Department of Homeland Security

Formidable Information and Technology Management Challenge Requires Institutional Approach Gao ID: GAO-04-702 August 27, 2004

In 2003 GAO designated the merger of 22 separate federal entities into the Department of Homeland Security (DHS) as a high risk area because of the criticality of the department's mission and the enormous transformation challenges that the department faced. Given that the effective use of information technology (IT) is a critical enabler of this merger, GAO has previously reported on a number of DHS efforts aimed at institutionalizing an effective information and technology governance structure and investing in new IT systems that are intended to better support mission operations. Now that DHS has been operating for over a year, GAO was asked to, based largely on its prior work, describe DHS's progress in meeting its information and technology management challenge.

DHS's overall IT challenge is to standardize and integrate the legacy system environments and management approaches that it inherited from its predecessor agencies, while concurrently attempting to ensure that present levels of IT support for critical homeland security operations are not only maintained but improved in the near term. To accomplish this, the department is in the process of instituting seven information and technology management disciplines that are key elements of an effective information and technology management structure. DHS's progress in institutionalizing these key information and technology management elements has been mixed, and overall remains a work in progress. Such progress is not unexpected, given the diversity of the inherited agencies and the size and complexity of the department's mission operations. Nevertheless, because DHS has not yet fully institutionalized these governance elements, its pursuit of new and enhanced IT investments are at risk of not optimally supporting corporate mission needs and not meeting cost, schedule, capability, and benefit commitments. Accordingly, GAO has previously made recommendations relative to most of these areas to the department's chief information officer and other responsible DHS entities. Lastly, DHS has developed a draft IT strategic plan, which GAO finds lacking in explicit goals, performance measures, milestones, and knowledge of whether it has properly positioned IT staff with the right skills to accomplish these things.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-04-702, Department of Homeland Security: Formidable Information and Technology Management Challenge Requires Institutional Approach This is the accessible text file for GAO report number GAO-04-702 entitled 'Department of Homeland Security: Formidable Information and Technology Management Challenge Requires Institutional Approach' which was released on September 27, 2004. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Committees: August 2004: DEPARTMENT OF HOMELAND SECURITY: Formidable Information and Technology Management Challenge Requires Institutional Approach: [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-702]: GAO Highlights: Highlights of GAO-04-702, a report to the Chairman, Senate Committee on Governmental Affairs, and the Chairman, Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, House Committee on Government Reform Why GAO Did This Study: In 2003 GAO designated the merger of 22 separate federal entities into the Department of Homeland Security (DHS) as a high risk area because of the criticality of the department‘s mission and the enormous transformation challenges that the department faced. Given that the effective use of information technology (IT) is a critical enabler of this merger, GAO has previously reported on a number of DHS efforts aimed at institutionalizing an effective information and technology governance structure and investing in new IT systems that are intended to better support mission operations. Now that DHS has been operating for over a year, GAO was asked to, based largely on its prior work, describe DHS‘s progress in meeting its information and technology management challenge. What GAO Found: DHS‘s overall IT challenge is to standardize and integrate the legacy system environments and management approaches that it inherited from its predecessor agencies, while concurrently attempting to ensure that present levels of IT support for critical homeland security operations are not only maintained but improved in the near term. To accomplish this, the department is in the process of instituting seven information and technology management disciplines that are key elements of an effective information and technology management structure (see chart). DHS‘s progress in institutionalizing these key information and technology management elements has been mixed, and overall remains a work in progress. Such progress is not unexpected, given the diversity of the inherited agencies and the size and complexity of the department‘s mission operations. Nevertheless, because DHS has not yet fully institutionalized these governance elements, its pursuit of new and enhanced IT investments are at risk of not optimally supporting corporate mission needs and not meeting cost, schedule, capability, and benefit commitments. Accordingly, GAO has previously made recommendations relative to most of these areas to the department‘s chief information officer and other responsible DHS entities. Lastly, DHS has developed a draft IT strategic plan, which GAO finds lacking in explicit goals, performance measures, milestones, and knowledge of whether it has properly positioned IT staff with the right skills to accomplish these things. Key Elements of Effective Information and Technology Management Structure: [See PDF for image] [End of figure] What GAO Recommends: To strengthen DHS‘s IT strategic planning, GAO recommends that the department establish IT goals, performance measures, and milestones, and analyze whether its IT staffing adequately supports those goals. In commenting on a draft of this report, DHS generally concurred with GAO‘s recommendations. www.gao.gov/cgi-bin/getrpt?GAO-04-702. To view the full product, including the scope and methodology, click on the link above. For more information, contact Randolph C. Hite at (202) 512-3439 or hiter@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: DHS's Progress in Dealing with Formidable Information and Technology Management Challenge Is Mixed: Conclusions: Recommendations: Agency Comments and Our Evaluation: Appendixes: Appendix I: Department of Homeland Security Governance Entities: Appendix II: Comments from the Department of Homeland Security: GAO Comments: Related GAO Products: Figures: Figure 1: Simplified Diagram of DHS Organizational Structure: Figure 2: Key Elements of an Effective Information and Technology Management Structure: Figure 3: DHS Investment Governance Boards: Figure 4: DHS Investment Review Process: Abbreviations: ACE: Automated Commercial Environment: CAPPS II: Computer-Assisted Passenger Prescreening System II: CIO: chief information officer: DHS: Department of Homeland Security: IRM: information resources management: IT: information technology: OMB: Office of Management and Budget: SEVIS: Student Exchange Visitor Information System: TSA: Transportation Security Administration: US-VISIT: United States Visitor and Immigrant Status Indicator Technology: Letter August 27, 2004: The Honorable Susan M. Collins: Chairman, Committee on Governmental Affairs: United States Senate: The Honorable Adam H. Putnam: Chairman, Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census: Committee on Government Reform: House of Representatives: Responding to real and potential threats to homeland security is one of the federal government's most significant challenges. To address this challenge, as you know, the Homeland Security Act of 2002 (P.L. 107- 296) merged 22 federal agencies and organizations with homeland security-related missions into the Department of Homeland Security (DHS). Since becoming operational in March 2003, DHS has faced the considerable challenge of transforming these diverse organizations into a single new cabinet-level department. The information technology (IT) task related to DHS's transformation is complex and critical to the agency's success. According to DHS's Deputy Secretary, to help detect and deter future terrorist attacks, DHS must rationalize disparate technologies with conflicting business rules, consolidate data centers and networks, have a common e-mail system, get the right information to border agents, and prevent cyber attacks against the department's mission-critical systems.[Footnote 1] Critical to meeting DHS's challenge is establishing an effective corporate information and technology management governance process at the same time that the department is investing billions of dollars to develop, acquire, maintain, and operate mission-critical systems. Ideally, DHS's corporate governance structure would be in place prior to the department's making significant IT investments so that such investment decisions reflect departmentwide needs and priorities. Yet, the operational reality of starting a new organization such as DHS is that it must strike a balance between its pursuit of new and enhanced systems (that in some cases are being managed using legacy processes) and establishing the means for achieving a family of systems that optimally support departmentwide operations and mission performance. Since DHS has been operational for over a year, you requested that we describe the state of DHS's information and technology management. Accordingly, our objective is to describe DHS's progress in meeting its information and technology management challenge. To address this objective we reviewed and synthesized our prior reports and those of the DHS Office of Inspector General on the department's information and technology management and specific IT investments. (A list of related GAO products is included at the end of this report.) We also reviewed relevant documentation to obtain more up-to-date information on changes to the department's processes, particularly as it relates to IT strategic planning and IT investment management. This documentation included DHS's draft information resources management (IRM) strategic plan, draft road maps related to its eight IT priority areas, and the department's investment review management directive and related guidance documents. As part of reviewing these changed processes and to discuss steps that the department has taken to address certain of our open recommendations, we also interviewed appropriate DHS IT officials, including the chief information officer (CIO), chief technology officer, and the coordinator for its top level investment management boards. We performed our work at DHS in Washington, D.C., in accordance with generally accepted government auditing standards between April and July 2004. Results in Brief: DHS is working to address the daunting challenge of standardizing and integrating the various legacy IT environments and management approaches it inherited from its predecessor agencies while it is concurrently attempting to ensure that existing levels of IT support for critical homeland security missions are not only maintained but improved in the near term. To do so, the department has, among other things, made progress in establishing seven key information and technology management disciplines. However, fully establishing and institutionalizing these disciplines remains a work in progress that has yet to be accomplished. While accomplishing them will understandably take considerable time given the diversity of the inherited agencies and the size and complexity of the department, DHS's progress to date on each has been mixed, both across and within the disciplines. In the interim, new and existing system investments continue to be pursued without a fully defined and implemented departmentwide IT governance structure. The status of DHS's efforts relating to the seven disciplines that would create such a structure are discussed below. * IT strategic planning. DHS's draft IRM strategic plan dated March 2004 lists the priorities of the department's and component agencies' CIOs for 2004. The department is also in the process of developing what it terms as road maps for each of these priority areas that include descriptions of the current condition of the area, the need for change, the planned future state, initiatives, and barriers. However, neither the draft IRM strategic plan nor the draft road maps fully define the department's IT goals and performance measures, the time frames to complete significant activities, and the staff resources to execute these activities. * Enterprise architecture. DHS released the initial version of its enterprise architecture in September 2003.[Footnote 2] Our recent report on this initial version stated that it provides a partial basis upon which to build future versions.[Footnote 3] However, this version was not systematically derived from a DHS or national corporate business strategy. Moreover, it is missing most of the content necessary to effectively guide and constrain IT investments. Without such content, DHS runs the risk that its investments will not be well integrated, will be duplicative, will be unnecessarily costly to maintain and interface, and will not effectively optimize mission performance. The department recognizes the architecture's limitations and plans to issue a new version in September 2004. * IT investment management. DHS has established an IT investment management process that includes departmental oversight of major IT projects. However, this process is still maturing and has yet to be institutionalized in that most projects have not undergone the departmental oversight process and a mechanism to ensure that such reviews are accomplished in a timely manner has not been established. * Systems development and acquisition management. DHS has numerous ongoing major systems initiatives, but our reviews of several of these projects have found that rigorous systems development and acquisition processes were not consistently employed. In particular, we identified significant problems in critical areas, such as process controls associated with acquiring software-intensive systems, managing and conducting testing, and measuring the performance of a system. * Information security management. The DHS Office of Inspector General reported that the department has made progress in establishing a framework for the department's information systems security program by, for example, appointing a chief information security officer and developing and disseminating information system security policies and procedures. However, the inspector general concluded that more needs to be done to ensure the security of DHS's IT infrastructure and prevent disruptions to mission operations. For example, none of the DHS components had a fully functioning IT security program. * Information management. As agencies increasingly move to an operational environment in which electronic--rather than paper-- records provide comprehensive documentation of their activities and business processes, a variety of information collection, use, and dissemination issues face these agencies, including DHS. For example, privacy issues are a major concern in certain IT investments, such as the Computer-Assisted Passenger Prescreening System II (CAPPS II), in which privacy was designated by law as one of eight key issues that the Transportation Security Administration (TSA) must fully address before the system is deployed or implemented. DHS has taken steps to deal with privacy at both the department and system-specific level. For example, in April 2003, DHS appointed its first chief privacy officer to, for instance, guide DHS agencies in developing appropriate privacy policies. * IT human capital management. DHS has begun strategic human capital planning at the headquarters level, but the agency has not yet systematically gathered necessary human capital data. Moreover, the DHS CIO has expressed concern over IT staffing and acknowledged that progress in the IT human capital area has been slow. Taken collectively, the breadth and complexity of information and technology management issues facing DHS is a formidable challenge. Overcoming this challenge will require the kind of institutional approach to information and technology management that the aforementioned seven disciplines are intended to provide. We have made numerous recommendations aimed at institutionalizing these disciplines to the department's chief information officer and other responsible DHS entities that, in some cases, the department has implemented or begun to implement. This report contains additional recommendations to the Secretary of Homeland Security related to the important undertaking of effective IT strategic planning, including the establishment of IT goals and performance measures that demonstrate how information and technology management contributes to, for example, the efficiency and effectiveness of agency operations. In written comments on a draft of our report signed by the Director, Departmental GAO/OIG Liaison within the Office of the Chief Financial Officer, DHS generally concurred with our recommendations. In addition, DHS provided additional information on our recommendations and actions that it has taken, which we incorporated in the report, as appropriate. Background: In March 2003 DHS assumed operational control of about 209,000 civilian and military positions from 22 agencies and offices. Not since the creation of the Department of Defense in 1947 has the federal government undertaken a transformation of this magnitude. As we have previously reported,[Footnote 4] such a transformation poses significant management and leadership challenges, including those associated with coordinating and facilitating the sharing of information, both among its component agencies and with other entities, and integrating numerous mission support, administrative, and infrastructure IT systems. Critical to DHS's ability to meet this challenge is the establishment of an effective IT governance mechanism, including IT plans, processes, and people. DHS Organizational Structure: The Homeland Security Act of 2002 created DHS by merging agencies that specialize in one or more interrelated and interdependent aspects of homeland security, such as intelligence analysis, law enforcement, border security, transportation security, biological research, critical infrastructure protection, and disaster recovery. DHS is in the early stages of transforming and integrating this disparate group of agencies with multiple missions, values, and cultures into a strong and effective cabinet department. The effective interaction, integration, and synergy of these agencies are critical to homeland security mission performance. DHS's mission is to lead the unified national effort to secure America by preventing and deterring terrorist attacks and protecting against and responding to threats and hazards to the nation. DHS also is to ensure safe and secure borders, welcome lawful immigrants and visitors, and promote the free flow of commerce. To accomplish this, the Homeland Security Act established five under secretaries with responsibilities over directorates for management, science and technology, information analysis and infrastructure protection, border and transportation security, and emergency preparedness and response (see fig. 1). In addition to these directorates, the U.S. Secret Service and the U.S. Coast Guard continue as distinct entities within DHS. Each DHS directorate is responsible for its specific homeland security mission area and for coordinating related efforts with its sibling components, as well as other external entities. Figure 1: Simplified Diagram of DHS Organizational Structure: [See PDF for image] [End of figure] Within the Management directorate is the Office of the CIO, which is expected to enhance mission success by leveraging best available information technologies and technology-management practices, provide shared services and coordinate acquisition strategies to minimize cost and improve consistency, support executive leadership in performance- based management by maintaining an enterprise architecture that is fully integrated with other management processes, and advocate and enable business transformation in support of enhanced homeland security. Other DHS entities also are responsible, or share responsibility, for critical information and technology management activities. For example, within DHS's major organizational offices (e.g., the directorates) are CIOs and IT organizations. Control over the department's IT budget is vested primarily with the CIO organizations within each of its component organizations, and the component CIO organizations are accountable to the heads of DHS's respective organizational components. Moreover, we have previously reported on the responsibilities held by various DHS directorates to ensure successful information sharing within the department and between federal agencies, state and local governments, and the private sector.[Footnote 5] The DHS CIO established a CIO Council, chaired by the CIO and composed of component-level CIOs, that serves as a focal point for coordinating challenges that cross agency boundaries. According to its charter, the specific functions of the DHS CIO Council include: * establishing a strategic plan and setting priorities for departmentwide IT; * defining and continuously improving DHS IT governance structures and processes; * advancing DHS IT priorities through well-defined road maps that detail actions and deliverables; * identifying opportunities for sharing resources, coordinating multibureau projects and programs, and consolidating activities; and: * developing and executing formal communication programs for internal and external constituencies. Key Components of an Effective Information and Technology Management Structure: As we have previously reported, information and technology management is a key element of management reform efforts that can help dramatically reshape government to improve performance and reduce costs.[Footnote 6] Accordingly, it is critical that agencies manage their information resources effectively, taking into account the need to address planning, processes, and people. Key components of an effective information and technology management structure include (1) IT strategic planning, (2) enterprise architecture, (3) IT investment management, (4) systems development and acquisition management, (5) information security management, (6) information management, and (7) IT human capital management (see fig. 2).[Footnote 7] Figure 2: Key Elements of an Effective Information and Technology Management Structure: [See PDF for image] [End of figure] Morever, effective implementation of information and technology management recognizes the interdependencies among these processes. Illustrations of some of these relationships are as follows: * IT strategic planning defines what an agency seeks to accomplish and identifies the strategies that it will use to achieve desired results. The IT strategic plan, which is the outcome of this effort, is executed using the processes established through the other components of the information and technology structure, such as IT investment management. * An organization's IT human capital approach must be aligned to support the mission, vision for the future, core values, goals and objectives, and strategies, which may be found in the IT strategic plan and the enterprise architecture. IT human capital management, in turn, ensures that the right people are in place with the right skills to perform critical system acquisition functions. * The enterprise architecture is an integral component of the IT investment management process because an organization should approve only those investments that move the organization toward the target architecture. * A critical aspect of systems acquisition and development management is ensuring that robust information security is built into the projects early and is periodically revisited. * Privacy--a component of information management--should be a consideration when acquiring and developing systems. For example, the E-Government Act of 2002 requires agencies to conduct privacy impact assessments before developing or acquiring IT systems that collect, maintain, or disseminate information that is personally identifiable to an individual. Such assessments would, in part, include what information is being collected, why it is being collected, and its intended use. In addition, ensuring that such personally identifiable data is secured against risks such as loss or unauthorized access, destruction, use, modification, or disclosure is an internationally recognized privacy principle. DHS has recognized the importance of information and technology management to achieving its mission. In February of this year, it issued its first strategic plan, which outlines seven strategic goals. One of these goals is organizational excellence, which includes information and technology management objectives related to privacy and security and electronic government modernization and interoperability initiatives. In addition, at its various components, DHS has numerous ongoing major systems development and acquisition initiatives related to meeting mission needs, such as the following: * Border and Transportation Security Directorate. The Automated Commercial Environment (ACE) project is to be a new trade processing system. * Border and Transportation Security Directorate. CAPPS II is to identify airline passengers who pose a security risk before they reach the passenger screening checkpoint. * Border and Transportation Security Directorate. The Student Exchange Visitor Information System (SEVIS) is expected to manage information about nonimmigrant foreign students and exchange visitors from schools and exchange programs. * Border and Transportation Security Directorate. The United States Visitor and Immigrant Status Indicator Technology (US-VISIT) is a governmentwide program intended to improve the nation's capacity for collecting information on foreign nationals who travel to the United States, as well as control the pre-entry, entry, status, and exit of these travelers. * Coast Guard. Rescue 21 is to replace the Coast Guard's 30-year-old search and rescue communication system. * Science and Technology Directorate. Project SAFECOM has the overall objective of achieving national wireless communications interoperability among first responders and public safety systems at all levels of government. DHS's Progress in Dealing with Formidable Information and Technology Management Challenge Is Mixed: In the 18 months that it has been in operation, DHS has taken steps to institute key elements of an effective information and technology management structure. However, DHS's progress has been mixed in that some elements are further advanced than others and there is still considerable work remaining to institutionalize each of the areas across the department. An example of the former is that DHS established several key practices related to building an effective IT investment management process, whereas fundamental activities in the IT human capital area have not been started. IT strategic planning can serve as an example of the considerable amount of work remaining within individual elements of the information and technology management structure. Specifically, although DHS issued a draft IRM strategic plan this past March, it and other strategic planning documents do not contain sufficient information regarding the department's IT goals, how it will achieve them, and when it expects that significant activities will be completed. DHS's mixed progress is not unexpected given the diversity of the inherited agencies and the size and complexity of the department and the daunting hurdles that it faces in integrating the systems and IT management approaches of its many organizational components. Nevertheless, new and existing IT investments continue to be pursued without a fully defined and implemented departmentwide governance structure, which increases the risk that they will not completely or optimally support the department's mission and objectives. To address the risks associated with DHS's departmental structures and specific IT investments, we have made recommendations to the DHS CIO and other responsible entities--such as the Coast Guard and TSA--to help the department successfully overcome its information and technology management challenge. In some cases, the department has implemented or begun to implement these recommendations. IT Strategic Planning: Strategic planning defines what an organization seeks to accomplish and identifies the strategies it will use to achieve desired results. In addition, the Paperwork Reduction Act requires that agencies indicate in strategic IRM plans how they are applying information resources to improve the productivity, efficiency, and effectiveness of government programs.[Footnote 8] Further, Office of Management and Budget (OMB) Circular A-130 states that strategic IRM plans should support agency strategic plans and provide a description of how IRM helps accomplish agency missions. This plan serves as a vision or road map for implementing effective management controls and marshalling resources in a manner that will facilitate leveraging of IT to support mission goals and outcomes. It should be tied to and support the agency strategic plan and provide for establishing and implementing IT management processes. DHS's draft IRM strategic plan dated March 2004, provides a high-level description of how IT supports the goals of the agency's strategic plan. According to the draft plan, although the department's component agencies have advanced their separate uses of information technology and services, serious gaps exist between the current and target environment necessary to support effective integration of information and collaboration of actions. The plan goes on to discuss steps taken in the investment management, enterprise architecture, and security disciplines. The draft IRM plan also cites eight DHS CIO Council priorities for 2004; namely, (1) information sharing, (2) mission rationalization, (3) IT security, (4) one IT infrastructure, (5) enterprise architecture, (6) portfolio management, (7) governance, and (8) IT human capital. DHS is in the process of developing road maps for each of the CIO Council's priorities. These road maps are currently in draft and generally include a description of the current condition of the area, the need for a change, the planned future state, initiatives, and barriers. Currently, neither the draft IRM strategic plan nor the draft priority area road maps contain sufficient information regarding the department's IT goals and performance measures, when the department expects that significant activities will be completed, and the staff resources necessary to implement these activities. For example: * Neither the draft IRM strategic plan nor the draft road maps include fully defined goals and performance measures. Leading organizations define specific goals, objectives, and measures, use a diversity of measurement types, and describe how IT outputs and outcomes affect organizational customer and agency program delivery requirements.[Footnote 9] In addition, the Paperwork Reduction Act and the Clinger-Cohen Act of 1996 require agencies to establish goals and performance measures on how information and technology management contributes to program productivity, the efficiency and effectiveness of agency operations, and service to the public.[Footnote 10] * The draft IRM plan does not include milestones for when major information and technology management activities will be initiated or completed. In addition, the milestones in the draft road maps are generally vague (e.g., using terms like short term and long term without defining them or including specific months with no year). Without milestone information, meaningful measurement of progress is not possible. This is particularly important since DHS did not always meet the target dates laid out by the CIO in February 2003. For example, the CIO planned to introduce a balanced scorecard[Footnote 11] for the DHS IT community in the department's first year. Although the draft IRM strategic plan states that the DHS CIO Council has endorsed the use of a balanced scorecard approach, as of mid-July, this scorecard had not been developed. * The plan does not address whether, or to what extent, DHS has staff with the relevant skills to obtain its target environment and, if it does, whether they are allocated appropriately. This is particularly important since the DHS CIO Council has targeted IT human capital as a priority area and, according to the draft road map document associated with this priority, DHS is facing such issues as an aging IT workforce and too little investment in continuous learning. The DHS CIO noted that the draft IRM strategic plan, the department's initial attempt at IT strategic planning, was primarily intended to meet OMB's requirements that a plan be developed. He further stated that through the development of the road maps, DHS is defining the operational details for its IT priority areas, which, in turn, will be used to update and improve the next version of the IRM plan. In responding to a draft of this report, DHS stated that the CIO intends to issue an IT strategic plan before the end of the calendar year and that, over the next few months, each priority area will develop goals, performance measures, and time lines for implementation. A key emphasis of version 1.0 of the DHS draft IRM plan is its recognition of the importance of the department's integration efforts and its description of its plan to implement a single IT infrastructure. In particular, to maximize its mission performance, DHS faces the enormous task of integrating and consolidating a multitude of systems. This includes exploiting opportunities to eliminate and consolidate systems in order to improve mission support and reduce system costs. We recently reported that DHS is in the process of developing its systems integration strategy and that, in the interim, the department has taken steps to address ongoing and planned component IT investments integration and alignment with its evolving strategic IT management framework.[Footnote 12] However, we concluded that while these steps have merit, they do not provide adequate assurance of strategic alignment across the department. For example, one step simply continued the various approaches that produced the diverse systems that the department inherited, while another relied too heavily on oral communication about complex IT strategic issues that are not yet fully defined. Thus, DHS has an increased risk that its component agencies' ongoing investments, collectively costing billions of dollars in fiscal year 2004, will need to be reworked at some future point to be effectively integrated and to maximize departmentwide value. Moreover, we reported that the DHS CIO does not have authority and control over departmentwide IT spending, even though such control is important for effective systems integration. According to our research on leading private and public sector organizations and experience at federal agencies, leading organizations adopt and use an enterprisewide approach under the leadership of a CIO or comparable senior executive who has the responsibility and authority, including budgetary and spending control, for IT across the entity.[Footnote 13] To help DHS better manage the risks that it faces, we made several recommendations, including that the Secretary examine the sufficiency of IT spending authority vested in the CIO and take appropriate steps to correct any limitations in authority that constrain the CIO's ability to effectively integrate IT investments in support of departmentwide mission goals. In commenting on a draft of this report, DHS did not address whether it would implement these recommendations. Enterprise Architecture: Effective use of enterprise architectures is a trademark of successful public and private organizations. For a decade, we have promoted the use of architectures to guide and constrain systems modernization, recognizing them as a crucial means to a challenging goal: establishing agency operational structures that are optimally defined in both business and technological environments. The Congress, OMB, and the federal CIO Council have also recognized the importance of an architecture-centric approach to modernization. The Clinger-Cohen Act of 1996 mandates that an agency's CIO develop, maintain, and facilitate the implementation of IT architectures. This should provide a means of managing the integration of business processes and supporting systems. Further, the E-Government Act of 2002[Footnote 14] requires OMB to oversee the development of enterprise architectures within and across agencies. Generally speaking, an enterprise architecture connects an organization's strategic plan with program and system solution implementations by providing the fundamental information details needed to guide and constrain implementable investments in a consistent, coordinated, and integrated fashion. An enterprise architecture provides a clear and comprehensive picture of an entity, whether it is an organization (e.g., federal department) or a functional or mission area that cuts across more than one organization (e.g., homeland security). This picture consists of snapshots of both the enterprise's current or "As Is" operational and technological environment and its target or "To Be" environment, as well as a capital investment road map for transitioning from the current to the target environment. These snapshots further consist of "views," which are basically one or more architecture products that provide conceptual or logical representations of the enterprise. For the last 2 years, we have promoted the development and use of a homeland security enterprise architecture. For example, in June 2002 we testified[Footnote 15] on the need to define the homeland security mission and the information, technologies, and approaches necessary to perform this mission in a way that is divorced from organizational parochialism and cultural differences. We also stressed that a particularly critical function of a homeland security architecture would be to establish processes and information/data protocols and standards that could facilitate information collection and permit sharing. Recognizing the pivotal role that an architecture will play in successfully merging the diverse operating and systems environments that the department inherited, DHS issued an initial version in September 2003. Our recent report on this initial enterprise architecture found that it provides a partial basis upon which to build future versions.[Footnote 16] However, the September 2003 version of the enterprise architecture is missing most of the content necessary to be considered a well-defined architecture. Moreover, the content in this version was not systematically derived from a DHS or national corporate business strategy, but rather was more the result of an amalgamation of the existing architectures that several of DHS's predecessor agencies already had, along with their respective portfolios of system investment projects. Such a development approach is not consistent with recognized architecture development best practices. DHS officials agreed with our content assessment of their initial architecture, stating that it is largely a reflection of what could be done without a departmental strategic plan to drive architectural content and with limited resources and time. They also stated that the primary purposes in developing this version were to meet an OMB deadline for submitting the department's fiscal year 2004 IT budget request and for the department to develop a more mature understanding of enterprise architecture and its ability to execute an approach and methodology for developing and using the next version of the architecture. Nevertheless, we concluded that DHS does not yet have the architectural content that it needs to effectively guide and constrain its business transformation efforts and the hundreds of millions of dollars it is investing in supporting systems. For example, the architecture does not (1) include a description of the information flows and relationships among organizational units, business operations, and system elements; (2) provide a description of the business and operational rules for data standardization to ensure data consistency, integrity, and accuracy; or (3) include an analysis of the gaps between the baseline and target architecture for business processes, information/data, and services/application systems to define missing and needed capabilities. Moreover, the architecture does not adequately recognize the interdependencies with other critical IT management processes since it does not include (1) a description of the policies, procedures, processes, and tools for selecting, controlling, and evaluating application systems to enable effective IT investment management and (2) a description of the system development lifecycle process for application development or acquisition and the integration of the process with the architecture. In addition, although the architecture recognizes the need for a governance structure and contains a high- level discussion of same, it does not include an architecture governance and control structure and the integrated procedures, processes, and criteria (e.g., investment management and security) to be followed. Without such content, DHS runs the risk that its investments will not be well integrated, will be duplicative, will be unnecessarily costly to maintain and interface, and will not effectively optimize mission performance. To assist DHS in developing a well-defined enterprise architecture, our August report contained numerous recommendations directed to the architecture executive steering committee--composed of senior executives from technical and business organizations across the department--in collaboration with the CIO, that are aimed at ensuring that the needed content is added and that the approach followed adheres to best practices. Given DHS's intended purpose of its enterprise architecture, which is to use it as the basis for departmentwide (and national) operational transformation and to support systems modernization and evolution, it is important that individual IT investments be aligned with the architecture. Moreover, according to the CIO, DHS is developing a process to align its systems modernization activities with its enterprise architecture. However, earlier this year, we reported that this alignment had not been determined for two of the department's major investments--ACE and US-VISIT--but the CIO and program officials stated that they planned to address this issue.[Footnote 17] IT Investment Management: Investments in IT can have a dramatic impact on an organization's performance. If managed effectively, these investments can vastly improve government performance and accountability. If not, they can result in wasteful spending and lost opportunities for improving delivery of services to the public. An IT investment management process provides a systematic method for agencies to minimize risks while maximizing return on investment. A central tenet of the federal approach to IT investment management has been the select/control/ evaluate model. During the select phase, the organization (1) identifies and analyzes each project's risks and returns before committing significant funds and (2) selects those projects that will best support its mission needs. In the control phase, the organization ensures that the project continues to meet mission needs at the expected levels of cost and risks. If the project is not meeting expectations or if problems have arisen, steps are quickly taken to address the deficiencies. During the evaluate phase, actual versus expected results are compared after a project has been fully implemented. DHS has developed and begun implementing a departmental IT investment management process. In May 2003 DHS issued an investment review management directive[Footnote 18] and IT capital planning and investment control guide, which provide the department's component organizations with requirements and guidance on documentation and review of IT investments. In February 2004, we reported that DHS's investment management process was evolving.[Footnote 19] Since that time, DHS has changed its process to reflect lessons learned during the department's first year of operation and continuous improvement of the process. Moreover, DHS issued a new interim IT capital planning and investment control guide in May 2004 and is in the process of revising the investment review management directive to reflect the changes that have been made. Among the changes is a shifting of responsibilities of some of its investment management boards and increases to the thresholds that determine which board approves an investment. Figure 3 illustrates the governance boards DHS uses to execute its investment review process. Under this process, DHS has four levels of investments, the top three of which are subject to review by department-level boards--the Investment Review Board, Joint Requirements Council, and Enterprise Architecture Board. (App. I provides more specific information on the boards and their responsibilities.) Figure 3: DHS Investment Governance Boards: [See PDF for image] [A] According to the DHS coordinator of this process, level 3 IT investments are approved by the component agency and are subject to review by the CIO, Chief Financial Officer, and Chief Procurement Officer, also known as the Management Review Council. If these officials have concerns about the investment or find that there are cross-programmatic issues to be addressed, they can refer the investment to the Joint Requirements Council for review. [End of figure] In addition, DHS has established a five-phase review process that calls for these investments to be reviewed at key decision points, such as program authorization (see fig. 4). Figure 4: DHS Investment Review Process: [See PDF for image] [End of figure] With the establishment of the governance boards and the investment review process, DHS has established several key practices associated with building the investment foundation as described by our IT investment management framework.[Footnote 20] In addition, as part of the selection phase of its capital planning and investment control process, DHS reviewed component agency IT investments for its fiscal year 2005 budget submission. Specifically, according to DHS IT officials, (1) the CIO approved the department's IT portfolio and (2) all of the major IT systems submitted to OMB for the fiscal year 2005 budget were assessed and scored by an investment review team.[Footnote 21] In addition, earlier this year, as we reported, with the department's establishment of the department's top investment management board, the ACE and CAPPS II investments met legislative conditions contained in the Department of Homeland Security Appropriations Act, 2004 (P.L. 108- 90).[Footnote 22] For example, in February 2004 we reported that that creation of the Investment Review Board satisfied a CAPPS II legislative requirement associated with the establishment of an oversight board, with the caveat that the board oversee the program on a regular and thorough basis. In addition, in May 2004 we reported that DHS satisfied a prior recommendation of ours to establish and charter an executive body to guide and direct the US-VISIT program by establishing a three-entity governance structure, which includes the department's Investment Review Board.[Footnote 23] Although DHS has made noticeable progress, it still has much work remaining to fully implement its IT investment management process, particularly as it relates to carrying out effective departmental control over IT investments. For example: * Many of DHS's IT investments have not undergone control reviews. As of early July, one or more of DHS's investment management boards had reviewed less than a quarter of the major IT investments subject to departmental review (level 1, 2, and 3 investments). According to the coordinator of this process, the investments that have undergone control reviews were considered DHS's highest priority IT investments based on criteria such as cost, visibility, or that a key decision point was forthcoming. In addition, DHS stated that its ability to complete control reviews in a timely manner is affected by the amount of resources, people, time, and funding allocated to the department. Nevertheless, our reviews of several DHS level 1 investments indicate the importance of such reviews, since we have found cost, schedule, and performance problems as well as significant management activities that have not been completed. * DHS has not established a process to ensure that control reviews of IT investments are performed in a timely manner. Our February 2004 report recommended that the DHS CIO develop a control review schedule for IT investments, subject to departmental oversight.[Footnote 24] DHS concurred with this recommendation, but has not yet implemented it. However, for the fiscal year 2006 budget cycle, which is being formulated now, DHS entities were asked to provide the dates of prior and future key decision points for each major IT investment. According to Office of the CIO capital planning and investment control officials, this is their first step toward building a control review schedule. * Officials from DHS's offices of the CIO and chief financial officer characterized the department's investment management process as still maturing. For example, Office of the CIO capital planning and investment control officials stated that the department will be concentrating on developing and building a disciplined and structured control process in fiscal year 2005. Officials from the offices of the CIO and chief financial officer also described various initiatives that are being undertaken to improve this process. For example, portfolio management is a CIO Council priority and, according to the draft road map for this priority, the planned future environment will have IT investments aligned and optimized against mission requirements at the DHS level. DHS has procured an automated portfolio management system to help in this endeavor. According to Office of the CIO capital planning and investment control officials, DHS has inserted its fiscal year 2005 business cases for major investments (also known as budget exhibit 300s) into this system and plans to add the fiscal year 2006 business cases later this year. In addition, according to these officials, the department's Investment Review Team plans to use this system to perform portfolio analysis to provide additional insight to DHS investment management boards as they make their investment selections for fiscal year 2006. Systems Development and Acquisition Management: Our work and other best-practice research have shown that applying rigorous management practices to the development and acquisition of IT systems and the acquisition of IT services improves the likelihood of delivering expected capabilities on time and within budget. In other words, the quality of IT systems and services is largely governed by the quality of the management processes involved in developing and acquiring them. DHS has numerous ongoing major systems development and acquisition initiatives that are critical to meeting its mission needs. Our reviews of several major DHS systems development and acquisition efforts have found that these rigorous processes are not always employed. We have made numerous recommendations that address a variety of system development and acquisition issues. DHS has generally agreed with these recommendations and, in some cases, has implemented, or begun to implement, them. For example: * Process controls for acquiring software-intensive systems. Disciplined processes for acquiring software are essential to software- intensive system acquisitions. The Software Engineering Institute at Carnegie Mellon University[Footnote 25] has defined the tenets of effective software acquisition, which identify, among other things, a number of key process areas that are necessary to effectively manage software-intensive system acquisitions. In the past, we have reported that such key processes had not been fully implemented for ACE and US- VISIT. Consequently, we made recommendations for both of these programs related to instituting acquisition process controls called for in the Software Engineering Institute's SA-CMM® model.[Footnote 26] As of May of this year, the acquisition control recommendation had been implemented by the ACE program in that the Software Engineering Institute had assigned the program a level 2 rating, meaning that it had established basic acquisition management processes.[Footnote 27] Also in May of this year we reported that US-VISIT was planning to implement our recommendation on instituting acquisition process controls.[Footnote 28] * Managing and conducting testing. Complete and thorough testing is essential to providing reasonable assurance that new or modified systems process information correctly and will meet an organization's business needs. According to leading IT organizations, to be effective, software testing practices should be planned and conducted in a structured and disciplined fashion.[Footnote 29] We have expressed concerns about testing and issued related recommendations for three DHS IT investments--Rescue 21, CAPPS II, and US-VISIT. For example, in September 2003 we reported that the Coast Guard planned to compress and overlap the testing schedules for Rescue 21, which increased its risk that, for instance, all requirements would not be tested during formal qualification testing, system integration testing, and operational testing and evaluation.[Footnote 30] To mitigate Rescue 21 risks, we made recommendations to the Coast Guard related to establishing a new testing schedule and ensuring that milestones are established for completing test plans and that these plans address all requirements of the system. The Coast Guard agreed with these recommendations, which the agency has begun to implement. In the cases of CAPPS II and US- VISIT, we made recommendations to TSA and the Border and Transportation Security Directorate, respectively, covering system and database testing and developing and approving complete test plans before testing begins, respectively.[Footnote 31] DHS generally concurred with these recommendations. * Measuring the performance of a system. By using comprehensive performance information, more informed decisions can be made about IT investments. An effective performance measurement system produces information that (1) provides an early warning indicator of problems and the effectiveness of corrective actions, (2) provides input to resource allocation and planning, and (3) provides periodic feedback about the quality, quantity, cost, and timeliness of products and services. We have reported on a variety of performance measure concerns associated with five DHS IT investments and have made relevant recommendations. For example, in February 2004, we reported that TSA had established preliminary goals and measures for CAPPS II but that they could be strengthened.[Footnote 32] We also noted that TSA had not fully established policies and procedures to monitor and evaluate the use and operation of the system. Similarly, our review of SEVIS, which is operational, found that several key system performance requirements were not being formally measured.[Footnote 33] This is problematic because without formally monitoring and documenting key system performance requirements, DHS cannot adequately ensure that potential system problems are identified and addressed early, before they have a chance to become larger and affect the DHS mission objectives supported by SEVIS. In addition to our recommendations related to specific DHS IT investments, we have also issued guidance to assist agencies in improving their systems development and acquisitions.[Footnote 34] Information Security Management: Since 1997 we have designated information security as a governmentwide high-risk issue because of continuing evidence indicating significant, pervasive weaknesses in the controls over computerized federal operations.[Footnote 35] Moreover, related risks continue to escalate, in part due to the government's increasing reliance on the Internet and on commercially available information technology. Government officials are increasingly concerned about attacks launched by individuals and groups with malicious intent, such as crime, terrorism, foreign intelligence gathering, and acts of war. In addition, the disgruntled organization insider is a significant threat, since such individuals often have knowledge that allows them to gain unrestricted access and inflict damage or steal assets without possessing a great deal of knowledge about computer intrusions. Based on its annual evaluation required by the Federal Information Security Management Act of 2002[Footnote 36], in September 2003 the DHS Office of Inspector General reported that DHS had made progress in establishing a framework for an IT systems security program.[Footnote 37] For example, DHS has (1) appointed a chief information security officer, (2) developed and disseminated information system security policies and procedures, (3) implemented an incident response and reporting process, (4) initiated a security awareness training program, and (5) established a critical infrastructure protection working group. However, the inspector general report concluded that still more needs to be done to ensure the security of DHS's IT infrastructure and prevent disruptions to mission operations. For example, DHS did not have a process to ensure that all plans of action and milestones for identified weaknesses were developed, implemented, and managed. In responding to a draft of this report, DHS stated that it has instituted a tool to monitor each organizational element's progress in developing and achieving the milestones identified in the plans of action and milestones. In addition, the Office of Inspector General stated that none of the DHS components had a fully functioning IT security program and a number of key security areas needed attention. For example, less than half of DHS's systems had a security plan and been assessed for risk. Among the Office of Inspector General's recommendations were that the CIO (1) develop and implement a process to identify information security- related material weaknesses in mission-critical programs and systems, (2) implement an oversight and reporting function to track the progress of remediation of material weaknesses, and (3) require DHS information officers to assign information systems security officers to oversee the security controls of each major application and general support system. More recently, the DHS Office of Inspector General reported that DHS cannot ensure that the sensitive information processed by its wireless systems is effectively protected from unauthorized access and potential misuse.[Footnote 38] In particular, the Inspector General reported that DHS had not (1) provided sufficient guidance on wireless implementation to its components, (2) established adequate security controls to protect its wireless networks against commonly known security vulnerabilities, and (3) certified or accredited its wireless networks.[Footnote 39] The Inspector General made several recommendations to address the deficiencies cited in the report, which the DHS CIO agreed to and has taken steps to implement. In addition, we have long held that it is important that security be addressed in the early planning stages of the development of IT systems,[Footnote 40] and have reported on security planning in the US- VISIT and CAPPS II programs. For example, in June 2003 we recommended that the US-VISIT program manager develop a system security plan[Footnote 41] and in May 2004 we reported that this recommendation had been partially implemented.[Footnote 42] Specifically, DHS provided a draft security plan, but this plan did not include (1) specific controls for meeting the security requirements, (2) a risk assessment methodology, or (3) the roles and responsibilities of individuals with system access. DHS reported four departmentwide information security-related material weaknesses in its fiscal year 2003 Performance and Accountability Report.[Footnote 43] For example, DHS reported that it had (1) limited tracking, evaluation, and reporting tools necessary to provide oversight over its information security efforts and (2) insufficient resources, processes, policies, and guidelines in place to ensure the identification, protection, and continuity of services to reduce the department's vulnerabilities and risks and to sustain mission-critical functions in the event of a man-made or natural disaster. According to the DHS report, the department plans to take corrective actions related to these material weaknesses by September 30, 2004. The DHS CIO Council has also pronounced information security a priority area. The draft road map associated with this area includes various short-, mid-, and long-term initiatives. Moreover, to lay a foundation for departmental improvements in information security management, DHS has developed an information security program strategic plan, which identifies major program areas, goals, and objectives. According to this April 2004 plan, these major security program areas allow DHS to implement and maintain information security as part of its capital investment control process, systems development life cycle, and the enterprise architecture, and are essential to providing security services that protect the confidentiality, integrity, and availability of information and to provide accountability for activities on DHS networks and computing platforms. Information Management: As agencies increasingly move to an operational environment in which electronic--rather than paper--records provide comprehensive documentation of their activities and business processes, a variety of information collection, use, and dissemination issues have emerged. Such issues are particularly relevant to DHS because the Homeland Security Act of 2002 and federal policy assign responsibilities to the department for the coordination and sharing of information related to threats of domestic terrorism--within the department and with and among other federal agencies, state and local governments, the private sector, and other entities. Among the information management issues facing DHS are information sharing, privacy, and compliance with the information collection requirements. Namely: Information sharing. As we have reported, information sharing is critical to successfully addressing increasing threats and fulfilling the missions of DHS.[Footnote 44] For example, to accomplish its missions, the department must (1) access, receive, and analyze law enforcement information, intelligence information, and other threat, incident, and vulnerability information from federal and nonfederal sources, and (2) analyze such information to identify and assess the nature and scope of terrorist threats. Further, DHS must share information both internally and externally with agencies and law enforcement on such matters as goods and passengers inbound to the United States and individuals who are known or suspected terrorists and criminals. It also must share information among emergency responders in preparing for and responding to terrorist attacks and other emergencies. We have made numerous recommendations over the last several years related to information-sharing functions that have been transferred to DHS, which are focused on sharing information on incidents, threats, and vulnerabilities and providing warnings related to critical infrastructures, both within the federal government and between the federal government and state and local governments and the private sector. In September 2003 we testified[Footnote 45] that although progress has been made in addressing our recommendations, further efforts were needed, such as (1) improving the federal government's capabilities to analyze incident, threat, and vulnerability information obtained from numerous sources and share appropriate timely, useful warnings and other information concerning both cyber and physical threats to federal entities, state and local governments, and the private sector, and (2) developing a comprehensive and coordinated national plan to facilitate information sharing on critical infrastructures. More recently, in July 2004 we reported that DHS's ability to gather, analyze, and disseminate information could be improved by developing information sharing-related policies and procedures for its components.[Footnote 46] In commenting on a draft of this report, DHS provided planned actions in response to its recommendations. The DHS Secretary has recognized the criticality of information sharing in the department's strategic plan. In addition, information sharing is one of the DHS CIO Council's priorities in 2004. In the draft road map associated with this priority area, DHS described a future state that includes seamless access and dissemination of information in real time or near real time, that information is shared with all constituents, at all levels of government, and with the private sector, and that there are agreed-upon data standardization rules. We have issued guidance on information-sharing practices of organizations that successfully share sensitive or time-critical information, which could aid DHS in its efforts.[Footnote 47] Privacy. With the emphasis on information sharing, privacy issues have emerged as a major, and contentious, concern. Since the terrorist attacks of September 11, 2001, data mining[Footnote 48] has been seen increasingly as a useful tool to help detect terrorist threats by improving the collection and analysis of public and private-sector data. Our May 2004 governmentwide report[Footnote 49] on data mining described 14 data mining efforts reported by DHS.[Footnote 50] Mining government and private databases containing personal information creates a range of privacy concerns because agencies can quickly and efficiently obtain information on individuals or groups by exploiting large databases containing personal information aggregated from public and private records. Concerns have also been raised about the quality and accuracy of the mined data; the use of the data for other than the original purpose for which the data were collected without the consent of the individual; the protection of the data against unauthorized access, modification, or disclosure; and the right of individuals to know about the collection of personal information, how to access that information, and how to request a correction of inaccurate information. In April 2003, DHS appointed its first chief privacy officer. According to this officer, among other things, the DHS privacy office promotes best practices with respect to privacy, guides DHS agencies in developing appropriate privacy policies, and serves as a resource for questions related to privacy and information collection and disclosure. Privacy concerns have also been a critical factor in the development and acquisition of US-VISIT and CAPPS II. With respect to CAPPS II, the 2004 DHS appropriations act designated privacy as one of eight key issues that TSA must address before CAPPS II is deployed or implemented. In our February 2004 report on whether TSA had fulfilled these legislative requirements, we stated that the agency's plans appear to address many of the requirements of the Privacy Act,[Footnote 51] the primary legislation that regulates the government's use of personal information.[Footnote 52] However, while TSA had taken initial steps, it had not finalized its plans for complying with the Privacy Act. We also looked at the TSA's plans in the larger context of eight Fair Information Practices, which are internationally recognized privacy principles that include practices such as data quality and security safeguards.[Footnote 53] The TSA's plans reflect some actions to address each of these practices. However, to meet its evolving mission goals, the agency also appears to limit the application of some of these practices. This reflects TSA's efforts to balance privacy with other public policy interests, such as national security, law enforcement, and administrative efficiency. Compliance with the information collection requirements of the Paperwork Reduction Act. The Paperwork Reduction Act prohibits an agency from conducting or sponsoring the collection of information unless (1) the agency has submitted the proposed collection and other documents to OMB, (2) OMB has approved the proposed collection, and (3) the agency displays an OMB control number on the collection. We testified in April 2004 that DHS had 18 reported violations of the Paperwork Reduction Act in fiscal year 2003, all related to OMB approvals that had expired and had not been reauthorized.[Footnote 54] IT Human Capital Management: Our work with leading organizations shows that they develop human capital strategies to assess their skill bases and recruit and retain staff who can effectively implement technology to meet business needs.[Footnote 55] They assess their IT skills on an ongoing basis to determine what expertise is needed to meet current responsibilities and support future initiatives and evaluate the skills of their current employees, which are then compared against the organization's needed skills to determine gaps in the IT skills base. The challenges the federal government faces in maintaining a high-quality IT workforce are long-standing and widely recognized. The success of the transformation and implementation of DHS is based largely on the degree to which human capital management issues are addressed. We have issued several reports examining how DHS plans to implement its new human capital system.[Footnote 56] For example, in June 2004 we reported that DHS had begun strategic human capital planning efforts at the headquarters level since the release of the department's overall strategic plan and the publication of proposed regulations for its new human capital management system.[Footnote 57] However, DHS had not yet systematically gathered relevant human capital data at the headquarters level, although efforts were under way to collect detailed human capital information and design a centralized information system so that such data could be gathered and reported departmentwide. These strategic human capital planning efforts can enable DHS to remain aware of and be prepared for current and future needs as an organization. It is important that DHS address its IT human capital challenges expeditiously since, according to the DHS CIO, the biggest obstacle to the implementation of a departmentwide systems integration strategy has been insufficient staffing. More specifically, the CIO said that his office received substantially fewer staff than he requested when the department was originally established in 2003. To illustrate his statement, the CIO said that after studying other comparably sized federal department CIO organizations, he requested approximately 163 positions. However, he said that his office received about 65 positions. In addition, CIO officials told the Office of Inspector General that, given the relatively small staff resources provided, they have been "busy putting out fires" and, as a result, have been hindered in carrying out some critical IT management responsibilities, including instituting central guidance and standards in areas such as information security and network management.[Footnote 58] Lastly, the DHS CIO also noted the lack of properly skilled IT staff within the component agencies. Challenges facing DHS in this area, he stated, include overcoming political and cultural barriers, leveraging cultural beliefs and diversity to achieve collaborative change, and recruiting and retaining skilled IT workers. In addition, we have expressed concerns about human capital issues related to two of DHS's major IT investments, ACE and US-VISIT. In May 2002 we reported that the program office managing ACE did not have the people in place to perform critical system acquisition functions, which increased the risk that promised system capabilities would not be delivered on time or within budget.[Footnote 59] Accordingly, we recommended that a human capital management strategy be immediately implemented for this office. Two years later we reported that U.S. Customs and Border Protection is in the process of implementing this recommendation.[Footnote 60] In particular, the program office had developed and begun implementing a human capital management plan, but the office has continued to experience difficulty in filling key positions. The ACE program office has begun implementing a new staffing plan intended to address DHS's concern that the program office has insufficient government program management staff. We have reported on similar IT human capital problems associated with US-VISIT and recommended that it develop and implement a human capital strategy, which the department is in the process of doing.[Footnote 61] As mentioned, the DHS CIO Council established IT human capital as one of its eight priority areas. As with the other priority areas, a component agency sponsor has been named for human capital. However, unlike the other priority areas, as of mid-July 2004, an Office of the CIO official had not been assigned to work in this area. An Office of the CIO official explained that the person originally assigned this task is no longer with the department and that the office was determining who would take over this role. Moreover, in February 2003, the DHS CIO set July 2003 as a milestone for developing a current inventory of IT skills, resources, and positions, and September 2003 as the target date for developing an action plan. In mid-July 2004, the CIO stated that these milestones were not met and acknowledged that progress in IT human capital has been slow. He stated that he still plans to complete an inventory and action plan but could not provide an estimated completion date. We have issued a large body of human capital work that could assist in this undertaking. For example, while agencies' approaches to workforce planning will vary, our guide on strategic workforce planning lays out five key principles that such a process should address irrespective of the context in which planning is done.[Footnote 62] These are as follows: * Involve top management, employees, and other stakeholders in developing, communicating, and implementing the strategic workforce plan. * Determine the critical skills and competencies that will be needed to achieve current and future programmatic results. * Develop strategies that are tailored to address gaps in number, deployment, and alignment of human capital approaches for enabling and sustaining the contributions of all critical skills and competencies. * Build the capability needed to address administrative, educational, and other requirements important to support workforce strategies. * Monitor and evaluate the agency's progress toward its human capital goals and the contribution that human capital results have made toward achieving programmatic goals. Conclusions: DHS faces the formidable challenge of defining and implementing an effective information and technology management structure at the same time that it is developing and acquiring major IT systems that are critical to meeting its mission needs. Although DHS has made progress in addressing this challenge, it does not yet have a fully institutionalized structure in place, which puts its pursuit of new and enhanced IT investments at risk of not optimally supporting corporate mission needs and not meeting cost, schedule, capability, and benefit commitments. In particular, still lacking in the department's IT strategic planning process--which is critical because it defines what an agency seeks to accomplish and how that will be achieved--are goals, performance measures, and milestones for significant activities and whether DHS has appropriately skilled and deployed IT staff. The department's CIO and DHS CIO Council--which is responsible for establishing a strategic plan and setting priorities for departmentwide IT--are organizationally placed to improve this planning process and to consider the needs of DHS as a whole. With regard to the other six elements of an effective information and technology management structure, DHS can be guided by the many recommendations that we and the Office of Inspector General have already made to the CIO and other responsible entities, along with our best practices guidance, as it uses technology to help better secure the homeland. Recommendations: To strengthen DHS's IT strategic planning process, we recommend that the Secretary of Homeland Security direct the CIO, in conjunction with the DHS CIO Council, to take the following three actions: * Establish IT goals and performance measures that, at a minimum, address how information and technology management contributes to program productivity, the efficiency and effectiveness of agency operations, and service to the public. * Establish milestones for the initiation and completion of major information and technology management activities. * Analyze whether DHS has appropriately deployed IT staff with the relevant skills to obtain its target IT structure and, if it does, whether they are allocated appropriately. Agency Comments and Our Evaluation: In written comments on a draft of our report signed by the Director, Departmental GAO/OIG Liaison within the Office of the Chief Financial Officer, DHS generally concurred with our recommendations. DHS also offered specific comments related to these recommendations, including: * Regarding our recommendation that DHS establish IT goals and performance measures, the department emphasized that it is developing road maps for its eight priority areas that, over the next few months, will include developing goals, performance measures, and time lines for implementation. We believe that DHS's plans are consistent with our recommendation. * On our recommendation to establish milestones for the initiation and completion of major information and technology management activities, DHS stated that its interpretation was that the recommendation pertained to having an established IT investment management structure and centered its comments on its plans related to two of its priorities--enterprise architecture and portfolio management. We agree that these two areas are covered by our recommendation. However, our recommendation is broader than just these two areas, instead covering any information and technology management activity identified as significant through DHS's IT strategic planning processes (e.g., the development of milestones related to activities associated with each of DHS's IT priorities). * With respect to our recommendation on IT staffing, DHS stated that on July 30, 2004, the CIO approved funding for an IT human capital center of excellence. This center is tasked with delivering plans, processes, and procedures to execute an IT human capital strategy and to conduct an analysis of the skill sets of DHS IT professionals. DHS's stated action represents a first step toward accomplishing these activities. DHS also provided specific comments on our characterization of the department's progress related to its IT investment management process. The department described its IT investment governance boards and processes and stated that it believed that its IT investment management process has matured and that IT investments are subject to a rigorous corporate review. While our report acknowledges that DHS had changed its IT investment management process to reflect lessons learned and continuous improvement of the process, we believe that our characterization of this process as still maturing is appropriate. For example, the directive that instructs DHS component entities on which investments need to be approved and by what governance board does not reflect the current process. Regarding DHS's comment that its IT investments are subject to a rigorous corporate review, as we reported, DHS has not established a process to ensure that control reviews of IT investments are performed in a timely manner and many of DHS's IT investments have not undergone such reviews. Lastly, DHS provided technical comments, which we addressed in the report as appropriate. DHS's written comments, along with our responses, are reproduced in appendix II. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the Secretary of Homeland Security and the Director, Office of Management and Budget. Copies will also be available at no charge on GAO's Web site at [Hyperlink, http://www.gao.gov]. If you have any questions on matters discussed in this report, please contact Randy Hite at (202) 512-3439 or via e-mail at [Hyperlink, hiter@gao.gov]. Other key contributors to this report were Season Dietrich, Tamra Goldstein, and Linda Lambert. Signed by: Randolph C. Hite: Director: Information Technology Architecture and Systems Issues: Signed by: David A. Powner: Director, Information Technology Management Issues: [End of section] Appendixes: [End of section] Appendix I: Department of Homeland Security Governance Entities: Governance board: Investment Review Board; Membership: Chaired by Deputy Secretary; Members include under secretaries and other department executives, including the Chief Information Officer (CIO); Example of responsibilities: Makes final determination as to whether to approve level 1 investments. Governance board: Department of Homeland Security (DHS) Management Council; Membership: Chaired by Under Secretary for Management; Members include chief operating officers or equivalents; Example of responsibilities: Ensures that management activities are in alignment with DHS mission, strategies, and goals; Makes recommendations regarding departmental management policies, procedures, and processes. Governance board: Joint Requirements Council; Membership: Chaired by chief operating officers or equivalent of one of the line agencies on a rotating basis (currently 1 year); Members include senior managers,[A] including the Chief Technology Officer, who is within the office of the CIO; Example of responsibilities: Decision authority for level 2 investments[B]; Reviews all projects/programs and new initiatives greater than $100 million in preparation for the investment review board; Validates requirements. Governance board: Asset Management Board; Membership: Chaired by DHS Director of Asset Management; Members are designated asset managers from the component agencies; Example of responsibilities: Reviews and approves real property acquisitions, sales, and transfers $1 million and above; Develops and implements asset management policy, procedures, and business practices. Governance board: Enterprise Architecture Board; Membership: Chaired by CIO; Members are CIOs from component entities; Example of responsibilities: Performs technical reviews of IT investments; Approves IT business cases and develops IT strategic guidance. Governance board: Integrated Product Teams; Membership: Members include subject matter experts from appropriate functional disciplines; Example of responsibilities: Convened by the Joint Requirements Council to address specific issues; Has a defined scope and duration and disbands upon completion. Governance board: Commodity Councils/ Management Boards; Membership: Members include program and procurement experts from organizational elements; Example of responsibilities: Develop and implement DHS sourcing strategy for a specific commodity and manages specific asset types; Coordinate policy formulation and define authorities and processes for achieving integrated asset management. Source: DHS. [A] Senior executives (SES) with a broad operating background who understand the requirements and capabilities of their agencies and who have sufficient authority to make decisions for the agency in their role on the Joint Requirements Council. [B] According to the DHS coordinator of this process, level 3 IT investments are approved by the component agency and are subject to review by the CIO, Chief Financial Officer, and Chief Procurement Officer, also known as the Management Review Council. If these officials have concerns about the investment or find that there are cross-programmatic issues to be addressed, they can refer the investment to the Joint Requirements Council for review. [End of table] [End of section] Appendix II: Comments from the Department of Homeland Security: U.S. Department of Homeland Security: Washington, DC 20528: August 12, 2004: Homeland Security: Mr. Randolph Hite: Director, Architecture and Systems Issues: Government Accountability Office: Washington, DC 20548: Dear Mr. Hite: RE: Draft Report GAO-04-702: Formidable Information Technology Challenge Requires Institutional Approach (GAO Job Code 31.0464): Thank you for the opportunity to review the above referenced draft report. We generally concur with the draft report's recommendations but there are several items we want to address. DHS appreciates that the draft report acknowledges both DHS's progress and challenges in information and technology management, particularly in light of the diversity of the 22 inherited agencies and the size and complexity of the Department. DHS is both meeting these challenges while at the same time shepherding the integration of systems and management approaches of is many organizational elements into an enterprise architecture. The draft report discusses the draft IRM Strategic Plan; that DHS had worked on and incorrectly suggests that in March 2004, the Department issued the IRM plan as an official Version 1.0 of its I Strategic Plan. This IRM plan, however, is still draft and does not reflect the full scope of DHS' Strategic Planning initiative. The DHS Chief Information Officer (CIO) intends to issue an IT Strategic Plan before the end of this calendar year. Nevertheless, the Department's IT efforts are designed to support the Department's Strategic Plan goals. As noted in the draft GAO report, the DHS CIO, in conjunction with the DHS CIO Council has identified eight priority areas and has developed roadmaps for each of these priorities. These roadmaps include a description of the current condition of the areas, the need for change, the planned future state, initiatives underway or needed, and any barriers to achieving these goals. Equally important, the Department released Version 1.0 of its Enterprise Architecture (EA) in September 2003. The Department recognizes that due to time constraints, Version 1.0 was not an all- inclusive product; and accordingly, the Department, continues its efforts to improve and will release Version 2.0 of the EA in September 2004. The draft report states that the investment management process is still maturing and has yet to be institutionalized, and that most projects have not, yet been incorporated into a departmental oversight process. The functionality and effectiveness of the investment governance bodies have matured during the last year. The Investment Review Board (IRB) is the executive review board that I provides acquisition oversight of DHS Level 1 investments (greater than $100 million), and conducts portfolio management reviews. The IRB conducts systematic reviews of investment submissions and approves key decisions. It also serves as a forum for iscussing investment issues and resolving problems requiring senior management attention. The DHS CIO serves on the IRB and actively participates in all IT investment decisions. Similarly, a Joint Requirements Council (JRC) was established as a senior requirements review board that conducts program reviews to oversee the requirements generation process, validate mission needs statements, review cross-functional needs and requirements, and make programmatic recommendations to the IRB on proposed new programs. The JRC has decision authority for projects/programs whose cost is $50-$100 million. The DHS CIO also is a member of the JRC. In addition, the Department created an Enterprise Architecture Board (EAB) chaired by the CIO and composed of all CIOs from the Organizational Elements. The EAB exercises architecture oversight of IT investments, reviews and approves IT investments with an acquisition cost between $1-$10 million or a Life Cycle Cost of $5-$20 million, and approves IT business cases and develops IT strategic guidance. Another component of this effort involves an Asset Management Board, chaired by the DHS Director of Asset Management, with membership from the Organizational Elements. The Asset Management Board develops and implements asset management policy, procedures and business practices, and establishes asset management controls and program metrics. This Board reviews IT programs from various perspectives. Interim guidance governing DHS investment review process responsibilities was issued in May 2004. For certain, the DHS investment management process has matured through the above described processes and structures. As a result, DHS IT investments are subject to a rigorous corporate review. The draft report states that, as related to information security management, DHS did not have a process to ensure that all plans of action and milestones (POAM) for identified weaknesses were developed, implemented, and managed. The Department has instituted use of a tool, Trusted Agent FISMA, which allows the CIO and the Chief Information Security Officer (CISO) to monitor each Organizational Element's progress in developing and achieving the milestones identified in the POAM. On the other hand, the draft report also states that "DHS has developed an information security program strategic plan, which identifies major program areas, goals, and objectives. These major security program areas allow DHS to implement and maintain information security as part of its capital investment control process, systems development life cycle, and the enterprise architecture, and are essential to providing security services that protect the confidentiality, integrity, and availability of information and to provide accountability for activities on DHS networks and computing platforms." We find such statements somewhat conflicting as presented. Human capital management issues are the key to successful implementation of the Department and are crucial to design, development, implementation, and maintenance of information and technologies. The draft report discusses IT human capital management and points out the need for strategic human capital planning. This is a government-wide issue that transcends the IT environment; the DHS CIO has taken steps to address (GAO's concerns. For example, there is currently underway an initiative that responds directly 'to your recommendation, regarding analysis of IT staff to determine whether IT professionals have the appropriate skills for the areas in which they are deployed. The DHS CIO, in conjunction. with the DHS CIO Council, has as one of his eight priorities, IT Human Capital. On July 30, 2004, the DOS CIO formally approved funding for the IT Human Capital Center of Excellence (COE). The COE is lead by the CIO of the Federal Law Enforcement Training Center (FLETC) and is supported by a Director within the OLIO (Office of the CIO) and a team of Human Capital professionals drawn from several of the Organizational Elements within DHS. The COE is working under thegovernance of the DHS CIO Council and with the guidance of the DHS Chief Human Capital Officer (CHCO) and is tasked with delivering plans, processes and procedures to execute the IT human capital strategy necessary to support the mission and goals of DHS. The COE will be conducting an analysis of the skill sets of all DHS IT professionals. This analysis will include an assessment of which skills are currently held by the IT employees versus which skills are necessary for each employee to have in order to meet the DHS mission and goals. The draft report recommends that the DHS CIO establish IT goals and performance measures to address how information and technology management contributes to program productivity, the efficiency and effectiveness of agency operations, and the service to the public. The draft report, however, glosses over DHS's performance measures process. At the capital and investment level the Department has performance measures that are captured in the OMB Exhibit 300. At the program level DHS is developing more robust monitoring of oo-going programs using key measures. The DHS CIO and the DHS CIO Council have established' eight priority areas: Information Sharing, Governance, IT Human Capital, Enterprise Architecture, Mission Rationalization, Infrastructure, Portfolio Management, and Information Security. Initial roadmaps have been developed for each of these priority areas. Over the next few months, each priority area will develop goals, performance measures, and timelines for implementation. The Department interprets GAO's recommendation to establish milestones for the initiation and conception of major information and technology management activities, to mean that there should be an established IT Investment Management structure. Two of the eight priorities established by the DHS CIO and the DHS CIO Council support this recommendation: Enterprise Architecture and Portfolio Management. The DHS CIO is establishing an Enterprise Architecture COE and is developing a Portfolio Management process, which will direct our IT investment decisions. Additionally, we have established and implemented a Capital Planning and Investment Control Process, and have used this process to influence and direct our investments. The Department has developed a draft Systems Development Life Cycle Model which is currently under review and will be implemented in the first quarter of FY 2005. In addition, the Department is developing consolidated tools, processes, and procedures for Program Reviews. Once these initiatives are complete, the Department will have all the elements in place for a robust investment management system covering all aspects of the investment life cycle including the Selection, Control, and Evaluation phases. We again thank you for the opportunity to provide comments on this report. Sincerely; Signed by: Anna F. Dixon: Director, Departmental GAO/OIG Liaison: Office of the Chief Financial Officer: U.S. Department of Homeland Security: The following are GAO's comments on the Department of Homeland Security's (DHS) letter dated August 12, 2004. GAO Comments: 1. Although the IRM strategic plan is not labeled draft, we changed our characterization of the plan in the report based on the DHS comments. 2. As discussed in the report, these road maps are draft and incomplete (e.g., they do not include fully defined goals and performance measures). 3. The Joint Requirements Council's charter does not list the CIO as a member of this council; instead the chief technology officer is the Office of the CIO's representative on the council, which is reflected in our report. 4. We believe that our characterization of DHS's IT investment management process as still maturing is appropriate. For example, the May 2003 directive that instructs DHS component entities on which investments need to be approved and by what governance board does not reflect the current process, and more recent DHS documentation related to the process provides inconsistent information. 5. We disagree because, as we stated in the report, DHS has not established a process to ensure that control reviews of IT investments are performed in a timely manner, and many of DHS's IT investments have not undergone such reviews. 6. We added information about the DHS tool to the report. 7. The DHS quote does not include our attribution in the report that the assessment of the information security program areas is the department's own representation. We did not evaluate the information security program strategic plan. 8. We do not agree that these statements are conflicting. The management of the department's plans of action and milestones is just one of many planned actions discussed in the information security program strategic plan. 9. As stated in the report, we agree that human capital management is a key to the success of the department and that the challenges that the federal government faces in maintaining a high-quality IT workforce are long-standing and widely recognized. It is because of these views that we are concerned that the department did not meet the CIO's goal of having a current inventory of IT skills by July 2003 and an action plan by September 2003. Nevertheless, DHS's stated action represents a first step toward accomplishing these activities. 10. Our report dealt with enterprise-level performance measures, not project-specific measures as required by the exhibit 300s. With respect to DHS's plans for each of the priority areas, we believe this is consistent with our recommendation. 11. We agree that the two priority areas discussed in the DHS letter are covered by our recommendation. However, our recommendation is broader than just these two areas. Specifically, our recommendation covers any information and technology management activity identified as significant through DHS's IT strategic planning processes (e.g., the development of milestones related to activities associated with each of DHS's IT priorities). [End of section] Related GAO Products: [End of section] Homeland Security: Efforts Under Way to Develop Enterprise Architecture, but Much Work Remains. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-777] Washington, D.C.: Aug. 6, 2004. Homeland Security: Performance of Information System to Monitor Foreign Students and Exchange Visitors Has Improved, but Issues Remain. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-690] Washington, D.C.: June 18, 2004. Human Capital: DHS Faces Challenges In Implementing Its New Personnel System. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-790] Washington, D.C.: June 18, 2004. Information Technology: Homeland Security Should Better Balance Need for System Integration Strategy with Spending for New and Enhanced Systems. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-509] Washington, D.C.: May 21, 2004. Information Technology: Early Releases of Customs Trade System Operating, but Pattern of Cost and Schedule Problems Needs to Be Addressed. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-719] Washington, D.C.: May 14, 2004. Homeland Security: First Phase of Visitor and Immigration Status Program Operating, but Improvements Needed. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-586] Washington, D.C.: May 11, 2004. Additional Posthearing Questions Related to Proposed Department of Homeland Security (DHS) Human Capital Regulations. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-617R] Washington, D.C.: April 30, 2004. Project SAFECOM: Key Cross-Agency Emergency Communications Effort Requires Stronger Collaboration. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-494] Washington, D.C.: April 16, 2004. Posthearing Questions Related to Proposed Department of Homeland Security (DHS) Human Capital Regulations. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-570R] Washington, D.C.: March 22, 2004. Human Capital: Preliminary Observations on Proposed DHS Human Capital Regulations. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-479T] Washington, D.C.: February 25, 2004. Aviation Security: Computer-Assisted Passenger Prescreening System Faces Significant Implementation Challenges. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-385] Washington, D.C.: February 12, 2004. Information Technology: OMB and Department of Homeland Security Investment Reviews. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-323] Washington, D.C.: February 10, 2004. Coast Guard: New Communication System to Support Search and Rescue Faces Challenges. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-1111] Washington, D.C.: September 30, 2003. Human Capital: DHS Personnel System Design Effort Provides for Collaboration and Employee Participation. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-1099] Washington, D.C.: September 30, 2003. Homeland Security: Risks Facing Key Border and Transportation Security Program Need to Be Addressed. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-1083] Washington, D.C.: September 19, 2003. Information Technology: Homeland Security Needs to Improve Entry Exit System Expenditure Planning. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-563] Washington, D.C.: June 9, 2003. Homeland Security: Information Sharing Responsibilities, Challenges, and Key Management Issues. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-715T] Washington, D.C.: May 8, 2003. Customs Service Modernization: Automated Commercial Environment Progressing, but Further Acquisition Management Improvements Needed. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-406] Washington, D.C.: February 28, 2003. Major Management Challenges and Program Risks: Department of Homeland Security. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-102] Washington, D.C.: January 2003. Homeland Security: Information Technology Funding and Associated Management Issues. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-250] Washington, D.C.: December 13, 2002. National Preparedness: Integrating New and Existing Technology and Information Sharing into an Effective Homeland Security Strategy. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-811T] Washington, D.C.: June 7, 2002. Customs Service Modernization: Management Improvements Needed on High- Risk Automated Commercial Environment Project. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-02-545] Washington, D.C.: May 13, 2002. (310464): FOOTNOTES [1] Statement of Admiral James Loy, Deputy Secretary, Department of Homeland Security, before the House Select Committee on Homeland Security, May 6, 2004. [2] Generally speaking, an enterprise architecture connects an organization's strategic plan with program and system solution implementations by providing the fundamental information details needed to guide and constrain implementable investments in a consistent, coordinated, and integrated fashion. [3] GAO, Homeland Security: Efforts Under Way to Develop Enterprise Architecture, but Much Work Remains, GAO-04-777 (Washington, D.C.: Aug. 6, 2004). [4] For example, see GAO, Major Management Challenges and Program Risks: Department of Homeland Security, GAO-03-102 (Washington, D.C.: January 2003) and Homeland Security: Proposal for Cabinet Agency Has Merit, but Implementation Will be Pivotal to Success, GAO-02-886T (Washington, D.C.: June 25, 2002). [5] GAO, Homeland Security: Information Sharing Responsibilities, Challenges, and Key Management Issues, GAO-03-715T (Washington, D.C.: May 8, 2003). [6] GAO, Major Management Challenges and Program Risks: A Governmentwide Perspective, GAO-03-95 (Washington, D.C.: January 2003). [7] As we recently reported, the Congress has made agency CIOs statutorily responsible for some of these key elements, such as IT investment management, information security management, and IT human capital management. See GAO, Federal Chief Information Officers: Responsibilities, Reporting Relationships, Tenure, and Challenges, GAO-04-823 (Washington, D.C.: July 21, 2004). [8] 44 U.S.C. 3506(a). [9] GAO, Executive Guide: Measuring Performance and Demonstrating Results of Information Technology Investments, GAO/AIMD-98-89 (Washington, D.C.: March 1998). [10] 44 U.S.C. 3506(h); 40 U.S.C. 11313. [11] A balanced scorecard is a tool to measure performance at various levels of an organization and to provide employees with data to help them achieve individual and organizational results. [12] GAO, Information Technology: Homeland Security Should Better Balance Need for System Integration Strategy with Spending for New and Enhanced Systems, GAO-04-509 (Washington, D.C.: May 21, 2004). [13] For example, see GAO, Architect of the Capitol: Management and Accountability Framework Needed for Organizational Transformation, GAO-03-231 (Washington, D.C.: Jan. 17, 2003) and Maximizing the Success of Chief Information Officers: Learning from Leading Organizations, GAO-01-376G (Washington, D.C.: February 2001). [14] E-Government Act of 2002, Public Law 107-347 (Dec. 17, 2002). [15] GAO, National Preparedness: Integrating New and Existing Technology and Information Sharing into an Effective Homeland Security Strategy, GAO-02-811T (Washington, D.C.: June 7, 2002). [16] GAO-04-777. [17] GAO, Information Technology: Early Releases of Customs Trade System Operating, but Pattern of Cost and Schedule Problems Needs to Be Addressed, GAO-04-719 (Washington, D.C.: May 14, 2004) and Homeland Security: First Phase of Visitor and Immigration Status Program Operating, but Improvements Needed, GAO-04-586 (Washington, D.C.: May 11, 2004). [18] This management directive covers both IT and non-IT investments. [19] GAO, Information Technology: OMB and Department of Homeland Security Investment Reviews, GAO-04-323 (Washington, D.C.: Feb. 10, 2004). [20] GAO, Information Technology Investment Management: A Framework for Assessing and Improving Process Maturity, GAO-04-394G (Washington, D.C.: March 2004). [21] The investment review team was made up of representatives from the offices of the CIO, the chief financial officer, and the chief procurement officer, as well as several component agencies. [22] GAO, Aviation Security: Computer-Assisted Passenger Prescreening System Faces Significant Implementation Challenges, GAO-04-385 (Washington, D.C.: Feb. 12, 2004) and GAO-04-719. [23] GAO-04-586. [24] GAO-04-323. [25] Carnegie Mellon University's Software Engineering Institute is recognized for its expertise in developing models and methods that define and determine organizations' software-intensive systems process maturity. [26] GAO, Customs Service Modernization: Management Improvements Needed on High-Risk Automated Commercial Environment Project, GAO-02-545 (Washington, D.C.: May 13, 2002) and Homeland Security: Risks Facing Key Border and Transportation Security Program Need to be Addressed, GAO-03-1083 (Washington, D.C.: Sept. 19, 2003). [27] GAO-04-719. [28] GAO-04-586. [29] GAO, Year 2000 Computing Crisis: A Testing Guide, GAO/AIMD-10.1.21 (Washington, D.C.: November 1998). [30] GAO, Coast Guard: New Communication System to Support Search and Rescue Faces Challenges, GAO-03-1111 (Washington, D.C.: Sept. 30, 2003). [31] GAO-04-385 and GAO-04-586. [32] GAO-04-385. [33] GAO, Homeland Security: Performance of Information System to Monitor Foreign Students and Exchange Visitors Has Improved, but Issues Remain, GAO-04-690 (Washington, D.C.: June 18, 2004). [34] See, for example, GAO/AIMD-98-89 and GAO/AIMD-10.1.21. [35] See GAO, High-Risk Series: Protecting Information Systems Supporting the Federal Government and the Nation's Critical Infrastructures, GAO-03-121 (Washington, D.C.: January 2003) for our latest high-risk series report on this issue. [36] 44 U.S.C. 3545. [37] Department of Homeland Security, Office of Inspector General, DHS Information Technology: Information Security Program Evaluation, FY2003, OIG-IT-03-02 (September 2003). [38] Department of Homeland Security, Office of Inspector General, Inadequate Security Controls Increase Risks to DHS Wireless Networks, OIG-04-27 (June 2004). [39] Accreditation is the authorization of an IT system to process, store, or transmit information, granted by a management official that provides a form of quality control and challenges managers and technical staff to find the best fit for security, given technical constraints, operational constraints, and mission requirements. Certification is the comprehensive evaluation of the technical and nontechnical security controls of an IT system to support the accreditation process that establishes the extent to which a particular design and implementation meets a set of specified security requirements. [40] GAO, Executive Guide: Information Security Management, GAO/AIMD- 98-68 (Washington, D.C.: May 1998). [41] GAO, Information Technology: Homeland Security Needs to Improve Entry Exit System Expenditure Planning, GAO-03-563 (Washington, D.C.: June 9, 2003). [42] GAO-04-586. [43] Department of Homeland Security, Performance and Accountability Report, Fiscal Year 2003 (Feb. 13, 2004). [44] GAO-03-715T. [45] GAO, Homeland Security: Information Sharing Responsibilities, Challenges, and Key Management Issues, GAO-03-1165T (Washington, D.C.: Sept. 17, 2003). [46] GAO, Critical Infrastructure Protection: Improving Information Sharing with Infrastructure Sectors, GAO-04-780 (Washington, D.C.: July 9, 2004). [47] GAO, Information Sharing: Practices That Can Benefit Critical Infrastructure Protection, GAO-02-24 (Washington, D.C.: Oct. 15, 2001). [48] Data mining is the application of database technology and techniques--such as statistical analysis and modeling--to uncover hidden patterns and subtle relationships in data and to infer rules that allow for the prediction of future results. [49] GAO, Data Mining: Federal Efforts Cover a Wide Range of Uses, GAO- 04-548 (Washington, D.C.: May 4, 2004). [50] As part of our methodology for this report, we aggregated the data collected by each agency and sent them to the agency chief information officer, comparable official, or their designee, and asked that they review the characteristics for completeness and accuracy. DHS did not respond to our request to review the reported data. [51] 5 U.S.C. 552a. [52] GAO-04-385. [53] We refer to the eight Fair Information Practices proposed in 1980 by the Organization for Economic Cooperation and Development and that were endorsed by the U.S. Department of Commerce in 1981. These are collection limitation, purpose specification, use limitation, data quality, security safeguards, openness, individual participation, and accountability. [54] GAO, Paperwork Reduction Act: Agencies' Paperwork Burden Estimates Due to Federal Actions Continue to Increase, GAO-04-676T (Washington, D.C.: Apr. 20, 2004). [55] GAO-01-376G. [56] GAO, Human Capital: DHS Personnel System Design Effort Provides for Collaboration and Employee Participation, GAO-03-1099 (Washington, D.C.: Sept. 30, 2003); Human Capital: Preliminary Observations on Proposed DHS Human Capital Regulations, GAO-04-479T (Washington, D.C.: Feb. 25, 2004); Posthearing Questions Related to Proposed Department of Homeland Security (DHS) Human Capital Regulations, GAO-04-570R (Washington, D.C.: Mar. 22, 2004); and Additional Posthearing Questions Related to Proposed Department of Homeland Security (DHS) Human Capital Regulations, GAO-04-617R (Washington, D.C.: Apr. 30, 2004). [57] GAO, Human Capital: DHS Faces Challenges In Implementing Its New Personnel System, GAO-04-790 (Washington, D.C.: June 18, 2004). [58] Department of Homeland Security, Office of Inspector General, Improvements Needed To DHS' Information Technology Management Structure, OIG-04-30 (July 2004). [59] GAO-02-545. [60] GAO-04-719. [61] GAO-03-1083 and GAO-04-586. [62] GAO, Human Capital: Key Principles for Effective Strategic Workforce Planning, GAO-04-39 (Washington, D.C.: Dec. 11, 2003). GAO's Mission: The Government Accountability Office, the investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through the Internet. GAO's Web site ( www.gao.gov ) contains abstracts and full-text files of current reports and testimony and an expanding archive of older products. The Web site features a search engine to help you locate documents using key words and phrases. You can print these documents in their entirety, including charts and other graphics. Each day, GAO issues a list of newly released reports, testimony, and correspondence. GAO posts this list, known as "Today's Reports," on its Web site daily. The list contains links to the full-text document files. To have GAO e-mail this list to you every afternoon, go to www.gao.gov and select "Subscribe to e-mail alerts" under the "Order GAO Products" heading. Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Public Affairs: Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.