EPA 550-R97-003 December 1997 Security Study An Analysis of the Terrorist Risk Associated with the Public Availability of Offsite Consequence Analysis Data under EPA's Risk Management Program Regulations ------- ------- Table of Contents Introduction. Section 1: Benefits... ...... * -4 ... '. . ! . ' ! ' ' . . ' ' . . s Section 2: Risk Analysis.. v ฐ .' / Section 3: Risk Minimization........... 15 List of Appendices Appendix A: RMP Data Elements of Concern ' . Appendix B: Summary of Electronic Submission Workgroup Discussion . Appendix C: Security Analysis "Scope" : ------- ------- Introduction Background Clean Air Act ง 112(r) required EPA to publish regulations focusing on the prevention of chemical accidents. On June 20, 1996, EPA published the final rule for Risk Management Programs. An estimated 64,000 facilities are subject to this regulation based on the quantity of regulated substances they have on-site. These facilities will be required to implement a Risk Management Program and submit a summary of the program, the risk management plan (RMP), to a central location specified by EPA.. .':.-, , The RMP (which CAA section 112(r) requires must be. available to the public, except in . the case of confidential business information) consist of four'elements: .. ' A hazard assessment that includes, a history of accidental releases -and an offsite consequence analysis (OCA) describing the potential impacts that an accidental release could have on the public and the environment around the facility; . , A prevention program that includes operating-procedures, employee training, hazard evaluation, and other activities designed to improve safety at the facility and thus reduce the likelihood of ari accident; An emergency response program that ensures that either facility employees or public responders are prepared to deal with any accidents that do occur and thus . minimize the consequences; and .-" " ' , ' -- - A facility registration section and executive summary. This report focuses on the OCA and the individual data elements that will be included in the RMP. The mandatory OCA data elements include the release modeling assumptions (e.g., quantity released, wind speed) as well" as the potential consequences ,(the distance beyond. Which no serious adverse effects are anticipated and an estimate of the total population within this zone). for both w,>r:st-case (catastrophic) and alternative accidental releases from the facility. A ' complete list of the OCA (and related) data elements is included in Appendix A. Electronic Submission Workgroup The Accident Prevention Subcommittee of the CAA Advisory Committee created the Electronic Submission Workgroup in October ,1996 to examine the technical and practical issues associated with creating a national electronic repository of risk management plans. The Workgroup was charged with recommending the best way(s) for. members of the regulated community to .submit their risk management plans and the best way(s) for EPA, State and local governments, and the public to have access to this information. ------- On May 9. 1997, the Workgroup presented to the Accident Prevention Subcommittee a Discussion Paper that outlined its preliminary recommendations and requested advice on five issues. Based on its analysis, the Workgroup offered recommendations for both the RMP Submission System (which the Workgroup named RMP*Submit) and the RMP Access System (named RMP*Info). This report is concerned principally with one issue: should the offsite consequence analysis (as part of the RMP) be made available to the public over the Internet. The Workgroup struggled with how EPA should provide access to OCA data -- refer to Appendix B for a more detailed description of this discussion. Many felt that the Internet was the obvious choice, but others saw potential problems in putting RMPs on the Internet. Some Workgroup members believed that making the OCA data available on the Internet would increase the risk that terrorists, foreign or domestic, would target reporting facilities. Specifically, they were concerned that the data elements providing the distances over which people might be harmed and the number of people within such distances (for the worst-case release scenario) would be useful to those contemplating a terrorist action, the Workgroup did unanimously agree that EPA should provide full, unrestricted access via the Internet to most RMP information (registration, prevention program, emergency response program, and five-year accident history data). However, neither the Workgroup nor the Accident Prevention Subcommittee have made a recommendation as to whether there should be full, unlimited access to offsite cqn.sequence analysis (OCA) data via the Internet. Because of the lack of consensus, this issue remained a maj.or concern to the Workgroup. At the May 9, 1997, Accident Prevention Subcommittee meeting, several Subcommittee members advised EPA to conduct a security study to quantify the incremental change in risk of putting OCA information on the Internet and to identify potential security measures that can be taken to reduce risk. The scope of the proposed study was developed by the Workgroup in conjunction with the Subcommittee and is included as Appendix C. RMP Databases The process of collecting and disseminating RMP information will consist of two elements: Each of the regulated facilities will receive RMP*Submit diskettes, which contain pre-designed forms for all of the RMP data elements. The completed diskettes (along with paper submissions from facilities without access to computers) will be submitted to EPA. . The data will be downloaded regularly to RMP*Info, the database that will provide the public with access to RMP information, EPA has contracted for the development of RMP*Submit and RMP*Info through EPA's Mission Oriented Software Engineering Support (MOSES) contract. ------- Primarily, the RMP data will be made available in RMP*Info on the Internet, through EPA's EnviroFacts at www.epa.gov/envirofw/. EnviroFacts is a relational database that provides a single point of access to data from multiple.data resources. It currently incorporates data from- seven EPA program databases and Locational Reference Tables-including the Comprehensive Environmental Response, Compensation and Liability Information System (CERCLIS) and the Toxic Release Inventory (TRI). Databases contained in EnviroFacts can be viewed through a set of structured queries or by downloading the data in an Oracle database. EPA plans to have RMP*Submit and RMP*Info fully operational by January 4. 1999. to allow sufficient time for industry to submit prior to the final RMP deadline of June 20, 1999. Security Study , | This report presents the findings of the security study, which as'conducted for the . Agency by Aegis Research Corporation, ICF Incorporated, and Science Applications , . International Corporation: ; ' . . Section 1 summarizes the benefits associated with the Risk Management Program 'and the public availability of the RMP that EPA identified in its Economic Analysis in Support of the Final Rule on Risk Management Program Regulations for Chemical Accident Prevention, to accompany the final rule. - Section 2 describes the nature of the security threat associated with the public availability of the OCA data and provides a quantification of the existing level of risk .(baseline) and the incremental risk of the Internet and other methods that EPA has considered for making the RMP (including the OCA data) publicly available. Section 3 provides a summary of potential approaches to minimizing the risk described in Section 2 through facility security and information technology. At the December 17, 1997, Accident Prevention Subcommittee meeting, Aegis Research . Corporation will provide a more detailed presentation of the analysis, including the Adversary Strategy, outlined in Section 2. \ . . ------- Section 1: Benefits EPA published Economic Analysis in Support of the Final Rule on Risk Management Program Regulations for Chemical Accident Prevention to accompany its final rule. That document quantified the primary benefits expected from the rule, including reductions in the damages to human health, property, and the environment from fires, explosions, and toxic releases at facilities covered by the rule. This section summarizes that analysis, with particular attention to the non-quantified benefits associated with the public availability of the RMP. Implementation of the Prevention Program EPA believes that the benefits expected from the RMP regulations arise primarily from avoiding chemical accidents and the-associated damages to human health, property, and the environment. The types of damages considered in EPA's analysis were human health threats, including deaths and'injuries; environmental damages, including threats to wildlife, soil, and water; and economic damages such as lost production, property damages, and litigation. EPA's prevention program requirements ~ activities such as employee training, equipment maintenance, hazard review, operating procedures, incident investigation-, and'compliance audits -- are very similar to those mandated by OSHA under its Process Safety Management Standard. Based on the analysis in The Cost and Benefits of Process Safety Management, Industry Survey Results, EPA expects that compliance with the prevention program component of the risk management program will result in a significant reduction in chemical accidents and the associated damages at facilities subject to the RMP regulations. Specific estimates of the initial and annualized benefits arising from avoided damages are provided in the Economic Analysis. Public Availability of the Risk Management Plan EPA expects that the availability of the RMP information will provide a number of benefits beyond the reduction in accidents that will result from the implementation of the prevention program. These benefits -- assumed to derive primarily from access to the data elements in the registration, prevention program, and offsite consequence analysis -- will accrue to both the public and industry. First, the public will benefit from RMP information, particularly the OCA data, because this information will allow the public to make more informed decisions on a number of issues. EPA research shows that approximately 85 million people live within a five-mile radius of a regulated source. This is equivalent to approximately 35 million households, or a third of the nation's total household population. This population is expected to benefit directly from the information provided by the offsite consequence analysis. Land use planners will be able to use OCA data when making decisions about siting of new industrial facilities and siting other buildings near existing industrial facilities. Emergency response agencies will have more complete information to use when they make decisions about devoting resources to establish special procedures and training forTire fighting and other emergency response personnel to ------- respond to an accident, and maintaining additional emergency and medical equipment in .case of an accident," The result will be more efficient, targeted use of resources. ' ' RMP information will also provide the community with a better basis 'for conducting dialogues on prevention activities. Not only will RMPs provide previously unavailable on prevention practices of local facilities, but RMP*Info will allow the community to compare practices at their facilities with those of facilities of the same size and industrial sector. These comparisons will make, it possible for the community to determine where local facility practices are .similar to or better than the industry .norm and where they may fall short. EPA's experience with EPCRA section 313, the Toxic Release Inventory (TRI), has shown that making data easily available to the public has a powerful influence on facility practices, absent any regulatory requirements to change practices. Many companies that are required to file annual emission inventories under TRI have voluntarily adopted measures,to . reduce emissions out of a desire to be seen as a good neighbor. EPA expects that publication of the RMP data will have a similar impact. Facilities are likely to take steps beyond those required . in the rule so that they can lessen the distances to endpoints, reduce the, number of reported 'accidents, or reasonably demonstrate that .they have reduced the likelihood of serious releases. The .availability of TRI information also has led to more frequent meetings between citizen groups and industry. This increased contact has led to plant tours, citizen inspections, the establishment of community advisory boards to monitor industrial activities, and the creation of "Good Neighbor Agreements" with specific facilities. Public interest groups use the data to educate the public about toxic chemical emissions and potential risk. A bibliography prepared by the Working Group on Community Right-to-Know listed over 100 state and local reports and more than 30 national TRI reports compiled by public interest groups. In California's Silicon Valley, for example, citizens used TRI data to pressure the state's largest emitter of ozone-depleting CFCs, IBM, into eliminating CFCs altogether. In Akron, Ohio, TRI information was used to pressure BF Goodrich into publicly announcing a 70 percent reduction goal in its emissions of air toxics. The Clean Water Action/Clean Water Fund used TRI data on the Houston Ship Channel in a report arguing that.the channel be included in the Texas Water Commission's list of Toxic Impaired Waters. ; ,.' Finally, experience in states with'existing accident prevention programs has demonstrated that risk information has led to improved decision-making at covered facilities. Facilities can identify and target higher risk activities and share information about technological improvements. The New Jersey accident prevention rule has served as'an impetus for industries to adopt innovative new technologies in their production processes. The result is more efficient production processes for the sources with decreased risks in associated accidents. The state also has shared information on state-of-the-art technologies. In addition, the State of California has , noted that industries covered under its accident prevention rule have identified areas of waste in their production processes and been able to realize cost savings by improving operations. ------- Section 2: Risk Analysis As described in the Introduction, the Electronic Submission Workgroup could not reach consensus on the means of making the RMP (specifically its OCA component) available to the public. This section focuses on this primary concern by describing the potential risk associated with a terrorist attack against a facility required to submit an RMP under EPA's Risk Management Program. It provides background information that outlines the nature of the potential terrorist threat and then examines the incremental risk associated with the public availability of OCA data on the Internet and the relative risk associated with alternative means of dissemination of the RMP. Targeting RMP Facilities The World Trade Center bombing in 1993 and the Oklahoma City Federal Building- bombing in 1,995 have made concerns about terrorist activities in the United States (whether from a domestic or foreign source) a reality. The federal budget currently provides hundreds of millions of dollars for prevention and response to terrorism in this country. In years past, much of this effort focused on airports. However, these two recent events (and others) have highlighted the potential susceptibility of "non-traditional" targets. On July 15, 1996, Executive Order 13010 established the President's Commission on Critical Infrastructure Protection (PCCIP) to examine the protection of eight critical infrastructures: telecommunications, electrical power systems, gas and oil storage and transportation, banking and finance, water supply systems, emergency services (including police, medical, fire and rescue), and continuity of government and government operations. Two of those categories, gas and oil storage and transportation and water supply systems, overlap in part with the focus of this study. The classified findings of the PCCIP were presented to the White House on October 21, 1997. Although the PCCIP was concerned primarily with electronic warfare (the "cyber threat"), its input has been sought in the development of this analysis. As directed by the Workgroup, this study examines the terrorist threat to the 64,000 regulated facilities and the surrounding public as a direct result of the availability of OCA data on the Internet. The possible consequences of an accidental release involving the toxic and flammable substances at these facilities led to these regulations; these same consequences make such facilities potentially attractive targets for terrorists - in such cases, the facility itself becomes a weapon. Although such actions have not occurred in the international arena where terrorist attacks are more prevalent, two specific incidents provide a basis for this assertion: On February 4, 1991, six pipe bombs were found on chemical tanks near the Norfolk Naval Base at the Allied Terminals, Inc., facility on the Elizabeth River. Fortunately, the timers on the bombs failed, and explosive ordnance personnel were able to remove and neutralize the devices without incident. ------- Earlier this year, three men and one woman allegedly planned to blow up a gas refinery In Bridgeport, Texas, releasing what they thought would be a lethal cloud of hydrogen sulfide gas and perhaps killing.police officers who would come to investigate a telephone bomb threat. During, the chaos, they hoped to rob an ' . armored car in the small town of Chico of $2 million and use the money to finance other terrorist actions. Due to information provided by ah informant who was part of the group, they were arrested quietly before the bombs, were set. It is important to recognize that the RMP regulations apply to only a small percentage of the hundreds of thousands of facilities regulated by EPA and other federal, state, and local agencies for their use of toxic, flammable, or otherwise hazardous chemicals. For example, this analysis does not .examine the risk associated with the transportation of regulated substances and other hazardous chemicals by truck, pipeline, barge, and train. Similarly, it should be recognized that facilities with hazardous chemicals represent only a small fraction of the potential universe of targets for a terrorist action. As has been demonstrated by the sarin release in the Tokyo subway and the bombs at the Atlanta Olympics, and in New York City and Oklahoma City, any public gathering places, including recreational- facilities, transportation systems, and commercial buildings, can serve as the target of a terrorist attack. Thus,-a listing of facilities submitting RMPs does not represent either a comprehensive listing of the potential universe of terrorist targets or even a comprehensive listing of targets where hazardous chemicals are present. .- Use of the Internet Intelligence experts have estimated that as much as 80 percent of our country's intelligence collection needs can be satisfied from open (unrestricted) sources, primarily the Internet, thus enabling the intelligence community to concentrate its efforts on the remaining 20 percent. The usefulness of Internet open source collection is likely to be even higher for foreign intelligence services collecting data on the United States. In addition, huge on-line databases, . such as those developed by EPA and other government agencies, greatly diminish the amount of processing and analysis that must be done to make the information useful. " ^ ! . Information of "targeting" quality is already available to terrorist organizations on the Internet and from other sources that can be easily accessed, most for the cost of an envelope and' a stamp under the Freedom of Information Act. The question remains, are foreign nations in general and those that sponsor terrorism availing themselves of that information? Because intelligence collection and operational plans are among the most closely guarded secrets of any nation, it is impossible,to know the answer to that question with absolute certainty. However, with an estimated 120 countries already having or developing the capability,to exploit the Internet for warlike purposes, the probability that they are using on-line databases as intelligence sources must be assumed. ------- Understanding the Baseline . The findings presented in the following pages represent the efforts of Aegis Research Corporation, in consultation with ICF Incorporated, to evaluate the risk of several scenarios . ;. under which the data in the offsite consequence analysis would be made available to the public under the mandate of Cleaa Air Act section 112(r). For,the purposes of examining the risk, this study focuses on the post-June 21, 1999, time frame (after the initial submission of RMPs) and assumes that there will be no significant modifications to the RMP regulations in the intervening months. Other key assumptions are as follows: EPA will implement a national RMP database (RMP*Info), accessible over the Internet within the EnviroFacts system. RMP* Info will contain the. executive summary, registration, and the summaries of the prevention program and ' emergency response program for the covered processes at RMP facilities; that is, all elements of the RMP except the OCA data. Users will not be able to sort or examine the RMP database itself; instead, directed searches based on a limited number of key data elements can be performed to view information on facilities of interest-- for example, a list of all facilities in Houston, Texas. The search fields will consist primarily of data in the registration and would not include individual data elements from the offsite . consequence analysis, prevention program, or emergency response program. Due to the size of the database (which would make it difficult, if not impossible, to download from the Internet in any case), EPA will produce a CD-ROM version of RMP*Info for use by states, local entities, and other stakeholders. Other right-to-know programs (e.g., EPCRA), federal'databases (e.g., TRI), and computer systems (e.g., CAMEO) will continue to operate as they do currently. Finally, this analysis does not attempt to evaluate the overall "success" or "failure" of an actual attack, but rather whether an attack is more likely because information vital to the planning process has become available (or more accessible) to the terrorist. The success or failure of an attempted strike would depend on numerous factors beyond the scope of this study, including facility-specific conditions, the competency of the terrorist(s), and the substances involved. Findings: Incremental Risk Following the direction of the Workgroup, the incremental risk was defined as the. ' increased'likelihood of a terrorist targeting an RMP facility due to the availability of additional information to support the planning process. To determine how useful certain information would be to a potential terrorist, our first task was to take the perspective of a terrorist. -To do so, we reviewed the intelligence requirements and operations planning/targeting criteria used by the U.S. Special Operations Command, a military force whose assignments often involve the destruction ------- of enemy infrastructure. We. adapted this approach to develop an Adversary Strategy, which consists of three components: - The key knowledge elements (e.g., the security, measures in place at a facility) for a terrorist planning a strike against an RMP facility; A listing of individual data sources (e.g., the OCA) that can to some degree provide each of these knowledge elements; and. . . An evaluation (scoring) of both the comprehensiveness of the data provided and . its utility for each individual data source for each knowledge element. '.'..- The Adversary Strategy provides a structure for comparing relative reductions in .the .likelihood of completing the task through the 'elimination of selected sources of knowledge. For example, eliminating access, to data on the number of persons living within the distance to the endpoint for a worst-case release might lower the attractiveness of a facility as a target. This allows the measurement of the relative risk associated with that particular piece of information (and the data sources that provide that information). In this way, the incremental increase in the risk of a terrorist attack associated with the availability, over the Internet, of the OCA data as part. of the RMP, could be evaluated.- ' ' Specifically, we first identified a series of ten knowledge elements - the information that the terrorist needs to select a particular RMP facility as the target. Next, we identified a list of the potential sources for each piece of information, considering sources including observation, , insider knowledge, and data available to the public on the Internet or though a FOIA request. Finally, we reviewed and graded each source (on a scale of one to ten, with ten being "most useful") based on a subjective analysis of the level of effort involved to use the source arid the comprehensiveness of the information provided. To calculate the likelihood that a terrorist can complete the target identification process, the highest valued source for each element was identified". Then,-following the approach in a proprietary model developed by Aegis to support such evaluations, these values were multiplied together to. reflect the overall effectiveness of the data sources in contributing to the planning process. (Note: Because the RMP serves as a data source for only some of the elements of the Strategy, the remaining elements were treated as constants for this analysis. For example, determining facility security measures is very important to the planning process, but these data are not available except through insider knowledge or observation of a particular facility.) . t First, a value for the .baseline level of risk upon implementation of RMP*Info was . determined, reflecting the availability of the RMP (but not the OCA data) over the Internet, as well as the other sources for similar data that were identified. This value was then compared to the product of the scores for the highest valued source for each'element when the OCA data are available with the RMP over the Internet. , , ------- Conclusion This comparison indicated that the risk (although still very small) was slightly more than two times higher with unrestricted availability of the RMP with OCA data on the Internet. This increase reflects several factors, including the nature of the OCA data elements and the enhanced accessibility of data on the Internet to an international audience. Taken together, the primary utility of the unrestricted RMP and OCA data to a terrorist emerges from the capability to scan across the entire country for the "best" targets. Findings: Relative Risk in the second stage of the analysis, we developed a model to compare five alternative means of disseminating the RMP with the OCA data: In a publicly accessible database on the Internet - RMP*Info; .. On one or more CD-ROMs; Through a system of Bulletin Boards; Upon request (in hardcopy); and , At a system of EPA-funded'state Reading Rooms. This model was based on Expert Choice, a software program that facilitates decision making under conditions of uncertainty. We considered'four primary criteria: (1) Ease of access by potential users to the data source ("medium"), including the physical location of the data and the need to expend additional resources; (2) Anonymity of the potential user of the medium; (3) Number of facilities whose data can be accessed through the .medium at a given time, and (4) Extent to which the medium increases public awareness (including that of fringe or terrorist groups) of the availability of the data. We then weighted each of the four criteria based upon its relative importance to a terrorist in the process of acquiring the data. ' 10 ------- Conclusion , ' . ' . t , We used this model to evaluate each of the mechanisms for disseminating the data. In the initial analysis., we assumed that the entire RMP (including the OCA),was available on the Internet and could be downloaded or sorted at the user's discretion. The results are presented in Figure 10, In this case, the Internet ranked much higher (i.e., represented a greater security risk due to its value to a potential terrorist as measured by the four criteria) relative to the other alternatives! Bulletin Board and CD-ROM dissemination ranked similarly at a lower level, while Paper was a distant fourth with Reading Room representing the least risk. The main reason is the Anonymity factor; terrorists must remain anonymous to carry out their operations. In the second analysis (based on the current operational .parameters of other databases in EriviroFacts), we assumed that RMP*Info could not be downloaded wholesale from the Internet and users would be provided with a limited search 'capability based upon the registration data. We also assumed that the maximum geographical area that could be searched at.one time would be either a county or local emergency planning district. .This level of access to information is analogous to that provided by a feature article in a local newspaper or. a publication by a local environmental group describing "zones of vulnerability." These results' are presented in Figure 11. Under these conditions, the. utility of the Internet to'a terrorist would be comparable to Bulletin Board'and CD-ROM; Paper'and Reading Room remain in their same relative positions. Conclusion One way'to achieve a resolution of this issue is to formulate a cost-benefit comparison. In this case, as described in the previous chapter, EPA believes that dissemination of the RMP (including OCA data) to the widest possible audience will lead to efforts (on the part of the facility and its neighbors) to reduce the risk of a chemical incident,impacting the surrounding community. This can be displayed graphically with a downward-sloping curve representing an inverse correlation between information and risk. At the same time, some members of the, ' chemical industry have voiced concerns with EPA's plans to put the OCA data on the Internet, citing the potential for an increased risk of a terrorist attack on their facilities as the cause. Under this line-of reasoning, the optimum course of action would be to limit the information available . to the extent possible. This, in-turn, can be displayed graphically with an upward-sloping curve representing a direct correlation between information and risk. As shown in Figure 12, the optimum solution is'!to make enough information available to the public to bring us to where the downward-sloping curve for the Risk of Chemical Accident intersects the upward-sweeping curve for the Risk of Terrorist Attack. (Please note: This. graphic is presented for conceptual purposes only; the, slope of the two curves and their point of intersection as depicte.d in Figure 12 are not intended to accurately reflect current conditions.) If we are "inside the box," we will have succeeded in reaching a solution that balances the benefits to be achieved with the potential risk to be incurred. The analysis presented in this section is intended to allow the Accident Prevention Subcommittee and EPA to make this determination. 11 ------- Comparison of Alternate Means of Dissemination Performance Sensitivity w.r.t GOAL for nodes below GOAL .90 .80 .70 .60 .SO .40 .30 .20 EOA \ / ANON ซFACIl_IT EXPOSE OVERALL .60 ,50 40 30 .20 1O .00 INTERNET BB CD-ROM PAPER RR Abbreviation EOA ANON SFACILIT EXPOSE Definition Ease of access to the medium. Anonymity - to avoid discovery and post-event capture. Number of facilities - equates to number of targets. Measurement of increased probability of attracting fringe groups. INTERNET BB CD-ROM PAPER RR one per state Full RMP and OCA data on and downloadable from Internet. Bulletin Board - assuming that each BB will have data on 1 state. Same as Internet, but on CD-ROM (up to 1 1 CDs). Paper - Request the paper RMP/OCA from a facility or EPA. Reading Room - at a public facility Figure 10 ------- Internet Mitigation Measures Performance Sensitivity w.r.t. GOAL for nodes below GOAL Cttt% .".."' AI15K .30 .80 .70 .60 .50 .40 .30 .20 "1 _ - .- - ' - - - - H~=?^- ฑ==r7r _- -'. p-"'r~" tS s. J X^\ ~---.^ "* ,;. N ,* /.'- /'' ' ~ . -. ' .:..... . -~^r~~-~-^__ ' . ' L . "~' --:^>^_. ' - - ! .; _ - - , . - ' - . ' -'- - - : . - - - 1 ' - .30 .80 .70 . GO .SO '"' -4O BB CD-ROM -2O r1ฐ PAPER "ฐEOA ANON ttFACILIT EXPOSE OVERALL '"" - " ' Abbreviation EGA ANON ttFACILIT EXPOSE Definition Ease of access to the medium. . Anonymity - to avoid discovery and post-even! ca()!ur-e -Number of facilities - equates to list of potential targets. . Measurement of increased probability of attracting fringe groups. . BB INTERNET CD-ROM PAPER RR one per state Bulletin Board - assuming that each BB will have data on 1 state. Full RMP and OCA data on Internet - controlled query only. Same as Internet, but on CD-ROM (up to 11 CDs). .. . - Paper - Request the paper RMP/OCA from a facility or EPA. .,. Reading Room - at a public facility . ' -'.' ' ' '"'.' - , ' Figure 1 1 ------- Are We "Inside the Box"? Risk of Chemical Accident Availability of Information Risk of Terrorist Attack Figure 12 ------- Section 3: Risk Minimization '.' This section will address two complementary approaches to minimizing the risks identified in the preceding section: ' Information technology measures that can be implemented as part of the design of RMP*Info, and , L Facility security measures that reflect the 'hazard posed by the presence of toxic and flammable substances. . Information Technology '.- As described in the Introduction, at a minimum, RMP information (with'the exception of the OCA) will be stored in a publicly available database (-RMP*Info), accessible through the EnviroFacts system. EnviroFacts provides a single point of access to data from seven EPA program databases and Locational Reference Tables, including the Comprehensive Environmental Response, Compensation and Liability Information System (CERCLIS) and the Toxic Release Inventory (TRI). Under current plans, there are two options for accessing the databases contained in EnviroFacts: - . ' . (1) ' Due to its multi-gigabyte size (and normal data transmission speeds), it is unlikely to be feasible to allow users to download the entire RMP database. As a result, EPA is developing a capability to allow users to select information based on functional areas, which can then be downloaded. Such files could then be imported into another software product on the user's PC where it may be searched, sorted, and tailored to the user's needs. However, because EnviroFacts imposes a 15 minute connection time limit, it would require a lengthy series of such operations to acquire the whqle database. (2) Users can also conduct any of a set of pre-designed, structured queries on specific fields within the database and then view the RMP associated with the facilities that meet the search criteria. EPA has proposed searches for RMP* Info based on facility name, facility ED number, facility location, NAICS code, and chemical name. Thus, the user can .search for facilities in a specific community or with processes in a specific NAICS code and then view the data for each such facility, EnviroFacts requires the entry of a user ID and password to download iti associated databases (but not for conducting the on-line queries), although a functional user -ED and password are provided on its home page. Although this is the most cost-effective way of making' the data available to the largest number of people; it means that there are no general security measures already in place for RMP*Info, .and' specifically for any data that are determined to be 15 ------- , t sensitive in any way. As described below, there are several types of mechanisms that could be . put in place to'protect OCA data generally or specific OCA data elements. At the most basic level, EPA could implement a registration system specifically for users of RMP*Info to exercise some control over who uses the database. Practically, this would most .' likely apply to the database as a whole rather than for the OCA data elements individually. Such a system would require the user to provide identifying information such as name, address, phone. number, etc., and then provides a password. The personal nature of the information provided. through such a login process is protected by Oracle SQL*Netฎ and Secure Network Services, which can encrypt password information as well as client-server, server-server, and server- gateway datastreams. Unfortunately, although simple, this type of registration system is not foolproof. For example, to preserve his or her anonymity, a terrorist, or any other individual, could simply enter false information into the registration form. The challenge of avoiding false registration may be 'overcome by adopting an approach similar to that followed for Freedom of Information Act requests. In this case, the interested party would submit a formal, written, and signed request to EPA for access to the OCA information. Upon receipt, a user ID and password would be assigned and delivered to the user. Neither of these systems, however, provide a-basis for evaluating potentially illicit use of the data; they only serve as a speed bump to discourage the casual Internet surfer. A more complex step would be to combine the registration system with an Oracle tracking system in which each query in RMP*Info will be executed through a stored procedure (or program) in the Oracle database. A user ED and password dialogue box could be displayed each time a user tries to query sensitive information. Which users access what information could then be tracked by examining the log files in Oracle using the AUDIT command. If a problem ever arises involving a facility for which RMP*Info has an entry, it would be possible to identify all persons who had accessed that particular piece of information. To be effective as a deterrent, this process would , need to be made clear to all users of RMP*Info up front. At the same time, additional measures could be implemented to limit the overall usefulness of the database to a potential terrorist. First, in contrast to the other databases in EnviroFact.-. EPA could determine to not activate any download option for the OCA, such as that described in option (1). In this case, individuals wanting a copy of the entire database to examine at their leisure would need to request the CD-ROM version from EPA. In this case, users would only be able to query RMP*Info in the structured, pre-determined fashion that EPA developed. In addition, EPA could further restrict the query function to prevent searches based on the information in the OCA judged to be most sensitive; the sensitive information would be viewable, but could not serve as a sorting criterion. In combination with the expected distribution of national reports on specific practices and industries, this approach would likely satisfy all members of the anticipated audience for the database, but would prevent a potential terrorist from sorting facilities nationwide to identify targets based on specific criteria. 16 ------- Finally, it is important to note that, regardless of the actions taken by EPA to provide a measure of security for elements of the OCA that are judged to be particularly sensitive, the public retains a legal right under the statute to view this data. Freedom of Information Act and E-FOIA requirements make it possible for any citizen to request the RMP information, including the OCA; for all facilities across the country. As a result, EPA would be unable to prevent anyone from compiling all of the RMP data (whether from RMP*Info, CD-ROMs,-or any,other means of dissemination that EPA selected)' and posting it on the Internet themselves. In fact, certain public interest groups have already indicated that they may do so. Facility Security The variety of facilities subject to the RMP regulations make it difficult to provide any generalizations regarding the "state-of-practice" or the "state-of-the-art" for security measures at , regulated facilities. Instead, this section will simply review strategies and practices that have been observed with respect to security programs in several key areas: entry of facility employees, entry of facility visitors, exit of visitors-and employees, unwanted entry, and acts of sabotage by employees and others. " . ; j Every company subject to the RMP regulations, formally or informally, has its own system for ensuring its security. To be effective; such systems are based on the real or perceived threat.to the facility: a small facility in a rural location will have a different security strategy than that of a large manufacturing complex in a densely populated area. The first step in creating such a system is identifying vulnerable areas, potential threats to the facility, and the security measures already in place at the site. It must then be determined whether the existing security measures adequately respond to the specific risks faced, by the facility. This is closely tied to the next step, that of developing a process for management approval of and implementing any necessary changes in personnel, equipment, and procedures. Finally, a security .program necessitates an ongoing effort to determine whether the site-specific risk has changed as a result of internal and external events. This effort is supported by communication both within the industry (e.g., trade association) and with public officials such as the local police department. , The process of employee entry into a facility depends on several factors. In a large .manufacturing facility, considerations of employee accountability (e.g., in the event of an emergency),'may result in implementation of a badge system with entry through a control point such as a guard gate -or an electric turn-style gate. Employees may also be issued badges with magnetic strips so their entry and exit can be tracked. Personal vehicles may be parked in an employee parking lot; however, it is possible for an employee to drive a personal vehicle into the site.of a facility without having the contents of the vehicle subject to investigation. Other . facilities rely on employee time cards or a security guard to track employee arrival-. For visitors, entry to a facility is generally restricted by full-time security personnel who staff the entrance gate(s). Visitors may be required to provide identification and state the nature of their visit, and may also be registered and provided with a badge or other identifying equipment (e.g., colored hard hat) to designate their status. Depending on the nature of their ''.'...' . ' ' 17 ------- operations, some facilities require a brief safety and security presentation to be issued prior to issuance of a visitor badge. If their destination is in the manufacturing or process area, visitors may be accompanied by a representative of. the-facility; if not, they may or may not be allowed to proceed unaccompanied. Visitors may also be restricted from driving their vehicles on facility grounds, thus eliminating uncontrolled traffic in process areas; guards may check the vehicle - contents in cases where the vehicle will be driven on site. Guards are trained to identify suspicious persons or situations and have the authority to refuse entry on the basis of their own judgement. In cases where a visitor is permitted to drive onto plant property, they may either proceed directly to the administrative office or other destination, or they may need to check m with a receptionist and follow the procedures described above upon arrival. The procedures for exiting a facility often demonstrate that .most security objectives are based on property protection. Searches for company property hidden in vehicles, bags, and briefcases can occur upon exit. In addition, employees and visitors may be required to sign-out or turn in their badge as they leave the facility. , The first line of defense against unauthorized entry is based on perimeter defense and visible deterrence. Regardless of size, facilities may.have perimeterfencing to prevent individuals from entering the grounds. However, the level of perimeter monitoring and protection varies from facility to facility/ Some facilities have sophisticated security .systems: video cameras, beam perimeter motion detectors, and regular walking or driving checks by security personnel. Remote cameras may be monitored from a central security point and can be remotely controlled and positioned to view a large area. In cases where there are no systems to support the primary deterrents, entry can be gained by almost any determined individual and many times without being noticed, particularly at night or during non-operating hours. Traditional security threats, including acts of sabotage by employees and bomb threats, have led to specific operating practices at facilities likely to be subject to such threats. Some security experts claim that the greatest potential for sabotage may be from employees. To address this concern, facilities use the existing supervisory structure and train their supervisors to be aware of suspicious or suspect behavior in their staff. If such behavior is detected, companies may have a system in place that allows the supervisor to report and begin an investigatory process or act to defuse the situation. Although not a universal practice, internal procedures may have been established to deal with bomb threats and similar incidents. Personnel handling incoming phone calls may be trained in asking appropriate questions, taking notes, and calling the appropriate authorities. In addition, the facility may be equipped with call recorders to tape such threatening phone calls. Given the wide array of facilities regulated under the RMP regulations, not all of these measures are necessary or appropriate to provide security. However, facilities may be able to, mitigate their vulnerability to sabotage and vandalism by implementing security measures that are appropriate for their type of operation. 18 ------- Appendix A: RMP Data Elements of Concern 1. REGISTRATION 1.1 Source identification " a/Name ' , . .' , . - b. Street : ' . c. City , , '. ' ' d. County : e. State - . f. Zip . "' ' '' '. . g. Latitude . . . " h. Longitude ' . ' '_.. ; 1.2'Source Dun and Bradstreet number .1-3 " . ' ; a. Name of corporate parent company (if applicable) . . b. Dun and Bradstreet number of corporate parent company (if applicable) 1.4 Owner/operator a. Name < b. Phone . c. Mailing address 1.5 Name and title of person responsible for part 68 implementation 1.6 Emergency contact a. Name b. Title ' ' -' ' ; ._-.'' c. Phone ' d. 24-hour phone .' . : .: 1.7 For each'covered process: ; '..-'.- a. 1. Chemical name 2. CAS number 3. Quantity 4. SIC code 5. Program level 1.8 EPA Identifier '''--.' 1.9 Number of full-time employees ------- 2. TOXICS: WORST CASE 2.1 Chemical name 2.2 Physical state a. Gas b. Liquid 2,3 Results based on a. Reference table b. Modeling c. Model used 2.4 Scenario a. Explosion b. Fire c. Toxic gas release d. Liquid spill and vaporization i1' _' . '' 2.5 Quantity released Ibs 2.6 Release rate Ibs/min. 2.7 Release duration (if modeled): min. 2.11 Distance to endpoint miles 2.12 Residential population within distance (number) . 2.13 Public receptors (check all that apply) a. Schools b. Residences ' . c. Hospitals d. Prisons e. Public recreational areas or arenas f. Major commercial, office, or industrial areais 2.14 Environmental receptors within distance (check all that apply) a. National or state parks, forests, or monuments b. Officially designated wildlife sanctuaries, preserves, or refuges c. Federal wilderness areas ------- 2.15 Passive mitigation considered (check all that apply) a. Dikes b. _. Enclosures ,; c. Berms v ' d. -'_ Drains . , e. Sumps . f. _ Other (specify) . ,. ; 3. TOXICS: ALTERNATIVE RELEASES 4. FLAMMABLES WORST CASE 4.1 Chemical '. . " ' - ' t 4.2 Results based on (check one) : a.- Reference table . ; b. Modeling c. Model used j 4.3 Scenario (check one) a. Vapor cloud explosion ... b. Fireball - 4.4 Quantity released Ibs ' 4.5 Endpoint used : 4.6-Distance to endpoint miles.- . 4.7'Residential population within distance (number) 4.8 Public receptors (check all that apply) ' a. Schools ' b. Residences c. Hospitals ; ' . - d. Prisons . . e. Public recreational areas or arenas f. Major commercial, office, or industrial areas , . 4.9 Environmental receptors within distance (check all that apply) a. National or state parks, forests, or monuments , b. '_ Officially designated wildlife sanctuaries, preserves, or refuges c. Federal wilderness areas 4.10 Passive mitigation considered (check all that apply) ------- a. Dikes b. Fire walls c. Blast walls d. Enclosures e. Other (specify) 5. FLAMMABLES ALTERNATIVE RELEASES 6. FIVE-YEAR ACCIDENT HISTORY 7. PREVENTION PROGRAM PROGRAM 3 7.4 PHA d. Major hazards identified (check all that apply) I. Toxic release 2. Fire 3. Explosion 4. Runaway reaction 5. Polymerization 6. ._ Overpressurization 7. Corrosion 8. Overfilling 9. Contamination 10. Equipment failure 11. Loss of cooling, heating, electricity, instrument air 12. Earthquake 13. Floods (flood plain) 14. Tornado 15. Hurricanes 16. Other , . e. Process controls in use (check all that apply) 1. Vents 2. Relief valves 3. Check valves 4. Scrubbers 5. Flares 6. Manual shutoffs 7. Automatic shutoffs 8. Interlocks 9. Alarms and procedures . 10. Keyed bypass . 11. Emergency air supply 12. " mergency power ------- 13. Backup'pump. - . ; 14. Grounding equipment' . 15. Inhibitor addition ; 16. Rupture disks , 17. Excess flow device 18. Quench system 19, Purge system ' 20. 'Other . f. Mitigation systems in use (check all that apply) ! 1. Sprinkler system .2. .Dikes , ; 3. Fire walls ; 4. Blast wails. 5. _____ Deluge system ' 6. Water curtain 7. _______ Enclosure 8. Neutralization 9. _Other . , g. Monitoring/detection systems in use (check all the apply) 1. Process area detectors 2. .. Perimeter monitors 3. Other . ; 8. PREVENTION PROGRAM PROGRAM 2 (same data elements as 7, but for hazard review) - 9. EMERGENCY RESPONSE ------- ------- Appendix B: Summary of Electronic Submission Workgroup Discussion For Restricted Access Some Workgroup members believe that the OCA information should be fully available to the LEPC and community in which a facility is located; however, access by groups and individuals geographically distant from the community where the facility is located should be controlled in some way. These Workgroup members are concerned that providing unlimited access to release scenario data will increase the instances of amateur terrorism and false alarms. The Workgroup focused its attention on amateur terrorists because members agree that professional terrorists are savvy enough to.access this type of data already. Some Workgroup members fear that posting release scenario data on the Internet will increase the likelihood of false alarms that will waste the resources of first responders.. Members who. favor controlled access to OCA information contend that the intent of legislators was to reduce risk by making RMP information available to the local community, not to.the entire world. These members argue that widespread and virtually unlimited access to a database of worst-case and alternative release scenario information is inappropriate. Such, information, if accessible via the Internet, could be obtained with minimal effort and total anonymity. In the hands of an individual or a group bent on making a statement through acts of sabotage or terrorism, this information could 'be used to intentionally inflict serious harm on the people of a community as well as on the environment. These members note that, in view of terrorist acts in the United State's in recent years, industry and members of the public sector are. concerned about-security. They believe that putting the OCA information on the Internet unnecessarily increases "the risk of terrorism and sabotage that could harm the public as well as the targeted facility. . Recognizing the division on this issue, the subgrpup met with two members of the FBI's Infrastructure Protection Task Force (IPTF). The IPTF representatives shared some anecdotes from their experience and expressed concern that providing OCA information on the Internet would make it easier for an ill-willed person to find and'use. When asked to compare potential benefits associated with making RMP information available (thereby leading to accident prevention activities by industry and the community) with potential risks associated with possible misuse of the information by potential terrorists, the IPTF members said that they could not make such an assessment. They expressed the opinion that the information .needed to answer that. question does not exist. The IPTF did not provide any compelling argument on one side or the other of this issue, but did indicate a professional concern. For Unrestricted Access ,-'' A second group of Workgroup members believe; that there should be unlimited Internet access to all, RMP data. Their argument is simple: the. RMP is community rightTto-know information and should be made available to the public. They cite the language in the law, which' specifies that EPA shall make RMP data "available to the public." From their point of view the ; "hazard" comes from the chemicals that are present in the community, not from the information about the chemicals being publicized. In fact, they believe a successful RMP program, including full disclosure of OCA data, will reduce the inherent hazards in the community. ------- They note that there are many valid and important uses for RMP information by people . who live well beyond the immediate community where a facility is located. A community might want to compare one of their facilities to another similar facility in another State to see, how their facility compares in terms of vulnerability zones and prevention practices. Researchers will use the RMP information to develop comparative studies on chemical hazards and effective accident prevention programs. Public interest groups anticipate that the data will be critical to their work in reducing accident risks throughout the country. . , Members who favor full, unlimited access to RMP data argue that the threat of potential terrorism does not outweigh the public's right to full access of RMPs. They also question whether restricting information (as opposed to reducing the actual hazards) provides any real barrier to terrorism. They argue potential terrorists could calculate the vulnerable zone around a facility and estimate how many people are at risk without RMP*Info by combining existing EPCRA reports with EPA guidance on vulnerability, analysis and software mapping programs. Larger facilities are already highly visible from the road and, in some cases, containers are clearly labeled. In addition, circles of vulnerability are more frequently being published in newspapers, and may be put on the Internet through newspapers going on-line. Even with the RMP, some argue that it wouldn't be very useful to an amateur terrorist because the RMP will only provide the address of the facility and the name and quantity of the hazardous substance, but not the specific location of the substance on site. . Other Data Access Options The Workgroup has not determined a viable alternative to the Internet^and, therefore, has worked under the assumption the Internet will be the dissemination method to make RMPs available to the public. At the same time, the Workgroup recognized that not all interested parties will be able to access RMP data on the Internet. The Workgroup has considered other options, including CD-ROM, bulletin board systems, state reading rooms, and access without facility name and address for those outside the community. None of these options offers a comparable way to allow inexpensive, widespread access to current RMP data in one place. Further, the Workgroup agrees that even if EPA does not post RMP data on the'Internet, it is highly likely that, because RMP data is subject to the Freedom of Information Act, a public interest group or other organization will eventually post RMP data on the Internet. , ------- Appendix C: Security Analysis "Scope" The study should: ' 1) Quantify the incremental change in risk of putting OCA information on the Internet, including qualitative judgements of an estimate/prediction of the extent of the risk. If it is found that there is adequate data to produce a terrorist threat, explicitly show what data would be used and how. 2) If a significant risk is found in #1, then advise EPA if it is possible to protect public from misuse of the information if it is on the Internet, and if so how. Provide a range of protection measures and their corresponding costs. - . . 3) Quantify the risks associated with making the information available in other ways, including; but not limited to: . '..'. , ' (A) CD-ROM distribution to the public through an EPA hotline; (B) Requesting paper copies of the OCA from the"LEPC; " , .. (C) Bulletin Board System; : ' ' (D) Reading Rooms in each State and Washington DC; and (E) Access without facility name and address for those outside the community. The study should also address the following questions: ... a) How do public'domain air dispersion models (such as ALOHA) and modeling guidance (such - as the CAA OCA guidance) that are already publicly available'factor into the risk? In other words, could a potential terrorist easily figure out the OCA information based on the chemical quantity or other basic information that is outside the OCA? ' - b) Given that chemical information is already available on the Internet and through other sources, such as EPA's Toxic Release Inventory (TRI), Toxic Substances Control Act (TSCA), Clean Water Act (CWA), Resource Conservation and Recovery Act (RCRA), the Emergency Planning and Community Right to.Know Act (EPCRA) does RMP information on the Internet increase the potential threat to the'public? , !' . .c) What information can be easily inferred from living or working in the community or driving by a facility (such as, a propane distributor listed in the yellow pages who has visible on-site ' tank)? ." - : ' d) What are standard operating procedures for facilities to protect against sabotage? Are their additional steps a facility can take for protection? ' e) Given the requirements on EPA to release information under FOIA and E-FOIA, and the high probability of someone else posting the information on the Internet if EPA does not, how do the risks compare for EPA posting and someone else posting the information? What are the best ways to control-this risk?. : ' , ------- f) What would be the increment of increased or decreased "risk" of terrorism when comparing making information available locally vs. nationally electronically? What factors account for this increas'e or decrease in risk? g) How will the availability of media (such as NY Times articles publishing the OCA circle), environmental studies (like "Accidents Do Happen"), and government reports ("Hazard Screening of Anhydrous Ammonia in Nebraska, June 1995) differ from national database access? h) How would this info be useful to a FOREIGN "terrorist" vs. local "terrorists" who would theoretically have access to the information? ------- |