Homeland Security
Further Actions Needed to Coordinate Federal Agencies' Facility Protection Efforts and Promote Key Practices
Gao ID: GAO-05-49 November 30, 2004
The war on terrorism has made physical security for federal facilities a governmentwide concern. The Interagency Security Committee (ISC), which is chaired by the Department of Homeland Security (DHS), is tasked with coordinating federal agencies' facility protection efforts, developing protection standards, and overseeing implementation. GAO's objectives were to (1) assess ISC's progress in fulfilling its responsibilities and (2) identify key practices in protecting federal facilities and any related implementation obstacles.
ISC has made progress in coordinating the government's facility protection efforts. In recent years, ISC has taken several actions to develop policies and guidance for facility protection and to share related information. Although its actions to ensure compliance with security standards and oversee implementation have been limited, in July 2004, ISC became responsible for reviewing federal agencies' physical security plans for the administration. ISC, however, lacks an action plan that could be used to provide DHS and other stakeholders with information on, and a rationale for, its resource needs; garner and maintain the support of ISC member agencies, DHS management, Office of Management and Budget, and Congress; identify implementation goals and measures for gauging progress; and propose strategies for addressing various challenges it faces, such as resource constraints. Without an action plan, ISC's strategy and time line for implementing its responsibilities remain unclear. s ISC and agencies have paid greater attention to facility protection in recent years, several key practices have emerged that, collectively, could provide a framework for guiding agencies' efforts. These include allocating resources using risk management; leveraging security technology; coordinating protection efforts and sharing information; measuring program performance and testing security initiatives; realigning real property assets to mission, thereby reducing vulnerabilities; and, implementing strategic human capital management, to ensure that agencies are well equipped to recruit and retain high-performing security professionals. GAO also noted several obstacles to implementation, such as developing quality data for risk management and performance measurement, and ensuring that technology will perform as expected.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-05-49, Homeland Security: Further Actions Needed to Coordinate Federal Agencies' Facility Protection Efforts and Promote Key Practices
This is the accessible text file for GAO report number GAO-05-49
entitled 'Homeland Security: Further Actions Needed to Coordinate
Federal Agencies' Facility Protection Efforts and Promote Key
Practices' which was released on January 5, 2005.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to the Chairman, Committee on Government Reform, House of
Representatives:
November 2004:
HOMELAND SECURITY:
Further Actions Needed to Coordinate Federal Agencies' Facility
Protection Efforts and Promote Key Practices:
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-49]:
GAO Highlights:
Highlights of GAO-05-49, a report to the Chairman, Committee on
Government Reform, House of Representatives
Why GAO Did This Study:
The war on terrorism has made physical security for federal facilities
a governmentwide concern. The Interagency Security Committee (ISC),
which is chaired by the Department of Homeland Security (DHS), is
tasked with coordinating federal agencies‘ facility protection efforts,
developing protection standards, and overseeing implementation. GAO‘s
objectives were to (1) assess ISC‘s progress in fulfilling its
responsibilities and (2) identify key practices in protecting federal
facilities and any related implementation obstacles.
What GAO Found:
ISC has made progress in coordinating the government‘s facility
protection efforts. In recent years, ISC has taken several actions to
develop policies and guidance for facility protection and to share
related information. Although its actions to ensure compliance with
security standards and oversee implementation have been limited, in
July 2004, ISC became responsible for reviewing federal agencies‘
physical security plans for the administration. ISC, however, lacks an
action plan that could be used to provide DHS and other stakeholders
with information on, and a rationale for, its resource needs; garner
and maintain the support of ISC member agencies, DHS management, Office
of Management and Budget, and Congress; identify implementation goals
and measures for gauging progress; and propose strategies for
addressing various challenges it faces, such as resource constraints.
Without an action plan, ISC‘s strategy and time line for implementing
its responsibilities remain unclear.
As ISC and agencies have paid greater attention to facility protection
in recent years, several key practices have emerged that, collectively,
could provide a framework for guiding agencies‘ efforts. These include
allocating resources using risk management; leveraging security
technology; coordinating protection efforts and sharing information;
measuring program performance and testing security initiatives;
realigning real property assets to mission, thereby reducing
vulnerabilities; and, implementing strategic human capital management,
to ensure that agencies are well equipped to recruit and retain high-
performing security professionals. GAO also noted several obstacles to
implementation, such as developing quality data for risk management and
performance measurement, and ensuring that technology will perform as
expected.
Key Practices in Facility Protection:
[See PDF for image]
[End of figure]
What GAO Recommends:
GAO is recommending that DHS direct ISC to develop an action plan that
identifies resource needs, goals, and time frames for meeting its
responsibilities; and proposes strategies for addressing the challenges
it faces. Furthermore, GAO recommends that the Chair of ISC, with input
from ISC member agencies and considering GAO‘s work as a starting
point, establish a set of key practices that could guide agencies‘
efforts in the facility protection area. This initiative could be used
to evaluate agency actions, identify lessons learned, and develop
strategies for overcoming challenges. DHS concurred with the
recommendations.
www.gao.gov/cgi-bin/getrpt?GAO-05-49.
To view the full product, including the scope and methodology, click on
the link above. For more information, contact Mark L. Goldstein at
(202) 512-2834 or goldsteinm@gao.gov.
[End of section]
Contents:
Letter:
Results in Brief:
Background:
ISC Has Made Progress but Faces Challenges in Fulfilling Some of Its
Major Responsibilities:
Key Practices in Federal Facility Protection:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendixes:
Appendix I: Objectives, Scope, and Methodology:
Appendix II: National Academy of Sciences Symposium Agenda:
Appendix III: ISC Actions Related to Its Major Responsibilities under
Executive Order 12977, as of September 2004:
Appendix IV: Risk Management Framework for Homeland Security and
Terrorism:
Appendix V: Comments from the Department of Homeland Security:
Appendix VI: Comments from the Department of State:
Appendix VII: Comments from the General Services Administration:
Appendix VIII: Comments from the Department of the Interior:
Appendix IX: Comments from the Department of Energy:
Bibliography:
Related GAO Products:
Table:
Table 1: Examples of Information Sharing and Coordination Identified by
Agencies:
Figures:
Figure 1: Bollards Installed at the Jacob Javits Federal Building:
Figure 2: Key Practices in Facility Protection:
Figure 3: Examples of Technologies Used in Facility Protection:
Figure 4: Smart Card Access Portals at the Jacob Javits Federal
Building Entrance:
Figure 5: Framework for Embassy Rightsizing:
Figure 6: FPS Officers Engaged in Biological and Chemical Weapons
Response Training:
Abbreviations:
CARES: Capital Asset Realignment for Enhanced Services:
CCTV: closed circuit television:
CIA: Central Intelligence Agency:
DBT: design basis threat:
DOD: Department of Defense:
DOE: Department of Energy:
DHS: Department of Homeland Security:
DS: Diplomatic Security:
DTRA: Defense Threat Reduction Agency:
FPS: Federal Protective Service:
FSRM: Federal Security Risk Management:
GPRA: Government Performance and Results Act of 1993:
GSA: General Services Administration:
HEPA: high-efficiency particulate air:
HSPD-12: Homeland Security Presidential Directive Number 12:
HSPD-7: Homeland Security Presidential Directive Number 7:
IG: Inspector General:
Interior: Department of the Interior:
ISC: Interagency Security Committee:
LROBP: Long-Range Overseas Buildings Plan:
NAS: National Academy of Sciences:
NPS: National Park Service:
OBO: Overseas Buildings Operations:
OLES: Office of Law Enforcement and Security:
OMB: Office of Management and Budget:
OPAP: Overseas Presence Advisory Panel:
PDD: Presidential Decision Directive:
PIN: personal identification number:
PSP: Physical Security Professionals:
State: Department of State:
USPS: U.S. Postal Service:
VA: Department of Veterans Affairs:
WMD: weapons of mass destruction:
Letter November 30, 2004:
The Honorable Tom Davis:
Chairman, Committee on Government Reform:
House of Representatives:
Dear Mr. Chairman:
The war on terrorism has made physical security for federal facilities
a governmentwide concern. The federal government owns or leases
hundreds of thousands of facilities, with the vast majority
concentrated in the Departments of Defense (DOD), Veterans Affairs
(VA), State (State), Energy (DOE), and the Interior (Interior); the
General Services Administration (GSA); and the U.S. Postal Service
(USPS). The makeup of these facilities reflects the diversity of
agencies' missions and includes office buildings, military
installations, hospitals, embassies, border stations, laboratories,
and park visitor centers.
After the September 11, 2001, attacks, Congress passed the Homeland
Security Act of 2002, which created the Department of Homeland Security
(DHS). In creating DHS, the government's efforts to prevent, protect
against, and respond to potential terrorism--including terrorism
directed at federal facilities--were centralized. As a result of the
act, DHS assumed responsibility for chairing the Interagency Security
Committee (ISC). ISC, which has representation from all the major
property-holding agencies and was established after the bombing of the
Oklahoma City federal building, has a range of governmentwide
responsibilities related to protecting nonmilitary facilities. These
generally involve developing policies and standards, ensuring
compliance and overseeing implementation, and sharing and maintaining
information.[Footnote 1] Although ISC was established to bring a
central focus to the government's efforts and provide a forum for
sharing key practices and lessons learned in protecting facilities, we
reported in September 2002 that ISC was having limited success in
fulfilling its responsibilities, because of the lack of consistent and
aggressive leadership by GSA, inadequate staff support and funding for
ISC, and ISC's difficulty in making decisions.[Footnote 2]
Our objectives were to (1) assess ISC's progress in fulfilling its
responsibilities and (2) identify key practices in protecting federal
facilities and any related implementation obstacles. To assess ISC's
progress in fulfilling its responsibilities, we interviewed the
Executive Director of ISC; analyzed ISC publications and other
documents; considered prior GAO work; and reviewed various laws and
policies, including the Homeland Security Act of 2002. We also reviewed
the executive order that established ISC, a subsequent executive order
that amended it in connection with the transfer of ISC's function to
DHS, and relevant homeland security policy directives. To identify key
practices, we systematically analyzed 170 GAO and Inspector General
(IG) reports issued since 1995 that addressed homeland security and
terrorism issues and pertained to facility protection. We also
contracted with the National Academy of Sciences (NAS) to convene a
symposium of experts on key practices in facility protection. Appendix
II contains the symposium agenda and identifies the panelists. We also
interviewed officials and analyzed documents from DHS and the major
property-holding agencies, including DOD, VA, State, DOE, Interior,
GSA, and USPS. For the purpose of this review, we defined key practices
as those activities that, on the basis of our analysis, were
recommended by GAO and others, acknowledged by agencies, and validated
by experts in the area. More information on our scope and methodology
appears in appendix I. We did our work from November 2003 through
October 2004 in accordance with generally accepted government auditing
standards.
Results in Brief:
ISC has made progress in coordinating the government's facility
protection efforts but faces certain challenges to fulfilling some of
its major responsibilities. In recent years, ISC has taken several
actions that relate to developing policies and guidance for facility
protection. For example, ISC has updated its security design criteria
for federal construction and developed guidance on security for
federally leased space. ISC has also made progress related to sharing
and maintaining information by, for example, developing a Web site and
establishing standard operating procedures for ISC and its member
agencies to follow for sharing information. Although its actions to
ensure compliance and provide oversight, which were specified in the
1995 executive order, have been limited, in July 2004, the
administration made ISC responsible for reviewing agencies' physical
security plans that are required under a December 2003 presidential
homeland security policy directive. Filling this role would represent a
major step toward meeting its compliance and oversight
responsibilities. Despite the overall progress ISC has made, and its
prominent new role in the administration's oversight activities, it
faces a number of challenges. For example, the sheer magnitude of
integrating the government's facility protection initiatives, which
involves many different agencies and varying perspectives on security,
is an ongoing, formidable task. Complicating this situation,
significant resource constraints hinder ISC's ability to fulfill this
and other related responsibilities. ISC has one full-time staff person
and is dependent on participation from member agencies to fulfill its
mission. In addition to these challenges, ISC lacks an action plan,
which we are recommending, that could be used to (1) provide DHS and
other stakeholders with detailed information on, and a rationale for,
its resource needs; (2) garner and maintain the support of ISC member
agencies, DHS management, Office of Management and Budget (OMB), and
Congress; (3) identify implementation goals and measures for gauging
progress in fulfilling all of its responsibilities; and (4) propose
strategies for addressing the challenges ISC faces. Without an action
plan, ISC's strategy and time line for implementing its
responsibilities remain unclear. DHS concurred with this
recommendation.
As ISC and agencies have paid greater attention to facility protection
in recent years, several key practices have emerged that collectively
could provide a framework for guiding agencies' efforts. These include
allocating resources using risk management; leveraging security
technology; sharing information and coordinating protection efforts
with other stakeholders; measuring program performance and testing
security initiatives; realigning real property assets to mission,
thereby reducing vulnerabilities; and, implementing strategic human
capital management, to ensure that agencies are well equipped to
recruit and retain high-performing security professionals. More
specifically, these key practices encompass the following:
* Allocating resources using risk management--A risk management
approach to facility protection, which, for example, DOD has employed
for several years to protect its critical facilities, involves
identifying potential threats, assessing vulnerabilities, identifying
the assets that are most critical to protect in terms of mission and
significance, and evaluating mitigation alternatives for their likely
effect on risk and their cost. Using information on these elements, a
strategy for allocating security-related resources is developed,
implemented, and reevaluated over time as conditions change.
* Leveraging technology--To address threats and vulnerabilities,
leveraging technology--through supplementing other measures with
technology in a cost-effective manner--enhances facility protection.
For example, advanced methods for screening access to facilities, such
as smart cards that GSA is piloting in New York City, have been used to
strengthen security. Smart cards use integrated circuit chips, which
store information on individuals; and biometrics, which analyze human
physical and behavioral characteristics. Sophisticated surveillance
systems can also help secure building perimeters and monitor activity
in the building.
* Information sharing and coordination--Establishing a means of
coordinating and sharing information with other government entities and
the private sector is crucial to prevent, protect against, and respond
to potential terrorism. Facility managers are highly dependent on
guidance and input from outside stakeholders to address threats
directed at federal facilities. For example, DOE has memoranda of
agreement in place with federal, state, and local law enforcement
agencies and works with DOD to secure facilities that house the
nation's nuclear stockpile.
* Performance measurement and testing--Performance measurement can be
used to ensure accountability for achieving broad program goals and
improved security at the individual building level. For broader program
goals, measures could focus on implementation time lines and adherence
to budgets. At the individual building level, active testing using, for
example, on-site security assessments can provide data on the
effectiveness of efforts to reduce vulnerabilities. Training exercises
and drills are also useful in assessing preparedness.
* Aligning assets to mission can reduce vulnerabilities--The
government's long-standing problem with excess and underutilized
property has implications for facility protection. To the extent that
agencies are expending resources to maintain and protect facilities
that are not needed, realigning assets to mission and relocating staff
can reduce vulnerabilities by reducing the number of assets that need
to be protected. Furthermore, expending resources to protect unneeded
facilities may reduce funds available to protect other more vulnerable
facilities and staff. An example where this is occurring is State's
attempt to "rightsize" its overseas presence, which gives heavy
consideration to reducing security vulnerabilities as part of an asset
realignment effort.
* Strategic human capital management--In facility protection, as with
other areas pertaining to homeland security, it is especially critical
for agencies to be well equipped to recruit and retain high-performing
security and law enforcement professionals. We have reported in recent
years that overall, the government should take a strategic and results-
oriented approach to managing and maintaining the human capital needed
to maximize government performance and assure its accountability.
Although agencies have begun using these key practices to varying
degrees, a number of implementation obstacles are apparent. These
include developing quality data that form the basis for risk
management, ensuring that technology will perform as expected, and
determining how to measure the true impact that various approaches have
on improving protection. Agencies also face significant, long-standing
obstacles to realigning their facility portfolios and implementing
human capital reforms in general. To help devise strategies for
overcoming these obstacles and evaluate their efforts, agencies would
benefit from having a set of key practices--such as those we have
identified--that could be used to guide their efforts to protect
facilities. We have advocated using guiding principles in other areas,
including human capital management, information technology, and capital
investment.[Footnote 3] ISC, in serving as the central coordinator for
agencies' efforts, is well positioned to promote key practices for
facility protection and could consider using our work as a starting
point. As such, we are recommending that the Chair of ISC pursue such
an initiative and DHS concurred with this recommendation. Also, ISC
member agencies including State, Interior, GSA, and DOE provided
additional information and comments on a draft of this report, which we
incorporated where appropriate.
Background:
Terrorists have targeted federal facilities several times over the past
10 years. After the 1995 bombing of the Alfred P. Murrah Federal
Building in Oklahoma City, the Department of Justice created minimum-
security standards for federal facilities. In October 1995, the
President signed Executive Order 12977, which established ISC. ISC was
expected to enhance the quality and effectiveness of security in, and
protection of, facilities in the United States occupied by federal
employees for nonmilitary activities and to provide a permanent body to
address continuing governmentwide security issues for federal
facilities. ISC is expected to have representation from all the major
federal departments and agencies, as well as a number of key
offices.[Footnote 4] ISC's specific responsibilities under the
executive order generally relate to three areas: developing policies
and standards, ensuring compliance and overseeing implementation, and
sharing and maintaining information. Related to policies and standards,
the executive order specifically states that ISC is to:
* establish policies for security in and protection of federal
facilities;
* develop and evaluate security standards for federal facilities;
* assess technology and information systems as a means of providing
cost-effective improvements to security in federal facilities;
* develop long-term construction standards for those locations with
threat levels or missions that require blast-resistant structures or
other specialized security requirements; and:
* evaluate standards for the location of, and special security related
to, day care centers in federal facilities.
In the area of compliance and oversight, ISC is to develop a strategy
for ensuring compliance with facility security standards and oversee
the implementation of appropriate security measures in federal
facilities. And, related to sharing and maintaining information, ISC is
to encourage agencies with security responsibilities to share security
related intelligence in a timely and cooperative manner and assist with
developing and maintaining a centralized security database of all
federal facilities.
Since September 11, the focus on protecting the nation's critical
infrastructure has been heightened considerably. The Homeland Security
Act of 2002 and other administration policies assigned DHS specific
duties associated with coordinating the nation's efforts to protect
critical infrastructure, and Homeland Security Presidential Directive
Number 7 (HSPD-7) stated that DHS's Secretary was responsible for
coordinating the overall national effort to identify, prioritize, and
protect critical infrastructure and key resources.[Footnote 5] Under
the Homeland Security Act of 2002, the Federal Protective Service (FPS)
was transferred from GSA to DHS and, as a result of this transfer, DHS
assumed responsibility for ISC in March 2003.
In September 2002, we reported that ISC was having limited success in
fulfilling its responsibilities.[Footnote 6] Specifically, ISC had made
little or no progress in areas including developing and establishing
policies for security in and protection of federal facilities and
developing a strategy for ensuring compliance with security standards.
In January 2003, we designated federal property as a high-risk area, in
part due to the threat of terrorism against federal
facilities.[Footnote 7] As the government's security efforts continue
to intensify, and real property-holding agencies employ such measures
as searching vehicles that enter federal facilities, restricting
parking, and installing concrete bollards, important questions continue
to be raised regarding the level of security needed to adequately
protect federal facilities and how the security community should
proceed. Figure 1 shows bollards installed at the Jacob Javits Federal
Building in New York, New York. Additionally, questions concerning the
cost-effectiveness and impact of various practices have emerged as the
nation faces a protracted war on terrorism.
Figure 1: Bollards Installed at the Jacob Javits Federal Building:
[See PDF for image]
[End of figure]
ISC Has Made Progress but Faces Challenges in Fulfilling Some of Its
Major Responsibilities:
ISC has made progress in coordinating the government's facility
protection efforts and has been given a prominent role in reviewing
agencies' physical security plans for the administration since we last
reported on this issue. In September 2002, we reported that ISC, at
that time, had made little or no progress in key elements of its
responsibilities, such as developing policies and standards for
security at federal facilities; ensuring compliance with security
standards and overseeing the implementation of appropriate security in
federal facilities; and related to information, developing a
centralized security database of all federal facilities.[Footnote 8]
Agency representatives identified several factors that they believe
contributed to ISC's limited progress. These factors included (1) the
lack of consistent and aggressive leadership by GSA, (2) inadequate
staff support and funding for ISC, and (3) ISC's difficulty in making
decisions. Nonetheless, there were areas where we observed some
progress over its then 7-year existence. For example, ISC had developed
and issued security design criteria and minimum standards for building
access procedures; disseminated information to member agencies on entry
security technology for buildings needing the highest security levels;
and, through its meetings and working groups, provided a forum for
federal agencies to discuss security-related issues and share
information and ideas.[Footnote 9]
In commenting on the September 2002 report, GSA, which at the time had
responsibility for chairing ISC, agreed to take action to address the
shortcomings we identified. In March 2003, in accordance with the
Homeland Security Act of 2002, FPS was transferred from GSA to DHS. As
a result, DHS assumed responsibility for chairing ISC, and the
executive order establishing ISC was amended to reflect the transfer of
this function from GSA to DHS.[Footnote 10] Transferring responsibility
for ISC to DHS reflected the shift to having homeland security
activities centralized under one cabinet-level department. Within DHS,
the role of chairing ISC was subsequently delegated to the Director of
FPS in January 2004.
Since our 2002 report, ISC has made clear progress in developing
policies and standards and maintaining and sharing information. Related
to policies and standards, ISC issued security standards for leased
space in July 2003, and OMB has approved them. These standards address
security requirements for leased facilities and, according to an ISC
official, are currently being used by ISC member agencies as a
management tool. In June 2003, ISC issued guidance on escape hoods for
federal agencies and, in October 2003, ISC issued an update to its May
2001 Security Design Criteria for New Federal Office Buildings and
Major Modernization Projects. According to an FPS official, GSA is
incorporating ISC's Security Design Criteria in the construction of new
facilities. More recently, ISC became involved with Homeland Security
Presidential Directive Number 12 (HSPD-12), issued in August 2004,
which seeks to standardize identification:
for federal employees and contractors.[Footnote 11] According to the
directive, wide variations in the quality and security of forms of
identification used to gain access to federal facilities, where there
is a potential for terrorist attacks, need to be eliminated. ISC's
Executive Director informed us that he was asked to be a member of the
White House Homeland Security Council Coordination Committee for HSPD-
12. This ISC official would provide the leadership role for this
committee and ensure that physical security requirements for the
federal government, as they relate to the directive, are included and
coordinated with ISC members.
Related to its role in maintaining and sharing information, ISC has
developed a Web site for posting policies and guidance and is
developing a secure Web portal for member agencies to exchange security
guidance and other information. Also, according to the Executive
Director of ISC, standard operating procedures were approved by ISC
members in June 2004 and were finalized in September 2004. These
operating procedures are intended to improve the quality of information
sharing among member agencies at its meetings by establishing standards
for attendance and participation at ISC meetings. For example, each ISC
agency representative is required to attend all meetings or delegate a
person to attend to ensure full participation. Finally, DHS is
developing a governmentwide facilities database that the ISC Executive
Director believes will meet ISC's responsibility to assist with
developing and maintaining a centralized security database of all
federal facilities. This database will list functions and services that
are mission critical, map federal assets and their critical
infrastructure, and identify key resources for both cyber and physical
security protection. According to ISC's Executive Director, ISC members
are an integral part of this process and will ensure that the required
support from within their departments and agencies is provided.
New Role Could Provide Vehicle for Addressing Responsibilities Related
to Ensuring Compliance and Overseeing Implementation:
Despite progress in its other areas of responsibility, ISC has not
developed, as specified in its 1995 executive order, a strategy for
ensuring compliance with security standards among agencies and
overseeing the implementation of appropriate security measures in
federal facilities. However, in July 2004, the administration made ISC
responsible for annually reviewing and approving physical security
plans that agencies are required to develop under a presidential
homeland security policy directive. HSPD-7, issued in December 2003,
establishes a national policy for federal departments and agencies to
identify and prioritize critical infrastructure and key resources in
the United States so that they can be protected from terrorist attacks.
The directive makes DHS responsible for overseeing the implementation
of the directive and outlines the roles and responsibilities of
individual agencies. Among the roles and responsibilities delineated,
HSPD-7 establishes an annual reporting cycle for agencies to evaluate
their critical infrastructure and key resources protection plans for
both cyber and physical security. ISC's Executive Director informed us
that in July 2004, the administration designated ISC as the oversight
body for agencies' physical security plans. According to ISC's
Executive Director, ISC's role will be to review, approve, or
disapprove each department or agency's physical security plan.
If ISC were to successfully fulfill its new responsibilities under
HSPD-7, which would be done under the broader umbrella of the
administration's central planning and coordination efforts for homeland
security, it would represent a major step toward meeting its
responsibilities that relate to oversight and compliance monitoring, as
specified in the 1995 executive order under which it was established.
That is, the 1995 executive order that established ISC specified that
ISC should develop a strategy for ensuring agencies' compliance with
governmentwide facility protection standards and oversee the
implementation of appropriate security measures in federal facilities.
By having a role in reviewing agencies' physical security plans in
relation to HSPD-7, ISC would have a vehicle for carrying out its
existing responsibility related to compliance and oversight. Appendix
III identifies each of ISC's major responsibilities under the executive
order and actions it has taken to date to fulfill them.
ISC Faces Challenges to Fulfilling Its Responsibilities:
ISC's Executive Director identified several challenges that relate to
ISC's many roles and responsibilities in coordinating the government's
facility protection efforts. These included the following:
* reaching a consensus with agencies on a risk management process for
the government that is reasonable and obtaining funding for this
activity;
* addressing the issue of leased government space and the impact that
new physical security standards for leased space will have on the real
estate market;
* developing a compliance process for agencies that can also be used as
a self-assessment tool to measure the effectiveness of ISC;
* educating senior level staff from across the government and gaining
their support for ISC activities; and overall,
* integrating all physical security initiatives for the entire federal
government and implementing change.
We agree that ISC faces these challenges and, furthermore, that they
will have to be addressed in order for ISC to be successful. More
specifically, the sheer magnitude of integrating the government's
facility protection initiatives, which ISC and FPS officials
identified, is formidable because it involves many different agencies
and varying perspectives on security. Furthermore, in discussing the
challenges associated with leased property, ISC's Executive Director
touched on one of several long-standing problems in the federal real
property area that have implications for facility protection policy. As
reported in GAO's 2003 high-risk report on federal real property, the
government's historical reliance on costly leased space--which achieves
short-term budget savings but is more costly over the longer term--is
problematic. To the extent that private sector lessors are required to
enhance the security of their property for federal tenants, the
associated costs will likely be passed on to the government in the form
of higher rent.
Another long-standing problem that could affect ISC as it attempts to
meet its responsibilities is the historically unreliable nature of
agency real property data. Poor data could make it difficult for agency
management to implement and oversee comprehensive risk-based approaches
to protecting their facilities. As discussed later, risk management, as
it pertains to facility protection, relies heavily on accurate and
timely data. At the governmentwide level, inventory data maintained by
GSA for the entire government, and financial data on property reported
in the government's financial statements, have also been historically
unreliable.[Footnote 12]
Another challenge identified by ISC's Executive Director--obtaining
adequate resources for its activities--is a particular concern.
According to the Executive Director of ISC, as the ISC's only full-time
staff person, his ability to ensure that all of ISC's responsibilities
are fulfilled is limited. Also, according to this official, ISC is
dependent entirely on participation and input from member agencies.
ISC's Executive Director said that, in the past, getting buy-in and
support from senior officials in member agencies had been a challenge.
It seems, however, that given ISC's new role in the administration's
homeland security efforts, it could make a persuasive case for a
sustained level of support from agencies. Also, it is important to note
that DHS has certain responsibilities under the executive order that
established ISC to ensure it has adequate resources. Specifically, the
executive order states that "to the extent permitted by law and subject
to the availability of appropriations, the Secretary of Homeland
Security should provide ISC with such administrative services, funds,
facilities, staff, and other support services as may be necessary for
the performance of its functions."[Footnote 13] According to ISC's
Executive Director, current ISC resources are not sufficient for ISC to
meet all of its evolving responsibilities. This official told us that
additional funding for ISC will not be available until fiscal year
2006. However, given the prominent role ISC will be playing in the
administration's homeland security efforts, it will be critical for DHS
to help ISC undertake activities that will allow it to fulfill its
responsibilities, address other challenges it faces, and ultimately be
successful.
Given the challenges ISC faces, its new responsibility related to HSPD-
7 for reviewing agencies' physical security plans, and the need to
sustain progress it has made in fulfilling its responsibilities, ISC
would benefit from having a clearly defined action plan for achieving
results. Although ISC has taken steps to address challenges, such as
seeking additional resources for fiscal year 2006, it lacks an action
plan that could be used to (1) provide DHS and other stakeholders with
detailed information on, and a rationale for, its resource needs; (2)
garner and maintain the support of ISC member agencies, DHS management,
OMB, and Congress; (3) identify implementation goals and measures for
gauging progress in fulfilling all of its responsibilities; and (4)
propose strategies for addressing the challenges ISC faces. Such a plan
could incorporate the strategy for ensuring compliance with facility
protection standards that is required under ISC's executive order, but
has not yet been developed. Without an overall action plan for meeting
this and other responsibilities, ISC's strategy and time line for these
efforts remain unclear.
Having an effective ISC is critically important to the government's
overall homeland security efforts as new threats emerge and agencies
continue to focus on improving facility protection. Prior to 1995,
there were no governmentwide standards for security at federal
facilities and agencies' efforts to coordinate and share information
needed improvement. Without standards and mechanisms for coordination,
there were concerns about the vulnerability of federal facilities to
acts of terrorism. As recently as August 2004, information from DHS
showed that threats against high-profile facilities in the New York
area and Washington, D.C., are still a major concern.
Key Practices in Federal Facility Protection:
As ISC and agencies have paid greater attention to facility protection
in recent years, several key practices have emerged that collectively
could provide a framework for guiding agencies' efforts. As discussed
in more detail later, ISC could play a vital role in promoting key
practices in relation to its information sharing responsibilities. Key
facility protection practices that we identified include allocating
security resources using risk management, leveraging the use of
security technology, coordinating protection efforts and sharing
information with other stakeholders, and measuring program performance
and testing security initiatives. In addition, we determined that two
other practices GAO has highlighted as governmentwide issues also have
implications for the facility protection area. These include realigning
real property assets to agencies' missions, thereby reducing
vulnerabilities, and strategic human capital management, to ensure that
agencies are well equipped to recruit and retain high-performing
security professionals. Our analysis--based on our work and Inspector
General (IG) reports, the views of the NAS symposium experts in
facility protection, and interviews with federal agencies--showed that
attention to these key practices could provide a framework for guiding
agencies' efforts and achieving success in the facility protection
area. Figure 2 identifies each of these key practices.
Figure 2: Key Practices in Facility Protection:
[See PDF for image]
[End of figure]
Using Risk Management Prioritizes Limited Security Resources:
Allocating resources using risk management is a systematic and
analytical process to consider the likelihood that a threat will
endanger an asset (structure, individual, or function) and identify,
evaluate, select, and implement actions that reduce the risk or
mitigate the consequences of an event. Although applying risk
management principles to facility protection can take on various forms,
our past work showed that most risk management approaches generally
involve identifying potential threats, assessing vulnerabilities,
identifying the assets that are most critical to protect in terms of
mission and significance, and evaluating mitigation alternatives for
their likely effect on risk and their cost. These and other elements of
a risk management approach are described in more detail in appendix IV.
Our work showed that there was consensus in the security community--
including GAO, IGs, agencies, national experts, and the private sector-
-that utilizing risk management practices provides the foundation for
an effective facility protection program. For example, GAO has
previously reported that for homeland security and information systems
security, risk management can provide a sound foundation for effective
security whether the assets are information, operations, people, or
federal facilities.[Footnote 14] In fact, dozens of GAO and IG reports
since September 11--which addressed efforts to protect facilities at
several agencies including DOD, State, Interior, and GSA--discussed how
risk management should be used to guide programs and better prepare
for, and respond to, terrorism and other threats.[Footnote 15] We have
also recognized the benefits of risk management in determining how best
to maximize the impact of limited resources.[Footnote 16] At our March
2004 NAS symposium, there was general consensus among panelists that
risk management is useful in guiding security decisions and that this
approach should be pursued by federal agencies. Some of the NAS
panelists commented:
"I am a supporter of risk-based methodologies. I see a lot of benefits
from this approach. First, [agencies] can weigh the amount of risk
reduction versus the cost of that reduction. Secondly, if [agencies]
have a proven model, [they] can actually provide sound security. We
have found time and time again, after a terrorist event, [there is a]
knee-jerk reaction where people—don't necessarily add security but
[instead] give the appearance of taking some action." - Navy official:
"One of the key corollaries to [a] risk-assessment process is the
determination of cost-effectiveness. That is a balancing act between
the cost of the mitigation measures that we implement and the
reductions in future losses, which we refer to as benefits." - Federal
Emergency Management Agency official:
"Threat assessments that we carry out are comparative, rather than
absolute. By ranking the likelihood of a range of threats, in
combination with a broad assessment of their potential consequences, we
aim to show clients where their greatest risks lie by outlining
proposals for mitigating these risks in the threat and risk assessment.
The client can then prioritize how best to direct available resources."
- Security consultant from the United Kingdom:
Our discussions with the major property-holding agencies and analysis
of documents we obtained showed that each agency used some form of risk
management to protect its facilities. Some examples of how agencies
applied risk management are as follows:
* According to officials with FPS, which protects federally owned or
occupied facilities held by GSA and DHS, security needs and related
countermeasures are prioritized based on the level of risk to a
particular facility. Risk is determined by evaluating the impact of
loss and vulnerability that each specific threat would have on a
facility. According to these officials, FPS inspectors are trained to
make educated decisions on applicable countermeasures to the identified
threats and vulnerabilities on a recurring basis.
* We have reported that, for many years, DOE has employed risk-based
security practices.[Footnote 17] To manage potential risks, DOE uses a
classified document referred to as a "design basis threat" (DBT). The
DBT identifies the potential size and capabilities of terrorist forces
and is based on information DOE gathers from the intelligence
community. DOE requires contractors operating its sites to provide
sufficient protective forces and equipment to defend against the threat
contained in the DBT. DOE updated its 1999 DBT in May 2003 to better
reflect current and projected terrorist threats in the aftermath of
September 11.
* VA conducts physical security assessments and prioritizes its
protection efforts for critical infrastructure, according to VA
officials. The phases of the assessment include defining the
criticality of VA facilities, identifying and analyzing vulnerabilities
of VA's critical facilities, and identifying appropriate
countermeasures. According to VA documents, VA determines vulnerability
by factors such as facility population, number of floors in the
facility, and the presence or absence of armed officers. This
assessment also includes a procedure for scoring and prioritizing
identified vulnerabilities at each assessed site.
* We have reported that DOD requires its installations to assess,
identify, and evaluate potential threats to the installation; identify
weaknesses and countermeasures to address the installation's
vulnerabilities; and evaluate and rank criticality of the
installation's assets to achieving mission goals.[Footnote 18] These
three assessments serve as the foundation of each DOD installation's
antiterrorism plan. The results of the assessments are used to balance
threats and vulnerabilities and to define and prioritize related
resource and operational requirements.
* Interior's Office of Law Enforcement and Security (OLES) has
identified 16 Interior assets as needing special consideration because
they are critical to the nation's infrastructure or are national icons
that could be targets for symbolic reasons.[Footnote 19] Having a
rationale such as this, for focusing on certain assets, represents
Interior's approach to risk management at the departmentwide level.
* According to USPS officials, USPS's physical security program
incorporates a risk assessment methodology and a layered approach to
facility security. This effort involves annual security surveys of
facilities conducted by facility security control officers and periodic
comprehensive reviews at larger core postal facilities by the Postal
Inspection Service, which is the investigative branch of USPS.
* In commenting on this report, State noted that another example of an
agency's use of risk management is State's Long-Range Overseas
Buildings Plan (LROBP). LROBP is a 6-year plan, updated yearly, that
identifies embassy and consulate facilities most in need of replacement
due to unacceptable security, safety, and/or operational conditions.
State also said that the plan identifies State's facilities' program
objectives and prioritizes competing facility requirements with input
from the Bureaus of Overseas Buildings Operations (OBO) and Diplomatic
Security (DS), State's Regional Bureaus, and other overseas agencies.
State indicated that the LROBP provides a road map for addressing long-
term facility needs under the Capital Security Construction Program,
Regular Capital Construction Program, as well as major rehabilitation,
compound security, and other programs. According to State's comments,
to prepare the plan, each year OBO and DS meet with the regional
bureaus to discuss which posts should move into the "top 80" list,
which contains the 80 primary posts requiring replacement for security
reasons, and for which, by law, the department can spend security
capital construction appropriations. Furthermore, with respect to the
original full list of facilities that need replacement, the department,
working with intelligence agencies, prioritizes these facilities.
At the NAS symposium, a private sector security expert discussed a risk
management methodology in use by FPS at GSA and Internal Revenue
Service facilities. We did not review the usefulness or effectiveness
of this methodology. Nonetheless, the methodology is an example of one
risk management process that is in use. The process, called Federal
Security Risk Management, or FSRM, is a risk matrix that compares
credible threats with assets and assesses the impact of loss and
vulnerability. According to the panelist, agencies use the risk matrix
to apply security upgrades to the risks deemed unacceptable and
reevaluate the countermeasures until a desired level of risk reduction
is achieved. The agencies then develop design or retrofit
specifications and criteria. This risk assessment cycle generally spans
a 2-to-4 year time period. According to the panelist, once unacceptable
risks are addressed through countermeasures, agencies need to
reevaluate risks and vulnerabilities on an ongoing basis.
Leveraging Security Technologies Can Enhance Facility Protection:
By efficiently using technology to supplement and reinforce other
security measures, vulnerabilities that are identified by the risk
management process can be more effectively addressed with appropriate
countermeasures. Our work showed broad concurrence among GAO, IGs,
facility security experts, and agency experts that making efficient use
of security technology to protect federal facilities is a key practice,
but that the type of technology to use should be carefully analyzed.
For example, in reporting on border security and information security
issues in 2003, we found that prior to significant investment in a
project, a detailed analysis should be conducted to determine that
benefits of a technology outweigh costs, as well as to determine the
effects of the technology on areas such as privacy and
convenience.[Footnote 20] In the facility access control area, we also
reported that agencies should decide how technology will be used and
whether to use technology at all to address vulnerabilities before
implementation.[Footnote 21] According to our 2003 testimony on using
technologies to secure federal facilities, technology implementation
costs can be high, particularly if significant infrastructure
modifications are necessary.[Footnote 22] Another consideration is that
lesser technological solutions sometimes may be more effective and less
costly than more advanced technologies. For example, as we reported in
2002, trained dogs are an effective and time-proven tool for detecting
concealed explosives. By using the risk management process and
balancing costs, benefits, and other concerns, agencies can efficiently
leverage technologies to enhance facility protection.
Among the advanced technologies that were identified during our review
were smart cards--which use integrated circuit chips to store
information on individuals--and biometrics--which analyze human
physical and behavioral characteristics--to verify the identity of
employees. Furthermore, sophisticated detection and surveillance
systems such as closed circuit television (CCTV) have also aided in
securing facility perimeters and monitoring activity in the building.
Such technologies expand surveillance capabilities and can free up
security staff for other duties. Several GAO and IG reports indicated
that agencies currently have a wide array of security technologies
available for protecting facilities, including smart cards, biometrics,
X-ray scanners, and CCTV.[Footnote 23] As we reported in 2002,
technologies identified as countermeasures through the risk management
process support the following three integral concepts for security:
* Protection--Provides countermeasures such as policies, procedures,
and technical controls to defend assets against attacks.
* Detection--Monitors for potential breakdowns in protective mechanisms
that could result in security breaches.
* Reaction--Responds to detected breaches to thwart attacks before
damage can be done.
In GAO's April 2002 testimony on security technologies, we categorized
the security technologies by which security concept they
supported.[Footnote 24] Figure 3 lists the technologies and provides
descriptions of each.
Figure 3: Examples of Technologies Used in Facility Protection:
[See PDF for image]
[End of figure]
Several of the major property-holding agencies we contacted use various
security technologies to protect their facilities. For example, to
control access to its embassies, State employs alarm systems, arrest
barriers to stop vehicles, audio/video monitoring equipment, explosive
detection devices and metal detectors, and X-ray machines. Officials at
USPS indicated that various detection technologies are used to secure
its facilities against biological and radiological agents. For example,
as we reported in 2002, USPS installed high-efficiency particulate air
(HEPA) filtration systems at some facilities to protect them from
biohazards.[Footnote 25] HEPA filtering technology is designed to
remove particulate biohazards and other particles.
Currently, GSA is conducting a smart card pilot program for two federal
buildings in New York City. Although the first cards went into use in
October 2003, planning for the pilot program began before the September
11 terrorist attacks. One of the federal buildings participating in the
program is the Jacob Javits Federal Building, which houses
approximately 35 agencies and more than 7,000 federal employees. All of
the employees participating in the program use smart cards to enter the
building. In addition to a person's name, title, and picture, the smart
card contains multiple layers of data substantiating the card's
authenticity and personal biometric data of the cardholder. Employees
use the smart cards at access portals near the building's entrances
(see fig. 4). After the portal has read the smart card and validated
the user, glass doors swing apart to allow entry. If the threat level
is raised under the homeland security advisory system, the building
access technology requires additional security procedures (e.g.,
entering a personal identification number (PIN), matching a stored
biometric record).[Footnote 26] Although agencies' use of smart cards
in the building has been optional, all of the agencies in the Javits
building are currently participating in the pilot program, including
the Federal Bureau of Investigation, the Small Business Administration,
and the Department of Housing and Urban Development.
Figure 4: Smart Card Access Portals at the Jacob Javits Federal
Building Entrance:
[See PDF for image]
[End of figure]
Overall, it was evident during our review that agencies are already
using or experimenting with a range of technologies in their facility
protection efforts. In terms of key practices, it is important to note
that focusing on obtaining and implementing the latest technology is
not necessarily a key practice by itself. Instead, having an approach
that allows for cost-effectively leveraging technology to supplement
and reinforce other measures would represent an advanced security
approach in this area. Also, linking the chosen technology to
countermeasures identified as part of the risk management process
provides assurance that factors such as purpose, cost, and expected
performance were addressed.
Information Sharing and Coordination among Federal Agencies and the
Private Sector Can Help Agencies Better Protect Their Assets:
Information sharing and coordination among organizations is crucial to
producing comprehensive and practical approaches and solutions to
address terrorist threats directed at federal facilities. Our work
showed a broad consensus--on the basis of prior GAO and IG work and
information from agencies and the private sector--that by having a
process in place to obtain and share information on potential threats
to federal facilities, agencies can better understand the risk they
face and more effectively determine what preventive measures should be
implemented. In considering the implications that information sharing
and coordination have for facility protection efforts, it is useful to
look at how this practice is being approached governmentwide, at the
agency level, and at the individual facility level.
At the governmentwide level, DHS is expected to play a critical role in
information sharing and coordination in most homeland security areas,
including facility protection. In September 2003, we reported that
information sharing was critical for DHS to meet its mission of
preventing terrorist attacks in the United States, reducing
vulnerability to terrorist attacks, and minimizing damage and assisting
with recovery if attacks do occur.[Footnote 27] In 2003, we also
reported that to accomplish its mission, DHS needed to access, receive,
and analyze law enforcement information, intelligence information, and
other threat, incident, and vulnerability information from federal and
nonfederal sources and analyze this information to identify and assess
the nature and scope of terrorist threats. Furthermore, we reported
that DHS should share information both internally and externally with
agencies, law enforcement, and first responders.[Footnote 28] As we
testified in September 2003, we have made numerous recommendations to
DHS to improve information sharing and coordination to accomplish its
homeland security responsibilities. These recommendations involved,
for example,
* incorporating existing information-sharing guidance contained in
various national strategies and the information-sharing procedures
required by the Homeland Security Act of 2002;
* establishing a clearinghouse to coordinate the various information-
sharing initiatives to eliminate possible confusion and duplication of
effort;
* fully integrating states and cities into a national policy-making
process for information sharing and taking steps to provide greater
assurance that actions at all levels of government are mutually
reinforcing;
* identifying and addressing perceived barriers to federal information-
sharing; and:
* using survey methods or related data collection approaches to
determine, over time, the needs of private and public organizations for
information related to homeland security and to measure progress in
improving information sharing at all levels of government.[Footnote 29]
In addition to those recommendations, we identified a need for a
comprehensive plan to facilitate information sharing and coordination
to protect critical infrastructure in our August 2004 testimony on
strengthening information sharing for homeland security.[Footnote 30]
We reported that such a plan could encourage improved information
sharing by clearly delineating roles and responsibilities of federal
and nonfederal entities, defining interim objectives and milestones,
setting time frames for achieving objectives, and establishing
performance measures. DHS has concurred with the above recommendations
to improve information sharing and coordination and is in various
stages of implementing them. These recommendations clearly have
implications for the facility protection area, by, for example,
increasing coordination among facility stakeholders that would reduce
duplicative efforts and reinforce protection strategies.
The emphasis on information sharing and coordination is also evident in
the National Strategy for Homeland Security and its related strategies
to protect critical infrastructure, including federal facilities.
According to the national strategy, successfully protecting facilities
will rely on effective information sharing and coordination among
multiple entities as part of the nation's broader homeland security
efforts. In the related National Strategy for the Physical Protection
of Critical Infrastructure and Key Assets, information sharing is a
common theme. This strategy calls for the federal government to work
with various stakeholders to, among other things, develop processes for
visitor screening, assess vulnerabilities, develop construction
standards, and implement security technology. With regard to national
icon protection, the strategy recommends that Interior work with other
agencies, the public, and the private sector to define criticality
criteria, assess vulnerabilities, conduct security awareness programs,
and collaborate to protect national icons outside the purview of the
federal government. Related to dams, the strategy recommends that DHS
work with other agencies, dam owners, and local and state officials to
assess risks and institute a national dam security program.
At the agency level, the agencies we contacted provided several
examples of their activities related to information sharing and
coordination. These activities are described in table 1.
Table 1: Examples of Information Sharing and Coordination Identified by
Agencies:
Agency: Department of Defense;
Examples of coordinating agencies and organizations: Agencies: DHS and
DOE, other federal entities; Other organizations: state and local
entities;
Examples of coordinating agencies and organizations:
* DOD requires commanders to form threat working groups with external
law enforcement officials;
* DOD's Defense Threat Reduction Agency (DTRA) shares responsibility
for maintaining the U.S. nuclear weapon stockpile;
* DTRA assists civilian agencies in antiterrorist programs such as
first-responder training and addressing weapons of mass destruction
threats.
Agency: Department of Energy;
Examples of coordinating agencies and organizations: Agencies: DOD,
DHS, federal law enforcement agencies; Other organizations: state and
local officials, law enforcement, and private sector;
Examples of coordinating agencies and organizations:
* Assigns personnel to serve as a central point of coordination and
liaison with outside groups;
* Some DOE facilities have entered into formal Memoranda of Agreements
with other law enforcement agencies;
* Directs sites to have formal or informal relationships with other
federal, state, local, and private sector officials to address facility
protection;
* Works with DOD to secure U.S. nuclear weapons stockpile.
Agency: Department of State;
Examples of coordinating agencies and organizations: Agencies: DHS,
Environmental Protection Agency, GSA, Central Intelligence Agency, FBI,
and various federal law enforcement agencies; Other organizations:
National Capital Planning Commission, the D.C. government;
Examples of information sharing activities:
* Shares information through meetings, working groups, and joint
projects;
* GSA installs and maintains security systems for State's domestic
facilities outside of the national capital region.
Agency: Department of Homeland Security;
Examples of coordinating agencies and organizations: Agencies: FBI,
State, GSA tenant agencies, other federal law enforcement agencies;
Other organizations: private sector organizations with an interest in
critical infrastructure protection;
Examples of information sharing activities:
* As central coordinator of federal homeland security efforts, assists
agencies with gathering facility threat information and incorporates it
into risk assessments;
* DHS, through FPS, provides tenant agencies with facility security
assessments, containing threat and countermeasure information, and
associated costs.
Agency: Department of the Interior;
Examples of coordinating agencies and organizations: Agencies: DHS,
DOD, FBI; Other organizations: state and local government
organizations, private sector;
Examples of information sharing activities:
* Office of Law Enforcement and Security (OLES) serves as principal
point of contact with external law enforcement and security
organizations;
* OLES is responsible for coordinating security policies and
information sharing among Interior's bureaus, which collectively hold
approximately 8,000 facilities.
Agency: Department of Veterans Affairs;
Examples of coordinating agencies and organizations: Agencies: FEMA,
DHS; Other organizations: local law enforcement, public and private
technical organizations;
Examples of information sharing activities:
* VA facilities have entered into information sharing agreements and
memoranda of understanding with local law enforcement;
* Some VA officials participate in local law enforcement and public
security councils to develop effective coordination and information
sharing relationships.
Agency: General Services Administration;
Examples of coordinating agencies and organizations: Agencies: DHS,
tenants include most federal agencies; Other organizations: local
officials and law enforcement;
Examples of information sharing activities:
* Participates in local and national public safety conferences to
learn latest security information in the public and private sectors,
and present information to others. These include conferences organized
by, for example, the International Association of Chiefs of Police.
Agency: United States Postal Service;
Examples of coordinating agencies and organizations: Agencies: DHS,
GSA; Other organizations: Legislative Task Force on Mail Safety;
Examples of information sharing activities:
* Informs other agencies of mail and facility security issues.
[End of table]
Source: GAO.
In addition to agencywide efforts, coordination and information sharing
is important at the individual facility level. As we have previously
reported, protecting federal facilities requires facility security
managers to involve multiple organizations to effectively coordinate
and share information to prevent, detect, and respond to terrorist
attacks.[Footnote 31] Security managers typically are not aware of
potential threats to their facilities and depend on intelligence from
other organizations to prevent and/or deter attacks. For example,
according to officials from VA, due to limited resources and its lack
of an intelligence gathering capability, VA must rely on other agencies
to gain threat information. Additionally, security managers have to
coordinate and share information with state and local governments to
respond to terrorist attacks and do not have direct access to the range
of emergency resources required to respond to terrorist attacks. They
rely on state and local governments to provide first-responder services
such as firefighting, medical personnel, and other emergency services.
They also rely on local police and the judicial process to enforce and
prosecute violators of the laws and regulations governing the
protection of federal facilities. As such, at the individual facility
level, security managers are less equipped to make informed decisions
about security without effective information sharing and coordination.
One way managers at the individual facility level may become better
informed is if they take advantage of emerging efforts by the
government to disseminate targeted threat information. For example, one
recent DHS effort to increase information sharing and coordination
among security stakeholders is its Homeland Security Information
Network. According to DHS's Web site, this unclassified network
consists of Internet, phone, fax, and pager communications systems that
provides DHS with constant access to real-time threat information from
public and private industries and agencies. DHS can also use the
network to send targeted alert notifications and other threat
information to states, cities, and others, which can then collect and
disseminate this information among those other entities involved in
combating terrorism. A base of locally knowledgeable experts governs
and administers the network with the support of DHS regional
coordinators.
Overall, IG reports and experts from the NAS symposium we held
underscored the value of information sharing and coordination for
facility protection. Regarding Interior's protection of national icons,
Interior's IG has reported that coordination and communication are two
key characteristics of any well-functioning organization.[Footnote 32]
State's IG has recommended that some embassies coordinate with local
police to establish coordinated response procedures to potential
vehicle bomb attacks.[Footnote 33] State concurred with these
recommendations. In a 2002 report, the GSA IG reported on the value of
having security officials share any gained expertise to address
emerging threats to federal facilities.[Footnote 34] At the NAS
symposium, there was a general consensus among panelists that
coordination and information sharing--whether through formal or
informal means--is critical to effectively protect federal facilities.
Some examples of panelist comments included:
"We should be sharing what we know. There are a limited number of
people in this field—One thing we do need, to help us share this
information, is more engineering forums, more opportunities for other
federal agencies and the private sector to share— this information."--
Defense official:
"Whatever information sharing structure gets superimposed on agencies,
it should not impede existing groups that share security information.
Informal networks rather than rigid hierarchies are the things you
really need to secure properties. In general, frequent interaction
helps build trust, helping people to work together and respond quickly
to threats."--Private sector security consultant:
Performance Measurement Can Ensure Accountability for Achieving Broad
Program Goals and Improved Security:
Performance measurement can help achieve broad program goals and
improve security at the individual facility level. Our analysis showed
a consensus among various stakeholders that performance measurement is
a key practice that agencies should follow. Although using performance
measurement for facility protection is a practice that--based on our
analysis--is in the early stages of development, several initiatives at
three levels--governmentwide policy, agency, and facility-specific--
demonstrate how performance measurement is being approached in the
facility protection area.
At the governmentwide policy level, the National Strategy for Homeland
Security addresses the threat of terrorism in the United States by
organizing the domestic efforts of federal, state, local and private
organizations.[Footnote 35] It aligns and focuses homeland security
functions into six mission critical areas, set forth as (1)
intelligence and warning, (2) border and transportation security, (3)
domestic counterterrorism, (4) protecting critical infrastructures and
key assets, (5) defending against catastrophic terrorism, and (6)
emergency preparedness and response. As mentioned before in relation to
information sharing and coordination, the National Strategy for the
Physical Protection of Critical Infrastructures and Key Assets[Footnote
36] incorporates facility protection efforts and identifies a set of
national goals and objectives. The strategy outlines the guiding
principles that will underpin the government's efforts to secure the
infrastructures and assets vital to national security, governance,
public health and safety, the economy, and public confidence. It also
provides a unifying organizational structure and identifies specific
initiatives to drive the government's near-term national protection
priorities and inform the resource allocation process. According to the
strategy, the strategic objectives that underpin our national critical
infrastructure and key asset protection effort include the following:
* identifying and assuring the protection of those infrastructures and
assets that are deemed most critical in terms of national-level public
health and safety, governance, economic and national security, and
public confidence consequences;
* providing timely warning and assuring the protection of those
infrastructures and assets that face a specific, imminent threat; and:
* assuring the protection of other infrastructures and assets that may
become terrorist targets over time by pursuing specific initiatives and
enabling a collaborative environment in which federal, state, and local
governments and the private sector can better protect the
infrastructures and assets they control.
These strategies are national in scope, cutting across all levels of
government, and involve a large number of organizations and entities
including federal, state, local, and private sectors. We have testified
that these national strategies are the starting point for federal
agencies and that the ultimate measure of this and other strategies'
value will be the extent they are useful as guidance for policy and
decision makers in allocating resources.[Footnote 37] Related to
facility protection, the strategic objectives are useful in providing a
context and a broader framework for agencies, as they develop
agencywide and facility-specific goals and measures to determine if
their specific facility protection efforts are achieving desired
results.
Security Goals Can Be Tied to Broader Agency Mission Goals:
At the agency level, we have reported that tying security goals to
broader agency mission goals can help federal agencies measure the
effectiveness and ensure accountability of their security
programs.[Footnote 38] One tool that agencies can use is the Government
Performance and Results Act of 1993 (GPRA). Under GPRA, agencies are to
prepare 5-year strategic plans that set the general direction for their
efforts. These plans are to include comprehensive mission statements,
general and outcome-related goals, descriptions of how those goals will
be achieved, identification of external factors that could affect
progress, and a description of how performance will be evaluated.
Agencies are to then prepare annual performance plans that establish
connections between the long-term goals in the strategic plans with the
day-to-day activities of program managers and staff. These plans are to
include measurable goals and objectives to be achieved by a program
activity, descriptions of the resources needed to meet these goals, and
a description of the methods used to verify and validate measured
values. Finally, GPRA requires that the agency report annually on the
extent to which it is meeting its goals and the actions needed to
achieve or modify those goals that were not met.
GPRA provides a framework under which agencies can identify
implementation time lines for facility protection initiatives and
adherence to related budgets. We did not assess the extent to which
agencies were using GPRA to develop agencywide facility protection or
security-related goals. However, we noted one agency that ties its
strategic security goals to GPRA is the Defense Threat Reduction Agency
(DTRA) at DOD. DTRA's 2003 strategic plan contains most of the elements
in a strategic plan developed using GPRA standards.[Footnote 39] DTRA
plays a key role in addressing the threats posed by weapons of mass
destruction[Footnote 40] (WMD), and its specialized capabilities and
services are used to support civilian agencies' efforts to address WMD
threats, particularly the efforts of DOE and DHS. DTRA also provides
training for emergency personnel responding to WMD incidents and
assesses the vulnerability of personnel and facilities to WMD threats.
DTRA's strategic plan lays out the agency's five goals, which serve as
the basis of its individual units' annual performance plans: (1) deter
the use and reduce the impact of WMD, (2) reduce the present threat,
(3) prepare for future threats, (4) conduct the right programs in the
best manner, and (5) develop people and enable them to succeed. These
long-term goals are further broken down into four or five objectives,
each with a number of measurable tasks under each objective. These
tasks have projected completion dates and identify the DTRA unit
responsible for the specific task. For example, under the goal "deter
the use and reduce the impact of WMD" is the objective "support the
nuclear force." A measurable task under this objective is to work with
DOE to develop support plans for potential resumption of underground
nuclear weapons effects testing. The technology development unit in
DTRA was expected to complete this task by the fourth quarter of fiscal
year 2004.
At the Individual Facility Level, Active Testing and Drills Can Help
Gauge the Adequacy of Facility Protection:
Our work showed examples where federal agencies were testing security
measures by conducting inspections and assessments to ensure that
adequate levels of protection are employed. For example, officials at
Interior said that after September 11, one of its bureaus began
conducting full-risk assessments at all of its facilities, in order of
importance. As part of one of its regularly scheduled assessments at
one location, Interior received assistance from DTRA, which performed
an assessment of vulnerabilities. According to Interior officials, DTRA
officials looked at whether the resulting effect from various types of
attack would affect the mission capabilities of the location. After the
assessment, DTRA made recommendations to Interior officials for
strengthening security. Consequently, Interior officials took actions
to improve security and scheduled plans for follow-up.
In another example, the Interior IG reported in August 2003 on its
security assessment of National Park Service (NPS) parks. During the
review, Interior IG officials identified some serious deficiencies with
the overall security program and made recommendations to remedy these
problems.[Footnote 41] For example, the IG's assessment revealed that
necessary security enhancements were delayed or wholly disregarded,
that management officials lacked situational awareness, and that other
officials lacked the expertise and resources to effectively assess,
determine, and prioritize necessary security actions. This type of
active testing is useful in exposing vulnerabilities and developing
countermeasures.
According to DOE officials, DOE's Performance Assurance Program
requires that performance testing determine the effectiveness of
facility protection systems and programs. DOE conducts inspections to
ensure that proper levels of protection are consistent with standards
it has established. Assessments are made of the sites' ability to
prevent unacceptable, adverse impact on national security or on the
health and safety of DOE and contract employees, the public, or the
environment. The adequacy of safeguards and security measures are then
validated through various means such as surveys, periodic facility
self-assessments, program reviews and inspections, and assessments.
In addition to testing facility access control through inspections and
site surveys, we found examples of security programs that tested the
effectiveness of physical security measures such as structural
enhancements, physical barriers, and blast-resistant windows. Blast-
resistance in buildings is generally provided by passive features such
as additional reinforcement and connections in the structural frame for
increased malleability, composite fiber wraps to prevent shattering of
columns and slabs, and high-performance glazing materials that resist
blast pressures. In both field tests and experience (for example, the
attack on the Pentagon), these measures have been quite effective in
reducing the devastating effects of deliberate explosions and,
consequently, reducing casualties as well.
In March 2004, a panelist from DOD at the NAS symposium indicated that
blast testing is also important in the prevention of injuries resulting
from progressive collapse of buildings and flying debris. He reported
that 87 percent of the deaths occurred in the collapsed portion of the
Alfred P. Murrah Federal Building in Oklahoma City, and only 5 percent
of the deaths occurred in the uncollapsed portion of the building.
Furthermore, another panelist noted that 70 of the over 2,000 publicly
reported terrorist incidents worldwide, since 1970, were directed at
buildings. Most of these have involved large vehicle bombs, incendiary
bombs, or rocket-propelled grenades.
Training exercises and drills are also useful in assessing
preparedness. We have reported that effective security also entails
having a well-trained staff that follows and enforces policies and
procedures.[Footnote 42] In these reports, we found breaches in
security resulting from human error are more likely to occur if
personnel do not understand the technologies, risks, and the policies
that are put in place to mitigate them. Furthermore, good training and
practice are essential to successfully implementing policies by
ensuring that personnel exercise good judgment in following security
procedures. Presidential Decision Directive (PDD) 39[Footnote 43]
requires key federal agencies to maintain well-exercised capabilities
for combating terrorism. Exercises test and validate policies and
procedures, test the effectiveness of response capabilities, increase
the confidence and skill levels of personnel, and identify strengths
and weaknesses in responses before they arise in actual incidents.
Counterterrorism exercises also include activities where agency
officials discuss scenarios around a table or other similar setting,
and field exercises, where agency leadership and operational units
actually deploy to practice their skills and coordination in a
realistic field setting.[Footnote 44] Overall, training, as it relates
to facility protection, provides decision makers with data on
performance in various scenarios. Training is also discussed later in
this report in relation to strategic human capital management.
Aligning Assets to Mission Can Reduce Security Vulnerabilities:
Excess and underutilized real property at federal agencies is a long-
standing and pervasive problem that has implications for the facility
protection area. Along with the need to secure facilities against the
threat of terrorism, excess property and the need to realign the
federal real property inventory were among the reasons GAO designated
federal real property as a high-risk area in January 2003.[Footnote 45]
To the extent that agencies are expending resources to maintain and
protect facilities that are not needed, funds available to protect
critical assets may be lessened. Our past work showed examples where
funds spent to maintain and protect excess property were significant.
For example, we reported in January 2003 that DOD estimates it is
spending $3 billion to $4 billion each year maintaining facilities that
are not needed. In another example, costs associated with excess DOE
facilities, primarily for security and maintenance, were estimated by
the DOE IG in April 2002 to exceed $70 million annually.[Footnote 46]
One building that illustrates this problem is the former Chicago main
post office. In October 2003, we testified that this building, a
massive 2.5 million square foot structure located near the Sears Tower,
is vacant and costing USPS $2 million annually in holding
costs.[Footnote 47] It is likely that other agencies that continue to
hold excess or underutilized property are also incurring significant
holding costs for services including security and maintenance.
Given the need to realign the federal real property inventory so that
it better reflects agencies' missions, agencies that can overcome this
problem may reap benefits in the facility protection area. That is,
funds no longer spent securing and maintaining excess property could be
put to other uses, such as enhancing protection at critical assets that
are tied to agencies' missions. VA's Capital Asset Realignment for
Enhanced Services (CARES) initiative, which VA started in October 2000,
is an example where a realignment effort is under way. In the mid-
1990s, VA began shifting its role from being a traditional hospital-
based provider of medical services to an integrated delivery system
that emphasizes a full continuum of care with a significant shift from
inpatient to outpatient services. Subsequently, VA began the CARES
initiative so that it could reduce its large inventory of buildings,
many of which are underutilized or vacant.
"Rightsizing" the Overseas Presence:
The administration's effort to "rightsize" the nation's overseas
presence demonstrates how giving consideration to security, people, and
facilities could be approached as part of an asset realignment
framework. During 2000, an interagency effort led by the Department of
State began to assess staffing of U.S. embassies and consulates to
determine whether there were opportunities to improve mission
effectiveness and reduce security vulnerabilities and costs by
relocating staff. This process, referred to as rightsizing, was
initiated in response to the November 1999 recommendations of the
Overseas Presence Advisory Panel (OPAP).[Footnote 48] In the aftermath
of the August 1998 bombings of U.S. embassies in Africa, OPAP
determined that overseas staffing levels had not been adjusted to
reflect the changing missions and requirements; thus, some embassies
and consulates were overstaffed, and some were understaffed. The
framework provides a systematic approach for assessing workforce size
and identifying options for rightsizing, both at the embassy level and
for making related decisions worldwide. It links staffing levels to
three critical elements of overseas diplomatic operations: (1)
physical/technical security of facilities and employees, (2) mission
priorities and requirements, and (3) cost of operations.
The first element includes analyzing the security of embassy buildings,
the use of existing secure space, and the vulnerabilities of staff to
terrorist attack. The second element focuses on assessing embassy
priorities and the staff's workload requirements. The third element
involves developing and consolidating cost information from all
agencies at a particular embassy to permit cost-based decision making.
Unlike an analysis that considers the elements in isolation, the
rightsizing framework encourages consideration of a full range of
options, along with the security, mission, and cost trade-offs. With
this information, decision makers would then be in a position to, for
example, determine whether rightsizing actions are needed either to add
staff, reduce staff, or change the staff mix at an embassy. Options for
reducing staff could include outsourcing functions or relocating
functions to the United States or to regional centers. In May 2002, we
testified that the use of this approach for the U.S. embassy in Paris
was successful in identifying security concerns and finding alternative
locations for staff, such as in the United States or other cities in
Europe.[Footnote 49] In April 2003, we reported that the rightsizing
framework could be applied at U.S. embassies in developing
countries.[Footnote 50] We later testified in April 2003 that OMB
should expand the use of the rightsizing framework and that State adopt
additional measures to ensure that U.S. agencies take a systematic
approach to assessing workforce size that considers security, mission,
and cost factors. GAO also recommended that State develop guidance on a
systematic approach for developing and vetting staffing projections for
new diplomatic compounds.[Footnote 51] State and OMB agreed with our
recommendations. Figure 5 illustrates the rightsizing process, which
integrates security, people, and mission considerations in determining
how facilities are used.
Figure 5: Framework for Embassy Rightsizing:
[See PDF for image]
[End of figure]
Strategic Management of Human Capital Can Enhance Agency Facility
Protection Efforts:
The strategic management of human capital is a key practice that can
maximize the government's performance and ensure the accountability of
its efforts related to homeland security. People define an
organization's culture, drive its performance, and embody its knowledge
base. They are the source of all knowledge, process improvement, and
technological advancements. As the government's homeland security
efforts evolve, federal agencies involved with the intelligence
community and other homeland security organizations will need the most
effective human capital systems to reach projected security
goals.[Footnote 52] For facility protection, as with other areas
related to homeland security, it is especially critical for agencies to
recognize the "people" element and implement strategies to help
individuals maximize their full potential. Also, it is important for
agencies to be well equipped to recruit and retain high-performing
security and law enforcement professionals. Training is also essential
to successfully implementing policies by ensuring that personnel are
well exercised and exhibit good judgment in following security
procedures.
As we have reported, high-performing organizations align human capital
approaches with missions and goals, and human capital strategies are
designed, implemented, and assessed based on their ability to achieve
results and contribute to an organization's mission.[Footnote 53] This
includes aligning their strategic planning and key institutional
performance with unit and individual performance management, as well as
implementing reward systems. We reported in March 2003 that federal
agencies can develop effective performance management systems by
implementing a selected, generally consistent, set of key
practices.[Footnote 54] These key practices helped public sector
organizations both in the United States and abroad create a clear
linkage or "line of sight" between individual performance and
organizational success and, thus, transform their cultures to be more
results-oriented, customer-focused, and collaborative in nature. These
key practices, which have applicability to agencies' management of
facility protection employers and contractors, include the following:
* Align individual performance expectations with organizational goals.
An explicit alignment helps individuals see the connection between
their daily activities and organizational goals.
* Connect performance expectations to crosscutting goals. Placing an
emphasis on collaboration, interaction, and teamwork across
organizational boundaries helps strengthen accountability for results.
* Provide and routinely use performance information to track
organizational priorities. Individuals use performance information to
manage during the year, identify performance gaps, and pinpoint
improvement opportunities.
* Require follow-up actions to address organizational priorities. By
requiring and tracking follow-up actions on performance gaps,
organizations underscore the importance of holding individuals
accountable for making progress on their priorities.
* Use competencies to provide a fuller assessment of performance.
Competencies define the skills and supporting behaviors that
individuals need to effectively contribute to organizational results.
* Link pay to individual and organizational performance. Pay,
incentive, and reward systems that link employee knowledge, skills, and
contributions to organizational results are based on valid, reliable,
and transparent performance management systems with adequate
safeguards.
* Make meaningful distinctions in performance. Effective performance
management systems strive to provide candid and constructive feedback
and the necessary objective information and documentation to reward top
performers and deal with poor performers.
* Involve employees and stakeholders to gain ownership of performance
management systems. Early and direct involvement helps increase
employees' and stakeholders' understanding and ownership of the system
and belief in its fairness.
* Maintain continuity during transitions. Because cultural
transformations take time, performance management systems reinforce
accountability for change management and other organizational goals.
Our analysis showed that several GAO and IG reports discuss the
importance of strategic management of human capital in relation to
homeland security functions, including facility protection. For
example, in June 2004 we recommended that DHS develop a transformation
strategy for FPS to resolve challenges related to, among other things,
the change in organizational culture and responsibilities FPS faces
since it was transferred from GSA to DHS.[Footnote 55] DHS concurred
with our recommendations. Furthermore, we testified on the importance
of making changes to human capital management related to improving
intelligence gathering at the CIA for security purposes.[Footnote 56]
Also, the DOE IG recommended that DOE standardize annual, refresher
training requirements for security forces and conduct reviews of
safeguards and security training programs departmentwide to ensure
compliance with the agency training plan.[Footnote 57] The Director,
Office of Safeguards and Security at DOE, agreed with the
recommendation.
Successfully training employees on using emerging security technologies
is also an important element in facility protection (see fig. 6).
Installing the latest security technology alone cannot guarantee
effective facility protection if security personnel have not been
adequately trained to use the technologies properly. Training is
particularly essential if the technology requires personnel to master
certain knowledge and skills to operate it, such as detecting concealed
objects in generated X-ray images. Without adequate training in
understanding how technology works, the security system will likely be
less effective. This is especially important in assessing risks and
vulnerabilities in facility protection. According to DHS officials, FPS
inspectors are trained to conduct risk assessments and to evaluate the
effectiveness of previously installed facility countermeasures.
Trained FPS inspectors articulate their findings to a building security
committee for approval and funding, after which FPS implements the
necessary countermeasures. At the NAS symposium, a security consultant
from the private sector said that the effectiveness of a risk
management approach depends on the involvement of experienced and
professional security personnel and that there is an increased chance
that personnel could omit major steps in the risk management process if
they are not well trained in applying risk management.
Figure 6: FPS Officers Engaged in Biological and Chemical Weapons
Response Training:
[See PDF for image]
[End of figure]
As the emphasis on protecting people, property, and information has
increased, it has made the demand for professional security
practitioners become even more important. It is widely recognized that
there is a need for competent professionals who can effectively manage
complex security programs that are designed to reduce threats to people
and the assets of corporations, governments, and public and private
institutions. To meet these needs, we noted an effort by one
organization to provide standard certifications for security
professionals. ASIS[Footnote 58] International is an international
organization for professionals responsible for security, including
managers and directors of security. According to the ASIS International
Web site, the organization is dedicated to increasing the effectiveness
and productivity of security practices by developing educational
programs and materials that address broad security concerns. ASIS
International has put together a training curriculum where security
professionals, upon completing requirements, can receive
certifications to become Certified Protection Professionals,
Professional Certified Investigators, or Physical Security
Professionals (PSP). The PSP designation is the certification for those
whose primary responsibility is to conduct threat surveys; design
integrated security systems that include equipment, procedures and
people; or install, operate and maintain those systems. We did not
assess the training and certifications offered by ASIS International.
Nonetheless, seeking certifications for security staff may allow
agencies to better ensure that they are adequately trained and allows
for comparisons with other organizations and the security industry.
Agencies Face Obstacles in Implementing Key Practices in Facility
Protection:
During our review, we noted that agencies face obstacles in
implementing the six key practices that we have identified. For
example, determining which assets to protect by establishing and
sustaining a comprehensive risk management approach is a significant
undertaking for federal agencies. The quality of information needed for
the risk management process is often difficult to obtain and analyze.
Another obstacle is keeping risk assessments up-to-date as threat
levels change, and resources for this activity are stretched. As we
pointed out earlier in relation to ISC's challenges, in our January
2003 high-risk report on federal real property, we highlighted that
some major real property-holding agencies face obstacles in developing
quality management data on their real property assets. Also, in April
2002, we reported that GSA's worldwide inventory of property contained
data that were unreliable and of limited usefulness. This inventory is
the only central source of descriptive data on the makeup of the
federal real property inventory.[Footnote 59]
In addition to data reliability problems, we have reported that some
agencies face obstacles in implementing and leveraging security
investments. As we testified in 2002, the capabilities of technology
can be overestimated.[Footnote 60]We found that by overestimating
technology's capabilities, security officials risk falling into a false
sense of security and relaxing their vigilance. Furthermore, technology
cannot compensate for human failure. Instead, technology and people
need to work together as part of an overall security process where
security personnel are properly trained to use the technology.
The federal government also faces systemic obstacles regarding
information sharing and coordination. We testified in August 2004 that
there is a need for a comprehensive plan to facilitate information
sharing and coordination in the protection of critical
infrastructure.[Footnote 61] However, DHS has not yet developed a plan
that describes how it will carry out its overall information sharing
responsibilities and relationships. In commenting on this report, DHS
indicated in its technical comments that such an information plan is
being developed. Another obstacle is developing productive information
sharing relationships among federal, state, and local governments and
the private sector. Improving the federal government's capabilities to
analyze incident, threat, and vulnerability information from numerous
sources could assist in more effectively disseminating information to
federal, state, local, and private entities. Not sharing information on
threats and on actual incidents experienced by others can hinder the
ability of agencies' to identify new trends, better understand risks,
and determine what preventive measures to implement. As we reported in
August 2003, information sharing initiatives implemented by states and
cities were neither effectively coordinated with those of federal
agencies, nor were they coordinated within and between federal
entities.[Footnote 62]
At the agencywide level, we have reported that agencies face obstacles
in developing meaningful, outcome-oriented performance goals and
collecting performance data that can be used to assess the true impact
of facility security. Performance measurement under GPRA typically
focuses on regularly collected data on the level and type of program
activities, the direct products and services delivered by the program,
and the results of those activities. For programs that have readily
observable results or outcomes, performance measurement may provide
sufficient information to demonstrate program results. In some
programs, such as facility security, however, outcomes are not quickly
achieved or readily observed, or their relationship to the program is
often not clearly defined. In such cases, more in-depth program
evaluations may be needed, in addition to performance measurement, to
examine the extent to which a program is achieving its objectives. This
approach is more challenging and represents a more advanced level of
performance measurement.
Significant long-standing obstacles also hinder agencies' ability to
realign their asset portfolios. As we have reported, the complex legal
and budgetary environment in which real property managers operate has a
significant impact on real property decisionmaking and often does not
lead to businesslike outcomes.[Footnote 63] Resource limitations--
including those related to facility protection--in general, often
prevent agencies from addressing real property needs from a strategic
portfolio perspective. When available funds for capital investment are
limited, Congress must weigh the need for new, modern facilities with
the need for renovation, maintenance, and disposal of existing
facilities, the latter of which often gets deferred. Facility
protection often falls within this latter category. Until these
competing factors are mitigated, agencies face budgetary and legal
disincentives when trying to realign their assets. State's experience
to date with rightsizing its overseas presence demonstrated some of the
challenges in realigning real property assets. We reported in November
2003 that State's efforts to replace facilities at risk of terrorist or
other attacks have experienced project delays due to changes in project
design and security requirements, difficulties hiring appropriate
American and local labor with the necessary clearances and skills,
differing site conditions, and unforeseen events such as civil
unrest.[Footnote 64]
Finally, we have reported that agencies continue to face obstacles in
implementing and maintaining a strategic approach to human
capital.[Footnote 65] Specifically, agencies continue to face
challenges in promoting (1) leadership; (2) strategic human capital
planning; (3) acquiring, developing, and retaining talent; and (4)
results-oriented organizational cultures in an effort to strategically
manage human capital. Although some progress has been made since we
designated human capital management as high-risk in 2001, today's
federal human capital strategies are not appropriately constituted to
meet current and emerging challenges, especially in light of the new
security challenges facing the government. Human capital challenges are
relevant to the facility protection area because security is a people-
intensive activity involving active management and response, and there
is a high dependency on law enforcement and security officers, as well
as contract guards.
Given these obstacles, and the need to overcome them, agencies would
benefit from having a set of key practices to guide their facility
protection efforts. GAO has advocated the use of guiding principles in
other areas, including human capital management, information
technology, and capital investment.[Footnote 66] ISC, in serving as the
central coordinator for agencies' efforts, is uniquely positioned to
promote key practices in facility protection and could use our work as
a starting point. In fact, ISC views one of its primary roles as being
the nucleus of communication on key practices and lessons learned for
the facility protection community in the federal government and has
embraced this responsibility.
Conclusions:
After having limited success prior to the September 11 terrorist
attacks, ISC has made progress in recent years related to its
responsibilities to develop policies and standards, as well as those
related to information sharing. Although this progress is encouraging,
more work remains to fulfill ISC's major responsibilities related to
ensuring agency compliance and overseeing the implementation of various
policies and standards. Fulfilling its new role in reviewing and
approving agencies' physical security plans for the administration
represents a major step toward meeting its compliance and oversight
responsibilities. Furthermore, because DHS now has responsibility for
ISC, the department also has a responsibility, in keeping with the
executive order under which ISC was established, to ensure that ISC has
adequate resources to accomplish its mission. Given the challenges ISC
faces, its new responsibility related to HSPD-7 for reviewing agencies'
physical security plans, and the need to sustain progress it has made
in fulfilling its responsibilities, ISC would benefit from having a
clearly defined action plan for achieving results. Such a plan, which
ISC lacks, could be used to (1) provide DHS and other stakeholders with
detailed information on, and a rationale for, its resource needs; (2)
garner and maintain the support of ISC member agencies, DHS management,
OMB, and Congress; (3) identify implementation goals and measures for
gauging progress in fulfilling all of its responsibilities; and (4)
propose strategies for addressing the challenges ISC faces. Such a plan
could incorporate the strategy for ensuring compliance with facility
protection standards that is required under ISC's executive order but
has not yet been developed. Without an overall action plan for meeting
this and other responsibilities, ISC's strategy and time line for these
efforts remain unclear.
Since September 11, the focus on protecting the nation's critical
infrastructure has been heightened considerably. At the individual
building level, agencies have improved perimeter security by, for
example, installing concrete bollards and are routinely screening
vehicles and people entering federal property. In looking at facility
protection issues more broadly, several key practices have emerged that
include allocating resources using risk management, leveraging security
technology, sharing information and coordinating protection efforts
with other stakeholders, and measuring program performance and testing
security initiatives. In addition, other key practices that have clear
implications for the facility protection area include realigning real
property assets and strategically managing human capital. Because
agencies face various obstacles and would benefit from evaluating their
actions, it would be useful for them to have a framework of key
practices in the facility protection area that could guide their
efforts, and ISC is well positioned to lead this initiative as the
government's central forum for exchanging information and guidance on
facility protection.
Recommendations for Executive Action:
We are making two recommendations--one to the Secretary of Homeland
Security and one to the Chair of ISC. Specifically, we recommend that
the Secretary of Homeland Security direct the Chair of ISC to develop
an action plan that identifies resource needs, implementation goals,
and time frames for meeting ISC's ongoing and yet-unfulfilled
responsibilities. The action plan should also be used to propose
strategies for addressing the range of challenges ISC faces. Such an
action plan would provide a road map for DHS to use in developing
resource priorities and for ISC to use in communicating its planned
actions to agencies and other stakeholders, including Congress.
Furthermore, we recommend that the Chair of ISC, with input from ISC
member agencies, consider using our work as a starting point for
establishing a framework of key practices that could guide agencies'
efforts in the facility protection area. This initiative could
subsequently be used by agencies to evaluate their actions, identify
lessons learned, and develop strategies for overcoming obstacles.
Agency Comments and Our Evaluation:
We provided a draft of this report to DHS, State, GSA, DOE, Interior,
DOD, VA, and USPS for their official review and comment. DHS concurred
with the report's overall conclusions and said it would implement the
recommendations. In its comments, DHS provided information on ongoing
initiatives related to information sharing and coordination. DHS's
comments can be found in appendix V. DHS also provided separate
technical comments, which we incorporated where appropriate. State
provided additional information on its activities as they relate to the
key practices, which we incorporated into the final report where
appropriate. State's comments can be found in appendix VI. GSA, DOE,
and Interior concurred with the report's findings and recommendations.
Comments from GSA, Interior, and DOE can be found in appendixes VII,
VIII, and IX, respectively. DOD, VA, and USPS notified us that they had
no comments on this report.
As agreed with your office, unless you publicly announce the contents
of this report earlier, we plan no further distribution until 30 days
from the report date. At that time, we will send copies of this report
to other interested Congressional Committees and the Secretaries of
Defense, Energy, the Interior, Homeland Security, State, Veterans
Affairs; the Administrator of GSA; and the Postmaster General of the
U.S. Postal Service. We will also make copies available to others upon
request. In addition, the report will be available at no charge on the
GAO Web site at [Hyperlink, http://www.gao.gov].
If you have any questions regarding this report, please contact me on
(202) 512-2834 or at [Hyperlink, goldsteinm@gao.gov] or David
Sausville, Assistant Director, on (202) 512-5403 or at
[Hyperlink, sausvilled@gao.gov]. Other contributors to this report were
Matt Cail, Roshni Dave, Joyce Evans, Brandon Haller, Anne Izod, Susan
Michal-Smith, and Cynthia Taylor.
Sincerely yours,
Signed by:
Mark L. Goldstein:
Director, Physical Infrastructure Issues:
[End of section]
Appendixes:
Appendix I: Objectives, Scope, and Methodology:
Our objectives were to (1) assess the Interagency Security Committee's
(ISC) progress in fulfilling its responsibilities and (2) identify key
practices in protecting federal facilities and any related
implementation obstacles. To assess ISC's progress in fulfilling its
responsibilities, we interviewed the Executive Director of ISC;
analyzed ISC publications and other documents; considered prior GAO
work; and reviewed various laws and policies, including the Homeland
Security Act of 2002. We also reviewed the executive order that
established ISC, a subsequent executive order that amended it in
connection with the transfer of ISC's function to DHS, and relevant
homeland security policy directives. We also reviewed minutes from ISC
meetings. We also considered prior GAO work on ISC. As part of our
interviews with ISC's Executive Director, we focused on the challenges
ISC faces in meeting its major responsibilities.
To identify key practices for facility protection and any related
implementation obstacles, we conducted a comprehensive literature
review of GAO and Inspector General (IG) reports, interviewed officials
from the major property-holding agencies, and validated our results
using an expert symposium on facility protection. For the analysis of
GAO and IG reports, we systematically analyzed reports issued between
January 1, 1995, and March 1, 2004. We chose 1995 as a starting point
to coincide with the year of the terrorist attack on the Alfred P.
Murrah Federal Building in Oklahoma City, Oklahoma, and the publishing
of the Justice Department's minimum-security standards.
We identified reports by searching GAO and IG online databases and
consulting with GAO and IG contacts using several search terms such as
facility security, terrorism, and homeland security. From this initial
selection, we identified over 450 reports related to homeland security,
which we subsequently reduced to 170 reports that were related to
facility protection. Thirty-six of the reports were from IG offices at
the seven agencies that control over 85 percent of federal facilities
in terms of building square footage. These agencies included the
Departments of Defense (DOD), Energy (DOE), the Interior (Interior),
Veterans Affairs (VA) and State (State); the U.S. Postal Service
(USPS); and the General Services Administration (GSA). We
systematically reviewed these reports using a data collection
instrument we designed to identify and group key practices according to
theme or type of activity. In doing our work, we also gave
consideration to other GAO reports on governmentwide management issues
that, in our judgment, had implications for the facility protection
area. We also considered new GAO reports that were issued after the
selection time period that were relevant. For the purposes of this
review, we did not assess the extent to which agencies were using GPRA
to develop agencywide facility protection or security-related goals.
Also, for the purpose of this review, we did not assess the training
and certifications offered by ASIS International.
We also interviewed officials at the major property-holding agencies,
including DOD, DOE, Interior, VA, State, USPS, and GSA to obtain
updated information on their facility protection activities and their
use of key practices. We then contracted with the National Academy of
Sciences (NAS) to convene a symposium with 21 security experts from the
private sector, government, academia, and foreign countries to validate
the practices and gain further insights. Using their judgment, NAS
officials selected security experts based on their broad expertise and
backgrounds in building security programs. Appendix II contains the
symposium agenda and identifies the experts. As a result, for the
purpose of this review, we defined key practices as those activities
that, on the basis of our analysis, were recommended by GAO and others,
acknowledged by agencies, and validated by experts in the area.
It is important to note that the key practices identified in this
report may not be an exclusive list and may not necessarily represent
all key practices for the protection of federal facilities. In
addition, new reports and other information may have become available
since we completed the analysis. Also, ISC has identified GAO as an
associate member, which includes the ability to serve on ISC
subcommittees. While associate members of ISC have this ability, no GAO
staff member serves on any subcommittee. Furthermore, no GAO staff
member actively participates in ISC meetings or contributes to
decisions. Rather, GAO's role on ISC is only to observe proceedings and
obtain ISC information distributed to the other ISC members. Because of
GAO's observational role, our independence in making recommendations
involving ISC and in completing this engagement was maintained.
ISC, agency officials, and other experts provided much of the data and
other information used in this report. We noted cases where these
officials provided testimonial evidence, and we were not always able to
obtain documentation that would substantiate the testimonial evidence
they provided. In cases where officials provided their views and
opinions on various issues within the context of speaking for the
organization, we corroborated the information with other officials.
Overall, we found no discrepancies with these data and, therefore,
determined that they were sufficiently reliable for the purpose of this
report. We requested official comments on this report from DHS, State,
GSA, Interior, DOE, DOD, VA, and USPS. Appendixes V through IX contain
comments we received from DHS, State, GSA, Interior, and DOE,
respectively. We received State's comments on November 12, 2004. DOD,
VA, and USPS had no comments.
[End of section]
Appendix II: National Academy of Sciences Symposium Agenda:
Symposium on Security Efforts for Federal Real Property:
March 4-5, 2004:
National Academy of Sciences:
Washington, D.C.:
2101 C Street, NW, in Washington, D.C.:
Thursday, March 4, 2004:
Welcome and Introductory Remarks:
Richard Little, Director, Board on Infrastructure and the Constructed
Environment, National Research Council (NRC):
David Walker, Comptroller General, U.S. General Accounting Office:
Keynote Address: The Modern Philosophy of Security:
Roger Hagengruber, Director, Institute for Public Policy, University of
New Mexico:
Session 1:
Wade Belcher, U.S. General Services Administration:
Rick Jones, Naval Facilities Engineering Service Center:
Curt Betts, Protective Design Center, U.S. Army Corps of Engineers:
Wayne Ashbury, Bureau of Diplomatic Security:
Session 2:
Robert Smilowitz, Weidlinger and Associates:
Kevin Claber, United Kingdom Government:
Joe Smith, Applied Research Associates, Inc.:
David Hadden, Ove Arup (United Kingdom):
Session 3:
Doug Sunshine, Defense Threat Reduction Agency:
John Crawford, Karagozian and Case:
Randy Nason, C.H. Gurnsey:
Eve Hinman, Hinman Consulting Engineers:
Friday, March 5, 2004:
Session 4:
Elise Weaver, Worcester Polytechnic Institute:
Robert Chapman, Building and Fire Research Laboratory, National
Institute of Standards and Technology:
Stuart Knoop, Oudens and Knoop:
William Dowd, National Capital Planning Commission:
Session 5:
Johanna Hardy, Senate Government Affairs Committee:
Susan Brita, House Transportation and Infrastructure Committee:
Charles Herrick, Stratus Consulting:
Paul Kleindorfer, The Wharton School:
Michael O'Hanlon, The Brookings Institution:
[End of section]
Appendix III: ISC Actions Related to Its Major Responsibilities under
Executive Order 12977, as of September 2004:
Responsibilities Related to Developing Policies and Standards:
Establish policies for security in and protection of federal
facilities;
Develop and evaluate security standards for federal facilities;
Assess technology and information systems as a means of providing cost-
effective improvements to security in federal facilities;
Develop long-term construction standards for those locations with
threat levels or missions that require blast-resistant structures or
other specialized security requirements;
Evaluate standards for the location of, and special security related
to, day care centers in federal facilities.
* May 2001: Issued Security Design Criteria for New Federal Office
Buildings and Major Modernization Projects (Security Design Criteria);
* July 2001: Issued Minimum Standards for Federal Building Access
Procedures;
* June 2003: Issued ISC Information Document on Escape Hoods;
* October 2003: Issued update of ISC Security Design Criteria;
* Currently developing physical security requirements for HSPD-12 and
the federal credentialing program;
* In 1997, ISC disseminated guidance on entry security technology for
member agencies' buildings with high security designations;
* Provided input in smart card development process for federal
government;
* Integrated expert opinions from engineering and architectural
disciplines and included technology expert advice on blasting and
biochemical threats in the most recent update of ISC Security Design
Criteria for 2004;
* July 2003: Issued Security Standards for Leased Space;
* In its review of the latest ISC security design criteria update, the
ISC long-term construction team will look into security needs at child
care centers (no actions implemented to date).
Responsibilities Related to Ensuring Compliance and Overseeing
Implementation of Policies and Standards:
Develop a strategy for ensuring compliance with standards;
Oversee the implementation of appropriate security measures in federal
facilities.
* According to ISC's Executive Director, ISC does not have the
necessary resources to develop a compliance process--ISC has requested
additional funding and resources for the fiscal year 2006 budget (no
actions implemented to date);
* As reviewer of agency physical security plans under HSPD-7, ISC has
not been able to develop a scoring process to review the plans.
Furthermore, ISC will not meet the November 2004 deadline for
completing agency reviews and is working with OMB and DHS on this
issue.
Responsibilities Related to Encouraging Information Sharing:
Encourage agencies with security responsibilities to share security-
related intelligence in a timely and cooperative manner;
Assist in developing and maintaining a centralized security database of
all federal facilities.
* April 2003: Appointed a full-time Executive Director;
* Since September 11, 2001, ISC has expanded its membership and
outreach efforts by adding associate member agencies that can provide
input but are not listed in Executive Order 12977;
* September 2004: ISC issued Standard Operating Procedures;
* ISC members meet regularly to facilitate an exchange of issues,
concerns, and ideas between federal and private organizations;
* Currently developing a secure Web portal system for member agencies
to exchange information among authorized personnel;
* Currently posts all finalized ISC standards, policies, guidance, and
documents on GSA Office of Chief Architect's Web site for ISC members;
* ISC does not have funding to support an initiative to develop a
centralized security database and expects DHS to take the lead on this
effort (no actions implemented to date).
Sources: GAO and DHS.
[End of table]
[End of section]
Appendix IV: Risk Management Framework for Homeland Security and
Terrorism:
In recent years, GAO has consistently advocated the use of a risk
management approach as an iterative analytical tool to help implement
and assess responses to various national security and terrorism
issues.[Footnote 67] Although applying risk management principles to
facility protection can take on various forms, our past work showed
that most risk management approaches generally involve identifying
potential threats, assessing vulnerabilities, identifying the assets
that are most critical to protect in terms of mission and significance,
and evaluating mitigation alternatives for their likely effect on risk
and their cost. We have concluded that without a risk management
approach, there is little assurance that programs to combat terrorism
are prioritized and properly focused. Risk management principles
acknowledge that while risk cannot be eliminated, enhancing protection
from known or potential threats can help reduce it. Drawing on this
precedent, we compiled a risk management framework--outlined below--to
help assess the U.S. government's response to homeland security and
terrorism risk. This framework, which we have used to assess the
Department of Homeland Security's programs to target oceangoing cargo
containers for inspection, also has applicability to protecting federal
facilities. For purposes of the risk management framework, we used the
following definitions:
* Risk--an event that has a potentially negative impact, and the
possibility that such an event will occur and adversely affect an
entity's assets and activities and operations, as well as the
achievement of its mission and strategic objectives. As applied to the
homeland security context, risk is most prominently manifested as
"catastrophic" or "extreme" events related to terrorism, i.e., those
involving more that $1 billion in damage or loss and/or more than 500
casualties.
* Risk management--a continuous process of managing, through a series
of mitigating actions that permeate an entity's activities, the
likelihood of an adverse event happening and having a negative impact.
In general, risk is managed as a portfolio, addressing entity-wide risk
within the entire scope of activities. Risk management addresses
"inherent," or pre-action, risk (i.e., risk that would exist absent any
mitigating action) as well as "residual," or post-action, risk (i.e.,
the risk that remains even after mitigating actions have been taken).
The risk management framework--which is based on the proposition that a
threat to a vulnerable asset results in risk--consists of the following
components:
* Internal (or implementing) environment--the internal environment is
the institutional "driver" of risk management, serving as the
foundation of all elements of the risk management process. The internal
environment includes an entity's organizational and management
structure and processes that provide the framework to plan, execute,
and control and monitor an entity's activities, including risk
management. Within the organizational and management structure, an
operational unit that is independent of all other operational
(business) units is responsible for implementing the entity's risk
management function. This unit is supported by and directly accountable
to an entity's senior management. For its part, senior management (1)
defines the entity's risk tolerance (i.e., how much risk is an entity
willing to assume in order to accomplish its mission and related
objectives) and (2) establishes the entity's risk management philosophy
and culture (i.e., how an entity's values and attitudes view risk and
how its activities and practices are managed to deal with risk). The
operational unit (1) designs and implements the entity's risk
management process and (2) coordinates internal and external evaluation
of the process and helps implement any corrective action.
* Threat (event) assessment--threat is defined as a potential intent to
cause harm or damage to an asset (e.g., natural environment, people,
manmade infrastructures, and activities and operations). Threat
assessments consist of the identification of adverse events that can
affect an entity. Threats might be present at the global, national, or
local level, and their sources include terrorists and criminal
enterprises. Threat information emanates from "open" sources and
intelligence (both strategic and tactical). Intelligence information is
characterized as "reported" (or raw) and "finished" (fully fused and
analyzed).
* Criticality assessment--criticality is defined as an asset's relative
importance. Criticality assessments identify and evaluate an entity's
assets based on a variety of factors, including the importance of its
mission or function, the extent to which people are at risk, or the
significance of a structure or system in terms of, for example,
national security, economic activity, or public safety. Criticality
assessments are important because they provide, in combination with the
framework's other assessments, the basis for prioritizing which assets
require greater or special protection relative to finite resources.
* Vulnerability assessment--vulnerability is defined as the inherent
state (either physical, technical, or operational) of an asset that can
be exploited by an adversary to cause harm or damage. Vulnerability
assessments identify these inherent states and the extent of their
susceptibility to exploitation, relative to the existence of any
countermeasures.
* Risk assessment--risk assessment is a qualitative and/or quantitative
determination of the likelihood (probability) of occurrence of an
adverse event and the severity, or impact, of its consequences. Risk
assessments include scenarios under which two or more risks interact
creating greater or lesser impacts.
* Risk characterization--risk characterization involves designating
risk as, for example, low, medium, or high (other scales, such as
numeric, are also be used). Risk characterization is a function of the
probability of an adverse event occurring and the severity of its
consequences. Risk characterization is the crucial link between
assessments of risk and the implementation of mitigation actions, given
that not all risks can be addressed because resources are inherently
scarce; accordingly, risk characterization forms the basis for deciding
which actions are best suited to mitigate the assessed risk.
* Mitigation evaluation--Mitigation evaluation is the identification of
mitigation alternatives to assess the effectiveness of the
alternatives. The alternatives should be evaluated for their likely
effect on risk and their cost.
* Mitigation selection--Mitigation selection involves a management
decision on which mitigation alternatives should be implemented among
alternatives, taking into account risk, costs, and the effectiveness of
mitigation alternatives. Selection among mitigation alternatives
should be based upon preconsidered criteria. There are as of yet no
clearly preferred selection criteria, although potential factors might
include risk reduction, net benefits, equality of treatment, or other
stated values. Mitigation selection does not necessarily involve
prioritizing all resources to the highest-risk area, but in attempting
to balance overall risk and available resources.
* Risk mitigation--Risk mitigation is the implementation of mitigation
actions, in priority order and commensurate with assessed risk;
depending on its risk tolerance, an entity may choose not to take any
action to mitigate risk (this is characterized as risk acceptance). If
the entity does choose to take action, such action falls into three
categories: (1) risk avoidance (exiting activities that expose the
entity to risk), (2) risk reduction (implementing actions that reduce
likelihood or impact of risk), and (3) risk sharing (implementing
actions that reduce likelihood or impact by transferring or sharing
risk). In each category, the entity implements actions as part of an
integrated "systems" approach, with built-in redundancy to help address
residual risk (the risk that remains after actions have been
implemented). The systems approach consists of taking actions in
personnel (e.g., training, deployment), processes (e.g., operational
procedures), technology (e.g., software or hardware), infrastructure
(e.g., institutional or operational--such as port configurations), and
governance (e.g., management and internal control and assurance). In
selecting actions, the entity assesses their costs and benefits, where
the amount of risk reduction is weighed against the cost involved and
identifies potential financing options for the actions chosen.
* Monitoring and evaluation of risk mitigation--Monitoring and
evaluation of risk mitigation entails the assessment of the functioning
of actions against strategic objectives and performance measures to
make necessary changes. Monitoring and evaluation includes, where and
when appropriate, peer review and testing and validation; and an
evaluation of the impact of the actions on future options; and
identification of unintended consequences that, in turn, would need to
be mitigated. Monitoring and evaluation helps ensure that the entire
risk management process remains current and relevant, and reflects
changes in (1) the effectiveness of the actions and (2) the risk
environment in which the entity operates--risk is dynamic and threats
are adaptive. The risk management process should be repeated
periodically, restarting the "loop" of assessment, mitigation, and
monitoring and evaluation.
[End of section]
Appendix V: Comments from the Department of Homeland Security:
U.S. Department of Homeland Security:
Washington, DC 20528:
November 15, 2004:
Mr. Mark L. Goldstein:
Director, Physical Infrastructure Issues:
U.S. Government Accountability Office:
Washington, DC 20548:
Dear Mr. Goldstein:
RE: Draft Report GAO-05-49, Homeland Security: Further Actions Needed
To Coordinate Federal Agencies' Facility Protection Efforts and Promote
Key Practices (GAO Job Code 543094):
Thank you for the opportunity to review and comment on the subject
draft report. We appreciate the recognition of the significant progress
the Interagency Security Committee (ISC) has achieved since moving to
the Department of Homeland Security (DHS) in March 2003. The ISC, which
is now chaired by DHS, is tasked with coordinating federal agencies'
facility protection efforts, developing protection standards, and
overseeing implementation. We view the recommendations as an
opportunity to increase the effectiveness of ISC efforts in promoting a
safe and secure environment for federal facilities, programs, employees
and visitors.
We agree with the draft report's two recommendations and intend to
implement them. GAO recommends the development of an action plan that
identifies resource needs, implementation goals, and timeframes for
meeting the ISC responsibilities. These responsibilities are stated in
Executive Order 12977 as amended ("Interagency Security Committee") and
Executive Order 13286 ("Amendment of Executive Orders, and Other
Actions, in Connection With the Transfer of Certain Functions to the
Secretary of Homeland Security"). GAO also recommends that the Chair of
the ISC, with input from ISC member agencies, consider using GAO's work
as a starting point for establishing a framework of key practices that
could guide agencies' efforts in the facility protection area.
Implementing this second recommendation should be beneficial in light
of the new ISC responsibility under the Homeland Security Presidential
Directive Number 7, Critical Infrastructure Identification,
Prioritization and Protection to evaluate the effectiveness of all
department and agency physical security plans.
We believe it is important that GAO recognize the existence of an
ongoing program within the Department. In order to better assume the
information sharing and coordination roles legislated to the Department
of Homeland Security, Secretary Ridge charged the Under Secretary for
Information Analysis and Infrastructure Protection (IAIP) to "develop a
DHS-wide business plan for a comprehensive information sharing and
collaboration system." Shortly thereafter, IAIP established an
Information Sharing & Collaboration Program (ISCP) to discharge this
responsibility. The ISCP is charged with the coordination and
facilitation of information sharing efforts throughout the Department,
and with its customers and partners in the federal, international,
state, local, tribal and private sectors.
Numerous on-going information sharing initiatives within the homeland
security, intelligence, law enforcement, and public safety communities
must be leveraged by the ISCP to attain the program objectives. The
role of the ISCP is to investigate, advise, recommend, and facilitate;
other DHS components will be directly responsible for policy
generation, technology and process development, and systems acquisition
and implementation. These initiatives are crucial to producing
comprehensive and practical approaches and solutions to address
terrorist threats directed at federal facilities.
We have also provided you with technical comments under separate cover
which we trust you will incorporate in the final report.
We thank you again for the opportunity to provide comments on this
draft report and look forward to working with you on future homeland
security issues.
Sincerely,
Signed by:
Anna F. Dixon:
Director, Departmental GAO/OIG Liaison:
Office of the Chief Financial Officer:
[End of section]
Appendix VI: Comments from the Department of State:
United States Department of State:
Assistant Secretary and Chief Financial Officer:
Washington, D.C. 20520:
Ms. Jacquelyn Williams-Bridgers:
Managing Director:
International Affairs and Trade:
Government Accountability Office:
441 G Street, N.W.
Washington, D.C. 20548-0001:
Dear Ms. Williams-Bridgers:
We appreciate the opportunity to review your draft report, "HOMELAND
SECURITY: Further Actions Needed to Coordinate Federal Agencies'
Facility Protection Efforts and Promote Key Practices," GAO Job Code
543094.
The enclosed Department of State comments are provided for
incorporation with this letter as an appendix to the final report.
If you have any questions concerning this response, please contact Cy
Alba, Branch Chief, Bureau of Overseas Building Operations, at (703)
875-5748.
Sincerely,
Christopher B. Burnham:
cc: GAO - Dave Sausville:
OBO - Charles Williams:
DS - Francis Taylor:
State/OIG - Mark Duda:
Department of State Comments on GAO Draft Report "Homeland Security:
Further Actions Needed to Coordinate Federal Agencies' Facility
Protection Efforts and Promote Key Practices" (GAO-05-49, GAO Code
543094):
The Department of State (DOS) thanks the Government Accountability
Office (GAO) for the opportunity to respond to their review of Federal
Agencies Facility Protection Efforts. The draft report recommends that
the Interagency Security Committee (ISC) establish a set of key
practices to guide agencies' efforts in the facility protection area.
Three key practices and the review summary are listed, followed by
State's comments.
Key Practice - Allocating Resources on the Basis of Risk Prioritizes
Limited Security Resources (p. 17):
Homeland Security Presidential Directive Number-7 (HSPD-7)
specifically directs DHS's Secretary to identify, prioritize, and
protect critical infrastructure and key resources, so that these
facilities can be protected from terrorist attack (pp. 7, 12). HSPD-7
establishes an annual reporting cycle for agencies to evaluate their
critical infrastructure and key resources protection plans for both
cyber and physical security (p. 12). [emphasis added] The Department of
State suggests the following be added to GAO's list on pp. 19 and 20 of
agency's examples of risk management to protect its facilities and how
they were applied.
The Department of State's Long-Range Overseas Buildings Plan (LROBP) is
a 6-year plan, updated yearly, that identifies embassy and consulate
facilities most in need of replacement due to unacceptable security,
safety, and/or operational condition. The plan identifies State's
facilities program objectives and prioritizes competing facility
requirements with input from the Bureaus of Overseas Buildings
Operations (OBO) and Diplomatic Security (DS), State's Regional
Bureaus, and other overseas agencies. The LROBP provides a roadmap for
addressing long-term facility needs under the Capital Security
Construction Program, Regular Capital Construction Program, as well as
major rehabilitation, compound security, and other programs. To prepare
the plan, each year OBO and DS meet with the Regional Bureaus to
discuss which posts should move into the "top 80" list, which contains
the 80 primary posts requiring replacement for security reasons, and
for which, by law, the Department can spend security capital
construction appropriations. With respect to the original full list of
facilities that need replacement, the Department, working with
intelligence agencies, prioritizes these facilities.
Key Practice - Performance Measurement Can Ensure Accountability for
Achieving Broad Program Goals and Improved Security (p 32):
The Department realizes that in this study, GAO did not assess the
extent to which agencies were using GPRA to develop agency-wide
facility protection or security-related goals (p. 34). GAO also notes
(p. 32) that using performance measurement for facility protection is a
practice that based on its analysis-is in the early stages of
development, although several initiatives used by other agencies were
found.
State would like to note that in its annual Performance Assessment
Rating Tool (PART) submission, that OBO's Capital Security Construction
Program and DS's Worldwide Security Upgrades program are evaluated.
State's PART submission can be viewed at www.whitehouse.gov/omb/part.
The OBO Capital Security Construction Program has been evaluated under
PART over the past 3 years, and has recently received a 97% PART score.
As of this date, no program in the Federal Government has received a
PART score higher than 97%. Also, OBO's Regular/Asset Management
Capital Construction Program was recognized as receiving one of the
highest scores within the Department at its initial PART assessment
with a score of 86%--an "effective" rating. The OBO compound security
program has goals and performance measures also but has not been
evaluated under PART; it will be this coming spring.
Key Practice - "Rightsizing" The Overseas Presence (p. 39):
The Department appreciates the discussion of rightsizing on pp. 39 and
40 of the draft report.
Summary: Agencies Face Obstacles in Implementing Key Practices in
Facility Protection (p. 46):
State would like to note that the challenges listed on pp. 48 and 49,
such as difficulties hiring appropriate staff and differing site
conditions, are not a function of rightsizing its overseas presence in
and of itself, but rather a consequence of undertaking a large-scale
program to construct new embassies in a foreign working environment in
as short a time as possible. We would also like to note that the
November 2003 GAO report [NOTE 65] found that OBO began instituting
management reforms for embassy building in 2001. The report also stated
that while it is too early to assess the effectiveness of these reforms
in ensuring that embassies are built within the approved project budget
and on time, OBO now has a number of mechanisms in place to more
effectively manage the expanded construction program.
NOTE:
[65] GAO, Embassy Construction: State Department Has Implemented
Management Reform, but Challenges Remain, GAO-04-100 (Washington, D.C.:
Nov. 4, 2003).
[End of section]
Appendix VII: Comments from the General Services Administration:
U.S. General Services Administration:
GSA PUBLIC BULDINGS SERVICE:
Response to Government Accountability Office:
HOMELAND SECURITY: Further Actions Needed to Coordinate Federal
Agencies' Facility Protection Efforts and Promote Key Practices:
November 12, 2004:
GSA Public Buildings Service (PBS) Response:
The PBS agrees with the findings of the Government Accountability
Office (GAO) relating security issues facing the federal government.
PBS also supports the recommendations to the Secretary of Department of
Homeland Security and the Chair of Interagency Security Committee
(ISC). As a member agency, of the ISC, GSA will support the initiatives
and efforts proposed by the committee.
Summary of Audit Issues:
Reason GAO stated for conducting the subject audit:
1. Assess the Interagency Security Committee's (ISC) progress in
fulfilling its responsibilities 2. Identify key practices in protecting
federal facilities and any related implementation obstacles:
Audit Findings:
1. ISC made progress in government facility protection efforts:
2. Action taken by ISC:
- Develop policy and guidance:
- Sharing of information between agencies:
3. July 2004, ISC became responsible for reviewing federal agencies
physical security plans:
4. ISC lacks an action plan for identifying implementation goals,
strategy and timeline:
Summary:
1. Audit Recommendations to the Secretary of DHS:
- Direct ISC to develop an action plan that identifies resource needs,
goals, and timeframes for meeting its responsibilities, and proposes
strategies for addressing the challenges it faces.
2. Audit Recommendations to the Chair of ISC:
- With input from ISC member agencies, and considering our work as a
starting point, establish a set of key practices that could guide
agencies' efforts in the facility protection area. This effort could
evaluate agency action, identify lessons learned, and develop
strategies for overcoming challenges.
[End of section]
Appendix VIII: Comments from the Department of the Interior:
United States Department of the Interior:
OFFICE OF THE ASSISTANT SECRETARY POLICY, MANAGEMENT AND BUDGET:
Washington, D.C. 20240:
NOV 10 2004:
Mr. Mark L. Goldstein:
Director, Physical Infrastructure Issues:
U.S. Government Accountability Office:
441 G. Street, NW, Mail Stop 2T23:
Washington, D.C. 20548:
Dear Mr. Goldstein:
Thank you for providing the Department of the Interior the opportunity
to review and comment on the draft U.S. Government Accountability
Office report entitled "Homelanc Security-Further Actions Needed To
Coordinate Federal Agencies' Facility Protection Efforts and Promote
Key Practices," (GAO-05-49) dated November 2004.
We have reviewed the report and agree with the findings and
recommendations.
Sincerely,
Signed by:
P. Lynn Scarlett:
Assistant Secretary:
Policy, Management and Budget:
[End of section]
Appendix IX: Comments from the Department of Energy:
Department of Energy:
Washington, DC 20585:
November 10, 2004:
Mr. Mark L. Goldstein:
Director, Physical Infrastructure Issues:
United States Government Accountability Office:
441 G. Street, NW:
Washington, DC 20548:
Reference: Draft GAO Report 05-49, HOMELAND SECURITY - Further Actions
Needed to Coordinate Federal Agencies' Facility Protection Efforts and
Promote Key Practices:
Dear Mr. Goldstein:
The Department of Energy, Office of Security, concurs with the
discussion and recommendations contained in Draft GAO Report 05-49,
HOMELAND SECURITY - Further Actions Needed to Coordinate Federal
Agencies' Facility Protection Efforts and Promote Key Practices. We
agree with the report's conclusions that closer coordination between
agencies is an important element in improving the security and safety
of all Federal worksites in a cost effective manner. We also agree that
the Department of Homeland Security's Interagency Security Committee
(ISC) is the appropriate entity to lead these coordination efforts.
Furthermore, we believe that the actions recommended by the GAO will
help to define a clear path forward for enhancing the security of all
Government facilities, and we look forward to continuing to work with
the ISC on this important National priority.
Thank you for the opportunity to review the draft report. If you wish
to further discuss this matter, please do not hesitate to contact me at
(202) 586-3345.
Sincerely,
Signed by:
Marshall O. Combs:
Director, Office of Security:
Office of Security and Safety Performance Assurance:
[End of section]
Bibliography:
[End of section]
Department of Defense:
U.S. Department of Defense, Office of Inspector General. Interagency
Summary Report on Security Controls Over Biological Agents (D-2003-
126). Washington, D.C.: August 27, 2003.
Department of Energy:
U.S. Department of Energy, Office of Inspector General. Management of
the Nuclear Weapons Production Infrastructure (DOE/IG-0484).
Washington, D.C.: September 22, 2000.
U.S. Department of Energy, Office of Inspector General. Summary Report
on Allegations Concerning the Department of Energy's Site Safeguards
and Security Planning Process (DOE/IG-0482). Washington, D.C.:
September 28, 2000.
U.S. Department of Energy, Office of Inspector General. The U.S.
Department of Energy's Audit Follow-up Process (DOE/IG-0447).
Washington, D.C.: July 7, 1999.
U.S. Department of Energy, Office of Inspector General. Special Audit
Report on the Department of Energy's Arms and Military-Type Equipment
(IG-0385). Washington, D.C.: February 1, 1996.
U.S. Department of Energy, Office of Inspector General. Audit of the
Department of Energy's Security Police Officer Training (CR-B-95-03).
Washington, D.C.: February 6, 1995.
Department of the Interior:
U.S. Department of the Interior, Office of Inspector General. Homeland
Security: Protection of Critical Infrastructure Systems - Assessment 2:
Critical Infrastructure Systems (2002-I-0053). Washington, D.C.:
September 2002.
U.S. Department of the Interior, Office of Inspector General. Homeland
Security: Protection of Critical Infrastructure Facilities and National
Icons - Assessment 1: Supplemental Funding - Plans and Progress (2002-
I-0039). Washington, D.C.: June 2002.
U.S. Department of the Interior, Office of Inspector General. Progress
Report: Secretary's Directives for Implementing Law Enforcement Reform
in Department of the Interior (2003-I-0062). Washington, D.C.: August
28, 2003.
U.S. Department of the Interior, Office of Inspector General. Review of
National Icon Park Security (2003-I-0063). Washington, D.C.: August
2003.
Department of State:
U.S. Department of State, Office of Inspector General. Limited-Scope
Security Inspection of Embassy Port of Spain, Trinidad and Tobago (SIO-
I-03-22). Washington, D.C.: August 2003.
U.S. Department of State, Office of Inspector General. Security
Inspection of Embassy N'Djamena, Chad (SIO-I-03-27). Washington, D.C.:
June 2003.
U.S. Department of State, Office of Inspector General. Security
Inspection of Embassy Yaoundé, Cameroon (SIO-I-03-28). Washington,
D.C.: March 2003.
U.S. Department of State, Office of Inspector General. Security
Inspection of Embassy Maseru, Lesotho (SIO-I-03-26). Washington, D.C.:
March 2003.
U.S. Department of State, Office of Inspector General. Limited-Scope
Security Inspection of Embassy Belgrade, Serbia and Montenegro (SIO-I-
03-13). Washington, D.C.: March 2003.
U.S. Department of State, Office of Inspector General. Limited-Scope
Security Inspection of Embassy Quito, Ecuador and Consulate General
Guyaquil (SIO-I-03-25). Washington, D.C.: February 2003.
U.S. Department of State, Office of Inspector General. Security
Oversight Inspection of Embassy Muscat, Oman (SIO-I-03-17). Washington,
D.C.: February 2003.
U.S. Department of State, Office of Inspector General. Limited-Scope
Security Inspection of Embassy Dublin, Ireland (SIO-I-03-08).
Washington, D.C.: December 2002.
U.S. Department of State, Office of Inspector General. Limited-Scope
Security Inspection of Embassy Apia, Samoa (SIO-I-03-04). Washington,
D.C.: November 2002.
U.S. Department of State, Office of Inspector General. Limited-Scope
Security Inspection of Embassy Ljubljana, Slovenia (SIO-I-03-03).
Washington, D.C.: November 2002.
U.S. Department of State, Office of Inspector General. Limited-Scope
Security Inspection of Embassy Almaty, Kazakhstan (SIO-I-03-02).
Washington, D.C.: November 2002.
U.S. Department of State, Office of Inspector General. Limited-Scope
Security Inspection of Embassy Amman, Jordan (SIO-I-03-01). Washington,
D.C.: November 2002.
U.S. Department of State, Office of Inspector General. Classified
Semiannual Report to the Congress: April 1, 2003 to September 30, 2003.
Washington, D.C.: September 2003.
U.S. Department of State, Office of Inspector General. Classified
Semiannual Report to the Congress: October 1, 2002 to March 31, 2003.
Washington, D.C.: March 2003.
General Services Administration:
General Services Administration, Office of Inspector General. Follow-up
Review of the Federal Protective Service's Contract Guard Program
(A020092/P/2/R02016). Arlington, VA: August 29, 2002.
General Services Administration, Office of Inspector General. Report on
Federal Protective Service Security Equipment Countermeasures
Installed at Federal Facilities (A020092/P/2/R02008). Arlington, VA:
March 29, 2002.
General Services Administration, Office of Inspector General. Audit of
the Federal Protective Service's Federal Security Risk Manager Program
(A010129/P/2/R02007). Arlington, VA: March 27, 2002.
General Services Administration, Office of Inspector General. Audit of
the Federal Protective Service's Intelligence Sharing Program (A000992/
P/2/R01013). Arlington, VA: March 23, 2001.
General Services Administration, Office of Inspector General. Audit of
The Federal Protective Service's Contract Guard Program (A995175/P/2/
R00010). Arlington, VA: March 28, 2000.
General Services Administration, Office of Inspector General. Audit of
Security Measures for New and Renovated Federal Facilities (A995025/P/
H/R99513). Arlington, VA: March 24, 1999.
General Services Administration, Office of Inspector General. Audit of
The Federal Protective Service's Program for Upgrading Security at
Federal Facilities (A70642/P/2/R98024). Arlington, VA: September 14,
1998.
Postal Service:
U.S. Postal Service, Office of Inspector General. Fiscal Year 1999
Information System Controls: St. Louis Information Service Center (FR-
AR-99-010). Arlington, VA: September 28, 1999.
U.S. Postal Service, Office of Inspector General. Review of Security
Badge Controls at Postal Service Headquarters (OV-LA-01-001).
Arlington, VA: March 26, 2001.
U.S. Postal Service, Office of Inspector General. Review of United
States Postal Service Personnel Security Program: Process for Updating
Sensitive Clearances (OV-MA-99-001). Arlington, VA: March 31, 1998.
Veterans Affairs:
Veterans Affairs, Office of Inspector General. Review of Security and
Inventory Controls Over Selected Biological, Chemical, and Radioactive
Agents Owned by or Controlled at Department of Veterans Affairs
Facilities (02-00266-76). Washington, D.C.: March 14, 2002.
[End of section]
Related GAO Products:
Allocating Resources Using Risk Management:
Fiscal Year 2003 U.S. Government Financial Statements: Sustained
Improvement in Federal Financial Management Is Crucial to Addressing
Our Nation's Future Fiscal Challenges.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-886T]
Washington, D.C.: July 8, 2004.
Nuclear Security: Several Issues Could Impede the Ability of DOE's
Office of Energy, Science and Environment to Meet the May 2003 Design
Basis Threat.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-894T]
Washington, D.C.: June 22, 2004.
Homeland Security: Summary of Challenges Faced in Targeting Oceangoing
Cargo Containers for Inspection.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-557T]
Washington, D.C.: March 31, 2004.
Homeland Security: Management Challenges Facing Federal Leadership.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-260]
Washington, D.C.: December 20, 2002.
Critical Infrastructure Protection: Significant Challenges Need to Be
Addressed.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-961T]
Washington, D.C.: July 24, 2002.
Homeland Security: Critical Design and Implementation Issues.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-957T]
Washington, D.C.: July 17, 2002.
Critical Infrastructure Protection: Significant Homeland Security
Challenges Need to Be Addressed.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-918T]
Washington, D.C.: July 9, 2002.
Homeland Security: A Risk Management Approach Can Guide Preparedness
Efforts.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-208T]
Washington, D.C.: October 31, 2001.
Combating Terrorism: Considerations for Investing Resources in Chemical
and Biological Preparedness.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-162T]
Washington, D.C.: October 17, 2001.
Homeland Security: Key Elements of a Risk Management Approach.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-150T]
Washington, D.C.: October 12, 2001.
Chemical and Biological Defense: Improved Risk Assessment and Inventory
Management Are Needed.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-667]
Washington, D.C.: September 28, 2001.
Combating Terrorism: Selected Challenges and Related Recommendations.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-822]
Washington, D.C.: September 20, 2001.
Combating Terrorism: Actions Needed to Improve DOD Antiterrorism
Program Implementation and Management.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-909]
Washington, D.C.: September 19, 2001.
Weapons of Mass Destruction: Defense Threat Reduction Agency Addresses
Broad Range of Threats, but Performance Reporting Can Be Improved.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-330]
Washington, D.C.: February 13, 2004.
Leveraging Technology:
Electronic Government: Smart Card Usage is Advancing Among Federal
Agencies, Including the Department of Veterans Affairs.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-84T]
Washington, D.C: September 6, 2004.
Information Security: Technologies to Secure Federal Systems.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-467]
Washington, D.C.: March 9, 2004.
Security: Counterfeit Identification Raises Homeland Security Concerns.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-133T]
Washington, D.C.: October 1, 2003.
Electronic Government: Challenges to the Adoption of Smart Card
Technology.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-1108T]
Washington, D.C.: September 9, 2003.
Information Security: Challenges in Using Biometrics.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-1137T]
Washington, D.C.: September 9, 2003.
Border Security: Challenges in Implementing Border Technology.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-546T]
Washington, D.C.: March 12, 2003.
Electronic Government: Progress in Promoting Adoption of Smart Card
Technology.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-144]
Washington, D.C.: January 3, 2003.
Technology Assessment: Using Biometrics for Border Security.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-174]
Washington, D.C.: November 15, 2002.
National Preparedness: Technologies to Secure Federal Buildings.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-687T]
Washington, D.C.: April 25, 2002.
Information Sharing and Coordination:
Information Technology: Major Federal Networks That Support Homeland
Security Functions.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-375]
Washington, D.C.: September 17, 2004:
9/11 Commission Report: Reorganization, Transformation, and Information
Sharing.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-1033T]
Washington, D.C.: August 3, 2004.
Critical Infrastructure Protection: Improving Information Sharing with
Infrastructure Sectors.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-780]
Washington, D.C.: July 9, 2004.
Posthearing Questions from September 17, 2003, Hearing on "Implications
of Power Blackouts for the Nation's Cybersecurity and Critical
Infrastructure Protection: The Electrical Grid, Critical
Interdependencies, Vulnerabilities, and Readiness".
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-300R]
Washington, D.C.: December 8, 2003.
Homeland Security: Challenges in Achieving Interoperable Communications
for First Responders.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-231T]
Washington, D.C.: November 6, 2003.
Homeland Security: Information Sharing Responsibilities, Challenges,
and Key Management Issues.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-1165T]
Washington, D.C.: September 17, 2003.
Homeland Security: Efforts to Improve Information Sharing Need to Be
Strengthened.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-760]
Washington, D.C.: August 27, 2003.
Homeland Security: Information Sharing Responsibilities, Challenges,
and Key Management Issues.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-715T]
Washington, D.C.: May 8, 2003.
Information Technology: Terrorist Watch Lists Should Be Consolidated to
Promote Better Integrating and Sharing.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-322]
Washington, D.C.: April 15, 2003.
Bioterrorism: Information Technology Strategy Could Strengthen Federal
Agencies' Abilities to Respond to Public Health Emergencies.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-139]
Washington, D.C.: May 30, 2003.
Homeland Security: Information Sharing Activities Face Continued
Management Challenges.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-1122T]
Washington, D.C.: October 1, 2002.
National Preparedness: Technology and Information Sharing Challenges.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-1048R]
Washington, D.C.: August 30, 2002.
Homeland Security: Effective Intergovernmental Coordination is Key to
Success.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-1013T]
Washington, D.C.: August 23, 2002.
Homeland Security: Effective Intergovernmental Coordination is Key to
Success.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-1012T]
Washington, D.C.: August 22, 2002.
Homeland Security: Effective Intergovernmental Coordination is Key to
Success.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-1011T]
Washington, D.C.: August 20, 2002.
Homeland Security: Intergovernmental Coordination and Partnership Will
Be Critical to Success.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-901T]
Washington, D.C.: July 3, 2002.
Homeland Security: Intergovernmental Coordination and Partnership Will
Be Critical to Success.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-900T]
Washington, D.C.: July 2, 2002.
Homeland Security: Intergovernmental Coordination and Partnership Will
Be Critical to Success.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-899T]
Washington, D.C.: July 1, 2002.
National Preparedness: Integration of Federal, State, Local, and
Private Sector Efforts is Critical to an Effective National Strategy
for Homeland Security.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-621T]
Washington, D.C.: April 11, 2002.
Combating Terrorism: Intergovernmental Cooperation in the Development
of a National Strategy to Enhance State and Local Preparedness.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-550T]
Washington, D.C.: April 2, 2002.
Combating Terrorism: Enhancing Partnerships Through a National
Preparedness Strategy.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-549T]
Washington, D.C.: March 28, 2002.
Combating Terrorism: Critical Components of a National Strategy to
Enhance State and Local Preparedness.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-548T]
Washington, D.C.: March 25, 2002.
Combating Terrorism: Intergovernmental Partnership in a National
Strategy to Enhance State and Local Preparedness.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-547T]
Washington, D.C.: March 22, 2002.
Homeland Security: Progress Made; More Direction and Partnership
Sought.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-490T]
Washington, D.C.: March 12, 2002.
Combating Terrorism: Key Aspects of a National Strategy to Enhance
State and Local Preparedness.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-473T]
Washington, D.C.: March 1, 2002.
Bioterrorism: Review of Public Health Preparedness Programs.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-149T]
Washington, D.C.: October 10, 2001.
Bioterrorism: Public Health and Medical Preparedness.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-141T]
Washington, D.C.: October 9, 2001.
Bioterrorism: Coordination and Preparedness.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-129T]
Washington, D.C.: October 5, 2001.
Combating Terrorism: Observations on Federal Spending to Combat
Terrorism.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-NSIAD/GGD-99-107]
Washington, D.C.: March 11, 1999.
Aligning Assets to Mission:
Embassy Construction: State Department Has Implemented Management
Reforms, but Challenges Remain.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-100]
Washington, D.C.: November 4, 2003.
VA Health Care: Framework for Analyzing Capital Asset Realignment for
Enhanced Services Decisions.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-1103R]
Washington, D.C.: August 18, 2003.
Major Management Challenges and Program Risks: Department of State.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-107]
Washington, D.C.: January 2003.
Overseas Presence: Framework for Assessing Embassy Staff Levels Can
Support Rightsizing Initiatives.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-780]
Washington, D.C.: July 26, 2002.
Overseas Presence: Observations on a Rightsizing Framework.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-659T]
Washington, D.C.: May 1, 2002.
Overseas Presence: More Work Needed on Embassy Rightsizing.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-143]
Washington, D.C.: November 27, 2001.
Strategic Human Capital Management:
Human Capital: Building on the Current Momentum to Transform the
Federal Government.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-976T]
Washington, D.C.: July 20, 2004.
Information Technology: Training Can Be Enhanced by Greater Use of
Leading Practices.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-791]
Washington, D.C.: June 24, 2004.
Results-Oriented Government: Shaping the Government to Meet 21ST
Century Challenges.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-1168T]
Washington, D.C.: September 17, 2003.
Results-Oriented Cultures: Creating a Clear Linkage between Individual
Performance and Organizational Success.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-488]
Washington, D.C.: March 14, 2003.
Human Capital: Building on the Current Momentum to Address High-Risk
Issues.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-637T]
Washington, D.C.: April 8, 2003.
High-Risk Series: Strategic Human Capital Management.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-120]
Washington, D.C.: January 2003.
Human Capital: A Self-Assessment Checklist for Agency Leaders.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/OCG-00-14G]
Washington, D.C.: September 2000.
Executive Guide: Leading Practices in Capital Decision-Making.
AIMD-99-32. Washington, D.C.: December 1998.
Performance Measurement and Testing:
Weaknesses in Screening Entrants Into the United States.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-438T]
Washington, D.C.: January 30, 2003.
Building Security: Interagency Security Committee Has Had Limited
Success in Fulfilling Its Responsibilities.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-1004]
Washington, D.C.: September 17, 2002.
Security Breaches at Federal Buildings in Atlanta, Georgia.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-668T]
Washington, D.C.: April 30, 2002.
Homeland Security: Responsibility and Accountability For Achieving
National Goals.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-627T]
Washington, D.C.: April 11, 2002.
Bioterrorism: Federal Research and Preparedness Activities.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-915]
Washington, D.C.: September 28, 2001.
Combating Terrorism: Observations on Options to Improve the Federal
Response.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-660T]
Washington, D.C.: April 24, 2001.
Combating Terrorism: Analysis of Federal Counterterrorist Exercises.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/NSIAD-99-157BR]
Washington, D.C.: June 25, 1999.
Federal Law Enforcement: Investigative Authority and Personnel at 13
Agencies.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/GGD-96-154]
Washington, D.C.: September 30, 1996.
Challenges and Lessons Learned in Homeland Security:
Critical Infrastructure Protection: Challenges for Selected Agencies
and Industry Sectors.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-233]
Washington, D.C.: February 28, 2003.
Combating Terrorism: Funding Data Reported to Congress Should Be
Improved.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-170]
Washington, D.C.: November 26, 2002.
Combating Terrorism: Actions Needed to Guide Services' Antiterrorism
Efforts at Installations.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-14]
Washington, D.C.: November 1, 2002.
Homeland Security: Challenges and Strategies in Addressing Short-and
Long-Term National Needs.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-160T]
Washington, D.C.: November 7, 2001.
Combating Terrorism: FEMA Continues to Make Progress in Coordinating
Preparedness and Response.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-15]
Washington, D.C.: March 20, 2001.
Critical Infrastructure Protection: Challenges to Building a
Comprehensive Strategy for Information Sharing and Coordination.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-AIMD-00-268]
Washington, D.C.: July 26, 2000.
Combating Terrorism: Observations on Growth in Federal Programs.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-NSIAD-99-181]
Washington, D.C.: June 9, 1999.
Combating Terrorism: Spending on Governmentwide Programs Requires
Better Management and Coordination.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/NSIAD-98-39]
Washington, D.C.: December 1, 1997.
Other Products Related to Facility Security:
Homeland Security: Transformation Strategy Needed to Address Challenges
Facing the Federal Protective Service.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-537]
Washington, D.C.: July 14, 2004.
General Services Administration: Factors Affecting the Construction and
Operating Costs of Federal Buildings.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-609T]
Washington, D.C.: April 2, 2003.
High-Risk Series: Federal Real Property.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-122]
Washington, D.C.: January 2003.
Building Security: Security Responsibilities for Federally Owned and
Leased Facilities.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-8]
Washington, D.C.: October 31, 2002.
Diffuse Security Threats: USPS Air Filtration Systems Need More Testing
and Cost Benefit Analysis before Implementation.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-838]
Washington, D.C.: August 22, 2002.
Homeland Security: Key Elements to Unify Efforts Are Underway but
Uncertainty Remains.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-610]
Washington, D.C.: June 7, 2002.
Federal Real Property: Better Governmentwide Data Needed for Strategic
Decisionmaking.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-342]
Washington, D.C.: April 16, 2002.
Highlights of GAO's Conference on Options to Enhance Mail Security and
Postal Operations.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-315SP]
Washington, D.C.: December 20, 2001.
General Services Administration: Status of Efforts to Improve
Management of Building Security Upgrade Program.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-GGD/OSI-00-19]
Washington, D.C.: October 7, 1999:
General Services Administration: Many Building Security Upgrades Made
But Problems Have Hindered Program Implementation.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-GGD-98-141]
Washington, D.C.: June 4, 1998.
Other Products Related to Security Topics:
Combating Terrorism: Evaluation of Selected Characteristics in National
Strategies Related to Terrorism.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-408T]
Washington, D.C.: February 3, 2004.
Homeland Security Advisory System: Preliminary Observations Regarding
Threat Level Increases from Yellow to Orange.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-453R]
Washington, D.C.: February 26, 2004.
Homeland Security: Preliminary Observations on Efforts to Target
Security Inspections of Cargo Containers.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-325T]
Washington, D.C.: December 16, 2003.
Aviation Security: Efforts to Measure Effectiveness and Strengthen
Security Programs.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-285T]
Washington, D.C.: November 20, 2003.
Bioterrorism: A Threat to Agriculture and the Food Supply.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-259T]
Washington, D.C.: November 19, 2003.
Aviation Security: Efforts to Measure Effectiveness and Address
Challenges.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-232T]
Washington, D.C.: November 5, 2003.
Aviation Security: Progress Since September 11, 2001 and the Challenges
Ahead.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-1150T]
Washington, D.C.: September 9, 2003.
Transportation Security: Post-September 11th Initiatives and Long-Term
Challenges.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-616T]
Washington, D.C.: April 1, 2003.
Combating Terrorism: Observations on National Strategies Related to
Terrorism.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-519T]
Washington, D.C.: March 3, 2003.
Overseas Presence: Conditions of Overseas Diplomatic Facilities.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-557T]
Washington, D.C.: March 20, 2003.
Mass Transit: Federal Action Could Help Transit Agencies Address
Security Challenges.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-263]
Washington, D.C.: December 13, 2002.
Mass Transit: Challenges in Securing Transit Systems.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-1075T]
Washington, D.C.: September 18, 2002.
Combating Terrorism: Department of State Programs to Combat Terrorism
Abroad.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-1021]
Washington, D.C.: September 6, 2002.
Port Security: Nation Faces Formidable Challenges in Making New
Initiatives Successful.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-993T]
Washington, D.C.: August 5, 2002.
National Preparedness: Integrating New and Existing Technology and
Information Sharing into an Effective Homeland Security Strategy.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-811T]
Washington, D.C.: June 7, 2002.
Homeland Security: A Framework for Addressing the Nation's Efforts.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-1158T]
Washington, D.C.: September 21, 2001.
Combating Terrorism: Comments on H.R. 525 to Create a President's
Council on Domestic Terrorism Preparedness.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-555T]
Washington, D.C.: May 9, 2001.
Combating Terrorism: Comments on Counterterrorism Leadership and
National Strategy.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-556T]
Washington, D.C.: March 27, 2001.
Embassy Construction: Better Long-Term Planning Will Enhance Program
Decision-making.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-11]
Washington, D.C.: January 22, 2001.
FAA Computer Security: Recommendations to Address Continuing
Weaknesses.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-171]
Washington, D.C.: December 6, 2000.
FAA Computer Security: Actions Needed to Address Critical Weaknesses
That Jeopardize Aviation Operations.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-AIMD-00-330]
Washington, D.C.: September 27, 2000.
FAA Computer Security: Concerns Remain Due to Personnel and Other
Continuing Weaknesses.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/AIMD-00-252]
Washington, D.C.: August 16, 2000.
Combating Terrorism: Action Taken but Considerable Risks Remain for
Forces Overseas.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/NSIAD-00-181]
Washington, D.C.: July 19, 2000.
State Department: Overseas Emergency Security Program Progressing, but
Costs Are Increasing.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/NSIAD-00-83]
Washington, D.C.: March 8, 2000.
Combating Terrorism: Issues in Managing Counterterrorist Programs.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-NSIAD-00-145]
Washington, D.C.: April 6, 2000.
State Department: Progress and Challenges in Addressing Management
Issues.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-NSIAD-00-124]
Washington, D.C.: March 8, 2000.
State Department: Major Management Challenges and Program Risks.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-NSIAD/AIMD-99-99]
Washington, D.C.: March 4, 1999.
Major Management Challenges and Program Risks: Department of State.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/OCG-99-12]
Washington, D.C.: January 1999.
Combating Terrorism: Opportunities to Improve Domestic Preparedness
Program Focus and Efficiency.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/NSIAD-99-3]
Washington, D.C.: November 12, 1998.
Foreign Affairs Management: Major Challenges Facing the Department of
State.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-NSIAD-98-251]
Washington, D.C.: September 17, 1998.
Combating Terrorism: Efforts to Protect U.S. Forces in Turkey and the
Middle East.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-NSIAD-98-44]
Washington, D.C.: October 28, 1997.
Combating Terrorism: Federal Agencies' Efforts to Implement National
Policy and Strategy.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/NSIAD-97-254]
Washington, D.C.: September 26, 1997.
Combating Terrorism: Status of DOD Efforts to Protect Its Forces
Overseas.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/NSIAD-97-207]
Washington, D.C.: July 21, 1997.
Aviation Security: FAA's Procurement of Explosives Detection Devices.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/RCED-97-111R]
Washington, D.C.: May 1, 1997.
Aviation Security: Posting Notices at Domestic Airports.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/RCED-97-88R]
Washington, D.C.: March 25, 1997.
Aviation Security: Technology's Role in Addressing Vulnerabilities.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-RCED/NSIAD-96-262]
Washington, D.C.: September 19, 1996.
Aviation Security: Urgent Issues Need to Be Addressed.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-RCED/NSIAD-96-251]
Washington, D.C.: September 11, 1996.
Aviation Security: Immediate Action Needed to Improve Security.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/T-RCED/NSIAD-96-237]
Washington, D.C.: August 1, 1996.
Aviation Security: FAA Can Help Ensure That Airports' Access Control
Systems are Cost-Effective.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/RCED-95-25]
Washington, D.C.: March 1, 1995.
(543094):
FOOTNOTES
[1] Presidential Executive Order 12977, Oct. 19, 1995.
[2] GAO, Building Security: Interagency Security Committee Has Had
Limited Success in Fulfilling Its Responsibilities, GAO-02-1004
(Washington, D.C.: Sept. 17, 2002).
[3] See GAO, A Model of Strategic Human Capital Management, GAO-02-
373SP (Washington, D.C.: Mar. 15, 2002); GAO, Human Capital: A Guide
for Assessing Strategic Training and Development Efforts in the Federal
Government, GAO-04-546G (Washington, D.C.: March 2004); GAO, Executive
Guide: Leading Practices in Capital Decision-Making, GAO/AIMD-99-32
(Washington, D.C.: December 1998); and GAO, Information Technology:
Training Can Be Enhanced by Greater Use of Leading Practices, GAO-04-
791 (Washington, D.C.: June 24, 2004).
[4] ISC's membership includes the Departments of State, Treasury,
Defense, Justice, the Interior, Agriculture, Commerce, Labor, Health
and Human Services, Housing and Urban Development, Transportation,
Energy, Education, and Veterans Affairs; GSA; the Environmental
Protection Agency, Central Intelligence Agency (CIA), and OMB. Other
members of ISC include the Director, U.S. Marshals Service and the
Assistant to the President for National Security Affairs. As a member
of ISC, DOD participates in meetings to ensure that DOD physical
security policies are consistent with ISC security standards and policy
guidance, according to the Executive Director of ISC.
[5] Homeland Security Presidential Directive Number 7, Critical
Infrastructure Identification Prioritization, and Protection, Dec. 17,
2003.
[6] GAO-02-1004.
[7] GAO, High-Risk Series: Federal Real Property, GAO-03-122
(Washington, D.C.: January 2003).
[8] GAO-02-1004.
[9] GAO-02-1004.
[10] Presidential Executive Order 13286, Mar. 5, 2003.
[11] Homeland Security Presidential Directive Number 12, Policy for a
Common Identification Standard for Federal Employees and Contractors,
Aug. 27, 2004.
[12] See GAO-03-122 and GAO, Fiscal Year 2003 U.S. Government Financial
Statements: Sustained Improvement in Federal Financial Management Is
Crucial to Addressing Our Nation's Future Fiscal Challenges, GAO-04-
886T (Washington, D.C.: July 8, 2004).
[13] Presidential Executive Order 12977, Oct. 19, 1995, originally
stated that the Administrator of GSA would provide ISC administrative
services, funds, facilities, staff, and other support services
necessary for the performance of ISC functions. Executive Order 13286
amended Executive Order 12977 to reflect the transfer of ISC to DHS and
substituted the Secretary of DHS for the Administrator of GSA.
[14] GAO-02-687T.
[15] For example, see GAO, Homeland Security: Critical Design and
Implementation Issues, GAO-02-957T (Washington, D.C.: July 17, 2002)
and GAO, Homeland Security: Key Elements of a Risk Management Approach,
GAO-02-150T (Washington, D.C.: Oct. 12, 2001).
[16] GAO, Homeland Security: A Risk Management Approach Can Guide
Preparedness Efforts, GAO-02-208T (Washington, D.C.: Oct. 31, 2001).
[17] GAO, Nuclear Security: Several Issues Could Impede the Ability of
DOE's Office of Energy, Science and Environment to Meet the May 2003
Design Basis Threat, GAO-04-894T (Washington, D.C.: June 22, 2004).
[18] GAO, Homeland Security: Challenges and Strategies in Addressing
Short-and-Long-Term National Needs, GAO-02-160T (Washington, D.C.:
Nov. 7, 2001).
[19] Interior officials requested that we not publicly identify these
16 assets because of security concerns.
[20] GAO, Border Security: Challenges in Implementing Border
Technology, GAO-03-546T (Washington, D.C.: Mar. 12, 2003); GAO,
Information Security: Challenges in Using Biometrics, GAO-03-1137T
(Washington, D.C.: Sept. 9, 2003).
[21] GAO-03-1137T.
[22] GAO, Electronic Government: Challenges to the Adoption of Smart
Card Technology, GAO-03-1108T (Washington, D.C.: Sept. 9, 2003).
[23] For example, see GAO-03-1108T; GAO-03-1137T; GAO-03-546T; U.S
Department of State, Office of Inspector General, Limited-Scope
Security Inspection of Embassy Port of Spain, Trinidad, and Tobago,
SIO-I-03-22, August 2003; U.S. Department of State, Office of Inspector
General, Security Inspection of Embassy N'Djamena, Chad, SIO-I-03-27,
June 2003; and U.S. Department of State, Office of Inspector General,
Security Inspection of Embassy Yaounde, Cameroon, SIO-I-03-28, March
2003.
[24] GAO-02-687T.
[25] GAO, Diffuse Security Threats: USPS Air Filtration System Need
More Testing and Cost Benefit Analysis before Implementation, GAO-02-
838 (Washington, D.C.: Aug. 22, 2002).
[26] As we reported in GAO, Homeland Security Advisory System:
Preliminary Observations Regarding Threat Level Increases from Yellow
to Orange, GAO-04-453R (Washington, D.C.: Feb. 26, 2004), the Homeland
Security Advisory System is composed of five color-coded threat
conditions, which represent levels of risk related to potential terror
attack. Red is severe, orange high, yellow elevated, blue guarded, and
green low.
[27] GAO, Homeland Security: Information Sharing Responsibilities,
Challenges, and Key Management Issues, GAO-03-1165T (Washington, D.C.:
Sept. 17, 2003).
[28] GAO-03-1165T.
[29] GAO, Homeland Security: Efforts to Improve Information Sharing
Need to Be Strengthened, GAO-03-760 (Washington, D.C.: Aug. 27, 2003).
[30] GAO, 9/11 Commission Report: Reorganization, Transformation, and
Information Sharing, GAO-04-1033T (Washington, D.C.: Aug. 3, 2004).
[31] GAO-02-687T.
[32] U.S. Department of the Interior, Office of Inspector General,
Review of National Icon Park Security, 2003-I-0063 (Washington, D.C.:
Aug. 28, 2003).
[33] U.S. Department of State, Office of Inspector General, Security
Inspection: Embassy Ljubljana, Slovenia, SIO-I-03-03 (Washington,
D.C.: November 2002).
[34] General Services Administration, Office of Inspector General,
Audit of the Federal Protective Service's Federal Security Risk Manager
Program, A010129/P/2/R02007 (Arlington, VA: Mar. 27, 2002).
[35] Office of Homeland Security, The National Strategy for Homeland
Security, July 2002.
[36] Office of Homeland Security, The National Strategy for the
Physical Protection of Critical Infrastructures and Key Assets,
February 2003.
[37] GAO, Combating Terrorism: Evaluation of Selected Characteristics
in National Strategies Related to Terrorism, GAO-04-408T (Washington,
D.C.: Feb. 3, 2004).
[38] GAO, Weapons of Mass Destruction: Defense Threat Reduction Agency
Addresses Broad Range of Threats, but Performance Reporting Can Be
Improved, GAO-04-330 (Washington, D.C.: Feb. 13, 2004).
[39] GAO-04-330.
[40] WMD, once defined by DOD as nuclear, biological, and chemical, now
includes radiological and high explosives as well.
[41] U.S. Department of the Interior, Office of Inspector General,
Review of National Icon Park Security, 2003-I-0063 (Washington, D.C.:
August 2003).
[42] GAO-02-687T, and GAO, Information Security: Technologies to Secure
Federal Systems, GAO-04-467 (Washington, D.C.: Mar. 9, 2004).
[43] After the bombing of a federal building in Oklahoma City,
Oklahoma, the President issued PDD 39 in June 1995, which enumerated
responsibilities for federal agencies in combating terrorism, including
domestic incidents. In May 1998, the President issued PDD 62 that
reaffirmed PDD 39 and further articulated responsibilities for specific
agencies.
[44] GAO, Combating Terrorism: Analysis of Federal Counterterrorist
Exercises, GAO/NSIAD-99-157BR (Washington, D.C.: June 25, 1999).
[45] GAO-03-122.
[46] DOE Office of the Inspector General, Disposition of the
Department's Excess Facilities, DOE/IG-0550 (Washington, D.C.: Apr. 3,
2002).
[47] GAO, Federal Real Property: Actions Needed to Address Long-
standing and Complex Problems, GAO-04-119T (Washington, D.C.: Oct. 1,
2003).
[48] State established OPAP following the 1998 embassy bombings in
Africa and in response to recommendations of the Accountability Review
Boards to consider the organization of U.S. embassies and consulates.
Department of State, America's Overseas Presence in the 21st Century,
The Report of the Overseas Presence Advisory Panel (Washington, D.C.:
November 1999).
[49] GAO, Overseas Presence: Observations on a Rightsizing Framework,
GAO-02-659T (Washington, D.C.: May 1, 2002).
[50] GAO, Overseas Presence: Rightsizing Framework Can Be Applied at
U.S. Diplomatic Posts in Developing Countries, GAO-03-396 (Washington,
D.C.: Apr. 7, 2003).
[51] GAO, Overseas Presence: Systematic Processes Needed to Rightsize
Posts and Guide Embassy Construction, GAO-03-582T (Washington, D.C.:
Apr. 7, 2003).
[52] GAO-04-1033T.
[53] GAO, Results-Oriented Government: Shaping the Government to Meet
21st Century Challenges, GAO-03-1168T (Washington, D.C.: Sept. 17,
2003).
[54] GAO, Results-Oriented Cultures: Creating a Clear Linkage between
Individual Performance and Organizational Success, GAO-03-488
(Washington, D.C.: Mar. 14, 2003).
[55] GAO, Homeland Security: Transformation Strategy Needed to Address
Challenges Facing the Federal Protective Service, GAO-04-537
(Washington, D.C.: July 14, 2004).
[56] GAO-04-1033T.
[57] Department of Energy Inspector General, Audit of the Department of
Energy's Security Police Officer Training, CR-B-95-03 (Washington,
D.C.: Feb. 6, 1995).
[58] ASIS formerly stood for the American Society for Industrial
Security; but now the organization refers to itself as ASIS
International.
[59] GAO, Federal Real Property: Better Governmentwide Data Needed for
Strategic Decisionmaking, GAO-02-342 (Washington, D.C.: Apr. 16, 2002).
[60] GAO-02-687T.
[61] GAO-04-1033T.
[62] GAO-03-760.
[63] GAO-03-122.
[64] GAO, Embassy Construction: State Department Has Implemented
Management Reforms, but Challenges Remain, GAO-04-100 (Washington,
D.C.: Nov. 4, 2003).
[65] GAO, High-Risk Series: Strategic Human Capital Management, GAO-03-
120 (Washington, D.C.: January 2003).
[66] See GAO-02-373SP; GAO/AIMD-99-32; GAO-04-791; and, GAO-04-546G.
[67] See GAO-02-208T and GAO-02-150T.
GAO's Mission:
The Government Accountability Office, the investigative arm of
Congress, exists to support Congress in meeting its constitutional
responsibilities and to help improve the performance and accountability
of the federal government for the American people. GAO examines the use
of public funds; evaluates federal programs and policies; and provides
analyses, recommendations, and other assistance to help Congress make
informed oversight, policy, and funding decisions. GAO's commitment to
good government is reflected in its core values of accountability,
integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through the Internet. GAO's Web site ( www.gao.gov ) contains
abstracts and full-text files of current reports and testimony and an
expanding archive of older products. The Web site features a search
engine to help you locate documents using key words and phrases. You
can print these documents in their entirety, including charts and other
graphics.
Each day, GAO issues a list of newly released reports, testimony, and
correspondence. GAO posts this list, known as "Today's Reports," on its
Web site daily. The list contains links to the full-text document
files. To have GAO e-mail this list to you every afternoon, go to
www.gao.gov and select "Subscribe to e-mail alerts" under the "Order
GAO Products" heading.
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office
441 G Street NW, Room LM
Washington, D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm
E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470:
Public Affairs:
Jeff Nelligan, managing director,
NelliganJ@gao.gov
(202) 512-4800
U.S. Government Accountability Office,
441 G Street NW, Room 7149
Washington, D.C. 20548: