Homeland Security

Further Actions Needed to Coordinate Federal Agencies' Facility Protection Efforts and Promote Key Practices Gao ID: GAO-05-49 November 30, 2004

The war on terrorism has made physical security for federal facilities a governmentwide concern. The Interagency Security Committee (ISC), which is chaired by the Department of Homeland Security (DHS), is tasked with coordinating federal agencies' facility protection efforts, developing protection standards, and overseeing implementation. GAO's objectives were to (1) assess ISC's progress in fulfilling its responsibilities and (2) identify key practices in protecting federal facilities and any related implementation obstacles.

ISC has made progress in coordinating the government's facility protection efforts. In recent years, ISC has taken several actions to develop policies and guidance for facility protection and to share related information. Although its actions to ensure compliance with security standards and oversee implementation have been limited, in July 2004, ISC became responsible for reviewing federal agencies' physical security plans for the administration. ISC, however, lacks an action plan that could be used to provide DHS and other stakeholders with information on, and a rationale for, its resource needs; garner and maintain the support of ISC member agencies, DHS management, Office of Management and Budget, and Congress; identify implementation goals and measures for gauging progress; and propose strategies for addressing various challenges it faces, such as resource constraints. Without an action plan, ISC's strategy and time line for implementing its responsibilities remain unclear. s ISC and agencies have paid greater attention to facility protection in recent years, several key practices have emerged that, collectively, could provide a framework for guiding agencies' efforts. These include allocating resources using risk management; leveraging security technology; coordinating protection efforts and sharing information; measuring program performance and testing security initiatives; realigning real property assets to mission, thereby reducing vulnerabilities; and, implementing strategic human capital management, to ensure that agencies are well equipped to recruit and retain high-performing security professionals. GAO also noted several obstacles to implementation, such as developing quality data for risk management and performance measurement, and ensuring that technology will perform as expected.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-05-49, Homeland Security: Further Actions Needed to Coordinate Federal Agencies' Facility Protection Efforts and Promote Key Practices This is the accessible text file for GAO report number GAO-05-49 entitled 'Homeland Security: Further Actions Needed to Coordinate Federal Agencies' Facility Protection Efforts and Promote Key Practices' which was released on January 5, 2005. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to the Chairman, Committee on Government Reform, House of Representatives: November 2004: HOMELAND SECURITY: Further Actions Needed to Coordinate Federal Agencies' Facility Protection Efforts and Promote Key Practices: [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-49]: GAO Highlights: Highlights of GAO-05-49, a report to the Chairman, Committee on Government Reform, House of Representatives Why GAO Did This Study: The war on terrorism has made physical security for federal facilities a governmentwide concern. The Interagency Security Committee (ISC), which is chaired by the Department of Homeland Security (DHS), is tasked with coordinating federal agencies‘ facility protection efforts, developing protection standards, and overseeing implementation. GAO‘s objectives were to (1) assess ISC‘s progress in fulfilling its responsibilities and (2) identify key practices in protecting federal facilities and any related implementation obstacles. What GAO Found: ISC has made progress in coordinating the government‘s facility protection efforts. In recent years, ISC has taken several actions to develop policies and guidance for facility protection and to share related information. Although its actions to ensure compliance with security standards and oversee implementation have been limited, in July 2004, ISC became responsible for reviewing federal agencies‘ physical security plans for the administration. ISC, however, lacks an action plan that could be used to provide DHS and other stakeholders with information on, and a rationale for, its resource needs; garner and maintain the support of ISC member agencies, DHS management, Office of Management and Budget, and Congress; identify implementation goals and measures for gauging progress; and propose strategies for addressing various challenges it faces, such as resource constraints. Without an action plan, ISC‘s strategy and time line for implementing its responsibilities remain unclear. As ISC and agencies have paid greater attention to facility protection in recent years, several key practices have emerged that, collectively, could provide a framework for guiding agencies‘ efforts. These include allocating resources using risk management; leveraging security technology; coordinating protection efforts and sharing information; measuring program performance and testing security initiatives; realigning real property assets to mission, thereby reducing vulnerabilities; and, implementing strategic human capital management, to ensure that agencies are well equipped to recruit and retain high- performing security professionals. GAO also noted several obstacles to implementation, such as developing quality data for risk management and performance measurement, and ensuring that technology will perform as expected. Key Practices in Facility Protection: [See PDF for image] [End of figure] What GAO Recommends: GAO is recommending that DHS direct ISC to develop an action plan that identifies resource needs, goals, and time frames for meeting its responsibilities; and proposes strategies for addressing the challenges it faces. Furthermore, GAO recommends that the Chair of ISC, with input from ISC member agencies and considering GAO‘s work as a starting point, establish a set of key practices that could guide agencies‘ efforts in the facility protection area. This initiative could be used to evaluate agency actions, identify lessons learned, and develop strategies for overcoming challenges. DHS concurred with the recommendations. www.gao.gov/cgi-bin/getrpt?GAO-05-49. To view the full product, including the scope and methodology, click on the link above. For more information, contact Mark L. Goldstein at (202) 512-2834 or goldsteinm@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: ISC Has Made Progress but Faces Challenges in Fulfilling Some of Its Major Responsibilities: Key Practices in Federal Facility Protection: Conclusions: Recommendations for Executive Action: Agency Comments and Our Evaluation: Appendixes: Appendix I: Objectives, Scope, and Methodology: Appendix II: National Academy of Sciences Symposium Agenda: Appendix III: ISC Actions Related to Its Major Responsibilities under Executive Order 12977, as of September 2004: Appendix IV: Risk Management Framework for Homeland Security and Terrorism: Appendix V: Comments from the Department of Homeland Security: Appendix VI: Comments from the Department of State: Appendix VII: Comments from the General Services Administration: Appendix VIII: Comments from the Department of the Interior: Appendix IX: Comments from the Department of Energy: Bibliography: Related GAO Products: Table: Table 1: Examples of Information Sharing and Coordination Identified by Agencies: Figures: Figure 1: Bollards Installed at the Jacob Javits Federal Building: Figure 2: Key Practices in Facility Protection: Figure 3: Examples of Technologies Used in Facility Protection: Figure 4: Smart Card Access Portals at the Jacob Javits Federal Building Entrance: Figure 5: Framework for Embassy Rightsizing: Figure 6: FPS Officers Engaged in Biological and Chemical Weapons Response Training: Abbreviations: CARES: Capital Asset Realignment for Enhanced Services: CCTV: closed circuit television: CIA: Central Intelligence Agency: DBT: design basis threat: DOD: Department of Defense: DOE: Department of Energy: DHS: Department of Homeland Security: DS: Diplomatic Security: DTRA: Defense Threat Reduction Agency: FPS: Federal Protective Service: FSRM: Federal Security Risk Management: GPRA: Government Performance and Results Act of 1993: GSA: General Services Administration: HEPA: high-efficiency particulate air: HSPD-12: Homeland Security Presidential Directive Number 12: HSPD-7: Homeland Security Presidential Directive Number 7: IG: Inspector General: Interior: Department of the Interior: ISC: Interagency Security Committee: LROBP: Long-Range Overseas Buildings Plan: NAS: National Academy of Sciences: NPS: National Park Service: OBO: Overseas Buildings Operations: OLES: Office of Law Enforcement and Security: OMB: Office of Management and Budget: OPAP: Overseas Presence Advisory Panel: PDD: Presidential Decision Directive: PIN: personal identification number: PSP: Physical Security Professionals: State: Department of State: USPS: U.S. Postal Service: VA: Department of Veterans Affairs: WMD: weapons of mass destruction: Letter November 30, 2004: The Honorable Tom Davis: Chairman, Committee on Government Reform: House of Representatives: Dear Mr. Chairman: The war on terrorism has made physical security for federal facilities a governmentwide concern. The federal government owns or leases hundreds of thousands of facilities, with the vast majority concentrated in the Departments of Defense (DOD), Veterans Affairs (VA), State (State), Energy (DOE), and the Interior (Interior); the General Services Administration (GSA); and the U.S. Postal Service (USPS). The makeup of these facilities reflects the diversity of agencies' missions and includes office buildings, military installations, hospitals, embassies, border stations, laboratories, and park visitor centers. After the September 11, 2001, attacks, Congress passed the Homeland Security Act of 2002, which created the Department of Homeland Security (DHS). In creating DHS, the government's efforts to prevent, protect against, and respond to potential terrorism--including terrorism directed at federal facilities--were centralized. As a result of the act, DHS assumed responsibility for chairing the Interagency Security Committee (ISC). ISC, which has representation from all the major property-holding agencies and was established after the bombing of the Oklahoma City federal building, has a range of governmentwide responsibilities related to protecting nonmilitary facilities. These generally involve developing policies and standards, ensuring compliance and overseeing implementation, and sharing and maintaining information.[Footnote 1] Although ISC was established to bring a central focus to the government's efforts and provide a forum for sharing key practices and lessons learned in protecting facilities, we reported in September 2002 that ISC was having limited success in fulfilling its responsibilities, because of the lack of consistent and aggressive leadership by GSA, inadequate staff support and funding for ISC, and ISC's difficulty in making decisions.[Footnote 2] Our objectives were to (1) assess ISC's progress in fulfilling its responsibilities and (2) identify key practices in protecting federal facilities and any related implementation obstacles. To assess ISC's progress in fulfilling its responsibilities, we interviewed the Executive Director of ISC; analyzed ISC publications and other documents; considered prior GAO work; and reviewed various laws and policies, including the Homeland Security Act of 2002. We also reviewed the executive order that established ISC, a subsequent executive order that amended it in connection with the transfer of ISC's function to DHS, and relevant homeland security policy directives. To identify key practices, we systematically analyzed 170 GAO and Inspector General (IG) reports issued since 1995 that addressed homeland security and terrorism issues and pertained to facility protection. We also contracted with the National Academy of Sciences (NAS) to convene a symposium of experts on key practices in facility protection. Appendix II contains the symposium agenda and identifies the panelists. We also interviewed officials and analyzed documents from DHS and the major property-holding agencies, including DOD, VA, State, DOE, Interior, GSA, and USPS. For the purpose of this review, we defined key practices as those activities that, on the basis of our analysis, were recommended by GAO and others, acknowledged by agencies, and validated by experts in the area. More information on our scope and methodology appears in appendix I. We did our work from November 2003 through October 2004 in accordance with generally accepted government auditing standards. Results in Brief: ISC has made progress in coordinating the government's facility protection efforts but faces certain challenges to fulfilling some of its major responsibilities. In recent years, ISC has taken several actions that relate to developing policies and guidance for facility protection. For example, ISC has updated its security design criteria for federal construction and developed guidance on security for federally leased space. ISC has also made progress related to sharing and maintaining information by, for example, developing a Web site and establishing standard operating procedures for ISC and its member agencies to follow for sharing information. Although its actions to ensure compliance and provide oversight, which were specified in the 1995 executive order, have been limited, in July 2004, the administration made ISC responsible for reviewing agencies' physical security plans that are required under a December 2003 presidential homeland security policy directive. Filling this role would represent a major step toward meeting its compliance and oversight responsibilities. Despite the overall progress ISC has made, and its prominent new role in the administration's oversight activities, it faces a number of challenges. For example, the sheer magnitude of integrating the government's facility protection initiatives, which involves many different agencies and varying perspectives on security, is an ongoing, formidable task. Complicating this situation, significant resource constraints hinder ISC's ability to fulfill this and other related responsibilities. ISC has one full-time staff person and is dependent on participation from member agencies to fulfill its mission. In addition to these challenges, ISC lacks an action plan, which we are recommending, that could be used to (1) provide DHS and other stakeholders with detailed information on, and a rationale for, its resource needs; (2) garner and maintain the support of ISC member agencies, DHS management, Office of Management and Budget (OMB), and Congress; (3) identify implementation goals and measures for gauging progress in fulfilling all of its responsibilities; and (4) propose strategies for addressing the challenges ISC faces. Without an action plan, ISC's strategy and time line for implementing its responsibilities remain unclear. DHS concurred with this recommendation. As ISC and agencies have paid greater attention to facility protection in recent years, several key practices have emerged that collectively could provide a framework for guiding agencies' efforts. These include allocating resources using risk management; leveraging security technology; sharing information and coordinating protection efforts with other stakeholders; measuring program performance and testing security initiatives; realigning real property assets to mission, thereby reducing vulnerabilities; and, implementing strategic human capital management, to ensure that agencies are well equipped to recruit and retain high-performing security professionals. More specifically, these key practices encompass the following: * Allocating resources using risk management--A risk management approach to facility protection, which, for example, DOD has employed for several years to protect its critical facilities, involves identifying potential threats, assessing vulnerabilities, identifying the assets that are most critical to protect in terms of mission and significance, and evaluating mitigation alternatives for their likely effect on risk and their cost. Using information on these elements, a strategy for allocating security-related resources is developed, implemented, and reevaluated over time as conditions change. * Leveraging technology--To address threats and vulnerabilities, leveraging technology--through supplementing other measures with technology in a cost-effective manner--enhances facility protection. For example, advanced methods for screening access to facilities, such as smart cards that GSA is piloting in New York City, have been used to strengthen security. Smart cards use integrated circuit chips, which store information on individuals; and biometrics, which analyze human physical and behavioral characteristics. Sophisticated surveillance systems can also help secure building perimeters and monitor activity in the building. * Information sharing and coordination--Establishing a means of coordinating and sharing information with other government entities and the private sector is crucial to prevent, protect against, and respond to potential terrorism. Facility managers are highly dependent on guidance and input from outside stakeholders to address threats directed at federal facilities. For example, DOE has memoranda of agreement in place with federal, state, and local law enforcement agencies and works with DOD to secure facilities that house the nation's nuclear stockpile. * Performance measurement and testing--Performance measurement can be used to ensure accountability for achieving broad program goals and improved security at the individual building level. For broader program goals, measures could focus on implementation time lines and adherence to budgets. At the individual building level, active testing using, for example, on-site security assessments can provide data on the effectiveness of efforts to reduce vulnerabilities. Training exercises and drills are also useful in assessing preparedness. * Aligning assets to mission can reduce vulnerabilities--The government's long-standing problem with excess and underutilized property has implications for facility protection. To the extent that agencies are expending resources to maintain and protect facilities that are not needed, realigning assets to mission and relocating staff can reduce vulnerabilities by reducing the number of assets that need to be protected. Furthermore, expending resources to protect unneeded facilities may reduce funds available to protect other more vulnerable facilities and staff. An example where this is occurring is State's attempt to "rightsize" its overseas presence, which gives heavy consideration to reducing security vulnerabilities as part of an asset realignment effort. * Strategic human capital management--In facility protection, as with other areas pertaining to homeland security, it is especially critical for agencies to be well equipped to recruit and retain high-performing security and law enforcement professionals. We have reported in recent years that overall, the government should take a strategic and results- oriented approach to managing and maintaining the human capital needed to maximize government performance and assure its accountability. Although agencies have begun using these key practices to varying degrees, a number of implementation obstacles are apparent. These include developing quality data that form the basis for risk management, ensuring that technology will perform as expected, and determining how to measure the true impact that various approaches have on improving protection. Agencies also face significant, long-standing obstacles to realigning their facility portfolios and implementing human capital reforms in general. To help devise strategies for overcoming these obstacles and evaluate their efforts, agencies would benefit from having a set of key practices--such as those we have identified--that could be used to guide their efforts to protect facilities. We have advocated using guiding principles in other areas, including human capital management, information technology, and capital investment.[Footnote 3] ISC, in serving as the central coordinator for agencies' efforts, is well positioned to promote key practices for facility protection and could consider using our work as a starting point. As such, we are recommending that the Chair of ISC pursue such an initiative and DHS concurred with this recommendation. Also, ISC member agencies including State, Interior, GSA, and DOE provided additional information and comments on a draft of this report, which we incorporated where appropriate. Background: Terrorists have targeted federal facilities several times over the past 10 years. After the 1995 bombing of the Alfred P. Murrah Federal Building in Oklahoma City, the Department of Justice created minimum- security standards for federal facilities. In October 1995, the President signed Executive Order 12977, which established ISC. ISC was expected to enhance the quality and effectiveness of security in, and protection of, facilities in the United States occupied by federal employees for nonmilitary activities and to provide a permanent body to address continuing governmentwide security issues for federal facilities. ISC is expected to have representation from all the major federal departments and agencies, as well as a number of key offices.[Footnote 4] ISC's specific responsibilities under the executive order generally relate to three areas: developing policies and standards, ensuring compliance and overseeing implementation, and sharing and maintaining information. Related to policies and standards, the executive order specifically states that ISC is to: * establish policies for security in and protection of federal facilities; * develop and evaluate security standards for federal facilities; * assess technology and information systems as a means of providing cost-effective improvements to security in federal facilities; * develop long-term construction standards for those locations with threat levels or missions that require blast-resistant structures or other specialized security requirements; and: * evaluate standards for the location of, and special security related to, day care centers in federal facilities. In the area of compliance and oversight, ISC is to develop a strategy for ensuring compliance with facility security standards and oversee the implementation of appropriate security measures in federal facilities. And, related to sharing and maintaining information, ISC is to encourage agencies with security responsibilities to share security related intelligence in a timely and cooperative manner and assist with developing and maintaining a centralized security database of all federal facilities. Since September 11, the focus on protecting the nation's critical infrastructure has been heightened considerably. The Homeland Security Act of 2002 and other administration policies assigned DHS specific duties associated with coordinating the nation's efforts to protect critical infrastructure, and Homeland Security Presidential Directive Number 7 (HSPD-7) stated that DHS's Secretary was responsible for coordinating the overall national effort to identify, prioritize, and protect critical infrastructure and key resources.[Footnote 5] Under the Homeland Security Act of 2002, the Federal Protective Service (FPS) was transferred from GSA to DHS and, as a result of this transfer, DHS assumed responsibility for ISC in March 2003. In September 2002, we reported that ISC was having limited success in fulfilling its responsibilities.[Footnote 6] Specifically, ISC had made little or no progress in areas including developing and establishing policies for security in and protection of federal facilities and developing a strategy for ensuring compliance with security standards. In January 2003, we designated federal property as a high-risk area, in part due to the threat of terrorism against federal facilities.[Footnote 7] As the government's security efforts continue to intensify, and real property-holding agencies employ such measures as searching vehicles that enter federal facilities, restricting parking, and installing concrete bollards, important questions continue to be raised regarding the level of security needed to adequately protect federal facilities and how the security community should proceed. Figure 1 shows bollards installed at the Jacob Javits Federal Building in New York, New York. Additionally, questions concerning the cost-effectiveness and impact of various practices have emerged as the nation faces a protracted war on terrorism. Figure 1: Bollards Installed at the Jacob Javits Federal Building: [See PDF for image] [End of figure] ISC Has Made Progress but Faces Challenges in Fulfilling Some of Its Major Responsibilities: ISC has made progress in coordinating the government's facility protection efforts and has been given a prominent role in reviewing agencies' physical security plans for the administration since we last reported on this issue. In September 2002, we reported that ISC, at that time, had made little or no progress in key elements of its responsibilities, such as developing policies and standards for security at federal facilities; ensuring compliance with security standards and overseeing the implementation of appropriate security in federal facilities; and related to information, developing a centralized security database of all federal facilities.[Footnote 8] Agency representatives identified several factors that they believe contributed to ISC's limited progress. These factors included (1) the lack of consistent and aggressive leadership by GSA, (2) inadequate staff support and funding for ISC, and (3) ISC's difficulty in making decisions. Nonetheless, there were areas where we observed some progress over its then 7-year existence. For example, ISC had developed and issued security design criteria and minimum standards for building access procedures; disseminated information to member agencies on entry security technology for buildings needing the highest security levels; and, through its meetings and working groups, provided a forum for federal agencies to discuss security-related issues and share information and ideas.[Footnote 9] In commenting on the September 2002 report, GSA, which at the time had responsibility for chairing ISC, agreed to take action to address the shortcomings we identified. In March 2003, in accordance with the Homeland Security Act of 2002, FPS was transferred from GSA to DHS. As a result, DHS assumed responsibility for chairing ISC, and the executive order establishing ISC was amended to reflect the transfer of this function from GSA to DHS.[Footnote 10] Transferring responsibility for ISC to DHS reflected the shift to having homeland security activities centralized under one cabinet-level department. Within DHS, the role of chairing ISC was subsequently delegated to the Director of FPS in January 2004. Since our 2002 report, ISC has made clear progress in developing policies and standards and maintaining and sharing information. Related to policies and standards, ISC issued security standards for leased space in July 2003, and OMB has approved them. These standards address security requirements for leased facilities and, according to an ISC official, are currently being used by ISC member agencies as a management tool. In June 2003, ISC issued guidance on escape hoods for federal agencies and, in October 2003, ISC issued an update to its May 2001 Security Design Criteria for New Federal Office Buildings and Major Modernization Projects. According to an FPS official, GSA is incorporating ISC's Security Design Criteria in the construction of new facilities. More recently, ISC became involved with Homeland Security Presidential Directive Number 12 (HSPD-12), issued in August 2004, which seeks to standardize identification: for federal employees and contractors.[Footnote 11] According to the directive, wide variations in the quality and security of forms of identification used to gain access to federal facilities, where there is a potential for terrorist attacks, need to be eliminated. ISC's Executive Director informed us that he was asked to be a member of the White House Homeland Security Council Coordination Committee for HSPD- 12. This ISC official would provide the leadership role for this committee and ensure that physical security requirements for the federal government, as they relate to the directive, are included and coordinated with ISC members. Related to its role in maintaining and sharing information, ISC has developed a Web site for posting policies and guidance and is developing a secure Web portal for member agencies to exchange security guidance and other information. Also, according to the Executive Director of ISC, standard operating procedures were approved by ISC members in June 2004 and were finalized in September 2004. These operating procedures are intended to improve the quality of information sharing among member agencies at its meetings by establishing standards for attendance and participation at ISC meetings. For example, each ISC agency representative is required to attend all meetings or delegate a person to attend to ensure full participation. Finally, DHS is developing a governmentwide facilities database that the ISC Executive Director believes will meet ISC's responsibility to assist with developing and maintaining a centralized security database of all federal facilities. This database will list functions and services that are mission critical, map federal assets and their critical infrastructure, and identify key resources for both cyber and physical security protection. According to ISC's Executive Director, ISC members are an integral part of this process and will ensure that the required support from within their departments and agencies is provided. New Role Could Provide Vehicle for Addressing Responsibilities Related to Ensuring Compliance and Overseeing Implementation: Despite progress in its other areas of responsibility, ISC has not developed, as specified in its 1995 executive order, a strategy for ensuring compliance with security standards among agencies and overseeing the implementation of appropriate security measures in federal facilities. However, in July 2004, the administration made ISC responsible for annually reviewing and approving physical security plans that agencies are required to develop under a presidential homeland security policy directive. HSPD-7, issued in December 2003, establishes a national policy for federal departments and agencies to identify and prioritize critical infrastructure and key resources in the United States so that they can be protected from terrorist attacks. The directive makes DHS responsible for overseeing the implementation of the directive and outlines the roles and responsibilities of individual agencies. Among the roles and responsibilities delineated, HSPD-7 establishes an annual reporting cycle for agencies to evaluate their critical infrastructure and key resources protection plans for both cyber and physical security. ISC's Executive Director informed us that in July 2004, the administration designated ISC as the oversight body for agencies' physical security plans. According to ISC's Executive Director, ISC's role will be to review, approve, or disapprove each department or agency's physical security plan. If ISC were to successfully fulfill its new responsibilities under HSPD-7, which would be done under the broader umbrella of the administration's central planning and coordination efforts for homeland security, it would represent a major step toward meeting its responsibilities that relate to oversight and compliance monitoring, as specified in the 1995 executive order under which it was established. That is, the 1995 executive order that established ISC specified that ISC should develop a strategy for ensuring agencies' compliance with governmentwide facility protection standards and oversee the implementation of appropriate security measures in federal facilities. By having a role in reviewing agencies' physical security plans in relation to HSPD-7, ISC would have a vehicle for carrying out its existing responsibility related to compliance and oversight. Appendix III identifies each of ISC's major responsibilities under the executive order and actions it has taken to date to fulfill them. ISC Faces Challenges to Fulfilling Its Responsibilities: ISC's Executive Director identified several challenges that relate to ISC's many roles and responsibilities in coordinating the government's facility protection efforts. These included the following: * reaching a consensus with agencies on a risk management process for the government that is reasonable and obtaining funding for this activity; * addressing the issue of leased government space and the impact that new physical security standards for leased space will have on the real estate market; * developing a compliance process for agencies that can also be used as a self-assessment tool to measure the effectiveness of ISC; * educating senior level staff from across the government and gaining their support for ISC activities; and overall, * integrating all physical security initiatives for the entire federal government and implementing change. We agree that ISC faces these challenges and, furthermore, that they will have to be addressed in order for ISC to be successful. More specifically, the sheer magnitude of integrating the government's facility protection initiatives, which ISC and FPS officials identified, is formidable because it involves many different agencies and varying perspectives on security. Furthermore, in discussing the challenges associated with leased property, ISC's Executive Director touched on one of several long-standing problems in the federal real property area that have implications for facility protection policy. As reported in GAO's 2003 high-risk report on federal real property, the government's historical reliance on costly leased space--which achieves short-term budget savings but is more costly over the longer term--is problematic. To the extent that private sector lessors are required to enhance the security of their property for federal tenants, the associated costs will likely be passed on to the government in the form of higher rent. Another long-standing problem that could affect ISC as it attempts to meet its responsibilities is the historically unreliable nature of agency real property data. Poor data could make it difficult for agency management to implement and oversee comprehensive risk-based approaches to protecting their facilities. As discussed later, risk management, as it pertains to facility protection, relies heavily on accurate and timely data. At the governmentwide level, inventory data maintained by GSA for the entire government, and financial data on property reported in the government's financial statements, have also been historically unreliable.[Footnote 12] Another challenge identified by ISC's Executive Director--obtaining adequate resources for its activities--is a particular concern. According to the Executive Director of ISC, as the ISC's only full-time staff person, his ability to ensure that all of ISC's responsibilities are fulfilled is limited. Also, according to this official, ISC is dependent entirely on participation and input from member agencies. ISC's Executive Director said that, in the past, getting buy-in and support from senior officials in member agencies had been a challenge. It seems, however, that given ISC's new role in the administration's homeland security efforts, it could make a persuasive case for a sustained level of support from agencies. Also, it is important to note that DHS has certain responsibilities under the executive order that established ISC to ensure it has adequate resources. Specifically, the executive order states that "to the extent permitted by law and subject to the availability of appropriations, the Secretary of Homeland Security should provide ISC with such administrative services, funds, facilities, staff, and other support services as may be necessary for the performance of its functions."[Footnote 13] According to ISC's Executive Director, current ISC resources are not sufficient for ISC to meet all of its evolving responsibilities. This official told us that additional funding for ISC will not be available until fiscal year 2006. However, given the prominent role ISC will be playing in the administration's homeland security efforts, it will be critical for DHS to help ISC undertake activities that will allow it to fulfill its responsibilities, address other challenges it faces, and ultimately be successful. Given the challenges ISC faces, its new responsibility related to HSPD- 7 for reviewing agencies' physical security plans, and the need to sustain progress it has made in fulfilling its responsibilities, ISC would benefit from having a clearly defined action plan for achieving results. Although ISC has taken steps to address challenges, such as seeking additional resources for fiscal year 2006, it lacks an action plan that could be used to (1) provide DHS and other stakeholders with detailed information on, and a rationale for, its resource needs; (2) garner and maintain the support of ISC member agencies, DHS management, OMB, and Congress; (3) identify implementation goals and measures for gauging progress in fulfilling all of its responsibilities; and (4) propose strategies for addressing the challenges ISC faces. Such a plan could incorporate the strategy for ensuring compliance with facility protection standards that is required under ISC's executive order, but has not yet been developed. Without an overall action plan for meeting this and other responsibilities, ISC's strategy and time line for these efforts remain unclear. Having an effective ISC is critically important to the government's overall homeland security efforts as new threats emerge and agencies continue to focus on improving facility protection. Prior to 1995, there were no governmentwide standards for security at federal facilities and agencies' efforts to coordinate and share information needed improvement. Without standards and mechanisms for coordination, there were concerns about the vulnerability of federal facilities to acts of terrorism. As recently as August 2004, information from DHS showed that threats against high-profile facilities in the New York area and Washington, D.C., are still a major concern. Key Practices in Federal Facility Protection: As ISC and agencies have paid greater attention to facility protection in recent years, several key practices have emerged that collectively could provide a framework for guiding agencies' efforts. As discussed in more detail later, ISC could play a vital role in promoting key practices in relation to its information sharing responsibilities. Key facility protection practices that we identified include allocating security resources using risk management, leveraging the use of security technology, coordinating protection efforts and sharing information with other stakeholders, and measuring program performance and testing security initiatives. In addition, we determined that two other practices GAO has highlighted as governmentwide issues also have implications for the facility protection area. These include realigning real property assets to agencies' missions, thereby reducing vulnerabilities, and strategic human capital management, to ensure that agencies are well equipped to recruit and retain high-performing security professionals. Our analysis--based on our work and Inspector General (IG) reports, the views of the NAS symposium experts in facility protection, and interviews with federal agencies--showed that attention to these key practices could provide a framework for guiding agencies' efforts and achieving success in the facility protection area. Figure 2 identifies each of these key practices. Figure 2: Key Practices in Facility Protection: [See PDF for image] [End of figure] Using Risk Management Prioritizes Limited Security Resources: Allocating resources using risk management is a systematic and analytical process to consider the likelihood that a threat will endanger an asset (structure, individual, or function) and identify, evaluate, select, and implement actions that reduce the risk or mitigate the consequences of an event. Although applying risk management principles to facility protection can take on various forms, our past work showed that most risk management approaches generally involve identifying potential threats, assessing vulnerabilities, identifying the assets that are most critical to protect in terms of mission and significance, and evaluating mitigation alternatives for their likely effect on risk and their cost. These and other elements of a risk management approach are described in more detail in appendix IV. Our work showed that there was consensus in the security community-- including GAO, IGs, agencies, national experts, and the private sector- -that utilizing risk management practices provides the foundation for an effective facility protection program. For example, GAO has previously reported that for homeland security and information systems security, risk management can provide a sound foundation for effective security whether the assets are information, operations, people, or federal facilities.[Footnote 14] In fact, dozens of GAO and IG reports since September 11--which addressed efforts to protect facilities at several agencies including DOD, State, Interior, and GSA--discussed how risk management should be used to guide programs and better prepare for, and respond to, terrorism and other threats.[Footnote 15] We have also recognized the benefits of risk management in determining how best to maximize the impact of limited resources.[Footnote 16] At our March 2004 NAS symposium, there was general consensus among panelists that risk management is useful in guiding security decisions and that this approach should be pursued by federal agencies. Some of the NAS panelists commented: "I am a supporter of risk-based methodologies. I see a lot of benefits from this approach. First, [agencies] can weigh the amount of risk reduction versus the cost of that reduction. Secondly, if [agencies] have a proven model, [they] can actually provide sound security. We have found time and time again, after a terrorist event, [there is a] knee-jerk reaction where people—don't necessarily add security but [instead] give the appearance of taking some action." - Navy official: "One of the key corollaries to [a] risk-assessment process is the determination of cost-effectiveness. That is a balancing act between the cost of the mitigation measures that we implement and the reductions in future losses, which we refer to as benefits." - Federal Emergency Management Agency official: "Threat assessments that we carry out are comparative, rather than absolute. By ranking the likelihood of a range of threats, in combination with a broad assessment of their potential consequences, we aim to show clients where their greatest risks lie by outlining proposals for mitigating these risks in the threat and risk assessment. The client can then prioritize how best to direct available resources." - Security consultant from the United Kingdom: Our discussions with the major property-holding agencies and analysis of documents we obtained showed that each agency used some form of risk management to protect its facilities. Some examples of how agencies applied risk management are as follows: * According to officials with FPS, which protects federally owned or occupied facilities held by GSA and DHS, security needs and related countermeasures are prioritized based on the level of risk to a particular facility. Risk is determined by evaluating the impact of loss and vulnerability that each specific threat would have on a facility. According to these officials, FPS inspectors are trained to make educated decisions on applicable countermeasures to the identified threats and vulnerabilities on a recurring basis. * We have reported that, for many years, DOE has employed risk-based security practices.[Footnote 17] To manage potential risks, DOE uses a classified document referred to as a "design basis threat" (DBT). The DBT identifies the potential size and capabilities of terrorist forces and is based on information DOE gathers from the intelligence community. DOE requires contractors operating its sites to provide sufficient protective forces and equipment to defend against the threat contained in the DBT. DOE updated its 1999 DBT in May 2003 to better reflect current and projected terrorist threats in the aftermath of September 11. * VA conducts physical security assessments and prioritizes its protection efforts for critical infrastructure, according to VA officials. The phases of the assessment include defining the criticality of VA facilities, identifying and analyzing vulnerabilities of VA's critical facilities, and identifying appropriate countermeasures. According to VA documents, VA determines vulnerability by factors such as facility population, number of floors in the facility, and the presence or absence of armed officers. This assessment also includes a procedure for scoring and prioritizing identified vulnerabilities at each assessed site. * We have reported that DOD requires its installations to assess, identify, and evaluate potential threats to the installation; identify weaknesses and countermeasures to address the installation's vulnerabilities; and evaluate and rank criticality of the installation's assets to achieving mission goals.[Footnote 18] These three assessments serve as the foundation of each DOD installation's antiterrorism plan. The results of the assessments are used to balance threats and vulnerabilities and to define and prioritize related resource and operational requirements. * Interior's Office of Law Enforcement and Security (OLES) has identified 16 Interior assets as needing special consideration because they are critical to the nation's infrastructure or are national icons that could be targets for symbolic reasons.[Footnote 19] Having a rationale such as this, for focusing on certain assets, represents Interior's approach to risk management at the departmentwide level. * According to USPS officials, USPS's physical security program incorporates a risk assessment methodology and a layered approach to facility security. This effort involves annual security surveys of facilities conducted by facility security control officers and periodic comprehensive reviews at larger core postal facilities by the Postal Inspection Service, which is the investigative branch of USPS. * In commenting on this report, State noted that another example of an agency's use of risk management is State's Long-Range Overseas Buildings Plan (LROBP). LROBP is a 6-year plan, updated yearly, that identifies embassy and consulate facilities most in need of replacement due to unacceptable security, safety, and/or operational conditions. State also said that the plan identifies State's facilities' program objectives and prioritizes competing facility requirements with input from the Bureaus of Overseas Buildings Operations (OBO) and Diplomatic Security (DS), State's Regional Bureaus, and other overseas agencies. State indicated that the LROBP provides a road map for addressing long- term facility needs under the Capital Security Construction Program, Regular Capital Construction Program, as well as major rehabilitation, compound security, and other programs. According to State's comments, to prepare the plan, each year OBO and DS meet with the regional bureaus to discuss which posts should move into the "top 80" list, which contains the 80 primary posts requiring replacement for security reasons, and for which, by law, the department can spend security capital construction appropriations. Furthermore, with respect to the original full list of facilities that need replacement, the department, working with intelligence agencies, prioritizes these facilities. At the NAS symposium, a private sector security expert discussed a risk management methodology in use by FPS at GSA and Internal Revenue Service facilities. We did not review the usefulness or effectiveness of this methodology. Nonetheless, the methodology is an example of one risk management process that is in use. The process, called Federal Security Risk Management, or FSRM, is a risk matrix that compares credible threats with assets and assesses the impact of loss and vulnerability. According to the panelist, agencies use the risk matrix to apply security upgrades to the risks deemed unacceptable and reevaluate the countermeasures until a desired level of risk reduction is achieved. The agencies then develop design or retrofit specifications and criteria. This risk assessment cycle generally spans a 2-to-4 year time period. According to the panelist, once unacceptable risks are addressed through countermeasures, agencies need to reevaluate risks and vulnerabilities on an ongoing basis. Leveraging Security Technologies Can Enhance Facility Protection: By efficiently using technology to supplement and reinforce other security measures, vulnerabilities that are identified by the risk management process can be more effectively addressed with appropriate countermeasures. Our work showed broad concurrence among GAO, IGs, facility security experts, and agency experts that making efficient use of security technology to protect federal facilities is a key practice, but that the type of technology to use should be carefully analyzed. For example, in reporting on border security and information security issues in 2003, we found that prior to significant investment in a project, a detailed analysis should be conducted to determine that benefits of a technology outweigh costs, as well as to determine the effects of the technology on areas such as privacy and convenience.[Footnote 20] In the facility access control area, we also reported that agencies should decide how technology will be used and whether to use technology at all to address vulnerabilities before implementation.[Footnote 21] According to our 2003 testimony on using technologies to secure federal facilities, technology implementation costs can be high, particularly if significant infrastructure modifications are necessary.[Footnote 22] Another consideration is that lesser technological solutions sometimes may be more effective and less costly than more advanced technologies. For example, as we reported in 2002, trained dogs are an effective and time-proven tool for detecting concealed explosives. By using the risk management process and balancing costs, benefits, and other concerns, agencies can efficiently leverage technologies to enhance facility protection. Among the advanced technologies that were identified during our review were smart cards--which use integrated circuit chips to store information on individuals--and biometrics--which analyze human physical and behavioral characteristics--to verify the identity of employees. Furthermore, sophisticated detection and surveillance systems such as closed circuit television (CCTV) have also aided in securing facility perimeters and monitoring activity in the building. Such technologies expand surveillance capabilities and can free up security staff for other duties. Several GAO and IG reports indicated that agencies currently have a wide array of security technologies available for protecting facilities, including smart cards, biometrics, X-ray scanners, and CCTV.[Footnote 23] As we reported in 2002, technologies identified as countermeasures through the risk management process support the following three integral concepts for security: * Protection--Provides countermeasures such as policies, procedures, and technical controls to defend assets against attacks. * Detection--Monitors for potential breakdowns in protective mechanisms that could result in security breaches. * Reaction--Responds to detected breaches to thwart attacks before damage can be done. In GAO's April 2002 testimony on security technologies, we categorized the security technologies by which security concept they supported.[Footnote 24] Figure 3 lists the technologies and provides descriptions of each. Figure 3: Examples of Technologies Used in Facility Protection: [See PDF for image] [End of figure] Several of the major property-holding agencies we contacted use various security technologies to protect their facilities. For example, to control access to its embassies, State employs alarm systems, arrest barriers to stop vehicles, audio/video monitoring equipment, explosive detection devices and metal detectors, and X-ray machines. Officials at USPS indicated that various detection technologies are used to secure its facilities against biological and radiological agents. For example, as we reported in 2002, USPS installed high-efficiency particulate air (HEPA) filtration systems at some facilities to protect them from biohazards.[Footnote 25] HEPA filtering technology is designed to remove particulate biohazards and other particles. Currently, GSA is conducting a smart card pilot program for two federal buildings in New York City. Although the first cards went into use in October 2003, planning for the pilot program began before the September 11 terrorist attacks. One of the federal buildings participating in the program is the Jacob Javits Federal Building, which houses approximately 35 agencies and more than 7,000 federal employees. All of the employees participating in the program use smart cards to enter the building. In addition to a person's name, title, and picture, the smart card contains multiple layers of data substantiating the card's authenticity and personal biometric data of the cardholder. Employees use the smart cards at access portals near the building's entrances (see fig. 4). After the portal has read the smart card and validated the user, glass doors swing apart to allow entry. If the threat level is raised under the homeland security advisory system, the building access technology requires additional security procedures (e.g., entering a personal identification number (PIN), matching a stored biometric record).[Footnote 26] Although agencies' use of smart cards in the building has been optional, all of the agencies in the Javits building are currently participating in the pilot program, including the Federal Bureau of Investigation, the Small Business Administration, and the Department of Housing and Urban Development. Figure 4: Smart Card Access Portals at the Jacob Javits Federal Building Entrance: [See PDF for image] [End of figure] Overall, it was evident during our review that agencies are already using or experimenting with a range of technologies in their facility protection efforts. In terms of key practices, it is important to note that focusing on obtaining and implementing the latest technology is not necessarily a key practice by itself. Instead, having an approach that allows for cost-effectively leveraging technology to supplement and reinforce other measures would represent an advanced security approach in this area. Also, linking the chosen technology to countermeasures identified as part of the risk management process provides assurance that factors such as purpose, cost, and expected performance were addressed. Information Sharing and Coordination among Federal Agencies and the Private Sector Can Help Agencies Better Protect Their Assets: Information sharing and coordination among organizations is crucial to producing comprehensive and practical approaches and solutions to address terrorist threats directed at federal facilities. Our work showed a broad consensus--on the basis of prior GAO and IG work and information from agencies and the private sector--that by having a process in place to obtain and share information on potential threats to federal facilities, agencies can better understand the risk they face and more effectively determine what preventive measures should be implemented. In considering the implications that information sharing and coordination have for facility protection efforts, it is useful to look at how this practice is being approached governmentwide, at the agency level, and at the individual facility level. At the governmentwide level, DHS is expected to play a critical role in information sharing and coordination in most homeland security areas, including facility protection. In September 2003, we reported that information sharing was critical for DHS to meet its mission of preventing terrorist attacks in the United States, reducing vulnerability to terrorist attacks, and minimizing damage and assisting with recovery if attacks do occur.[Footnote 27] In 2003, we also reported that to accomplish its mission, DHS needed to access, receive, and analyze law enforcement information, intelligence information, and other threat, incident, and vulnerability information from federal and nonfederal sources and analyze this information to identify and assess the nature and scope of terrorist threats. Furthermore, we reported that DHS should share information both internally and externally with agencies, law enforcement, and first responders.[Footnote 28] As we testified in September 2003, we have made numerous recommendations to DHS to improve information sharing and coordination to accomplish its homeland security responsibilities. These recommendations involved, for example, * incorporating existing information-sharing guidance contained in various national strategies and the information-sharing procedures required by the Homeland Security Act of 2002; * establishing a clearinghouse to coordinate the various information- sharing initiatives to eliminate possible confusion and duplication of effort; * fully integrating states and cities into a national policy-making process for information sharing and taking steps to provide greater assurance that actions at all levels of government are mutually reinforcing; * identifying and addressing perceived barriers to federal information- sharing; and: * using survey methods or related data collection approaches to determine, over time, the needs of private and public organizations for information related to homeland security and to measure progress in improving information sharing at all levels of government.[Footnote 29] In addition to those recommendations, we identified a need for a comprehensive plan to facilitate information sharing and coordination to protect critical infrastructure in our August 2004 testimony on strengthening information sharing for homeland security.[Footnote 30] We reported that such a plan could encourage improved information sharing by clearly delineating roles and responsibilities of federal and nonfederal entities, defining interim objectives and milestones, setting time frames for achieving objectives, and establishing performance measures. DHS has concurred with the above recommendations to improve information sharing and coordination and is in various stages of implementing them. These recommendations clearly have implications for the facility protection area, by, for example, increasing coordination among facility stakeholders that would reduce duplicative efforts and reinforce protection strategies. The emphasis on information sharing and coordination is also evident in the National Strategy for Homeland Security and its related strategies to protect critical infrastructure, including federal facilities. According to the national strategy, successfully protecting facilities will rely on effective information sharing and coordination among multiple entities as part of the nation's broader homeland security efforts. In the related National Strategy for the Physical Protection of Critical Infrastructure and Key Assets, information sharing is a common theme. This strategy calls for the federal government to work with various stakeholders to, among other things, develop processes for visitor screening, assess vulnerabilities, develop construction standards, and implement security technology. With regard to national icon protection, the strategy recommends that Interior work with other agencies, the public, and the private sector to define criticality criteria, assess vulnerabilities, conduct security awareness programs, and collaborate to protect national icons outside the purview of the federal government. Related to dams, the strategy recommends that DHS work with other agencies, dam owners, and local and state officials to assess risks and institute a national dam security program. At the agency level, the agencies we contacted provided several examples of their activities related to information sharing and coordination. These activities are described in table 1. Table 1: Examples of Information Sharing and Coordination Identified by Agencies: Agency: Department of Defense; Examples of coordinating agencies and organizations: Agencies: DHS and DOE, other federal entities; Other organizations: state and local entities; Examples of coordinating agencies and organizations: * DOD requires commanders to form threat working groups with external law enforcement officials; * DOD's Defense Threat Reduction Agency (DTRA) shares responsibility for maintaining the U.S. nuclear weapon stockpile; * DTRA assists civilian agencies in antiterrorist programs such as first-responder training and addressing weapons of mass destruction threats. Agency: Department of Energy; Examples of coordinating agencies and organizations: Agencies: DOD, DHS, federal law enforcement agencies; Other organizations: state and local officials, law enforcement, and private sector; Examples of coordinating agencies and organizations: * Assigns personnel to serve as a central point of coordination and liaison with outside groups; * Some DOE facilities have entered into formal Memoranda of Agreements with other law enforcement agencies; * Directs sites to have formal or informal relationships with other federal, state, local, and private sector officials to address facility protection; * Works with DOD to secure U.S. nuclear weapons stockpile. Agency: Department of State; Examples of coordinating agencies and organizations: Agencies: DHS, Environmental Protection Agency, GSA, Central Intelligence Agency, FBI, and various federal law enforcement agencies; Other organizations: National Capital Planning Commission, the D.C. government; Examples of information sharing activities: * Shares information through meetings, working groups, and joint projects; * GSA installs and maintains security systems for State's domestic facilities outside of the national capital region. Agency: Department of Homeland Security; Examples of coordinating agencies and organizations: Agencies: FBI, State, GSA tenant agencies, other federal law enforcement agencies; Other organizations: private sector organizations with an interest in critical infrastructure protection; Examples of information sharing activities: * As central coordinator of federal homeland security efforts, assists agencies with gathering facility threat information and incorporates it into risk assessments; * DHS, through FPS, provides tenant agencies with facility security assessments, containing threat and countermeasure information, and associated costs. Agency: Department of the Interior; Examples of coordinating agencies and organizations: Agencies: DHS, DOD, FBI; Other organizations: state and local government organizations, private sector; Examples of information sharing activities: * Office of Law Enforcement and Security (OLES) serves as principal point of contact with external law enforcement and security organizations; * OLES is responsible for coordinating security policies and information sharing among Interior's bureaus, which collectively hold approximately 8,000 facilities. Agency: Department of Veterans Affairs; Examples of coordinating agencies and organizations: Agencies: FEMA, DHS; Other organizations: local law enforcement, public and private technical organizations; Examples of information sharing activities: * VA facilities have entered into information sharing agreements and memoranda of understanding with local law enforcement; * Some VA officials participate in local law enforcement and public security councils to develop effective coordination and information sharing relationships. Agency: General Services Administration; Examples of coordinating agencies and organizations: Agencies: DHS, tenants include most federal agencies; Other organizations: local officials and law enforcement; Examples of information sharing activities: * Participates in local and national public safety conferences to learn latest security information in the public and private sectors, and present information to others. These include conferences organized by, for example, the International Association of Chiefs of Police. Agency: United States Postal Service; Examples of coordinating agencies and organizations: Agencies: DHS, GSA; Other organizations: Legislative Task Force on Mail Safety; Examples of information sharing activities: * Informs other agencies of mail and facility security issues. [End of table] Source: GAO. In addition to agencywide efforts, coordination and information sharing is important at the individual facility level. As we have previously reported, protecting federal facilities requires facility security managers to involve multiple organizations to effectively coordinate and share information to prevent, detect, and respond to terrorist attacks.[Footnote 31] Security managers typically are not aware of potential threats to their facilities and depend on intelligence from other organizations to prevent and/or deter attacks. For example, according to officials from VA, due to limited resources and its lack of an intelligence gathering capability, VA must rely on other agencies to gain threat information. Additionally, security managers have to coordinate and share information with state and local governments to respond to terrorist attacks and do not have direct access to the range of emergency resources required to respond to terrorist attacks. They rely on state and local governments to provide first-responder services such as firefighting, medical personnel, and other emergency services. They also rely on local police and the judicial process to enforce and prosecute violators of the laws and regulations governing the protection of federal facilities. As such, at the individual facility level, security managers are less equipped to make informed decisions about security without effective information sharing and coordination. One way managers at the individual facility level may become better informed is if they take advantage of emerging efforts by the government to disseminate targeted threat information. For example, one recent DHS effort to increase information sharing and coordination among security stakeholders is its Homeland Security Information Network. According to DHS's Web site, this unclassified network consists of Internet, phone, fax, and pager communications systems that provides DHS with constant access to real-time threat information from public and private industries and agencies. DHS can also use the network to send targeted alert notifications and other threat information to states, cities, and others, which can then collect and disseminate this information among those other entities involved in combating terrorism. A base of locally knowledgeable experts governs and administers the network with the support of DHS regional coordinators. Overall, IG reports and experts from the NAS symposium we held underscored the value of information sharing and coordination for facility protection. Regarding Interior's protection of national icons, Interior's IG has reported that coordination and communication are two key characteristics of any well-functioning organization.[Footnote 32] State's IG has recommended that some embassies coordinate with local police to establish coordinated response procedures to potential vehicle bomb attacks.[Footnote 33] State concurred with these recommendations. In a 2002 report, the GSA IG reported on the value of having security officials share any gained expertise to address emerging threats to federal facilities.[Footnote 34] At the NAS symposium, there was a general consensus among panelists that coordination and information sharing--whether through formal or informal means--is critical to effectively protect federal facilities. Some examples of panelist comments included: "We should be sharing what we know. There are a limited number of people in this field—One thing we do need, to help us share this information, is more engineering forums, more opportunities for other federal agencies and the private sector to share— this information."-- Defense official: "Whatever information sharing structure gets superimposed on agencies, it should not impede existing groups that share security information. Informal networks rather than rigid hierarchies are the things you really need to secure properties. In general, frequent interaction helps build trust, helping people to work together and respond quickly to threats."--Private sector security consultant: Performance Measurement Can Ensure Accountability for Achieving Broad Program Goals and Improved Security: Performance measurement can help achieve broad program goals and improve security at the individual facility level. Our analysis showed a consensus among various stakeholders that performance measurement is a key practice that agencies should follow. Although using performance measurement for facility protection is a practice that--based on our analysis--is in the early stages of development, several initiatives at three levels--governmentwide policy, agency, and facility-specific-- demonstrate how performance measurement is being approached in the facility protection area. At the governmentwide policy level, the National Strategy for Homeland Security addresses the threat of terrorism in the United States by organizing the domestic efforts of federal, state, local and private organizations.[Footnote 35] It aligns and focuses homeland security functions into six mission critical areas, set forth as (1) intelligence and warning, (2) border and transportation security, (3) domestic counterterrorism, (4) protecting critical infrastructures and key assets, (5) defending against catastrophic terrorism, and (6) emergency preparedness and response. As mentioned before in relation to information sharing and coordination, the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets[Footnote 36] incorporates facility protection efforts and identifies a set of national goals and objectives. The strategy outlines the guiding principles that will underpin the government's efforts to secure the infrastructures and assets vital to national security, governance, public health and safety, the economy, and public confidence. It also provides a unifying organizational structure and identifies specific initiatives to drive the government's near-term national protection priorities and inform the resource allocation process. According to the strategy, the strategic objectives that underpin our national critical infrastructure and key asset protection effort include the following: * identifying and assuring the protection of those infrastructures and assets that are deemed most critical in terms of national-level public health and safety, governance, economic and national security, and public confidence consequences; * providing timely warning and assuring the protection of those infrastructures and assets that face a specific, imminent threat; and: * assuring the protection of other infrastructures and assets that may become terrorist targets over time by pursuing specific initiatives and enabling a collaborative environment in which federal, state, and local governments and the private sector can better protect the infrastructures and assets they control. These strategies are national in scope, cutting across all levels of government, and involve a large number of organizations and entities including federal, state, local, and private sectors. We have testified that these national strategies are the starting point for federal agencies and that the ultimate measure of this and other strategies' value will be the extent they are useful as guidance for policy and decision makers in allocating resources.[Footnote 37] Related to facility protection, the strategic objectives are useful in providing a context and a broader framework for agencies, as they develop agencywide and facility-specific goals and measures to determine if their specific facility protection efforts are achieving desired results. Security Goals Can Be Tied to Broader Agency Mission Goals: At the agency level, we have reported that tying security goals to broader agency mission goals can help federal agencies measure the effectiveness and ensure accountability of their security programs.[Footnote 38] One tool that agencies can use is the Government Performance and Results Act of 1993 (GPRA). Under GPRA, agencies are to prepare 5-year strategic plans that set the general direction for their efforts. These plans are to include comprehensive mission statements, general and outcome-related goals, descriptions of how those goals will be achieved, identification of external factors that could affect progress, and a description of how performance will be evaluated. Agencies are to then prepare annual performance plans that establish connections between the long-term goals in the strategic plans with the day-to-day activities of program managers and staff. These plans are to include measurable goals and objectives to be achieved by a program activity, descriptions of the resources needed to meet these goals, and a description of the methods used to verify and validate measured values. Finally, GPRA requires that the agency report annually on the extent to which it is meeting its goals and the actions needed to achieve or modify those goals that were not met. GPRA provides a framework under which agencies can identify implementation time lines for facility protection initiatives and adherence to related budgets. We did not assess the extent to which agencies were using GPRA to develop agencywide facility protection or security-related goals. However, we noted one agency that ties its strategic security goals to GPRA is the Defense Threat Reduction Agency (DTRA) at DOD. DTRA's 2003 strategic plan contains most of the elements in a strategic plan developed using GPRA standards.[Footnote 39] DTRA plays a key role in addressing the threats posed by weapons of mass destruction[Footnote 40] (WMD), and its specialized capabilities and services are used to support civilian agencies' efforts to address WMD threats, particularly the efforts of DOE and DHS. DTRA also provides training for emergency personnel responding to WMD incidents and assesses the vulnerability of personnel and facilities to WMD threats. DTRA's strategic plan lays out the agency's five goals, which serve as the basis of its individual units' annual performance plans: (1) deter the use and reduce the impact of WMD, (2) reduce the present threat, (3) prepare for future threats, (4) conduct the right programs in the best manner, and (5) develop people and enable them to succeed. These long-term goals are further broken down into four or five objectives, each with a number of measurable tasks under each objective. These tasks have projected completion dates and identify the DTRA unit responsible for the specific task. For example, under the goal "deter the use and reduce the impact of WMD" is the objective "support the nuclear force." A measurable task under this objective is to work with DOE to develop support plans for potential resumption of underground nuclear weapons effects testing. The technology development unit in DTRA was expected to complete this task by the fourth quarter of fiscal year 2004. At the Individual Facility Level, Active Testing and Drills Can Help Gauge the Adequacy of Facility Protection: Our work showed examples where federal agencies were testing security measures by conducting inspections and assessments to ensure that adequate levels of protection are employed. For example, officials at Interior said that after September 11, one of its bureaus began conducting full-risk assessments at all of its facilities, in order of importance. As part of one of its regularly scheduled assessments at one location, Interior received assistance from DTRA, which performed an assessment of vulnerabilities. According to Interior officials, DTRA officials looked at whether the resulting effect from various types of attack would affect the mission capabilities of the location. After the assessment, DTRA made recommendations to Interior officials for strengthening security. Consequently, Interior officials took actions to improve security and scheduled plans for follow-up. In another example, the Interior IG reported in August 2003 on its security assessment of National Park Service (NPS) parks. During the review, Interior IG officials identified some serious deficiencies with the overall security program and made recommendations to remedy these problems.[Footnote 41] For example, the IG's assessment revealed that necessary security enhancements were delayed or wholly disregarded, that management officials lacked situational awareness, and that other officials lacked the expertise and resources to effectively assess, determine, and prioritize necessary security actions. This type of active testing is useful in exposing vulnerabilities and developing countermeasures. According to DOE officials, DOE's Performance Assurance Program requires that performance testing determine the effectiveness of facility protection systems and programs. DOE conducts inspections to ensure that proper levels of protection are consistent with standards it has established. Assessments are made of the sites' ability to prevent unacceptable, adverse impact on national security or on the health and safety of DOE and contract employees, the public, or the environment. The adequacy of safeguards and security measures are then validated through various means such as surveys, periodic facility self-assessments, program reviews and inspections, and assessments. In addition to testing facility access control through inspections and site surveys, we found examples of security programs that tested the effectiveness of physical security measures such as structural enhancements, physical barriers, and blast-resistant windows. Blast- resistance in buildings is generally provided by passive features such as additional reinforcement and connections in the structural frame for increased malleability, composite fiber wraps to prevent shattering of columns and slabs, and high-performance glazing materials that resist blast pressures. In both field tests and experience (for example, the attack on the Pentagon), these measures have been quite effective in reducing the devastating effects of deliberate explosions and, consequently, reducing casualties as well. In March 2004, a panelist from DOD at the NAS symposium indicated that blast testing is also important in the prevention of injuries resulting from progressive collapse of buildings and flying debris. He reported that 87 percent of the deaths occurred in the collapsed portion of the Alfred P. Murrah Federal Building in Oklahoma City, and only 5 percent of the deaths occurred in the uncollapsed portion of the building. Furthermore, another panelist noted that 70 of the over 2,000 publicly reported terrorist incidents worldwide, since 1970, were directed at buildings. Most of these have involved large vehicle bombs, incendiary bombs, or rocket-propelled grenades. Training exercises and drills are also useful in assessing preparedness. We have reported that effective security also entails having a well-trained staff that follows and enforces policies and procedures.[Footnote 42] In these reports, we found breaches in security resulting from human error are more likely to occur if personnel do not understand the technologies, risks, and the policies that are put in place to mitigate them. Furthermore, good training and practice are essential to successfully implementing policies by ensuring that personnel exercise good judgment in following security procedures. Presidential Decision Directive (PDD) 39[Footnote 43] requires key federal agencies to maintain well-exercised capabilities for combating terrorism. Exercises test and validate policies and procedures, test the effectiveness of response capabilities, increase the confidence and skill levels of personnel, and identify strengths and weaknesses in responses before they arise in actual incidents. Counterterrorism exercises also include activities where agency officials discuss scenarios around a table or other similar setting, and field exercises, where agency leadership and operational units actually deploy to practice their skills and coordination in a realistic field setting.[Footnote 44] Overall, training, as it relates to facility protection, provides decision makers with data on performance in various scenarios. Training is also discussed later in this report in relation to strategic human capital management. Aligning Assets to Mission Can Reduce Security Vulnerabilities: Excess and underutilized real property at federal agencies is a long- standing and pervasive problem that has implications for the facility protection area. Along with the need to secure facilities against the threat of terrorism, excess property and the need to realign the federal real property inventory were among the reasons GAO designated federal real property as a high-risk area in January 2003.[Footnote 45] To the extent that agencies are expending resources to maintain and protect facilities that are not needed, funds available to protect critical assets may be lessened. Our past work showed examples where funds spent to maintain and protect excess property were significant. For example, we reported in January 2003 that DOD estimates it is spending $3 billion to $4 billion each year maintaining facilities that are not needed. In another example, costs associated with excess DOE facilities, primarily for security and maintenance, were estimated by the DOE IG in April 2002 to exceed $70 million annually.[Footnote 46] One building that illustrates this problem is the former Chicago main post office. In October 2003, we testified that this building, a massive 2.5 million square foot structure located near the Sears Tower, is vacant and costing USPS $2 million annually in holding costs.[Footnote 47] It is likely that other agencies that continue to hold excess or underutilized property are also incurring significant holding costs for services including security and maintenance. Given the need to realign the federal real property inventory so that it better reflects agencies' missions, agencies that can overcome this problem may reap benefits in the facility protection area. That is, funds no longer spent securing and maintaining excess property could be put to other uses, such as enhancing protection at critical assets that are tied to agencies' missions. VA's Capital Asset Realignment for Enhanced Services (CARES) initiative, which VA started in October 2000, is an example where a realignment effort is under way. In the mid- 1990s, VA began shifting its role from being a traditional hospital- based provider of medical services to an integrated delivery system that emphasizes a full continuum of care with a significant shift from inpatient to outpatient services. Subsequently, VA began the CARES initiative so that it could reduce its large inventory of buildings, many of which are underutilized or vacant. "Rightsizing" the Overseas Presence: The administration's effort to "rightsize" the nation's overseas presence demonstrates how giving consideration to security, people, and facilities could be approached as part of an asset realignment framework. During 2000, an interagency effort led by the Department of State began to assess staffing of U.S. embassies and consulates to determine whether there were opportunities to improve mission effectiveness and reduce security vulnerabilities and costs by relocating staff. This process, referred to as rightsizing, was initiated in response to the November 1999 recommendations of the Overseas Presence Advisory Panel (OPAP).[Footnote 48] In the aftermath of the August 1998 bombings of U.S. embassies in Africa, OPAP determined that overseas staffing levels had not been adjusted to reflect the changing missions and requirements; thus, some embassies and consulates were overstaffed, and some were understaffed. The framework provides a systematic approach for assessing workforce size and identifying options for rightsizing, both at the embassy level and for making related decisions worldwide. It links staffing levels to three critical elements of overseas diplomatic operations: (1) physical/technical security of facilities and employees, (2) mission priorities and requirements, and (3) cost of operations. The first element includes analyzing the security of embassy buildings, the use of existing secure space, and the vulnerabilities of staff to terrorist attack. The second element focuses on assessing embassy priorities and the staff's workload requirements. The third element involves developing and consolidating cost information from all agencies at a particular embassy to permit cost-based decision making. Unlike an analysis that considers the elements in isolation, the rightsizing framework encourages consideration of a full range of options, along with the security, mission, and cost trade-offs. With this information, decision makers would then be in a position to, for example, determine whether rightsizing actions are needed either to add staff, reduce staff, or change the staff mix at an embassy. Options for reducing staff could include outsourcing functions or relocating functions to the United States or to regional centers. In May 2002, we testified that the use of this approach for the U.S. embassy in Paris was successful in identifying security concerns and finding alternative locations for staff, such as in the United States or other cities in Europe.[Footnote 49] In April 2003, we reported that the rightsizing framework could be applied at U.S. embassies in developing countries.[Footnote 50] We later testified in April 2003 that OMB should expand the use of the rightsizing framework and that State adopt additional measures to ensure that U.S. agencies take a systematic approach to assessing workforce size that considers security, mission, and cost factors. GAO also recommended that State develop guidance on a systematic approach for developing and vetting staffing projections for new diplomatic compounds.[Footnote 51] State and OMB agreed with our recommendations. Figure 5 illustrates the rightsizing process, which integrates security, people, and mission considerations in determining how facilities are used. Figure 5: Framework for Embassy Rightsizing: [See PDF for image] [End of figure] Strategic Management of Human Capital Can Enhance Agency Facility Protection Efforts: The strategic management of human capital is a key practice that can maximize the government's performance and ensure the accountability of its efforts related to homeland security. People define an organization's culture, drive its performance, and embody its knowledge base. They are the source of all knowledge, process improvement, and technological advancements. As the government's homeland security efforts evolve, federal agencies involved with the intelligence community and other homeland security organizations will need the most effective human capital systems to reach projected security goals.[Footnote 52] For facility protection, as with other areas related to homeland security, it is especially critical for agencies to recognize the "people" element and implement strategies to help individuals maximize their full potential. Also, it is important for agencies to be well equipped to recruit and retain high-performing security and law enforcement professionals. Training is also essential to successfully implementing policies by ensuring that personnel are well exercised and exhibit good judgment in following security procedures. As we have reported, high-performing organizations align human capital approaches with missions and goals, and human capital strategies are designed, implemented, and assessed based on their ability to achieve results and contribute to an organization's mission.[Footnote 53] This includes aligning their strategic planning and key institutional performance with unit and individual performance management, as well as implementing reward systems. We reported in March 2003 that federal agencies can develop effective performance management systems by implementing a selected, generally consistent, set of key practices.[Footnote 54] These key practices helped public sector organizations both in the United States and abroad create a clear linkage or "line of sight" between individual performance and organizational success and, thus, transform their cultures to be more results-oriented, customer-focused, and collaborative in nature. These key practices, which have applicability to agencies' management of facility protection employers and contractors, include the following: * Align individual performance expectations with organizational goals. An explicit alignment helps individuals see the connection between their daily activities and organizational goals. * Connect performance expectations to crosscutting goals. Placing an emphasis on collaboration, interaction, and teamwork across organizational boundaries helps strengthen accountability for results. * Provide and routinely use performance information to track organizational priorities. Individuals use performance information to manage during the year, identify performance gaps, and pinpoint improvement opportunities. * Require follow-up actions to address organizational priorities. By requiring and tracking follow-up actions on performance gaps, organizations underscore the importance of holding individuals accountable for making progress on their priorities. * Use competencies to provide a fuller assessment of performance. Competencies define the skills and supporting behaviors that individuals need to effectively contribute to organizational results. * Link pay to individual and organizational performance. Pay, incentive, and reward systems that link employee knowledge, skills, and contributions to organizational results are based on valid, reliable, and transparent performance management systems with adequate safeguards. * Make meaningful distinctions in performance. Effective performance management systems strive to provide candid and constructive feedback and the necessary objective information and documentation to reward top performers and deal with poor performers. * Involve employees and stakeholders to gain ownership of performance management systems. Early and direct involvement helps increase employees' and stakeholders' understanding and ownership of the system and belief in its fairness. * Maintain continuity during transitions. Because cultural transformations take time, performance management systems reinforce accountability for change management and other organizational goals. Our analysis showed that several GAO and IG reports discuss the importance of strategic management of human capital in relation to homeland security functions, including facility protection. For example, in June 2004 we recommended that DHS develop a transformation strategy for FPS to resolve challenges related to, among other things, the change in organizational culture and responsibilities FPS faces since it was transferred from GSA to DHS.[Footnote 55] DHS concurred with our recommendations. Furthermore, we testified on the importance of making changes to human capital management related to improving intelligence gathering at the CIA for security purposes.[Footnote 56] Also, the DOE IG recommended that DOE standardize annual, refresher training requirements for security forces and conduct reviews of safeguards and security training programs departmentwide to ensure compliance with the agency training plan.[Footnote 57] The Director, Office of Safeguards and Security at DOE, agreed with the recommendation. Successfully training employees on using emerging security technologies is also an important element in facility protection (see fig. 6). Installing the latest security technology alone cannot guarantee effective facility protection if security personnel have not been adequately trained to use the technologies properly. Training is particularly essential if the technology requires personnel to master certain knowledge and skills to operate it, such as detecting concealed objects in generated X-ray images. Without adequate training in understanding how technology works, the security system will likely be less effective. This is especially important in assessing risks and vulnerabilities in facility protection. According to DHS officials, FPS inspectors are trained to conduct risk assessments and to evaluate the effectiveness of previously installed facility countermeasures. Trained FPS inspectors articulate their findings to a building security committee for approval and funding, after which FPS implements the necessary countermeasures. At the NAS symposium, a security consultant from the private sector said that the effectiveness of a risk management approach depends on the involvement of experienced and professional security personnel and that there is an increased chance that personnel could omit major steps in the risk management process if they are not well trained in applying risk management. Figure 6: FPS Officers Engaged in Biological and Chemical Weapons Response Training: [See PDF for image] [End of figure] As the emphasis on protecting people, property, and information has increased, it has made the demand for professional security practitioners become even more important. It is widely recognized that there is a need for competent professionals who can effectively manage complex security programs that are designed to reduce threats to people and the assets of corporations, governments, and public and private institutions. To meet these needs, we noted an effort by one organization to provide standard certifications for security professionals. ASIS[Footnote 58] International is an international organization for professionals responsible for security, including managers and directors of security. According to the ASIS International Web site, the organization is dedicated to increasing the effectiveness and productivity of security practices by developing educational programs and materials that address broad security concerns. ASIS International has put together a training curriculum where security professionals, upon completing requirements, can receive certifications to become Certified Protection Professionals, Professional Certified Investigators, or Physical Security Professionals (PSP). The PSP designation is the certification for those whose primary responsibility is to conduct threat surveys; design integrated security systems that include equipment, procedures and people; or install, operate and maintain those systems. We did not assess the training and certifications offered by ASIS International. Nonetheless, seeking certifications for security staff may allow agencies to better ensure that they are adequately trained and allows for comparisons with other organizations and the security industry. Agencies Face Obstacles in Implementing Key Practices in Facility Protection: During our review, we noted that agencies face obstacles in implementing the six key practices that we have identified. For example, determining which assets to protect by establishing and sustaining a comprehensive risk management approach is a significant undertaking for federal agencies. The quality of information needed for the risk management process is often difficult to obtain and analyze. Another obstacle is keeping risk assessments up-to-date as threat levels change, and resources for this activity are stretched. As we pointed out earlier in relation to ISC's challenges, in our January 2003 high-risk report on federal real property, we highlighted that some major real property-holding agencies face obstacles in developing quality management data on their real property assets. Also, in April 2002, we reported that GSA's worldwide inventory of property contained data that were unreliable and of limited usefulness. This inventory is the only central source of descriptive data on the makeup of the federal real property inventory.[Footnote 59] In addition to data reliability problems, we have reported that some agencies face obstacles in implementing and leveraging security investments. As we testified in 2002, the capabilities of technology can be overestimated.[Footnote 60]We found that by overestimating technology's capabilities, security officials risk falling into a false sense of security and relaxing their vigilance. Furthermore, technology cannot compensate for human failure. Instead, technology and people need to work together as part of an overall security process where security personnel are properly trained to use the technology. The federal government also faces systemic obstacles regarding information sharing and coordination. We testified in August 2004 that there is a need for a comprehensive plan to facilitate information sharing and coordination in the protection of critical infrastructure.[Footnote 61] However, DHS has not yet developed a plan that describes how it will carry out its overall information sharing responsibilities and relationships. In commenting on this report, DHS indicated in its technical comments that such an information plan is being developed. Another obstacle is developing productive information sharing relationships among federal, state, and local governments and the private sector. Improving the federal government's capabilities to analyze incident, threat, and vulnerability information from numerous sources could assist in more effectively disseminating information to federal, state, local, and private entities. Not sharing information on threats and on actual incidents experienced by others can hinder the ability of agencies' to identify new trends, better understand risks, and determine what preventive measures to implement. As we reported in August 2003, information sharing initiatives implemented by states and cities were neither effectively coordinated with those of federal agencies, nor were they coordinated within and between federal entities.[Footnote 62] At the agencywide level, we have reported that agencies face obstacles in developing meaningful, outcome-oriented performance goals and collecting performance data that can be used to assess the true impact of facility security. Performance measurement under GPRA typically focuses on regularly collected data on the level and type of program activities, the direct products and services delivered by the program, and the results of those activities. For programs that have readily observable results or outcomes, performance measurement may provide sufficient information to demonstrate program results. In some programs, such as facility security, however, outcomes are not quickly achieved or readily observed, or their relationship to the program is often not clearly defined. In such cases, more in-depth program evaluations may be needed, in addition to performance measurement, to examine the extent to which a program is achieving its objectives. This approach is more challenging and represents a more advanced level of performance measurement. Significant long-standing obstacles also hinder agencies' ability to realign their asset portfolios. As we have reported, the complex legal and budgetary environment in which real property managers operate has a significant impact on real property decisionmaking and often does not lead to businesslike outcomes.[Footnote 63] Resource limitations-- including those related to facility protection--in general, often prevent agencies from addressing real property needs from a strategic portfolio perspective. When available funds for capital investment are limited, Congress must weigh the need for new, modern facilities with the need for renovation, maintenance, and disposal of existing facilities, the latter of which often gets deferred. Facility protection often falls within this latter category. Until these competing factors are mitigated, agencies face budgetary and legal disincentives when trying to realign their assets. State's experience to date with rightsizing its overseas presence demonstrated some of the challenges in realigning real property assets. We reported in November 2003 that State's efforts to replace facilities at risk of terrorist or other attacks have experienced project delays due to changes in project design and security requirements, difficulties hiring appropriate American and local labor with the necessary clearances and skills, differing site conditions, and unforeseen events such as civil unrest.[Footnote 64] Finally, we have reported that agencies continue to face obstacles in implementing and maintaining a strategic approach to human capital.[Footnote 65] Specifically, agencies continue to face challenges in promoting (1) leadership; (2) strategic human capital planning; (3) acquiring, developing, and retaining talent; and (4) results-oriented organizational cultures in an effort to strategically manage human capital. Although some progress has been made since we designated human capital management as high-risk in 2001, today's federal human capital strategies are not appropriately constituted to meet current and emerging challenges, especially in light of the new security challenges facing the government. Human capital challenges are relevant to the facility protection area because security is a people- intensive activity involving active management and response, and there is a high dependency on law enforcement and security officers, as well as contract guards. Given these obstacles, and the need to overcome them, agencies would benefit from having a set of key practices to guide their facility protection efforts. GAO has advocated the use of guiding principles in other areas, including human capital management, information technology, and capital investment.[Footnote 66] ISC, in serving as the central coordinator for agencies' efforts, is uniquely positioned to promote key practices in facility protection and could use our work as a starting point. In fact, ISC views one of its primary roles as being the nucleus of communication on key practices and lessons learned for the facility protection community in the federal government and has embraced this responsibility. Conclusions: After having limited success prior to the September 11 terrorist attacks, ISC has made progress in recent years related to its responsibilities to develop policies and standards, as well as those related to information sharing. Although this progress is encouraging, more work remains to fulfill ISC's major responsibilities related to ensuring agency compliance and overseeing the implementation of various policies and standards. Fulfilling its new role in reviewing and approving agencies' physical security plans for the administration represents a major step toward meeting its compliance and oversight responsibilities. Furthermore, because DHS now has responsibility for ISC, the department also has a responsibility, in keeping with the executive order under which ISC was established, to ensure that ISC has adequate resources to accomplish its mission. Given the challenges ISC faces, its new responsibility related to HSPD-7 for reviewing agencies' physical security plans, and the need to sustain progress it has made in fulfilling its responsibilities, ISC would benefit from having a clearly defined action plan for achieving results. Such a plan, which ISC lacks, could be used to (1) provide DHS and other stakeholders with detailed information on, and a rationale for, its resource needs; (2) garner and maintain the support of ISC member agencies, DHS management, OMB, and Congress; (3) identify implementation goals and measures for gauging progress in fulfilling all of its responsibilities; and (4) propose strategies for addressing the challenges ISC faces. Such a plan could incorporate the strategy for ensuring compliance with facility protection standards that is required under ISC's executive order but has not yet been developed. Without an overall action plan for meeting this and other responsibilities, ISC's strategy and time line for these efforts remain unclear. Since September 11, the focus on protecting the nation's critical infrastructure has been heightened considerably. At the individual building level, agencies have improved perimeter security by, for example, installing concrete bollards and are routinely screening vehicles and people entering federal property. In looking at facility protection issues more broadly, several key practices have emerged that include allocating resources using risk management, leveraging security technology, sharing information and coordinating protection efforts with other stakeholders, and measuring program performance and testing security initiatives. In addition, other key practices that have clear implications for the facility protection area include realigning real property assets and strategically managing human capital. Because agencies face various obstacles and would benefit from evaluating their actions, it would be useful for them to have a framework of key practices in the facility protection area that could guide their efforts, and ISC is well positioned to lead this initiative as the government's central forum for exchanging information and guidance on facility protection. Recommendations for Executive Action: We are making two recommendations--one to the Secretary of Homeland Security and one to the Chair of ISC. Specifically, we recommend that the Secretary of Homeland Security direct the Chair of ISC to develop an action plan that identifies resource needs, implementation goals, and time frames for meeting ISC's ongoing and yet-unfulfilled responsibilities. The action plan should also be used to propose strategies for addressing the range of challenges ISC faces. Such an action plan would provide a road map for DHS to use in developing resource priorities and for ISC to use in communicating its planned actions to agencies and other stakeholders, including Congress. Furthermore, we recommend that the Chair of ISC, with input from ISC member agencies, consider using our work as a starting point for establishing a framework of key practices that could guide agencies' efforts in the facility protection area. This initiative could subsequently be used by agencies to evaluate their actions, identify lessons learned, and develop strategies for overcoming obstacles. Agency Comments and Our Evaluation: We provided a draft of this report to DHS, State, GSA, DOE, Interior, DOD, VA, and USPS for their official review and comment. DHS concurred with the report's overall conclusions and said it would implement the recommendations. In its comments, DHS provided information on ongoing initiatives related to information sharing and coordination. DHS's comments can be found in appendix V. DHS also provided separate technical comments, which we incorporated where appropriate. State provided additional information on its activities as they relate to the key practices, which we incorporated into the final report where appropriate. State's comments can be found in appendix VI. GSA, DOE, and Interior concurred with the report's findings and recommendations. Comments from GSA, Interior, and DOE can be found in appendixes VII, VIII, and IX, respectively. DOD, VA, and USPS notified us that they had no comments on this report. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to other interested Congressional Committees and the Secretaries of Defense, Energy, the Interior, Homeland Security, State, Veterans Affairs; the Administrator of GSA; and the Postmaster General of the U.S. Postal Service. We will also make copies available to others upon request. In addition, the report will be available at no charge on the GAO Web site at [Hyperlink, http://www.gao.gov]. If you have any questions regarding this report, please contact me on (202) 512-2834 or at [Hyperlink, goldsteinm@gao.gov] or David Sausville, Assistant Director, on (202) 512-5403 or at [Hyperlink, sausvilled@gao.gov]. Other contributors to this report were Matt Cail, Roshni Dave, Joyce Evans, Brandon Haller, Anne Izod, Susan Michal-Smith, and Cynthia Taylor. Sincerely yours, Signed by: Mark L. Goldstein: Director, Physical Infrastructure Issues: [End of section] Appendixes: Appendix I: Objectives, Scope, and Methodology: Our objectives were to (1) assess the Interagency Security Committee's (ISC) progress in fulfilling its responsibilities and (2) identify key practices in protecting federal facilities and any related implementation obstacles. To assess ISC's progress in fulfilling its responsibilities, we interviewed the Executive Director of ISC; analyzed ISC publications and other documents; considered prior GAO work; and reviewed various laws and policies, including the Homeland Security Act of 2002. We also reviewed the executive order that established ISC, a subsequent executive order that amended it in connection with the transfer of ISC's function to DHS, and relevant homeland security policy directives. We also reviewed minutes from ISC meetings. We also considered prior GAO work on ISC. As part of our interviews with ISC's Executive Director, we focused on the challenges ISC faces in meeting its major responsibilities. To identify key practices for facility protection and any related implementation obstacles, we conducted a comprehensive literature review of GAO and Inspector General (IG) reports, interviewed officials from the major property-holding agencies, and validated our results using an expert symposium on facility protection. For the analysis of GAO and IG reports, we systematically analyzed reports issued between January 1, 1995, and March 1, 2004. We chose 1995 as a starting point to coincide with the year of the terrorist attack on the Alfred P. Murrah Federal Building in Oklahoma City, Oklahoma, and the publishing of the Justice Department's minimum-security standards. We identified reports by searching GAO and IG online databases and consulting with GAO and IG contacts using several search terms such as facility security, terrorism, and homeland security. From this initial selection, we identified over 450 reports related to homeland security, which we subsequently reduced to 170 reports that were related to facility protection. Thirty-six of the reports were from IG offices at the seven agencies that control over 85 percent of federal facilities in terms of building square footage. These agencies included the Departments of Defense (DOD), Energy (DOE), the Interior (Interior), Veterans Affairs (VA) and State (State); the U.S. Postal Service (USPS); and the General Services Administration (GSA). We systematically reviewed these reports using a data collection instrument we designed to identify and group key practices according to theme or type of activity. In doing our work, we also gave consideration to other GAO reports on governmentwide management issues that, in our judgment, had implications for the facility protection area. We also considered new GAO reports that were issued after the selection time period that were relevant. For the purposes of this review, we did not assess the extent to which agencies were using GPRA to develop agencywide facility protection or security-related goals. Also, for the purpose of this review, we did not assess the training and certifications offered by ASIS International. We also interviewed officials at the major property-holding agencies, including DOD, DOE, Interior, VA, State, USPS, and GSA to obtain updated information on their facility protection activities and their use of key practices. We then contracted with the National Academy of Sciences (NAS) to convene a symposium with 21 security experts from the private sector, government, academia, and foreign countries to validate the practices and gain further insights. Using their judgment, NAS officials selected security experts based on their broad expertise and backgrounds in building security programs. Appendix II contains the symposium agenda and identifies the experts. As a result, for the purpose of this review, we defined key practices as those activities that, on the basis of our analysis, were recommended by GAO and others, acknowledged by agencies, and validated by experts in the area. It is important to note that the key practices identified in this report may not be an exclusive list and may not necessarily represent all key practices for the protection of federal facilities. In addition, new reports and other information may have become available since we completed the analysis. Also, ISC has identified GAO as an associate member, which includes the ability to serve on ISC subcommittees. While associate members of ISC have this ability, no GAO staff member serves on any subcommittee. Furthermore, no GAO staff member actively participates in ISC meetings or contributes to decisions. Rather, GAO's role on ISC is only to observe proceedings and obtain ISC information distributed to the other ISC members. Because of GAO's observational role, our independence in making recommendations involving ISC and in completing this engagement was maintained. ISC, agency officials, and other experts provided much of the data and other information used in this report. We noted cases where these officials provided testimonial evidence, and we were not always able to obtain documentation that would substantiate the testimonial evidence they provided. In cases where officials provided their views and opinions on various issues within the context of speaking for the organization, we corroborated the information with other officials. Overall, we found no discrepancies with these data and, therefore, determined that they were sufficiently reliable for the purpose of this report. We requested official comments on this report from DHS, State, GSA, Interior, DOE, DOD, VA, and USPS. Appendixes V through IX contain comments we received from DHS, State, GSA, Interior, and DOE, respectively. We received State's comments on November 12, 2004. DOD, VA, and USPS had no comments. [End of section] Appendix II: National Academy of Sciences Symposium Agenda: Symposium on Security Efforts for Federal Real Property: March 4-5, 2004: National Academy of Sciences: Washington, D.C.: 2101 C Street, NW, in Washington, D.C.: Thursday, March 4, 2004: Welcome and Introductory Remarks: Richard Little, Director, Board on Infrastructure and the Constructed Environment, National Research Council (NRC): David Walker, Comptroller General, U.S. General Accounting Office: Keynote Address: The Modern Philosophy of Security: Roger Hagengruber, Director, Institute for Public Policy, University of New Mexico: Session 1: Wade Belcher, U.S. General Services Administration: Rick Jones, Naval Facilities Engineering Service Center: Curt Betts, Protective Design Center, U.S. Army Corps of Engineers: Wayne Ashbury, Bureau of Diplomatic Security: Session 2: Robert Smilowitz, Weidlinger and Associates: Kevin Claber, United Kingdom Government: Joe Smith, Applied Research Associates, Inc.: David Hadden, Ove Arup (United Kingdom): Session 3: Doug Sunshine, Defense Threat Reduction Agency: John Crawford, Karagozian and Case: Randy Nason, C.H. Gurnsey: Eve Hinman, Hinman Consulting Engineers: Friday, March 5, 2004: Session 4: Elise Weaver, Worcester Polytechnic Institute: Robert Chapman, Building and Fire Research Laboratory, National Institute of Standards and Technology: Stuart Knoop, Oudens and Knoop: William Dowd, National Capital Planning Commission: Session 5: Johanna Hardy, Senate Government Affairs Committee: Susan Brita, House Transportation and Infrastructure Committee: Charles Herrick, Stratus Consulting: Paul Kleindorfer, The Wharton School: Michael O'Hanlon, The Brookings Institution: [End of section] Appendix III: ISC Actions Related to Its Major Responsibilities under Executive Order 12977, as of September 2004: Responsibilities Related to Developing Policies and Standards: Establish policies for security in and protection of federal facilities; Develop and evaluate security standards for federal facilities; Assess technology and information systems as a means of providing cost- effective improvements to security in federal facilities; Develop long-term construction standards for those locations with threat levels or missions that require blast-resistant structures or other specialized security requirements; Evaluate standards for the location of, and special security related to, day care centers in federal facilities. * May 2001: Issued Security Design Criteria for New Federal Office Buildings and Major Modernization Projects (Security Design Criteria); * July 2001: Issued Minimum Standards for Federal Building Access Procedures; * June 2003: Issued ISC Information Document on Escape Hoods; * October 2003: Issued update of ISC Security Design Criteria; * Currently developing physical security requirements for HSPD-12 and the federal credentialing program; * In 1997, ISC disseminated guidance on entry security technology for member agencies' buildings with high security designations; * Provided input in smart card development process for federal government; * Integrated expert opinions from engineering and architectural disciplines and included technology expert advice on blasting and biochemical threats in the most recent update of ISC Security Design Criteria for 2004; * July 2003: Issued Security Standards for Leased Space; * In its review of the latest ISC security design criteria update, the ISC long-term construction team will look into security needs at child care centers (no actions implemented to date). Responsibilities Related to Ensuring Compliance and Overseeing Implementation of Policies and Standards: Develop a strategy for ensuring compliance with standards; Oversee the implementation of appropriate security measures in federal facilities. * According to ISC's Executive Director, ISC does not have the necessary resources to develop a compliance process--ISC has requested additional funding and resources for the fiscal year 2006 budget (no actions implemented to date); * As reviewer of agency physical security plans under HSPD-7, ISC has not been able to develop a scoring process to review the plans. Furthermore, ISC will not meet the November 2004 deadline for completing agency reviews and is working with OMB and DHS on this issue. Responsibilities Related to Encouraging Information Sharing: Encourage agencies with security responsibilities to share security- related intelligence in a timely and cooperative manner; Assist in developing and maintaining a centralized security database of all federal facilities. * April 2003: Appointed a full-time Executive Director; * Since September 11, 2001, ISC has expanded its membership and outreach efforts by adding associate member agencies that can provide input but are not listed in Executive Order 12977; * September 2004: ISC issued Standard Operating Procedures; * ISC members meet regularly to facilitate an exchange of issues, concerns, and ideas between federal and private organizations; * Currently developing a secure Web portal system for member agencies to exchange information among authorized personnel; * Currently posts all finalized ISC standards, policies, guidance, and documents on GSA Office of Chief Architect's Web site for ISC members; * ISC does not have funding to support an initiative to develop a centralized security database and expects DHS to take the lead on this effort (no actions implemented to date). Sources: GAO and DHS. [End of table] [End of section] Appendix IV: Risk Management Framework for Homeland Security and Terrorism: In recent years, GAO has consistently advocated the use of a risk management approach as an iterative analytical tool to help implement and assess responses to various national security and terrorism issues.[Footnote 67] Although applying risk management principles to facility protection can take on various forms, our past work showed that most risk management approaches generally involve identifying potential threats, assessing vulnerabilities, identifying the assets that are most critical to protect in terms of mission and significance, and evaluating mitigation alternatives for their likely effect on risk and their cost. We have concluded that without a risk management approach, there is little assurance that programs to combat terrorism are prioritized and properly focused. Risk management principles acknowledge that while risk cannot be eliminated, enhancing protection from known or potential threats can help reduce it. Drawing on this precedent, we compiled a risk management framework--outlined below--to help assess the U.S. government's response to homeland security and terrorism risk. This framework, which we have used to assess the Department of Homeland Security's programs to target oceangoing cargo containers for inspection, also has applicability to protecting federal facilities. For purposes of the risk management framework, we used the following definitions: * Risk--an event that has a potentially negative impact, and the possibility that such an event will occur and adversely affect an entity's assets and activities and operations, as well as the achievement of its mission and strategic objectives. As applied to the homeland security context, risk is most prominently manifested as "catastrophic" or "extreme" events related to terrorism, i.e., those involving more that $1 billion in damage or loss and/or more than 500 casualties. * Risk management--a continuous process of managing, through a series of mitigating actions that permeate an entity's activities, the likelihood of an adverse event happening and having a negative impact. In general, risk is managed as a portfolio, addressing entity-wide risk within the entire scope of activities. Risk management addresses "inherent," or pre-action, risk (i.e., risk that would exist absent any mitigating action) as well as "residual," or post-action, risk (i.e., the risk that remains even after mitigating actions have been taken). The risk management framework--which is based on the proposition that a threat to a vulnerable asset results in risk--consists of the following components: * Internal (or implementing) environment--the internal environment is the institutional "driver" of risk management, serving as the foundation of all elements of the risk management process. The internal environment includes an entity's organizational and management structure and processes that provide the framework to plan, execute, and control and monitor an entity's activities, including risk management. Within the organizational and management structure, an operational unit that is independent of all other operational (business) units is responsible for implementing the entity's risk management function. This unit is supported by and directly accountable to an entity's senior management. For its part, senior management (1) defines the entity's risk tolerance (i.e., how much risk is an entity willing to assume in order to accomplish its mission and related objectives) and (2) establishes the entity's risk management philosophy and culture (i.e., how an entity's values and attitudes view risk and how its activities and practices are managed to deal with risk). The operational unit (1) designs and implements the entity's risk management process and (2) coordinates internal and external evaluation of the process and helps implement any corrective action. * Threat (event) assessment--threat is defined as a potential intent to cause harm or damage to an asset (e.g., natural environment, people, manmade infrastructures, and activities and operations). Threat assessments consist of the identification of adverse events that can affect an entity. Threats might be present at the global, national, or local level, and their sources include terrorists and criminal enterprises. Threat information emanates from "open" sources and intelligence (both strategic and tactical). Intelligence information is characterized as "reported" (or raw) and "finished" (fully fused and analyzed). * Criticality assessment--criticality is defined as an asset's relative importance. Criticality assessments identify and evaluate an entity's assets based on a variety of factors, including the importance of its mission or function, the extent to which people are at risk, or the significance of a structure or system in terms of, for example, national security, economic activity, or public safety. Criticality assessments are important because they provide, in combination with the framework's other assessments, the basis for prioritizing which assets require greater or special protection relative to finite resources. * Vulnerability assessment--vulnerability is defined as the inherent state (either physical, technical, or operational) of an asset that can be exploited by an adversary to cause harm or damage. Vulnerability assessments identify these inherent states and the extent of their susceptibility to exploitation, relative to the existence of any countermeasures. * Risk assessment--risk assessment is a qualitative and/or quantitative determination of the likelihood (probability) of occurrence of an adverse event and the severity, or impact, of its consequences. Risk assessments include scenarios under which two or more risks interact creating greater or lesser impacts. * Risk characterization--risk characterization involves designating risk as, for example, low, medium, or high (other scales, such as numeric, are also be used). Risk characterization is a function of the probability of an adverse event occurring and the severity of its consequences. Risk characterization is the crucial link between assessments of risk and the implementation of mitigation actions, given that not all risks can be addressed because resources are inherently scarce; accordingly, risk characterization forms the basis for deciding which actions are best suited to mitigate the assessed risk. * Mitigation evaluation--Mitigation evaluation is the identification of mitigation alternatives to assess the effectiveness of the alternatives. The alternatives should be evaluated for their likely effect on risk and their cost. * Mitigation selection--Mitigation selection involves a management decision on which mitigation alternatives should be implemented among alternatives, taking into account risk, costs, and the effectiveness of mitigation alternatives. Selection among mitigation alternatives should be based upon preconsidered criteria. There are as of yet no clearly preferred selection criteria, although potential factors might include risk reduction, net benefits, equality of treatment, or other stated values. Mitigation selection does not necessarily involve prioritizing all resources to the highest-risk area, but in attempting to balance overall risk and available resources. * Risk mitigation--Risk mitigation is the implementation of mitigation actions, in priority order and commensurate with assessed risk; depending on its risk tolerance, an entity may choose not to take any action to mitigate risk (this is characterized as risk acceptance). If the entity does choose to take action, such action falls into three categories: (1) risk avoidance (exiting activities that expose the entity to risk), (2) risk reduction (implementing actions that reduce likelihood or impact of risk), and (3) risk sharing (implementing actions that reduce likelihood or impact by transferring or sharing risk). In each category, the entity implements actions as part of an integrated "systems" approach, with built-in redundancy to help address residual risk (the risk that remains after actions have been implemented). The systems approach consists of taking actions in personnel (e.g., training, deployment), processes (e.g., operational procedures), technology (e.g., software or hardware), infrastructure (e.g., institutional or operational--such as port configurations), and governance (e.g., management and internal control and assurance). In selecting actions, the entity assesses their costs and benefits, where the amount of risk reduction is weighed against the cost involved and identifies potential financing options for the actions chosen. * Monitoring and evaluation of risk mitigation--Monitoring and evaluation of risk mitigation entails the assessment of the functioning of actions against strategic objectives and performance measures to make necessary changes. Monitoring and evaluation includes, where and when appropriate, peer review and testing and validation; and an evaluation of the impact of the actions on future options; and identification of unintended consequences that, in turn, would need to be mitigated. Monitoring and evaluation helps ensure that the entire risk management process remains current and relevant, and reflects changes in (1) the effectiveness of the actions and (2) the risk environment in which the entity operates--risk is dynamic and threats are adaptive. The risk management process should be repeated periodically, restarting the "loop" of assessment, mitigation, and monitoring and evaluation. [End of section] Appendix V: Comments from the Department of Homeland Security: U.S. Department of Homeland Security: Washington, DC 20528: November 15, 2004: Mr. Mark L. Goldstein: Director, Physical Infrastructure Issues: U.S. Government Accountability Office: Washington, DC 20548: Dear Mr. Goldstein: RE: Draft Report GAO-05-49, Homeland Security: Further Actions Needed To Coordinate Federal Agencies' Facility Protection Efforts and Promote Key Practices (GAO Job Code 543094): Thank you for the opportunity to review and comment on the subject draft report. We appreciate the recognition of the significant progress the Interagency Security Committee (ISC) has achieved since moving to the Department of Homeland Security (DHS) in March 2003. The ISC, which is now chaired by DHS, is tasked with coordinating federal agencies' facility protection efforts, developing protection standards, and overseeing implementation. We view the recommendations as an opportunity to increase the effectiveness of ISC efforts in promoting a safe and secure environment for federal facilities, programs, employees and visitors. We agree with the draft report's two recommendations and intend to implement them. GAO recommends the development of an action plan that identifies resource needs, implementation goals, and timeframes for meeting the ISC responsibilities. These responsibilities are stated in Executive Order 12977 as amended ("Interagency Security Committee") and Executive Order 13286 ("Amendment of Executive Orders, and Other Actions, in Connection With the Transfer of Certain Functions to the Secretary of Homeland Security"). GAO also recommends that the Chair of the ISC, with input from ISC member agencies, consider using GAO's work as a starting point for establishing a framework of key practices that could guide agencies' efforts in the facility protection area. Implementing this second recommendation should be beneficial in light of the new ISC responsibility under the Homeland Security Presidential Directive Number 7, Critical Infrastructure Identification, Prioritization and Protection to evaluate the effectiveness of all department and agency physical security plans. We believe it is important that GAO recognize the existence of an ongoing program within the Department. In order to better assume the information sharing and coordination roles legislated to the Department of Homeland Security, Secretary Ridge charged the Under Secretary for Information Analysis and Infrastructure Protection (IAIP) to "develop a DHS-wide business plan for a comprehensive information sharing and collaboration system." Shortly thereafter, IAIP established an Information Sharing & Collaboration Program (ISCP) to discharge this responsibility. The ISCP is charged with the coordination and facilitation of information sharing efforts throughout the Department, and with its customers and partners in the federal, international, state, local, tribal and private sectors. Numerous on-going information sharing initiatives within the homeland security, intelligence, law enforcement, and public safety communities must be leveraged by the ISCP to attain the program objectives. The role of the ISCP is to investigate, advise, recommend, and facilitate; other DHS components will be directly responsible for policy generation, technology and process development, and systems acquisition and implementation. These initiatives are crucial to producing comprehensive and practical approaches and solutions to address terrorist threats directed at federal facilities. We have also provided you with technical comments under separate cover which we trust you will incorporate in the final report. We thank you again for the opportunity to provide comments on this draft report and look forward to working with you on future homeland security issues. Sincerely, Signed by: Anna F. Dixon: Director, Departmental GAO/OIG Liaison: Office of the Chief Financial Officer: [End of section] Appendix VI: Comments from the Department of State: United States Department of State: Assistant Secretary and Chief Financial Officer: Washington, D.C. 20520: Ms. Jacquelyn Williams-Bridgers: Managing Director: International Affairs and Trade: Government Accountability Office: 441 G Street, N.W. Washington, D.C. 20548-0001: Dear Ms. Williams-Bridgers: We appreciate the opportunity to review your draft report, "HOMELAND SECURITY: Further Actions Needed to Coordinate Federal Agencies' Facility Protection Efforts and Promote Key Practices," GAO Job Code 543094. The enclosed Department of State comments are provided for incorporation with this letter as an appendix to the final report. If you have any questions concerning this response, please contact Cy Alba, Branch Chief, Bureau of Overseas Building Operations, at (703) 875-5748. Sincerely, Christopher B. Burnham: cc: GAO - Dave Sausville: OBO - Charles Williams: DS - Francis Taylor: State/OIG - Mark Duda: Department of State Comments on GAO Draft Report "Homeland Security: Further Actions Needed to Coordinate Federal Agencies' Facility Protection Efforts and Promote Key Practices" (GAO-05-49, GAO Code 543094): The Department of State (DOS) thanks the Government Accountability Office (GAO) for the opportunity to respond to their review of Federal Agencies Facility Protection Efforts. The draft report recommends that the Interagency Security Committee (ISC) establish a set of key practices to guide agencies' efforts in the facility protection area. Three key practices and the review summary are listed, followed by State's comments. Key Practice - Allocating Resources on the Basis of Risk Prioritizes Limited Security Resources (p. 17): Homeland Security Presidential Directive Number-7 (HSPD-7) specifically directs DHS's Secretary to identify, prioritize, and protect critical infrastructure and key resources, so that these facilities can be protected from terrorist attack (pp. 7, 12). HSPD-7 establishes an annual reporting cycle for agencies to evaluate their critical infrastructure and key resources protection plans for both cyber and physical security (p. 12). [emphasis added] The Department of State suggests the following be added to GAO's list on pp. 19 and 20 of agency's examples of risk management to protect its facilities and how they were applied. The Department of State's Long-Range Overseas Buildings Plan (LROBP) is a 6-year plan, updated yearly, that identifies embassy and consulate facilities most in need of replacement due to unacceptable security, safety, and/or operational condition. The plan identifies State's facilities program objectives and prioritizes competing facility requirements with input from the Bureaus of Overseas Buildings Operations (OBO) and Diplomatic Security (DS), State's Regional Bureaus, and other overseas agencies. The LROBP provides a roadmap for addressing long-term facility needs under the Capital Security Construction Program, Regular Capital Construction Program, as well as major rehabilitation, compound security, and other programs. To prepare the plan, each year OBO and DS meet with the Regional Bureaus to discuss which posts should move into the "top 80" list, which contains the 80 primary posts requiring replacement for security reasons, and for which, by law, the Department can spend security capital construction appropriations. With respect to the original full list of facilities that need replacement, the Department, working with intelligence agencies, prioritizes these facilities. Key Practice - Performance Measurement Can Ensure Accountability for Achieving Broad Program Goals and Improved Security (p 32): The Department realizes that in this study, GAO did not assess the extent to which agencies were using GPRA to develop agency-wide facility protection or security-related goals (p. 34). GAO also notes (p. 32) that using performance measurement for facility protection is a practice that based on its analysis-is in the early stages of development, although several initiatives used by other agencies were found. State would like to note that in its annual Performance Assessment Rating Tool (PART) submission, that OBO's Capital Security Construction Program and DS's Worldwide Security Upgrades program are evaluated. State's PART submission can be viewed at www.whitehouse.gov/omb/part. The OBO Capital Security Construction Program has been evaluated under PART over the past 3 years, and has recently received a 97% PART score. As of this date, no program in the Federal Government has received a PART score higher than 97%. Also, OBO's Regular/Asset Management Capital Construction Program was recognized as receiving one of the highest scores within the Department at its initial PART assessment with a score of 86%--an "effective" rating. The OBO compound security program has goals and performance measures also but has not been evaluated under PART; it will be this coming spring. Key Practice - "Rightsizing" The Overseas Presence (p. 39): The Department appreciates the discussion of rightsizing on pp. 39 and 40 of the draft report. Summary: Agencies Face Obstacles in Implementing Key Practices in Facility Protection (p. 46): State would like to note that the challenges listed on pp. 48 and 49, such as difficulties hiring appropriate staff and differing site conditions, are not a function of rightsizing its overseas presence in and of itself, but rather a consequence of undertaking a large-scale program to construct new embassies in a foreign working environment in as short a time as possible. We would also like to note that the November 2003 GAO report [NOTE 65] found that OBO began instituting management reforms for embassy building in 2001. The report also stated that while it is too early to assess the effectiveness of these reforms in ensuring that embassies are built within the approved project budget and on time, OBO now has a number of mechanisms in place to more effectively manage the expanded construction program. NOTE: [65] GAO, Embassy Construction: State Department Has Implemented Management Reform, but Challenges Remain, GAO-04-100 (Washington, D.C.: Nov. 4, 2003). [End of section] Appendix VII: Comments from the General Services Administration: U.S. General Services Administration: GSA PUBLIC BULDINGS SERVICE: Response to Government Accountability Office: HOMELAND SECURITY: Further Actions Needed to Coordinate Federal Agencies' Facility Protection Efforts and Promote Key Practices: November 12, 2004: GSA Public Buildings Service (PBS) Response: The PBS agrees with the findings of the Government Accountability Office (GAO) relating security issues facing the federal government. PBS also supports the recommendations to the Secretary of Department of Homeland Security and the Chair of Interagency Security Committee (ISC). As a member agency, of the ISC, GSA will support the initiatives and efforts proposed by the committee. Summary of Audit Issues: Reason GAO stated for conducting the subject audit: 1. Assess the Interagency Security Committee's (ISC) progress in fulfilling its responsibilities 2. Identify key practices in protecting federal facilities and any related implementation obstacles: Audit Findings: 1. ISC made progress in government facility protection efforts: 2. Action taken by ISC: - Develop policy and guidance: - Sharing of information between agencies: 3. July 2004, ISC became responsible for reviewing federal agencies physical security plans: 4. ISC lacks an action plan for identifying implementation goals, strategy and timeline: Summary: 1. Audit Recommendations to the Secretary of DHS: - Direct ISC to develop an action plan that identifies resource needs, goals, and timeframes for meeting its responsibilities, and proposes strategies for addressing the challenges it faces. 2. Audit Recommendations to the Chair of ISC: - With input from ISC member agencies, and considering our work as a starting point, establish a set of key practices that could guide agencies' efforts in the facility protection area. This effort could evaluate agency action, identify lessons learned, and develop strategies for overcoming challenges. [End of section] Appendix VIII: Comments from the Department of the Interior: United States Department of the Interior: OFFICE OF THE ASSISTANT SECRETARY POLICY, MANAGEMENT AND BUDGET: Washington, D.C. 20240: NOV 10 2004: Mr. Mark L. Goldstein: Director, Physical Infrastructure Issues: U.S. Government Accountability Office: 441 G. Street, NW, Mail Stop 2T23: Washington, D.C. 20548: Dear Mr. Goldstein: Thank you for providing the Department of the Interior the opportunity to review and comment on the draft U.S. Government Accountability Office report entitled "Homelanc Security-Further Actions Needed To Coordinate Federal Agencies' Facility Protection Efforts and Promote Key Practices," (GAO-05-49) dated November 2004. We have reviewed the report and agree with the findings and recommendations. Sincerely, Signed by: P. Lynn Scarlett: Assistant Secretary: Policy, Management and Budget: [End of section] Appendix IX: Comments from the Department of Energy: Department of Energy: Washington, DC 20585: November 10, 2004: Mr. Mark L. Goldstein: Director, Physical Infrastructure Issues: United States Government Accountability Office: 441 G. Street, NW: Washington, DC 20548: Reference: Draft GAO Report 05-49, HOMELAND SECURITY - Further Actions Needed to Coordinate Federal Agencies' Facility Protection Efforts and Promote Key Practices: Dear Mr. Goldstein: The Department of Energy, Office of Security, concurs with the discussion and recommendations contained in Draft GAO Report 05-49, HOMELAND SECURITY - Further Actions Needed to Coordinate Federal Agencies' Facility Protection Efforts and Promote Key Practices. We agree with the report's conclusions that closer coordination between agencies is an important element in improving the security and safety of all Federal worksites in a cost effective manner. We also agree that the Department of Homeland Security's Interagency Security Committee (ISC) is the appropriate entity to lead these coordination efforts. Furthermore, we believe that the actions recommended by the GAO will help to define a clear path forward for enhancing the security of all Government facilities, and we look forward to continuing to work with the ISC on this important National priority. Thank you for the opportunity to review the draft report. If you wish to further discuss this matter, please do not hesitate to contact me at (202) 586-3345. Sincerely, Signed by: Marshall O. Combs: Director, Office of Security: Office of Security and Safety Performance Assurance: [End of section] Bibliography: [End of section] Department of Defense: U.S. Department of Defense, Office of Inspector General. Interagency Summary Report on Security Controls Over Biological Agents (D-2003- 126). Washington, D.C.: August 27, 2003. Department of Energy: U.S. Department of Energy, Office of Inspector General. Management of the Nuclear Weapons Production Infrastructure (DOE/IG-0484). Washington, D.C.: September 22, 2000. U.S. Department of Energy, Office of Inspector General. Summary Report on Allegations Concerning the Department of Energy's Site Safeguards and Security Planning Process (DOE/IG-0482). Washington, D.C.: September 28, 2000. U.S. Department of Energy, Office of Inspector General. The U.S. Department of Energy's Audit Follow-up Process (DOE/IG-0447). Washington, D.C.: July 7, 1999. U.S. Department of Energy, Office of Inspector General. Special Audit Report on the Department of Energy's Arms and Military-Type Equipment (IG-0385). Washington, D.C.: February 1, 1996. U.S. Department of Energy, Office of Inspector General. Audit of the Department of Energy's Security Police Officer Training (CR-B-95-03). Washington, D.C.: February 6, 1995. Department of the Interior: U.S. Department of the Interior, Office of Inspector General. Homeland Security: Protection of Critical Infrastructure Systems - Assessment 2: Critical Infrastructure Systems (2002-I-0053). Washington, D.C.: September 2002. U.S. Department of the Interior, Office of Inspector General. Homeland Security: Protection of Critical Infrastructure Facilities and National Icons - Assessment 1: Supplemental Funding - Plans and Progress (2002- I-0039). Washington, D.C.: June 2002. U.S. Department of the Interior, Office of Inspector General. Progress Report: Secretary's Directives for Implementing Law Enforcement Reform in Department of the Interior (2003-I-0062). Washington, D.C.: August 28, 2003. U.S. Department of the Interior, Office of Inspector General. Review of National Icon Park Security (2003-I-0063). Washington, D.C.: August 2003. Department of State: U.S. Department of State, Office of Inspector General. Limited-Scope Security Inspection of Embassy Port of Spain, Trinidad and Tobago (SIO- I-03-22). Washington, D.C.: August 2003. U.S. Department of State, Office of Inspector General. Security Inspection of Embassy N'Djamena, Chad (SIO-I-03-27). Washington, D.C.: June 2003. U.S. Department of State, Office of Inspector General. Security Inspection of Embassy Yaoundé, Cameroon (SIO-I-03-28). Washington, D.C.: March 2003. U.S. Department of State, Office of Inspector General. Security Inspection of Embassy Maseru, Lesotho (SIO-I-03-26). Washington, D.C.: March 2003. U.S. Department of State, Office of Inspector General. Limited-Scope Security Inspection of Embassy Belgrade, Serbia and Montenegro (SIO-I- 03-13). Washington, D.C.: March 2003. U.S. Department of State, Office of Inspector General. Limited-Scope Security Inspection of Embassy Quito, Ecuador and Consulate General Guyaquil (SIO-I-03-25). Washington, D.C.: February 2003. U.S. Department of State, Office of Inspector General. Security Oversight Inspection of Embassy Muscat, Oman (SIO-I-03-17). Washington, D.C.: February 2003. U.S. Department of State, Office of Inspector General. Limited-Scope Security Inspection of Embassy Dublin, Ireland (SIO-I-03-08). Washington, D.C.: December 2002. U.S. Department of State, Office of Inspector General. Limited-Scope Security Inspection of Embassy Apia, Samoa (SIO-I-03-04). Washington, D.C.: November 2002. U.S. Department of State, Office of Inspector General. Limited-Scope Security Inspection of Embassy Ljubljana, Slovenia (SIO-I-03-03). Washington, D.C.: November 2002. U.S. Department of State, Office of Inspector General. Limited-Scope Security Inspection of Embassy Almaty, Kazakhstan (SIO-I-03-02). Washington, D.C.: November 2002. U.S. Department of State, Office of Inspector General. Limited-Scope Security Inspection of Embassy Amman, Jordan (SIO-I-03-01). Washington, D.C.: November 2002. U.S. Department of State, Office of Inspector General. Classified Semiannual Report to the Congress: April 1, 2003 to September 30, 2003. Washington, D.C.: September 2003. U.S. Department of State, Office of Inspector General. Classified Semiannual Report to the Congress: October 1, 2002 to March 31, 2003. Washington, D.C.: March 2003. General Services Administration: General Services Administration, Office of Inspector General. Follow-up Review of the Federal Protective Service's Contract Guard Program (A020092/P/2/R02016). Arlington, VA: August 29, 2002. General Services Administration, Office of Inspector General. Report on Federal Protective Service Security Equipment Countermeasures Installed at Federal Facilities (A020092/P/2/R02008). Arlington, VA: March 29, 2002. General Services Administration, Office of Inspector General. Audit of the Federal Protective Service's Federal Security Risk Manager Program (A010129/P/2/R02007). Arlington, VA: March 27, 2002. General Services Administration, Office of Inspector General. Audit of the Federal Protective Service's Intelligence Sharing Program (A000992/ P/2/R01013). Arlington, VA: March 23, 2001. General Services Administration, Office of Inspector General. Audit of The Federal Protective Service's Contract Guard Program (A995175/P/2/ R00010). Arlington, VA: March 28, 2000. General Services Administration, Office of Inspector General. Audit of Security Measures for New and Renovated Federal Facilities (A995025/P/ H/R99513). Arlington, VA: March 24, 1999. General Services Administration, Office of Inspector General. Audit of The Federal Protective Service's Program for Upgrading Security at Federal Facilities (A70642/P/2/R98024). Arlington, VA: September 14, 1998. Postal Service: U.S. Postal Service, Office of Inspector General. Fiscal Year 1999 Information System Controls: St. Louis Information Service Center (FR- AR-99-010). Arlington, VA: September 28, 1999. U.S. Postal Service, Office of Inspector General. Review of Security Badge Controls at Postal Service Headquarters (OV-LA-01-001). Arlington, VA: March 26, 2001. U.S. Postal Service, Office of Inspector General. Review of United States Postal Service Personnel Security Program: Process for Updating Sensitive Clearances (OV-MA-99-001). Arlington, VA: March 31, 1998. Veterans Affairs: Veterans Affairs, Office of Inspector General. Review of Security and Inventory Controls Over Selected Biological, Chemical, and Radioactive Agents Owned by or Controlled at Department of Veterans Affairs Facilities (02-00266-76). Washington, D.C.: March 14, 2002. [End of section] Related GAO Products: Allocating Resources Using Risk Management: Fiscal Year 2003 U.S. Government Financial Statements: Sustained Improvement in Federal Financial Management Is Crucial to Addressing Our Nation's Future Fiscal Challenges. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-886T] Washington, D.C.: July 8, 2004. Nuclear Security: Several Issues Could Impede the Ability of DOE's Office of Energy, Science and Environment to Meet the May 2003 Design Basis Threat. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-894T] Washington, D.C.: June 22, 2004. Homeland Security: Summary of Challenges Faced in Targeting Oceangoing Cargo Containers for Inspection. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-557T] Washington, D.C.: March 31, 2004. Homeland Security: Management Challenges Facing Federal Leadership. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-260] Washington, D.C.: December 20, 2002. Critical Infrastructure Protection: Significant Challenges Need to Be Addressed. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-961T] Washington, D.C.: July 24, 2002. Homeland Security: Critical Design and Implementation Issues. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-957T] Washington, D.C.: July 17, 2002. Critical Infrastructure Protection: Significant Homeland Security Challenges Need to Be Addressed. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-918T] Washington, D.C.: July 9, 2002. Homeland Security: A Risk Management Approach Can Guide Preparedness Efforts. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-208T] Washington, D.C.: October 31, 2001. Combating Terrorism: Considerations for Investing Resources in Chemical and Biological Preparedness. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-162T] Washington, D.C.: October 17, 2001. Homeland Security: Key Elements of a Risk Management Approach. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-150T] Washington, D.C.: October 12, 2001. Chemical and Biological Defense: Improved Risk Assessment and Inventory Management Are Needed. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-667] Washington, D.C.: September 28, 2001. Combating Terrorism: Selected Challenges and Related Recommendations. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-822] Washington, D.C.: September 20, 2001. Combating Terrorism: Actions Needed to Improve DOD Antiterrorism Program Implementation and Management. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-909] Washington, D.C.: September 19, 2001. Weapons of Mass Destruction: Defense Threat Reduction Agency Addresses Broad Range of Threats, but Performance Reporting Can Be Improved. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-330] Washington, D.C.: February 13, 2004. Leveraging Technology: Electronic Government: Smart Card Usage is Advancing Among Federal Agencies, Including the Department of Veterans Affairs. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-84T] Washington, D.C: September 6, 2004. Information Security: Technologies to Secure Federal Systems. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-467] Washington, D.C.: March 9, 2004. Security: Counterfeit Identification Raises Homeland Security Concerns. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-133T] Washington, D.C.: October 1, 2003. Electronic Government: Challenges to the Adoption of Smart Card Technology. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-1108T] Washington, D.C.: September 9, 2003. Information Security: Challenges in Using Biometrics. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-1137T] Washington, D.C.: September 9, 2003. Border Security: Challenges in Implementing Border Technology. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-546T] Washington, D.C.: March 12, 2003. Electronic Government: Progress in Promoting Adoption of Smart Card Technology. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-144] Washington, D.C.: January 3, 2003. Technology Assessment: Using Biometrics for Border Security. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-174] Washington, D.C.: November 15, 2002. National Preparedness: Technologies to Secure Federal Buildings. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-687T] Washington, D.C.: April 25, 2002. Information Sharing and Coordination: Information Technology: Major Federal Networks That Support Homeland Security Functions. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-375] Washington, D.C.: September 17, 2004: 9/11 Commission Report: Reorganization, Transformation, and Information Sharing. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-1033T] Washington, D.C.: August 3, 2004. Critical Infrastructure Protection: Improving Information Sharing with Infrastructure Sectors. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-780] Washington, D.C.: July 9, 2004. Posthearing Questions from September 17, 2003, Hearing on "Implications of Power Blackouts for the Nation's Cybersecurity and Critical Infrastructure Protection: The Electrical Grid, Critical Interdependencies, Vulnerabilities, and Readiness". [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-300R] Washington, D.C.: December 8, 2003. Homeland Security: Challenges in Achieving Interoperable Communications for First Responders. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-231T] Washington, D.C.: November 6, 2003. Homeland Security: Information Sharing Responsibilities, Challenges, and Key Management Issues. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-1165T] Washington, D.C.: September 17, 2003. Homeland Security: Efforts to Improve Information Sharing Need to Be Strengthened. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-760] Washington, D.C.: August 27, 2003. Homeland Security: Information Sharing Responsibilities, Challenges, and Key Management Issues. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-715T] Washington, D.C.: May 8, 2003. Information Technology: Terrorist Watch Lists Should Be Consolidated to Promote Better Integrating and Sharing. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-322] Washington, D.C.: April 15, 2003. Bioterrorism: Information Technology Strategy Could Strengthen Federal Agencies' Abilities to Respond to Public Health Emergencies. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-139] Washington, D.C.: May 30, 2003. Homeland Security: Information Sharing Activities Face Continued Management Challenges. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-1122T] Washington, D.C.: October 1, 2002. National Preparedness: Technology and Information Sharing Challenges. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-1048R] Washington, D.C.: August 30, 2002. Homeland Security: Effective Intergovernmental Coordination is Key to Success. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-1013T] Washington, D.C.: August 23, 2002. Homeland Security: Effective Intergovernmental Coordination is Key to Success. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-1012T] Washington, D.C.: August 22, 2002. Homeland Security: Effective Intergovernmental Coordination is Key to Success. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-1011T] Washington, D.C.: August 20, 2002. Homeland Security: Intergovernmental Coordination and Partnership Will Be Critical to Success. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-901T] Washington, D.C.: July 3, 2002. Homeland Security: Intergovernmental Coordination and Partnership Will Be Critical to Success. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-900T] Washington, D.C.: July 2, 2002. Homeland Security: Intergovernmental Coordination and Partnership Will Be Critical to Success. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-899T] Washington, D.C.: July 1, 2002. National Preparedness: Integration of Federal, State, Local, and Private Sector Efforts is Critical to an Effective National Strategy for Homeland Security. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-621T] Washington, D.C.: April 11, 2002. Combating Terrorism: Intergovernmental Cooperation in the Development of a National Strategy to Enhance State and Local Preparedness. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-550T] Washington, D.C.: April 2, 2002. Combating Terrorism: Enhancing Partnerships Through a National Preparedness Strategy. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-549T] Washington, D.C.: March 28, 2002. Combating Terrorism: Critical Components of a National Strategy to Enhance State and Local Preparedness. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-548T] Washington, D.C.: March 25, 2002. Combating Terrorism: Intergovernmental Partnership in a National Strategy to Enhance State and Local Preparedness. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-547T] Washington, D.C.: March 22, 2002. Homeland Security: Progress Made; More Direction and Partnership Sought. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-490T] Washington, D.C.: March 12, 2002. Combating Terrorism: Key Aspects of a National Strategy to Enhance State and Local Preparedness. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-473T] Washington, D.C.: March 1, 2002. Bioterrorism: Review of Public Health Preparedness Programs. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-149T] Washington, D.C.: October 10, 2001. Bioterrorism: Public Health and Medical Preparedness. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-141T] Washington, D.C.: October 9, 2001. Bioterrorism: Coordination and Preparedness. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-129T] Washington, D.C.: October 5, 2001. Combating Terrorism: Observations on Federal Spending to Combat Terrorism. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-NSIAD/GGD-99-107] Washington, D.C.: March 11, 1999. Aligning Assets to Mission: Embassy Construction: State Department Has Implemented Management Reforms, but Challenges Remain. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-100] Washington, D.C.: November 4, 2003. VA Health Care: Framework for Analyzing Capital Asset Realignment for Enhanced Services Decisions. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-1103R] Washington, D.C.: August 18, 2003. Major Management Challenges and Program Risks: Department of State. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-107] Washington, D.C.: January 2003. Overseas Presence: Framework for Assessing Embassy Staff Levels Can Support Rightsizing Initiatives. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-780] Washington, D.C.: July 26, 2002. Overseas Presence: Observations on a Rightsizing Framework. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-659T] Washington, D.C.: May 1, 2002. Overseas Presence: More Work Needed on Embassy Rightsizing. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-143] Washington, D.C.: November 27, 2001. Strategic Human Capital Management: Human Capital: Building on the Current Momentum to Transform the Federal Government. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-976T] Washington, D.C.: July 20, 2004. Information Technology: Training Can Be Enhanced by Greater Use of Leading Practices. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-791] Washington, D.C.: June 24, 2004. Results-Oriented Government: Shaping the Government to Meet 21ST Century Challenges. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-1168T] Washington, D.C.: September 17, 2003. Results-Oriented Cultures: Creating a Clear Linkage between Individual Performance and Organizational Success. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-488] Washington, D.C.: March 14, 2003. Human Capital: Building on the Current Momentum to Address High-Risk Issues. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-637T] Washington, D.C.: April 8, 2003. High-Risk Series: Strategic Human Capital Management. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-120] Washington, D.C.: January 2003. Human Capital: A Self-Assessment Checklist for Agency Leaders. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/OCG-00-14G] Washington, D.C.: September 2000. Executive Guide: Leading Practices in Capital Decision-Making. AIMD-99-32. Washington, D.C.: December 1998. Performance Measurement and Testing: Weaknesses in Screening Entrants Into the United States. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-438T] Washington, D.C.: January 30, 2003. Building Security: Interagency Security Committee Has Had Limited Success in Fulfilling Its Responsibilities. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-1004] Washington, D.C.: September 17, 2002. Security Breaches at Federal Buildings in Atlanta, Georgia. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-668T] Washington, D.C.: April 30, 2002. Homeland Security: Responsibility and Accountability For Achieving National Goals. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-627T] Washington, D.C.: April 11, 2002. Bioterrorism: Federal Research and Preparedness Activities. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-915] Washington, D.C.: September 28, 2001. Combating Terrorism: Observations on Options to Improve the Federal Response. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-660T] Washington, D.C.: April 24, 2001. Combating Terrorism: Analysis of Federal Counterterrorist Exercises. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/NSIAD-99-157BR] Washington, D.C.: June 25, 1999. Federal Law Enforcement: Investigative Authority and Personnel at 13 Agencies. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/GGD-96-154] Washington, D.C.: September 30, 1996. Challenges and Lessons Learned in Homeland Security: Critical Infrastructure Protection: Challenges for Selected Agencies and Industry Sectors. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-233] Washington, D.C.: February 28, 2003. Combating Terrorism: Funding Data Reported to Congress Should Be Improved. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-170] Washington, D.C.: November 26, 2002. Combating Terrorism: Actions Needed to Guide Services' Antiterrorism Efforts at Installations. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-14] Washington, D.C.: November 1, 2002. Homeland Security: Challenges and Strategies in Addressing Short-and Long-Term National Needs. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-160T] Washington, D.C.: November 7, 2001. Combating Terrorism: FEMA Continues to Make Progress in Coordinating Preparedness and Response. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-15] Washington, D.C.: March 20, 2001. Critical Infrastructure Protection: Challenges to Building a Comprehensive Strategy for Information Sharing and Coordination. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-AIMD-00-268] Washington, D.C.: July 26, 2000. Combating Terrorism: Observations on Growth in Federal Programs. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-NSIAD-99-181] Washington, D.C.: June 9, 1999. Combating Terrorism: Spending on Governmentwide Programs Requires Better Management and Coordination. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/NSIAD-98-39] Washington, D.C.: December 1, 1997. Other Products Related to Facility Security: Homeland Security: Transformation Strategy Needed to Address Challenges Facing the Federal Protective Service. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-537] Washington, D.C.: July 14, 2004. General Services Administration: Factors Affecting the Construction and Operating Costs of Federal Buildings. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-609T] Washington, D.C.: April 2, 2003. High-Risk Series: Federal Real Property. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-122] Washington, D.C.: January 2003. Building Security: Security Responsibilities for Federally Owned and Leased Facilities. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-8] Washington, D.C.: October 31, 2002. Diffuse Security Threats: USPS Air Filtration Systems Need More Testing and Cost Benefit Analysis before Implementation. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-838] Washington, D.C.: August 22, 2002. Homeland Security: Key Elements to Unify Efforts Are Underway but Uncertainty Remains. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-610] Washington, D.C.: June 7, 2002. Federal Real Property: Better Governmentwide Data Needed for Strategic Decisionmaking. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-342] Washington, D.C.: April 16, 2002. Highlights of GAO's Conference on Options to Enhance Mail Security and Postal Operations. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-315SP] Washington, D.C.: December 20, 2001. General Services Administration: Status of Efforts to Improve Management of Building Security Upgrade Program. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-GGD/OSI-00-19] Washington, D.C.: October 7, 1999: General Services Administration: Many Building Security Upgrades Made But Problems Have Hindered Program Implementation. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-GGD-98-141] Washington, D.C.: June 4, 1998. Other Products Related to Security Topics: Combating Terrorism: Evaluation of Selected Characteristics in National Strategies Related to Terrorism. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-408T] Washington, D.C.: February 3, 2004. Homeland Security Advisory System: Preliminary Observations Regarding Threat Level Increases from Yellow to Orange. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-453R] Washington, D.C.: February 26, 2004. Homeland Security: Preliminary Observations on Efforts to Target Security Inspections of Cargo Containers. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-325T] Washington, D.C.: December 16, 2003. Aviation Security: Efforts to Measure Effectiveness and Strengthen Security Programs. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-285T] Washington, D.C.: November 20, 2003. Bioterrorism: A Threat to Agriculture and the Food Supply. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-259T] Washington, D.C.: November 19, 2003. Aviation Security: Efforts to Measure Effectiveness and Address Challenges. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-232T] Washington, D.C.: November 5, 2003. Aviation Security: Progress Since September 11, 2001 and the Challenges Ahead. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-1150T] Washington, D.C.: September 9, 2003. Transportation Security: Post-September 11th Initiatives and Long-Term Challenges. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-616T] Washington, D.C.: April 1, 2003. Combating Terrorism: Observations on National Strategies Related to Terrorism. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-519T] Washington, D.C.: March 3, 2003. Overseas Presence: Conditions of Overseas Diplomatic Facilities. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-557T] Washington, D.C.: March 20, 2003. Mass Transit: Federal Action Could Help Transit Agencies Address Security Challenges. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-263] Washington, D.C.: December 13, 2002. Mass Transit: Challenges in Securing Transit Systems. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-1075T] Washington, D.C.: September 18, 2002. Combating Terrorism: Department of State Programs to Combat Terrorism Abroad. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-1021] Washington, D.C.: September 6, 2002. Port Security: Nation Faces Formidable Challenges in Making New Initiatives Successful. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-993T] Washington, D.C.: August 5, 2002. National Preparedness: Integrating New and Existing Technology and Information Sharing into an Effective Homeland Security Strategy. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-811T] Washington, D.C.: June 7, 2002. Homeland Security: A Framework for Addressing the Nation's Efforts. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-1158T] Washington, D.C.: September 21, 2001. Combating Terrorism: Comments on H.R. 525 to Create a President's Council on Domestic Terrorism Preparedness. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-555T] Washington, D.C.: May 9, 2001. Combating Terrorism: Comments on Counterterrorism Leadership and National Strategy. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-556T] Washington, D.C.: March 27, 2001. Embassy Construction: Better Long-Term Planning Will Enhance Program Decision-making. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-11] Washington, D.C.: January 22, 2001. FAA Computer Security: Recommendations to Address Continuing Weaknesses. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-171] Washington, D.C.: December 6, 2000. FAA Computer Security: Actions Needed to Address Critical Weaknesses That Jeopardize Aviation Operations. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-AIMD-00-330] Washington, D.C.: September 27, 2000. FAA Computer Security: Concerns Remain Due to Personnel and Other Continuing Weaknesses. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/AIMD-00-252] Washington, D.C.: August 16, 2000. Combating Terrorism: Action Taken but Considerable Risks Remain for Forces Overseas. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/NSIAD-00-181] Washington, D.C.: July 19, 2000. State Department: Overseas Emergency Security Program Progressing, but Costs Are Increasing. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/NSIAD-00-83] Washington, D.C.: March 8, 2000. Combating Terrorism: Issues in Managing Counterterrorist Programs. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-NSIAD-00-145] Washington, D.C.: April 6, 2000. State Department: Progress and Challenges in Addressing Management Issues. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-NSIAD-00-124] Washington, D.C.: March 8, 2000. State Department: Major Management Challenges and Program Risks. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-NSIAD/AIMD-99-99] Washington, D.C.: March 4, 1999. Major Management Challenges and Program Risks: Department of State. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/OCG-99-12] Washington, D.C.: January 1999. Combating Terrorism: Opportunities to Improve Domestic Preparedness Program Focus and Efficiency. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/NSIAD-99-3] Washington, D.C.: November 12, 1998. Foreign Affairs Management: Major Challenges Facing the Department of State. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-NSIAD-98-251] Washington, D.C.: September 17, 1998. Combating Terrorism: Efforts to Protect U.S. Forces in Turkey and the Middle East. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-NSIAD-98-44] Washington, D.C.: October 28, 1997. Combating Terrorism: Federal Agencies' Efforts to Implement National Policy and Strategy. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/NSIAD-97-254] Washington, D.C.: September 26, 1997. Combating Terrorism: Status of DOD Efforts to Protect Its Forces Overseas. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/NSIAD-97-207] Washington, D.C.: July 21, 1997. Aviation Security: FAA's Procurement of Explosives Detection Devices. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/RCED-97-111R] Washington, D.C.: May 1, 1997. Aviation Security: Posting Notices at Domestic Airports. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/RCED-97-88R] Washington, D.C.: March 25, 1997. Aviation Security: Technology's Role in Addressing Vulnerabilities. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-RCED/NSIAD-96-262] Washington, D.C.: September 19, 1996. Aviation Security: Urgent Issues Need to Be Addressed. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-RCED/NSIAD-96-251] Washington, D.C.: September 11, 1996. Aviation Security: Immediate Action Needed to Improve Security. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-RCED/NSIAD-96-237] Washington, D.C.: August 1, 1996. Aviation Security: FAA Can Help Ensure That Airports' Access Control Systems are Cost-Effective. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/RCED-95-25] Washington, D.C.: March 1, 1995. (543094): FOOTNOTES [1] Presidential Executive Order 12977, Oct. 19, 1995. [2] GAO, Building Security: Interagency Security Committee Has Had Limited Success in Fulfilling Its Responsibilities, GAO-02-1004 (Washington, D.C.: Sept. 17, 2002). [3] See GAO, A Model of Strategic Human Capital Management, GAO-02- 373SP (Washington, D.C.: Mar. 15, 2002); GAO, Human Capital: A Guide for Assessing Strategic Training and Development Efforts in the Federal Government, GAO-04-546G (Washington, D.C.: March 2004); GAO, Executive Guide: Leading Practices in Capital Decision-Making, GAO/AIMD-99-32 (Washington, D.C.: December 1998); and GAO, Information Technology: Training Can Be Enhanced by Greater Use of Leading Practices, GAO-04- 791 (Washington, D.C.: June 24, 2004). [4] ISC's membership includes the Departments of State, Treasury, Defense, Justice, the Interior, Agriculture, Commerce, Labor, Health and Human Services, Housing and Urban Development, Transportation, Energy, Education, and Veterans Affairs; GSA; the Environmental Protection Agency, Central Intelligence Agency (CIA), and OMB. Other members of ISC include the Director, U.S. Marshals Service and the Assistant to the President for National Security Affairs. As a member of ISC, DOD participates in meetings to ensure that DOD physical security policies are consistent with ISC security standards and policy guidance, according to the Executive Director of ISC. [5] Homeland Security Presidential Directive Number 7, Critical Infrastructure Identification Prioritization, and Protection, Dec. 17, 2003. [6] GAO-02-1004. [7] GAO, High-Risk Series: Federal Real Property, GAO-03-122 (Washington, D.C.: January 2003). [8] GAO-02-1004. [9] GAO-02-1004. [10] Presidential Executive Order 13286, Mar. 5, 2003. [11] Homeland Security Presidential Directive Number 12, Policy for a Common Identification Standard for Federal Employees and Contractors, Aug. 27, 2004. [12] See GAO-03-122 and GAO, Fiscal Year 2003 U.S. Government Financial Statements: Sustained Improvement in Federal Financial Management Is Crucial to Addressing Our Nation's Future Fiscal Challenges, GAO-04- 886T (Washington, D.C.: July 8, 2004). [13] Presidential Executive Order 12977, Oct. 19, 1995, originally stated that the Administrator of GSA would provide ISC administrative services, funds, facilities, staff, and other support services necessary for the performance of ISC functions. Executive Order 13286 amended Executive Order 12977 to reflect the transfer of ISC to DHS and substituted the Secretary of DHS for the Administrator of GSA. [14] GAO-02-687T. [15] For example, see GAO, Homeland Security: Critical Design and Implementation Issues, GAO-02-957T (Washington, D.C.: July 17, 2002) and GAO, Homeland Security: Key Elements of a Risk Management Approach, GAO-02-150T (Washington, D.C.: Oct. 12, 2001). [16] GAO, Homeland Security: A Risk Management Approach Can Guide Preparedness Efforts, GAO-02-208T (Washington, D.C.: Oct. 31, 2001). [17] GAO, Nuclear Security: Several Issues Could Impede the Ability of DOE's Office of Energy, Science and Environment to Meet the May 2003 Design Basis Threat, GAO-04-894T (Washington, D.C.: June 22, 2004). [18] GAO, Homeland Security: Challenges and Strategies in Addressing Short-and-Long-Term National Needs, GAO-02-160T (Washington, D.C.: Nov. 7, 2001). [19] Interior officials requested that we not publicly identify these 16 assets because of security concerns. [20] GAO, Border Security: Challenges in Implementing Border Technology, GAO-03-546T (Washington, D.C.: Mar. 12, 2003); GAO, Information Security: Challenges in Using Biometrics, GAO-03-1137T (Washington, D.C.: Sept. 9, 2003). [21] GAO-03-1137T. [22] GAO, Electronic Government: Challenges to the Adoption of Smart Card Technology, GAO-03-1108T (Washington, D.C.: Sept. 9, 2003). [23] For example, see GAO-03-1108T; GAO-03-1137T; GAO-03-546T; U.S Department of State, Office of Inspector General, Limited-Scope Security Inspection of Embassy Port of Spain, Trinidad, and Tobago, SIO-I-03-22, August 2003; U.S. Department of State, Office of Inspector General, Security Inspection of Embassy N'Djamena, Chad, SIO-I-03-27, June 2003; and U.S. Department of State, Office of Inspector General, Security Inspection of Embassy Yaounde, Cameroon, SIO-I-03-28, March 2003. [24] GAO-02-687T. [25] GAO, Diffuse Security Threats: USPS Air Filtration System Need More Testing and Cost Benefit Analysis before Implementation, GAO-02- 838 (Washington, D.C.: Aug. 22, 2002). [26] As we reported in GAO, Homeland Security Advisory System: Preliminary Observations Regarding Threat Level Increases from Yellow to Orange, GAO-04-453R (Washington, D.C.: Feb. 26, 2004), the Homeland Security Advisory System is composed of five color-coded threat conditions, which represent levels of risk related to potential terror attack. Red is severe, orange high, yellow elevated, blue guarded, and green low. [27] GAO, Homeland Security: Information Sharing Responsibilities, Challenges, and Key Management Issues, GAO-03-1165T (Washington, D.C.: Sept. 17, 2003). [28] GAO-03-1165T. [29] GAO, Homeland Security: Efforts to Improve Information Sharing Need to Be Strengthened, GAO-03-760 (Washington, D.C.: Aug. 27, 2003). [30] GAO, 9/11 Commission Report: Reorganization, Transformation, and Information Sharing, GAO-04-1033T (Washington, D.C.: Aug. 3, 2004). [31] GAO-02-687T. [32] U.S. Department of the Interior, Office of Inspector General, Review of National Icon Park Security, 2003-I-0063 (Washington, D.C.: Aug. 28, 2003). [33] U.S. Department of State, Office of Inspector General, Security Inspection: Embassy Ljubljana, Slovenia, SIO-I-03-03 (Washington, D.C.: November 2002). [34] General Services Administration, Office of Inspector General, Audit of the Federal Protective Service's Federal Security Risk Manager Program, A010129/P/2/R02007 (Arlington, VA: Mar. 27, 2002). [35] Office of Homeland Security, The National Strategy for Homeland Security, July 2002. [36] Office of Homeland Security, The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets, February 2003. [37] GAO, Combating Terrorism: Evaluation of Selected Characteristics in National Strategies Related to Terrorism, GAO-04-408T (Washington, D.C.: Feb. 3, 2004). [38] GAO, Weapons of Mass Destruction: Defense Threat Reduction Agency Addresses Broad Range of Threats, but Performance Reporting Can Be Improved, GAO-04-330 (Washington, D.C.: Feb. 13, 2004). [39] GAO-04-330. [40] WMD, once defined by DOD as nuclear, biological, and chemical, now includes radiological and high explosives as well. [41] U.S. Department of the Interior, Office of Inspector General, Review of National Icon Park Security, 2003-I-0063 (Washington, D.C.: August 2003). [42] GAO-02-687T, and GAO, Information Security: Technologies to Secure Federal Systems, GAO-04-467 (Washington, D.C.: Mar. 9, 2004). [43] After the bombing of a federal building in Oklahoma City, Oklahoma, the President issued PDD 39 in June 1995, which enumerated responsibilities for federal agencies in combating terrorism, including domestic incidents. In May 1998, the President issued PDD 62 that reaffirmed PDD 39 and further articulated responsibilities for specific agencies. [44] GAO, Combating Terrorism: Analysis of Federal Counterterrorist Exercises, GAO/NSIAD-99-157BR (Washington, D.C.: June 25, 1999). [45] GAO-03-122. [46] DOE Office of the Inspector General, Disposition of the Department's Excess Facilities, DOE/IG-0550 (Washington, D.C.: Apr. 3, 2002). [47] GAO, Federal Real Property: Actions Needed to Address Long- standing and Complex Problems, GAO-04-119T (Washington, D.C.: Oct. 1, 2003). [48] State established OPAP following the 1998 embassy bombings in Africa and in response to recommendations of the Accountability Review Boards to consider the organization of U.S. embassies and consulates. Department of State, America's Overseas Presence in the 21st Century, The Report of the Overseas Presence Advisory Panel (Washington, D.C.: November 1999). [49] GAO, Overseas Presence: Observations on a Rightsizing Framework, GAO-02-659T (Washington, D.C.: May 1, 2002). [50] GAO, Overseas Presence: Rightsizing Framework Can Be Applied at U.S. Diplomatic Posts in Developing Countries, GAO-03-396 (Washington, D.C.: Apr. 7, 2003). [51] GAO, Overseas Presence: Systematic Processes Needed to Rightsize Posts and Guide Embassy Construction, GAO-03-582T (Washington, D.C.: Apr. 7, 2003). [52] GAO-04-1033T. [53] GAO, Results-Oriented Government: Shaping the Government to Meet 21st Century Challenges, GAO-03-1168T (Washington, D.C.: Sept. 17, 2003). [54] GAO, Results-Oriented Cultures: Creating a Clear Linkage between Individual Performance and Organizational Success, GAO-03-488 (Washington, D.C.: Mar. 14, 2003). [55] GAO, Homeland Security: Transformation Strategy Needed to Address Challenges Facing the Federal Protective Service, GAO-04-537 (Washington, D.C.: July 14, 2004). [56] GAO-04-1033T. [57] Department of Energy Inspector General, Audit of the Department of Energy's Security Police Officer Training, CR-B-95-03 (Washington, D.C.: Feb. 6, 1995). [58] ASIS formerly stood for the American Society for Industrial Security; but now the organization refers to itself as ASIS International. [59] GAO, Federal Real Property: Better Governmentwide Data Needed for Strategic Decisionmaking, GAO-02-342 (Washington, D.C.: Apr. 16, 2002). [60] GAO-02-687T. [61] GAO-04-1033T. [62] GAO-03-760. [63] GAO-03-122. [64] GAO, Embassy Construction: State Department Has Implemented Management Reforms, but Challenges Remain, GAO-04-100 (Washington, D.C.: Nov. 4, 2003). [65] GAO, High-Risk Series: Strategic Human Capital Management, GAO-03- 120 (Washington, D.C.: January 2003). [66] See GAO-02-373SP; GAO/AIMD-99-32; GAO-04-791; and, GAO-04-546G. [67] See GAO-02-208T and GAO-02-150T. GAO's Mission: The Government Accountability Office, the investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through the Internet. GAO's Web site ( www.gao.gov ) contains abstracts and full-text files of current reports and testimony and an expanding archive of older products. The Web site features a search engine to help you locate documents using key words and phrases. You can print these documents in their entirety, including charts and other graphics. Each day, GAO issues a list of newly released reports, testimony, and correspondence. GAO posts this list, known as "Today's Reports," on its Web site daily. The list contains links to the full-text document files. To have GAO e-mail this list to you every afternoon, go to www.gao.gov and select "Subscribe to e-mail alerts" under the "Order GAO Products" heading. Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Public Affairs: Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.