 
activities with existing laws, and ensuring that our national approach 
to cyber CIP is both coordinated and comprehensive. Without such a 
detailed strategy, our nation risks not having the appropriate 
structure to deal with the growing threat of computer-based attacks on 
its critical infrastructure. 

CIP Funds Are Not Separately Appropriated for Most Organizations, and 
Precise Levels of Spending Cannot Be Ascertained: 

Most of the organizations in our review do not receive appropriations 
specifically designated for cyber CIP and, therefore, do not have a 
process to track these funds. A complicating factor in tracking funds 
spent on cyber CIP activities is that organizational totals often 
include funds spent on physical, cyber, and agency-specific CIP 
activities. Although most organizations cannot readily identify their 
cyber CIP funding, a few key organizations can since most, or in some 
cases all, of their operations are related to cyber CIP activities. 
These organizations include the CIAO, NIPC, the National Institute of 
Standards and Technology (NIST), and GSA’s Federal Computer Incident 
Response Center (FedCIRC), as highlighted in the February 2002 Office 
of Homeland Security overview.[Footnote 19] Table 3 shows the CIP 
funding identified in the homeland security budget for these four 
national cyber CIP organizations.

Table 3: Office of Homeland Security Fiscal Year 2002 and 2003 CIP 
Funding: 

National CIP Entity: FedCIRC (GSA); 
Fiscal year 2002 base: $10 million; 
Emergency supplemental[A]: 0; 
Fiscal year 2003 proposed: $11 million. 

National CIP Entity: NIPC (FBI); 
Fiscal year 2002 base: $72 million; 
Emergency supplemental[A]: $61 million; 
Fiscal year 2003 proposed: $125 million.

National CIP Entity: Computer Security Division (NIST); 
Fiscal year 2002 base: $11 million; 
Emergency supplemental[A]: 0; 
Fiscal year 2003 proposed: $15 million.

National CIP Entity: CIAO (Commerce); 
Fiscal year 2002 base: $5 million; 
Emergency supplemental[A]: $1 million; 
Fiscal year 2003 proposed: $7 million.

[A] P.L. 107-38, the Emergency Supplemental Appropriations Act for 
Recovery from and Response to Terrorist Attacks on the United States: 
FY 2001.

Source: Office of Homeland Security, Securing the Homeland, 
Strengthening the Nation, February 2002.

[End of table]

Although most organizations are not appropriated CIP funds, OMB has 
estimated CIP funding levels by department and independent agencies in 
its Annual Report to Congress on Combating Terrorism.[Footnote 20] 
According to OMB’s report, CIP funds have increased from approximately 
$1.2 billion in fiscal year 1998 (actual) to approximately $3.9 billion 
in the President’s fiscal year 2003 budget request. 

Since September 11, additional funds have been provided or requested 
for CIP activities related to homeland security, which has further 
complicated identifying what aspects of CIP activities are funded. In a 
recent report to the Congress, the Congressional Research Service 
stated that the fiscal year 2002 estimates are not readily visible in 
agency budgets or congressional appropriations.[Footnote 21] The 
Congressional Research Service added that a detailed breakdown of CIP 
funds is not available. Without a precise tracking of cyber CIP funding 
and spending, it is difficult to determine if the federal government is 
spending its limited cyber CIP resources on the appropriate priorities. 

However, OMB officials told us that they plan to provide more detailed 
breakdowns in the future. Such information is also necessary to enable 
the CIP Board to make recommendations to OMB on cyber CIP funding, as 
outlined in Executive Order 13231.

Conclusions: 

Protecting our nation’s critical infrastructure is vital to our 
national security, economic stability, and public health and safety. 
PDD 63 established a strong foundation that defined a starting point, 
and Executive Order 13231 expanded that foundation by tasking a special 
advisor to the President for cyberspace security to take a leadership 
role in enhancing our future efforts in that area. The President’s 
recent proposal to create a Department of Homeland Security states that 
“currently, at least twelve different government entities oversee the 
protection of our critical infrastructure.” However, as our analysis 
shows, at least 50 organizations are involved in national or 
multiagency cyber CIP efforts, as well as additional infrastructure 
organizations that have not yet been officially recognized.

Further, although most organizations could identify their relationships 
with other key cyber CIP entities, relationships among all 
organizations performing similar activities (e.g., policy development 
or analysis and warning) were not consistently established. Without a 
strategy that identifies responsibilities and relationships for all 
cyber CIP efforts, our nation risks not having the appropriate 
structure to deal with the growing threat of computer-based attacks on 
its critical infrastructures.

Finally, most of the organizations in our review do not receive 
appropriations specifically designated for cyber CIP and, therefore, do 
not have a process to track these funds. OMB plans to provide more 
detailed information on this area in the future.

Recommendation: 

We have previously recommended that the Assistant to the President for 
National Security Affairs ensure that the federal government’s CIP 
strategy defines the specific roles and responsibilities of 
organizations involved in CIP and related information security 
activities. To supplement this recommendation, we recommend that when 
developing the strategy to guide federal CIP efforts, the Assistant to 
the President for National Security Affairs, the Assistant to the 
President for Homeland Security, and the Special Advisor to the 
President for Cyberspace Security ensure that, among other things, the 
strategy: 

* includes all relevant sectors and defines the key federal agencies’ 
roles and responsibilities associated with each of these sectors, and: 

* defines the relationships among the key CIP organizations.

Agency Comments and Our Evaluation: 

We received written comments on a draft of this report from the Special 
Advisor to the President for Cyberspace Security; the Chief of Staff 
and General Counsel, Office of Science and Technology Policy (OSTP); 
the Chief Operating Officer and General Counsel, Federal Emergency 
Management Agency (FEMA); the Assistant Secretary and Chief Financial 
Officer, Department of State; and the Director, Audit Liaison Office, 
Justice Management Division, Department of Justice. The Department of 
Justice generally concurred with our findings and recommendations (see 
appendix IV for Justice’s written comments); the Special Advisor to the 
President for Cyberspace Security and the Department of State did not 
indicate whether they agreed or disagreed; FEMA requested that we add 
an additional organization, and OSTP disagreed with our statement that 
none of the R&D organizations coordinated with them. We received oral 
comments from officials from the Office of Management and Budget; the 
Environmental Protection Agency; the Departments of Defense, Energy, 
Health and Human Services, and Treasury; the Federal Communications 
Commission; the National Science Foundation; and the General Services 
Administration. Although the written and oral comments varied in scope 
and detail, they were primarily limited to technical comments on the 
description of their responsibilities described in appendix II. We have 
incorporated these changes in the report, as appropriate. These changes 
included the addition of a few organizations involved in national or 
multiagency cyber CIP efforts. The Department of Transportation had no 
comments on a draft of this report, and we did not receive comments 
from the Department of Commerce.

In written comments on a draft of this report (see app. V), the Special 
Advisor to the President for Cyberspace Security acknowledged the 
complexity and importance of coordinating CIP efforts and stated that 
the President’s Critical Infrastructure Protection Board, created under 
Executive Order 13231 and composed of senior federal officials, 
coordinates cybersecurity efforts, including aligning roles and 
responsibilities. The Special Advisor also pointed out that the 
coordination of federal efforts is only a small part of the overall 
infrastructure protection challenge since the majority of the U.S. 
computing power is not owned by the federal government. He added that 
he is currently coordinating a national strategy that will address 
cybersecurity challenges faced by federal, state, and local 
governments; private companies; infrastructure owners; and home users. 

We agree that federal coordination is only part of the overall 
challenge in effectively managing our nation’s cyber CIP efforts and 
look forward to the completion of the national strategy so that all 
relevant sectors are included and relationships among the government’s 
many players are defined. The Special Advisor also made separate 
technical comments, which have been incorporated in the report, as 
appropriate.

In written comments on a draft of this report (see app. VI), OSTP 
stated that it is inaccurate for us to “imply that consultations are 
not occurring with the agencies” with R&D responsibilities and that it 
has exercised its coordination authority for CIP R&D over the past 5 
years through regular senior-level interagency meetings. However, when 
we asked the R&D organizations who they coordinated with, none 
indicated that they coordinated with OSTP, and OSTP did not 
specifically identify the R&D organizations in our review. Also, none 
of these organizations commented on this statement in our draft report 
that OSTP took exception to. Therefore, we did not make any changes to 
the report. In addition, OSTP also made separate technical comments 
that have been incorporated in the report, as appropriate.

In written comments on a draft of this report (see app. VII), FEMA 
stated that the current draft does not include the Office of the Chief 
Information Officer/Information Technology Services Directorate. On 
the basis of additional information the agency provided in an 
attachment, we added this office and also incorporated additional 
technical comments, as appropriate.

In written comments on a draft of this report (see app. VIII), the 
Department of State did not indicate whether it agreed or disagreed 
with our draft, but noted that we had not included one of its six 
organizations, the Bureau of Information Resource Management. We did 
not include this bureau because it is not involved in national or 
multiagency cyber CIP efforts. As a result, we made no revisions to our 
report.

We are sending copies of this report to other interested congressional 
committees; the Assistant to the President for National Security 
Affairs; the Assistant to the President for Homeland Security; the 
Special Advisor to the President for Cyberspace Security; the Director 
of the Office of Management and Budget; and the heads of the agencies 
that are identified in this report. We will also make copies available 
to others upon request. The report will be available at no charge on 
the GAO Web site at [hyperlink, http://www.gao.gov].

If you or your offices have any questions about matters discussed in 
this report, please contact me at (202) 512-3317 or Dave Powner, 
assistant director, at (303) 572-7316. We can also be reached by e-mail 
at daceyr@gao.gov or pownerd@gao.gov, respectively. Staff who made key 
contributors to this report are listed in appendix IX.

Robert F. Dacey
Director, Information Security Issues: 

Signed by Robert F. Dacey: 

[End of section]

Appendix I: Objectives, Scope, and Methodology: 

The objectives of our review were to (1) identify the federal civilian, 
defense, and intelligence organizations involved in protecting critical 
infrastructures from computer-based attacks, and their 
responsibilities, current organizational placement, and source of 
authority; (2) determine the organizations’ relationships with each 
other; and (3) determine appropriated critical infrastructure 
protection (CIP) funds for each organization.

To identify the federal civilian, defense, and intelligence 
organizations involved in protecting critical infrastructures from 
computer-based attacks, and their responsibilities, source of 
authority, and current organizational placement, we selected federal or 
federally sponsored organizations supporting national or multiagency 
efforts that were mentioned in either Presidential Decision Directive 
(PDD) 63 or Executive Order 13231, including lead agencies and members 
of the President’s Critical Infrastructure Protection Board. After 
identifying the organizations with a national or multiagency cyber CIP 
effort, we (1) reviewed agency documents including enabling 
legislation, charters, delegations of authority, policy documents, 
program and strategic plans, and performance reports; (2) requested 
written responses from them on their CIP responsibilities, sources of 
authority, organizational placement and reporting relationships, and 
funding; (3) interviewed pertinent officials associated with these 
organizations; and (4) asked for other organizations within these 
organizations that have a national CIP role. Our inventory of 
organizations does not include 9 of the 24 largest federal departments 
or agencies since they were not specifically identified in PDD 
63,[Footnote 22] Executive Order 13231, or by officials we interviewed; 
organizations that are responsible for the security of critical cyber 
systems, but do not have national cyber CIP responsibilities outside 
their agencies, such as the Federal Aviation Administration, the 
Centers for Disease Control, the Financial Management Service, and the 
National Weather Service; or agencies that have national physical 
security CIP responsibilities, such as Treasury’s Bureau of Alcohol, 
Tobacco and Firearms; Transportation’s Office of Pipeline Safety; and 
the Environmental Protection Agency’s Chemical Emergency Preparedness 
and Prevention Office.

To determine the organizations’ relationships with each other, we (1) 
reviewed PDD 63 and Executive Order 13231 and written responses 
regarding organizational placement and reporting relationships; (2) 
analyzed interdependencies; and (3) held discussions with organization 
officials and officials from the oversight and policy making bodies 
such as the Critical Infrastructure Assurance Office (CIAO). We also 
interviewed the Special Advisor to the President for Cyberspace 
Security on current initiatives to improve coordination among these 
organizations.

To determine the level of the organizations’ CIP appropriated funds, we 
analyzed agency budget documents and written responses regarding 
funding levels. We reviewed recent CIP budget documents created by the 
Office of Homeland Security, the Office of Management and Budget (OMB), 
and the Congressional Research Service. We also discussed with OMB how 
funds are appropriated and tracked for CIP activities.

We performed our work in Washington, D.C., from January through May 
2002, in accordance with generally accepted government auditing 
standards.

[End of section]

Appendix II: Federal Organizations Involved in National or Multiagency 
Cyber CIP Efforts: 

The federal organizations listed below have various national or 
multiagency responsibilities related to cyber CIP efforts. These 
organizations include 5 advisory committees; 6 Executive Office of the 
President organizations; 38 executive branch organizations associated 
with departments, agencies, or intelligence organizations; and 3 other 
organizations. The description of each organization includes its cyber 
CIP responsibilities, source(s) of authority, key relationships with 
other CIP organizations, and, where available, information on cyber CIP 
funds. See figure 4 (in main body of text) for information on 
organizational placement.

Federal Advisory Committees: 

Federal Advisory Committees are committees, boards, commissions, or 
similar groups from the private sector that are established by statute 
or established or used by the President or one or more agencies for 
providing advice or recommendations to the President or one or more 
agencies or federal government officials. Within a year after a 
presidential advisory committee submits a public report to the 
President, the President or a delegate of the President is required to 
report to the Congress proposals for action or reasons for inaction 
regarding the recommendations contained in the public report. In 
addition, each year the President is required to provide the Congress 
with an annual report on the activities, status, and changes in the 
composition of advisory committees from the preceding fiscal year. 

According to federal documents, the advisory committees for cyber CIP 
issues are: 

* the National Infrastructure Advisory Council (NIAC),

* the President’s Council of Advisors on Science and Technology 
(PCAST),

* the President’s National Security Telecommunications Advisory 
Committee (NSTAC),

* the President’s Information Technology Advisory Committee (PITAC), 
and: 

* the National Science and Technology Council (NSTC).

National Infrastructure Advisory Council: 

Executive Order 13130 established NIAC to advise the President on the 
security of information systems for critical infrastructure supporting 
other sectors of the economy: banking and finance, transportation, 
energy, manufacturing, and emergency government services. The members 
of NIAC, which were selected from the private sector, academia, and 
state and local government, had expertise relevant to the functions of 
the committee. One of NIAC’s main duties was to monitor the development 
of private-sector information sharing and analysis centers (ISAC). Just 
before leaving office, President Clinton put forward the names of 21 
appointees. The order was rescinded by the Bush Administration before 
the council could meet. In Executive Order 13231, President Bush 
established a National Infrastructure Advisory Council (with the same 
acronym, NIAC) whose functions are similar to those of the council 
established under the Clinton Administration. The National 
Infrastructure Advisory Council is comprised of a group of 30 
representatives from private industry and state and local government 
that will advise the President on matters relating to cybersecurity and 
CIP.

President’s Council of Advisors on Science and Technology: 

A private-sector President’s Council of Advisors on Science and 
Technology assists the National Science and Technology Council to 
ensure that federal science and technology policies reflect the full 
spectrum of the nation’s needs. Since its creation, the President’s 
Council of Advisors on Science and Technology has been expanded and 
currently consists of 18 members from the private sector plus the 
Assistant to the President for Science and Technology, who serves as 
the committee’s co-chair. The committee members, who are appointed by 
the President, are drawn from industry, education, research 
institutions, and other nongovernmental organizations.
President’s National Security Telecommunications Advisory Committee: 
Executive Order 13231 calls on the President’s National Security 
Telecommunications Advisory Committee to advise the President on the 
security and continuity of communications systems essential for 
national security and emergency preparedness. In 1982, the President’s 
National Security Telecommunications Advisory Committee, which 
comprises presidentially appointed senior executives from up to 30 
major U.S. corporations in the telecommunications and financial 
services industries, was established to advise the President on 
national-security and emergency-preparedness telecommunications 
issues.

President’s Information Technology Advisory Committee: 

Under the authority of Executive Order 13035 (1997) and amended by 
Executive Order 13092 (1998), the President’s Information Technology 
Advisory Committee provides the President, the Congress, and the 
federal agencies involved in information technology (IT) research and 
development with expert, independent advice on advanced information 
technologies, including the national infrastructure as high-
performance computing, large-scale networking, and high-assurance 
software and systems design. As part of this assessment, the committee 
reviews the federal networking and IT research and development program. 
Leading IT experts from industry and academia comprise the committee as 
it helps guide the administration’s efforts to accelerate the 
development and adoption of information technologies. The committee is 
formally renewed through presidential executive orders. The current 
executive order is due to expire June 1, 2003.

National Science and Technology Council: 

The NSTC was established by executive order in 1993 as a cabinet-level 
council, with the President serving as chair. This council is the 
principal means for the President to coordinate science, space, 
technology, and the various parts of the federal research and 
development community. An objective of NSTC is establishing clear 
national goals for federal science and technology. The council prepares 
research and development strategies that are coordinated across federal 
agencies to form an investment package aimed at accomplishing multiple 
national goals. PDD 63 states that the Office of Science and Technology 
Policy shall be responsible for coordinating research and development 
programs through the council.

Executive Office of the President: 

According to federal documents, the organizations with critical 
infrastructure protection responsibilities are as follows: 

* the Office of Homeland Security (OHS),

* the National Security Council (NSC),

* the Office of Science and Technology Policy (OSTP),

* the National Economic Council (NEC),

* the Office of Management and Budget (OMB), and: 

* the President’s Critical Infrastructure Protection Board.

Office of Homeland Security: 

Established by Executive Order 13228, the mission of the Office of 
Homeland Security is to develop and coordinate the implementation of a 
comprehensive national strategy to secure the United States from 
terrorist threats or attacks. The office, which is led by the Assistant 
to the President for Homeland Security, coordinates the executive 
branch’s efforts to detect, prepare for, prevent, protect against, 
respond to, and recover from terrorist attacks within the United 
States. The office identifies priorities and coordinates efforts for 
collecting and analyzing information. The office also identifies, in 
coordination with the Assistant to the President for National Security 
Affairs, intelligence sources outside the United States regarding 
threats of terrorism within the United States. The office also works 
with federal, state, and local agencies. 

Executive Order 13228 also established the Homeland Security Council 
which is responsible for advising and assisting the President regarding 
all aspects of homeland security. The council is to serve as the 
mechanism for ensuring that homeland-security-related activities of 
executive departments and agencies are coordinated and homeland 
security policies are effectively developed and implemented. As 
previously mentioned, in February 2002, the Office of Homeland Security 
published an overview of its proposed $37.7 billion fiscal year 2003 
budget. This total includes $722 million for technology to defend the 
homeland, a portion of which is to be allocated to several of the 
national CIP organizations we identified.

National Security Council: 

NSC coordinated the initial development and implementation of PDD 63. 
These efforts included developing the National Information System 
Defense Plan, monitoring federal agency CIP plans, and fostering a 
public/private-sector partnership on information assurance. Under the 
current Bush administration, the council underwent a major streamlining 
in which all its groups established during previous administrations 
were abolished. The responsibilities and functions of the former groups 
were consolidated into 17 policy coordination committees. The 
activities associated with CIP were assumed by the Counter-Terrorism 
and National Preparedness Policy Coordination Committee. The Special 
Advisor to the President for Cyberspace Security reports to the 
Assistant to the President for National Security Affairs, who leads the 
council, and to the Assistant to the President for Homeland Security. 
Furthermore, Executive Order 13231 identifies the Assistant to the 
President for National Security Affairs as a member of the President’s 
Critical Infrastructure Protection Board.

Office of Science and Technology Policy: 

The Office of Science and Technology Policy was established by the 
National Science and Technology Policy, Organization, and Priorities 
Act of 1976. PDD 63 designates OSTP as the lead agency for research and 
development for the government through the National Science and 
Technology Council. Recently, Executive Order 13231 created a standing 
committee for research and development, which is to be chaired by a 
designee of the Director of OSTP. This office serves as the primary 
advisor to the President for policy formulation and budget development 
on all questions in which science and technology are important 
elements. The office also leads an interagency effort to develop and 
implement science and technology policies and budgets that are 
coordinated across federal agencies. Its Director serves as the 
Assistant to the President for Science and Technology. In this 
capacity, the Director manages the National Security and Technology 
Council and the President’s Council of Advisors on Science and 
Technology.

OSTP’s Technology Division is responsible for the following: all of 
OSTP’s activities in the area of emergency-preparedness 
telecommunications; the NCS; the NSTAC; continuity of government 
programs; and infrastructure protection programs. In addition, this 
division works closely with the office’s Science Division on national 
security issues. OSTP’s Assistant Director for Homeland and National 
Security fills the post of Senior Director for Research and Development 
within the Office of Homeland Security. OSTP’s official 
responsibilities for protecting the domestic infrastructure derive from 
both statute and executive order. As a result, OSTP coordinates between 
the military and nonmilitary sectors within the government, between the 
technical and the policy-making communities, and between the federal 
government and state and local governments.

National Economic Council: 

PDD 63 tasked NEC to review sector plans and the national plan for CIP 
to ensure that they align with the President’s economic goals. 
Additionally, Executive Order 13231 calls on a designee of the chairman 
of NEC to work in coordination with the chair of the Private Sector and 
State and Local Government Outreach Committee of the President’s 
Critical Infrastructure Protection Board. NEC was established in 1993 
within the Office of Policy Development within the Executive Office of 
the President to advise the President on matters related to U.S. and 
global economic policy. By executive order, NEC has four principal 
functions: to coordinate policy-making for domestic and international 
economic issues, to coordinate economic policy advice for the 
President, to ensure that policy decisions and programs are consistent 
with the President’s economic goals, and to monitor implementation of 
the President’s economic policy agenda.

Office of Management and Budget: 

Executive Order 13231 calls on a designee of the Director of OMB to 
chair the Executive Branch Information Systems Security Committee of 
the President’s Critical Infrastructure Protection Board. OMB 
evaluates, formulates, and coordinates budget and management policies 
and objectives among federal departments and agencies, including that 
for information security. Some of its primary responsibilities are to 
assist the President in developing and maintaining effective 
government, developing efficient coordinating mechanisms to expand 
interagency cooperation, and developing regulatory reform proposals and 
programs. As part of the Floyd D. Spence National Defense Authorization 
Act for Fiscal Year 2001, Congress enacted the Government Information 
Security Reform Act, tasking OMB with responsibility for establishing 
and overseeing policies, standards, and guidelines for information 
security. OMB is also required to submit an annual report to the 
Congress summarizing results of agencies’ evaluations of their 
information security programs.

President’s Critical Infrastructure Protection Board: 

The Special Advisor to the President for Cyberspace Security heads the 
Office of Cyberspace Security as set forth by Executive Order 13231. 
The advisor works in close coordination and partnership with the 
private sector, which owns and operates the vast majority of America’s 
critical infrastructure. The special advisor also reports to the 
Assistant to the President for Homeland Security and to the Assistant 
to the President for National Security Affairs. Executive Order 13231 
established the President’s Critical Infrastructure Protection Board to 
coordinate the federal efforts and programs associated with protecting 
our nation’s critical infrastructures. The Special Advisor to the 
President for Cyberspace Security chairs the board. Executive Order 
13231 tasks the board with recommending policies and coordinating 
programs for protecting information systems for CIP. The executive 
order also established 10 standing committees to support the board’s 
work on a wide range of critical information infrastructure efforts. 
The board is also intended to coordinate with the Office of Homeland 
Security in activities relating to the protection of and recovery from 
attacks against information systems for critical infrastructure, 
including emergency preparedness communications that were assigned to 
the Office of Homeland Security by Executive Order 13228 of October 8, 
2001.

Chief Information Officers Council: 

The Chief Information Officers (CIO) Council was established by 
Executive Order 13011 in 1996. As set forth in Executive Order 13231, 
the vice chair of the CIO Council serves as an official member of the 
President’s Critical Infrastructure Protection Board and sits on the 
board’s coordination committee. The CIO Council serves as the principal 
interagency forum for improving practices in the design, modernization, 
use, sharing, and performance of federal government agency information 
resources. The council’s role includes developing recommendations for 
IT management policies, procedures, and standards; identifying 
opportunities to share information resources; and assessing and 
addressing the needs of the federal government’s IT workforce. 
Membership on the council comprises CIOs and deputy CIOs from 28 
federal executive agencies. The CIO Council serves as a focal point for 
coordinating challenges that cross agency boundaries.

National Communications System: 

Created by Executive Order 12472, the National Communications System’s 
CIP mission is to assure the reliability and availability of national 
security and emergency preparedness (NS/EP) telecommunications. Its 
mission includes, but it is not necessarily limited to, responsibility 
for (1) assuring the government’s ability to receive priority services 
for NS/EP purposes in current and future telecommunications networks by 
conducting research and development and participating in national and 
international standards bodies and (2) operationally coordinating with 
industry for protecting and restoring NS/EP services in an all-hazards 
environment. NCS’s mission is externally focused on the reliability and 
availability of the public telecommunications network. This mission is 
carried out within government through the NS/EP Coordinating Committee, 
with industry on a policy level in coordination with NSTAC, and 
operationally through the National Coordinating Center for 
Telecommunications (NCC) and through its participation in national and 
international standards bodies. Furthermore, in January 2000, NCC was 
designated an ISAC for telecommunications under the provisions of PDD 
63.

NCS reports to the Executive Office of the President-NSC for policy, 
OSTP for operations, and OMB for budget through the Secretary of 
Defense, who is the Executive Agent for NCS. NCS’s NS/EP Coordinating 
Committee is a standing committee under the President’s Critical 
Infrastructure Protection Board. Externally, NCS coordinates with the 
Office of Cyberspace Security; CIAO; the National Telecommunications 
and Information Administration; the National Infrastructure Protection 
Center (NIPC); the General Service Administration’s (GSA) Federal 
Computer Incident Response Center (FedCIRC); the Department of Energy 
(including several of the laboratories); the Department of 
Transportation (DOT), industry members of the National Coordinating 
Center for Telecommunications; ISACs; and numerous Department of 
Defense (DOD) organizations.

Federal Communications Commission: 

The Federal Communications Commission (FCC) is an independent U.S. 
government agency and a nonvoting member of the President’s Critical 
Infrastructure Protection Board. FCC is composed of five commissioners 
appointed by the President with the advice and consent of the Senate. 
FCC has the authority to define telecommunications service priorities 
for national security emergency preparedness when the President has not 
invoked his wartime authority. In addition, one designated commissioner 
is assigned responsibility for advising and representing the commission 
regarding matters of emergency-preparedness and national defense, 
including national emergency plans and emergency preparedness of 
private-sector communications organizations and continuity of FCC 
functions. Recently the commission established an internal advisory 
body, the FCC’s Homeland Security Policy Council, comprising senior 
managers from each of the FCC’s policy, licensing, and operational 
bureaus and offices. The Homeland Security Policy Council, which serves 
as an advisory council to the chairman on homeland security matters 
related to the communications industry, is headed by and reports 
directly to the chairman’s chief of staff. FCC establishes the rules 
under which the Emergency Alert System (EAS) operates. EAS provides a 
means of addressing the American people in the event of national 
emergency. Broadcast stations, cable systems, and participating 
satellite programmers install equipment that can transmit a 
presidential message to the public. FCC has created two Federal 
Advisory Committees to facilitate discussions on infrastructure 
protection. The Network Reliability and Interoperability Council and 
the Media Security and Reliability Council advise the commission on 
incident prevention, system restoration, reliability and public safety 
issues related to the communications industries.

U.S. Department of Commerce: 

PDD 63 assigned Commerce as the lead sector liaison for information and 
communications. Additionally, PDD 63 established a national plan 
coordination staff, which became the Critical Infrastructure Assurance 
Office, an interagency office housed in Commerce that is responsible 
for planning infrastructure protection efforts. Recently, Executive 
Order 13231 assigned the Secretary of Commerce to the President’s 
Critical Infrastructure Protection Board and established a standing 
committee for private-sector and state and local government outreach, 
which is chaired by a designee from Commerce. According to agency 
officials and federal documents, the organizations with critical 
infrastructure protection responsibilities are as follows: 

* the Critical Infrastructure Assurance Office (CIAO),

* the National Institute of Standards and Technology (NIST),

* the National Information Assurance Partnership (NIAP), and: 

* the National Telecommunications and Information Administration 
(NTIA).

Critical Infrastructure Assurance Office: 

As established under PDD 63, CIAO performs a variety of CIP functions 
in three major areas: (1) educating the private sector on the 
importance of CIP, (2) preparing the national CIP strategy, and (3) 
assisting federal civilian agencies and departments in determining 
their dependencies on critical infrastructures.

First, CIAO works to educate industry representatives that critical 
infrastructure assurance must be addressed through corporate risk 
management activities. Its efforts focus on the critical infrastructure 
industries (e.g., information and communications, banking and finance, 
transportation, energy, and water supply), particularly the corporate 
boards and chief executive officers who are responsible for setting 
policy and allocating resources for risk management. In addition to 
infrastructure owners and operators, this office’s awareness and 
outreach efforts also target members of the audit, insurance, and 
investment communities. CIAO’s goal is to educate these groups on the 
importance of assuring effective corporate operations, accountability, 
and information security.

Second, CIAO is tasked with working with government and industry to 
prepare the national strategy for CIP, which is due for completion in 
2002. This strategy will serve as the basis for CIP legislative and 
public policy reforms, where needed. The development of the national 
strategy for CIP is to also serve as part of an ongoing process in 
which government and industry will continuously modify and refine their 
efforts to ensure the safety of critical information systems.
Third, CIAO is responsible for assisting civilian federal agencies and 
departments in analyzing their dependencies on critical 
infrastructures. This mission is conducted under Project Matrix, a 
program designed to identify and characterize the assets and associated 
infrastructure dependencies and interdependencies that the government 
requires to fulfill its most critical responsibilities. Project Matrix 
involves a three-step process in which each federal civilian agency 
identifies (1) its critical assets; (2) other federal government 
assets, systems, and networks on which those critical assets depend to 
operate; and (3) all associated dependencies on privately owned and 
operated critical infrastructures.

Additional cyber CIP duties were added to CIAO under Executive Order 
13231, including having its director serve as a member of and advisor 
to the President’s Critical Infrastructure Protection Board. CIAO will 
also support the activities of the National Infrastructure Advisory 
Council, a group of 30 representatives from private industry and state 
and local government that will advise the President on matters relating 
to cybersecurity and CIP. In addition, CIAO will administer a Homeland 
Security Information Technology and Evaluation Program to study and 
develop methods to improve information sharing among federal agencies 
and state and local governments.

CIAO’s reported CIP funding to support these activities for fiscal 
years 2000 through 2002 has been about $4.4 million, $4.8 million, and 
$6.4 million, respectively.

National Institute of Standards and Technology: 

NIST is a nonregulatory federal agency within Commerce’s Technology 
Administration that works with industry, federal agencies, testing 
organizations, standards groups, academia, and private-sector users to 
improve critical infrastructure security. Policy guidance that directs 
NIST’s CIP-related activities includes Executive Order 13231, the 
Computer Security Act of 1987, the Government Information Security 
Reform Act of 2001, and OMB’s Circular A-130, Appendix III.
First, NIST supports federal departments and agencies by developing 
security standards and guidelines for sensitive federal systems as 
defined under the Computer Security Act of 1947. For example, the 
institute works with industry to develop voluntary industry standards 
that support cybersecurity, interoperability, and data exchange. Such 
standards are to be used to support the operation of the Internet. NIST 
participants formulate public specifications that assist industry to 
improve the security and competitiveness of commercial products and to 
inform consumers.

Second, NIST also helps to improve the security of commercial IT 
products that provide the communications and information processing 
backbone of the nation’s infrastructure. NIST develops tests, tools, 
profiles, implementation methods, and recommendations for timely and 
cost-effective testing programs. Validation programs developed by NIST 
are conducted in cooperation with private-sector testing laboratories.
NIST coordinates with a wide variety of IT security organizations in 
the federal government and the private sector. In the federal 
government, major constituents and collaborators include OMB, the 
National Security Agency, the General Services Administration, and the 
departments of Treasury and Health and Human Services. Key interactions 
include the Federal Public Key Infrastructure Steering Committee and 
its working groups, the Center for Internet Security, the Federal 
Computer Security Managers’ Forum, the Federal CIO Council, the 
Committee for National Security, and the Executive Branch Information 
Systems Security. Examples of IT industry associations with which NIST 
works include the banking standards community and the Smart Card 
Consortia. Some key industry collaborations include those with Intel, 
Microsoft, RSA, IBM, Counterpane Systems, Motorola, Entrust, and 
Certicom.

NIST’s CIP funding to support these activities for 2002 and 2003 has 
been $11 million and $15 million, respectively.

National Information Assurance Partnership: 

NIAP is a U.S. government initiative designed to meet the security 
testing, evaluation, and assessment needs of IT producers and 
consumers. NIAP collaborates with NIST and the National Security Agency 
in fulfilling their respective responsibilities under the Computer 
Security Act of 1987. The partnership, originated in 1997, promotes the 
development of technical security requirements for IT products and 
systems and appropriate metrics for evaluating those products and 
systems. NIAP collaborates with government agencies and industry in a 
variety of areas to help meet current and future IT security challenges 
affecting the nation’s critical information infrastructure. One recent 
NIAP initiative under way is collaborating with industry in developing 
protection profiles for key information technologies supporting 
homeland defense.

National Telecommunications and Information Administration: 
As the lead agency for the information and communications 
infrastructure sector under PDD 63, Commerce was assigned 
responsibility for economic security aspects of CIP, which it delegated 
to NTIA. To fulfill its mission, NTIA conducts five major activities. 

First, it works to raise the information and communications sector’s 
awareness of cyber vulnerabilities and risks. It then assists this 
sector in eliminating or mitigating these vulnerabilities. Third, it 
facilitates the establishment and operation of the information and 
communications sectors’ ISACs. Fourth, it develops partnerships with 
other countries and international organizations to achieve compatible 
security policies and strategies. Finally, it provides industry with 
results from government-based research and development efforts 
regarding CIP.

To fulfill these responsibilities, NTIA coordinates with a variety of 
organizations within the government and the private sector. Within 
Commerce, NTIA coordinates primarily with the CIAO and NIST. Within the 
federal government, NTIA coordinates with the chair of the President’s 
Critical Infrastructure Protection Board. Within the private sector, 
NTIA works with three trade associations that serve as sector 
coordinators: the Information Technology Association of America, the 
Telecommunications Industry Association, and the United States Telecom 
Association.

U.S. Department of Defense: 

PDD 63 identifies national defense as a special function related to CIP 
and designates DOD as the lead agency for this function. Recently, 
Executive Order 13231 assigned the Secretary of Defense to the 
President’s Critical Infrastructure Protection Board and established 
three standing committees that will be chaired or co-chaired by DOD, 
including the Committee on National Security Systems, the Incident 
Response Coordination Committee, and the Physical Security Committee. 
According to agency officials and federal documents, the organizations 
with critical infrastructure protection responsibilities are as 
follows: 

* the Joint Staff;

* the Office of the Assistant Secretary of Defense, Command, Control, 
Communications, and Intelligence (ASD/C3I);

* the Defense Advanced Research Projects Agency (DARPA);

* the Defense Threat Reduction Agency (DTRA);

* the National Security Agency (NSA);

* the Defense Intelligence Agency (DIA); and: 

* the Joint Task Force for Computer Network Operations (JTF-CNO).
Joint Staff: 

The Joint Chiefs of Staff serve as the primary military advisors to the 
President and, regarding CIP, the chairman of the Joint Chiefs of Staff 
is responsible for ensuring that critical assets are identified for 
executing deliberate and crisis action plans and planning for 
mitigating their loss or disruption. Within the Joint Chiefs of Staff, 
the Joint Staff serves as special function representative for military 
plans and operations within the DOD CIP Integration Staff. The Joint 
Staff is divided into eight directorates: J1-Manpower; J2-Intelligence; 
J3-Operations; J4-Logistics; J5-Strategic Plans; J6-Command, Control, 
Communications, and Computers (C4) Systems; J7-Operational Plans; and 
J8-Force Structure. The J5 CIP office governs the physical aspects of 
CIP, and the J6 directorate governs the cyber aspects and 
responsibilities for the Joint Staff.

DOD’s Joint Staff coordinates with several organizations, including 
Combatant Commands; Services; various government agencies; the 
President’s Critical Infrastructure Protection Board, chaired by the 
Office of Cyberspace Security; the CIAO at Commerce; the NIPC in the 
FBI; the ASD/C3I; DOT, Office of Security and Intelligence; Office of 
Homeland Security, Senior Director-Protection and Prevention; the 
National Security Incident Response Center, chaired by the National 
Security Agency; the Defense Information Systems Agency; DOD’s Computer 
Emergency Response Teams (CERT); the Joint Task Force Computer Network 
Defense; FedCIRC; and the Carnegie Mellon CERT® Coordination Center.

The Joint Staff did not receive a specific CIP appropriation before the 
Defense Emergency Response Funding, which was provided in response to 
the attacks on September 11. The Joint Staff received $500,000 for CIP 
through the Defense Emergency Response Funding that was specifically 
earmarked for CIP in addition to funds not specifically earmarked for 
CIP.

Office of the Assistant Secretary of Defense, Command, Control, 
Communications and Intelligence: 

In accordance with PDD 63, DOD is responsible for identifying the 
national defense infrastructure and working with the national CIP 
organizational structure and the private sector to ensure its 
protection. ASD/C3I manages DOD’s CIP program and is responsible for 
its CIP policy development. DOD’s CIP program is developing to ensure 
that critical cyber and physical infrastructure assets that DOD depends 
on are available to mobilize, deploy, and sustain military operations. 
ASD/C3I (CIP) develops CIP policy, advocates funding, and oversees 
implementation of the CIP program. This office oversees DOD’s Critical 
Infrastructure Protection Integration Staff (CIPIS). CIPIS receives 
input from DOD’s defense sectors, lead components, and special function 
components.

Defense Advanced Research Projects Agency: 

Executive Order 13231 directs DARPA to work in coordination with the 
National Science Foundation as members of the President’s Critical 
Infrastructure Protection Board’s Committee on Research and 
Development. In this capacity, DARPA is to assist with federal 
government research and development for protecting critical 
infrastructure information systems, including emergency preparedness 
communications and the physical assets that support such systems, and 
ensure that government activities are coordinated with corporations, 
universities, federally funded research centers, and national 
laboratories. DARPA’s Information Technology Office performs research 
on information technologies for use in advanced defense applications. 
The office’s mission is to provide the networking and computing 
hardware, software, systems, and management technologies vital to 
ensuring DOD’s military superiority. The office is addressing IT issues 
of strategic concern, such as security, interoperability, and 
survivability technologies.

Defense Threat Reduction Agency: 

Directed by PDD 63, DTRA’s CIP-related efforts encompass technology 
development and combat support. This agency’s technology development 
efforts include managing the development of the National Infrastructure 
Simulation and Analysis Center (NISAC) and the technical development 
under its Mission Degradation Analysis (MIDAS) program. NISAC is a 
joint effort between DTRA and Department of Energy’s (DOE) national 
laboratories to develop an architecture to simulate and analyze the 
nation’s civilian infrastructures. The MIDAS program is a research 
effort to determine DOD mission degradation due to degradation in 
supporting infrastructures. DTRA’s combat support efforts include 
Balanced Survivability Assessments, Joint Staff Integrated 
Vulnerability Assessments, and the Chemical-Biological Sea Port 
Protection Analysis.

DITRA’s director reports directly to the Assistant to the Secretary of 
Defense, Nuclear Chemical Biological. Regarding CIP research and 
development, DTRA coordinates with internal DOD offices and DOE, and 
has begun to coordinate with the Office of Homeland Security in 
managing NISAC.

DTRA received appropriations designated for some of its CIP and CIP-
related projects for fiscal years 2000, 2001, and 2002, but funding for 
the remaining CIP efforts were funded through the agency’s budgeting 
process. MIDAS received the following amounts in appropriations: fiscal 
year 2000, $1.7 million; fiscal year 2001, $2.4 million; and fiscal 
year 2002, $2.7 million. The Critical Infrastructure Protection Act of 
2001, which was enacted as part of the USA PATRIOT Act, authorized $20 
million for NISAC for fiscal year 2002. The Balanced Survivability 
Assessments effort received $8.9 million in fiscal year 2000, $15.8 
million in fiscal year 2001, and $17.6 million in fiscal year 2002.

National Security Agency: 

NSA’s primary CIP mission is protecting national security 
telecommunications and information systems. The Information Assurance 
Director falls under the purview of the Director, NSA, who is 
responsible for fulfilling NSA’s CIP duties. NSA’s IAD performs these 
duties through assessing the vulnerability of the security of 
information systems, assessing operations security; evaluating and 
assessing security measures in national security systems; and 
addressing the threat, detection, reaction, warning, and response to 
intrusions into national security systems.

Furthermore, the National Security Incident Response Center is NSA’s 
focal point for addressing computer incidents affecting the U.S. 
government’s national security information systems. The center’s CIP 
duties include providing warnings of threats against U.S. information 
systems in a timely manner and providing assistance to defense and 
civil agencies in isolating, containing, and resolving incidents that 
threaten national security systems. The center also assists the JTF-
CNO, FedCIRC, and NIPC in isolating, containing, and resolving attacks 
and unauthorized intrusions threatening national security systems. 
NSIRC coordinates its incident reporting and vulnerability assessments 
with these entities for attacks and intrusions directed against 
national security systems. The center’s vulnerability assessments are 
used to develop hardware and software computer network defenses. NSA 
works with NIST to evaluate commercial off-the-shelf products. In 
addition, NSA coordinates with the President’s Critical Infrastructure 
Protection Board, the Committee for National Security Systems, and ASD/
C3I.

Defense Intelligence Agency: 

DIA’s CIP mission includes collecting and analyzing intelligence data 
concerning threats to and vulnerabilities of critical infrastructures. 
A senior staff member of the agency serves as the DOD Intelligence, 
Surveillance, and Reconnaissance (ISR) CIAO, as well as the 
Intelligence Special Function Coordinator for all DOD sectors. The ISR 
CIAO is responsible for developing the ISR Sector Assurance Plan and 
the ISR Sector Registered Asset List of identified critical assets. 
These roles are a key element of the DOD-wide CIP program led by ASD/
C3I.

DIA received appropriations for some of its CIP and CIP-related 
projects for fiscal years 2000, 2001, and 2002, but funding for the 
remaining CIP efforts were funded through the DIA’s budgeting process.

Joint Task Force--Computer Network Operations: 

JTF-CNO, the United States Space Command’s operational component for 
computer network operations, is the primary DOD organization for 
coordinating and directing internal activities to detect computer-based 
attacks, contain damage, and restore computer functionality when 
disruptions occur. JTF-CNO leverages the existing intrusion detection 
capabilities of the unified commands, its components, and DOD and non-
DOD agencies. JTF-CNO receives intrusion data from these sources and 
integrates these data with intelligence, operational, and technical 
data. The 2001 JTF-CNO expansion is to allow it to increase JTF-CNO’s 
ability in (1) performing preventative activities, such as conducting 
security reviews and issuing vulnerability alerts; (2) coordinating and 
monitoring detection activities performed by components, including 
monitoring automated intrusion-detection systems; (3) investigating 
and diagnosing incidents; and (4) handling and responding to events, 
which involves disseminating information and providing technical 
assistance to system administrators so that they can appropriately 
respond to cyberattacks. JTF-CNO maintains a relationship with CERT®/
CC, NIPC, and FedCIRC by participating in joint technical exchanges, 
working groups, and countermeasure development teams.

Director of Central Intelligence: 

PDD 63 identifies intelligence as a special function related to CIP and 
designates the Central Intelligence Agency (CIA) as the lead agency for 
this function. Recently, Executive Order 13231 assigned the Director of 
Central Intelligence to the President’s Critical Infrastructure 
Protection Board. Additionally, the National Security Act of 1947 
designates the Director of Central Intelligence as the primary adviser 
on national foreign intelligence to the President and the National 
Security Council, as well as to officials who make and execute U.S. 
national security policy.

According to agency officials and federal documents, the organizations 
with critical infrastructure protection responsibilities are as 
follows: 

* the Central Intelligence Agency (CIA),

* the National Intelligence Council (NIC), and: 

* the National Foreign Intelligence Board (NFIB).

Central Intelligence Agency: 

The CIA’s mission is to provide accurate, comprehensive, and timely 
intelligence on national security topics. PDD 63 directed the CIA to 
enhance its capabilities to provide intelligence support for threat 
assessment and warning and to engage in incident response as needed. 
Since that time, the agency reports that it has made improvements in 
analytic capabilities and intragovernment coordination regarding 
mutual analysis, information sharing, and computer incident responses. 
In addition, the agency established the Information Operations Center 
to address the growing cyberthreats. CIA involvement in protecting the 
information infrastructure also extends to participating with other 
federal agencies and the private sector. In particular, the CIA has 
assisted the FBI’s NIPC by providing technical and analytic support and 
disseminating cyberthreat assessments. In addition, CIA has 
collaborated with NIPC and others in the intelligence community to 
develop and present outreach briefings on foreign cyberthreats to key 
infrastructure stakeholders, including elements of the private sector.
CIA collects foreign intelligence information through a variety of 
clandestine and overt means. First, the Directorate of Operations has 
primary responsibility for the clandestine collection of foreign 
intelligence. This directorate is divided administratively into area 
divisions, as well as several staffs, centers, and one division that 
deals with transnational issues. Second, the Directorate of Science and 
Technology (DS&T) provides a wide range of collection support to the 
CIA and the intelligence community, including human source intelligence 
collection efforts and agent communications. This directorate supports 
the National Imagery and Mapping Agency with a cadre of affiliated 
personnel who serve in key technical positions. Open-source collection 
(collection of information from foreign radio, television, newspapers, 
magazines and journals, commercial databases, etc.) is also 
administered in the DS&T. In addition, this directorate provides 
collection support for signal intelligence and measurement and 
signature intelligence.

Once the intelligence has been collected, CIA analysts produce a 
variety of finished intelligence products that support national-level 
policy deliberations. The Directorate of Intelligence serves as the 
executive agency for meeting the bulk of CIA’s finished intelligence 
products for the policy-making community through a number of 
suboffices, including the Office of Russian and European Analysis; the 
Office of Near Eastern, South Asian, and African Analysis; the Office 
of Asian Pacific and Latin American Analysis; and the Office of 
Transnational Issues. In addition, DS&T produces a number of 
unclassified products derived from open-source materials.

National Intelligence Council: 

The National Intelligence Council serves as a senior advisory group to 
the DCI in his capacity as leader of the intelligence community. This 
council is responsible for determining and promulgating the 
intelligence community’s judgments on issues of importance to 
policymakers. Consequently, most of its publications are produced by 
interagency teams and formally coordinated with all intelligence 
agencies possessing relevant expertise.

NIC comprises national intelligence officers, experts drawn from all 
elements of the intelligence community, from outside of government in 
academia, and from the private sector. National intelligence officers 
provide mid-and long-term strategic thinking and production by 
concentrating on substantive problems of particular geographic regions 
of the world and of particular functional areas (economic and global 
issues, general-purpose forces, science and technology, strategic 
programs and nuclear proliferation, and warning). NIC supervises the 
production of national intelligence estimates and publications, briefs 
senior policymakers, and focuses intelligence community collection and 
analytic resources on priority issues. In particular, this council has 
produced several documents related to CIP, including a classified 2001 
national intelligence estimate on cyberthreats.

National Foreign Intelligence Board: 

The National Foreign Intelligence Board, an advisory board to the 
Director of Central Intelligence, has existed in one form or another 
since the founding of the CIA in 1947. The board includes 
representatives from all of the agencies that make up the intelligence 
community (including NIC, CIA, DOD, State, Treasury, FBI, and DOE). In 
particular, the board is responsible for producing, reviewing, and 
coordinating national foreign intelligence, and the bulk of its work is 
to review and approve national intelligence estimates that are created 
by NIC.

U.S. Department of Energy: 

PDD 63 assigned DOE as the lead sector liaison for the national energy 
infrastructure, including electric power and oil and gas production and 
storage. Recently, Executive Order 13231 assigned the Secretary of 
Energy to the President’s Critical Infrastructure Protection Board and 
established a standing committee for infrastructure interdependencies, 
which is co-chaired by designees from DOE and DOT. According to agency 
officials and federal documents, the organizations with critical 
infrastructure protection responsibilities are as follows: 

* the Office of Energy Assurance (OEA) and: 

* the National Laboratories.

Office of Energy Assurance: 

According to its officials, DOE is currently restructuring the offices 
that handle security and emergency management for both physical-and 
cyber-based CIP under the OEA. This office will work with the states 
and industry to allow for a secure and reliable flow of energy to 
America’s home, industry, and public-service facilities, as well as the 
transportation system, in direct support of the President’s national 
energy policy and PDD 63.

Three offices will carry out OEA’s functions. First, the Office of 
Energy Reliability coordinates DOE policy development and 
intergovernmental and interagency activities related to the protection 
and reliability of the national energy infrastructure. This office will 
be responsible for developing and maintaining a national strategy for 
energy assurance in support of the President’s national energy policy. 
It will also provide leadership for intradepartmental energy-assurance 
activities and represent DOE in interagency, intergovernmental, and 
other energy-assurance-related forums. The office will develop a 
national tracking and reporting process to assess the ongoing 
effectiveness of the national strategy to identify shortfalls and 
develop corrective action plans.

Second, the Office of Energy Emergencies will work to ensure that DOE 
can support state and industry efforts to plan for, respond to, and 
mitigate actions that disrupt the energy infrastructure. The office 
will identify potential threats to the national energy infrastructure 
and communicate information about them to the appropriate authorities 
to facilitate emergency planning and response. This communications and 
liaison network will also be maintained during emergencies. The office 
will develop plans for federal responses to energy emergencies. In 
addition, the office will assist states and industry by providing 
technical and professional assistance in the development, testing, and 
revision of their own emergency response plans.

Third, the Office of Critical Infrastructure Protection will work with 
national energy organizations within the government and private 
industry in developing the capability required for protecting the 
nation’s energy infrastructure. The office will assess the 
vulnerability of the national energy infrastructure to cyber or 
physical disruptions and identify technologies and capabilities that 
can protect our nation’s critical energy infrastructures and facilitate 
their use by the private sector and federal agencies. The office will 
develop and maintain interdependency models and planning tools to 
assist federal and state government and private industry in 
anticipating system failures and understanding the cascading effects of 
single point failures (system failures experienced at centralized 
network hubs). In addition, the office will coordinate national 
laboratory research and development programs related to mitigating 
national energy infrastructure vulnerabilities. This office will be 
DOE’s representative to the Critical Infrastructure Coordination Group 
and the National Infrastructure Assurance Council.

National Laboratories: 

DOE funds several national laboratories that conduct CIP-related 
research. For example, Argonne Laboratories has been working on CIP 
since 1997 by performing system mapping activities and vulnerability 
testing. Also, Sandia National Laboratories has established the 
Information Design Assurance Red Team (IDART). The team works in the 
areas of information operations and security of critical 
infrastructures. IDART assessments evaluate projects and programs for 
system vulnerabilities in the areas of information warfare, information 
assurance, and information security.

U.S. Department of Justice: 

PDD 63 assigned Justice as the lead sector liaison for emergency law 
enforcement services and for the special function of law enforcement 
and internal security. Recently, Executive Order 13231 assigned the 
Attorney General or designee to the President’s Critical Infrastructure 
Protection Board and co-chair of the Incident Response Coordination and 
Physical Security committees. According to agency officials and federal 
documents, the organizations with critical infrastructure protection 
responsibilities are as follows: 

* the Computer Crime and Intellectual Property Section (CCIPS),

* the National Infrastructure Protection Center (NIPC),

* the National Counter Intelligence Executive (NCIX), and: 

* the Cyber Crime Division.

Computer Crime and Intellectual Property Section: 

Within the Criminal Division, the CCIPS investigates and prosecutes 
cyberattacks on our nation’s critical infrastructure. This section also 
addresses policy and legislation issues such as information sharing 
among the military, the intelligence community, law enforcement, 
civilian agencies and the private sector, as well as government network 
intrusion detection and strategic planning. CCIPS coordinates with DOD, 
CIAO, NIPC, NSC, and interagency groups that work on CIP issues, 
including work on the national plan to defend cyberspace and the cyber 
portion of the 5-year counterterrorism plan.

National Infrastructure Protection Center: 

NIPC, a multiagency organization located within the FBI, detects, 
analyzes, and warns of cyberthreats to and/or attacks on the 
infrastructure, should they occur. NIPC’s mission is based on 
authorities given in Executive Order 13231 and PDD 63. In addition, the 
center is responsible for accomplishing the FBI’s role as lead agency 
for sector liaison for the Emergency Law Enforcement Services Sector. 
As a sector liaison, NIPC provides law enforcement response for 
cyberthreats and crimes involving or affecting critical 
infrastructures. NIPC also facilitates and coordinates the federal 
government’s response to cyber incidents, mitigating attacks, and 
investigating threats, as well as monitoring reconstitution efforts. 
NIPC regularly coordinates with federal, state, local, and law 
enforcement and intelligence agencies resident in the NIPC: FBI, DOD, 
CIA, NSA, the United States Secret Service (USSS), Commerce, DOT, DOE, 
and other federal agencies on the President’s Critical Infrastructure 
Protection Board, as well as Canada and Great Britain.
In addition, NIPC runs the National InfraGard program, which is a 
cooperative undertaking between the federal government and an 
association of businesses, academic institutions, state and local law 
enforcement agencies, and other participants dedicated to increasing 
the security of critical infrastructures. InfraGard’s goal is to enable 
the flow of information so that the owners and operators of 
infrastructure assets, the majority of which are from the private 
sector, can better protect themselves and so that the U.S. government 
can better discharge its law enforcement and national security 
responsibilities. InfraGard provides members a forum for education and 
training on infrastructure vulnerabilities and protection measures and 
with threat advisories, alerts, and warnings.

NIPC comprises three sections: (1) the Computer Investigations and 
Operations Section, which is the operational and response arm and is 
responsible for designing, developing, implementing, and managing 
automated tools NIPC uses to collect, analyze, share, and distribute 
information; and coordinating computer investigations conducted by the 
FBI’s 56 field offices and approximately 400 sublocations throughout 
the country; (2) the Analysis and Warning Section, which is the 
indication and warning arm, which provides support during computer 
intrusion investigations; and (3) the Training, Outreach, and Strategy 
Section, which provides outreach to the private sector and to local law 
enforcement, and training and exercise programs for cyber and 
infrastructure protection investigators within the FBI and other 
agencies. NIPC’s funding to support these activities for fiscal years 
2000 through 2002 has been $21 million, $26 million, and $72 million, 
respectively.

National Counter Intelligence Executive: 

Executive Order 13231 requires NCIX to coordinate with the President’s 
Critical Infrastructure Protection Board to address threats from 
hostile foreign intelligence services to programs within the board’s 
purview. Created by PDD 75, “Counterintelligence for the 21st Century,” 
NCIX is appointed by, and reports to, the Director of the FBI, who is 
the chair of the Counterintelligence Board of Directors. NCIX serves as 
the substantive leader of national-level counterintelligence, 
identifying critical assets, producing strategic counterintelligence 
analyses, developing a national threat assessment, formulating a 
national counterintelligence strategy, creating an integrated 
counterintelligence budget, and developing an agenda of program reviews 
and evaluations.

Cyber Crime Division: 

A recent restructuring within the FBI has resulted in a new division 
called the Cyber Crime Division. The mission of this division has not 
been finalized.

U.S. Department of Transportation: 

PDD 63 assigned DOT as the lead sector liaison for aviation, highways, 
mass transit, pipelines, rail, and waterborne commerce. Recently, 
Executive Order 13231 assigned the Secretary of Transportation or 
designee to the President’s Critical Infrastructure Protection Board 
and as co-chair of the Infrastructure Independencies Committee. 
According to officials, DOT is in the process of establishing the 
Transportation Security Administration, which was required by the 
Aviation and Transportation Security Act (P.L. 107-71, Nov. 19, 2001). 
According to its officials, the department is still determining how CIP 
responsibilities might be aligned under the new organization. 
Currently, the Office of Intelligence and Security (OIS) is 
Transportation’s lead office in fulfilling its national CIP 
responsibilities.

Office of Intelligence and Security: 

Within the Office of the Secretary of Transportation, OIS analyzes, 
develops, and coordinates departmental and national policies addressing 
national defense, border security, and transportation infrastructure 
assurance and protection issues. The office also coordinates with the 
public and private sectors, international organizations, academia, and 
interest groups regarding issues of infrastructure protection, national 
defense, and drug and migrant interdiction, including serving as the 
DOT CIP coordinator and sector liaison official under PDD 63 and its 
lead for both PDD 62 and Executive Order 13231.
Outside DOT, OIS serves the secretary as the transportation sector 
liaison official under PDD 63. To fulfill this role, OIS establishes 
sector coordinators, such as the Association of American Railroads and 
the Airport Councils International-North America, and is the primary 
liaison with the Office of Homeland Security, the Office of Cyberspace 
Security, the intelligence and law enforcement community, and DOD, 
especially the U.S. Transportation Command. OIS is the transportation 
sector’s primary point of contact for all security issues, including 
coordinating countermeasures and disseminating threat information.

Environmental Protection Agency: 

PDD 63 designates the Environmental Protection Agency (EPA) as the lead 
agency for sector liaison for protecting the water supply. Presidential 
decision directives 39, 62, and 63 mandate EPA participation in a 
federal response program specifically aimed at preparing for and 
responding to terrorist incidents. According to agency officials, EPA 
and the Office of Homeland Security are currently discussing also 
designating EPA as the lead agency for sector liaison for chemical 
preparedness. The Office of Water is the lead EPA office in fulfilling 
EPA’s national CIP responsibilities.

Office of Water: 

As a result of concerns raised since September 11, the Office of Water 
has expanded its focus to provide technical and financial assistance 
for vulnerability assessments, and emergency response planning for 
drinking water and wastewater utilities. This office also works to 
improve knowledge and develop new technologies that will help utilities 
protect assets and public health through cooperative research with 
other federal agencies and nongovernmental organizations. Finally, the 
Office of Water facilitates communications among utilities and 
government officials at all levels regarding preparedness and response 
activities involving the water sector. In this regard, the office 
currently is reviewing the interdependencies between areas such as 
energy, wastewater, and transportation.

Federal Emergency Management Agency: 

PDD 63 assigned FEMA as the lead sector liaison for the emergency fire 
service and continuity of government and the responsibility for 
developing a national infrastructure assurance plan. In addition, 
Executive Order 13231 assigned the Director of FEMA or designee to the 
President’s Critical Infrastructure Protection Board. FEMA supports 
state and local emergency-management programs by funding emergency 
planning, training emergency managers and local officials, conducting 
large-scale tests, and sponsoring programs that teach the public how to 
prepare for disasters. According to FEMA officials, the agency’s CIP 
roles are still evolving. In the past, FEMA focused primarily on 
physical preparedness, response, and recovery. However, recently, FEMA 
officials stated that the agency is exploring ways to better help local 
officials regarding cyber issues. FEMA plans to handle cyberattacks 
similar to the outreach done for natural disasters. According to agency 
officials and federal documents, the organizations with critical 
infrastructure protection responsibilities are as follows: 

* the Office of National Preparedness (ONP),

* the United States Fire Administration (USFA), and: 

* the Office of the Chief Information Officer (OCIO) and Information 
Technology Services Directorate.

Office of National Preparedness: 

Regarding CIP, the Office of National Preparedness provides leadership 
in coordinating and facilitating all federal efforts to assist state 
and local emergency-management and emergency-response organizations. 
The assistance includes planning; training; equipment and exercises 
necessary to build and sustain the capability to respond to any 
emergency or disaster, including a terrorist incident involving a 
weapon of mass destruction, as well as other natural or man-made 
hazards. This office coordinates with the Office of Homeland Security 
to develop a national strategy to protect against, respond to, and 
recover from terrorist threats and incidents that affect the United 
States and its citizens. To fulfill this goal, the Office of National 
Preparedness coordinates, integrates, and implements all federal 
programs and activities that develop, build, and maintain federal, 
state, and local consequence management capabilities, including first 
responders. It coordinates, implements, and administers a national 
capability assurance program that employs standards, assessments, 
exercises, lessons learned from disasters, and corrective actions to 
ensure fully interoperable and continually validated federal, state, 
and local response capabilities. This office also administers grant 
programs for obtaining the needed levels of consequence management 
capabilities at the state and local levels of government. ONP’s 
director, who has been designated as the FEMA/CIAO, oversees FEMA’s PDD 
63 sector responsibilities in support of emergency fire services and 
continuity of government services.

United States Fire Administration: 

The United States Fire Administration maintains a CIP information 
center that serves as the information sharing and analysis center for 
the emergency fire services sector as envisioned under PDD 63. The 
center provides information to over 33,000 local fire and rescue 
departments, who, as emergency first responders, have the 
responsibility to prioritize the infrastructures that must be protected 
from attack. The Fire Administration also maintains the national fire 
data center, which proposes possible solutions and national priorities, 
monitors resulting programs, and provides information to the public and 
fire organizations.

Office of the Chief Information Officer and Information Technology 
Services Directorate: 

The Chief Information Officer (CIO) will support FEMA’s CIAO in an 
advisory capacity for all cyber infrastructure protection issues, 
including those that affect the sectors for which FEMA is the lead 
agency. As FEMA’s executive agency for cybersecurity, the CIO will also 
support FEMA’s CIAO in meeting its PDD 63 responsibilities for internal 
cyber infrastructure protection. Finally, the CIO will advise the 
sector liaisons for emergency fire services and continuity of 
government services on cyber infrastructure issues.

U.S. General Services Administration: 

Recently, Executive Order 13231 assigned the Administrator of the GSA 
to the President’s Critical Infrastructure Protection Board. According 
to agency officials and federal documents, the organizations with 
critical infrastructure protection responsibilities are as follows: 

* the Federal Computer Incident Response Center (FedCIRC) and: 

* the Office of Acquisition Policy.

Federal Computer Incident Response Center: 

In support of PDD 63 and the Government Information Security Reform 
Act, FedCIRC provides a central focal point for computer incident 
reporting, providing assistance to civilian agencies with independent 
prevention and response. GSA administers FedCIRC through the Office of 
Information Assurance and Critical Infrastructure Protection in the 
Federal Technology Service. FedCIRC’s mission is to ensure that the 
government has critical services available to withstand or quickly 
recover from attacks against its information resources.
FedCIRC provides the means for federal agencies to work together to 
handle security incidents, share related information, solve common 
security problems, collaborate with the President’s Critical 
Infrastructure Protection Board and the NIPC for planning future 
infrastructure protection strategies and deal with criminal activities 
that pose a threat to the critical information infrastructure. FedCIRC 
distributes advisories and vulnerability notes via e-mail and on its 
home page, as well as through a quarterly newsletter for information 
security managers/officers and system administrators.
FedCIRC provides a computer security incident-response service to 
collect and analyze incident information from all federal civilian 
agencies. With this service, incidents can be rapidly analyzed so that 
warnings are issued when a threat is discovered. In addition, FedCIRC 
researches and analyzes computer incidents and vulnerabilities in 
detail to identify potential risks to the information infrastructure 
and works with the IT community to address and resolve these risks. 
Beginning in June 2002, FedCIRC is offering a “patch authentication and 
dissemination capability” to identify vendor patches needed to correct 
known vulnerabilities in agency computer systems. FedCIRC will notify 
agencies when vulnerabilities are identified, test the patches to 
verify that they correct the intended vulnerabilities, and make them 
available to agencies.

FedCIRC’s funds specifically appropriated for cyber CIP for fiscal 
years 2002 and 2003 were $10 million and $11 million, respectively.

Office of Acquisition Policy: 

PDD 63 tasked GSA, in coordination with Commerce and DOD to assist 
federal agencies in implementing best practices for information 
assurance within their individual agencies. In addition, GSA is to 
identify large procurements related to infrastructure assurance, study 
whether the procurement process reflects the importance of 
infrastructure protection and, if necessary, propose revisions to the 
overall procurement process. The Office of Acquisition Policy has a 
major role in developing, maintaining, issuing, and administering 
guiding principles via the Federal Acquisition Regulation, which is 
applicable to all executive branch agencies.

Department of Health and Human Services: 

PDD 63 appoints the Department of Health and Human Services (HHS) as 
the lead agency for sector liaison for protection of the health 
services infrastructure. This role includes public health services and 
prevention, surveillance, laboratory services, and personal health 
services. In addition, Executive Order 13231 assigned the Secretary of 
HHS or designee to the President’s Critical Infrastructure Protection 
Board. Agency officials stated that the department is experiencing many 
changes and reorganizations and, as a result, is reexamining its 
responsibilities for CIP. HHS’s Deputy Secretary is charged with 
overall responsibility for the CIP program, and the department’s PDD 63 
responsibilities are evolving. The Office of Emergency Preparedness 
(OEP) is HHS’s lead office in fulfilling its national CIP 
responsibilities.

Office of Emergency Preparedness: 

The Office of Emergency Preparedness has departmental responsibility 
for managing and coordinating federal health; medical-and-health-
related social services; and recovery to major emergencies and 
federally declared disasters, including natural disasters, 
technological disasters, major transportation accidents, and 
terrorism. As the lead federal agency for health and medical services 
within the federal response plan, HHS designated this office to work in 
partnership with FEMA and the federal interagency community. The Office 
of Emergency Preparedness also directs and manages the National 
Disaster Medical System, a cooperative asset-sharing partnership 
between HHS, DOD, the Department of Veteran Affairs, FEMA, state and 
local governments, private businesses, and civilian volunteers. The 
office is also responsible for federal health and medical response to 
terrorist acts involving weapons of mass destruction.

National Science Foundation: 

The National Science Foundation (NSF) funds CIP-related research in 
reliable and secure cyber infrastructures, including research on 
computer and network security and assured information technologies 
intended to provide sustainable communications and operations in the 
aftermath of a catastrophic event. NSF’s CIP-related funding also 
includes research on decision science; emergency response and recovery; 
and the interdependencies and vulnerabilities of physical 
infrastructure systems, including electrical power, transportation, 
energy, and water. Under Executive Order 13231, NSF participates in the 
Critical Infrastructure Protection Board Research and Development 
Standing Committee and Working Committee and supports studies at the 
request of the President’s Critical Infrastructure Protection Board. 
Previously, the foundation participated in the interagency Critical 
Infrastructure Protection Working Group established in response to PDD 
63. NSF is involved in other research and development coordination 
efforts relevant to CIP, including a leadership role in the Information 
Technology Research and Development Working Group and interaction with 
the Presidential Information Technology Advisory Committee. Its 
responsibilities established under PDD 63 include education for a 
cybersecurity workforce.

U.S. Department of State: 

The Department of State advises the President on foreign policy and 
relations. Accordingly, PDD 63 assigned State as the lead for the 
special function of foreign affairs, and Executive Order 13231 assigned 
the Secretary of State or his designee to the President’s Critical 
Infrastructure Protection Board, on which State serves as chair of the 
International Affairs Committee. According to agency officials and 
federal documents, the organizations with critical infrastructure 
protection responsibilities are as follows: 

* the Bureau of Resource Management (RM),

* the Bureau of Diplomatic Security (DS),

* the Bureau of Political-Military Affairs (PM),

* the Bureau of International Narcotics and Law Enforcement (INL), and: 

* the Bureau of Economic and Business Affairs (EB).

Bureau of Resource Management: 

The Assistant Secretary for Resource Management is responsible for 
managing the formal department-wide CIP program plan by serving as 
chair of the Department’s Critical Infrastructure Protection Governance 
Board. The Governance Board facilitates the decision making process on 
policy and priorities relating to CIP within the Department. In 
addition, the Resource Management Bureau is responsible for ensuring 
that the formal departmentwide CIP program is managed and fully 
resourced over a multiyear planning period to achieve the CIP 
objectives of PDD 63 for both domestic and overseas operations.

Bureau of Diplomatic Security: 

The Assistant Secretary for Diplomatic Security is the Department’s 
Chief Infrastructure Assurance Officer, who oversees the protection of 
all other aspects of the department’s critical infrastructure. The 
Bureau of Diplomatic Security provides a secure environment for 
conducting American diplomacy and promoting American interest 
worldwide. Regarding CIP, this bureau develops and maintains effective 
security programs for every U.S. embassy and consulate abroad. In 
addition, the bureau monitors and analyzes intelligence on terrorist 
activities and threats directed against Americans and U.S. diplomatic 
facilities overseas, as well as threats against U.S. officials, 
visiting foreign dignitaries, resident foreign diplomats, and foreign 
missions in the United States.

Bureau of Political-Military Affairs: 

The PM Bureau provides policy direction in the areas of international 
security, military coordination and peace operations, and arms trade. 
Its responsibilities include developing regional security policy, 
security assistance, arms transfers, confidence and security building 
measures, humanitarian de-mining programs, CIP, burden sharing, and 
complex contingency operations and contingency planning. Regarding 
federal CIP efforts, this bureau is responsible for coordinating and 
implementing interagency and intradepartmental policy development. To 
accomplish this goal, PM leads international cooperation on CIP issues. 
In addition, Executive Order 13231 assigned this bureau responsibility 
for the international CIP outreach program. PM’s Assistant Secretary 
serves as State’s alternate representative on the President’s Critical 
Infrastructure Protection Board and chair of the Board’s International 
Affairs Committee.

Bureau of International Narcotics and Law Enforcement: 

INL has specific responsibility for CIP-related issues involving 
criminal misuse of information technology (e.g., cybercrime). This 
bureau also coordinates and funds the response of federal law 
enforcement to requests for training and technical assistance from 
foreign partners, including assistance in fighting high-technology 
crime, an important subset of protecting critical networked systems.

Bureau of Economic and Business Affairs: 

The EB bureau is responsible for CIP-related issues in multilateral 
economic organizations, such as the Organization for Economic 
Cooperation and Development, and the Asia Pacific Economic Cooperation 
forum. In such forums, the bureau works to develop internationally 
accepted information technology security standards and best practices 
and to ensure that government information security regimes include 
input from private stockholders.

U.S. Department of the Treasury: 

PDD 63 assigned Treasury as the lead sector liaison for banking and 
finance. Recently, Executive Order 13231 designated the Secretary of 
the Treasury a member of the President’s Critical Infrastructure 
Protection Board and created the Financial and Banking Information 
Infrastructure Committee (FBIIC), which is chaired by the Treasury 
Assistant Secretary for Financial Institutions. In addition, Executive 
Order 13228 includes several policy coordinating committees that 
regularly seek Treasury’s input and cooperation. According to agency 
officials and federal documents, the organizations with national or 
multiagency cyber critical infrastructure protection responsibilities 
are as follows: 

* the Office of Financial Institutions (OFI),

* the United States Secret Service (USSS),

* the Office of the Comptroller of the Currency (OCC), and: 

* the Office of Thrift Supervision (OTS).

Office of Financial Institutions: 

Treasury’s Assistant Secretary for the OFI acts as sector liaison to 
the banking and finance sector on CIP. The office coordinates 
Treasury’s efforts regarding legislation and regulation for financial 
institutions, federal agencies that regulate or insure financial 
institutions, and securities markets. In addition, the assistant 
secretary chairs FBIIC, which coordinates the federal financial 
regulatory effort to develop a coordinated emergency response mechanism 
in order to respond to cyber or physical attacks against the financial 
sector. The OFI also participates on standing committees regarding 
interdependencies, international outreach, and private-sector 
outreach. FBIIC has also been tasked by the Office of Homeland Security 
to examine the possible economic consequences of cyber or physical 
attacks against these critical assets. Finally, this office is 
consulting with private-sector representatives to develop a private-
sector-driven national strategy for infrastructure assurance, which 
addresses not only cyberattacks, but also physical attacks against the 
financial services sector.

United States Secret Service: 

The United States Secret Service’s role in CIP is to lead the research, 
development, and implementation of effective and innovative 
investigative programs to combat vulnerabilities of electronic 
financial transactions and, as an arm of the Treasury, help sustain a 
liaison with the banking and finance organizations to assess and 
address vulnerabilities. To meet this challenge, the Secret Service has 
permanently assigned representatives to the Critical Infrastructure 
Assurance Office, NIPC, the Computer Emergency Response Team 
Coordination Center at Carnegie Mellon, the Office of Homeland 
Security, and the White House Office of Critical Infrastructure 
Protection. The Secret Service provides input into the national CIP 
plan through its representatives in these organizations. The Secret 
Service has also initiated a nationwide network of Electronic Crimes 
Task Forces, as mandated by the USA PATRIOT Act. These task forces, 
which will bring law enforcement, academia, and the private sector 
together, have been designated to provide a systemic and proactive 
approach to preventing cyber-based crimes. Regarding physical CIP, the 
Secret Service helps secure national special security events (e.g., the 
Olympics).

Office of the Comptroller of the Currency: 

OCC helps protect the nation’s cyber critical infrastructure by 
chartering, regulating, and supervising national banks to ensure that 
the banking systems are safe and competitive. To accomplish its goals, 
OCC approves and denies applications for new national bank charters; 
examines national banks and other entities subject to its supervision; 
takes supervisory action against banks that do not comply with laws and 
regulations; and issues rules, regulations, and supervisory guidance 
governing a wide spectrum of bank activities, including those relating 
to investments and lending. The office also participates in the efforts 
of the FBIIC.

Office of Thrift Supervision: 

OTS, a Treasury bureau, is the primary regulator of all federal and 
many state-chartered thrift institutions, which include savings banks 
and savings and loan associations. Representatives of the OTS are 
members of the FBIIC.

[End of section]

Appendix III: Components of Executive Departments or Agencies and Their 
Primary Activities Related to Cyber CIP: 

Table 4: Executive Department or Agency Components and Their Primary 

Activities Related to Cyber CIP: 

Organization: Federal Advisory Committees: 

Organization: National Infrastructure Advisory Council; Policy 
development: [Check]; 
Analysis& warning: [Empty]; 
Compliance: [Empty]; 
Response& recovery: [Empty]; 
Research & development: [Empty].

Organization: President’s Council of Advisors on Science and 
Technology; 
Policy development: [Check]; 
Analysis& warning: [Empty]; 
Compliance: [Empty]; 
Response& recovery: [Empty]; 
Research &development: [Empty].

Organization: President’s National Security Telecommunications 
Advisory Committee; 
Policy development: [Check]; 
Analysis& warning: [Empty]; 
Compliance: [Empty]; 
Response& recovery: [Empty]; 
Research &development: [Empty].

Organization: President’s Information Technology Advisory Committee; 
Policy development: [Check]; 
Analysis& warning: [Empty]; 
Compliance: [Empty]; 
Response& recovery: [Empty]; 
Research &development: [Empty].

Organization: National Science and Technology Council; 
Policy development: [Check]; 
Analysis& warning: [Empty]; 
Compliance: [Empty]; 
Response& recovery: [Empty]; 
Research &development: [Empty].

Organization: Executive Office of the President; 
Policy development: [Empty]; 
Analysis& warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Office of Homeland Security; 
Policy development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: National Security Council; 
Policy  development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Office of Science and Technology Policy; 
Policy  development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Check]; 
Research & development: [Empty].

Organization: National Economic Council; 
Policy development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Office of Management and Budget; 
Policy  development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: President’s Critical Infrastructure Protection Board; 
Policy  development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Chief Information Officers Council; 
Policy  development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: National Communications System; 
Policy  development: [Check]; 
Analysis & warning: [Check]; 
Compliance: [Empty]; 
Response & recovery: [Check]; 
Research & development: [Empty].

Organization: Federal Communications Commission; 
Policy  development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Check]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: U.S. Department of Commerce; 
Policy  development: [Empty]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Critical Infrastructure Assurance Office; 
Policy development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: National Institute of Standards and Technology; 
Policy  development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Check].

Organization: National Information Assurance Partnership; 
Policy  development: [Empty]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Check].

Organization: National Telecommunications and Information 
Administration; 
Policy  development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: U.S. Department of Defense; 
Policy  development: [Empty]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Joint Staff; 
Policy  development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Office of the Assistant Secretary of Defense, Command, 
Control, Communications, and Intelligence; 
Policy  development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Defense Advanced Research Projects Agency; 
Policy  development: [Empty]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Check].

Organization: Defense Threat Reduction Agency; 
Policy development: [Empty]; 
Analysis & warning: [Check]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Check].

Organization: National Security Agency; 
Policy development: [Empty]; 
Analysis & warning: [Check]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Defense Intelligence Agency; 
Policy development: [Empty]; 
Analysis & warning: [Check]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Joint Task Force - Computer Network Operations; 
Policy development: [Empty]; 
Analysis & warning: [Check]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Director of Central Intelligence; 
Policy development: [Empty]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Central Intelligence Agency; 
Policy development: [Empty]; 
Analysis & warning: [Check]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: National Intelligence Council; 
Policy development: [Empty]; 
Analysis & warning: [Check]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: National Foreign Intelligence Board; 
Policy development: [Empty]; 
Analysis & warning: [Check]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: U.S. Department of Energy; 
Policy development: [Empty]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Office of Energy Assurance; 
Policy development: [Check]; 
Analysis & warning: [Check]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: National Laboratories; Policy 
development: [Empty]; 
Analysis& warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Check].

Organization: U.S. Department of Justice; 
Policy development: [Empty]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Computer Crime and Intellectual Property Section; 
Policy development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Check]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: National Infrastructure Protection Center; 
Policy development: [Empty]; 
Analysis & warning: [Check]; 
Compliance: [Check]; 
Response & recovery: [Check]; 
Research & development: [Check].

Organization: National Counter Intelligence Executive; 
Policy development: [Check]; 
Analysis & warning: [Check]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Cyber Crime Division; 
Policy development: [Empty]; 
Analysis & warning: [Empty]; 
Compliance: [Check]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: U.S. Department of Transportation; 
Policy development: [Empty]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Office of Intelligence and Security; 
Policy development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Environmental Protection Agency; 
Policy development: [Empty]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Office of Water; 
Policy development: [Check]; 
Analysis & warning: [Check]; 
Compliance: [Empty]; 
Response & recovery: [Check]; 
Research & development: [Empty].

Organization: Federal Emergency Management; Agency; 
Policy development: [Empty]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Office of National Preparedness; 
Policy development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: United States Fire Administration; 
Policy development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Office of the Chief Information Officer and Information 
Technology Services Directorate; 
Policy development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: U.S. General Services Administration; 
Policy development: [Empty]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Federal Computer Incident Response Center; 
Policy development: [Empty]; 
Analysis & warning: [Check]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Office of Acquisition Policy; Policy 
development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Department of Health and Human Services; 
Policy development: [Empty]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Office of Emergency Preparedness; 
Policy development: [Empty]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Check]; 
Research & development: [Empty].

Organization: National Science Foundation; 
Policy development: [Empty]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Check].

Organization: U.S. Department of State; 
Policy development: [Empty]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Bureau of Resource Management; 
Policy development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Bureau of Diplomatic Security; 
Policy development: [Empty]; 
Analysis & warning: [Check]; 
Compliance: [Check]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Bureau of Political-Military Affairs; 
Policy development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Bureau of International Narcotics and Law Enforcement; 
Policy development: [Empty]; 
Analysis & warning: [Empty]; 
Compliance: [Check]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Bureau of Economic and Business Affairs; 
Policy development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: U.S. Department of the Treasury; 
Policy development: [Empty]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Office of Financial Institutions; 
Policy development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Empty]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: United States Secret Service; 
Policy development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Check]; 
Response & recovery: [Empty]; 
Research & development: [Check].

Organization: Office of the Comptroller of the Currency; 
Policy development: [Check]; 
Analysis & warning: [Empty]; 
Compliance: [Check]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

Organization: Office of Thrift Supervision; 
Policy development: [Empty]; 
Analysis & warning: [Empty]; 
Compliance: [Check]; 
Response & recovery: [Empty]; 
Research & development: [Empty].

[End of table]

[End of section]

Appendix IV: Comments from the Department of Justice: 

U. S. Department of Justice: 
Washington, DC 20530: 

May 31, 2002: 

Joel C. Willemssen: 
Managing Director: 
Information Technology Issues: 
U.S. General Accounting Office: 
441 G Street, NW: 
Washington, D.C.

Dear Mr. Willemssen: 

On May 17, 2002, the General Accounting Office (GAO) provided the 
Department of Justice (DOJ) copies of its draft report “Critical 
Infrastructure Protection: Federal Efforts Require a More Coordinated 
and Comprehensive Approach for Protecting Information Systems.” The 
draft was reviewed by representatives of the Criminal Division and the 
Federal Bureau of Investigation. The DOJ generally concurs with the 
report and is providing the enclosed minor comments for your 
consideration and understand that they will be incorporated as 
appropriate.

I hope the comments will be beneficial in completing the final 
document. If you have any questions concerning any of the Department’s 
comments (technical or formal) you may contact me on (202) 514-0469.

Sincerely,

Vickie L. Sloan: 
Director, Audit Liaison Office: 
Justice Management Division: 

Signed by Vickie L. Sloan: 

Enclosure: 

[End of section]

Appendix V: Comments from the Special Advisor to the President for 
Cyberspace Security: 

The White House Washington: 

June 7, 2002: 

Joel C. Willemssen: 
Managing Director, Information Technology Issues: 
U.S. General Accounting Office: 
441 G Street, NW: 
Washington, DC 20548: 

Dear Mr. Willemssen: 

Thank you for providing me an opportunity to review and comment on the 
draft GAO report entitled “Critical Infrastructure Protection: Federal 
Efforts Require a more Coordinated and Comprehensive Approach for 
Protecting Information Systems” (GAO-02-474). Coordinating federal 
critical infrastructure protection (CIP) efforts is a complex and 
crucial endeavor. In October 2001, the Administration issued Executive 
Order 13231 creating the President’s Critical Infrastructure Protection 
Board. Composed of senior federal officials, the Board coordinates 
cybersecurity efforts including aligning roles and responsibilities of 
the federal departments and agencies.

Your report correctly observes that the risk of computer based attacks 
is real and growing. However, the coordination of federal efforts is 
only a small part of the overall challenge of infrastructure 
protection. The majority of the computing power in the U.S., which is 
vulnerable to attack or could be comprised and used to launch attacks 
against the nation’s critical infrastructures, is not owned and 
operated by the federal government; it is owned and operated by private 
companies (large and small), universities, state and local governments 
and home users. This presents a unique strategic challenge.

As Chair of the Board, I am coordinating a national strategy on cyber 
security. The strategy will address a broad spectrum challenges related 
to cyber security including those faced by federal, state and local 
governments, as well as, private companies, infrastructure operators 
and home users.

Sincerely,

Richard A. Clarke: 
Special Advisor to the President for Cyberspace Security Chairman, 
President’s Infrastructure Protection Board: 

Signed by Richard A. Clarke: 

[End of section]

Appendix VI: Comments from the Office of Science and Technology Policy: 

Executive Office Of The President Office Of Science And Technology 
Policy: 
Washington, D.C. 20502: 

June 4, 2002: 

Memorandum For Joel C. Willemssen: 
Managing Director, Information Technology Issues: 
General Accounting Office: 

From:	Shana Dale V: 
Chief Of Staff And General Counsel: 

Subject: OSTP Technical Corrections to GAO-02-474: 

The following are technical corrections to the General Accounting 
Office’s proposed report entitled, “Critical Infrastructure 
Protection: Federal Efforts Require a More Coordinated and 
Comprehensive Approach for Protecting Information Systems.” 

1) Section entitled, “Relationships Among Cyber CIP Organizations Are 
Not Consistently Established,” paragraph 2, delete sentence 4, “Of the 
organizations with research and development functions, none mentioned 
the Office of Science and Technology Policy, who was designated the 
lead coordinator for research and development in both PDD 63 and 
Executive Order 13231.” 

Comment: OSTP has exercised its coordination authority for CIP over the 
past five years with those organizations that have research and 
development (R&D) functions through regular senior level interagency 
meetings.

Beginning in March 1998, the National Science and Technology Council 
formed a Critical Infrastructure Protection Research and Development 
Interagency Working Group (CIP R&D IWG) under the joint oversight of 
the Committee on National Security and the Committee on Technology. 
This CIP R&D IWG, led by OSTP, was established to develop and to 
sustain a coherent roadmap on technologies that, if implemented within 
critical national infrastructure sectors, would reduce vulnerabilities 
and counter threats that could cause major damage to the security, 
economic vitality, and social well-being of the United States. As a 
result of PDD-63, the IWG’s charter was expanded to develop a process 
of ongoing R&D planning and appraisal, as well as to provide 
appropriate R&D support to the Critical Infrastructure Coordinating 
Group and the national coordinator.

On October 16, 2001, Executive Order 13231 established a standing 
committee for research and development (CR&D), chaired by OSTP, to 
coordinate a program of Federal Government R&D for protection of 
information systems for critical infrastructure, including emergency 
preparedness communications and the physical assets that support such 
systems, and to ensure coordination of government activities in this 
field with corporations, universities, federally funded research 
centers, and national laboratories.

The CR&D created under Executive Order 13231 consists of a committee of 
principals with senior R&D leadership from across departments and 
agencies. Supporting the CR&D principals is a working level 
subcommittee with representatives designated by principals from each of 
the departments and agencies. The committee of principals meets on a 
quarterly basis, and the subcommittee meets twice monthly. It is 
inaccurate to imply that consultations are not occurring with the 
agencies.

2) Appendix II, Executive Office of the President, Office of Science 
and Technology Policy, paragraph 2, should be modified as follows: 
The Technology Division is responsible for all of OSTP’s activities in 
the areas of national security an emergency-preparedness 
telecommunications; the  NCS; NSTAC, continuity of government 
programs; and infrastructure protection programs; and works closely 
with the Science technology division Division on national issues 
security issues. The OSTP Assistant Director for Homeland and 
National Security fills the post of Senior Director for Research and 
Development within the Office of Homeland Security. OSTP has official 
responsibilities for protecting the domestic infrastructure deriving 
both from statute and executive order. As a result, OSTP coordinates 

between the military and nonmilitary sectors within the government, 
between the technical and the policy-making communities, and between 
the federal government and state and local governments.
3) Appendix III, Components of Executive Departments or Agencies and 
their Primary Activities Related to Cyber CIP, Executive Office of the 
President, Office of Science and Technology Policy, should include a 
check mark in the “Response and recovery” field. (Executive Order 
12472, Section 2.) 

4) Figure 3: Overview of National or Multi-agency Federal Cyber CIP 
Organizations, Office of Science and Technology Policy, should include 
Response and Recovery coloring in addition to Research and Development. 
(Executive Order 12472, Section 2.) 

[End of section]

Appendix VII: Comments from the Federal Emergency Management Agency: 

Federal Emergency Management Agency: 
Washington, D.C. 20472: 

June 13, 2002: 

Mr. Joel Willemssen: 
General Accounting Office: 
441 G Street, NW 
Washington, DC 20548: 

Dear Mr. Willemssen: 

FEMA has reviewed General Accounting Office (GAO) Draft Report 
entitled, Critical Infrastructure Protection: Federal Efforts Require a 
More Coordinated and Comprehensive Approach for Protecting Information 
Systems, GSA-02-474, dated July 2002.

We believe the report, as written does not incorporate the FEMA 
Critical Infrastructure Protection (CIP) efforts that were approved by 
Director Joe Allbaugh and submitted to the White House. The current 
document dilutes the accurate reporting of the Agency’s CIP structure 
and mission. Please substitute the enclosed text for the FEMA portion 
of your report, page 64.

The report lists and describes the activities of the Office of National 
Preparedness; Readiness, Response, and Recovery Directorate; and the 
U.S. Fire Administration as the components of FEMA with activities 
related to cyber Critical Infrastructure Protection. FEMA’s Office of 
the CIO/Information Technology Services Directorate should be added to 
that list. Relevant additions are incorporated in the text of the 
enclosure. The following changes are also required: 

1. Figure 4, page 21, should be amended to incorporate the following 
under “Federal Emergency Management Agency”: Office of the CIO/
Information Technology Services Directorate.

2. On page 76, Appendix III, “Components of Executive Departments or 
Agencies and their Primary Activities Related to Cyber CIP,” the table 
should be modified under “Federal Emergency Management Agency” to 
include an entry, “Information Technology Services Directorate,” with a 
checkmark under Policy Development.

Thank you for the opportunity to review on this report. Our points of 
contact are Michael Mosteller, ONP, 202-646-4312, and Steve Schmidt, 
Office of Cyber Security. 540-542-3343.

Sincerely,

Michael D. Brown: 
Chief Operating Officer/General Counsel: 

Signed by Michael D. Brown: 

Attachment: 

[End of section]

Appendix VIII: Comments from the Department of State: 

United States Department of State: 
Washington, D.C. 20520: 

June 11 2002: 

Dear Ms. Westin: 

We appreciate the opportunity to review your draft report, “Critical 
Infrastructure Protection: Federal Efforts Require a More Coordinated 
and Comprehensive Approach for Protecting Information System,” GAO-02-
474, GAO Job Code 310141.

The Department’s comments are enclosed for incorporation, along with 
this letter, as an appendix to the GAO final report.
If you have any questions regarding this response, please contact 
Hunter Ledbetter, Office of Intelligence Resources and Planning, Bureau 
of Resource Management on (202) 647-7231.

Sincerely,

Christopher B. Burnham: 
Assistant Secretary and Chief Financial Officer: 

Signed by Christopher B. Burnham: 

Enclosure: 

As stated.

cc: GAO/IT - Mr. Willemssen State/OIG - Mr. Berman State/RM - Mr. 
Kaplan: 

Ms. Susan S. Westin, Managing Director, International Affairs and 
Trade, U.S. General Accounting Office.

GAO Report Revisions: 

U.S. Department of State: 

The Department of State (DOS) advises the President on foreign policy 
and relations. Accordingly, PDD 63 assigned DOS as the lead for the 
special function of foreign affairs. Executive Order 13231 assigned the 
Secretary of State or his designee to the President’s CIP Board, on 
which State serves as Chair of the International Affairs Committee. 
According to DOS documents and officials, there are currently three 
bureaus within the DOS charged with institutional CIP protection and 
three others focused primarily on international outreach and 
coordination involving CIP. These include: 

* the Bureau of Resource Management (RM): 

* the Bureau of Diplomatic Security (DS): 

* the Bureau of Information Management (IRM): 

* the Bureau of Political - Military Affairs (PM): 

* the Bureau of International Narcotics and Law Enforcement (INL): 

* the Bureau of Economic and Business Affairs (EB): 

Bureau of Resource Management (RM): 

The Assistant Secretary for Resource Management is responsible for 
managing the formal Department-wide CIP Program plan by serving as 
Chair of the Department’s Critical Infrastructure Protection Governance 
Board. The Governance Board facilitates the decision making process on 
policy and priorities relating to CIP within the Department. In 
addition, the RM bureau is responsible for ensuring that the formal 
Department-wide CIP Program is managed and resource-loaded over a 
multi-year planning period to achieve the CIP objectives of PDD-63 for 
both domestic and overseas operations.

Bureau of Diplomatic Security (DS): 

The Assistant Secretary for Diplomatic Security is the Department’s 
Chief Infrastructure Assurance Officer (CIAO) who oversees the 
protection of all other aspects of the Department’s critical 
infrastructure. The DS bureau provides a secure environment for 
conducting American diplomacy and promoting American interest 
worldwide. Regarding CIP, DS develops and maintains effective security 
programs for every U.S. embassy and consulate abroad.

Bureau of Information Resource Management (IRM): 

IRM ensures availability of Information Technology systems and 
operations, including IT contingency planning, to support the 
Department’s diplomatic, consular, and management operations; it is 
also the authority for the Department’s computer security programs.

Bureau of Political - Military Affairs (PM): 

Executive Order 13231 assigned PM responsibility for the international 
CIP outreach program. PM’s Assistant Secretary serves as State’s 
alternate representative on the President’s CIP Board and Chair of the 
Board’s International Affairs Committee. In this context, PM is 
responsible for coordinating and implementing intradepartmental and 
interagency policy to promote international cooperation on CIP issues.
Bureau of International Narcotics and Law Enforcement (INL): 
The INL bureau has specific responsibility for CIP-related issues 
involving criminal misuse of information technology (e.g. cyber-crime). 
INL also coordinates and funds the response of federal law enforcement 
to requests for training and technical assistance from foreign 
partners, including assistance in fighting high tech crime, an 
important subset of protecting critical networked systems.

Bureau for Economic and Business Affairs (EB): 

The EB bureau is responsible for CIP-related issues in multilateral 
economic organizations such as the Organization for Economic 
Cooperation and Development (OECD), and the Asia Pacific Economic 
Cooperation forum (APEC). In such fora, the EB bureau works to develop 
internationally-accepted information technology security standards and 
best practices, and to ensure that government information security 
regimes include input from private stockholders.

[End of section]

Appendix IX: GAO Contact and Staff Acknowledgments: 

GAO Contact: 

Dave Powner (303) 572-7316: 

Acknowledgments: 

Contributors to this report include Sandra Edwards, Michael Gilmore, 
Sophia Harrison, Catherine Schweitzer, Jamelyn Smith, and Eric Winter.

[End of section] 

Footnotes: 

[1] U.S. General Accounting Office, High-Risk Series: Information 
Management and Technology, GAO/HR-97-9 (Washington, D.C.: Feb. 1, 
1997); High-Risk Series: An Update, GAO/HR-99-1 (Washington, D.C.: 
January 1999); High-Risk Series: An Update, GAO-01-263 (Washington, 
D.C.: January. 2001).

[2] President’s Commission on Critical Infrastructure Protection, 
Critical Foundations: Protecting America’s Infrastructures 
(Washington, D.C.: October 1997).

[3] The CERT® Coordination Center is a center of Internet security 
expertise located at the Software Engineering Institute, a federally 
funded research and development center operated by Carnegie Mellon 
University.

[4] Executive Order 13231 replaces this council with the National 
Infrastructure Advisory Council.

[5] U.S. General Accounting Office, Combating Terrorism: Selected 
Challenges and Related Recommendations, GAO-01-822 (Washington, D.C.: 
Sept. 20, 2001).

[6] The White House, Defending America’s Cyberspace: National Plan for 
Information Systems Protection: Version 1.0: An Invitation to a 
Dialogue (Washington, D.C.: 2000).

[7] U.S. General Accounting Office, Information Security: Opportunities 
for Improved OMB Oversight of Agency Practices., GAO/AIMD-96-110 
(Washington, D.C.: Sept. 24, 1996).

[8] U.S. General Accounting Office, Information Security: Serious 
Weaknesses Place Critical Federal Operations and Assets at Risk, GAO/
AIMD-98-92 (Washington, D.C.: Sept. 23, 1998); Information Security: 
Serious and Widespread Weaknesses Persist at Federal Agencies, GAO/
AIMD-00-295 (Washington, D.C.: Sept. 6, 2000); Information Security: 
Additional Actions Needed to Fully Implement Reform Legislation, GAO-
02-470T (Washington, D.C.: Mar. 6, 2002).

[9] GAO/HR-97-9, Feb. 1,1997; GAO-01-263, January 2001.

[10] Title X, Subtitle G--Government Information Security Reform, Floyd 
D. Spence National Defense Authorization Act for Fiscal Year 2001, P.L. 
106-398 (Oct. 30, 2000).

[11] GAO-02-470T, Mar. 6, 2002.

[12] The Department of Commerce’s CIAO established Project Matrix to 
provide a standard methodology for identifying all assets, nodes, 
networks, and associated infrastructure dependencies and 
interdependencies required for the federal government to fulfill its 
national security, economic stability, and critical public health and 
safety responsibilities to the American people.

[13] These are the Departments of Commerce, Defense, Energy, Justice, 
Transportation, Health and Human Services, State, and Treasury; and the 
Environmental Protection Agency, the Federal Emergency Management 
Agency, the General Services Administration, and the National Science 
Foundation.

[14] Figure 4 displays the five general CIP activities according to a 
color-coded legend. Appendix III provides an alternative (table format) 
for black and white printing.

[15] U.S. General Accounting Office, Critical Infrastructure 
Protection: Significant Challenges in Developing National 
Capabilities, GAO-01-323 (Washington, D.C.: Apr. 25, 2001).

[16] GAO/AIMD-98-92, Washington, D.C.: Sept. 23, 1998.

[17] U.S. General Accounting Office, Critical Infrastructure 
Protection: Challenges to Building a Comprehensive Strategy for 
Information Sharing and Coordination, GAOT/AIMD-00-268 (Washington, 
D.C.: July 26, 2000).

[18] GAO-01-822, Washington, D.C.: Sept. 20, 2001.

[19] Securing the Homeland, Strengthening the Nation, February 2002.

[20] OMB collects this information for the Annual Report on Combating 
Terrorism as required by P.L. 105-85. By OMB’s definition, CIP 
encompasses the potential threat from equipment failure, human error, 
weather and natural disasters, and criminal as well as terrorist 
attacks.

[21] Congressional Research Service, Critical Infrastructures: 
Background, Policy, and Implementation, Updated February 4, 2002.

[22] These departments or agencies are the Departments of Agriculture, 
Education, Housing and Urban Development, Interior, Labor, and Veterans 
Affairs, the U.S. Agency for International Development, the National 
Aeronautics and Space Administration, and the Nuclear Regulatory 
Commission. 

[End of section] 

GAO’s Mission: 

The General Accounting Office, the investigative arm of Congress, 
exists to support Congress in meeting its constitutional 
responsibilities and to help improve the performance and accountability 
of the federal government for the American people. GAO examines the use 
of public funds; evaluates federal programs and policies; and provides 
analyses, recommendations, and other assistance to help Congress make 
informed oversight, policy, and funding decisions. GAO’s commitment to 
good government is reflected in its core values of accountability, 
integrity, and reliability.

Obtaining Copies of GAO Reports and Testimony: 

The fastest and easiest way to obtain copies of GAO documents at no 
cost is through the Internet. GAO’s Web site (www.gao.gov) contains 
abstracts and full-text files of current reports and testimony and an 
expanding archive of older products. The Web site features a search 
engine to help you locate documents using key words and phrases. You 
can print these documents in their entirety, including charts and other 
graphics.

Each day, GAO issues a list of newly released reports, testimony, and 
correspondence. GAO posts this list, known as “Today’s Reports,” on its 
Web site daily. The list contains links to the full-text document 
files. To have GAO e-mail this list to you every afternoon, go to 
www.gao.gov and select “Subscribe to daily E-mail alert for newly 
released products” under the GAO Reports heading.

Order by Mail or Phone: 

The first copy of each printed report is free. Additional copies are $2 
each. A check or money order should be made out to the Superintendent 
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or 
more copies mailed to a single address are discounted 25 percent. 
Orders should be sent to: 

U.S. General Accounting Office: 
441 G Street NW, Room LM: 
Washington, D.C. 20548: 

To order by Phone: 

Voice: 	(202) 512-6000 

TDD: 	(202) 512-2537

Fax: 	(202) 512-6061

To Report Fraud, Waste, and Abuse in Federal Programs: 
Contact: 

Web site: www.gao.gov/fraudnet/fraudnet.htm

E-mail: fraudnet@gao.gov

Automated answering system: (800) 424-5454 or (202) 512-7470

Public Affairs: 

Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800
U.S. General Accounting Office: 
441 G Street NW, Room 7149: 
Washington, D.C. 20548: