Maritime Security

Better Planning Needed to Help Ensure an Effective Port Security Assessment Program Gao ID: GAO-04-1062 September 30, 2004

Created in the wake of the September 11, 2001, terrorist attacks, the Port Security Assessment Program was designed to evaluate security at the nation's 55 most economically and militarily strategic ports. Implemented by the U.S. Coast Guard, an agency of the Department of Homeland Security, the program focuses on identifying vulnerabilities, suggesting approaches to minimize them, and making the information available to those responsible for developing and implementing portwide security plans. The program has been under way for more than 2 years and has undergone several sets of changes, including the addition of a geographic information system (GIS). GAO was asked to discuss why and how the program changed and assess the Coast Guard's approach for implementing the program in its current form.

Changes in the Port Security Assessment Program reflect attempts to deal with two main developments since the program's inception: evolving assessment needs at the ports and missteps in how the initial assessments were carried out. The program was designed as a comprehensive assessment of each port and its critical assets, such as passenger terminals, factories, cargo facilities, and bridges. However, the need for comprehensive assessments was diminished when many owners and operators of these critical assets began conducting their own assessments to comply with new regulatory requirements or apply for security grants. The program's assessments also proved more expensive than expected, and a GAO review conducted at the time found shortcomings in their quality and usefulness. The current program's assessments are more targeted in scope and nature, including the opportunity for local Coast Guard officials to request reviews of specific assets they do not know enough about. To help local authorities with security planning and response, the Coast Guard decided to incorporate a GIS. A GIS is a computer mapping system designed to have many information "layers" that can be easily updated and retrieved. The Coast Guard expects to complete the assessments at the 55 ports by February 2005, but no timeline exists for making the GIS component operational. Although the revised program holds promise, the implementation approach is at increased risk because the Coast Guard is not taking sufficient steps in the planning process. Contrary to best practices for technology systems development, the GIS is being developed without sufficient up-front work to identify how the system will be expected to perform. Both the GIS component and the program as a whole also lack a project plan detailing tasks, schedules, and costs. In other federal agencies, GAO has identified similar projects that failed when such steps were not followed. The initial response of local Coast Guard officials to the new, targeted assessments is generally positive. However, the assessments could be of greater benefit if functional requirements for the GIS were more clearly defined, so the Coast Guard could use the assessments to address gaps in security knowledge.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-04-1062, Maritime Security: Better Planning Needed to Help Ensure an Effective Port Security Assessment Program This is the accessible text file for GAO report number GAO-04-1062 entitled 'Maritime Security: Better Planning Needed to Help Ensure an Effective Port Security Assessment Program' which was released on September 30, 2004. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Requesters: United States Government Accountability Office: GAO: September 2004: Maritime Security: Better Planning Needed to Help Ensure an Effective Port Security Assessment Program: GAO-04-1062: GAO Highlights: Highlights of GAO-04-1062, a report to congressional requesters Why GAO Did This Study: Created in the wake of the September 11, 2001, terrorist attacks, the Port Security Assessment Program was designed to evaluate security at the nation‘s 55 most economically and militarily strategic ports. Implemented by the U.S. Coast Guard, an agency of the Department of Homeland Security, the program focuses on identifying vulnerabilities, suggesting approaches to minimize them, and making the information available to those responsible for developing and implementing portwide security plans. The program has been under way for more than 2 years and has undergone several sets of changes, including the addition of a geographic information system (GIS). GAO was asked to discuss why and how the program changed and assess the Coast Guard‘s approach for implementing the program in its current form. What GAO Found: Changes in the Port Security Assessment Program reflect attempts to deal with two main developments since the program‘s inception: evolving assessment needs at the ports and missteps in how the initial assessments were carried out. The program was designed as a comprehensive assessment of each port and its critical assets, such as passenger terminals, factories, cargo facilities, and bridges. However, the need for comprehensive assessments was diminished when many owners and operators of these critical assets began conducting their own assessments to comply with new regulatory requirements or apply for security grants. The program‘s assessments also proved more expensive than expected, and a GAO review conducted at the time found shortcomings in their quality and usefulness. The current program‘s assessments are more targeted in scope and nature, including the opportunity for local Coast Guard officials to request reviews of specific assets they do not know enough about. To help local authorities with security planning and response, the Coast Guard decided to incorporate a GIS. A GIS is a computer mapping system designed to have many information ’layers“ that can be easily updated and retrieved. The Coast Guard expects to complete the assessments at the 55 ports by February 2005, but no timeline exists for making the GIS component operational. Although the revised program holds promise, the implementation approach is at increased risk because the Coast Guard is not taking sufficient steps in the planning process. Contrary to best practices for technology systems development, the GIS is being developed without sufficient up-front work to identify how the system will be expected to perform. Both the GIS component and the program as a whole also lack a project plan detailing tasks, schedules, and costs. In other federal agencies, GAO has identified similar projects that failed when such steps were not followed. The initial response of local Coast Guard officials to the new, targeted assessments is generally positive. However, the assessments could be of greater benefit if functional requirements for the GIS were more clearly defined, so the Coast Guard could use the assessments to address gaps in security knowledge. A terrorist attack on port assets could result in human casualties, economic disruption, and environmental destruction. Assessments of assets such as bridges are to identify methods to protect them from such an attack. [See PDF for image] [End of figure] What GAO Recommends: To enhance the program‘s effectiveness as a tool for improving port security, GAO recommends that the Coast Guard define performance requirements for the GIS and develop a more comprehensive plan for implementing both the GIS and the Port Security Assessment Program as a whole. In commenting on a draft of this report, the Coast Guard agreed to take steps to define the functional requirements of the GIS and to more fully develop a plan for the long-term implementation of the program. www.gao.gov/cgi-bin/getrpt?GAO-04-1062. To view the full product, including the scope and methodology, click on the link above. For more information, contact Margaret Wrightson at (415) 904-2200 or wrightsonm@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: Assessment Program Has Been Extensively Revised: Absence of Key Management Elements Places Program's Potential to Enhance Port Security at Higher Risk: Conclusions: Recommendations for Executive Action: Agency Comments: Appendix I: Objectives, Scope, and Methodology: Appendix II: GAO Contacts and Staff Acknowledgments: GAO Contacts: Staff Acknowledgments: Figures: Figure 1: Examples of Layers in a Geographic Information System: Figure 2: Sample GIS Map of Debris Path from Space Shuttle Columbia: Figure 3: Timeline of Key Events in the Development of Port Security Assessment Program: Abbreviations: BLM: Bureau of Land Management: DHS: Department of Homeland Security: DTRA: Defense Threat Reduction Agency: GIS: geographic information system: MTSA: Maritime Transportation Security Act: NVIC: Navigation and Vessel Inspection Circular: United States Government Accountability Office: Washington, DC 20548: September 30, 2004: The Honorable Don Young: Chairman: Committee on Transportation and Infrastructure: House of Representatives: The Honorable Frank A. LoBiondo: Chairman: Subcommittee on Coast Guard and Maritime Transportation: Committee on Transportation and Infrastructure: House of Representatives: Three years after the terrorist attacks of September 11, 2001, securing the nation's ports continues to be a major concern. Ports and associated waterways are particularly vulnerable because of their size, accessibility, and the many sites and facilities that could be targeted. Gathering information about these vulnerabilities is an essential step for developing deterrents and responding effectively if an incident occurs. One such effort is the Port Security Assessment Program, which is designed to assess port vulnerabilities and security measures in the nation's 55 most economically and militarily strategic ports.[Footnote 1] Since November 2001, nearly $70 million in appropriated funds has been and continues to be spent on this project, which is administered by the United States Coast Guard, an agency of the Department of Homeland Security (DHS). This program has changed considerably since its inception in the days immediately following the September 11 attacks. Among these changes, the Coast Guard has added a new feature--a geographic information system (GIS). A GIS is a computer mapping system with many information "layers" that can be quickly retrieved and displayed and easily updated. If, for example, a port received notice of potential threats to chemical plants in the area, a well-designed GIS could identify locations of these plants, provide a variety of information about them, and pinpoint available surveillance and response resources for Coast Guard personnel and others involved in port security. This tool is intended to provide up-to-date, readily accessible information to help develop security plans and respond to specific threats or incidents. However, the experience of other federal agencies has shown that developing an information technology system, such as a GIS, that clearly meets users' needs can be difficult. Given the role the program is expected to play in enhancing the Coast Guard's ability to provide security at our nation's ports, this report (1) discusses why and how the program has changed over time and (2) assesses the Coast Guard's approach for implementing the program as it is currently configured. To address the first objective, we reviewed Coast Guard documents and spoke with officials at Coast Guard headquarters responsible for implementing the program. We also visited ports that had been assessed. At the ports, we interviewed local Coast Guard personnel as well as numerous stakeholders to determine how the assessment process was carried out. For part of the history of the program, we also relied on our previous work.[Footnote 2] To address our second objective, we interviewed Coast Guard officials, including the GIS Program Manager to assess progress on the GIS development effort. We also reviewed Coast Guard documents, including its systems acquisition guidance, and documentation of the Coast Guard's efforts to modify its port security GIS. Finally, we reviewed information and documentation related to GIS applications and identified standards and best practices for information systems acquisition and development to determine best practices for managing such a project. Our work, which was conducted from June 2003 through August 2004, was done in accordance with generally accepted government auditing standards. Results in Brief: The changes in the Port Security Assessment Program reflect attempts to deal with two main developments since the program's inception: evolving assessment needs at the ports and missteps in how the program's initial assessments were carried out. As originally designed, the program involved hiring an outside contractor to conduct a vulnerability assessment encompassing a wide range of port activities and installations, including docks, warehouses, shipping facilities, bridges, factories and power stations, and other facilities and infrastructure. By the time these assessments began in August 2002, however, various port stakeholders, including port authorities, and owners and operators of boats, factories, and other facilities, had begun or completed their own assessments in order to identify security vulnerabilities of their assets or apply for federal security grants. More security information subsequently became available as new regulatory requirements went into effect in 2003 requiring owners or operators of specific facilities and vessels in the nation's ports to conduct security assessments of those assets. The increased information from these stakeholders, combined with higher-than-expected costs for the contractor's first 8 assessments, led the Coast Guard to begin changing the scope of the contractor's assessments. When our examination of the contractor's efforts found shortcomings in the quality and usefulness of the assessments, the Coast Guard temporarily stopped conducting assessments in order to make further revisions to the program. By this time, the Coast Guard had also decided that a GIS would be useful for assembling and using the extensive amount of security information becoming available, leading to its adoption as part of the program. The program now includes four components--GIS and three specific types of assessments: a compilation and synopsis of other assessments already conducted in the port, an assessment of the port's maritime vulnerabilities by former Navy Special Operations Forces, and the option for specific assessments of critical infrastructure or operations as requested by the local Coast Guard Captain of the Port. These assessments are more tailored to specific needs than the previous assessments were. The Coast Guard plans to complete these assessments so that all 55 of the most strategic ports will have received an assessment using either the previous approaches or the current approach. Coast Guard officials have not yet determined when the GIS will be completed and made available. The revised program holds promise, but the Coast Guard's implementation approach is putting that promise at increased risk, particularly for the GIS component. Developing a GIS that can meet the varying security requirements of 55 ports is a complex undertaking, and the Coast Guard has increased the risk by not using project management principles called for by the information technology industry's best practices. Specifically, * The Coast Guard has not yet identified the functional requirements for the GIS or taken the steps needed to ensure that Coast Guard personnel modifying the system and Coast Guard and other personnel who will actually use it have a clear and mutual understanding of these requirements. Industry practices call for carefully identifying these requirements and documenting how they will be developed. In previous work that we have done on other agencies' development of information technology systems, we have found systems that had to be abandoned when these steps were not followed. * The Coast Guard is proceeding without first developing a plan that clearly indicates how the GIS will be managed, what it is expected to cost, or when the various work steps should be completed. As the Coast Guard is facing these problems for the GIS component, it is proceeding to carry out the other three assessment components at individual ports. As of early August 2004, these assessment components had been performed at twelve ports. Local Coast Guard officials responsible for security at those ports indicated that the individual components generally appeared to be of value in security planning activities. However, because specific functional requirements in the GIS have not been defined, Coast Guard officials are not in a position to fully use these assessments to help address gaps in the information they need for security planning and response. Finally, beyond the GIS component, the program as a whole lacks a fully developed plan detailing costs, schedule, and overall management strategy. The lack of such a plan may negatively affect the usefulness of the assessment program in the long term. To help ensure that the Port Security Assessment Program is operated effectively, we are recommending that the Coast Guard define and document GIS requirements and develop a plan for implementing both the GIS and the program as a whole. In commenting on a draft of this report, Coast Guard officials generally agreed with the facts and concurred with our recommendations. The Coast Guard also provided technical comments which we have incorporated into this report as appropriate. Background: Creating effective security in the nation's ports in the post-September 11 world is a challenging task. Ports present attractive targets for terrorists: they are sprawling, easily accessible by water and land, close to crowded metropolitan areas, and interwoven with complex transportation networks. Besides terminals where goods bound for import or export are unloaded or loaded onto vessels, ports also contain other facilities critical to the nation's economy, such as refineries, factories, and power plants. These many facilities, along with the ships and barges that ply port waterways, can be vulnerable on many fronts. For example, container terminals, where containers are transferred between ships and railroad cars or trucks, need ways to screen vehicles and routinely check cargo for evidence of tampering. At factories and other facilities where hazardous materials are present, safeguards must be in place to prevent unauthorized persons from gaining access. Similarly, vessels ranging from oil tankers to tugboats need effective access control over critical operating areas, such as engine and control rooms. The framework for the nation's collective response to this challenge is now found in the Maritime Transportation Security Act (MTSA), passed by the Congress in November 2002. MTSA's implementing regulations require owners and operators of facilities and vessels to conduct assessments that will identify their security vulnerabilities and to develop security plans to mitigate these vulnerabilities. Under these regulations, these plans are to include such items as measures for access control, responses to security threats, and drills and exercises to train staff and test the plan. MTSA was enacted after the Coast Guard initially began developing the Port Security Assessment Program in the wake of the September 11 attacks. Some basic information about geographic information systems, or GIS, may be helpful in understanding this component of the Port Security Assessment Program. A GIS can be thought of as a sort of electronic map, but with many more capabilities than traditional paper mapping. For example, paper maps can provide only a static snapshot of selected entities and their locations and cannot be easily updated or changed. By contrast, information in a GIS can be easily and continually updated. In addition, because a GIS stores information on separate "layers" related to such things as roads or buildings, users can combine data layers at will, providing the capability to quickly create and view maps for specific purposes any time they are needed. Data layers in a GIS can be extremely varied. Typical types include the following: * Layers describing location, ownership, and other information about real property (called cadastral data). * Layers that have the characteristics of a map and image qualities of a photograph (called digital orthoimagery). * Layers describing water features such as lakes, ponds, streams and rivers, canals, oceans, and coastlines (called hydrographical data). For the Coast Guard, potential GIS layers could include transportation- -describing anchorages, bridges, and roadways; utilities--including power plants, power lines, and substations; and emergency response-- including police and fire stations, and hospitals. Figure 1 illustrates, in a simplified way, this concept of layers and how they can be integrated. Figure 1: Examples of Layers in a Geographic Information System: [See PDF for image] [End of figure] The database capabilities of a GIS allow many other kinds of information to be embedded on these data layers as well, so that the information is easily available. For example, a GIS allows the user to know not only the location of a building relative to other buildings or roads, but can also provide information such as the building's owner, when the building was built, the building's contents, and its dimensions and height. This ability to create maps on demand for specific purposes, with additional information at the ready, surpasses what can be done with traditional mapping approaches. One illustration of a GIS's usefulness came in connection with efforts to recover debris from the space shuttle Columbia when it was lost in re-entering the earth's atmosphere on February 1, 2003. Debris from the shuttle was spread over at least 41 counties in Texas and Louisiana. In Texas, a state-operated GIS provided authorities with precise maps and search grids to guide reconnaissance and collection crews in the field. Officials in charge of the effort used maps of debris fields, combined with GIS data about the physical terrain, to carefully track the pieces of debris found. Figure 2 is a map, created from debris data entered into the GIS, showing the general west-to-east track of debris data across several east Texas counties and the outer boundaries of the area in which debris was found. Figure 2: Sample GIS Map of Debris Path from Space Shuttle Columbia: [See PDF for image] [End of figure] Assessment Program Has Been Extensively Revised: The Coast Guard has made significant revisions to adapt the Port Security Assessment Program to the increasing amount of security evaluations performed by port stakeholders and to address shortcomings in the program's initial implementation. The Coast Guard initially set out to use the program as an assessment of security conditions at 55 ports. The Coast Guard and the contractor it hired to develop the assessment approach and conduct the assessments started the first assessments in August 2002, when other assessment efforts were also under way. Port stakeholders around the country had begun or already completed their own assessments of their facilities or vessels in order to identify security vulnerabilities of their assets or obtain federal assistance in strengthening their security. Even more security information was to become available as new regulatory requirements were implemented in 2003 requiring security assessments to be performed by the owners or operators of facilities and vessels operating in the nation's ports. This changing security environment and higher-than- expected costs to complete the contractor's initial assessments prompted the Coast Guard to revise the scope of the contractor's assessments. Our examination of the contractor's initial assessments identified additional shortcomings in the quality of the work and the assessment approach. In response, the Coast Guard temporarily postponed all assessment work to make further revisions, both to take advantage of the other sources of assessment information and make the assessments more useful in port security planning efforts. The revised program (1) added a GIS as a new feature and (2) tailored security assessments for particular purposes, such as synthesizing existing assessments or assessing certain infrastructure at the direction of local Coast Guard personnel. The assessments are to be completed by February 2005--but the Coast Guard is still developing its GIS and is uncertain as to when the GIS will be ready for use. Program Initially Focused on Assessing Post-9/11 Vulnerabilities at Key Ports: The Coast Guard began the Port Security Assessment Program to assess the vulnerabilities of the nation's most strategic commercial and military ports in the aftermath of the September 11, 2001, terrorist attacks. (See fig. 3 for a timeline of the program.) To identify which ports were most strategic, the Coast Guard considered such factors as cargo volume, import/export cargo value, volume of passenger traffic on ferries or cruise ships, population density around the port, the presence of critical infrastructure or key assets, the presence of military forces or bases, and whether the port was designated to support major military deployments. From this analysis, 55 ports out of 361 ports were chosen to be the first to receive port security assessments. Figure 3: Timeline of Key Events in the Development of Port Security Assessment Program: [See PDF for image] [End of figure] In April 2002, the Coast Guard selected a contractor to perform the assessments. Under this arrangement, the contractor was responsible for developing an approach (which the Coast Guard calls "Version 1") to assess vulnerabilities of port assets and systems such as cargo facilities, manufacturing facilities, passenger terminals, power generation and fuelling facilities, as well as other infrastructure such as public access areas and bridges. The assessment was to identify the relationships between selected assets to port systems, identify the vulnerabilities of those assets to terrorist attacks, and recommend actions to mitigate the vulnerabilities.[Footnote 3] With oversight from the Coast Guard, the contractor had primary responsibility for conducting key activities of each assessment, such as identifying which assets should be assessed, collecting data from stakeholders, making on-site visits, and analyzing the data collected. The final product was to be a comprehensive written report of the findings identified during the assessment. Primary customers for this work were the local Coast Guard Captain of the Port and port stakeholders serving on Area Maritime Security Committees, who could use it in such security planning efforts as the development of an Area Maritime Security Plan.[Footnote 4] The first assessments began in August 2002; the Coast Guard's goal was to complete them at all 55 ports by the end of 2004.[Footnote 5] To further refine the approach before assessing "megaports" such as New York/New Jersey or Los Angeles/Long Beach, as well as to give the program a chance to build additional assessment teams to perform the work, the Coast Guard decided to try out the approach at medium-sized ports first such as San Diego and Boston. Under the time frame the Coast Guard adopted, officials expected to conduct assessments of 8 ports in 2002, 18 in 2003, and 24 in 2004.[Footnote 6] Need to Incorporate Work Done by Others and Correct Shortcomings in Contractor's Assessments Led to Revisions in the Approach: Several actions taken by port stakeholders led to substantial changes in the approach. One of these developments was that many port stakeholders were starting or completing assessments on their own. Stakeholders, such as port authorities, and owners and operators of facilities and vessels began conducting assessments in order to identify security vulnerabilities of their assets or to meet application requirements for federal grants. In some cases, initial assessments were performed shortly after the September 11, 2001, terrorist attacks and were followed by more comprehensive assessments conducted either on their own or by contractors. For example, port stakeholders such as chemical producers that were members of certain industry or trade organizations were required to complete assessments of their facilities using approved assessment methodologies as a condition of their membership in the organization. Beginning in September 2002, the Coast Guard also issued a series of suggested guidelines[Footnote 7] for port stakeholders to use in conducting security assessments and developing security plans to address any identified vulnerabilities. In addition to the assessment activities that many stakeholders voluntarily undertook after the terrorist attacks, more maritime security information became increasingly available as the Maritime Transportation Security Act began to be implemented. Enacted in November 2002, MTSA mandated major changes in the nation's approach to maritime security and called for a comprehensive framework that includes planning, personnel security, and careful monitoring of vessels and cargo. The regulations implementing MTSA required owners or operators of specific facilities and vessels in the nation's ports to conduct assessments and develop plans to address vulnerabilities. These security assessments and plans were to be reviewed and approved by the Coast Guard prior to July 1, 2004.[Footnote 8] As a result, facilities and vessels that had not already completed a security assessment were now required to do so, thereby increasing the amount of assessment information available from port stakeholders at the 55 ports as July 1, 2004, drew nearer. Coupled with the changes in the amount of information to be generated by others, high costs for the first set of assessments prompted the Coast Guard to begin reassessing the Version 1 approach for conducting the assessments. According to the Coast Guard, assessments for the first 8 ports cost nearly three times more than was originally expected, exceeding $1 million per port. To address this issue, the Coast Guard made changes in the assessment approach, including greater emphasis on discussions early on in the assessment process with local Coast Guard Captains of the Port in order to better focus on the facilities and infrastructure needing to be assessed and the adoption of a standardized report outline and format to reduce redundancy.[Footnote 9] The Coast Guard decided to pilot-test this new approach, which the Coast Guard now calls "Version 2," at two ports in the summer of 2003. As this new approach was being readied, our own review of the contractor's assessments disclosed additional shortcomings. In a September 2003 testimony before the Senate Committee on Commerce, Science, and Transportation, we expressed concern about how the assessment program was being implemented.[Footnote 10] In talking with some port stakeholders who participated in the assessment, we found that many of them saw little usefulness in the assessments beyond what they already knew about their vulnerabilities from previously completed assessments. Some key port stakeholders declined to participate in the assessment after receiving lengthy questionnaires from the contractor asking for information stakeholders considered proprietary. Port stakeholders also said they had not been given the opportunity to review or comment on the draft assessment report, which contained errors and inaccuracies. Finally, the contractor was moving to use the Version 2 approach in the next set of assessments before the lessons learned from the pilot tests could be identified and incorporated into the assessment approach. We shared our findings with Coast Guard officials and suggested that the assessment approach be further revised. In addition to giving the Captains of the Port and Coast Guard personnel a larger role in identifying the critical assets to be assessed, we suggested that the Coast Guard reduce duplication and lessen the burden on stakeholders by doing more to take into account already-completed assessments of facilities and assets. The Coast Guard agreed and postponed conducting more assessments until additional changes to address these deficiencies were made. Subsequent Revisions Incorporated the Use of a GIS and More Focused Assessments: While considering what changes needed to be made to the assessment program, the Coast Guard also determined that it was essential to provide local Coast Guard officials and certain members of the local Area Maritime Security Committee a means to retrieve maritime security information and display it for planning and response purposes at the ports. Although a significant amount of security information was now available, it was kept in disparate locations and was not readily available. With the regulations implementing MTSA requiring Captains of the Port and Area Maritime Security Committees to develop portwide Area Maritime Security Plans, access to the available security information became increasingly important in order for them to carry out this responsibility and improve the protection of the marine transportation system. To provide local Coast Guard officials and certain members of the local Area Maritime Security Committee access to this information, the Coast Guard decided to incorporate a GIS as a new feature in the assessment program. At the local port level, the GIS would integrate the security information into a single electronic database that would allow the information to be retrieved and displayed within the context of a particular port area. Whereas previous assessment results were compiled into a published report that would characterize the port's security posture at a single point in time, GIS has the capability of being updated as new information becomes available. GIS also provides a tool for visually depicting the port and for retrieving security or assessment information as needed in the development or revision of Area Maritime Security Plans. The Coast Guard believes this will benefit the Captains of the Port and the Area Maritime Security Committees to better visualize the port and enhance their ability to develop security plans as well as respond to a security incident, should one occur. In addition to the GIS component, the revised program has three other components, all related to assessments. The Coast Guard revised the assessment approach so that it would provide more specialized information about port security. The approach, known as Version 3, has three different types of assessments that collectively are aimed at providing both a synthesis of what is already known about security at a port and studies of specific topics or infrastructure that have not been fully assessed. When completed, these assessments will provide the core security information to populate the GIS. These assessment components are as follows: * Assessment of Assessments--An identification and inventory of completed security assessments of port assets and critical infrastructure within a port. This inventory is designed to help the assessment team minimize the possibility of needlessly duplicating previously completed assessments as well as to provide the Captain of the Port and the Area Maritime Security Committee with greater awareness of existing security information. * Terrorist Operations Assessment--An assessment utilizing the expertise of contractors comprised of former Navy Special Operations personnel to provide an outsider perspective on the ports' vulnerabilities to a terrorist attack. This assessment is to evaluate potential terrorist targets within the ports and identify likely attack scenarios for the Captain of the Port and Area Maritime Security Committee to consider addressing in the Area Maritime Security Plan. * Special Assessment--Assessment of specific port assets, infrastructure, or operations that are critical to the port but have not been previously assessed from a maritime perspective. Performed at the request of the Captain of the Port and the Area Maritime Security Committee, this assessment is to provide vulnerability, impact, and countermeasure information on those assets, infrastructure, or operations. Examples include blast impact assessments of commercial vessels, plume dispersion assessments of an attack on vessel or facility with hazardous materials, and security assessments of underwater tunnels. The Coast Guard has a more definite schedule for completing the assessments than for completing the GIS. The Coast Guard resumed assessments in March 2004 using the Version 3 approach and plans to complete assessments at the remaining ports by February 2005.[Footnote 11] For the GIS component, the Coast Guard plans to use its own GIS. Until this system is operational for port security, the Coast Guard plans to lease a commercial GIS that will enable Coast Guard staff to familiarize themselves with how a GIS works and identify their specific system needs or requirements so the Coast Guard's GIS can be customized accordingly. Project officials chose a commercial-off-the-shelf software application, iMap,[Footnote 12] that provides the Coast Guard access to over 800 layers of data containing information related to the nation's ports. Because the Coast Guard's GIS is still in development for port security, when the GIS component will be made operational and available to all assessed ports is yet to be determined.[Footnote 13] Absence of Key Management Elements Places Program's Potential to Enhance Port Security at Higher Risk: The Coast Guard's revised approach appears to provide a useful planning and response tool for port security, but the implementation of the assessment program is at higher risk because of two major problems. First, the centerpiece of the new approach, the GIS component, is being developed without several key project management steps that are critical to success in such projects. Not following these steps increases the risk that the data collected will not provide port security officials with the information they need to adequately assess, identify, and mitigate security risks. Second, for the GIS component and the program as a whole, the Coast Guard lacks a strategy that clearly defines how the program will be managed, how much it will cost, or what activities will continue over the longer term. Lack of a strategy increases the risk of cost overruns, missed deadlines, and a less-than-effective program. At the same time the Coast Guard is facing these problems, it is also conducting security assessments at individual ports using the revised approach, and for this part of the program, the results to date appear more favorable. Early indications from local Coast Guard officials at the ports where the new assessments have been performed are that these assessments are of some usefulness in current security planning activities. However, not resolving the broader planning and management issues could also affect the potential value of these assessments to fill in any remaining gaps in the Coast Guard's awareness of the security posture in the ports. GIS Component Seen as Having Great Potential, but Coast Guard Is Not Following Established Project Management Practices: The Captains of the Port and other Coast Guard officials we talked with were in agreement in their belief that a GIS with security assessment information would greatly facilitate their security planning and response efforts. They provided such examples as the following, based on their understanding of the tools that would be available with the GIS: * For planning efforts, the visual nature of the GIS would greatly enhance the Captain of the Port's and Area Maritime Security Committee's understanding of the connections between port facilities, assets, and infrastructure that would otherwise not be possible through paper reports. * For incident response efforts, the capability of GIS to store and retrieve security information such as plans and assessments of particular assets within the port would quicken response times as the information can be immediately located and viewed. A useful, well-designed system does appear to carry great promise. For example, if Coast Guard personnel were alerted that a particular port may be targeted and that warehouses containing shipping containers were at risk, officials could quickly create a map showing the location and contents of the warehouses, ingress points located near the warehouses, and depth of the nearby waterways throughout the port. Using this information, security officials could assess the relative risk to each warehouse, prioritize actions based on the risk level, and act almost immediately to secure the most vulnerable locations. However, developing a useful GIS is a significant and complex challenge. One reason is that every port has its own unique mix of geographic characteristics and operations that must be accurately captured. For example, one port may be located along a stretch of river while another may sit next to the open ocean, one port may have a high volume of cruise ship traffic while another may have a high concentration of chemical and petroleum facilities. These different characteristics will require a GIS that is flexible enough to be of use in a variety of settings. Another reason the GIS can be challenging is that some security-related situations, such as potential terrorist activities, involve a great deal of unpredictability and the kinds of information and analyses needed to address such uncertainty are difficult to anticipate. This complexity places a premium on proper planning. Over the years, we have analyzed information technology systems across a broad range of federal programs and agencies, and these analyses have repeatedly shown that without adequate planning, the risks increase for cost overruns, schedule slippages, and systems that are not effective or usable. For example, the Bureau of Land Management (BLM) spent more than $67 million on a system that was never deployed. When the system was tested prior to deployment, it was found not to meet users' requirements because it did not support BLM's business activities, was too complex, and significantly impeded worker productivity. We found this system failed because it was developed without a clear understanding of requirements and without a credible project schedule with reliable milestones.[Footnote 14] In another example, the Centers for Medicare and Medicaid Services had similar problems that led to its planned Medicare Transaction System being cancelled--the project did not have fully defined and agreed-to requirements and had a flawed project schedule.[Footnote 15] These types of problems make it prudent to ensure that planning of GIS applications is adequate. Coast Guard officials indicated that they viewed the development of the port security GIS database as an add-on to existing Coast Guard information systems, not as a new database or information system. Within this context, however, it is still important to ensure that the steps being taken are likely to produce a satisfactory result. In that light, we assessed the Coast Guard's development efforts using established best practices in the industry for developing information technology systems, including those created by the Institute of Electrical and Electronics Engineers/Electronic Industries Alliance.[Footnote 16] The Coast Guard's current efforts do not apply these criteria in two key ways--defining what the GIS should do and establishing sufficient plans to ensure that the requirements can be successfully realized. That is, successful implementation of the Coast Guard's port security GIS is at higher risk because the Coast Guard has not used established project management practices, including defining requirements and developing a project schedule, to oversee and guide the program. Actions to Develop GIS Requirements Do Not Meet Standards: One aspect of developing any information technology system such as a GIS involves establishing and maintaining a common and unambiguous definition of functional requirements among the project team, system users, and software developer. These requirements define what the system will be expected to do for its users once it is developed and implemented. For example, one requirement could be to ensure that the system can link together specified types of geospatial data to provide the user with sufficient information. Another requirement could be to ensure that the users would be provided the capability of printing paper maps and other information found in the GIS. A third could be that the GIS be available to its users 24 hours a day, 7 days a week. Requirements such as these could be important in ensuring that the system will deliver what users need. It is critical that functional requirements are carefully defined and that they flow directly from how the organization's day-to-day operations are or will be carried out to meet mission needs. Improperly defined or incomplete requirements have been commonly identified as a root cause for why systems fail or do not meet their cost, schedule, or performance goals. Without adequately defined requirements, significant risk exists that a system will need extensive and costly changes before it will meet the organization's needs. The Coast Guard's actions to develop GIS requirements are not being carried out using established practices. The Coast Guard's approach for addressing these requirements takes three main forms: * First, the Coast Guard is using the assessments being conducted at the 55 ports to identify requirements for the GIS it is developing. * Second, the Coast Guard is using feedback from the experiences of local officials with the commercial-off-the-shelf software application currently in use to help determine what requirements should be included. * Finally, the contractor supporting the interim GIS has been tasked to identify the GIS data layers most frequently used by the Coast Guard. However, these actions fall short of meeting best practices. First, there are indications that requirements identified during the assessment visits did not necessarily include functional requirements. Second, although tasks to identify the data layers accessed by the Coast Guard using its interim GIS solution could be used to identify requirements for the port security GIS, these tasks have not yet been completed and there is no estimate as to when the information will be available. According to Coast Guard officials, the Coast Guard intends to use an existing information system instead of building a new GIS database or information system that is exclusive to port security. However, while the Coast Guard is not developing a new system, greater planning efforts appear paramount. To the extent that the Coast Guard and other users believe they need to add new kinds of data that do not currently exist in the system, both system users and developers need to agree on how to define and capture this information so that it can be of maximum use. In addition, if the Coast Guard decides to take a more limited approach, adding few, if any, new functional requirements, it runs the risk that the system will be of only partial use. Rather than taking advantage of the powerful planning and analysis capabilities that a robust geographic information system could make available, the more limited version could only be used to develop static maps of ports and their assets. Without effectively identifying and documenting the requirements for the new potential functions and data associated with the port security portion of its GIS, the Coast Guard faces the risk that the GIS will not provide port security officials with the functionality and information they need to adequately assess, identify, and mitigate security risks. Coast Guard GIS Planning Does Not Meet Established Best Practices: Information technology project management principles and industry best practices[Footnote 17] emphasize that a project management plan is needed to define the technical and managerial processes necessary to satisfy project requirements. The plan should include, among other activities, * developing a work breakdown structure with a schedule for all of the tasks to be performed; * identifying and addressing project risks, and: * implementing a security policy. The planning document identified by the Coast Guard does not meet these standards. According to the Port Security Assessment program manager, the Coast Guard considers the project's Concept of Operations[Footnote 18] to be its project plan. However, the Concept of Operations, does not include important elements required in a project plan. For example: * Tasks and schedules: The Concept of Operations identifies seven Port Security Assessment Program objectives, one of which is the use of a GIS, but does not identify any of the tasks or a schedule for carrying them out. It also provides a list of eight high-level activities that need to be completed during the project, but again it lists no associated implementation tasks and schedule, although it estimates that port security assessments will be completed by December 2004. Since the document was written in February 2004, the assessment completion date has already been postponed by 2 months, and the project manager is unsure if the interim GIS contract will need to be renewed next spring because he is not sure when the Coast Guard's own port security GIS will be completed and ready for implementation. * Project risk: The Concept of Operations does not address project risks. As a result of not identifying potential risks, the project has encountered unexpected problems. For example, two of the eight high- level activities identified in the Concept of Operations, scheduled to be completed in April and July 2004, encountered unexpected problems that caused delays and could hinder their eventual completion. * Security Policy and Project costs: The Concept of Operations does not address security policy and provides no plan for estimating project costs. For example, we asked program officials to provide documented cost information associated with the GIS component, and while we received some information, it was not sufficient to provide a clear indication of how much the GIS component would likely cost.[Footnote 19] Creating a plan that meets these requirements is essential to ensuring that the port security assessment GIS project can be successfully completed in the estimated timeframes with the resources that are available. The Coast Guard has already encountered problems caused by lack of a reliable project schedule and risk assessment. According to Coast Guard Officials, the Coast Guard is adding to an existing system rather than building a new one. Adding to an existing system, however, does not obviate the need for careful planning. Until the Coast Guard develops a project management plan that includes a schedule and milestones, it is at increased risk that the GIS component of its port security assessment program could be inadequately managed, resulting in schedule slippages and inaccurate costs estimates. In addition, without identifying and mitigating risks and security concerns, the project could encounter unexpected issues that would need to be addressed, resulting in additional schedule and cost problems. Incomplete GIS Planning Places Usefulness of New Assessments at Greater Risk: The Coast Guard has proceeded to carry out the revised assessments of individual ports with generally favorable results. The Coast Guard resumed its assessment program using the Version 3 assessment components in March 2004 and as of August 1, 2004, had completed on- site assessments of 12 additional ports in 6 Captain of the Port zones.[Footnote 20] To provide an indication of the usefulness of these assessments, we spoke with the local Captain of the Port or other Coast Guard officials that participated in the assessment process at each of these zones. In general, all agreed that the assessments were of some usefulness. Two said that the assessments provided substantially new information that they did not previously have or consider. The other four found the completed assessment results useful by bringing an outside perspective to look at the port. They said the assessments were helpful in validating their previously completed assessments or the current awareness of the security posture within their ports. The value of these assessments could be enhanced, we believe, if the Coast Guard addressed the key management practices we have already discussed in its approach for developing its GIS. By themselves, the current assessments have value to local Coast Guard officials mostly in supplementing or validating their knowledge. However, when used with the GIS, these assessments also have potential value in helping the officials "close the loop" on information they may lack. The three assessment components involve mainly data gathering and analysis, the results of which are to be fed into the GIS. Without the GIS to integrate and organize information gathered from these and other sources, those responsible for planning security cannot as easily identify the vulnerabilities in their ports and gaps in their awareness of the security posture within their ports that need to be addressed. At all of the six ports, the Captain of the Ports or other Coast Guard officials said the value of the three assessment components would be enhanced if used in conjunction with a GIS that would be better able to visually display the entire security posture of the port rather than having to review individual hard copy assessment reports as they are now published. However, the functional requirements need to be first defined in order to effectively integrate these assessment components into the GIS. Until this planning step is taken, the value of these assessments could fail to reach their full potential. Planning Concerns for GIS Component Extends to Overall Management and Direction of the Program: Finally, the uncertainty brought on by the lack of planning for the GIS component is reflected in a similar uncertainty for the Port Security Assessment Program as a whole. For the assessment components, future plans are unclear beyond fiscal year 2005. Once all assessment reports of the 55 strategic ports are completed--a task the Coast Guard expects to be done by February 2005--the Coast Guard currently expects the assessment of assessments component to be an ongoing effort that will be updated by Coast Guard personnel as new assessment information becomes available. It expects the special assessments and terrorist operations assessments to continue through fiscal year 2005 as ports previously assessed under earlier assessment approaches are revisited, but it has made no decision about continuing them beyond that time. Beyond fiscal year 2005, the Coast Guard is currently considering two options for what to do with the special assessment and terrorist operations assessment components of the program. The options are (1) continuing the program at other ports beyond the initial 55 or (2) conducting some recurring assessment at the 55 ports. Our discussions with Captains of the Port and Coast Guard officials surfaced mixed views of the future need for the three assessment components. One Captain whose port had been assessed under the Version 3 approach said he would like the assessment team to return to his port within 2 years, in order to assess the security measures put in place after the completion of the last assessment. By contrast, Captains for two other ports said they did not think that the team needed to return unless the critical infrastructure in their ports changed dramatically. The Coast Guard official responsible for the program said that as of July 2004, discussions were underway between program officials, other Coast Guard teams, and DHS officials as to how the program should proceed in the future to best augment port security efforts. The outcome of these discussions and future funding provided to the program will largely determine the extent to which the three assessment components continue to be implemented as part of the program. Although the GIS component will continue to be enhanced, its schedule for completion and implementation is uncertain. Thus, when the various program components--GIS and port assessments--are taken together, it is not clear what activities will be conducted over the longer term, who will do them, or how much they will cost. Conclusions: As the Coast Guard attempts to determine the future of the Port Security Assessment Program, it needs to ensure that the program provides maximum effectiveness to its main customers, Captains of the Port and Area Maritime Security Committees. The initial program had shortcomings that created a product of marginal value. The revised program has potential to be more useful because it intends to integrate all of the assessment information collected by the Coast Guard and other relevant security authorities and place this information in a GIS. However, the Coast Guard risks producing a system that is not as useful as it could be, because its approach lacks a defined management strategy, specific cost estimates, and a clear implementation schedule. Developing the program's GIS component in this way is of particular concern, given the problems that have resulted when other agencies used the same approach in attempting to develop their information technology systems. And without a clear development strategy for GIS, the usefulness of the three assessment components may also be limited, because local Coast Guard officials and Area Maritime Security Committees will be less able to use them to fill the remaining gaps in their awareness of the security posture within their ports. Getting this project right is important, because the prospect of a well functioning GIS has great appeal to many Coast Guard and other port stakeholders, who believe such a tool will be of considerable help in providing effective port security. Recommendations for Executive Action: To help ensure that the revised Port Security Assessment Program provides the most effective tool possible for security planning and response, we recommend that the Secretary of Homeland Security direct the Commandant of the Coast Guard to (1) define and document the GIS functional requirements and (2) develop a long-term project plan for the GIS and the Port Security Assessment Program as a whole (including cost estimates, schedule, and management responsibilities). Agency Comments: We provided a draft of this report to the Department of Homeland Security and the Coast Guard for their review and comment. The Coast Guard's Marine Safety, Security And Environmental Protection Directorate generally agreed with our recommendations, including the need to finalize data types and develop a detailed work plan for adding map layers. Coast Guard officials provided a number of technical clarifications, which we incorporated where appropriate to ensure the accuracy of our report. The Coast Guard commented in detail on two aspects of our report: * The Coast Guard said our report tended to overlook many of the program's significant achievements, particularly the value of the three assessment components. The Coast Guard emphasized the progress that it had made on tailoring assessments, completing them on schedule, and reducing their cost from more than $1 million per port to about $200,000 per port. * The Coast Guard also said our characterization of its GIS made it appear that the Coast Guard was developing an entirely new information technology system. The Coast Guard emphasized that its GIS was part of an existing information technology system. Regarding these concerns, we would make the following points: * First, the amount of emphasis the report places on GIS reflects our review of Coast Guard documents and interviews with numerous local Coast Guard officials, which showed that when compared with the three assessment components, the GIS had the potential to provide substantially more value. The program's Concept of Operations contains multiple references to the critical and central role the GIS component will hold in providing a dynamic tool to its users (Captains of the Port and Area Maritime Security Committees) for port security planning and response. Further, the end users we talked with expressed near unanimous need for a dynamic GIS planning and response tool to increase maritime domain awareness. * Second, we acknowledge that the Coast Guard's GIS is part of a pre- existing information technology system. In our view, however, this is not the key point. The point is the need for GIS planning and functional requirements. When we assessed the Coast Guard's development efforts against established industry best practices for developing information technology systems, we found the Coast Guard's current efforts do not apply two key practices: defining what the GIS system should do and establishing plans sufficient to ensure that the functional requirements can be successfully realized. Our past work has shown that when other agencies tried to develop systems without these practices, problems resulted. In short, without adequate planning, we believe that the GIS--and with it, the Port Security Assessment Program--is at risk of foundering. Hence, the aim of our recommendation is to produce a more effective GIS tool for port security officials. If the Coast Guard does establish functional requirements and a clear strategy for its GIS, the system will more likely meet its potential, and port security officials will be more likely to use it effectively. We are sending copies of this report to relevant congressional committees and subcommittees, the Secretary of Homeland Security, the Commandant of the Coast Guard, and other interested parties. If you or your staffs have any questions about this report, please contact me at (415) 904-2200 or at wrightsonm@gao.gov or Steve Calvo, Assistant Director, at (206) 287-4800 or at calvos@gao.gov. Key contributors to this report are listed in appendix II. This report will also be available at no charge on the GAO Web site at http:// www.gao.gov. Signed by: Margaret T. Wrightson: Director, Homeland Security and Justice Issues: [End of section] Appendix I: Objectives, Scope, and Methodology: Our two objectives for this report were to (1) discuss why and how the Port Security Assessment Program has changed over time and (2) assess the Coast Guard's approach for implementing the Port Security Assessment Program as it is currently configured. To address why and how the assessment program changed, we reviewed Coast Guard documents, interviewed officials at Coast Guard headquarters responsible for implementing the program, and visited three ports that had been assessed under the previous program assessment approach. At these ports, we interviewed local Coast Guard personnel as well numerous stakeholders to determine their views about how the assessment process was carried out. These stakeholders included, for example, operators of container terminals, power plants, cruise ship terminals, port authorities, and chemical facilities. We also relied on our previous work related to the program.[Footnote 21] For background information on the role of the geographic information system (GIS) as a tool for planning and response, we identified city and state government agencies that have GIS's in place and talked with GIS managers and experts from these agencies. We also met with federal government GIS experts who had experience with implementing GIS within the federal environment. They included experts from the Federal Emergency Management Agency, Bureau of Customs and Border Patrol, and United States Geological Survey. Finally, we met with GIS experts at universities and elsewhere to further our understanding. To assess the Coast Guard's approach for implementing the Port Security Assessment Program in its current form, we interviewed a variety of Coast Guard and other officials. For GIS, we interviewed the Coast Guard's GIS Program Manager and others to determine the progress made to date. For the assessment portion of the program, we interviewed Coast Guard officials from the six Captain of the Port zones that are responsible for the security of the 12 ports assessed under the most recent program approach. To establish criteria for assessing the program's current approach, we reviewed Coast Guard documents. We also reviewed information and documentation related to GIS applications and identified industry best practices for information systems acquisition and development to determine criteria for managing such a project. We reviewed documentation of the Coast Guard's efforts to modify its port security GIS to determine whether the progress made met the criteria we established. In conducting our assessment, we also relied upon our work on the development of major information technology systems throughout the federal government.[Footnote 22] Our work, which was conducted from June 2003 through August 2004, was done in accordance with generally accepted government auditing standards. [End of section] Appendix II: GAO Contacts and Staff Acknowledgments: GAO Contacts: Margaret Wrightson (415) 904-2200 Steven Calvo (206) 287-4800: Staff Acknowledgments: In addition to those named above, Chuck Bausell, Jason Berman, Christopher Hatscher, Nicholas Larson, Elizabeth Roach, and Stan Stenersen made key contributions to this report. FOOTNOTES [1] There are a total of 361 ports in the United States. [2] GAO, Maritime Security: Progress Made in Implementing Maritime Transportation Security Act, but Concerns Remain, GAO-03-1155T (Washington, D.C.: Sept. 9, 2003). [3] In addition to conducting port vulnerability assessments of the ports identified as strategic commercial and military seaports, the contractor was to develop model port security guidelines and a port vulnerability self-assessment tool for ports that did not receive a port vulnerability assessment. We did not examine the development of these components of the Coast Guard's program. [4] The Captain of the Port is a Coast Guard officer who provides direction to Coast Guard law enforcement activities within the general proximity of the zone in which assigned. Under the regulations implementing the Maritime Transportation Security Act of 2002, the Captain of the Port develops the Area Maritime Security Plan for his or her zone in consultation with the Area Maritime Security Committee that is comprised of members from federal, local, and state governments; law enforcement agencies; maritime industry and labor organizations; and other port stakeholders that may be affected by security policies. The Plan is to provide a communication and coordination framework for the port stakeholders and law enforcement officials to follow in addressing security vulnerabilities and responding to any incidents. Prior to the Maritime Transportation Security Act of 2002, this committee and plan were known generically as port security committees and port security plans. [5] The original program goal, as stated in the Contract Request for Proposals and Statement of Work, was to complete assessments at the 55 ports by March 2005. That goal was accelerated subsequent to contract award in an effort to complete assessments sooner. [6] In addition to the assessments being performed under the Port Security Assessment Program, the Coast Guard considers five assessments conducted by the Defense Threat Reduction Agency (DTRA) as completed assessments for the purposes of meeting this deadline. DTRA is an agency within the Department of Defense. [7] These guidelines were contained in Navigation and Vessel Inspection Circulars (NVICs), an approach the Coast Guard uses to provide detailed guidance about enforcement or compliance with certain federal marine safety regulations and Coast Guard marine safety programs. [8] For more information on these security plans and assessments requirements see GAO, Maritime Security: Substantial Work Remains to Translate New Planning Requirements into Effective Port Security, GAO-04-838 (Washington, D.C.: June 30, 2004). [9] These changes came out of a process improvement workshop the Coast Guard conducted for the assessment program in April 2003. Participants in this workshop included a Captain of the Port representative that had received an assessment of their port, a Captain of the Port who had not yet received an assessment of their port, DHS representatives, and other Coast Guard officials involved in port security. [10] See GAO, Maritime Security: Progress Made in Implementing Maritime Transportation Security Act, but Concerns Remain, GAO-03-1155T (Washington, D.C.: Sept. 9, 2003). [11] With the start of the new Version 3 assessment approach, the assessment program had $36 million in appropriated funds remaining. According to the program manager, this amount will be sufficient to complete the three non-GIS components at the ports yet to be assessed. [12] iMap can be used to collect information, merge it analytically, and provide it interactively to users. [13] According to Coast Guard officials, a "beta"-or test-version was available by the end of August 2004 for the ports of Charleston, Boston, and New York/New Jersey, using the commercial GIS as the platform. [14] See GAO, Land Management Systems: Progress and Risks in Developing BLM's Land and Mineral Record System, GAO/AIMD-95-180 (Washington, D.C.: Aug. 31, 1995); Land Management Systems: BLM Faces Risks in Completing the Automated Land and Mineral Record System, GAO/AIMD-97-42 (Washington, D.C.: Mar. 19, 1997); Land Management Systems: Actions Needed in Completing the Automated Land and Mineral Record System Development, GAO/AIMD-98-107 (Washington, D.C.: May 15, 1998); and Land Management Systems: Major Software Development Does Not Meet BLM's Business Needs, GAO/AIMD-99-135 (Washington, D.C.: Apr. 30, 1999). [15] Medicare Transaction System: Success Depends Upon Correcting Critical Managerial and Technical Weaknesses, GAO/AIMD-97-78 (Washington, D.C.: May 16, 1997). [16] Institute of Electrical and Electronics Engineers/Electronic Industries Alliance, IEEE/EIA Guide for Information Technology (IEEE/ EIA 12207.1 - 1997), April 1998. The Institute and Alliance developed this guidance to provide a common framework for developing and managing software. IEEE standards are developed within the IEEE Societies and the Standards Coordinating Committees of the IEEE Standards Board. The standards developed within IEEE represent a consensus of the broad expertise on the subject within the Institute as well as those outside of IEEE that have expressed an interest in participating in the development of the standard. The Alliance is a national trade organization whose mission is promoting the market development and competitiveness of the U.S. high-tech industry through domestic and international policy efforts. [17] Institute of Electrical and Electronics Engineers/Electronic Industries Alliance, IEEE/EIA Guide for Information Technology (IEEE/ EIA 12207.1 - 1997), April 1998. [18] A concept of operations is a statement, in broad outline, of a commander's assumptions or intent in regard to an operation or series of operations. The concept is designed to give an overall picture of the operation and provide additional clarity of purpose. This written Concept of Operations was dated February 2, 2004. [19] The Coast Guard indicated to us that for fiscal years 2005-2007, expected program costs for the Port Assessment Program as a whole will total about $30.8 million. Of this amount, $5.4 million is for the GIS component. For fiscal year 2004, the Coast Guard indicated that $1.5 million was supplied towards the development of its own GIS and that an estimated $900,000 will be spent for the use of the commercial GIS that the Coast Guard is using on an interim basis. The Coast Guard projected costs for continued development and implementation of the GIS for fiscal years 2005 to 2007 to total $3 million. However, the documentation we received lacks sufficient detail to indicate whether these amounts are all that will be spent, and the information the Coast Guard supplied is silent on any costs beyond fiscal year 2007. [20] There are a total of 45 Captains of the Port zones nationwide. These zones may contain more than one port depending on how their geographic boundaries are defined. [21] See GAO, Maritime Security: Progress Made in Implementing Maritime Transportation Security Act, but Concerns Remain, GAO-03-1155T (Washington, D.C.: Sept. 9, 2003). [22] See GAO, Land Management Systems: Progress and Risks in Developing BLM's Land and Mineral Record System, GAO/AIMD-95-180 (Washington, D.C.: Aug. 31, 1995); Land Management Systems: BLM Faces Risks in Completing the Automated Land and Mineral Record System, GAO-AIMD-97-42 (Washington, D.C.: Mar. 19, 1997); Land Management Systems: Actions Needed in Completing the Automated Land and Mineral Record System Development, GAO-AIMD-98-107 (Washington, D.C.: May 15, 1998); Land Management Systems: Major Software Development Does Not Meet BLM's Business Needs, GAO-AIMD-99-135 (Washington, D.C.: Apr. 30, 1999); and Medicare Transaction System: Success Depends Upon Correcting Critical Managerial and Technical Weaknesses, GAO/AIMD-97-78 (Washington, D.C.: May 16, 1997). GAO's Mission: The Government Accountability Office, the investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through the Internet. GAO's Web site ( www.gao.gov ) contains abstracts and full-text files of current reports and testimony and an expanding archive of older products. The Web site features a search engine to help you locate documents using key words and phrases. You can print these documents in their entirety, including charts and other graphics. Each day, GAO issues a list of newly released reports, testimony, and correspondence. GAO posts this list, known as "Today's Reports," on its Web site daily. The list contains links to the full-text document files. To have GAO e-mail this list to you every afternoon, go to www.gao.gov and select "Subscribe to e-mail alerts" under the "Order GAO Products" heading. Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Public Affairs: Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.