Defense Business Transformation
A Comprehensive Plan, Integrated Efforts, and Sustained Leadership Are Needed to Assure Success
Gao ID: GAO-07-229T November 16, 2006
Of the 26 areas on GAO's high-risk list of federal programs or activities that are at risk for waste, fraud, abuse, or mismanagement, 8 are Department of Defense (DOD) programs or operations and another 6 are governmentwide high-risk areas that also apply to DOD. These high-risk areas relate to most of DOD's major business operations. DOD's failure to effectively resolve these high-risk areas has resulted in billions of dollars of waste each year, ineffective performance, and inadequate accountability. At a time when DOD is competing for resources in an increasingly fiscally constrained environment, it is critically important that DOD get the most from every defense dollar. DOD has taken several positive steps and devoted substantial resources toward establishing key management structures and processes to successfully transform its business operations and address its high-risk areas, but overall progress by area varies widely and huge challenges remain. This testimony addresses DOD's efforts to (1) develop a comprehensive, integrated, enterprisewide business transformation plan and its related leadership approach and (2) comply with legislation that addresses business systems modernization and improving financial management accountability. The testimony also addresses two sections included in recent legislation and other DOD high-risk areas.
In the past year, DOD has made progress in transforming its business operations, but continues to lack a comprehensive, enterprisewide approach to its overall business transformation effort. Within DOD, business transformation is broad, encompassing people, planning, management, structures, technology, and processes in many key business areas. While DOD's planning and management continues to evolve, it has yet to develop a comprehensive, integrated, and enterprisewide plan that covers all key business functions, and contains results-oriented goals, measures and expectations that link organizational, unit, and individual performance goals, while also being clearly linked to DOD's overall investment plans. Because of the complexity and long-term nature of business transformation, DOD also continues to need a chief management official (CMO) with significant authority, experience, and tenure to provide sustained leadership and integrate DOD's overall business transformation effort. Without formally designating responsibility and accountability for results, reconciling competing priorities in investments will be difficult and could impede DOD's progress in its transformation efforts. DOD is taking steps to comply with legislative requirements aimed at improving its business systems modernization and financial management; however, much remains to be accomplished. In particular, DOD recently issued updates to both the business enterprise architecture and the transition plan, which are still not sufficiently complete to effectively and efficiently guide and constrain business system investments across the department. Most notably, the architecture is not adequately linked to DOD component architectures, and the plan does not include business system information for all major DOD components. To address these shortfalls, DOD issued a strategy for "federating" or extending its architecture to the defense components. But much remains to be accomplished before a well-defined federated architecture is in place, given that GAO recently reported that select components' architecture programs are not mature. However, DOD components continue to invest billions of dollars in thousands of new and existing business system programs. The risks associated with investing in systems ahead of having a well-defined architecture and transition plan are profound and must be managed carefully, as must the wide assortment of other risks that GAO's work has shown to exist on specific DOD business system investments. While not a guarantee, GAO's work and research has shown that establishing effective system modernization management controls, such as an architecture-centric approach to investment decision making, can increase the chances of delivering cost-effective business capabilities on time and within budget. Further, with regard to legislation pertaining to financial management improvement, DOD issued and updated its Financial Improvement and Audit Readiness Plan in fiscal year 2006 to provide components with a construct for resolving problems affecting the accuracy and timeliness of financial information and an improved audit strategy for obtaining financial statement audit opinions.
GAO-07-229T, Defense Business Transformation: A Comprehensive Plan, Integrated Efforts, and Sustained Leadership Are Needed to Assure Success
This is the accessible text file for GAO report number GAO-07-229T
entitled 'Defense Business Transformation: A Comprehensive Plan,
Integrated Efforts, and Sustained Leadership Are Needed to Assure
Success' which was released on November 16, 2006.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Testimony:
Before the Subcommittee on Readiness and Management Support, Committee
on Armed Services, U.S. Senate:
United States Government Accountability Office:
GAO:
For Release on Delivery Expected at 9:30 a.m. EST:
Thursday, November 16, 2006:
Defense Business Transformation:
A Comprehensive Plan, Integrated Efforts, and Sustained Leadership Are
Needed to Assure Success:
Statement of David M. Walker Comptroller General of the United States:
GAO-07-229T:
GAO Highlights:
Highlights of GAO-07-229T, a testimony to the Subcommittee on Readiness
and Management Support, Committee on Armed Services, U.S. Senate
Why GAO Did This Study:
Of the 26 areas on GAO‘s high-risk list of federal programs or
activities that are at risk for waste, fraud, abuse, or mismanagement,
8 are Department of Defense (DOD) programs or operations and another 6
are governmentwide high-risk areas that also apply to DOD. These high-
risk areas relate to most of DOD‘s major business operations. DOD‘s
failure to effectively resolve these high-risk areas has resulted in
billions of dollars of waste each year, ineffective performance, and
inadequate accountability. At a time when DOD is competing for
resources in an increasingly fiscally constrained environment, it is
critically important that DOD get the most from every defense dollar.
DOD has taken several positive steps and devoted substantial resources
toward establishing key management structures and processes to
successfully transform its business operations and address its high-
risk areas, but overall progress by area varies widely and huge
challenges remain.
This testimony addresses DOD‘s efforts to (1) develop a comprehensive,
integrated, enterprisewide business transformation plan and its related
leadership approach and (2) comply with legislation that addresses
business systems modernization and improving financial management
accountability. The testimony also addresses two sections included in
recent legislation and other DOD high-risk areas.
What GAO Found:
In the past year, DOD has made progress in transforming its business
operations, but continues to lack a comprehensive, enterprisewide
approach to its overall business transformation effort. Within DOD,
business transformation is broad, encompassing people, planning,
management, structures, technology, and processes in many key business
areas. While DOD‘s planning and management continues to evolve, it has
yet to develop a comprehensive, integrated, and enterprisewide plan
that covers all key business functions, and contains results-oriented
goals, measures and expectations that link organizational, unit, and
individual performance goals, while also being clearly linked to DOD‘s
overall investment plans. Because of the complexity and long-term
nature of business transformation, DOD also continues to need a chief
management official (CMO) with significant authority, experience, and
tenure to provide sustained leadership and integrate DOD‘s overall
business transformation effort. Without formally designating
responsibility and accountability for results, reconciling competing
priorities in investments will be difficult and could impede DOD‘s
progress in its transformation efforts.
DOD is taking steps to comply with legislative requirements aimed at
improving its business systems modernization and financial management;
however, much remains to be accomplished. In particular, DOD recently
issued updates to both the business enterprise architecture and the
transition plan, which are still not sufficiently complete to
effectively and efficiently guide and constrain business system
investments across the department. Most notably, the architecture is
not adequately linked to DOD component architectures, and the plan does
not include business system information for all major DOD components.
To address these shortfalls, DOD issued a strategy for ’federating“ or
extending its architecture to the defense components. But much remains
to be accomplished before a well-defined federated architecture is in
place, given that GAO recently reported that select components‘
architecture programs are not mature. However, DOD components continue
to invest billions of dollars in thousands of new and existing business
system programs. The risks associated with investing in systems ahead
of having a well-defined architecture and transition plan are profound
and must be managed carefully, as must the wide assortment of other
risks that GAO‘s work has shown to exist on specific DOD business
system investments. While not a guarantee, GAO‘s work and research has
shown that establishing effective system modernization management
controls, such as an architecture-centric approach to investment
decision making, can increase the chances of delivering cost-effective
business capabilities on time and within budget. Further, with regard
to legislation pertaining to financial management improvement, DOD
issued and updated its Financial Improvement and Audit Readiness Plan
in fiscal year 2006 to provide components with a construct for
resolving problems affecting the accuracy and timeliness of financial
information and an improved audit strategy for obtaining financial
statement audit opinions.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-229T].
To view the full product, click on the link above. For more
information, contact Sharon Pickup at (202) 512-9619 or pickups@gao.gov
or Randy Hite at (202) 512-6256 or hiter@gao.gov.
[End of Section]
Mr. Chairman and Members of the Subcommittee:
It is a pleasure to be back before this Subcommittee to discuss the
progress and challenges associated with the Department of Defense's
(DOD) efforts to transform its business operations. Since the first
financial statement audit of a major DOD component was attempted almost
20 years ago, we have reported that weaknesses in business operations
not only adversely affect the reliability of reported financial data,
but also the economy, efficiency, and effectiveness of DOD's
operations. In fact, DOD currently bears responsibility, in whole or in
part, for 14 of our 26 high-risk areas. Eight of these are specific to
DOD and include DOD's overall approach to business transformation,
business systems modernization, financial management, the personnel
security clearance process, supply chain management, support
infrastructure management, weapon systems acquisition, and contract
management. In addition, DOD shares responsibility for six
governmentwide high-risk areas.[Footnote 1] Collectively, these high-
risk areas relate to most of DOD's major business operations which
directly support the warfighter, including how they get paid, the
benefits provided to their families, and the availability and condition
of the equipment they use both on and off the battlefield.
DOD's business area weaknesses result in reduced efficiencies,
ineffective performance, and inadequate accountability to Congress and
the American people, wasting billions of dollars each year at a time
when DOD is competing for resources in an increasingly fiscally
constrained environment. As a result, it is important that DOD get the
most from every dollar it invests. Our nation is not only threatened by
external security threats, but also from within by growing fiscal
imbalances due primarily to our aging population and rising health care
costs. These trends are compounded by the near-term deficits arising
from new discretionary and mandatory spending as well as lower revenues
as a share of the economy. If left unchecked, these fiscal imbalances
will ultimately impede economic growth, have an adverse effect on our
future standard of living, and in due course affect our ability to
address key national and homeland security needs. These factors create
the need to make choices that will only become more difficult and
potentially disruptive the longer they are postponed. Among these
difficult choices will be decisions about the affordability and
sustainability of the continued growth in defense spending.
Furthermore, irrespective of the size of the defense budget, the
taxpayers and warfighters deserve more effective management of DOD's
overall resources.
I continue to believe that DOD's senior leadership is committed to
transforming the department and DOD has taken a number of positive
steps to begin this effort. In fact, because of the impact of the
department's business operations on its warfighters, DOD recognizes
now, more than ever, the need to transform its business operations and
provide transparency in this process. Indeed, Secretary Rumsfeld was
very clear in his speech on September 10, 2001, when he identified
business transformation as a top priority. However, DOD's ability to
focus on this priority was overshadowed by the events of September 11,
2001, and the ensuing Global War on Terrorism, including military
operations in Iraq and Afghanistan. Clearly, these events have required
considerable emphasis and have become the department's primary focus.
As a result, progress on the full range of DOD's business
transformation challenges has been inconsistent, focusing thus far on
enterprisewide transformation, with many challenges remaining
concerning the transformation of the various military services and
defense agencies.
Congress, in part through the leadership of this Subcommittee, passed
legislation that codified many of our prior recommendations related to
DOD business systems modernization.[Footnote 2] Since then, DOD has
devoted substantial resources and made important progress toward
establishing key management structures and processes to guide business
systems investment activities, particularly at the enterprise, or
departmentwide, level. DOD's current approach is clearly superior to
its prior approach; however, a number of formidable challenges remain.
Last year when we testified before this Subcommittee, we highlighted
several of these formidable challenges.[Footnote 3] Today, I would like
to provide my perspectives on actions DOD has taken to address these
challenges and achieve business transformation through all levels of
the department over the past year. Specifically, I will discuss DOD's
efforts to (1) develop a comprehensive, integrated, enterprisewide
business transformation plan and its related leadership approach and
(2) comply with legislation that addresses business systems
modernization and improving financial management accountability. I will
also discuss two sections of the recently enacted John Warner National
Defense Authorization Act for Fiscal Year 2007[Footnote 4] that address
financial improvement and acquisition of all major automated
information systems, and selected additional DOD high-risk areas that
highlight the need for continued attention.
My statement is based in large part on our previous reports and some of
our current, ongoing efforts. Our work was performed in accordance with
generally accepted government auditing standards.
Summary:
I have stated on many occasions that transforming DOD's business
operations is an absolute necessity given our nation's current deficits
and long-term fiscal outlook. In the past year, DOD has made progress
in transforming its business operations, but continues to lack a
comprehensive, enterprisewide approach to planning and decision making
needed to ensure successful transformation and address systemic
business challenges. Within DOD, business transformation is broad,
encompassing people, planning, management, structures, technology, and
processes in several key business areas. While DOD's planning and
management continues to evolve, it has yet to develop a comprehensive,
integrated, enterprisewide plan that covers all key business functions,
and contains results-oriented goals, measures and expectations that
link organizational and individual performance goals, while also being
clearly linked to DOD's overall investment plans. Because of the
complexity and long-term nature of business transformation, DOD also
continues to need a chief management official (CMO) with significant
authority, experience, and tenure to provide sustained leadership and
integrate DOD's overall business transformation efforts. Without
formally designating responsibility and accountability for results,
reconciling competing priorities and prioritizing investments will be
difficult and could impede DOD's progress in its transformation
efforts.
DOD continues to take steps to comply with legislative requirements
aimed at improving its business systems modernization and financial
management; however, much remains to be accomplished before the full
intent of this legislation is achieved. In particular, DOD recently
issued updates to both the business enterprise architecture and the
transition plan, which while addressing several issues previously
reported by us, are still not sufficiently complete to effectively and
efficiently guide and constrain business system investments across all
levels of the department. Most notably, the architecture does not
include DOD component architectures, and the plan does not include most
component business system investments. To address these shortfalls, DOD
recently issued a strategy for "federating" or extending its
architecture to the military services and defense agencies. In our
view, much remains to be accomplished before a well-defined federated
architecture is in place, particularly given that we recently reported
that the respective military service architecture programs are not
mature. Nevertheless, DOD components are continuing to invest billions
of dollars in thousands of new and existing business system programs.
As we previously stated, the risks associated with investing in systems
ahead of having a well-defined architecture and accompanying transition
plan are profound and must be managed carefully, as must the wide
assortment of other risks that our work has shown to exist on specific
DOD business system investments. While not a guarantee, our work and
research has shown that establishing effective system modernization
management controls, such as an architecture-centric approach to
investment decision making, can increase the chances of delivering cost-
effective business capabilities on time and within budget. Further,
with regard to legislation pertaining to its financial management
improvement, DOD issued its Financial Improvement and Audit Readiness
Plan and two updates in fiscal year 2006 to provide components with a
construct for resolving problems affecting the accuracy and timeliness
of financial information and an improved audit strategy for obtaining
financial statement audit opinions.
In addition, you asked for my comments on two sections of the recently
enacted John Warner National Defense Authorization Act for Fiscal Year
2007.[Footnote 5] The first provision, section 321, seeks to ensure
that the department pursues financial management improvement activities
only in accordance with a comprehensive financial management
improvement plan that coordinates these activities with improvements in
its systems and controls. I fully support the intent of this
legislation, which is aimed at directing DOD's corrective actions
toward achieving sustained improvements in its ability to provide
timely, reliable, complete, and useful information. This is important
not only for financial reporting purposes, but also, more importantly,
for informed decision making and oversight. Section 321 is consistent
with existing legislation, as well as recent actions taken by the
department. The second provision, section 816, establishes certain
reporting and oversight requirements for the acquisition of all major
automated information systems (MAIS),[Footnote 6] which if properly
implemented could strengthen oversight of and accountability for
business system acquisitions that fail to meet cost, schedule, or
performance criteria. Therefore, I also support the purpose of this
legislation.
Ensuring effective transformation of other areas within DOD that we
have identified as high risk will require continued attention and
sustained leadership over a number of years to be successful. These
other high-risk areas include DOD's weapon systems acquisition,
contract management, supply chain management, personnel security
clearance program, and support infrastructure management. In the area
of weapon systems acquisition, recurring problems with cost overruns
and schedule delays have resulted in a reduction of buying power of the
defense dollar at a time when the nation is struggling with a large and
growing structural deficit. While DOD has made some progress in
addressing its supply chain management problems, the department faces
challenges in successfully implementing its changes and measuring
progress. While positive steps have been taken to address the financial
costs, delays, and other risks associated with DOD's personnel security
clearance program, problems with this program continue. Finally, much
work remains for DOD to transform its support infrastructure to
adequately fund and improve operations and achieve efficiencies while
ensuring that infrastructure costs no longer consume a larger than
necessary portion of DOD's budget.
Background:
DOD is one of the largest and most complex organizations in the world.
Overhauling its business operations will take many years to accomplish
and represents a huge management challenge. Execution of DOD's
operations spans a wide range of defense organizations, including the
military services and their respective major commands and functional
activities, numerous large defense agencies and field activities, and
various combatant and joint operational commands that are responsible
for military operations for specific geographic regions or theaters of
operation. To support DOD's operations, the department performs an
assortment of interrelated and interdependent business functions--
using more than 3,700 business systems--related to major business areas
such as weapon systems management, supply chain management,
procurement, health care management, and financial management. The
ability of these systems to operate as intended affects the lives of
our warfighters both on and off the battlefield. For fiscal year 2006,
Congress appropriated approximately $15.5 billion to DOD, and for
fiscal year 2007, DOD has requested another $16 billion in appropriated
funds to operate, maintain, and modernize these business systems and
associated infrastructure.
Until DOD can successfully transform its operations, it will continue
to confront the pervasive, decades-old management problems that cut
across all of DOD's major business areas. Since our report on the
financial statement audit of a major DOD component over 16 years
ago,[Footnote 7] we have repeatedly reported that weaknesses in
business management systems, processes, and internal controls not only
adversely affect the reliability of reported financial data, but also
the management of DOD operations. In March 2006,[Footnote 8] I
testified that DOD's financial management deficiencies, taken together,
continue to represent the single largest obstacle to achieving an
unqualified opinion on the U.S. government's consolidated financial
statements. These issues were also discussed in the latest consolidated
financial audit report.[Footnote 9] To date, none of the military
services or major DOD components has passed the test of an independent
financial audit because of pervasive weaknesses in internal control and
processes and fundamentally flawed business systems.[Footnote 10]
DOD's financial management problems are pervasive, complex, long-
standing, deeply rooted in virtually all of its business operations,
and challenging to resolve. The nature and severity of DOD's financial
management business operations and system deficiencies not only affect
financial reporting, but also impede the ability of DOD managers to
receive the full range of information needed to effectively manage day-
to-day operations. Such weaknesses have adversely affected the ability
of DOD to control costs, ensure basic accountability, anticipate future
costs and claims on the budget, measure performance, maintain funds
control, prevent fraud, and address pressing management issues,
including supporting warfighters and their families.
Transformation of DOD's business systems and operations is key to
improving the department's ability to provide DOD management and
Congress with accurate, timely, reliable, and useful information for
analysis, oversight, and decision making. This effort is an essential
part of the Secretary of Defense's broad initiative to "transform the
way the department works and what it works on." The savings resulting
from an effective business transformation effort could be significant.
DOD Lacks a Fully Developed, Comprehensive, Integrated, and
Enterprisewide Approach to Decision Making and Sustained Leadership:
I would like to take a few minutes to briefly discuss two critical
elements that are still needed at DOD to ensure successful and
sustainable business transformation before turning to DOD's business
modernization and financial management accountability improvement
efforts. First, DOD needs a comprehensive, integrated, and
enterprisewide plan to guide its overall business transformation
efforts. Second, a chief management official with the right skills and
at the right level of the department is essential for providing the
leadership continuity needed to sustain the momentum for business
transformation efforts across administrations and ensure successful
implementation.
Comprehensive, Integrated, and Enterprisewide Business Transformation
Plan Not Fully Developed:
DOD has not fully developed a comprehensive, integrated, and
enterprisewide strategy or action plan for managing its overall
business transformation effort. The lack of a comprehensive,
integrated, and enterprisewide action plan linked with performance
goals, objectives, and rewards has been a continuing weakness in DOD's
overall business transformation efforts that I have been testifying on
for years.[Footnote 11] I recognize that DOD's efforts to plan and
organize itself to achieve business transformation are continuing to
evolve. However, I cannot emphasize enough how critical to the success
of these efforts are top management attention and structures that focus
on transformation from a broad perspective and a clear, comprehensive,
integrated, and enterprisewide plan that, at a summary level, addresses
all of the department's major business operations. This plan should
cover all of DOD's key business functions; contain results-oriented
goals, measures, and expectations that link institutional, unit, and
individual performance goals and expectations to promote
accountability; identify people with needed skills, knowledge,
experience, responsibility, and authority to implement the plan; and
establish an effective process and related tools for implementation and
oversight. Such an integrated business transformation plan would be
instrumental in establishing investment priorities and guiding the
department's key resource decisions.
While DOD has developed plans that address aspects of business
transformation at different organizational levels, these plans have not
been clearly aligned into a comprehensive, integrated, and
enterprisewide approach to business transformation. As I will shortly
discuss in more detail, DOD recently issued an enterprise transition
plan (ETP) that is to serve as a road map and management tool for
sequencing business system investments in the areas of personnel,
logistics, real property, acquisition, purchasing, and financial
management. As Business Transformation Agency (BTA) officials
acknowledge, the ETP does not contain all of the components of a
comprehensive and integrated enterprisewide transformation plan as we
envision. BTA officials stated that, while the ETP is integrated with
the Financial Improvement and Audit Readiness Plan,[Footnote 12] the
ETP is not as integrated with other enterprisewide, high-risk area
improvement plans, such as the Supply Chain Plan.[Footnote 13] However,
BTA officials consider the ETP to be an evolving plan and are currently
analyzing other enterprisewide plans aimed at improving and
transforming DOD's business operations in order to improve the degree
of alignment between those plans and the ETP. Finally, BTA officials
indicate that the department is moving toward a family of linked plans
that could be used to guide and monitor business transformation, rather
than one comprehensive plan that addresses all aspects of DOD's
business operations.
To develop a family of linked plans, the enterprise transition plan
would also need to be aligned with the high-level Quadrennial Defense
Review (QDR) strategic plan and its initiatives, which so far is not
the case. For example, the QDR highlights the need for transforming the
way the department works and what it works on, but it does not contain
supporting details such as key metrics, milestones, and mechanisms to
guide and direct the business transformation effort. Moreover, the
QDR's business transformation initiative, the Institutional Reform and
Governance project, is not clearly aligned with the ETP. This
initiative is intended to (1) establish a common and authoritative
analytical framework to link strategic decisions to execution, (2)
integrate core decision processes, (3) and align and focus the
department's governance and management functions under an integrated
enterprise model. Finally, the QDR and other DOD planning documents do
not address the ongoing gap between wants, needs, affordability, and
sustainability in what is likely to be a resource-constrained
environment.
Sustained Leadership Is Needed:
While DOD has established leadership and oversight mechanisms to
address transformation, DOD lacks the sustained leadership at the right
level needed to achieve successful and lasting transformation. Due to
the complexity and long-term nature of DOD's business transformation
efforts, we continue to believe DOD needs a chief management officer
(CMO) to provide sustained leadership and maintain momentum. Without
formally designating responsibility and accountability for results,
choosing among competing demands for scarce resources and resolving
differences in priorities among various DOD organizations will be
difficult and could impede DOD's ability to transform in an efficient,
effective, and reasonably timely manner. In addition, it may be
particularly difficult for DOD to sustain transformation progress when
key personnel changes occur. This position would elevate, integrate,
and institutionalize the attention essential for addressing key
stewardship responsibilities, such as strategic planning, enterprise
architecture development and implementation, information technology
management, and financial management, while facilitating the overall
business management transformation effort within DOD.
I would also like to articulate what this position would not do. The
CMO would not be another layer in DOD's day-to-day management
structure. Specifically, the CMO would not assume the responsibilities
of the undersecretaries of defense, the service secretaries, or other
DOD officials for the day-to-day management of the department, nor
would the CMO supervise those officials in connection with their
ongoing responsibilities. Instead, the CMO would be responsible and
accountable for planning, integrating, and executing the overall
business transformation effort. The CMO also would develop and
implement a strategic plan for the overall business transformation
effort. As required by Congress, DOD is studying the feasibility and
advisability of establishing a CMO to oversee the department's business
transformation process. As part of this effort, the Defense Business
Board, an advisory panel, examined various options and, in May 2006,
endorsed this concept. The Institute for Defense Analysis is scheduled
to issue a report on this issue before the end of this year. In
addition, McKinsey and Company recently endorsed the CMO concept.
The Secretary of Defense, Deputy Secretary of Defense, and other senior
leaders have clearly shown a commitment to business transformation and
addressing deficiencies in the department's business operations. During
the past year, DOD has taken additional steps to address certain
provisions and requirements of the Ronald W. Reagan National Defense
Authorization Act for Fiscal Year 2005, including establishing the
Defense Business Systems Management Committee (DBSMC), which is
intended to be DOD's primary transformation leadership and oversight
mechanism, and creating the BTA to support the DBSMC, a decision-making
body. However, these organizations do not provide the sustained
leadership needed to successfully achieve the needed overall business
transformation. The DBSMC's representatives consist of political
appointees whose terms expire when administrations change. Furthermore,
it is important to remember that committees do not lead, people do.
Thus, DOD still needs to designate a person to provide sustained
leadership and have overall responsibility and accountability for this
effort.
In addition, we testified in November 2005[Footnote 14] that DOD's BTA
offers potential benefits relative to the department's business systems
modernization efforts if the agency can be properly organized, given
resources, and empowered to effectively execute its roles and
responsibilities and is held accountable for doing so. However, the
department has faced challenges in making the BTA operational. For
example, we previously testified that there are numerous key
acquisition functions that would need to be established and made
operational for the BTA to effectively assume responsibility for 21 DOD-
wide projects, programs, systems, and initiatives, and our experience
across the government shows that these functions can take considerable
time to establish.[Footnote 15]
To assist the department, the Fiscal Year 2004 National Defense
Authorization Act gives DOD the authority to hire up to 2,500 highly
qualified experts from outside the civil service and uniformed services
without going through the normal civil service hiring system.[Footnote
16] Earlier this year, the BTA had yet to take advantage of this
authority because of certain departmental obstacles concerning, for
example, the roles that these experts could perform. However, it is our
understanding that this is no longer the case, and to date the BTA has
hired 9 of these individuals. Moreover, we were told that the BTA has
also obtained direct hiring authority from the Office of Personnel
Management. The BTA's total projected end strength is 235 personnel. As
of November 2006, the BTA had hired 128 personnel; agency officials
anticipate hiring the remaining 107 personnel, including 16 additional
highly qualified subject experts by September 30, 2007.
While achieving the BTA's initial staffing goals would represent a
major accomplishment and is extremely important to its ability to
perform its business transformation and business systems modernization
roles and responsibilities, BTA human capital management is not a one-
time event but rather an essential BTA function that needs to be
managed strategically. Our research shows that to be successful,
organizations need to treat human capital as strategic assets--
continuously working to understand gaps between future needs and on-
board capabilities and establish plans for filling gaps through a
combination of, for example, training, retention incentives, hiring,
and performance-related rewards. By employing such an approach, the BTA
can be better positioned to make sure that it has the right people,
with the right skills, when it needs them not only today but in the
future. The Deputy Undersecretary of Defense for Financial Management
stated that the BTA is currently developing a human capital strategy
that is expected to be completed by January 2007. It will to (1)
provide for rotating staff between BTA and the DOD components to infuse
talent into the BTA and to develop a change-oriented culture, (2) align
individual and team performance to already established organizational
mission outcomes, and (3) employ OPM's Human Capital Assessment and
Accountability Framework and the DOD Human Capital Strategy.
DOD Has Made Progress in Complying with Business Systems Modernization
and Financial Management Accountability Legislation, but Much Work
Remains:
The department has made important progress in complying with
legislation pertaining to its financial management improvement and
business systems modernization efforts. However, formidable challenges
remain relative to extending the architecture and implementing its
tiered accountability investment approach across the military services
and defense agencies, and ensuring that the department's thousands of
business system investments are implemented on time and within budget
and provide promised capabilities and benefits. The Fiscal Year 2005
National Defense Authorization Act contained provisions aimed at
establishing some of the tools needed to accomplish this. As our
evaluations of federal information technology (IT) management and our
research of successful organizations show, other tools necessary for
successfully modernizing systems will also be needed.
As we reported earlier this year,[Footnote 17] DOD also made important
progress in complying with the Fiscal Year 2005 National Defense
Authorization Act pertaining to its business systems modernization. For
example, on March 15, 2006, DOD released updates to its business
enterprise architecture (Version 3.1) and its ETP. These updates added
previously missing content to the architecture and transition plan,
such as identifying an enterprisewide data standard to support
financial management and reporting requirements. Other business system
modernization management improvements were also apparent, such as
increased budgetary reporting of business system investments and
additional investment review controls.
More recently, DOD issued Version 4.0 of its business enterprise
architecture and ETP. These latest versions provide additional content
and clarity. For example, the transition plan now includes the results
of ongoing analyses of gaps between existing business capabilities and
needed capabilities. However, enormous challenges, such as extending
the architecture across the military services and defense agencies,
remain. To this end, the department defined a conceptual strategy in
September 2006, for federating the architecture[Footnote 18] and
adopting a shared services orientation.[Footnote 19] While we believe
that the concepts have merit and are applicable to DOD, much remains to
be decided and accomplished before they can be implemented in a way to
produce architectures and transition plans for each DOD component that
are aligned with the department's corporate view and that can guide and
constrain component-specific investments.
At the same time, DOD components continue to invest billions of dollars
in new and existing business systems each year. This means that the
risks of investing in these programs ahead of the federated
architecture need to be part of investment approval decisions. As we
have previously reported,[Footnote 20] investment decision making based
on architecture alignment is but one of many keys to success of any
business system modernization. Other keys to the success in delivering
promised system capabilities and benefits on time and within budget
include having the right human capital team in place and following a
range of essential program management and system and software
acquisition disciplines. As I will discuss later, our experience in
reviewing several DOD business system programs shows that these keys to
success are not consistently practiced. While not a guarantee, our
research of leading program management and system acquisition practices
and evaluations of federal agencies shows that institutionalization of
a family of well-defined management controls can go a long way in
minimizing business system modernization risks.
DOD Continues to Evolve Its Business Enterprise Architecture, but Much
Remains to Be Accomplished:
In May 2006,[Footnote 21] we reported on DOD's efforts to address a
number of provisions in the Fiscal Year 2005 National Defense
Authorization Act.[Footnote 22] Among other things, we stated that the
department had adopted an incremental strategy for developing and
implementing its architecture, which was consistent with our prior
recommendation and a best practice. We further stated that DOD had
addressed a number of the limitations in prior versions of its
architecture. For example, we reported that Version 3.1 of the
architecture had much of the information needed, if properly
implemented, to achieve compliance with the Department of the
Treasury's United States Standard General Ledger,[Footnote 23] such as
the data elements or attributes that are needed to facilitate
information sharing and reconciliation with the Treasury. In addition,
we stated that the architecture continued to specify DOD's Standard
Financial Information Structure (SFIS)[Footnote 24] as an
enterprisewide data standard for categorizing financial information to
support financial management and reporting functions.
Despite this progress, we also reported[Footnote 25] that this version
of the architecture did not comply with all of the legislative
requirements[Footnote 26] and related best practices. For example,
while program officials stated that analyses of the current
architectural environment for several of the enterprise-level systems
had occurred, the architecture did not contain a description of, or a
reference to, the results of these analyses. The architecture also did
not include a systems standards profile to support implementation of
data sharing among departmentwide business systems and interoperability
with departmentwide IT infrastructure. Program officials acknowledged
that the architecture did not include this profile and stated that they
were working with the Assistant Secretary of Defense (Networks and
Information Integration) and Chief Information Officer to address this
in future versions. We also reported that the architecture was not, for
example, adequately linked to the military service and defense agency
component architectures and transition plans, which we said was
particularly important given the department's stated intention to adopt
a federated approach to developing and implementing the architecture.
In September 2006, DOD released Version 4.0 of its architecture, which
according to the department, resolves several of the architecture gaps
that were identified with the prior version. One example of a gap that
DOD reports Version 4.0 is beginning to fill is the definition of a key
business process area missing from prior versions--the planning,
programming, and budgeting process area. In this regard, according to
DOD, the architecture now includes departmental and other federal
planning, programming, and budgeting guidance (e.g., OMB Circular A-11)
and some high-level activities associated with this process area. In
addition, DOD reports that Version 4.0 has restructured the business
process models to reduce data redundancy and ensure adherence to
process modeling standards (e.g., eliminated numerous process modeling
standards violations and stand-alone process steps with no linkages).
Despite these improvements, this version is still missing, for example,
a depiction of the current environment (i.e., baseline of its current
assets and current capabilities) that was analyzed against its target
environment to identify capability gaps that the ETP is to address.
Further, it does not include DOD component architectures (e.g.,
services and various DOD agencies) as distinct yet coherent members of
a federated DOD business enterprise architecture.
DOD Plans to Federate Its Business Enterprise Architecture to the
Components:
Recognizing the need to address component architectures, DOD released
its business mission area federation strategy and road map in September
2006, which is intended to define how DOD will extend its business
enterprise architecture across the military services and defense
agencies. According to DOD, the strategy will provide for
standardization across the federation of architectures by, for example,
introducing a consistent set of standards for determining the status
and quality of the member (component and program) architectures, a
standard methodology for linking member architectures to the
overarching corporate architecture, the capability to search member
architectures, and a common method to reuse capabilities described by
these architectures.
In the end, the strategy is intended to link related business mission
area services or capabilities in the various architectures by
establishing a set of configuration standards for architecture
repositories. Further, the strategy is also intended to support the
development of the interoperable execution of enterprise and component
systems by defining and disclosing common services that can be shared
and reused by these systems. (See fig. 1 for a simplified and
illustrative conceptual depiction of DOD's federated business
enterprise architecture.)
Figure 1: Simplified and Illustrative Diagram of DOD's Federated
Business Enterprise Architecture:
[See PDF for image]
Source: Business Transformation Agency.
[End of figure]
The importance of extending the DOD business enterprise architecture to
the military services is underscored by our recent findings about the
military services' management of their respective enterprise
architecture programs.[Footnote 27] Specifically, in August 2006, we
released an assessment of federal agency enterprise architecture
programs' satisfaction of the elements in our Enterprise Architecture
Management Maturity Framework (EAMMF).[Footnote 28] Our EAMMF is a five-
stage architecture framework for managing the development, maintenance,
and implementation of an architecture and understanding the extent to
which effective architecture management practices are being performed
and where an organization is in its progression toward having a well-
managed architecture program. In short, the framework consists of 31
core elements that relate to architecture governance, content, use, and
measurement.[Footnote 29] These elements reflect research by us and
others showing that architecture programs should be founded upon
institutional architecture commitment and capabilities, and measured
and verified products and results.
With respect to the maturity of the military services' respective
enterprise architecture programs, we found that the departments of the
Air Force, the Army, and the Navy had not satisfied about 29, 55, and
29 percent of the core elements in our framework, respectively. In
addition, the Army had only fully satisfied 1 of the 31 core elements
(3 percent). (See table 1 for the number and percentage of elements
fully, partially, and not satisfied by each of the military services).
Table 1: Number and Percentage of Framework Elements Fully, Partially,
and Not Satisfied by the Military Services:
Military services: Air Force;
Fully satisfied: 14 (45%);
Partially satisfied: 8 (26%);
Not satisfied: 9 (29%).
Military services: Army;
Fully satisfied: 1 (03%);
Partially satisfied: 13 (42%);
Not satisfied: 17 (55%).
Military services: Navy;
Fully satisfied: 10 (32%);
Partially satisfied: 12 (39%);
Not satisfied: 9 (29%).
Source: GAO.
[End of table]
By comparison, the other major federal departments and agencies that we
reviewed had as a whole fully satisfied about 67 percent of the
framework's core elements. Among the key elements that all three
services had not fully satisfied were developing architecture products
that describe their respective target architectural environments and
developing transition plans for migrating to a target environment, in
addition to the following.
* The Air Force, for example, had not yet placed its architecture
products under configuration management to ensure the integrity and
consistency of these products and was not measuring and reporting on
the quality of these products.
* The Army, for example, had yet to develop effective architecture
development plans and had not developed architecture products that
fully described its current architectural environment.
* The Navy, for example, had yet to describe its current architectural
environment in terms of performance and had not explicitly addressed
security in its architecture descriptions.
Further, while the services had partially satisfied between 8 and 13
core elements in our framework, it is important to note that even
though certain core elements are partially satisfied, fully satisfying
some of them will not be accomplished quickly and easily. It is also
important to note the importance of fully, rather than partially,
satisfying certain elements, such as those that address architecture
content, which can have important implications for the quality of an
architecture and thus its usability and results.
To assist the military services in addressing enterprise architecture
challenges and managing their architecture programs, we recommended
that the services develop and implement plans for fully satisfying each
of the conditions in our framework. The department generally agreed
with our findings and recommendations and stated that it plans to use
our framework as one of the benchmark best practices as DOD components
continuously work to improve enterprise architecture management
maturity.
Clearly, much remains to be accomplished to implement the federated
strategy and create DOD's federated business enterprise architecture.
One key to making this happen, which we have previously
recommended,[Footnote 30] is having a business enterprise architecture
development management plan that defines what will be done, when, by
whom, and how it will done to fully develop the architecture. Having
and using such a plan is provided for in our EAMMF. Without one, the
department is less likely to effectively accomplish its intended
architecture evolution, extension, and improvement efforts. According
to BTA officials, they are in the process of addressing this
recommendation. We currently have ongoing work for this committee and
others looking at, among other things, how the department plans to
implement the federated strategy and the challenges that it faces in
doing so.
DOD Continues to Improve Its Enterprise Transition Plan, but Needed
Improvements Remain:
DOD has taken a number of steps to improve its ETP and address some of
the missing elements that we previously identified[Footnote 31]
relative to the Fiscal Year 2005 National Defense Authorization Act's
requirements and related transition planning guidance. For example, in
May 2006, we reported that the transition plan included an initiative
aimed at identifying capability gaps between the current and target
architectural environments, and provided information on progress on
major investments--including key accomplishments and milestones
attained, and more information about the termination of legacy systems.
However, we reported that it still did not identify, among other
things, all legacy systems that will not be part of the target
architecture, and it did not include system investment information for
all the military services, defense agencies, and combatant commands.
In September 2006, DOD released an updated revision to its ETP, which
continues to include major investments--such as key accomplishments and
milestones attained, as well as new information on near-term activities
(i.e., within the next 6 months) at both the enterprise and component
levels. For example, in an effort to improve visibility into personnel
activities, DOD reported that, for the Defense Civilian Personnel Data
System, it met the September 2006 milestone to implement enterprisewide
tools for use in advanced reporting and data warehousing, and that it
has set a September 2008 milestone for developing an implementation
strategy for integrating modules supporting functionality that is
currently provided by stand-alone applications. In addition, the
updated plan provides information on business priorities supported by
systems and initiatives and aligns these priorities with a set of
business value measures (e.g., on-time customer request, payroll
accuracy). Specifically, for each business enterprise priority, the
plan now identifies the business capability improvements (e.g., manage
personnel and pay) necessary to achieve the business enterprise
priority (e.g., personnel visibility) objectives and the metrics for
measuring progress towards achieving these objectives. In addition, the
plan now identifies the relationship between target systems, business
capabilities, operational activities, and the system functions they
provide and specific organizations that will or plan to use the system.
Further, the transition plan now includes the initial results of
ongoing analyses of gaps between its current and target environments
for most of the business enterprise priorities, in which capability and
performance shortfalls and their root causes are described and the
architecture solution component (such as business rules and
transformation initiatives and systems) that are to address these
shortfalls are identified.
However, the current transition plan is still missing important
elements. Specifically, the plan does not yet include system investment
information for all the defense agencies and combatant commands. In
addition, the planned investments in the transition plan are not
sequenced based on a range of activities that are critical to
developing an effective transition plan. As we have previously
reported,[Footnote 32] a transition or sequencing plan should provide a
temporal investment road map for moving between the current and target
environments, based on such considerations as technology opportunities,
marketplace trends, institutional system development and acquisition
capabilities, legacy and new system dependencies and life expectancies,
and the projected value of competing investments. According to a BTA
official responsible for the ETP, the transition plan investments have
not been sequenced based on these considerations. Rather, the ETP is
based on fiscal year budgetary constraints.
Program officials stated that the next version of the plan will enhance
performance metric tracking, improve the quality of system functional
scope and organizational span information, better integrate component
plans with enterprise plans, enhance federating plans for each business
capability, and possibly add other components to the enterprise
transition plan. As the transition plan evolves and all system
investments are validated against the architecture via capability gap
analyses, the department should be better positioned to sequentially
define and manage the migration and disposition of existing business
processes and systems--and the introduction of new ones.
DOD Has Established Business Systems Investment Decision-Making
Controls, but Full Implementation Remains Unclear:
To help improve the department's control and accountability over its
business systems investments, provisions in the Fiscal Year 2005
National Defense Authorization Act directed DOD to put in place a
specifically defined structure that is responsible and accountable for
controlling business systems investments to ensure compliance and
consistency with the business enterprise architecture. More
specifically, the act directs the Secretary of Defense to delegate
responsibility for review, approval, and oversight of the planning,
design, acquisition, deployment, operation, maintenance, and
modernization of defense business systems to designated approval
authorities or "owners" of certain business missions.[Footnote 33] DOD
has satisfied this requirement under the act. On March 19, 2005, the
Deputy Secretary of Defense issued a memorandum that delegated the
authority in accordance with the criteria specified in the act, as
described above. Our research and evaluation of agencies' investment
management practices have shown that clear assignment of senior
executive investment management responsibility and accountability is
crucial to having an effective institutional approach to IT investment
management.[Footnote 34]
The Fiscal Year 2005 National Defense National Authorization Act also
required DOD to establish investment review structures and processes,
including a hierarchy of investment review boards (IRB), each with
representation from across the department, and a standard set of
investment review and decision-making criteria for these boards to use
to ensure compliance and consistency with DOD's business enterprise
architecture. In this regard, the act required the establishment of the
DBSMC--which serves as the highest ranking governance body for business
system modernization activities within the department. As of April
2006, DOD identified 3,717 business systems and assigned responsibility
for these systems to IRBs. Table 2 shows the systems and the
responsible IRB and component.
Table 2: DOD Systems and Investment Review Board and Component:
Investment review board: Financial Management;
Air Force: 67;
Army: 161;
Navy: 148;
Defense Finance and Accounting Service: 72;
Other defense agencies: 35; Total: 483.
Investment review board: Human Resources Management;
Air Force: 164;
Army: 320;
Navy: 174;
Defense Finance and Accounting Service: 20;
Other defense agencies: 114; Total: 792.
Investment review board: Weapon System Life-Cycle Management and
Materiel Supply and Service Management;
Air Force: 780;
Army: 730;
Navy: 406;
Defense Finance and Accounting Service: 1;
Other defense agencies: 168; Total: 2,085.
Investment review board: Real Property and Installations Life-Cycle
Management;
Air Force: 71;
Army: 122;
Navy: 44;
Defense Finance and Accounting Service: 0;
Other defense agencies: 17; Total: 254.
Investment review board: Other;
Air Force: 65;
Army: 0;
Navy: 26;
Defense Finance and Accounting Service: 0;
Other defense agencies: 12; Total: 103.
Investment review board: Total;
Air Force: 1,147;
Army: 1,333;
Navy: 798;
Defense Finance and Accounting Service: 93;
Other defense agencies: 346; Total: 3,717.
Source: GAO analysis of DOD data.
[End of table]
A key element of the department's approach to reviewing and approving
business systems investments is the use of what it refers to as tiered
accountability. DOD's tiered accountability approach involves an
investment control process that begins at the component level and works
its way through a hierarchy of review and approval authorities,
depending on the size and significance of the investment. Military
service officials emphasized that the success of the process depends on
them performing a thorough analysis of each business system before it
is submitted for higher-level review and approval. Through this
process, the department reported in March 2006 that 226 business
systems, representing about $3.6 billion in modernization investment
funding, had been approved by the DBSMC--the department's highest-
ranking approval body for business systems. According to the
department's March 2006 report, this process also identified more than
290 systems for phase out or elimination and approximately 40 business
systems for which the requested funding was reduced and the funding
availability periods were shortened to fewer than the number of years
requested. For example, one business system investment that has been
eliminated is the Forward Compatible Payroll (FCP) system. In reviewing
the program status, the IRB determined that FCP would duplicate the
functionality contained in the Defense Integrated Military Human
Resources System, and it was unnecessary to continue investing in both
systems.[Footnote 35] A major reason the department has thousands of
business systems is that it has historically failed to consistently
employ the range of effective institutional investment management
controls, such as an architecture-centric approach to investment
decision making, that our work and research show are keys to successful
system modernization programs. Such controls help to identify and
eliminate duplicative systems and this helps to optimize mission
performance, accountability, and transformation. They also help to
ensure that promised system capabilities and benefits are delivered on
time and within budget.
Furthermore, the BTA reports that the tiered accountability approach
has reduced the level of funding and the number of years that funding
will be available for 14 Army business systems, 8 Air Force business
systems, and 8 Navy business systems. For example, the Army's Future
Combat Systems Advanced Collaborative Environment program requested
funding of $100 million for fiscal years 2006 through 2011, but the
amount approved was reduced to approximately $51 million for fiscal
years 2006 through 2008. Similarly, Navy's Military Sealift Command
Human Resources Management System requested funding of about $19
million for fiscal years 2006 through 2011, but the amount approved was
approximately $2 million for the first 6 months of fiscal year 2006.
According to Navy officials, this system initiative will be reviewed to
ascertain whether it has some of the same functionality as the Defense
Civilian Personnel Data System. Funding system initiatives for shorter
time periods can help reduce the financial risk by providing additional
opportunities for monitoring a project's progress against established
milestones and help ensure that the investment is properly aligned with
the architecture and the department's overall goals and objectives.
Besides limiting funding, the investment review and approval process
has resulted in conditions being placed on system investments. These
conditions identify specific actions to be taken and when the actions
must be completed. For example, in the case of the Army's Logistics
Modernization Program (LMP) initiative, one of the noted conditions was
that the Army had to address the issues discussed in our previous
reports.[Footnote 36] In our May 2004 report, we recommended that the
department establish a mechanism that provides for tracking all
business systems modernization conditional approvals to provide
reasonable assurance that all specific actions are completed on
time.[Footnote 37] In response, the department has begun to track
conditional approvals.
Despite the department's efforts to control its investments to acquire
new business systems or to enhance existing business systems,
formidable challenges remain. In particular, the reviews of those
business systems that have modernization funding of less than $1
million, which represent the majority of the department's reported
3,717 business systems, are only now being started on an annual basis,
and thus the extent to which the review structures and processes will
be applied to the department's 3,717 business systems is not clear.
Given the large number of systems involved, it is important that an
efficient system review and approval process be effectively implemented
for all systems. As indicated in table 2, there are numerous systems
across the department in the same functional area. Such large numbers
of systems indicate a real possibility for eliminating unnecessary
duplication and avoiding unnecessary spending on the department's
multiple business systems. In support of this Subcommittee, we have
work planned to address the extent to which these management controls
are actually being implemented for both the enterprise-level
investments and the thousands of other system investments that are
being managed at the component level.
Key DOD Systems Still Face Challenges:
As we have previously testified and reported,[Footnote 38] DOD has not
effectively managed a number of business system programs. Among other
things, our reviews of individual system investments have identified
weaknesses in such things as architectural alignment and informed
investment decision making, which are focus areas of the Fiscal Year
2005 National Defense Authorization Act provisions. Our reviews have
also identified weaknesses in other system acquisition and investment
management areas--such as requirements management, testing, and
performance management--where good management is crucial for the
successful implementation of any given DOD business system. I will
describe examples of the weaknesses that we have recently reported on
for five system investments. The system investments are the Defense
Integrated Military Human Resources System (DIMHRS), Defense Travel
System (DTS), the Army Logistics Modernization Program (LMP), the Navy
Tactical Command Support System (NTCSS), and the Transportation
Coordinators' Automated Information for Movements System II (TC-AIMS
II). The weaknesses that we have found raise questions as to the extent
to which the structures, processes, and controls that DOD has
established in response to the Fiscal Year 2005 National Defense
Authorization Act are actually being implemented, and illustrate the
range of system acquisition and investment management controls (beyond
those provided for in the act) that need to be effectively implemented
in order for a given investment to be successfully acquired and
deployed.
DIMHRS:
In 2005 we reported that DIMHRS--a planned DOD-wide military pay and
personnel system---was not being managed as a DOD-wide investment, to
include alignment with a DOD-wide architecture and governance by a DOD-
wide body.[Footnote 39] In addition, we reported that DIMHRS
requirements had not been adequately defined, and not all acquisition
best practices associated with commercial component-based systems were
being followed. Accordingly, we made a number of recommendations. In
response, DOD has elevated the system to an enterprise investment under
the BTA, and established a DIMHRS steering committee that is chartered
to include representation from the services. The BTA has also hired a
DIMHRS program manager, and the Army and the Air Force, while
continuing to evaluate their respective requirements, have determined
that the commercial software product selected for DIMHRS can be used
under certain conditions. The Army expects to deploy DIMHRS in April
2008 and the Air Force plans to begin deployment in May 2008. The Navy,
on the other hand, assessed both DIMHRS and the Marine Corps Total
Force System (MCTFS)[Footnote 40] and determined that MCTFS would
better meet its requirements. According to a Navy official, the DBSMC
has directed the Navy to research MCTFS and to fully evaluate the cost
implications of the MCTFS option, but has not granted the Navy
permission to deploy MCTFS. We plan to evaluate DOD's implementation of
our prior recommendations and the Navy's analysis of the merits of
pursuing the MCTFS option.
DTS:
In September 2006, we reported[Footnote 41] on limitations in the
economic justification underlying DOD's decision to invest in DTS,
which is intended to be the standard departmentwide travel system.
Specifically, we found that two key assumptions used to estimate cost
savings in the September 2003 DTS economic analysis were not based on
reliable information. Additionally, we reported that DOD did not have
quantitative metrics to measure the extent to which DTS is actually
being used. Moreover, we found that DOD had not adequately defined and
tested the system's requirements, an area of concern that was also
discussed in our January 2006 report.[Footnote 42] These system
acquisition management weaknesses introduce considerable risk to DOD's
ability to deliver promised DTS capabilities and benefits on time and
within budget. Although the September 2003 economic analysis was not
based on supportable data, the department's criteria do not require
that a new economic analysis be prepared. DTS has already completed all
of the major milestones related to a major automated system which
require that an economic analysis be prepared or at least updated to
reflect the current assumptions and the related costs and benefits.
However, the Fiscal Year 2005 National Defense Authorization
Act[Footnote 43] requires the periodic review, but not less than
annually, of every defense business system investment. Further, the
department's April 2006 guidance[Footnote 44] notes that the annual
review process "provides follow-up assurance that information
technology investments, which have been previously approved and
certified, are managed properly, and that promised capabilities are
delivered on time and within budget." If effectively implemented, this
annual review process provides an excellent opportunity for DOD
management to assess whether DTS is meeting its planned cost, schedule,
and functionality goals. Going forward, such a review could serve as a
useful management tool in making funding and other management decisions
related to DTS. We made recommendations to DOD aimed at improving the
management oversight of DTS, including periodic reports on DTS
utilization and resolution of inconsistencies in DTS's requirements.
DOD generally agreed with the recommendations and described its efforts
to address them.
LMP:
In 2004 and 2005,[Footnote 45] we reported that the Army faced
considerable challenges in developing and implementing LMP which is
intended to transform the Army Materiel Command's logistics operations.
In particular, we reported that LMP will not provide intended
capabilities and benefits because of inadequate requirements management
and system testing. These problems prevented the Tobyhanna Army Depot
from accurately reporting on its financial operations, which, in turn,
adversely impacts the depot's ability to accurately set prices. We
found that the Army has not put into place an effective management
process to help ensure that the problems with the system are resolved.
While the Army developed a process that identified the specific steps
that should be followed in addressing the problems identified, the
process was not followed. We recommended improvements in the
implementation of LMP as well as delaying implementation at the
remaining four depots until problems encountered have been resolved.
DOD concurred with all the recommendations. The Subcommittee has
requested that we undertake a series of audits directed at DOD's
efforts to resolve long-standing financial management problems over the
visibility of its assets. Our first such audit is evaluating the Army's
efforts in the area and will include follow-up work on LMP.
NTCSS:
In December 2005, [Footnote 46] we reported that DOD needed to reassess
its planned investment in the NTCSS--a system intended to help Navy
personnel effectively manage ships, submarines, and aircraft support
activities. Among other things, we reported that the Navy had not
economically justified its ongoing and planned investment in the NTCSS
and had not invested in the NTCSS within the context of a well-defined
DOD or Navy enterprise architecture. In addition, we reported that the
Navy had not effectively performed key measurement, reporting,
budgeting, and oversight activities, and had not adequately conducted
requirements management and testing activities. We conclude that
without this information, the Navy could not determine whether the
NTCSS as defined, and as being developed, is the right solution to meet
its strategic business and technological needs. Accordingly, we
recommended that DOD develop the analytical basis to determine if
continued investment in the NTCSS represents prudent use of limited
resources and we also made recommendations to strengthen management of
the program, conditional upon a decision to proceed with further
investment in the program. In response, DOD generally concurred with
the recommendations.
TC-AIMS II:
In December 2005,[Footnote 47] we reported that TC-AIMS II--a joint
services system with the goal of helping to manage the movement of
forces and equipment within the United States and abroad--had not been
defined and developed in the context of a DOD enterprise architecture.
Similar to DIMHRS and DTS, TC-AIMS II was intended to be an enterprise-
level system. However, the Army--DOD's acquisition agent for TC-AIMS
II--had pursued the system on the basis of an Army logistics-focused
architecture. This means that TC-AIMS II, which was intended to produce
a departmentwide military deployment management system, was based on a
service-specific architecture, thus increasing the risk that this
program, as defined, will not properly fit within the context of future
DOD enterprisewide business operations and IT environments. In
addition, the Army had not economically justified the program on the
basis of reliable estimates of life-cycle costs and benefits, and as a
result, the Army does not know if investment in TC-AIMS II, as planned,
is warranted or represents a prudent use of limited DOD resources.
Accordingly, we recommended that DOD, among other things, develop the
analytical basis needed to determine if continued investment in TC-AIMS
II, as planned, represents prudent use of limited defense resources. In
response, DOD generally concurred with our recommendations and
described efforts initiated or planned to bring the program into
compliance with applicable guidance.
DOD Issues Its Financial Improvement and Audit Readiness Plan:
A major component of DOD's business transformation effort is the
defense Financial Improvement and Audit Readiness Plan (FIAR),
initially issued in December 2005 and updated in June 2006 and
September 2006, pursuant to section 376 of the National Defense
Authorization Act for Fiscal Year 2006.[Footnote 48] Section 376
limited DOD's ability to obligate or expend funds for fiscal year 2006
on financial improvement activities until the department submitted a
comprehensive and integrated financial management improvement plan to
the congressional defense committees. Section 376 required the plan to
(1) describe specific actions to be taken to correct deficiencies that
impair the department's ability to prepare timely, reliable, and
complete financial management information and (2) systematically tie
these actions to process and control improvements and business systems
modernization efforts described in the business enterprise architecture
and transition plan. Further, section 376 required a written
determination that each financial management improvement activity
undertaken is consistent with the financial management improvement plan
and likely to improve internal controls or otherwise result in
sustained improvement in DOD's ability to produce timely, reliable, and
complete financial management information. DOD had to submit each
written determination to the congressional defense committees. Section
321 of the National Defense Authorization Act for Fiscal Year 2007
extended the written determination provision beyond fiscal year
2006.[Footnote 49]
DOD intends the FIAR Plan to provide DOD components with a framework
for resolving problems affecting the accuracy, reliability, and
timeliness of financial information, and obtaining clean financial
statement audit opinions. The FIAR Plan states that it prioritizes
DOD's improvement efforts based on the following criteria: (1) impact
on DOD financial statements, (2) ability to resolve long-standing
problems, (3) need for focused DOD leadership attention to resolve the
problem, (4) dependency on business transformation initiatives and
system solutions, and (5) availability of resources. The FIAR Plan
outlines the business rules and oversight structure DOD has established
to guide financial improvement activities and audit preparation
efforts. According to DOD, its June and September 2006 FIAR Plan
updates were intended to (1) begin identifying milestones that must be
met for assertions about the reliability of reported financial
statement information to occur on time, (2) develop greater consistency
among components regarding their corrective actions and milestones, and
(3) further describe how the FIAR Plan will be integrated with the
enterprise transition plan. In addition, the September 2006 update
outlines three key elements for achieving financial management
transformation: accountability, integration, and prioritization.
Although the FIAR Plan states that it is integrated with DOD component-
level financial improvement plans and the ETP, DOD officials have
acknowledged that the level of integration between the two efforts is
not complete and is still evolving.
The FIAR Plan is a high-level summary of DOD's plans and reported
actions to comply with financial management legislation and achieve
clean financial statement audit opinions. We have reviewed the FIAR
Plan and its updates and discussed the FIAR Plan with DOD and OMB. We
cannot comment on specific focus areas or milestones because we have
not seen any of the underlying component or other subordinate plans on
which the FIAR Plan is based. However, we believe the incremental line
item approach, integration plans, and oversight structure outlined in
the FIAR Plan for examining DOD's operations, diagnosing problems,
planning corrective actions, and preparing for audit represents a vast
improvement over prior financial improvement initiatives.
We continue to stress that the effectiveness of DOD's FIAR Plan will
ultimately be measured by the department's ability to provide timely,
reliable, and useful information for day-to-day management and decision
making. Nonetheless, I would like to see DOD place greater emphasis on
achieving auditability by 2012. If DOD is able to achieve this date,
and other impediments to an opinion on the consolidated financial
statements of the U.S. government are also addressed, an opinion for
the federal government may also be possible by 2012. We look forward to
working with DOD and the new DOD inspector general, when appointed, in
further developing DOD's audit strategy.
Legislation Enacted to Address DOD's Financial Management Weaknesses
and Strengthen Business Systems Accountability:
Lastly, you asked for my comments on two sections of the recently
enacted John Warner National Defense Authorization Act for Fiscal Year
2007.[Footnote 50] The first provision, section 321, seeks to ensure
that the department pursues financial management improvement activities
only in accordance with a comprehensive financial management
improvement plan that coordinates these activities with improvements in
its systems and controls. The second provision, section 816,
establishes certain reporting and oversight requirements for the
acquisition of all major automated information systems (MAIS).[Footnote
51]
Legislation Reiterates Need for Consistency between DOD's Financial and
Business Transformation Plans:
Section 321 of the John Warner National Defense Authorization Act for
Fiscal Year 2007 extends beyond fiscal year 2006 certain limitations
and requirements placed on DOD's financial management improvement and
audit initiatives in section 376 of the National Defense Authorization
Act for Fiscal Year 2006. Specifically, section 321 of the act limits
DOD's ability to obligate or expend any funds for the purpose of any
financial management improvement activity relating to the preparation,
processing, or auditing of financial statements until it has submitted
to the congressional defense committees a written determination that
each activity proposed to be funded is (1) consistent with the DOD
financial management improvement plan required by section 376 of the
National Defense Authorization Act for Fiscal Year 2006 and (2) is
likely to improve internal controls or otherwise result in sustained
improvements in the ability of the department to produce timely,
reliable, and complete financial management information.
I fully support the intent of legislation, such as section 321, which
is aimed at directing DOD's corrective actions towards the
implementation of sustained improvements in its ability to provide
timely, reliable, complete, and useful information. This is imperative
not only for financial reporting purposes, but more importantly for
daily decision making and oversight. Section 321 is consistent with and
builds on existing legislation, in addition to section 376 of the
National Defense Authorization Act for Fiscal Year 2006. For example,
section 1008 of the National Defense Authorization Act for Fiscal Year
2002[Footnote 52] currently requires DOD to limit resources used to
prepare and audit unreliable financial information, thereby saving the
taxpayers millions of dollars annually. In addition, the fiscal year
2002 act requires DOD to report to congressional committees and others
annually on the reliability of DOD's financial information and to
provide a summary of improvement activities, including priorities,
milestones, measures of success, and estimates of when each financial
statement will convey reliable information. In my opinion, Congress has
clearly articulated its expectation that DOD exercise prudence in its
use of taxpayer money and focus only on those activities that will
result in sustained improvements in its ability to produce timely and
reliable financial management information.
It is evident that DOD intends to use its FIAR Plan, which it plans to
update semiannually, as a tool for complying with legislative
requirements regarding its financial improvement efforts. However, as
is true with most large initiatives, a comprehensive and integrated
plan, sustained leadership, results-oriented performance measures, and
effective implementation will be key to successful reform.
Legislative Language Establishing Reporting Requirements for Major
Automated Information Systems Increases Oversight and Accountability:
The provisions in section 816 of the John Warner National Defense
Authorization Act for Fiscal Year 2007 provide for greater disclosure
and accountability of business system investment performance, and thus
facilitate greater oversight. More specifically, the legislation
establishes certain reporting and oversight requirements for the
acquisition of MAIS that fail to meet cost, schedule, or performance
criteria. In general, a MAIS is a major DOD IT program that is not
embedded in a weapon system (e.g., a business system investment). As
such, we believe that the provisions can increase oversight and
accountability. Therefore, I also support this legislation.
Specific High-risk Program Areas Highlight the Need for Continued
Attention to Ensure Effective Transformation:
I would like to discuss the five remaining high-risk areas within DOD.
These include weapon systems acquisitions and contract management;
supply chain management; personnel security clearance program; and
support infrastructure management.
DOD Weapon Systems Acquisitions and Contract Management:
Two interrelated areas are the management of DOD's major weapon systems
acquisitions and its contracts. While DOD eventually fields the best
weapon systems in the world, we have consistently reported that
typically the programs take significantly longer, cost significantly
more money, and deliver fewer capabilities than originally promised.
DOD's new weapon system programs are expected to be the most expensive
and complex ever and will consume an increasingly large share of DOD's
budget. These costly current and planned acquisitions are running head-
on into the nation's unsustainable fiscal path. In the past 5 years,
DOD has doubled its commitment to weapon systems from $700 billion to
$1.4 trillion, but this huge increase has not been accompanied by more
stability, better outcomes, or increased buying power for the
acquisition dollar. Rather than showing appreciable improvement,
programs are experiencing recurring problems with cost overruns, missed
deadlines, and performance shortfalls. A large number of the programs
included in our annual assessment of weapon systems are costing more
and taking longer to develop than estimated.[Footnote 53] It is not
unusual to see development cost increases between 30 percent and 40
percent and attendant schedule delays. These cost increases mean DOD
cannot produce as many weapons as intended nor can it be relied on to
deliver to the warfighter when promised. This causes DOD to either cut
back on planned quantities or capabilities, or to even scrap
multibillion dollar programs, after years of effort. If these systems
are managed with the traditional margins of error, the financial
consequences can be dire, especially in light of a constrained
discretionary budget.
It is within this context that we must engage in a comprehensive and
fundamental reexamination of new and ongoing investments in our
nation's weapon systems. Success for acquisitions means making sound
decisions to ensure that program investments are based on needs versus
wants and getting promised results. In the commercial world, successful
companies have no choice but to adopt processes and cultures that
emphasize basing decisions on knowledge, reducing risks prior to
undertaking new efforts, producing realistic cost and schedule
estimates, and building in quality to deliver products to customers at
the right price, time, and cost. However, this is not happening within
DOD. The department has tried to embrace best practices in its policies
and instill more discipline in setting requirements, among numerous
other actions, but it still has trouble distinguishing wants from true
needs. While DOD's acquisition policy supports a knowledge-based,
evolutionary approach to acquiring new weapons, its practice of making
decisions on individual programs often sacrifices knowledge and
executability in favor of revolutionary solutions. In an important
sense, success has come to mean starting and continuing programs even
when cost, schedule, and quantities must be sacrificed.
Our reviews have identified a number of causes behind the acquisition
problems just described, but I would like to focus on three. The first
I refer to as "big A," or acquisition with a capital "A." What I mean
by this is that DOD's funding, requirements, and acquisition processes
are not working synergistically. DOD does not clearly define and
stabilize requirements before programs are started. Our work has shown
that DOD's requirements process generates more demand for new programs
than fiscal resources can support. DOD compounds the problem by
approving many highly complex and interdependent programs. Moreover,
once a program is approved, requirements can be added along the way--
significantly stretching technology, creating design challenges,
exacerbating budget overruns, and enhancing accountability challenges.
For example, in the F-22A program, after the program was started, the
Air Force added a requirement for air-to-ground attack capability. In
its Global Hawk program, after the start of the program, the Air Force
added both signals intelligence and imagery intelligence requirements.
Both programs have experienced serious schedule delays and significant
unit cost increases. Customers often demand additional requirements
fearing there may not be another chance to get new capabilities because
programs can take a decade or longer to complete. Yet, perversely,
these strategies delay delivery to the warfighter, often by years.
The second cause I would refer to as "little a" or the acquisition
process itself. DOD commits to individual programs before it obtains
assurance that the capabilities it is pursuing can be achieved within
available resources and time constraints. In particular, DOD routinely
accepts high levels of technology risk at the start of major
acquisition programs. Funding processes encourage this approach, since
acquisition programs attract more dollars than efforts concentrating
solely on proving out technologies. However, without mature
technologies at the outset, a program will almost certainly incur cost
and schedule problems. Only 10 percent of the programs in our latest
annual assessment of weapon systems had demonstrated critical
technologies to best practice standards at the start of development;
and only 23 percent demonstrated them to DOD's standards.[Footnote 54]
The cost effect of proceeding without completing technology development
before starting an acquisition can be dramatic. For example, research,
development, test and evaluation costs for the programs included in our
review that met best practice standards at program start increased by a
modest average of 4.8 percent more than the first full estimate,
whereas the costs for the programs that did not meet these standards
increased by a much higher average of 34.9 percent more than the first
full estimate. The bottom line is that these consequences are
predictable and, thus, preventable.
The third cause has to do with the lack of accountability. DOD
officials are not always held accountable when programs go astray.
Likewise, contractors are not always held accountable when they fail to
achieve desired acquisition outcomes. In December 2005, we reported
that DOD gives its contractors the opportunity to collectively earn
billions of dollars through monetary incentives.[Footnote 55]
Unfortunately, we found DOD programs routinely engaged in practices
that failed to hold contractors accountable for achieving desired
outcomes and undermined efforts to motivate contractor performance,
such as:
* evaluating contractor performance on award-fee criteria that are not
directly related to key acquisition outcomes (e.g., meeting cost and
schedule goals and delivering desired capabilities to the warfighter);
* paying contractors a significant portion of the available fee for
what award-fee plans describe as "acceptable, average, expected, good,
or satisfactory" performance, which sometimes did not require meeting
the basic requirements of the contract; and:
* giving contractors at least a second opportunity to earn initially
unearned or deferred fees.
As a result, DOD has paid out an estimated $8 billion in award fees on
contracts in our study population, regardless of whether acquisition
outcomes fell short of, met, or exceeded DOD's expectations. For
example, we found that DOD paid its contractor for a satellite program-
-the Space-Based Infrared System High--74 percent of the award fee
available, $160 million, even though research and development costs
increased by more than 99 percent, and the program was delayed for many
years and was rebaselined three times. In another instance, DOD paid
its contractor for the F-22A aircraft more than $848 million, 91
percent of the available award fee, even though research and
development costs increased by more than 47 percent, and the program
had been delayed by more than 2 years and rebaselined 14 times. Despite
paying billions of dollars in award and incentive fees, DOD has not
compiled data or developed performance measures to validate its belief
that award and incentive fees improve contractor performance and
acquisition outcomes.
Similarly, DOD officials are rarely held accountable when programs go
astray. There are several reasons for this, but the primary ones
include the fact that DOD has never clearly specified who is
accountable for what, invested responsibility for execution in any
single individual, or even required program leaders to stay until the
job is done. Moreover, program managers are not empowered to make go or
no-go decisions, they have little control over funding, they cannot
veto new requirements, and they have little authority over staffing.
Because there is frequent turnover in their positions, program managers
also sometimes find themselves in the position of having to take on
efforts that are already significantly flawed.
There are many other factors that play a role in causing weapons
programs to go astray. They include workforce challenges, poor
contractor oversight, frequent turnover in key leadership, and a lack
of systems engineering, among others. Moreover, many of the business
processes that support weapons development--strategic planning and
budgeting, human capital management, infrastructure, financial
management, information technology, and contracting--are beset with
pervasive, decades-old management problems, including outdated
organizational structures, systems, and processes. In fact, all of
these areas--along with weapon systems acquisition--are on our high-
risk list of major government programs and operations.
Our work shows that acquisition problems will likely persist until DOD
provides a better foundation for buying the right things, the right
way. This involves making tough trade-off decisions as to which
programs should be pursued and, more importantly, not pursued, making
sure programs are executable, locking in requirements before programs
are started, and making it clear who is responsible for what and
holding people accountable when these responsibilities are not
fulfilled. These changes will not be easy to make. They require DOD to
reexamine the entirety of its acquisition process and to make deep-
seated changes to the setting, funding, and execution of program
requirements. In other words, DOD would need to revisit who sets
requirements and strategy, and who monitors performance, and what
factors to consider in selecting and rewarding contractors. It also
involves changing how DOD views success, and what is necessary to
achieve success. I am encouraged by DOD's recent efforts to improve the
collaboration and consultation between the requirements and acquisition
communities. The test of these efforts will be whether they produce
better decisions. If they do, it is important that they are sustained
by more than the force of personality.
Buying major systems is not the only area where DOD needs to improve
its acquisition practices. For example, DOD's management of its
contracts has been on our high-risk list since 1992. Our work has found
that DOD is unable to ensure that it is using sound business practices
to acquire the goods and services needed to meet the warfighter's
needs, creating unnecessary risks and paying higher prices than
justified. In this regard, in a March 2005 report, we concluded that
deficiencies in DOD's oversight of service contractors could place DOD
at risk of paying the contractors more than the value of the services
they performed.[Footnote 56] In June 2006, we reported that personnel
at the Defense Logistics Agency were not consistently reviewing prices
for commodities acquired under its Prime Vendor Program.[Footnote 57]
We noted that until DOD provides sufficient management oversight, the
program will remain vulnerable to the systemic pricing problems that
have plagued it in the past. Earlier this year, we reported that the
Army acquired security guard services under an authorized sole-source
basis, despite recognizing that it was paying about 25 percent more
than it had under contracts that had been previously awarded
competitively.[Footnote 58] We recommended that the Army reassess its
acquisition strategy to help make the best use of taxpayer dollars and
achieve its desired outcomes. In other reports, we identified numerous
issues in DOD's use of interagency contracting vehicles that
contributed to poor acquisition outcomes.
Until the department devotes sufficient management attention to address
these long-standing issues, DOD remains at risk of wasting billions of
dollars and failing to get the goods and services it needs to
accomplish its missions.
DOD Supply Chain Management:
Since the January 2005 update of the high-risk series, DOD has made
some progress toward addressing supply chain management problems. With
the encouragement of OMB, DOD has developed a plan to show progress
toward the long-term goal of resolving problems and removing supply
chain management from our list of high-risk areas within the
department. DOD issued the first iteration of the plan in July 2005
and, since then, has regularly updated it. Based on our initial review
of the plan, we believe it is a solid first step toward improving
supply chain management in support of the warfighter. For example,
DOD's plan identifies three key areas--requirements forecasting, asset
visibility, and materiel distribution--that we believe are critical to
DOD's efforts to improve supply chain management. The plan highlights
selected DOD supply chain initiatives, including key milestones in
their development. Within the last year, for example, DOD has made some
progress in streamlining the storage and distribution of defense
inventory items on a regional basis as part of its Joint Regional
Inventory Materiel Management initiative. DOD has completed a pilot for
this initiative in the San Diego region and, in January 2006, began a
similar transition for inventory items in Oahu, Hawaii. Notwithstanding
this positive first step, the department faces challenges and risks in
successfully implementing its proposed changes across the department
and measuring progress in resolving supply chain management problems.
It will be important for DOD to sustain top leadership commitment and
long-term institutional support for the plan; obtain necessary resource
commitments from the military services, the Defense Logistics Agency,
and other organizations; implement its proposed initiatives across the
department; identify performance metrics and valid data to use in
monitoring the initiatives; and demonstrate progress toward meeting
performance targets. We have been holding monthly meetings with DOD and
OMB officials to receive updates on the plan and gain a greater
understanding of the ongoing initiatives. In addition, we are
continuing to review the performance measures DOD is using to track the
plan's progress in resolving supply chain problems and DOD's efforts to
develop a comprehensive, integrated, and enterprisewide strategy to
guide logistics programs and initiatives. DOD is working on a logistics
road map, referred to as the "To Be" road map, which provides a vision
for future logistics programs and initiatives, including supply chain
management; identifies capability gaps; and links programs with
investments. However, the schedule for completing the initial road map
has recently slipped. Until the road map is completed, we will not be
able to assess how it addresses the challenges and risks DOD faces in
its supply chain management efforts.
DOD Personnel Security Clearance Program:
DOD's personnel security clearance program is another area that we
continue to assess because of the risks it poses. For over two decades,
we have reported on problems with DOD's personnel security clearance
program as well as the financial costs and risks to national security
resulting from these problems. For example, at the turn of the century,
we documented problems such as incomplete investigations, inconsistency
in determining eligibility for clearances, and a backlog of overdue
clearance reinvestigations that exceeded 500,000 cases. More recently
in 2004, we identified continuing and new impediments hampering DOD's
clearance program and made recommendations for increasing the
effectiveness and efficiency of the program. These long-standing delays
in completing hundreds of thousands of clearance requests for
servicemembers, federal employees, and industry personnel as well as
numerous impediments that hinder DOD's ability to accurately estimate
and eliminate its clearance backlog led us to declare DOD's personnel
security clearance program a high-risk area in January 2005. Since
then, we have issued a report and participated in four hearings that
addressed issues related to DOD's program.[Footnote 59] Among other
things, our September 2006 report showed that the 2,259 industry
personnel granted eligibility for a top secret clearance in January and
February 2006 had waited an average of 471 days. Also, our reviews of
50 of the cases for completeness revealed that required information was
not included in almost all of the cases. While positive steps--such as
(1) the development of an initial version of a plan to improve security
clearance processes governmentwide and (2) high-level involvement from
OMB--have been taken toward addressing the problems, other recent
events such as DOD halting the processing of all new clearance requests
for industry personnel on April 28, 2006, reveal continuing problems
with DOD's personnel security clearance program.
DOD Support Infrastructure Management:
Since 1997, GAO has identified DOD's management of its support
infrastructure as a high-risk area because infrastructure costs
continue to consume a larger than necessary portion of its budget. DOD
officials have been concerned for several years that much of the
department's infrastructure is outdated, inadequately maintained, and
that DOD has more infrastructure than needed, which impacts its ability
to devote more funding to weapon systems modernization and other
critical needs. Inefficient management practices and outdated business
processes have also contributed to the problem.
While DOD has made progress and expects to continue making improvements
in its support infrastructure management, DOD officials recognize they
must achieve greater efficiencies. To its credit, the department has
given high-level emphasis to reforming its support operations and
infrastructure since we last reported on this high-risk area, including
efforts to reduce excess infrastructure, promote transformation, and
foster jointness through the 2005 base realignment and closure (BRAC)
process. Also, DOD is updating its Defense Installations Strategic Plan
to better address infrastructure issues, and has revised its
installations readiness reporting to better measure facility
conditions, established core real property inventory data requirements
to better support the needs of real property asset management, and
continued to modify its suite of analytical tools to better forecast
funding requirements for installation management services. It has also
achieved efficiencies through privatizing military family housing and
demolishing unneeded buildings at military installations.
Our engagements examining DOD's management of its facilities
infrastructure indicates that much work remains for DOD to fully
rationalize and transform its support infrastructure to improve
operations, achieve efficiencies, and allow it to concentrate its
resources on the most critical needs, as the following illustrates.
* In July 2005, we reported on clear limitations associated with
achieving DOD's projected $50 billion in savings from this BRAC round.
While DOD offered many proposed actions in the 2005 round, these
actions were more related to business process reengineering and
realignment of various functions and activities than base closures and
actual facility reductions. Moreover, sizable savings were projected
from efficiency measures and other actions, but many underlying
assumptions had not been validated and could be difficult to track over
time. We have ongoing work monitoring actions emanating from the 2005
BRAC process and assessing costs and savings from those actions, and
will be able to comment further on the status of these initiatives over
the next several years as implementation actions progress.
* In June 2005, we reported that hundreds of millions of operation and
maintenance dollars designated for facilities' sustainment,
restoration, and modernization and other purposes were moved by the
services to pay for base operations support (BOS) due in part to a lack
of a common terminology across the services in defining BOS functions,
as well as the lack of a mature analytic process for developing
credible and consistent requirements.[Footnote 60] While these funding
movements are permissible, we found that they were disruptive to the
orderly provision of BOS services and contributed to the overall
degradation of facilities, which adversely affects the quality of life
and morale of military personnel. In another report issued in June
2005, we reported that many of DOD's training ranges were in
deteriorated condition and lacked modernization, which adversely
affected training activities and jeopardized the safety of military
personnel.[Footnote 61]
* In an April 2006 report, we identified several opportunities for DOD
and the services to improve their oversight and monitoring of the
execution and performance of awarded privatized housing
projects.[Footnote 62] We further reported that 36 percent of awarded
privatization projects had occupancy rates below expectations even
though the services had begun renting housing units to parties other
than military families, including units rented to single or
unaccompanied servicemembers, retired military personnel, civilians and
contractors who work for DOD, and civilians from the general public.
Factors contributing to occupancy challenges include increased housing
allowances, which have made it possible for more military families to
live off base thus reducing the need for privatized housing, and the
questionable reliability of DOD's housing requirements determination
process, which could result in overstating the need for privatized
housing.
* During recent visits to installations in the United States and
overseas, service officials continue to report inadequate funding to
provide both base operations support and maintain their facilities.
They express concern that unless this is addressed, future upkeep and
repair of many new facilities to be constructed as a result of BRAC,
overseas rebasing, and the Army's move to the modular brigade structure
will suffer and the condition of their facilities will continue to
deteriorate.
* We have also found that DOD's outline of its strategic plan for
addressing this high-risk area had a number of weaknesses and warranted
further clarification and specification. We have met with OMB and DOD
officials periodically to discuss the department's efforts to address
this high-risk area.
Through our monitoring of DOD activities between now and the next
several years for base closures and overseas basing, we will be able to
determine what other work needs to be done on issues associated with
DOD's management of its support infrastructure, as well as provide a
more complete assessment of costs, savings, and overall benefits
realized from the department's efforts to address these issues.
Organizations throughout DOD will need to continue reengineering their
business processes and striving for greater operational effectiveness
and efficiency. DOD will also need to develop a comprehensive, long-
range plan for its infrastructure that addresses facility requirements,
recapitalization, and maintenance and repair, as well as to provide
adequate resources to meet these requirements and halt the degradation
of facilities and services.
Mr. Chairman and Members of the Subcommittee, this concludes my
prepared statement. I would be happy to answer any questions you may
have at this time.
FOOTNOTES
[1] GAO, GAO's High-Risk Program, GAO-06-497T (Washington, D.C.: Mar.
15, 2006). DOD shares responsibility for the following six
governmentwide high-risk areas: (1) disability programs, (2)
interagency contracting, (3) information systems and critical
infrastructure, (4) information-sharing for homeland security, (5)
human capital, and (6) real property.
[2] Ronald W. Reagan National Defense Authorization Act for Fiscal Year
2005, Pub. L. No. 108-375, § 332 (2004) (codified in part at 10 U.S.C.
§§ 186 and 2222).
[3] GAO, Defense Management: Foundational Steps Being Taken to Manage
DOD Business Systems Modernization but Much Remains to be Accomplished
to Effect True Business Transformation, GAO-06-234T (Washington, D.C.:
Nov. 9, 2005).
[4] John Warner National Defense Authorization Act for Fiscal Year
2007, Pub. L. No. 109-364 (2006).
[5] John Warner National Defense Authorization Act for Fiscal Year
2007, Pub. L. No. 109-364 (2006).
[6] The Committee originally asked GAO to comment on sec. 804 of the
Senate bill, S. 2766, which, with some changes, has now been enacted as
sec. 816.
[7] GAO, Financial Audit: Air Force Does Not Effectively Account for
Billions of Dollars of Resources, GAO/AFMD-90-23 (Washington, D.C.:
Feb. 23, 1990).
[8] GAO, Fiscal Year 2005 U.S. Government Financial Statements:
Sustained Improvement in Federal Financial Management Is Crucial to
Addressing Our Nation's Financial Condition and Long-term Fiscal
Imbalance, GAO-06-406T (Washington, D.C.: Mar. 1, 2006).
[9] Department of the Treasury, 2005 Financial Report of the United
States Government (Washington, D.C.: Dec. 15, 2005).
[10] Although not major DOD components, the Military Retirement Fund
received an unqualified audit opinion on its fiscal year 2005 financial
statements, and the DOD Medicare Eligible Retiree Health Care Fund
received a qualified audit opinion on its fiscal year 2005 financial
statements.
[11] See for example, GAO, Department of Defense: Sustained Leadership
is Critical to Effective Financial and Business Management
Transformation, GAO-06-1006T (Washington, D.C.: Aug. 3, 2006); DOD's
High-Risk Areas: Successful Business Transformation Requires Sound
Strategic Planning and Sustained Leadership, GAO-05-520T (Washington,
D.C.: Apr. 13, 2005); and DOD Financial Management: Integrated
Approach, Accountability, Transparency, and Incentives Are Keys to
Effective Reform, GAO-02-497T (Washington, D.C.: Mar. 6, 2002).
[12] U.S. Department of Defense, Defense Financial Improvement and
Audit Readiness Plan (Washington, D.C.: Sept. 30, 2006).
[13] U.S Department of Defense, DOD Plan for Improvement in the GAO
High Risk Area of Supply Chain Management with a Focus on Inventory
Management and Distribution, (Washington, D.C.: September 2006).
[14] GAO, Defense Management: Foundational Steps Being Taken to Manage
DOD Business Systems Modernization, but Much Remains to be Accomplished
to Effect True Business Transformation, GAO-06-234T (Washington, D.C.:
Nov. 9, 2005).
[15] According to DOD, 21 systems and initiatives have been transferred
under the BTA as of Oct. 31, 2006.
[16] National Defense Authorization Act for Fiscal Year 2004, Pub. L.
No. 108-136, § 1101 (2003) (codified in part at 10 U.S.C. § 9903).
[17] GAO-06-406T and GAO, Business Systems Modernization: DOD Continues
to Improve Institutional Approach, but Further Steps Needed, GAO-06-658
(Washington, D.C.: May 15, 2006).
[18] A federated architecture is an architecture that is composed of a
set of coherent, but distinct, entity architectures. The entities or
members of the federation collaborate to develop an integrated
enterprise architecture that conforms to the enterprise view and to the
overarching rules of the federation.
[19] A service-oriented architecture is an approach for sharing
functions and applications across an organization by designing them as
discrete, reusable, business-oriented services. These services need to
be, among other things, (1) self-contained, meaning that they do not
depend on any other functions or applications to execute a discrete
unit of work; (2) published and exposed as self-describing business
capabilities that can be accessed and used; and (3) subscribed to via
well-defined and standardized interfaces instead of unique, tightly
coupled connections. Such a service orientation is thus not only
intended to promote the reduced redundancy and increased integration
that any architectural approach is designed to achieve, but to also
provide the kind of flexibility needed to support a quicker response to
changing and evolving business requirements and emerging conditions.
[20] GAO, DOD Systems Modernization: Planned Investment in the Navy
Tactical Command Support System Needs to be Reassessed, GAO-06-215
(Washington, D.C.: Dec. 5, 2005) and DOD Systems Modernization:
Uncertain Joint Use and Marginal Expected Value of Military Asset
Deployment System Warrant Reassessment of Planned Investment, GAO-06-
171 (Washington, D.C.: Dec. 15, 2005).
[21] GAO-06-658.
[22] Ronald W. Reagan National Defense Authorization Act for Fiscal
Year 2005, Pub. L. No. 108-375, § 332 (2004) (codified in part at 10
U.S.C. § 2222).
[23] The United States Standard General Ledger provides a uniform chart
of accounts and technical guidance used in standardizing federal agency
accounting.
[24] SFIS is the department's common financial business language.
[25] GAO-06-658.
[26] 10 U.S.C. §2222(d).
[27] GAO, Enterprise Architecture: Leadership Remains Key to
Establishing and Leveraging Architectures for Organizational
Transformation, GAO-06-831 (Washington, D.C.: August 2006).
[28] GAO-06-831.
[29] GAO, Information Technology: A Framework for Assessing and
Improving Enterprise Architecture Management (Version 1.1), GAO-03-584G
(Washington, D.C.: April 2003).
[30] GAO-06-658.
[31] GAO-06-219.
[32] GAO-06-658.
[33] Approval authorities, including the Under Secretary of Defense for
Acquisition, Technology and Logistics; the Under Secretary of Defense
(Comptroller); the Under Secretary of Defense for Personnel and
Readiness; the Assistant Secretary of Defense for Networks and
Information Integration and Chief Information Officer of the Department
of Defense; and the Deputy Secretary of Defense or an Under Secretary
of Defense, as designated by the Secretary of Defense, are responsible
for the review, approval, and oversight of business systems and must
establish investment review processes for systems under their
cognizance.
[34] GAO, Information Technology Investment Management: A Framework for
Assessing and Improving Process Maturity, GAO-04-394G (Washington,
D.C.: March 2004).
[35] According to the department's fiscal year 2007 IT budget request,
approximately $33 million was sought for fiscal year 2007 and about $31
million was estimated for fiscal year 2008 for FCP.
[36] GAO, DOD Business Systems Modernization: Billions Continue to Be
Invested with Inadequate Management Oversight and Accountability, GAO-
04-615 (Washington, D.C.: May 27, 2004 and Army Depot Maintenance:
Ineffective Oversight of Depot Maintenance Operations and System
Implementation Efforts, GAO-05-441 (Washington, D.C.: June 30, 2005).
[37] GAO-04-615.
[38] See, for example, GAO-06-234T.
[39] GAO, DOD Systems Modernization: Management of Integrated Military
Human Capital Program Needs Additional Improvements, GAO-05-189
(Washington, D.C.: Feb 11, 2005).
[40] MCTFS is the Marine Corps' integrated personnel and pay system.
[41] GAO, Defense Travel System: Reported Savings Questionable and
Implementation Challenges Remain, GAO-06-980 (Washington, D.C.: Sept.
26, 2006).
[42] GAO DOD Business Transformation: Defense Travel System Continues
to Face Implementation Challenges, GAO-06-18 (Washington, D.C.: Jan.
18, 2006).
[43] Ronald W. Reagan National Defense Authorization Act for Fiscal
Year 2005, Pub. L. No. 108-375, § 332 (2004) (codified, in part at 10
U.S.C. §§ 186 and 2222).
[44] DOD, DOD IT Business Systems Investment Review Process: Investment
Certification and Annual Review Process User Guidance (Apr. 10, 2006).
[45] GAO, DOD Business Systems Modernization: Billions Continue to Be
Invested with Inadequate Management Oversight and Accountability, GAO-
04-615 (Washington, D.C.: May. 27, 2004) and Army Depot Maintenance:
Ineffective Oversight of Depot Maintenance Operations and System
Implementation Efforts, GAO-05-441 (Washington, D.C.: June 30, 2005).
[46] GAO, DOD Systems Modernization: Planned Investment in the Navy
Tactical Command Support System Needs to be Reassessed, GAO-06-215
(Washington, D.C.: Dec. 5, 2005).
[47] GAO, DOD Systems Modernization: Uncertain Joint Use and Marginal
Expected Value of Military Asset Deployment System Warrant Reassessment
of Planned Investment, GAO-06-171 (Washington, D.C.: Dec. 15, 2005).
[48] Pub. L. No. 109-163, § 376, 119 Stat. 3136, 3213 (2006).
[49] Pub. L. No. 109-364, § 321, 120 Stat. 2083 (2006).
[50] John Warner National Defense Authorization Act for Fiscal Year
2007, Pub. L. No. 109-364 (2006).
[51] The Committee originally asked GAO to comment on sec. 804 of the
Senate bill, S. 2766, which, with some changes, has now been enacted as
sec. 816.
[52] Pub. L. No. 107-107, §1008, 115 Stat. 1012, 1204 (Dec. 28, 2001).
[53] GAO, Defense Acquisitions: Assessments of Selected Major Weapon
Programs, GAO-06-391 (Washington, D.C.: Mar. 31, 2006).
[54] DOD's policy states technologies should be demonstrated in at
least a relevant environment before a program enters system
development; whereas, GAO utilizes the best practice standard that
calls for technologies to be demonstrated one step higher--
demonstration in an operational environment.
[55] GAO, Defense Acquisitions: DOD Has Paid Billions in Award and
Incentive Fees Regardless of Acquisition Outcomes, GAO-06-66
(Washington, D.C.: Dec. 19, 2005); and Defense Acquisitions: DOD Wastes
Billions of Dollars through Poorly Structured Incentives, GAO-06-409T
(Washington, D.C.: Apr. 5, 2006).
[56] GAO, Contract Management: Opportunities to Improve Surveillance on
Department of Defense Service Contracts, GAO-05-274 (Washington, D.C.:
Mar. 17, 2005).
[57] GAO, Defense Management: Attention is Needed to Improve Oversight
of DLA Prime Vendor Program, GAO-06-739R (Washington, D.C.: June 19,
2006).
[58] GAO, Contract Security Guards: Army's Guard Program Requires
Greater Oversight and Reassessment of Acquisition Approach, GAO-06-284
(Washington, D.C.: Apr. 3, 2006).
[59] GAO, DOD Personnel Clearances: Additional OMB Actions Are Needed
to Improve the Security Clearance Process , GAO-06-1070 (Washington,
D.C.: Sept. 28, 2006); DOD Personnel Clearances: New Concerns Slow
Processing of Clearances for Industry Personnel, GAO-06-748T
(Washington, D.C.: May 17, 2006); DOD Personnel Clearances: Funding
Challenges and Other Impediments Slow Clearances for Industry
Personnel, GAO-06-747T (Washington, D.C.: May 17, 2006); DOD Personnel
Clearances: Government Plan Addresses Some Longstanding Problems with
DOD's Program, But Concerns Remain, GAO-06-233T (Washington, D.C.: Nov.
9, 2005); and DOD Personnel Clearances: Some Progress Has Been Made but
Hurdles Remain to Overcome the Challenges That Led to GAO's High-Risk
Designation, GAO-05-842T (Washington, D.C.: June 28, 2005).
[60] GAO, Defense Infrastructure: Issues Need to Be Addressed in
Managing and Funding Base Operations and Facilities Support, GAO-05-556
(Washington, D.C.: June 15, 2005).
[61] GAO, Military Training: Better Planning and Funding Priority
Needed to Improve Conditions of Military Training Ranges, GAO-05-534
(Washington, D.C.: June 10, 2005).
[62] GAO, Military Housing: Management Issues Require Attention as the
Privatization Program Matures, GAO-06-438 (Washington, D.C.: Apr. 28,
2006).
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site (www.gao.gov). Each weekday, GAO posts
newly released reports, testimony, and correspondence on its Web site.
To have GAO e-mail you a list of newly posted products every afternoon,
go to www.gao.gov and select "Subscribe to Updates."
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office 441 G Street NW, Room LM
Washington, D.C. 20548:
To order by Phone: Voice: (202) 512-6000 TDD: (202) 512-2537 Fax: (202)
512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Gloria Jarmon, Managing Director, JarmonG@gao.gov (202) 512-4400 U.S.
Government Accountability Office, 441 G Street NW, Room 7125
Washington, D.C. 20548:
Public Affairs:
Paul Anderson, Managing Director, AndersonP1@gao.gov (202) 512-4800
U.S. Government Accountability Office, 441 G Street NW, Room 7149
Washington, D.C. 20548: