Auditors: DHS should spur use of critical infrastructure data

The Homeland Security Department should work to increase use of sensitive information it receives from private companies about vulnerable assets like utilities, private IT networks, energy production and distribution facilities, and transportation assets, the Government Accountability Office said in a report unveiled today.

The report, titled "DHS
Should Take Steps to Encourage More Widespread Use of its Program to Protect and Share Critical Infrastructure Information," describes how the department has been carrying out the Critical Infrastructure Information Act.

That law was a response to the frequently repeated fact that more than 85 percent of the essential facilities that terrorists could target are in private hands.

The law sought to encourage private companies to submit information about the critical infrastructure assets to DHS by creating special shields against the public release of the data. In particular, the law bars release of the information under the federal Freedom of Information Act.

Once the information is gathered and protected, the department is responsible for sharing it with appropriate agencies so they can help protect the assets from terrorist attacks.

GAO reported that the department has set up a program office to establish requirements for gathering, protecting, sharing and using the infrastructure information.

As of January 2006, the program office had received 260 submissions of critical infrastructure information from various sectors. The office has publicized the program to government agencies and private companies, and trained about 750 potential users in DHS and other federal, state and local agencies to handle the specially protected information.

However, according to the report, DHS must overcome challenges in defining government needs for the information, deciding how it will be used, protecting the information and controlling access to it as well as convincing the private companies that they will gain by submitting the information.

'If DHS were able to surmount these challenges, it and other government users may begin to overcome the lack of trust that critical infrastructure owners have in the government's ability to use and protect their sensitive information,' the report said.

The auditing agency added that DHS officials concurred with the report findings in oral comments.


  • automated processes (Nikolay Klimenko/

    How the Army’s DORA bot cuts manual work for contracting professionals

    Thanks to robotic process automation, the time it takes Army contracting professionals to determine whether prospective vendors should receive a contract has been cut from an hour to just five minutes.

  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

Stay Connected