Financial Management

Department of Homeland Security Faces Significant Financial Management Challenges Gao ID: GAO-04-774 July 19, 2004

When the Department of Homeland Security (DHS) began operations in March 2003, it faced the daunting task of bringing together 22 diverse agencies. This transformation poses significant management and leadership challenges, including integrating a myriad of redundant financial management systems and addressing the existing weaknesses in the inherited components, as well as newly identified weaknesses. This review was performed to (1) identify the financial management systems' weaknesses DHS inherited from the 22 component agencies, (2) assess DHS's progress in addressing those weaknesses, (3) identify plans DHS has to integrate its financial management systems, and (4) review whether the planned systems DHS is developing will meet the requirements of relevant financial management improvement laws.

DHS inherited 30 reportable internal control weaknesses identified in prior component financial audits with 18 so severe they were considered material weaknesses. These weaknesses include insufficient internal controls, system security deficiencies, and incomplete policies and procedures necessary to complete basic financial information. Of the four inherited component agencies that had previously been subject to stand-alone audits, all four agencies' systems were found not to be in substantial compliance with the requirements of the Federal Financial Management Improvement Act (FFMIA), an indicator of whether a federal entity can produce reliable data for management and reporting purposes. Component agencies took varied actions to resolve 9 of the 30 inherited internal control weaknesses. The remaining 21 weaknesses were combined and reported as material weaknesses or reportable conditions in DHS's first Performance and Accountability Report, or were reclassified by independent auditors as lower-level observations and recommendations. Combining or reclassifying weaknesses does not resolve the underlying internal control weakness, or mean that challenges to address them are less than they would have been prior to the establishment of DHS. DHS is in the early stages of acquiring a financial enterprise solution to consolidate and integrate its business functions. Initiated in August 2003, DHS expects the financial enterprise solution to be fully deployed and operational in 2006 at an estimated cost of $146 million. Other agencies have failed in attempts to develop financial management systems with fewer diverse operations. Success will depend on a number of variables, including having an effective strategic management framework, sustained management oversight, and user acceptance of the efforts. It is too early to tell whether DHS's planned financial enterprise solution will be able to meet the requirements of relevant financial management improvement laws. As of June 2004, DHS is not subject to the CFO Act and thus FFMIA, which is applicable only to agencies subject to the CFO Act. While DHS is currently not required to report on compliance with FFMIA, its auditors disclosed systems deficiencies that would have likely resulted in noncompliance issues.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-04-774, Financial Management: Department of Homeland Security Faces Significant Financial Management Challenges This is the accessible text file for GAO report number GAO-04-774 entitled 'Financial Management: Department of Homeland Security Faces Significant Financial Management Challenges' which was released on July 29, 2004. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to the Ranking Minority Member, Committee on Governmental Affairs, U.S. Senate: July 2004: FINANCIAL MANAGEMENT: Department of Homeland Security Faces Significant Financial Management Challenges: GAO-04-774: GAO Highlights: Highlights of GAO-04-774, a report to The Honorable Joseph I. Lieberman, Ranking Minority Member, Committee on Governmental Affairs, U.S. Senate: Why GAO Did This Study: When the Department of Homeland Security (DHS) began operations in March 2003, it faced the daunting task of bringing together 22 diverse agencies. This transformation poses significant management and leadership challenges, including integrating a myriad of redundant financial management systems and addressing the existing weaknesses in the inherited components, as well as newly identified weaknesses. This review was performed to (1) identify the financial management systems‘ weaknesses DHS inherited from the 22 component agencies, (2) assess DHS‘s progress in addressing those weaknesses, (3) identify plans DHS has to integrate its financial management systems, and (4) review whether the planned systems DHS is developing will meet the requirements of relevant financial management improvement laws. What GAO Found: DHS inherited 30 reportable internal control weaknesses identified in prior component financial audits with 18 so severe they were considered material weaknesses. These weaknesses include insufficient internal controls, system security deficiencies, and incomplete policies and procedures necessary to complete basic financial information. Of the four inherited component agencies that had previously been subject to stand-alone audits, all four agencies‘ systems were found not to be in substantial compliance with the requirements of the Federal Financial Management Improvement Act (FFMIA), an indicator of whether a federal entity can produce reliable data for management and reporting purposes. Component agencies took varied actions to resolve 9 of the 30 inherited internal control weaknesses. The remaining 21 weaknesses were combined and reported as material weaknesses or reportable conditions in DHS‘s first Performance and Accountability Report, or were reclassified by independent auditors as lower-level observations and recommendations. Combining or reclassifying weaknesses does not resolve the underlying internal control weakness, or mean that challenges to address them are less than they would have been prior to the establishment of DHS. The following table summarizes the current status of the weaknesses DHS inherited from component agencies. Status of 30 Inherited Weaknesses in 2003 Audit [See PDF for image] [End table] DHS is in the early stages of acquiring a financial enterprise solution to consolidate and integrate its business functions. Initiated in August 2003, DHS expects the financial enterprise solution to be fully deployed and operational in 2006 at an estimated cost of $146 million. Other agencies have failed in attempts to develop financial management systems with fewer diverse operations. Success will depend on a number of variables, including having an effective strategic management framework, sustained management oversight, and user acceptance of the efforts. It is too early to tell whether DHS‘s planned financial enterprise solution will be able to meet the requirements of relevant financial management improvement laws. As of June 2004, DHS is not subject to the CFO Act and thus FFMIA, which is applicable only to agencies subject to the CFO Act. While DHS is currently not required to report on compliance with FFMIA, its auditors disclosed systems deficiencies that would have likely resulted in noncompliance issues. What GAO Recommends: GAO is making eight recommendations to improve financial management at DHS, including recommendations to give continued attention to resolving all previously reported internal control weaknesses and adhere to FFMIA requirements even though not statutorily required to do so. GAO also believes Congress should enact legislation to designate DHS as a Chief Financial Officers Act (CFO Act) agency. DHS generally agreed with the overall findings and recommendations. www.gao.gov/cgi-bin/getrpt?GAO-04-774. To view the full product, including the scope and methodology, click on the link above. For more information, contact McCoy Williams at (202) 512-6906 or williamsm1@gao.gov. [End section] Contents: Letter: Results in Brief: Background: DHS Inherited Significant Weaknesses from Its Component Agencies: Some Progress Made in Addressing Inherited Weaknesses: DHS Is in the Early Stages of Integrating Its Financial Management Systems: It Is Not Known Whether DHS's Planned Financial Management Systems Will Be Able to Meet the Requirements of Relevant Financial Management Improvement Laws: Conclusions: Matter for Congressional Consideration: Recommendations for Executive Action: Agency Comments and Our Evaluation: Appendixes: Appendix I: Scope and Methodology: Appendix II: Material Weaknesses and Reportable Conditions at DHS for Fiscal Year 2003: Appendix III: Disposition of Reported Internal Control Weaknesses by Component: Appendix IV: Comments from the Department of Homeland Security: Tables: Table 1: Status of 30 Inherited Weaknesses in 2003 Audit: Table 2: Decreases in Service Providers from March 2003 to May 2004: Table 3: Key Financial Management Improvement Laws: Figure: Figure 1: Phase I Timeline: Letter July 19, 2004: The Honorable Joseph I. Lieberman: Ranking Minority Member: Committee on Governmental Affairs: United States Senate: Dear Senator Lieberman: When the Department of Homeland Security (DHS) began operations in March 2003, it faced the daunting task of bringing together 22 diverse agencies. Not since the creation of the Department of Defense had the federal government undertaken a transformation of this magnitude. As we previously reported,[Footnote 1] such a consolidation poses significant management and leadership challenges, including integrating a myriad of redundant financial management systems and addressing the existing and newly identified weaknesses in the inherited components. You asked us to review DHS's progress in addressing financial management weaknesses and integrating its financial systems. This report (1) identifies the financial management systems' weaknesses DHS inherited from the 22 component agencies, (2) assesses DHS's progress in addressing those weaknesses, (3) identifies plans DHS has to integrate its financial management systems, and (4) reviews whether the planned systems DHS is developing will meet the requirements of relevant financial management improvement laws.[Footnote 2] Our work is based primarily on reviews of DHS's Performance and Accountability Report for fiscal year 2003 and prior period component agency annual financial reports, when available. We interviewed DHS officials and obtained documents related to DHS's financial management systems integration project. In addition, we reviewed our and Office of Inspector General (OIG) previously issued reports and relevant laws and regulations. A more detailed discussion of our scope and methodology can be found in appendix I. We conducted our work from October 2003 through June 2004 in accordance with U.S. generally accepted government auditing standards. Results in Brief: When DHS began operating in March 2003, it inherited 22 component agencies, approximately 180,000 employees, about 100 resource management systems, and 30 reportable internal control conditions[Footnote 3] identified in prior component financial audits. Of the 30 reportable conditions, 18 were so severe they were considered material weaknesses.[Footnote 4] Among these weaknesses were insufficient internal controls or processes to reliably report financial information such as revenue, accounts receivable, and accounts payable; significant system security deficiencies; financial systems that required extensive manual processes to prepare financial statements; and incomplete policies and procedures necessary to complete basic financial management activities. Further, of the four component agencies that had previously been subject to stand-alone audits, all four agencies' systems were found not to be in substantial compliance with the requirements of the Federal Financial Management Improvement Act of 1996 (FFMIA),[Footnote 5] an indicator of whether a federal entity can produce reliable data for management and reporting purposes. Because most of the components that transferred to DHS were comparatively small components of their former department, they had not been subjected to significant financial statement audit scrutiny prior to transfer. Thus, it was unknown at the time of transfer whether additional internal control weaknesses existed in those components. Component agencies took action to resolve 9 of the 30 internal control weaknesses DHS inherited from component agencies. These actions included reinstating procedures to accurately estimate financial data, performing risk assessments of major systems, and instituting processes to ensure accounts receivable and fixed assets are properly recorded. Another 9 of the inherited weaknesses were combined and reported as material weaknesses in DHS's first Performance and Accountability Report, while 5 were combined and reported as reportable conditions. Although combining or reclassifying weaknesses reduces the overall number of weaknesses, it does not resolve the underlying internal control weakness or reduce the level of effort that will be needed to mitigate the weakness. The remaining 7 weaknesses were classified by the department's independent auditors as observations and recommendations.[Footnote 6] Finally, auditors reported 6 additional weaknesses as of September 30, 2003, bringing the total number of DHS reportable conditions to 14 for fiscal year 2003, 7 of which were considered to be material weaknesses. DHS has developed or begun to develop corrective action plans to address 10 of the 14 internal control weaknesses identified in the 2003 financial audit. Sustained attention must be given to resolving all previously reported weaknesses, regardless of their current designation at DHS. DHS is in the early stages of acquiring a financial enterprise solution to consolidate and integrate the department's financial accounting and reporting systems, including budget, accounting and reporting, cost management, asset management, and acquisition and grants functions. According to DHS, the department initiated a financial management systems integration project in August 2003. The completed project is expected to be fully deployed and operational in 2006 at an estimated cost of approximately $146 million. Other agencies have failed in attempts to develop financial management systems with fewer diverse operations. An effective strategic management framework, sustained management oversight, and user acceptance of the efforts, among other things, will be keys to DHS's success. As an interim effort, DHS is working to consolidate the number of legacy financial systems, and reports that it has reduced the overall number of financial service providers. We plan to monitor DHS's efforts as part of our consolidated financial statement audit of the U.S. government. It is too early to tell whether DHS's planned financial enterprise solution will be able to meet the requirements of relevant financial management improvement laws it is currently subject to. As of June 2004, DHS is not subject to the Chief Financial Officers Act of 1990[Footnote 7] (CFO Act) and thus is exempt from FFMIA, which is only applicable to CFO Act agencies. The CFO Act requires major agencies to have a qualified, presidentially appointed, Senate-confirmed Chief Financial Officer (CFO) who reports to the head of the agency. Currently, the CFO at DHS reports to the Under Secretary for Management while directorate CFOs report to the head of their respective directorates, not to DHS's CFO. In addition, while DHS is currently not required to report on its systems' compliance with FFMIA, its auditors disclosed systems deficiencies that indicate that DHS's systems would not have been in substantial compliance with the requirements of FFMIA during its first 7 months of operation. We obtained written comments on a draft of this report from DHS's Chief Financial Officer. In commenting on a draft of this report, DHS generally agreed with the overall findings and recommendations. The comments DHS provided to us are reprinted in appendix IV. Background: In the aftermath of the terrorist attacks of September 11, 2001, responding to potential and real threats to homeland security became one of the federal government's most significant challenges. To address this challenge, the Congress passed, and the President signed, the Homeland Security Act of 2002,[Footnote 8] which merged 22 federal agencies and organizations into DHS, making it the department with the third largest budget in the federal government, about $40 billion for fiscal year 2005.[Footnote 9] In January 2003, we designated implementation and transformation of the new Department of Homeland Security as high risk based on three factors: (1) the implementation and transformation of DHS is an enormous undertaking that will take time to achieve in an effective and efficient manner, (2) components to be merged into DHS already face a wide array of existing challenges, and (3) failure to effectively carry out its mission would potentially expose the nation to very serious consequences.[Footnote 10] As we previously reported,[Footnote 11] one of the department's key challenges is integrating the components' respective financial management systems, many of which were outdated and had limited functionality, as well as addressing weaknesses from the inherited components. The Homeland Security Act of 2002 states that DHS's missions include, among other things, preventing terrorist attacks within the United States, reducing America's vulnerability to terrorism, minimizing subsequent damage, and assisting in the recovery from attacks that do occur. To help accomplish this integrated homeland security mission, the various mission areas and associated programs of 22 federal agencies were merged, in whole or in part, into DHS. The department's organizational structure consists of eight major components--the U.S. Coast Guard (Coast Guard), the U.S. Secret Service, the Bureau of Citizenship and Immigration Services (CIS), and five directorates, each of which is headed by an Under Secretary: Information Analysis and Infrastructure Protection, Science and Technology, Border and Transportation Security, Emergency Preparedness and Response, and Management. Within the Management Directorate is DHS's Office of the Chief Financial Officer (OCFO), which is assigned primary responsibility for functions, such as budget, finance and accounting, strategic planning and evaluation, and financial systems for the department. OCFO is also charged with ongoing integration of these functions within the department. The CFO Act requires the agency's CFO to develop and maintain an integrated accounting and financial management system that provides for complete, reliable, and timely financial information that facilitates the systematic measurement of performance at the agency, the development and reporting of cost information, and the integration of accounting and budget information. The act also requires that the agency's CFO be qualified, presidentially appointed, approved by the Senate, and report to the head of the agency. FFMIA requires that CFO Act agencies implement and maintain financial management systems that substantially comply with federal financial management systems requirements, applicable accounting standards, and the U.S. Government Standard General Ledger at the transaction level. It also requires auditors to report whether the agency's financial management systems substantially comply with the three requirements of FFMIA. While not required to comply with provisions of the CFO Act or FFMIA, the Accountability of Tax Dollars Act of 2002,[Footnote 12] requires DHS to prepare and have audited financial statements annually.[Footnote 13] The Accountability of Tax Dollars Act of 2002, however, does not require compliance with the CFO Act or FFMIA. In identifying improved financial performance as one of its five governmentwide initiatives, the President's Management Agenda recognized that an unqualified financial audit opinion[Footnote 14] is a basic prescription for any well-managed organization and that without sound internal control and accurate and timely financial information, it is not possible to accomplish the agenda and secure the best performance and highest measure of accountability for the American people. In addition, the Joint Financial Management Improvement Program (JFMIP) Principals[Footnote 15] have defined certain measures, in addition to receiving an unqualified financial statement opinion, for achieving financial management success. These additional measures include being able to routinely provide timely, accurate, and useful financial and performance information, having neither material internal control weaknesses nor material noncompliance with laws and regulations, and meeting the requirements of FFMIA. DHS obtained a consolidated financial audit for the 7-month period from March 1, 2003, to September 30, 2003, and received a qualified opinion from its independent auditors on its consolidated balance sheet as of September 30, 2003, and the related statement of custodial activity for the 7 months ending September 30, 2003. Auditors were unable to opine on the consolidated statements of net costs and changes in net position, combined statement of budgetary resources, and consolidated statement of financing. The auditors reported 14 reportable conditions on internal control, 7 of which were considered to be material weaknesses. DHS Inherited Significant Weaknesses from Its Component Agencies: When DHS was created in March 2003 and merged with 22 diverse agencies, there were many known financial management weaknesses and vulnerabilities in the inherited agencies. For 5 of the agencies that transferred to DHS--Customs Service (Customs), Transportation Security Administration (TSA), Immigration and Naturalization Service (INS), Federal Emergency Management Agency (FEMA), and Federal Law Enforcement Training Center (FLETC)--auditors had reported 30 reportable conditions, 18 of which were considered material internal control weaknesses. Further, of the four component agencies--Customs, TSA, INS, and FEMA--that had previously been subject to stand-alone audits, all four agencies' systems were found not to be in substantial compliance with the requirements of FFMIA. Most of the 22 components that transferred to DHS had not been subjected to significant financial statement audit scrutiny prior to their transfer, so the extent to which additional significant internal control deficiencies existed was unknown. For example, conditions at the Coast Guard have surfaced because of its greater relative size and increased audit scrutiny at DHS as compared to its former legacy agency, the Department of Transportation (DOT). As part of DOT's financial statement audit, the Coast Guard had no specifically attributable reported weaknesses identified. However, newly identified weaknesses related to the Coast Guard were one of the main reasons that independent auditors issued a qualified opinion on DHS's consolidated balance sheet and why they were unable to provide an opinion on other financial statements for the 7 months ending September 30, 2003. For fiscal year 2002 and prior to its transfer to DHS, Customs' auditors reported[Footnote 16] nine internal control weaknesses, including weaknesses in its ability to monitor the effectiveness of its internal controls over entry duties and taxes, controls over drawback claims,[Footnote 17] security issues in information technology (IT) systems, and issues concerning the strength of its core financial systems. These weaknesses can result in inaccurate reporting of certain material elements of Customs' financial situation, system security weaknesses that could leave Customs' information vulnerable to unauthorized access, and the necessity of extensive manual procedures and analyses to process routine transactions. Finally, these weaknesses contributed to Customs' systems inability to substantially comply with the requirements of FFMIA. Although TSA is a relatively new agency formed after the September 11, 2001, terror attacks, its auditors reported six internal control weaknesses, including weaknesses in the hiring of qualified personnel, financial reporting and systems, property accounting and financial reporting, financial management policies, administration of screener contracts, and maintenance of adequate information in its personnel files. These weaknesses can result in uncontrolled spending of taxpayer dollars, misplaced or unaccounted for property, and challenges in producing financial statements. In its first year audit ending September 30, 2002, TSA obtained an unqualified audit opinion on its financial statements. However, TSA's systems did not substantially comply with the requirements of FFMIA. INS's auditors reported four internal control weaknesses as of February 28, 2003,[Footnote 18] including weaknesses in the functionality of its financial systems; recording accounts payable and related accruals; financial reporting; and controls over its financial management system. Weaknesses such as these have existed for several years and contribute to INS's systems continuing inability to substantially comply with the requirements of FFMIA. Although the weaknesses did not interfere with the agency's ability to obtain an unqualified opinion on its financial statement audit, they did result in the need for extensive manual effort to prepare reliable financial information and record basic financial transactions to aid management in decision making. FEMA's auditors reported seven internal control weaknesses for fiscal year 2002, including weaknesses in information security controls over its financial systems environment; financial system functionality; financial reporting process; real and personal property system processes; account reconciliation processes; accounts receivable processes; and the lack of a process to evaluate the accuracy of a new claims estimation methodology. These weaknesses resulted in the need for extensive manual effort to compile financial information because FEMA's financial systems were unable to perform certain basic accounting functions efficiently. Further, FEMA's systems were unable to accurately track basic accounting information, such as real and personal property and accounts receivable. Many of these weaknesses specifically contributed to FEMA's systems' failure to substantially comply with the requirements of FFMIA. Finally, FLETC's auditors reported four internal control weaknesses for fiscal year 2002. These weaknesses resulted from FLETC not having adequate policies and procedures in place to ensure that funds obligated were proper and that costs for construction in progress were recorded properly. Further, auditors found that FLETC was not taking the steps necessary to be in compliance with certain Office of Management and Budget requirements. Many of these weaknesses lead to FLETC's systems' inability to substantially comply with the requirements of FFMIA. Some Progress Made in Addressing Inherited Weaknesses: DHS has made some progress in addressing the internal control weaknesses it inherited from component agencies. Nine of the 30 internal control weaknesses identified in prior component financial statement audits have been closed as of September 30, 2003. The remaining 21 issues represent continuing weaknesses that have been reported in DHS's first Performance and Accountability Report. Nine of these were combined and reported as 3 material weaknesses, while 5 were reported as reportable conditions. The department's independent auditors classified the remaining 7 weaknesses as lower level observations and recommendations. Table 1 summarizes the status of the 30 weaknesses DHS inherited from component agencies as of September 30, 2003. Table 1: Status of 30 Inherited Weaknesses in 2003 Audit: Closed: 9. Classified as material weaknesses for 2003: 9. Classified as reportable conditions for 2003: 5. Classified as observation and recommendation for 2003: 7. Total: 30. Source: GAO based on DHS's fiscal year 2003 Performance and Accountability Report. [End of table] Auditors reported 6 additional weaknesses as of September 30, 2003, bringing the total number of reportable conditions for DHS to 14 for fiscal year 2003, 7 of which were considered to be material weaknesses. A description of these weaknesses can be found in appendix II. As mentioned previously, several of the departmentwide weaknesses resulted from combining previously identified weaknesses or reclassifying them, rather than from resolving the underlying internal control weaknesses. For example, in fiscal year 2003, DHS's auditors reported a departmentwide material weakness related to financial systems functionality and technology. This weakness resulted from combining what accounted for 7 of the inherited weaknesses--3 from Customs, 2 from FEMA, 1 from INS, and 1 from TSA. Appendix III provides detailed information on the status of each of the 30 inherited weaknesses, including how they were reported in DHS's Performance and Accountability Report. Component agencies took various steps to resolve nine of the previously identified weaknesses inherited from component agencies. For example, Customs had a previously identified weakness related to the effectiveness of its internal controls over accurate reporting of entry duties and taxes. This weakness was resolved by reinstituting a program that Customs had in place prior to the terrorist attacks of September 11, 2001, which allows for more accurate reporting of these taxes and duties. Another weakness DHS inherited relates to FEMA's inability to identify and record certain accounts receivable in a timely manner. FEMA's accounts receivable processes were strengthened to ensure that accounts receivable are determined and recorded on a timely basis. In order to resolve several weaknesses at FLETC and TSA, various policies and procedures were implemented at these components to ensure that financial information was recorded and properly approved. Further, TSA has hired additional staff, thereby resolving its weaknesses of not having a sufficient number of qualified accounting personnel. In addition to the 7 material weaknesses and 7 reportable conditions reported in DHS's 2003 financial statement audit, DHS reported 12 additional weaknesses that affect the department's full compliance with certain objectives of 31 U.S.C. 3512(c), (d) (commonly known as the Federal Managers' Financial Integrity Act of 1982 (FMFIA)). FMFIA requires that management ensure that it has an organizational structure that supports the planning, directing, and controlling of operations to meet agency objectives; clearly defines key areas of authority and responsibility; and provides for appropriate lines of reporting. The standards also define internal control as a key component necessary to ensure that financial reporting information is reliable. Examples of the FMFIA weaknesses reported by DHS included deficient controls over laws and regulations regarding the border entry process, nonconformance related to system security, and lack of oversight and administration of major contracts at TSA. Of the seven departmentwide material weaknesses reported by DHS's auditors for fiscal year 2003, four were newly identified and contributed to the auditors' inability to render an opinion on all of DHS's financial statements. Newly identified weaknesses included the lack of procedures at DHS to verify the accuracy and completeness of balances transferred on March 1, 2003, and significant weaknesses with the number of qualified financial management personnel employed by the department. DHS's auditors also found significant deficiencies at the Coast Guard and Secret Service, preventing them from being able to express an opinion on certain financial statements. In addition to the internal control weaknesses cited in its 2003 financial statement audit, there were other weaknesses that, while not material to DHS on a departmentwide basis, are still important weaknesses that need to be addressed. FEMA, Customs, and TSA each had weaknesses at the time of their transfer to DHS. However, in the 2003 audit report, these weaknesses were classified as observations and recommendations, a much less serious classification. Lower classification within DHS does not mean that the issues are now somehow less severe, it merely refers to the materiality of a component within DHS. Considered against operations or assets of the stand-alone entity, these issues by themselves were relatively more significant than when considered in the context of the much larger consolidated operations of DHS as a whole. Resolving all previously reported internal control weaknesses, regardless of the current designation at DHS, is key to DHS's ability to produce relevant and reliable financial information. DHS's CFO testified that the department is committed to resolving the remaining weaknesses and has developed a plan to do so. According to the CFO's plans, corrective actions will be developed by each applicable bureau or directorate and submitted to the OCFO. Currently, DHS's OCFO has compiled a summary document with the corrective action plans as submitted by the applicable bureau or directorate. According to this document, corrective action plans of varying levels of detail are in place to address 12 of the 14 internal control weaknesses, some of which are scheduled to be completed by the end of fiscal year 2004. However, 2 material internal control weaknesses--Financial Systems Functionality and Technology and Transfer of Funds, Assets, and Liabilities to DHS--do not currently have any planned corrective actions in place. Along with developing corrective action plans, the CFO testified that DHS plans to implement a departmentwide tracking system to monitor the status of corrective actions. DHS has begun working with a contractor to design and implement a tracking system for outstanding weaknesses identified during the department's independent financial audits. While this system is still being developed by the OCFO, with assistance from contractors, it is not yet fully functional and does not include information on all reported weaknesses. Until such time that it does, it will provide limited oversight and information on the status of corrective actions to address weaknesses at DHS. While progress has been made to address the known material weaknesses, much work still remains. Follow-through with planned corrective actions is paramount. The support of top officials at the department will be key in ensuring that the necessary resources are available to address the weaknesses and to ensure that they are resolved in a timely manner. DHS Is in the Early Stages of Integrating Its Financial Management Systems: DHS intends to acquire and deploy an integrated financial enterprise solution and reports that it has reduced the number of its legacy financial systems. DHS has established the Resource Management Transformation Office (RMTO) within the Management Directorate to manage its financial enterprise solution project. However, the acquisition is in the early stages, and continued focus and follow through, among other things, will be necessary for it to be successful. RMTO has termed its financial enterprise solution project "electronically Managing enterprise resources for government effectiveness and efficiency" (eMerge2), which according to the RMTO's Strategic Framework, "establishes the strategic direction for migration, modernization, and integration of DHS financial, accounting, procurement, personnel, asset management and travel systems, processes, and policies." DHS expects the acquisition and implementation of the financial enterprise solution to take place over a 3-year time period and cost approximately $146 million. According to the strategic framework DHS provided to us, the development of an integrated financial enterprise solution will be accomplished in three phases. Phase I includes defining, acquiring, and testing the planned solution. Phase II involves implementing the solution throughout DHS, and Phase III is ongoing maintenance of the solution. According to DHS, the eMerge2 initiative is currently in Phase I, which is to be executed in three stages and is expected to be completed in late 2004. Figure 1 represents the three stages of Phase I and the timelines as of August 2003 and May 2004, according to the DHS RMTO Strategic Frameworks provided to us. Figure 1: Phase I Timeline: [See PDF for image] [End of figure] According to plans DHS's RMTO developed early in Phase I, completion of core requirements development was to have been completed between September 2003 and mid-February 2004. However, in updated plans dated May 2004, the core requirements development actually began in January 2004 and was to be completed in May 2004. The earlier plans' timeline also called for requesting vendor solution proposals in October 2003, with final vendor selection to occur in April or May of 2004. However, vendor proposal requests were issued in June 2004 and selection is to be completed in July 2004. Concurrent with eMerge2, DHS has issued a request for quotation (RFQ) for an interim project--the Business Automation Initiative--to be developed by contractors during 2004. The RFQ requested system proposals to automate purchase requests for the department and to streamline the employee entry/exit process. Another interim initiative was considered by the department to integrate data mining and warehousing, improve grants visibility (beginning with first responder grants), and streamline financial statement consolidation. However, instead of pursuing this interim solution, DHS plans to include it in the requirements of the eMerge2 initiative. Of key importance in the development of any DHS system solution acquisition, interim or not, is how the acquisition fits within the future overall plans of DHS as outlined in its enterprise architecture, which is still being developed. It would be duplicative and wasteful to implement a short- term solution that is not part of the long-term integration plans at DHS. According to DHS officials, the RMTO recently completed the requirements definition phase for the eMerge2 initiative and obtained approval of the requirements from various high-level DHS officials. Additionally, a request for proposal (RFP) was issued by DHS for the eMerge2 initiative in June 2004. The RFP is scheduled to be open for approximately 1 month and then a vendor will be chosen. DHS has developed various planning documents for the eMerge2 initiative. However, these documents were not provided to us until after we completed our fieldwork. Thus, we are not providing description, analysis, or evaluation of such information in this report, and we are unable to determine if DHS, through the RMTO, is developing a financial enterprise solution that will be in alignment with departmentwide information technology plans, many of which are still under development. Nevertheless, we have found that similar projects have proven challenging and costly for other federal agencies. For example, we have reported on the efforts of National Aeronautics and Space Administration[Footnote 19] (NASA), and the District of Columbia Courts[Footnote 20] (DC Courts) to acquire new information systems. NASA is on its third attempt in 12 years to modernize its financial management process and systems, and has spent about $180 million on its two prior failed efforts. DC Courts began its system acquisition in 1998 and has struggled in its implementation. One of the key impediments to the success of integration efforts at NASA was the failure to involve key stakeholders in the implementation or evaluation of system improvements. As a result, new systems failed to meet the needs of key stakeholders. DC Courts struggled in developing requirements that contained the necessary specificity to ensure the system developed would meet its users' needs. To avoid similar problems, it is important, among other things, that DHS ensure commitment and extensive involvement from top management and users in eMerge2. Over the past year, DHS has reported that it has reduced the number of financial management service providers for the department from the 19 providers at the time DHS was formed to the 10 it currently uses. DHS has plans to further consolidate to 7 providers. A DHS official estimated approximately $5 million in savings through the reduction of the number of financial management service centers. Table 2 shows the decreases that have occurred in service providers from March 2003 to May 2004. Table 2: Decreases in Service Providers from March 2003 to May 2004: Service provider type: Financial management service centers; March 2003: 19; May 2004: 10; Decrease: 9. Service provider type: Contracting offices; March 2003: 13; May 2004: 8; Decrease: 5. Service provider type: Human resource offices; March 2003: 22; May 2004: 7; Decrease: 15. Service provider type: Payroll offices; March 2003: 7; May 2004: 3; Decrease: 4. Service provider type: Property management offices; March 2003: 22; May 2004: 3; Decrease: 19. Service provider type: Total; March 2003: 83; May 2004: 31; Decrease: 52. Source: GAO based on DHS-provided information. [End of table] This continued focus on consolidation and integration of services and service providers, if implemented properly, could aid the department in realizing further savings and efficiencies in support of its overall mission. Although we did not perform audit procedures to determine the impact of these reductions, reduction of service providers prematurely, without considering the provider's reliability, or without an overall consolidation plan, could be negative if it interferes with the enterprise approach or causes significant short-term inefficiencies for agencies that must quickly adapt to other systems. It Is Not Known Whether DHS's Planned Financial Management Systems Will Be Able to Meet the Requirements of Relevant Financial Management Improvement Laws: It is too early to tell whether DHS's planned financial enterprise solution will be able to meet the requirements of relevant financial management improvement laws--those currently applicable to DHS (such as FMFIA), as well as some not applicable that are subject to pending legislation. DHS is currently subject to most financial management improvement laws except for the CFO Act and FFMIA. The goals of the CFO Act and FFMIA are to provide the Congress and agency management with reliable financial information for managing and making day-to-day decisions and to improve financial management systems and controls to properly safeguard the government's assets. Further, the CFO Act requires certain agencies to have a qualified, presidentially appointed, Senate-confirmed CFO who reports to the head of the agency.[Footnote 21] FFMIA requires major departments and agencies covered by the CFO Act to implement and maintain financial management systems that comply substantially with (1) federal financial management systems requirements, (2) applicable federal accounting standards, and (3) the U.S. Government Standard General Ledger at the transaction level. Although DHS is not currently subject to FFMIA, its auditors disclosed systems deficiencies in its financial management information systems, the application of accounting standards, and recording of financial transactions, all of which relate to the requirements of FFMIA. Based on these weaknesses it is likely that DHS's systems would not have been in substantial compliance with the requirements of FFMIA. Table 3 lists relevant financial management laws and describes their relationship to DHS. Table 3: Key Financial Management Improvement Laws: Law: Chief Financial Officers Act of 1990; DHS covered? No; Requirement: Requires agencies to develop and maintain an integrated accounting and financial management system that provides for (1) complete, reliable, consistent, and timely information that is responsive to the financial information of the agency and facilitates the systematic measurement of performance; (2) the development and reporting of cost management information; (3) the integration of accounting and budget information; and (4) requires that the agency's CFO be qualified, presidentially appointed, approved by the Senate, and report to the head of the agency; Impact of legislation on DHS: H.R. 4259 and S. 1567, which are now under consideration before the Congress, would make DHS a CFO Act agency; The current CFO of DHS reports to the Under Secretary for Management. Each directorate has separate CFOs who report to their respective directorate head. Law: Federal Financial Management Improvement Act of 1996; DHS covered? No; Requirement: Requires the major departments and agencies covered by the CFO Act to implement and maintain financial management systems that comply substantially with (1) federal financial management systems requirements, (2) applicable federal accounting standards, and (3) the U.S. Government Standard General Ledger at the transaction level. Requires auditors to include in their CFO Act audit reports whether the agency's financial management systems comply with FFMIA's requirements; Impact of legislation on DHS: DHS is not currently required to comply with FFMIA standards. Auditors did disclose systems deficiencies in its financial management information systems, the application of accounting standards, and recording of financial transactions, all of which relate to the requirements of FFMIA. Law: Accountability of Tax Dollars Act of 2002; DHS covered? Yes; Requirement: Requires non-CFO Act agencies to obtain annual financial statement audits, unless specifically exempted by OMB or already statutorily required to obtain an annual audit; Impact of legislation on DHS: DHS obtained an audit for the 7 months ending September 30, 2003. Law: 31 U.S.C. 3512(c), (d) (commonly known as the Federal Managers' Financial Integrity Act of 1982 (FMFIA)); DHS covered? Yes; Requirement: Requires agency management to ensure that they have effective control over, and accountability for, its assets. To ensure compliance, it requires the agency head to establish internal accounting and administrative controls and report whether the agency's systems comply; Impact of legislation on DHS: In its 2003 financial statement audit, auditors reported 12 weaknesses that would affect DHS's full compliance with FMFIA. Law: Government Performance and Results Act of 1993; DHS covered? Yes; Requirement: Requires each agency to develop strategic plans covering a period of at least 5 years. It also requires each agency to prepare an annual performance plan that includes the performance indicators that will be used to measure "the relevant outputs, service levels, and outcomes of each program activity" in an agency's budget; Impact of legislation on DHS: DHS has prepared a performance budget to comply with this act. Law: Clinger-Cohen Act of 1996; DHS covered? Yes; Requirement: Requires agencies to establish goals for improving efficiency and effectiveness of their operations through the effective use of IT. Performance measurements must be established that assess how well IT supports agency programs. Where comparable processes and organizations exist, agency heads must benchmark agency process performance against comparable processes in terms of cost, speed, productivity, and quality of outputs and outcomes. Agency heads must clearly define agency missions and consider appropriate process changes before making significant investments in IT. Agencies must also report annually on operational improvements achieved through the effective use of IT; Impact of legislation on DHS: DHS is in the process of drafting an IT strategic plan, which will be the driving force in establishing DHS's strategic IT management framework. It will discuss how the department plans to manage and use IT to achieve strategic mission goals. According to the CIO, the department is still in the process of completing the IT strategic plan and expects to make it final in mid- 2004. Law: Federal Information Security Management Act (FISMA) of 2002; DHS covered? Yes; Requirement: FISMA requires the designation and establishment of specific responsibilities for an agency senior information officer, implementation of minimum information security requirements for agency information systems, and required agency reporting to the Congress; Impact of legislation on DHS: DHS has created the office of the Chief Information Officer and the Chief Information Security Officer. The September 2003 FISMA Report issued by DHS OIG indicates that DHS has performed reviews of FISMA IT security and has created positions for component information security officers to ensure that information security is coordinated at all levels of the agency. Source: GAO. [End of table] DHS is currently required to have annual audits under the Accountability of Tax Dollars Act and to report on its internal controls under FMFIA. Although DHS's CFO has testified that DHS complies with the audit provisions of the CFO Act and will continue to do so, we believe DHS should be a CFO Act agency and be subject to the requirements of FFMIA. DHS should not be the only cabinet-level department not covered by what is the cornerstone for pursuing and achieving the requisite financial management systems and capabilities in the federal government.[Footnote 22] Given its early implementation, it is too early to tell whether DHS's planned financial enterprise solution will meet the requirements of financial management laws it is currently not subject to. While DHS systems must meet the requirements of laws they are currently subject to, it is also important that DHS be proactive and incorporate the requirements of the CFO Act and FFMIA. It would certainly make good business sense to do so given DHS's size and mission. DHS has implemented a commercial-off-the-shelf tool called Dynamic Object Oriented Requirements System (DOORS) to track the requirements of various laws, regulations, and circulars place on the development of an integrated financial system. DOORS is intended to be DHS's repository of all applicable system, process, technological, data, or other requirements. DHS estimated that several thousand compliance requirements will be tracked using DOORS once analysis is completed. After the repository is complete, requirements reports are to be printed directly from DOORS and attached to future RFPs to ensure that contractors are aware of the legislative requirements of the systems to be developed. A system to record, track, and link all legislative requirements as a financial management system is being developed is important. Also important is that DHS be statutorily required to comply with the CFO Act and FFMIA and that the systems DHS acquires are capable of meeting the requirements of those laws, as well as ones currently applicable. Meeting these financial management improvement requirements will help produce timely and useful financial and business information. Conclusions: Since its inception in March 2003, DHS has been faced with many challenges, including how to integrate its financial management processes and systems. Steps have been taken to address the 30 internal control weaknesses it inherited from its component agencies. However, to ensure financial accountability and establish an effective financial environment, DHS must address all outstanding inherited weaknesses, as well as address the newly identified department-level weaknesses. Through the eMerge2 initiative, DHS has plans to integrate and consolidate its financial and business systems. But without such things as continued active oversight from top-level management and systematic approaches to this integration, DHS could find itself in the same position as other federal departments--producing an ineffective and costly financial management system that does not provide the information needed by management or meet the requirements of financial management laws. Finally, we believe that it is of critical importance that DHS be statutorily required to comply with the important financial management reforms legislated in the CFO Act and FFMIA. The financial management improvements of FFMIA build on the CFO Act by emphasizing the need for agencies to have systems that can generate reliable, useful, and timely information with which to make fully informed decisions and to ensure accountability on an ongoing basis. This issue is still of foremost importance, especially as DHS continues its financial management system integration and development. Matter for Congressional Consideration: In view of the size of DHS and the importance of the CFO Act and FFMIA in improving financial management and its applicability to all other cabinet departments, the Congress may wish to consider the following action: * Enact legislation to designate DHS as a CFO Act agency. Recommendations for Executive Action: We are making eight recommendations for executive action at DHS that will improve financial management at the department. Specifically, we recommend that the Secretary of Homeland Security direct the Under Secretary for Management to do the following: * Continue to maintain strong involvement of key stakeholders and top management throughout the acquisition and implementation of the eMerge2 initiative. * Assess the impact of further reduction in financial service providers on DHS staff and their ability to produce timely financial information. * Adhere to FFMIA requirements, including JFMIP requirements, even though the department is not statutorily required to do so. * Have independent auditors report annually on compliance with FFMIA. * Continue to give sustained attention to addressing previously reported material weaknesses, reportable conditions, and observations and recommendations. * Complete development of corrective action plans for all material weaknesses, reportable conditions, and observations and recommendations. * Ensure that internal control weaknesses are addressed at the component level if they were combined or reclassified at the departmentwide level. * Maintain a tracking system of all auditor-identified and management- identified control weaknesses. Agency Comments and Our Evaluation: We obtained written comments on a draft of this report from DHS's Chief Financial Officer. The comments DHS provided to us are reprinted in appendix IV. In commenting on a draft of this report, DHS generally agreed with the overall findings and recommendations. However, in response to our recommendation to incorporate all internal control weaknesses in the tracking system DHS is currently developing, DHS felt the recommendation was too broad and suggested that we change the language to reflect tracking of all auditor-identified and management-identified internal control weaknesses. The original intent of our recommendation was to encourage DHS to track and resolve all auditor reported material weaknesses, reportable conditions, and observations and recommendations, similar to those discussed throughout this report. We fully support DHS including all management-identified control weaknesses as well, and have updated our recommendation accordingly. Additionally, DHS commented on its commitment to full adherence to the CFO Act and FFMIA. We applaud the current leadership at DHS for voluntarily complying with some audit provisions of the CFO Act, however, we continue to strongly support passage of legislation that would statutorily make DHS a CFO Act agency, and thus guarantee future requirements to adhere to important financial management legislation. As arranged with your office, unless you publicly announce its contents earlier, we plan no further distribution of this report until 30 days after the date of this letter. At that time, we will send copies of this report to interested congressional committees and subcommittees. We will also make copies available to others on request. In addition, the report will be available at no charge on GAO's Web site at [Hyperlink, http://www.gao.gov]. If you or your staff have any questions about this report or wish to discuss it further, please contact me at (202) 512-6906 or Casey Keplinger, Assistant Director, at (202) 512-9323. In addition, Heather Dunahoo and Scott Wrightson made key contributions to this report. Sincerely yours, Signed by: McCoy Williams: Director, Financial Management and Assurance: [End of section] Appendixes: Appendix I: Scope and Methodology: To identify what were the existing weaknesses in the Department of Homeland Security's (DHS) component agencies' financial management systems, we reviewed relevant DHS Office of Inspector General (OIG) reports and our January 2003 report on major management challenges at DHS and looked at how such challenges are being addressed. We also reviewed DHS's Performance and Accountability Report for the 7 months ending September 30, 2003. We reviewed prior-period component agency annual financial statement audit reports when available; Immigration and Naturalization Service's (INS) financial statement audit report for the 5 months ending February 28, 2003; and Performance and Accountability Reports for the Federal Emergency Management Agency (FEMA) and the Departments of Transportation, Justice, and Treasury. We reviewed testimony of DHS's current and former Chief Financial Officer (CFO) and DHS's OIG reports related to financial management at the department. Finally, we interviewed officials from the OIG and the Office of the Chief Financial Officer (OCFO). To determine whether DHS was addressing the problems that existed in the financial management systems DHS acquired from its component agencies, we met with officials from the OCFO's Office of Financial Management and OIG staff. In addition to items already mentioned, we reviewed planned corrective actions developed by the department to address its fiscal years 2002 and 2003 material weaknesses and reportable conditions. We also reviewed testimony of DHS's CFO related to this issue. Further, we conducted a walk-through to review the system DHS is developing to track planned corrective actions. To determine what plans DHS has to integrate its financial management systems, we met with the Director of the Resource Management Transformation Office (RMTO) and other staff in this office. We also reviewed testimony of DHS's current and former CFO and DHS's OIG related to financial management at the department. We reviewed documentation detailing the reduction of financial service providers, but we did not complete audit procedures to determine if these reductions were positive or negative for the department. Finally, we reviewed the RMTO's strategic framework. However, substantial documentation related to the eMerge2 initiative was not provided to us until after we completed our fieldwork. Thus, we did not include analysis or evaluation of such information in this report. To determine whether the planned systems that DHS is developing will be able to meet the requirements of relevant financial management improvement laws, we reviewed relevant laws and regulations, and relevant guidance related to financial management, financial reporting, systems implementation, and requirements. We also interviewed the Director of the RMTO and other officials. Further, we reviewed testimony relevant to this issue by DHS's current and former CFO and DHS's OIG. We have not reviewed system requirements or other recently developed plans because these were completed and obtained after our fieldwork was completed. We requested comments on this report from the Secretary of Homeland Security or his designee. Written comments were received from the department's Chief Financial Officer and are reprinted in appendix IV. We performed our review from October 2003 through June 2004 in Washington, D.C., in accordance with U.S. generally accepted government auditing standards. Appendix II: Material Weaknesses and Reportable Conditions at DHS for Fiscal Year 2003: Number: 1; Material weakness: Financial management and personnel: DHS's OCFO needs to establish financial reporting roles and responsibilities, assess critical needs, and establish standard operating procedures (SOP) for the department. These conditions were not unexpected for a newly created organization, especially one as large and complex as DHS. The Coast Guard and the Strategic National Stockpile had weaknesses in financial oversight that have led to reporting problems. Number: 2; Material weakness: Financial reporting: Key controls to ensure reporting integrity were not in place, and inefficiencies made the process more error prone. At the Coast Guard, the financial reporting process was complex and labor-intensive. Several DHS bureaus lacked clearly documented procedures, making them vulnerable if key people leave the organization. Number: 3; Material weakness: Financial systems functionality and technology: The auditors found weaknesses across DHS in its entitywide security program management and in controls over system access, application software development, system software, segregation of duties, and service continuity. Many bureau systems lacked certain functionality to support the financial reporting requirements. Number: 4; Material weakness: Property, plant, and equipment (PP&E): The Coast Guard was unable to support the recorded value of $2.9 billion in PP&E due to insufficient documentation provided prior to the completion of audit procedures, including documentation to support its estimation methodology. The Transportation Security Administration (TSA) lacked a comprehensive property management system and adequate policies and procedures to ensure the accuracy of its PP&E records. Number: 5; Material weakness: Operating materials and supplies (OM&S): Internal controls over physical counts of OM&S were not effective at the Coast Guard. As a result, the auditors were unable to verify the recorded value of $497 million in OM&S. The Coast Guard also had not recently reviewed its OM&S capitalization policy, leading to a material adjustment to its records when an analysis was performed. Number: 6; Material weakness: Actuarial liabilities: The Secret Service did not record the pension liability for certain of its employees and retirees, and when corrected, the auditors had insufficient time to audit the amount recorded. The Coast Guard also was unable to provide, prior to the completion of audit procedures, sufficient documentation to support the recorded value of $201 million in post-service benefit liabilities. Number: 7; Material weakness: Transfers of funds, assets, and liabilities to DHS: DHS lacked controls to verify that monthly financial reports and transferred balances from legacy agencies were accurate and complete. Source: GAO based on DHS Performance and Accountability Report and congressional testimony. [End of table] Number: 1; Reportable condition: Drawback claims on duties, taxes, and fees: The Bureau of Customs and Border Protection's (CBP) accounting system lacked automated controls to detect and prevent excessive drawback claims and payments. Number: 2; Reportable condition: Import entry in-bond: CBP did not have a reliable process of monitoring the movement of "in-bond" shipments-- i.e., merchandise traveling through the U.S. that is not subject to duties, taxes, and fees until it reaches a port of destination. CBP lacked an effective compliance measurement program to compute an estimate of underpayment of related duties, taxes, and fees. Number: 3; Reportable condition: Acceptance and adjudication of immigration and naturalization applications: The Bureau of Citizenship and Immigration Services' (CIS) process for tracking and reporting the status of applications and related information was inconsistent and inefficient. Also, CIS did not perform cycle counts of its work in process that would facilitate the accurate calculation of deferred revenue and reporting of related operational information. Number: 4; Reportable condition: Fund balance with Treasury (FBWT): The Coast Guard did not perform required reconciliations for FBWT accounts and lacked written standard operating procedures (SOP) to guide the process, primarily as the result of a new financial system that substantially increased the number of reconciling differences. Number: 5; Reportable condition: Intragovernmental balances: Several large DHS bureaus had not developed and adopted effective SOPs or established systems to track, confirm, and reconcile intragovernmental balances and transactions with their trading partners. Number: 6; Reportable condition: Strategic National Stockpile (SNS): The SNS accounting process was fragmented and disconnected, largely due to operational challenges caused by the laws governing SNS. A $485 million upwards adjustment had to be made to value SNS in DHS's records properly. Number: 7; Reportable condition: Accounts payable and undelivered orders: CIS and the Bureau of Immigration and Customs Enforcement (ICE), TSA, and the Coast Guard had weaknesses in their processes for accruing accounts payable or reporting accurate balances for undelivered orders. Source: GAO based on DHS Performance and Accountability Report and congressional testimony. [End of table] Appendix III: Disposition of Reported Internal Control Weaknesses by Component: Agency and Condition Reported in 2002: U.S. Customs Service: Material Weaknesses: 1. Entry Duties and Taxes; 2003 Status and Disposition: Closed. Agency and Condition Reported in 2002: U.S. Customs Service: Material Weaknesses: 2. Drawback Claims on Duties and Taxes; 2003 Status and Disposition: Reportable Condition (Drawback Claims on Duties, Taxes, and Fees). Agency and Condition Reported in 2002: U.S. Customs Service: Material Weaknesses: 3. Financial Systems Security; 2003 Status and Disposition: Material Weakness (Financial Systems Functionality and Technology). Agency and Condition Reported in 2002: U.S. Customs Service: Material Weaknesses: 4. Financial Systems Integration; 2003 Status and Disposition: Material Weakness (Financial Systems Functionality and Technology). Agency and Condition Reported in 2002: U.S. Customs Service: Reportable Conditions: 5. Bonded Warehouse and Foreign Trade Zones; 2003 Status and Disposition: Observation & Recommendations to Management. Agency and Condition Reported in 2002: U.S. Customs Service: Reportable Conditions: 6. In-bond Movements; 2003 Status and Disposition: Reportable Condition (In-bond Movement of Imported Goods). Agency and Condition Reported in 2002: U.S. Customs Service: Reportable Conditions: 7. Drawback in New York and Newark; 2003 Status and Disposition: Observation & Recommendations to Management. Agency and Condition Reported in 2002: U.S. Customs Service: Reportable Conditions: 8. Financial Systems Entity-wide Security; 2003 Status and Disposition: Material Weakness (Financial Systems Functionality and Technology). Agency and Condition Reported in 2002: U.S. Customs Service: Reportable Conditions: 9. Internal Control over Laws and Regulations; 2003 Status and Disposition: Closed. Agency and Condition Reported in 2002: Immigration and Naturalization Service (as of February 28, 2003): Material Weaknesses: 10. Financial Systems Functionality; 2003 Status and Disposition: Reportable Condition (Acceptance and Adjudication of Immigration and Naturalization Applications). Agency and Condition Reported in 2002: Immigration and Naturalization Service (as of February 28, 2003): Material Weaknesses: 11. Accounts Payable; 2003 Status and Disposition: Reportable Condition (Accounts Payable and Undelivered Orders). Agency and Condition Reported in 2002: Immigration and Naturalization Service (as of February 28, 2003): Material Weaknesses: 12. Financial Reporting; 2003 Status and Disposition: Observation & Recommendations to Management. Agency and Condition Reported in 2002: Immigration and Naturalization Service (as of February 28, 2003): Reportable Conditions: 13. Information Systems; 2003 Status and Disposition: Material Weakness (Financial Systems Functionality and Technology). Agency and Condition Reported in 2002: Federal Emergency Management Agency: Material Weaknesses: 14. Information Security; 2003 Status and Disposition: Material Weakness (Financial Systems Functionality and Technology). Agency and Condition Reported in 2002: Federal Emergency Management Agency: Material Weaknesses: 15. Financial Systems Functionality; 2003 Status and Disposition: Material Weakness (Financial Systems Functionality and Technology). Agency and Condition Reported in 2002: Federal Emergency Management Agency: Material Weaknesses: 16. Financial Reporting; 2003 Status and Disposition: Material Weakness (Financial Reporting). Agency and Condition Reported in 2002: Federal Emergency Management Agency: Material Weaknesses: 17. Real and Personal Property; 2003 Status and Disposition: Observation & Recommendations to Management. Agency and Condition Reported in 2002: Federal Emergency Management Agency: Material Weaknesses: 18. Account Reconciliation; 2003 Status and Disposition: Reportable Condition (Intragovernmental Balances). Agency and Condition Reported in 2002: Federal Emergency Management Agency: Material Weaknesses: 19. Accounts Receivable; 2003 Status and Disposition: Closed. Agency and Condition Reported in 2002: Federal Emergency Management Agency: Reportable Conditions: 20. Cerro Grande; 2003 Status and Disposition: Closed. Agency and Condition Reported in 2002: Federal Law Enforcement Training Center: Reportable Conditions: 21. Policies and Procedures; 2003 Status and Disposition: Closed. Agency and Condition Reported in 2002: Federal Law Enforcement Training Center: Reportable Conditions: 22. Laws and Regulations (OMB Circular A-127); 2003 Status and Disposition: Closed. Agency and Condition Reported in 2002: Federal Law Enforcement Training Center: Reportable Conditions: 23. Real Property Accounting; 2003 Status and Disposition: Closed. Agency and Condition Reported in 2002: Federal Law Enforcement Training Center: Reportable Conditions: 24. Laws and Regulations (OMB Circular A-11); 2003 Status and Disposition: Observation & Recommendations to Management. Agency and Condition Reported in 2002: Transportation Security Administration: Material Weaknesses: 25. Human Resources; 2003 Status and Disposition: Closed. Agency and Condition Reported in 2002: Transportation Security Administration: Material Weaknesses: 26. Financial Reporting and Systems; 2003 Status and Disposition: Material Weaknesses (Financial Reporting; Financial Systems Functionality and Technology). Agency and Condition Reported in 2002: Transportation Security Administration: Material Weaknesses: 27. Property, Plant, and Equipment; 2003 Status and Disposition: Material Weakness (Property, Plant, and Equipment). Agency and Condition Reported in 2002: Transportation Security Administration: Material Weaknesses: 28. Financial Management Policies; 2003 Status and Disposition: Observation & Recommendations to Management. Agency and Condition Reported in 2002: Transportation Security Administration: Material Weaknesses: 29. Administration of Screener Contracts; 2003 Status and Disposition: Closed. Agency and Condition Reported in 2002: Transportation Security Administration: Reportable Conditions: 30. Personnel Files; 2003 Status and Disposition: Observation & Recommendations to Management. Source: GAO based on DHS Performance and Accountability Report. [End of table] Appendix IV: Comments from the Department of Homeland Security: U.S. Department of Homeland Security Washington, DC 20528: Homeland Security: July 13, 2004: Mr. McCoy Williams: Director, Financial Management and Assurance: U.S. General Accounting Office: Washington, DC 20548: RE: Draft GAO-04-774, FINANCIAL MANAGEMENT. Department of Homeland Security Faces Significant Financial Management Challenges, GAO Engagement 195026: Thank you for the opportunity to review the draft report GAO-04-774, FINANCIAL MANAGEMENT: Department of Homeland Security Faces Significant Financial Management Challenges. The Department of Homeland Security generally agrees with GAO's recommendations. DHS is in the early phase of amalgamating redundant financial management systems associated with 22 discrete entities into an enterprise wide financial system, eMerge2, that will be implemented in 2005 and 2006. eMerge2 is the Department's financial enterprise solution program "electronically Managing enterprise resources for government effectiveness and efficiency." This project establishes the strategic direction for migration, modernization, and integration of DHS financial, accounting, procurement, personnel, asset management and travel systems, and processes. Under the Secretary's leadership, key stakeholder and top management support of eMerge2 has been evident throughout the past year and we have every expectation of their sustained interest through the acquisition and implementation stages. During the interim, we have established processes to ensure that the Department addresses and resolves both identified weaknesses and internal control deficiencies in our legacy financial systems as well as deterring and curtailing future deficiencies. Additionally, DHS wants to provide an update regarding the eMerge2 program. Since the GAO team completed its field work for this GAO review, the eMerge2 final requirements analysis has been completed. The specifications for the eMerge2 system includes adherence to all federal financial system requirements: FFMIA, JFMIP, USSGL, OMB Circulars, etc., indicating our commitment to full adherence to the CFO Act and FFMIA. We also want to take this opportunity to reaffirm the Department's commitment to resolving all identified weaknesses through the development of plans to implement corrective actions. For the most part, we concur with the report's recommendations. However, we suggest a modification to recommendation #8. Currently, the recommendation asks DHS to "Incorporate all types of internal control weaknesses in the tracking system being developed." We believe the recommendation, as written, is overly broad. We suggest that it be changed to read: "Maintain a tracking system of all auditor-identified and management-identified control weaknesses." In conclusion, we thank you for a well balanced report that provides us with an analytical assessment appropriate to the stage we are at in the process of organizational consolidation and moving forward to a unified financial management system. Sincerely, Signed by: Andrew B. Maner Chief Financial Officer Department of Homeland Security: (195026): FOOTNOTES [1] For example, see U.S. General Accounting Office, Major Management Challenges and Program Risk: Department of Homeland Security, GAO-03- 102 (Washington, D.C.: January 2003) and Department of Homeland Security: Challenges and Steps in Establishing Sound Financial Management, GAO-03-1134T (Washington, D.C.: Sept. 10, 2003). [2] Relevant laws include those currently applicable to DHS as well as some not currently applicable that are the subject of pending legislation. [3] Under standards issued by the American Institute of Certified Public Accountants, "reportable conditions" are matters coming to the auditors' attention relating to significant deficiencies in the design or operation of internal controls that, in the auditors' judgment, could adversely affect the department's ability to record, process, summarize, and report financial data consistent with the assertions of management in the financial statements. [4] Material weaknesses are reportable conditions in which the design or operation of one or more of the internal control components does not reduce to a relatively low level the risk that misstatements in amounts that would be material in relation to the financial statements being audited may occur and not be detected within a timely period by employees in the normal course of performing their assigned functions. [5] Division A, Section 101(f), Title VIII of Public Law 104-208 is entitled the Federal Financial Management Improvement Act of 1996. FFMIA requires the major departments and agencies covered by the CFO Act to implement and maintain financial management systems that comply substantially with (1) federal financial management systems requirements, (2) applicable federal accounting standards, and (3) the U.S. Government Standard General Ledger at the transaction level. [6] Observations and recommendations are weaknesses that do not meet the criteria for reportable conditions and are typically communicated from the auditor to the appropriate level of entity management in a management letter. [7] Pub. L. No. 101-576, 104 Stat. 2838 (Nov. 15, 1990). [8] Pub. L. 107-296, 116 Stat. 2135 (Nov. 25, 2002). [9] U.S. Department of Homeland Security, Budget in Brief: Fiscal Year 2005. [10] See GAO-03-102. [11] See GAO-03-1134T. [12] Pub. L. No. 107-289, 116 Stat. 2049 (Nov. 7, 2002). [13] An audit includes examining, on a test basis, evidence supporting the amounts and disclosures in the financial statements, assessing the accounting principles used and significant estimates made by management, and evaluating the overall consolidated financial statement presentation. [14] An unqualified audit opinion indicates that the balances in the financial statements are free of significant errors known as material misstatements. [15] The JFMIP Principals are the Secretary of the Treasury, the Directors of the Office of Management and Budget (OMB) and the Office of Personnel Management (OPM), and the Comptroller General of the United States. [16] Customs' auditors performed an internal control review, not a full scope financial statement audit. [17] Drawback is a remittance, in whole or in part, of duties, taxes, or fees previously paid by an importer. Drawback typically occurs when the imported goods on which duties, taxes, or fees that have previously been paid are subsequently exported from the United States or destroyed prior to entering the commerce of the U.S. Depending on the type of claim, the claimant has up to 8 years from the date of importation to file for drawback. [18] INS obtained an independent financial statement audit for the 5 month period October 1, 2002, to February 28, 2003-prior to its transfer to DHS. [19] U.S. General Accounting Office, Information Technology: Architecture Needed to Guide NASA's Financial Management Modernization, GAO-04-43 (Washington, D.C.: Nov. 21, 2003) and National Aeronautics and Space Administration: Significant Actions Needed to Address Long- standing Financial Management Problems, GAO-04-754T (Washington, D.C.: May 19, 2004). [20] U.S. General Accounting Office, DC Courts: Disciplined Processes Critical to Successful System Acquisition, GAO-02-316 (Washington, D.C.: Feb. 28, 2002). [21] Currently, the CFO at DHS reports to the Under Secretary for Management while directorate CFO's report to the head of the respective directorates, not to DHS's CFO. [22] See GAO-03-1134T. GAO's Mission: The Government Accountability Office, the investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through the Internet. GAO's Web site ( www.gao.gov ) contains abstracts and full-text files of current reports and testimony and an expanding archive of older products. The Web site features a search engine to help you locate documents using key words and phrases. You can print these documents in their entirety, including charts and other graphics. Each day, GAO issues a list of newly released reports, testimony, and correspondence. GAO posts this list, known as "Today's Reports," on its Web site daily. The list contains links to the full-text document files. To have GAO e-mail this list to you every afternoon, go to www.gao.gov and select "Subscribe to e-mail alerts" under the "Order GAO Products" heading. Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Public Affairs: Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.