Information Technology
Improvements for Acquisition of Customs Trade Processing System Continue, but Further Efforts Needed to Avoid More Cost and Schedule Shortfalls
Gao ID: GAO-08-46 October 25, 2007
The Department of Homeland Security (DHS) established the Automated Commercial Environment (ACE) program to replace and supplement existing cargo processing technology. According to the fiscal year 2007 DHS appropriations act, DHS is to develop and submit an expenditure plan for ACE that satisfies certain conditions, including being reviewed by GAO. GAO reviewed the plan to (1) determine whether the expenditure plan satisfies the legislative conditions, (2) determine the status of 15 open GAO recommendations, and (3) provide observations about the expenditure plan and DHS's management of the program. To address the mandate, GAO assessed plans and related documentation against federal guidelines and industry standards and interviewed the appropriate DHS officials.
The ACE expenditure plan satisfies many--but not all--of the legislative conditions specified in the fiscal year 2007 DHS appropriations act. Specifically, the plan (with related program documentation and officials' statements) complies with acquisition rules, requirements, guidelines, and management practices of the federal government; includes a DHS certification that an independent verification and validation agent is under contract; was reviewed and approved by DHS and the Office of Management and Budget (OMB); and was reviewed by GAO. In addition, it partially satisfies conditions for meeting the capital planning and investment control review requirements established by OMB in Circular A-11 (part 7), including information security, and for complying with the DHS enterprise architecture. DHS has implemented eight open GAO recommendations made during the past 4 years, including those related to performance measures and targets, independent verification and validation, cost estimation, and program reporting. Seven other recommendations made during this time are in the process of being implemented. With respect to these seven, DHS has taken steps to satisfy each, such as establishing an accountability framework, reducing overlap and concurrence among ACE releases, and completing a privacy impact assessment, and actions are under way or planned to more fully address them. GAO is making three new observations about the expenditure plan and the management of ACE. First, the program is taking needed steps to redefine requirements for several ACE releases because of limitations in the completeness of original requirements, but this redefinition is likely to introduce significant program schedule delays and cost increases. Second, the changes to ACE requirements have led to replacement of a key commercial product, but the new product carries the risk of negatively impacting user productivity. Third, the automated database used for managing ACE risks is incomplete and does not contain information needed to adequately inform program decisions. All told, DHS has continued to make progress on ACE, and the program is better positioned today for delivering promised capabilities and benefits than it has been in the past. Nevertheless, key program management practices relating to, for example, human capital management, requirements management, and risk management remain a challenge, and other management areas, such as information security and architecture alignment, continue to require attention. As a result, GAO sees major program schedule delays and cost overruns on the horizon. To improve ACE management and minimize exposure to risk, it is important for DHS to remain vigilant in its efforts to satisfy ACE legislative requirements, fully implement prior GAO recommendations, and keep Congress fully informed about the program's status, plans, and risk.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-08-46, Information Technology: Improvements for Acquisition of Customs Trade Processing System Continue, but Further Efforts Needed to Avoid More Cost and Schedule Shortfalls
This is the accessible text file for GAO report number GAO-08-46
entitled 'Information Technology: Improvements for Acquisition of
Customs Trade Processing System Continue, but Further Efforts Needed to
Avoid More Cost and Schedule Shortfalls' which was released on October
25, 2007.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to Congressional Committees:
October 2007:
Information Technology:
Improvements for Acquisition of Customs Trade Processing System
Continue, but Further Efforts Needed to Avoid More Cost and Schedule
Shortfalls:
GAO-08-46:
GAO Highlights:
Highlights of GAO-08-46, a report to congressional committees.
Why GAO Did This Study:
The Department of Homeland Security (DHS) established the Automated
Commercial Environment (ACE) program to replace and supplement existing
cargo processing technology. According to the fiscal year 2007 DHS
appropriations act, DHS is to develop and submit an expenditure plan
for ACE that satisfies certain conditions, including being reviewed by
GAO.
GAO reviewed the plan to (1) determine whether the expenditure plan
satisfies the legislative conditions, (2) determine the status of 15
open GAO recommendations, and (3) provide observations about the
expenditure plan and DHS‘s management of the program. To address the
mandate, GAO assessed plans and related documentation against federal
guidelines and industry standards and interviewed the appropriate DHS
officials.
What GAO Found:
The ACE expenditure plan satisfies many”but not all”of the legislative
conditions specified in the fiscal year 2007 DHS appropriations act.
Specifically, the plan (with related program documentation and
officials‘ statements) complies with acquisition rules, requirements,
guidelines, and management practices of the federal government;
includes a DHS certification that an independent verification and
validation agent is under contract; was reviewed and approved by DHS
and the Office of Management and Budget (OMB); and was reviewed by GAO.
In addition, it partially satisfies conditions for meeting the capital
planning and investment control review requirements established by OMB
in Circular A-11 (part 7), including information security, and for
complying with the DHS enterprise architecture.
DHS has implemented eight open GAO recommendations made during the past
4 years, including those related to performance measures and targets,
independent verification and validation, cost estimation, and program
reporting. Seven other recommendations made during this time are in the
process of being implemented. With respect to these seven, DHS has
taken steps to satisfy each, such as establishing an accountability
framework, reducing overlap and concurrence among ACE releases, and
completing a privacy impact assessment, and actions are under way or
planned to more fully address them.
GAO is making three new observations about the expenditure plan and the
management of ACE. First, the program is taking needed steps to
redefine requirements for several ACE releases because of limitations
in the completeness of original requirements, but this redefinition is
likely to introduce significant program schedule delays and cost
increases. Second, the changes to ACE requirements have led to
replacement of a key commercial product, but the new product carries
the risk of negatively impacting user productivity. Third, the
automated database used for managing ACE risks is incomplete and does
not contain information needed to adequately inform program decisions.
All told, DHS has continued to make progress on ACE, and the program is
better positioned today for delivering promised capabilities and
benefits than it has been in the past. Nevertheless, key program
management practices relating to, for example, human capital
management, requirements management, and risk management remain a
challenge, and other management areas, such as information security and
architecture alignment, continue to require attention. As a result, GAO
sees major program schedule delays and cost overruns on the horizon. To
improve ACE management and minimize exposure to risk, it is important
for DHS to remain vigilant in its efforts to satisfy ACE legislative
requirements, fully implement prior GAO recommendations, and keep
Congress fully informed about the program‘s status, plans, and risk.
What GAO Recommends:
GAO is making recommendations to further strengthen ACE management and
accountability by disclosing program information in quarterly reports
to Congress related to unmet legislative conditions, open GAO
recommendations, program changes, and risk management. DHS agreed with
GAO‘s findings and recommendations and described actions that it has
under way and planned to address them. Most of the described actions
are consistent with GAO‘s recommendations.
To view the full product, including the scope and methodology, click on
[hyperlink, http://www.GAO-08-46]. For more information, contact
Randolph C. Hite at (202) 512-3459 or hiter@gao.gov.
[End of section]
Contents:
Letter:
Compliance with Legislative Conditions:
Status of GAO Recommendations:
Observations on the Expenditure Plan and Management of ACE:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendixes:
Appendix I: Briefing to Subcommittees on Homeland Security, House and
Senate Committees on Appropriations:
Appendix II: Comments from the Department of Homeland Security:
Appendix III: Contact and Staff Acknowledgments:
ACE: Automated Commercial Environment:
CBP: U.S. Customs and Border Protection:
CIO: chief information officer:
COTS: commercial off-the-shelf:
DHS: Department of Homeland Security:
GBB: global business blueprint:
ITS: internet transaction server:
OMB: Office of Management and Budget:
PIA: privacy impact assessment:
October 25, 2007:
The Honorable Robert C. Byrd:
Chairman:
The Honorable Thad Cochran:
Ranking Minority Member:
Subcommittee on Homeland Security:
Committee on Appropriations:
United States Senate:
The Honorable David E. Price:
Chairman:
The Honorable Harold Rogers:
Ranking Minority Member:
Subcommittee on Homeland Security:
Committee on Appropriations:
House of Representatives:
The U.S. Customs and Border Protection (CBP), as part of the Department
of Homeland Security (DHS), submitted to Congress in February 2007 its
fiscal year 2007 expenditure plan for the Automated Commercial
Environment (ACE) program pursuant to the Department of Homeland
Security Appropriations Act, 2007.[Footnote 1]
Begun in 2001, ACE is to replace and supplement existing cargo
processing technology. The system is being developed and deployed in a
series of increments to about 300 ports of entry and is expected to be
fully deployed by the end of 2011. The goals of ACE include (1)
supporting border security by enhancing analysis and information
sharing with other government agencies and providing CBP with the means
to decide before a shipment reaches the border what should be targeted
because it is a security threat and what should be expedited because it
complies with U.S. laws and (2) streamlining time-consuming and labor-
intensive tasks for CBP personnel and the trade community through a
national trade account and a single Web-based interface.
As required by the appropriations act, we reviewed ACE's fiscal year
2007 expenditure plan. Our objectives were to (1) determine whether the
expenditure plan satisfies the legislative conditions, (2) determine
the status of 15 open GAO recommendations for ACE,[Footnote 2] and (3)
provide observations about the expenditure plan and DHS's management of
the program.
On July 26, 2007, we provided a briefing to the staffs of the
Subcommittees on Homeland Security, Senate and House Committees on
Appropriations on the results of our review. This report transmits
those results. The full briefing, including our scope and methodology,
is reprinted in appendix I.
Compliance with Legislative Conditions:
The ACE expenditure plan--including related program documentation and
program officials' statements--satisfies or partially satisfies the six
legislative conditions specified in the appropriations act.
Specifically, the plan satisfies the conditions that it (1) comply with
the acquisition rules, requirements, guidelines, and systems
acquisition management practices of the federal government;[Footnote 3]
(2) include a certification by the DHS Chief Information Officer that
an independent verification and validation agent is currently under
contract for the program; (3) be reviewed by the DHS Investment Review
Board, the Secretary of DHS, and Office of Management and Budget (OMB);
and (4) be reviewed by us. The plan and its supporting information
partially satisfies the conditions that it (5) meet the capital
planning and investment control review requirements established by OMB
(including Circular A-11, part 7) and that it (6) comply with the DHS
enterprise architecture. For example, although DHS determined that ACE
was aligned with the DHS enterprise architecture, the agency's analysis
did not address key aspects of an architectural alignment, such as
alignment with the architecture's data reference model.
Status of GAO Recommendations:
DHS has implemented some, but not all, of the recommendations
pertaining to ACE that we have made since 2003. These recommendations,
along with their status, are summarized here.
Eight recommendations have been implemented. For example, DHS has:
* developed a range of ACE performance measures and targets needed to
support an outcome-based, results-oriented accountability framework,
including user satisfaction with ACE;
* aligned ACE program goals, benefits, desired business outcomes, and
performance measures;
* addressed those legislative conditions associated with measuring ACE
performance and results and employing effective independent
verification and validation practices; and:
* ensured that future expenditure plans are based on cost estimates
that are reconciled with independent cost estimates.
The remaining seven recommendations are in the process of being
implemented, as described here.
* Recommendation: Define and implement an ACE accountability framework
that fulfills several conditions,[Footnote 4] to include ensuring the
currency, relevance, and completeness of commitments made to Congress
in expenditure plans and reporting in future expenditure plans the
progress against commitments that were contained in prior expenditure
plans.
In progress. The program has established an accountability framework
that is providing input for both the annual expenditure plan and
quarterly congressional reports. However, as with prior expenditure
plans, the fiscal year 2007 expenditure plan did not reflect the most
current program information. For example, information on milestones,
earned value management, and risks were about 4 months old when the
plan was submitted to the appropriations committees in February 2007,
and program commitments were no longer current. Further, while program
officials continue to use the quarterly ACE status reports to provide
the appropriations committees with more detailed information, these
reports are generally submitted to Congress 3 to 4 months after the end
of each quarter, thus limiting their currency and relevance as well.
CBP and DHS officials told us that the delays were due to the DHS
review and approval process and that they are exploring ways to
accelerate the process.
The 2007 expenditure plan did not adequately report on progress against
previous plan commitments. For example, the plan did not (1) report
progress against milestones in the fiscal year 2006 plan or explain why
these milestones were not achieved, (2) report actual obligation or
expenditure of funds relative to the planned uses of these funds in
prior expenditure plans, or (3) address progress against the milestone
dates for each stage of a release that was included in the prior year's
plan. According to program officials, the quarterly congressional
reports provide more current information on the program's progress
against prior commitments. However, these reports have also not fully
addressed the commitments made in prior expenditure plans. Program
officials stated that they intend to start providing this information
in the last quarterly report of each year.
* Recommendation: Define measures and collect and use associated
metrics for determining whether prior and future program management
improvements are successful.
Planned. The program office has made changes that are to improve
overall program management and, according to its December 2006
quarterly report to Congress, the program office plans to measure the
impact of future management improvements. Moreover, this report stated
that the program anticipates more changes, including creation of a
cargo requirement management board to decide the disposition of all
change requests to production systems; establishment of a new invoice
review policy; and colocation of personnel within a given business
area. However, program officials told us that they have yet to define
measures to determine the impact of such changes and thus are not yet
positioned to determine their success.
* Recommendation: Minimize the degree of overlap and concurrency across
ongoing and future ACE releases and capture and mitigate the associated
risks of any residual concurrence.
In progress. Since May 2006, the program office has reduced overlap and
concurrence of ACE releases and has taken actions to reduce potential
contention for limited resources by, for instance, decoupling (i.e.,
reducing dependencies among) certain program components; dividing
releases into smaller subreleases to provide more flexibility in
scheduling; improving planning for development, integration, testing,
training activities, and milestones to better schedule use of
development and test environments; and centralizing management of
shared software services. Further, the program office conducts regular
integration meetings with the teams supporting each release to discuss
concerns, decisions, and schedules associated with resource
availability and is using a software tool to track and mitigate release-
specific concurrency risks. However, this tool contains vague or
incomplete data relative to mitigating these risks. These data
limitations make it difficult to determine the status or the
effectiveness of the efforts to reduce the risks associated with
overlap and concurrence among releases.
* Recommendation: Direct the appropriate departmental officials to
fully address those legislative conditions associated with having an
approved privacy impact assessment (PIA)[Footnote 5] and ensuring
architectural alignment.
In progress. One legislative condition states that the plan should meet
OMB's capital planning and investment control review requirements,
which include addressing security and privacy issues. The program
office has developed a PIA for ACE release 4 (e-Manifest: Trucks),
which is currently operational. DHS approved this PIA on July 14, 2006.
This PIA addressed the major elements of DHS's guidance, and program
officials stated that they would update the assessment for each ACE
release. However, this PIA did not cover other recently completed
screening releases. Program officials told us that these screening
releases were considered to be part of the Automated Targeting System
and were covered by the Automated Targeting System's PIA. However, this
PIA does not specifically identify or address ACE screening releases.
With respect to architectural alignment, DHS determined in May 2007
that all required ACE products and technologies were aligned with the
DHS technical reference model and that ACE was thus aligned with the
DHS enterprise architecture. However, we have yet to receive sufficient
documentation describing the criteria and methodology used to make
these determinations or verifiable analysis supporting the
determinations. Moreover, the determinations were based on technical
alignment and did not address other relevant aspects of program
alignment to an enterprise architecture, such as data alignment.
* Recommendation: Develop and implement key human capital management
practices.
In progress. In June 2006, the Office of Information Technology
Strategic Human Capital Management Plan, which included an ACE-specific
appendix as a road map for effective management of human capital
resources, was approved. However, the plan does not address the basic
tenets of effective human capital management, such as defining the
positions needed (including core competencies) to perform core program
functions, assessing and inventorying current workforce skills and
abilities, assessing any gaps between needed and existing workforce
levels and capabilities, and filling identified gaps. Officials
acknowledged these limitations in the plans and stated that they are
developing an implementation plan to address these shortfalls.
* Recommendation: Include in the June 30, 2006, quarterly update report
to the appropriations committees a strategy for managing ACE human
capital needs and the ACE framework for managing performance and
ensuring accountability.
In progress. The June 30, 2006, quarterly report to the House and
Senate Appropriations Committees included the ACE program's strategy
for meeting its human capital needs and its accountability framework;
however, the human capital strategy does not meet the basic tenets of
strategic human capital management, as previously explained.
* Recommendation: Accurately report to the appropriations committees on
progress in implementing our prior recommendations.
In progress. Quarterly reports to the House and Senate Appropriations
Committees have contained information on the status of our open
recommendations since November 2002, but recent reports remain outdated
due to a 2-to 7-month time lapse between when the reports are produced
and when they are provided to the appropriations committees. DHS and
program officials stated that they are exploring ways to accelerate the
review process and thereby improve the timeliness and accuracy of their
reports to Congress.
Observations on the Expenditure Plan and Management of ACE:
We have three observations about ACE requirements, commercial product
selection, and risk management.
* Requirements: Redefinition of requirements for several ACE releases
is now under way to address limitations in completeness of originally
defined requirements, and this redefinition is likely to introduce
program schedule delays and cost increases.
In defining ACE requirements, the program office discovered that its
original approach did not adequately engage all key stakeholders, such
as software programmers and subject matter experts, for the legacy
system ACE is intended to replace. To address this, key stakeholders
are now collaborating and decomposing legacy code. However, this effort
is expected to significantly delay some system releases and drops.
Program officials have taken several actions that they say will
minimize the impact of the delays, such as prioritizing shared
functionality, dividing releases/drops into smaller increments, and
changing release deployment strategies. However, these changes have yet
to be approved, and the full extent of the cost and schedule
implications is not yet known. Moreover, neither the fiscal year 2007
expenditure plan nor the ACE quarterly reports have disclosed the
requirements redefinition and its impact, and neither has addressed any
changes to release deployment strategies.
* Commercial product selection: Significant changes to ACE requirements
have led to reevaluation and replacement of a key commercial off-the-
shelf (COTS) product previously selected and being prepared for use.
The program office conducted several analyses to determine which COTS
products would best meet ACE system requirements, including a general
review of various packages in 2002 to select a provider and a more
detailed analysis in 2004 to define and allocate ACE requirements and
select a specific product--the SAP Enterprise Portal. In December 2006,
however, the ACE Chief System Architect determined through additional
analysis that all planned SAP functionality could be provided by
Internet Transaction Server (ITS) technology and recommended that ITS
be adopted. The program office subsequently stopped work on SAP
Enterprise Portal design and configuration efforts and reported that
ITS would be used for release 5/drop A2 instead of the SAP Enterprise
Portal. This decision is expected to have some near-term schedule
impacts because much of the completed work for A2 had been based on the
planned use of SAP Enterprise Portal. Further, use of ITS raises the
risk of inadequate user response time, which would, in turn, negatively
impact user productivity and introduce a high probability of
significant cost and schedule impacts. Program officials reported that
actions are under way to mitigate the risk through performance modeling
and test planning. However, neither the fiscal year 2007 expenditure
plan nor the quarterly reports to Congress disclose this COTS product
change, its impact on release schedules and cost estimates, or the risk
to future system performance.
* Risk management: All program risks are not being effectively managed.
The program office has developed a process guide and implemented an
automated tool (database) for managing ACE risks in accordance with
relevant guidance and best practices. Although the database contains
fields to provide a description, level (high, medium, or low), and
mitigation strategy (including start and end dates, exit criteria, and
implementation status) for each risk, the completeness and quality of
this information varies. Because of such database limitations, we could
not determine the status of and mitigation progress on 17 risks.
Moreover, these database limitations were not reflected in the
documentation used at key program events, indicating that the program
does not have the risk-related information that it needs to inform its
program decisions and to reduce the chances of potential problems
becoming actual problems. Program officials stated that they are taking
steps to improve risk management, including establishing a group to
ensure the quality and completeness of the database, holding regular
group meetings with contract staff and team leads to discuss risks and
their impacts, and conducting risk management training. To date,
however, program risks have not been communicated to oversight
organizations through the 2007 expenditure plan or recent quarterly
reports to the House and Senate Appropriations Committees.
Conclusions:
Over the past 7 years, CBP and DHS have worked to fulfill legislatively
mandated annual expenditure plan requirements and to implement dozens
of our recommendations related to these plans and management of the
program. Among other things, these requirements and recommendations
have promoted effective program management and accountability for
performance and results. As a result of these years of effort, the ACE
program is better positioned today for delivering promised capabilities
and benefits than it has been in the past.
Nevertheless, key program management practices relating to, for
example, human capital management, requirements management, and risk
management continue to remain a challenge, and other management areas,
such as information security and architecture alignment, continue to
require attention. As a result, avoiding major program schedule delays
and cost overruns remains a challenge as more of each appears to be on
the horizon. To further improve ACE management and minimize its
exposure to risk, it is important for CBP and DHS to remain vigilant in
their efforts to satisfy ACE legislative requirements and to fully
implement our prior recommendations. Moreover, it is important that
they keep Congress fully informed on where the program stands and what
changes are planned to address emerging cost overruns and schedule
delays.
Recommendations for Executive Action:
To further strengthen ACE management and promote accountability for ACE
performance and results, we are recommending that the Secretary of
Homeland Security direct the CBP Commissioner to ensure that future
quarterly reports to the House and Senate Appropriations Committees
disclose:
* the risks and associated mitigation strategies of not having fully
satisfied the expenditure plan legislative conditions and not having
completed implementation of all our prior recommendations;
* the status and impacts on the program's estimated cost and schedule
and lessons learned from ongoing efforts to redefine requirements and
to implement a different COTS product than originally selected; and:
* the program's plans and actions for improving ACE risk management and
its current inventory of program risks, including their associated
mitigation strategies and the status of the strategies' implementation.
Agency Comments and Our Evaluation:
In written comments on a draft of this report signed by the Director,
Departmental GAO/OIG Liaison, and reprinted in appendix II, DHS agreed
with our findings and stated that it is committed to addressing them.
Further, the department agreed with our recommendations and described
actions that it said are under way or planned to address them. While
most of the department's stated actions are consistent with our
recommendations, in one case they may not be sufficient. Specifically,
the department stated that it would ensure that future expenditure
plans meet all OMB capital planning and investment control review
requirements by attaching the required OMB budget submission for ACE,
referred to as an Exhibit 300, to all future plans. However, we
reviewed the fiscal year 2007 ACE Exhibit 300 as part of our review of
the fiscal year 2007 ACE expenditure plan and found that it did not
meet the OMB requirements cited above. Therefore, unless DHS improves
the quality of future ACE Exhibit 300s by addressing the weaknesses we
have identified, this action alone may not fully address our
recommendation.
We are sending copies of this report to the Chairmen and Ranking
Minority Members of the other Senate and House committees and
subcommittees that have authorization and oversight responsibilities
for homeland security. We are also sending copies to the DHS Secretary,
the CBP Commissioner and, on their request, to other interested
parties. In addition, the report will be available at no charge on the
GAO Web site at [hyperlink, http://www.gao.gov].
Should you or your offices have any questions on matters discussed in
this report, please contact me at (202) 512-3459 or at h [Hyperlink,
hiter@gao.gov] iter@gao.gov. Contact points for our Offices of
Congressional Relations and Public Affairs may be found on the last
page of this report. Other contacts and key contributors to this report
are listed in appendix III.
Signed by:
Randolph C. Hite:
Director, Information Technology Architecture:
and Systems Issues:
[End of section]
Appendix I: Briefing to Subcommittees on Homeland Security, House and
Senate Committees on Appropriations:
Information Technology: Management Improvements for Acquisition of
Customs Trade Processing System Continue, but Further Efforts Needed to
Avoid More Cost and Schedule Shortfalls:
Briefing to the Staffs of the Subcommittees on Homeland Security,
Senate and House Committees on Appropriations:
July 26, 2007:
Briefing Overview:
Introduction:
Objectives:
Results in Brief:
Background:
Results:
* Legislative Conditions:
* Status of Recommendations:
* Observations:
Conclusions:
* Recommendations for Executive Action:
Agency Comments:
Attachment 1. Scope and Methodology:
Attachment 2. Related GAO Products:
Introduction:
The U.S. Customs and Border Protection[Footnote 6](CBP) is developing a
new import and export processing system, referred to as the Automated
Commercial Environment (ACE), to replace and supplement existing cargo
processing technology. Begun in 2001, this system is being developed
and deployed in a series of increments to about 300 ports of entry and
is expected to be fully deployed by the end of 2011.
The goals of ACE include:
* supporting border security by enhancing analysis and information
sharing with other government agencies and providing CBP with the means
to decide before a shipment reaches the border what should be targeted
because it is a security threat and what should be expedited because it
complies with U.S. laws; and:
* streamlining time-consuming and labor-intensive tasks for CBP
personnel and the trade community through a national trade account and
a single Web-based interface.
The Department of Homeland Security Appropriations Act, 2007,[Footnote
7] states that DHS may not obligate $216.8 million of the $316.8
million appropriated for ACE until the House and Senate Committees on
Appropriations receive a plan for expenditure that:
1. meets the capital planning and investment control review
requirements established by the Office of Management and Budget (OMB),
including Circular A-11, part 7;[Footnote 8]:
2. complies with DHS‘s information systems enterprise architecture;
3. complies with the acquisition rules, requirements, guidelines, and
systems acquisition management practices of the federal government;
4. includes a certification by the Chief Information Officer (CIO) of
DHS that an independent verification and validation agent (IV&V) is
currently under contract for the project;
5. is reviewed and approved by the DHS Investment Review Board
(IRB),[Footnote 9] the Secretary of Homeland Security, and OMB; and:
6. is reviewed by GAO.
On February 6, 2007, DHS submitted its fiscal year 2007 expenditure
plan for $316.8 million to the House and Senate Appropriations
Subcommittees on Homeland Security. In addition, CBP submits quarterly
reports to the House and Senate Appropriations Committees to keep them
apprised of ACE progress and issues.
Objectives:
As agreed, our objectives were to:
1. determine whether the ACE fiscal year 2007 expenditure plan
satisfies the legislative conditions,
2. determine the status of 15 open GAO recommendations for
ACE,[Footnote 10] and:
3. provide observations about the expenditure plan and DHS‘s management
of the ACE program.
We conducted our work at CBP headquarters and contractor facilities in
the Washington, D.C., metropolitan area from December 2006 through July
2007 in accordance with generally accepted government auditing
standards. Details of our scope and methodology are provided in
attachment 1. Related GAO products are in attachment 2.
Results in Brief: Objective 1:
Legislative Conditions:
Table: Summary of satisfaction of legislative conditions:
Legislative condition: Meets the capital planning and investment
control review requirements established by OMB, including OMB Circular
A-11, part 7;
Status [A] [B]: Partially satisfied.
Legislative condition: Complies with the DHS enterprise architecture;
Status [A] [B]: Partially satisfied.
Legislative condition: Complies with the acquisition rules,
requirements, guidelines, and systems acquisition management practices
of the federal government;
Status [A] [B]: Satisfied.
Legislative condition: Includes a certification by the DHS CIO that an
IV&V agent is currently under contract for the project;
Status [A] [B]: Satisfied.
Legislative condition: Is reviewed and approved by the DHS IRB,
Secretary of DHS, and OMB;
Status [A] [B]: Satisfied.
Legislative condition: Is reviewed by GAO;
Status [A] [B]: Satisfied.
Source: GAO.
[A] Partially satisfied means that the plan, in combination with
supporting documentation, either satisfied or provided for satisfying
many, but not all, key aspects of the condition that we reviewed.
[B] Satisfied means that the plan, in combination with supporting
documentation, either satisfied or provided for satisfying every aspect
of the condition that we reviewed.
[End of table]
Results in Brief: Objective 2:
Open Recommendations:
Table: Implementation of prior GAO recommendations GAO
Recommendations[A]:
GAO Recommendation: 1. Define and implement an ACE accountability
framework that ensures;
Status [B,C,D]: [Empty].
GAO Recommendation: 1. Define and implement an ACE accountability
framework that ensures: a. coverage of all program commitment areas,
including key expected or estimated system (1) capabilities, use, and
quality; (2) benefits and mission value; (3) costs; and (4) milestones
and schedules;
Status [B,C,D]: Complete.
GAO Recommendation: 1. Define and implement an ACE accountability
framework that ensures: b. currency, relevance, and completeness of
such commitments made to Congress in expenditure plans;
Status [B,C,D]: In progress.
GAO Recommendation: 1. Define and implement an ACE accountability
framework that ensures: c. reliable data relevant to measuring progress
against commitments;
Status [B,C,D]: Complete.
GAO Recommendation: 1. Define and implement an ACE accountability
framework that ensures: d. reporting in future expenditure plans
progress against commitments contained in prior expenditure plans;
Status [B,C,D]: In progress.
GAO Recommendation: 1. Define and implement an ACE accountability
framework that ensures: e. use of criteria for exiting key readiness
milestones that adequately consider indicators of system maturity, such
as severity of open defects, and document milestone decisions in a way
that reflects the risks associated with proceeding with unresolved
severe defects and provides for mitigating these risks.[E];
Status [B,C,D]: Complete.
GAO Recommendation: 2. Develop the range of realistic performance
measures and targets needed to support an outcome-based, results-
oriented accountability framework, including user satisfaction;
Status [B,C,D]: Complete.
GAO Recommendation: 3. Explicitly align program goals, benefits,
desired business outcomes, and performance measures;
Status [B,C,D]: Complete.
GAO Recommendation: 4. Define measures and collect and use associated
metrics for determining whether prior and future program management
improvements are successful;
Status [B,C,D]: Planned.
GAO Recommendation: 5. Fully address those legislative conditions
associated with measuring performance and results and employing
effective IV&V practices;
Status [B,C,D]: Complete.
GAO Recommendation: 6. Ensure that future expenditure plans are based
on cost estimates that are reconciled with independent cost estimates;
Status [B,C,D]: Complete.
GAO Recommendation: 7. Develop and implement a rigorous and
analytically verifiable cost estimating program that embodies the
tenets of effective estimating;
Status [B,C,D]: Complete.
GAO Recommendation: 8. Use earned value management (EVM)[F]in
developing all existing and future releases;
Status [B,C,D]: Complete.
GAO Recommendation: 9. Have future expenditure plans specifically
address any proposals or plans for extending and using ACE
infrastructure to support other homeland security applications;
Status [B,C,D]: Complete.
GAO Recommendation: 10. Minimize the degree of overlap and concurrence
across ongoing and future releases, and capture and mitigate the
associated risks of any residual concurrence;
Status [B,C,D]: In progress.
GAO Recommendation: 11. Fully address those legislative conditions
associated with having an approved privacy impact assessment (PIA) and
ensuring architectural alignment;
Status [B,C,D]: In progress.
GAO Recommendation: 12. Develop and implement missing human capital
management practices;
Status [B,C,D]: In Progress.
GAO Recommendation: 13. Include in the June 30, 2006, quarterly update
report to the appropriations committees a strategy for managing human
capital needs and the framework for managing performance and ensuring
accountability;
Status [B,C,D]: In progress.
GAO Recommendation: 14. Report to House and Senate Appropriations
Committees on a quarterly basis on efforts to address open GAO
recommendations;
Status [B,C,D]: Complete.
GAO Recommendation: 15. Accurately report to the appropriations
committees on CBP's progress in implementing our prior recommendations;
Status [B,C,D]: In Progress.
Source: GAO.
[A] With respect to the fiscal year 2007 expenditure plan.
[B] Complete means that actions have been taken to fully implement the
recommendation.
[C] In progress means that actions are under way to implement the
recommendation.
[D] Planned means actions are planned to implement the recommendation.
[E] This is a combination of two related recommendations.
[F] EVM is a management tool for measuring progress and is both an
industry accepted practice and an OMB requirement.
[End of table]
Results in Brief: Objective 3:
Observations:
Summary of observations:
* Limitations in the completeness of the original requirements for
several ACE releases have resulted in changes to how requirements are
being defined, as well as changes to the requirements themselves. These
changes are likely to produce significant schedule delays and cost
growth, and neither the expenditure plan nor the quarterly reports to
Congress have disclosed these risks.
* Requirements changes have led to reevaluation and replacement of a
key commercial software product that was previously selected based on
incomplete requirements. This change carries schedule and cost risks
that neither the expenditure plan nor the quarterly reports have
disclosed.
* Management of ACE risks has not been effective, but improvements are
planned to better anticipate and avoid problems that cause schedule
delays and cost growth. ACE risks are not disclosed in either the
expenditure plan or in the quarterly reports.
Results in Brief:
Recommendations and Agency Comments:
To reduce ACE exposure to future schedule delays and cost growth and to
promote greater accountability, we are making recommendations to DHS
aimed at disclosing the nature of and progress in addressing the risks
associated with not having fully satisfied expenditure plan legislative
conditions, not having completed implementation of all prior GAO
recommendations, and having to redefine ACE requirements and reselect a
key commercial software product.
In oral comments on a draft of this briefing, DHS and CBP officials
agreed with our conclusions and recommendations, and provided
clarifying information and technical comments that we incorporated in
the briefing, as appropriate.
Background:
Program Overview:
CBP is about 6 years into its trade processing modernization program,
known as ACE. Among other things, ACE is to introduce reengineered
business processes and next generation cargo processing technology, and
it is to support CBP‘s mission of (1) protecting the American public
against terrorism and (2) enforcing the laws of the United States while
fostering our nation‘s economic security through lawful international
trade and travel.
ACE is also to support provisions of Title VI of the North American
Free Trade Agreement, commonly known as the Customs Modernization Act.
Subtitle B of the Act[Footnote 11] contains provisions that were
intended to enable the government to modernize international trade
processes and permit CBP to adopt an informed compliance approach with
industry using automated systems.
The goals of ACE are to:
* enhance analysis and information sharing with other government
agencies relative to new national security threats;
* provide CBP personnel with the technology and information needed to
decide, before a shipment reaches the border, what should be targeted
because it is a security threat and what should be expedited because it
complies with U.S. laws;
* enable the efficient collection, processing, and analysis of
commercial import and export data via an integrated, fully automated
information system;
* reduce costs for the government and the trade community by
streamlining time-consuming and labor-intensive tasks;
* enable government and trade communities to process, view, and manage
accounts nationally and obtain historical information on cargo,
conveyances, and crew, based on screening and targeting rules; and:
* enable government to comply with legislative mandates to improve
efficiency/effectiveness and provide better customer service to U.S.
citizens.
Background:
Program Organization:
Several CBP components support the execution of the ACE program.
* The Cargo Systems Program Office (referred to in this briefing as the
program office) is responsible for the implementation of ACE. This
office has primary responsibility for ACE program management; is
responsible for the day-to-day management of ACE modernization
activities; and develops the policies, standards, processes, and
metrics by which the program is managed and measured.
* The ACE program office is located within CBP‘s Office of Information
Technology (OIT), which is headed by the Assistant Commissioner for
Information and Technology.
* The ACE program office is supported by the Targeting and Analysis
Systems Program Office (a merger of ACE screening and targeting
resources and the Office of Information Technology‘s Interprocess
Solutions Branch), which is responsible for acquisition and development
of ACE screening and targeting functionality.
* The program office is supported by CBP‘s Office of Finance, Office of
Strategic Trade, Office of Regulations and Rulings, and more than 100
participating government agencies and offices.
Background:
Contractors:
CBP awarded a 15-year, indefinite delivery/indefinite quantity, prime
integration contract (5-year base with two 5-year options) to IBM
Global Services in April 2001 for development and implementation of
ACE. CBP exercised the first option in April of 2006.
* IBM and its subcontractors-collectively called the ACE Support
Team[Footnote 12]-provide ACE with program management support,
enterprise engineering, systems planning and development, and systems
business process reengineering; technology architectures; prototyping;
systems and application design; software development, testing, and
evaluation; deployment; and developmental operations support.
* IBM is also under contract for operations and maintenance of deployed
ACE releases, as well as for ongoing enhancements (new capabilities,
referred to as program baseline enhancements) implemented in sub-
releases that are scheduled in-between major ACE releases.
Background:
Acquisition Approach and Cost:
CBP also relies on support contractors to provide a range of management
support, such as program management, financial management, process
improvement, quality assurance, requirements and configuration
management, program communication, organizational learning, human
capital planning, specialized cost analysis and life cycle cost
estimating/modeling services, and procurement support.
In 2002, ACE was to be completed in four increments over 4 years at an
estimated cost of between $1.5 billion and $1.6 billion.
The ACE Program Plan (version 2.1, dated August 2006) states that ACE
is expected to be fully deployed and operational by the end of 2011 at
a cost of about $3.3 billion. However, program officials told us that
cost and schedule estimates are being revised, but have not yet been
approved and therefore were not provided for our review. In the fiscal
year 2007 ACE expenditure plan, CBP reports that it has spent about
$1.7 billion on the program.
ACE is now being acquired and implemented through a series of 10
increments (referred to as releases), which are further divided into
major system deliveries, known as ’drops.“ (See the following six
slides for a description of the increments and their status.)
Background:
Description of ACE Increments:
A description of the 10 ACE increments (releases and related drops)
follows.
Release 1 (ACE Foundation): Computer hardware and system software
(infrastructure) to support subsequent system releases.
Release 2 (Account Creation): Initial group of national account
managers1 and 41 importers access to account information, such as trade
activity.
Release 3 (Periodic Payment): Additional account managers and
importers, as well as brokers and carriers,2 with access to account
information; provides initial financial transaction processing and
revenue collection capability, allowing monthly payments of duties and
fees.
Release 4 (e-Manifest: Trucks): Electronic truck manifest3 processing
and interfacing to legacy enforcement systems and databases.
Background:
Description of ACE Increments:
Release 5 (Entry Summary, Accounts, and Revenue (ESAR)): SAP[Footnote
16] technologies to enhance and expend accounts management, financial
management, and entry summary functionality.
* Master Data and Enhanced Accounts (drop A1): SAP to deliver enhanced
account creation and maintenance functionality and expand the types of
accounts managed in ACE.
* Entry Summary and Revenue (drop A2): Entry summary, interfaces with
participating government agencies, calculation of duties and fees,
reconciliation processing, and refunds.
Release 6 (e-Manifest, All Modes, and Cargo Release): Electronic
manifest capability for rail, air, and sea shipments; provides a
multimodal manifest;[Footnote 17] enables full tracking of cargo,
conveyances, individuals, and equipment; and enhances enforcement
processes for rail, air, and sea.
* e-Manifest: Rail and Sea Manifest (drop M1): Electronic manifest
functionality for rail and sea shipments; rail, sea, and truck
electronic manifests into the multimodal manifest.
* e-Manifest: Air Manifest and Cargo Release (drop M2): Electronic
manifest to air shipment and brings all modes of transportation into
the multimodal manifest.
* e-Manifest: Exports and Mail Entry Writing System (drop M3): Tracking
of cargo, conveyances, individuals, and equipment for truck, sea, rail,
and air manifests.
Release 7 (Exports and Cargo Control): Remaining accounts management,
revenue, manifest, release, and export functionality.
* ESAR: Drawback, Protest, and Importer Activity Summary Statement
(IASS) (drop A3): Import activity summary statement,[Footnote 18]
drawback functionality, and enhanced protest; online processing for
trade account applications.
E-Manifest: Final Exports and Manifest (drop M4): Electronic manifest
for mail, pipeline, and hand carry; electronic export processing.
Screening S1 (Screening Foundation): Foundation for screening cargo and
conveyances by centralizing criteria and results into a single standard
database; allows user definition and maintenance of data sources and
business rules for air, rail, sea, and truck modes of transportation.
Screening S2 (Targeting Foundation): Platform and foundation for
advanced targeting capabilities by enabling CBP‘s National Targeting
Center to search multiple databases for relevant facts and actionable
intelligence and infer relationships between entities and data
elements; architecture for integrating new data sources (including
integrating external data sources and providing a single sign on
capability), implementing analytical tools, and deploying analytical
capabilities.
Screening S3 (Advanced Targeting Capabilities): Screening for
reconciliation, intermodal manifest, Food and Drug Administration data,
and in-bond, warehouse, and foreign trade zone authorized movements;
integrates additional data sources into targeting capability; and risk
management capability.
Background:
Status of ACE Increments:
According to CBP, as of July 2007,:
* Five increments are fully operational: Releases 1, 2, and 3, and
Screenings S1 and S2.
* One increment (Release 4) has been deployed at 94 of the 99 truck
land border ports.
* Three increments are at various stages of development and/or
deployment: Release 5/Drops A1 and A2, Release 6/Drop M1, and Screening
Background:
Status of ACE Increments:
Figure: ACE Schedule:
This figure is a bar chart showing the ACE schedule.
[See PDF for image] - graphic text:
Source: GAO analysis based on CBP data.
[End of table]
Background:
Status of ACE Use:
CBP reports increased use of operational ACE increments. For example:
* The number of external accounts[Footnote 19] grew from 41 in June
2003 to 736 in August 2005, and stood at about 4,100 in October 2006.
As of November 2006, about 4,500 corporate entities had been approved
to pay monthly duties and fees.
* Total revenue collections through ACE grew from $84,673 in June 2004
to $1.3 billion in July 2005, and as of October 2006 stood at about $8
billion.
* The number of e-Manifests that were filed using ACE grew from 20,847
in December 2006 to 45,548 in January 2007.
Background:
Funding for ACE Expenditure Plans:
Table: Funding for ACE Expenditure Plans:
Release: 1: ACE Foundation:-through Operational Readiness;
Budgeted amount: Prior years[A]: 114.8;
Budgeted amount: Fiscal year: [Empty];
Budgeted amount: Total: 114.8.
Release: 2: Account Creation-through Operational Readiness;
Budgeted amount: Prior years[A]: 114.8;
Budgeted amount: Fiscal year: [Empty];
Budgeted amount: Total: 114.8.
Release: 3: Periodic Payment:-through Operational Readiness;
Budgeted amount: Prior years[A]: 172.9;
Budgeted amount: Fiscal year: [Empty];
Budgeted amount: Total: 183.2.
Release: 4: e-Manifest Trucks-through Operational Readiness;
Budgeted amount: Prior years[A]: 10.3;
Budgeted amount: Fiscal year: [Empty];
Budgeted amount: Total: 183.2.
Release: 5(A1): ESAR: Master Data and Enhanced Amounts;
Budgeted amount: Prior years[A]: 172.3;
Budgeted amount: Fiscal year: [Empty];
Budgeted amount: Total: 233.6.
Release: 5(A2): ESAR: Entry Summary and Revenue;
Budgeted amount: Prior years[A]: 23.3;
Budgeted amount: Fiscal year: 38.0;
Budgeted amount: Total: 233.6.
Release: 6(M1): e-Manifest- Rail and Sea Manifest;
Budgeted amount: Prior years[A]: 46.3;
Budgeted amount: Fiscal year: 38.3;
Budgeted amount: Total: 95.0.
Release: 6(M2): e-Manifest- Air and Cargo Release;
Budgeted amount: Prior years[A]: 10.4;
Budgeted amount: Fiscal year: 38.3;
Budgeted amount: Total: 95.
Release: 6(M3): Exports and Mail Entry Writing System;
Budgeted amount: Prior years[A]: [Empty];
Budgeted amount: Fiscal year: 38.3;
Budgeted amount: Total: 95.
Release: 7(A3): ESAR: Drawback, Protest and IASS[B];
Budgeted amount: Prior years[A]: [Empty];
Budgeted amount: Fiscal year: [Empty];
Budgeted amount: Total: [Empty].
Release: 7(M4): e-Manifest Custodial Entities, Pipeline, and Batch
Processes[C];
Budgeted amount: Prior years[A]: [Empty];
Budgeted amount: Fiscal year: [Empty];
Budgeted amount: Total: [Empty].
Release: S1: Screening Foundation;
Budgeted amount: Prior years[A]: 48.7;
Budgeted amount: Fiscal year: [Empty];
Budgeted amount: Total: 48.7.
Release: S2: Targeting Foundation;
Budgeted amount: Prior years[A]: 39.3;
Budgeted amount: Fiscal year: [Empty];
Budgeted amount: Total: 39.3.
Release: S3: Advanced Targeting;
Budgeted amount: Prior years[A]: 21.8;
Budgeted amount: Fiscal year: [Empty];
Budgeted amount: Total: 21.8.
Activity: ACE Operations and Maintenance;
Budgeted amount: Prior years[A]: 143.1;
Budgeted amount: Fiscal year: 44.2;
Budgeted amount: Total: 187.3.
Activity: ACE Production Baselines;
Budgeted amount: Prior year[A]: [Empty];
Budgeted amount: Fiscal year: 22.6;
Budgeted amount: Total: 22.6.
Activity: ACE Foundation Architecture and Engineering;
Budgeted amount: Prior year[A]: 90.4;
Budgeted amount: Fiscal year: 35.7;
Budgeted amount: Total: 126.1.
Activity: ACE Implementation Infrastructure and Support;
Budgeted amount: Prior year[A]: 269.5;
Budgeted amount: Fiscal year: 62.9;
Budgeted amount: Total: 332.4.
Activity: ACE Foundation Program Management;
Budgeted amount: Prior year[A]: 137.5;
Budgeted amount: Fiscal year: 18.9;
Budgeted amount: Total: 156.4.
Activity: ACE Communications, Training, Outcome, and Deployment;
Budgeted amount: Prior year[A]: 31.7;
Budgeted amount: Fiscal year: 24.4;
Budgeted amount: Total: 56.1.
Activity: Other Tasks;
Budgeted amount: Prior year[A]: 20.6;
Budgeted amount: Fiscal year: [Empty];
Budgeted amount: Total: 20.6.
Activity: Cargo Systems Program Office;
Budgeted amount: Prior year[A]: 201.2;
Budgeted amount: Fiscal year: 25.3;
Budgeted amount: Total: 226.5.
Activity: International Trade Data System;
Budgeted amount: Prior year[A]: 59.4;
Budgeted amount: Fiscal year: 16;
Budgeted amount: Total: 75.4.
Activity: Management Reserve;
Budgeted amount: Prior year[A]: 92;
Budgeted amount: Fiscal year: 4.6;
Budgeted amount: Total: 96.6.
Activity: International Trade Data System Funding for Development[D];
Budgeted amount: Prior year[A]: [Empty];
Budgeted amount: Fiscal year: -14;
Budgeted amount: Total: -14.
Appropriated total;
Budgeted amount: Prior year[A]: 1707;
Budgeted amount: Fiscal year: 317;
Budgeted amount: Total: 2024.
Source: GAO analysis of CBP data.
[A] Prior funding consists of stopgap funding, approved by the
appropriations committees in March 2001, and the seven previous
expenditure plans.
[B,C] Funding for A3 and M4 has not yet been included in the
expenditure plans.
[D] This amount consists of prior year unobligated funds that ITDS
provided to ACE to address requirements for participating government
agencies.
[End of table]
Objective 1: Legislative Conditions:
Condition 1: Partially Satisfied:
The 6 legislative conditions have been either satisfied or partially
satisfied.
Table: Legislative condition:
Legislative condition: 1. Meets the capital planning and investment
control review requirements established by the Office of Management and
Budget (OMB), including OMB Circular A-11, part 7;
Status [A,B]: Partially satisfied.
Legislative condition: 2. Complies with DHS‘s enterprise architecture;
Status [A,B]: Partially satisfied.
Legislative condition: 3. Complies with the acquisition rules,
requirements, guidelines, and systems acquisition management practices
of the federal government;
Status [A,B]: Satisfied.
Legislative condition: 4. Includes a certification by the DHS CIO that
an IV&V agent is currently under contract for the project;
Status [A,B]: Satisfied.
Legislative condition: 5. Is reviewed and approved by the DHS IRB,
Secretary of Homeland Security, and OMB;
Status [A,B]: Satisfied.
Legislative condition: 6. Is reviewed by GAO;
Status [A,B]: Satisfied.
Source: GAO.
[A] Partially satisfied means that the plan, in combination with
supporting documentation, either satisfied or provided for satisfying
many, but not all, key aspects of the condition that we reviewed.
[B] Satisfied means that the plan, in combination with supporting
documentation, either satisfied or provided for satisfying every aspect
of the condition that we reviewed.
[End of table]
Condition 1: The plan, including related program documentation and
program officials‘ statements, partially satisfies the capital planning
and investment control review requirements established by OMB,
including Circular A-11, part 7.[Footnote 20]
The table that follows provides an overview of the results of our
analysis and selected examples in areas where A-11 requirements have or
have not been fully satisfied. Given that the A-11 requirements are
intended to minimize a program‘s exposure to risk, permit performance
measurement and oversight, and promote accountability, any areas in
which the program falls short of the requirements reduces the chances
of delivering cost effective capabilities and measurable results on
time and within budget.
Objective 1: Legislative Conditions:
Condition 1: Partially Satisfied:
Table: Condition 1: Partially Satisfied:
Table: Examples of A-11 Conditions Results of Our Analysis:
Provide a brief description of the investment and its status in the
capital planning and investment control review process, including major
assumptions made about the investment;
The expenditure plan and the ACE Exhibit 300 budget submission provide
brief descriptions of the ACE investment and its releases. The Exhibit
300 also describes the status of ACE relative to DHS‘s capital planning
and investment control process, and states that ACE is in the ’control“
stage of the process;
The Exhibit 300 and the ACE program plan also describe investment
assumptions, such as (a) an annual budget of $305.5 million will be
provided; (b) incremental deliveries within releases will mitigate
risks and reduce uncertainty of program estimates; (c) ITDS funding
will be timely, separate, and adequate; (d) stakeholder representation
and resources will be adequate.
Report performance goals and measures for existing investments and show
how the Federal Enterprise Architecture (FEA) Performance Reference
Model (PRM) applies to this investment;
The expenditure plan reports the program‘s performance goals, benefits,
objectives, performance measures, and their relationships for some, but
not all, increments, including actual performance for fiscal years 2005
through 2006. The plan includes the ACE accountability framework, which
is the program‘s overall tool for implementing CBP‘s PRM, which in turn
is based on the FEA PRM. CBP‘s PRM includes, for example, performance
measures for user satisfaction, efficiency, productivity, and data
reliability, among other elements, and the ACE accountability framework
incorporates a subset of these PRM measures, augmented by additional
measures focusing on the program‘s status;
ACE‘s Exhibit 300 also presents performance goals, targets, measures,
and results for 2003 through 2012. However, these are not fully
consistent with the expenditure plan. According to CBP, this is because
the ACE performance measures were aligned with DHS‘s goals, objectives,
strategies, and desired results as of July 2006, which is after the
fiscal year 2007 Exhibit 300 was submitted. In addition, the
performance measures continue to evolve as more understanding is gained
in the usefulness and meaning of measures. (See the open
recommendations section of this briefing for more information on
performance measures.)
Provide a summary of the investment‘s risk assessment, including how 19
OMB-identified risk elements are being addressed;
The expenditure plan presents some, but not all, of the identified
risks for the program‘s releases and activities. The Exhibit 300 also
presents program risks, assessments, mitigation strategies, and status,
and it organizes them by OMB risk categories. However, the risks in the
expenditure plan and the Exhibit 300 are not fully consistent with each
other or with the risks being tracked in the program‘s risk database.
Further, the most recent risk assessment is limited to security risks
for Release 4;
The ACE program has a documented risk management process that includes
identifying, classifying, reporting, and tracking risks. However, this
process has not been fully implemented. For example, some risks that
are identified in the risk database and the accountability framework
have missing or outdated status information and mitigation strategies.
As a result, the status of all risks is not clear. Program officials
stated that risk management is not yet mature, but that they are taking
steps to improve it. (See the open recommendation section of this
briefing for more information on risk management.)
Provide a summary of the investment‘s status in accomplishing baseline
cost and schedule goals through the use of an earned value management
(EVM) system or operational analysis, depending on the life-cycle
stage;
The expenditure plan reported some, but not all, EVM data for ACE
releases and activities. For example, the data includes planned,
estimated, and actual schedule milestones, but it does not include
schedule variances;
The EVM data in the expenditure plan was from the ACE accountability
framework that program officials rely on to manage the program. (See
the open recommendations section of this briefing for more information
on the accountability framework.) According to program officials, they
are using EVM to manage all ACE releases and screenings under contract
and EVM tracking begins with an Integrated Baseline Review, which forms
the basis for a realistic plan against which to objectively measure
work to be completed during the period of performance;
The Exhibit 300 also includes EVM data and describes contractor
requirements for EVM, including verification of EVM compliance with
industry standards. According to program officials, these contractual
requirements are still operative;
Nevertheless, the EVM program has still not been certified, as required
by OMB. According to program officials, this certification is scheduled
for the beginning of fiscal year 2008. As an interim measure, the prime
contractor performed an EVM compliance and internal surveillance audit
against relevant EVM criteria[Footnote 21] in March 2006 and found no
issues.
Provide a description of the investment's privacy and security issues.
Summarize the agency's ability to manage security at the system or
application level. Demonstrate compliance with the certification and
accreditation processes as well as the mitigation of IT security
weaknesses;
Privacy: The expenditure plan does not discuss privacy issues. However,
the Exhibit 300 states that ACE is subject to the privacy provisions of
the E-Government Act of 2002. It further states that a privacy impact
assessment was conducted in 2005 for Release 4 and that separate
assessments will be conducted for each subsequent release. This
assessment was approved by DHS on July 14, 2006, and our analysis shows
that it complied with relevant DHS guidance. This assessment does not
cover other recently completed screening releases S1 and S2. According
to program officials, S1 and S2 are considered to be part of the
Automated Targeting System (ATS), and are therefore covered by the ATS
PIA. However, our analysis of the ATS PIA showed that while it
addresses screening and targeting functions, it does not specifically
identify or address releases S1 and S2. (See the open recommendations
section of this briefing for further information on privacy issues);
Security: CBP has taken a number of actions related to ACE security
management. It conducted a security self-assessment for Release 4 in
September 2006 using the National Institute of Standards and Technology
(NIST) Security Self-Assessment Guide for Information Technology
Systems and did not report any major security vulnerabilities. In
addition, CBP officials stated that another security self-assessment
was conducted in April 2007. However, we have yet to receive this self-
assessment. CBP also reports that it has conducted two full contingency
plan tests at its disaster recovery facility;
Further, CBP accredited ACE Release 4 on November 22, 2004; Release
S1on July 18, 2006; and Release S2 on October 18, 2006. The program
office plans to conduct its next ACE certification and accreditation of
ACE in September 2007 for Release 5/Drop A1. However, since November
2004, the deployed ACE system has been subject to considerable change.
Specifically, about 7,100 trouble tickets, trouble reports, change
requests and install requests were generated”some of which have
resulted in system changes. Federal guidance recommends reaccreditation
whenever significant changes to the system or its operational
environment are likely to affect a system‘s security posture.[Footnote
22] However, CBP has not established explicit criteria for when to
reaccredit/recertify a system in the face of changes, or documented a
systematic procedure for determining the security risk from the
cumulative impact of changes made to the system. As a result, CBP has
not recertified or reaccredited the system;
In addition, the ACE security plan and security risk assessment have
not been updated to reflect key information, such as the results of the
April 2007 security self-assessment or a system access control risk
identified in May 2006 and included in the program‘s risk database.
Source: OMB and NIST criteria and GAO analysis of DHS documentation.
[End of table]
Objective 1: Legislative Conditions:
Condition 2: Partially Satisfied:
Condition 2: The plan, including related program documentation and
program officials‘ statements, partially satisfies the condition that
it comply with the DHS information systems enterprise architecture (EA)
as currently defined.
According to federal guidelines and best practices, investment
compliance with an EA is essential for ensuring that an organization‘s
investment in new and existing systems is defined, designed, and
implemented in a way that promotes integration and interoperability and
minimizes overlap and redundancy, thus optimizing enterprisewide
efficiency and effectiveness. A compliance determination is not a one-
time event that occurs when an investment begins, but is, rather, a
series of determinations that occurs throughout an investment‘s life
cycle as changes to key aspects of both the EA and the investment‘s
architecture are made (e.g., data, business, services, and technology).
The DHS Enterprise Architecture Board, supported by the Enterprise
Architecture Center of Excellence, is responsible for ensuring that
projects demonstrate adequate technical and strategic compliance with
the department‘s EA.
During 2006, the DHS Enterprise Architecture Board conducted three
reviews of ACE architectural alignment with the DHS EA Technical
Reference Model (TRM)[Footnote 23] as part of key milestone reviews for
three release/screening increments.
* Master Data and Enhanced Accounts (Drop A1), Critical Design Review,
June 2006;
* E-Manifest: Rail and Sea (Drop M1), Critical Design Review, September
2006, and:
* Targeting Foundation (S2), Production Readiness Review, November
2006.
On May 1, 2007, DHS EA officials reported that all required products
and technologies were aligned to the TRM, and thus that ACE was in
alignment with the DHS EA. In addition, the DHS CIO certified as part
of the above milestone reviews that each increment was in alignment
with the TRM. More specifically,
* In December 2006, the Center of Excellence determined that ACE was
conditionally compliant with the DHS EA, contingent on actions taken in
regard to four conditions. Three of the four conditions were resolved
by March 2007.
* On March 29, 2007, the EAB recommended approval of ACE‘s decision
request for program alignment, with one remaining condition”that by
June 30, 2007, the program submit technology insertions packages for
the products identified as needing alignment with the DHS TRM.
Notwithstanding these EA compliance determinations, DHS did not provide
us with sufficient documentation of its determinations to allow us to
understand the methodology and criteria, or to verify the analyses,
that were used to arrive at them. Moreover, documentation that was
provided showed that the determinations focused on ACE technical
alignment, and did not address, for example, alignment to the DHS EA
Data Reference Model.
Until DHS demonstrates, through verifiable documentation and
methodologically- based analysis, that ACE is aligned with all relevant
aspects of the DHS EA, including corporate data structures and
standards, the program will be at risk of being designed and
implemented in a way that does not support optimized departmental
operations, performance, and achievement of strategic goals and
outcomes, including those related to information sharing.
Objective 1: Legislative Conditions:
Condition 3: Satisfied:
Condition 3: The plan, including related program documentation and
program officials‘ statements, satisfies the condition that it comply
with the acquisition rules, requirements, guidelines, and systems
acquisition management practices of the federal government.[Footnote
24]
Federal acquisition rules, requirements, guidelines, and management
practices provide an acquisition management framework that is based on
the use of rigorous and disciplined processes for planning, managing,
and controlling the acquisition of IT resources.[Footnote 25] These
acquisition management processes are embodied in published best
practices models, such as the Capability Maturity Models® developed by
Carnegie Mellon University‘s Software Engineering Institute (SEI).
These models explicitly define, among other things, acquisition process
management controls that are recognized hallmarks of successful
organizations and that, if implemented effectively, can greatly
increase the chances of acquiring software-intensive systems that
provide promised capabilities on time and within budget.
In our prior reviews of the ACE program,[Footnote 26] we reported that
ACE had satisfied this condition based on SEI‘s November 2003
assessment of the program against the Software Acquisition Capability
Maturity Model (SA- CMM®).[Footnote 27] That assessment assigned the
program an SEI level 2[Footnote 28] rating, indicating that CBP had
instituted basic acquisition management processes and practices. Since
receiving its 2003 rating, the program office has not conducted another
acquisition capability assessment to ensure that it is continuing to
employ these basic acquisition controls, and does not plan to do so.
Furthermore, program officials told us that although the prime
contractor was contractually required to have an SEI CMM® Level
3[Footnote 29] capability, they are no longer required to do so because
funding contractor program management-related activities is now a lower
priority relative to other competing demands for ACE funding.
According to CBP officials, several steps have been taken to mitigate
any impact of no longer focusing on SEI CMM® compliance, such as:
* requiring the prime contractor and the program office‘s support
contractors to follow plans, processes, and procedures for such key
areas as EVM, configuration management, and problem reporting;
* having the program office‘s quality assurance staff, in collaboration
with the prime contractor‘s quality assurance function, monitor
adherence to key management controls through reviews of ACE processes
and products, including 48 such reviews in fiscal year 2006; and:
* having the program office‘s contracting function continuously monitor
adherence to contractual provisions;
* leveraging OIT assistance, through the Process Asset Group, to
conducts reviews of new and updated plans, policies, and
procedures;[Footnote 30] and:
* cataloguing job aids in a Process Asset Group library that specifies
the required activities for program management processes and
disseminating them to ACE staff.
Objective 1: Legislative Conditions:
Condition 4: Satisfied:
Condition 4: The plan satisfies the condition that it include
certification by the DHS CIO that an IV&V agent is currently under
contract.
On October 24, 2006, the DHS Deputy CIO certified in writing that an
IV&V agent is under contract for ACE and that the agent met applicable
requirements and standards. (See open recommendations section of this
briefing for more information on IV&V.)
Objective 1: Legislative Conditions:
Condition 5: Satisfied:
Condition 5. The plan, including related program documentation and
program officials‘ statements, satisfies the requirement that it be
reviewed and approved by the DHS IRB, the Secretary of Homeland
Security, and OMB.
* The DHS IRB reviewed the program and approved the expenditure plan on
December 12, 2006.
* The DHS Under Secretary for Management approved the expenditure plan
on behalf of the Secretary of Homeland Security on February 6, 2007.
* OMB approved the expenditure plan on January 22, 2007.
Objective 1: Legislative Conditions:
Condition 6: Satisfied:
Condition 6. The plan satisfies the requirement that it be reviewed by
GAO. Our review was completed on July 26, 2007.
Objective 2: Open Recommendations:
Accountability Framework:
Open Recommendation 1: Define and implement an ACE accountability
framework that fulfills these conditions:
a. Covers all program commitment areas, including key expected or
estimated system (1) capabilities, use, and quality; (2) benefits and
mission value; (3) costs; and (4) milestones and schedules.
Status: Complete:
Effective program management includes defining and measuring progress
against program commitments and being held accountable for results.
Such commitments generally cover expected or estimated (1) capabilities
and their associated use and quality, (2) benefits and mission value,
(3) costs, and (4) milestones and schedules.
Since 2003, we have reported that such commitments for ACE have not
always been defined, although improvements have been made. Most
recently, we reported[Footnote 31] that the program office had
developed an initial version of an accountability framework for
measuring several program commitments, such as capabilities and
milestones, but that other commitments, such as benefits, had not been
as well defined.
During the last year, the program office has continued to improve its
coverage of program commitments, as evidenced by the content of key
program documents” ACE accountability framework, ACE Program Plan
(August 2006), the CBP/ACE performance reference model, periodic
Program Management Review (PMR) reports, and the fiscal year 2007
expenditure plan. For example,
* The accountability framework now captures and integrates data on ACE
functional and performance capabilities, benefits, and mission value,
estimated and actual costs, milestones and schedule, accomplishments,
and earned value management status. Further, the framework provides
visibility into each ACE release at several levels of detail, and it is
being used by the ACE Executive Director and others as the means for
monitoring program progress, issues, and decisions.
* The PMR reports have included the accountability framework data.
* The fiscal year 2007 ACE expenditure plan included an example of the
accountability framework commitments from the September 2006 PMR report.
b. Ensures currency, relevance, and completeness of such commitments
made to Congress in expenditure plans.
Status: In progress:
We have previously reported that commitments made in expenditure plans
relative to program capabilities, benefits, costs, and schedules need
to be current, relevant, and complete. To the extent that they are not,
the currency and relevance of the plan and its utility to Congress as
an accountability mechanism are limited.
ACE expenditure plans have not always included such information. To
address this limitation, we reported last year[Footnote 32] that CBP
was relying on quarterly reports to Congress to provide the
appropriations committees with more current, relevant, and complete
information about the program than could be provided in the expenditure
plan. However, we also noted that the quarterly reports were generally
submitted to Congress 3 to 4 months after the end of each quarter, thus
limiting their currency and relevance.
The fiscal year 2007 expenditure plan continues to include information
about program commitments that is not current. Specifically,
* The latest expenditure plan was provided to the appropriations
committees on February 6, 2007. However, information from the ACE
accountability framework that was included in the plan, such as
milestones, EVM values, and risks, were as of October 2006, making it
about 4 months old. For example, the expenditure plan listed the
milestone for the Production Readiness Review (PRR) for a key release,
Release 5/Drop A1, as March 1, 2007. However, this milestone had
already slipped by more than 4 months--to July 12, 2007--by the
December 2006 PMR (held on January 5, 2007).
According to program officials, they continue to use the quarterly ACE
status reports to provide the appropriations committees with more
current information.[Footnote 33] However, recent quarterly reports
have not been current. For example,
* The December 2006 quarterly report was not provided until February
26, 2007, and it contained the same outdated PRR milestone as the
expenditure plan did for the release previously mentioned.
* Other quarterly reports have been submitted to the appropriations
committees as many as 7 months after the end of the quarter.
CBP and DHS officials told us that the delays were due to the DHS
review and approval process and that incorporating the most current
program information would delay the reports even longer. According to
the ACE and DHS officials, they are exploring ways to accelerate the
review process.
c. Ensures reliable data relevant to measuring progress against
commitments. Status: Complete:
The quality of the capabilities that a program is to deliver is a
relevant program commitment. One measure of the quality of system
capabilities is the trend in the number and severity of unresolved
system defects or problems. Reliable data about these defects are
needed so that system maturity can be understood and informed
investment decisions can be made.
We previously reported [Footnote 34] that ACE defect data were not
always consistent because the two tools that the program used to track
defects were not integrated and reconciled. As a result, the true
status of ACE defects, and thus an important measure of system quality,
was not known.
Since then, the program office has integrated the two tools using a
cross- referencing function and has instituted manual processes for
reconciling the data in each tool. The December 2006 quarterly
congressional report stated that these efforts have improved the
ability to record, assess, and report on system quality and performance.
d. Ensures reporting in future expenditure plans progress against
commitments contained in prior expenditure plans.
Status: In progress:
The value and utility of an expenditure plan for congressional
oversight and agency accountability depends in large part on whether
the plan reports on progress against commitments--system capabilities,
benefits, costs, and schedules--made in prior plans.
Historically, the ACE expenditure plans have not reported adequately on
progress against previous plan commitments. Most recently, we
reported[Footnote 35] that the fiscal year 2006 expenditure plan
contained several such reporting gaps, such as whether funding amounts
were actually obligated and expended as planned and whether releases
met schedules. In particular, we reported that the plan did not address
whether the design and development for Release 5 was actually
accomplished as planned.
The fiscal year 2007 expenditure plan still does not adequately
describe the program‘s progress against the commitments that were made
in the fiscal year 2006 plan. For example,
* The plan does not report progress against milestones in the fiscal
year 2006 plan or explain why these milestones were not achieved.
* The plan does not report actual obligation or expenditure of funds
relative to the planned uses of these funds in prior expenditure plans.
* The plan did not address progress against the milestone dates for
each stage of a release that was included in the prior year‘s plan. As
a case in point, the fiscal year 2006 expenditure plan described
specific functionality planned for Release 5/Drop A1 (Master Data and
Enhanced Accounts), such as online registration for trade
representatives. However, the fiscal year 2007 expenditure plan does
not include information on whether these functions were delivered,
stating only that Release 5 functionality would be deployed in two
phases.
According to program officials, the quarterly congressional reports
provide more current information on the program‘s progress against
prior commitments. However, we found that these reports have also not
fully addressed the commitments made in prior expenditure plans. For
example, recent quarterly reports describe progress against
developmental milestones for each release, but do not report whether
key functionality associated with each release was delivered. In
particular, the report for the first quarter of fiscal year 2007
identified planned future capabilities and associated milestones for
Release 5/Drop A1 but did not address the status of the key functions
associated with this release.
Program officials stated that they intend to start providing this
information in the last quarterly report of each year.
e. Ensures use of criteria for exiting key readiness milestones that
adequately consider indicators of system maturity, such as severity of
open defects, and document the milestone decisions in a way that
reflects the associated risks and plans for mitigating them.[Footnote
36]
Status: Complete:
As noted earlier, one measure of the quality of system capabilities
being delivered is the number and severity of unresolved system defects
or problems. As such, information on such defects is an important
consideration when program decisions, such as key milestone decisions,
are made.
We previously reported[Footnote 37] that several key milestones were
passed that had severe open defects and that program officials were
unable to provide documentation regarding how the risks associated with
these defects were assessed. We also reported that these risks were not
being tracked in the program‘s risk database.
Since then, the system life cycle gate review process for Office of
Information and Technology projects, including ACE, has been amended to
include milestone readiness decisions based on an assessment and
acceptance of risks (including the risks related to unresolved
defects). Further, the ACE Risk and Issue Management Process guidance
provides for the systematic identification, analysis, prioritization,
planning, execution, evaluation, and documentation of program risks and
issues and requires that any risks associated with going forward should
be identified as part of each life cycle gate review.
This process has been applied in the following two major gate reviews:
* Release A1 (ESAR) Critical Design Review (May 2006) and:
* Release M1 (E-Manifest: Rail and Sea Manifest) Critical Design Review
(August 2006).
In the case of Release 5/Drop A1, program officials reported that no
severe defects existed, but that all known risks associated with
proceeding past the milestone had been entered into the program‘s risk
database and documented in the certification package submitted to the
DHS CIO.
The quarterly reports to Congress similarly state that risks related to
gate review decisions and the associated impacts are entered into a
database to ensure visibility and mitigation and are included in the
package submitted to the DHS CIO for review and certification to pass a
given milestone. Going forward, officials stated that similar
assessments will be part of the following planned gate reviews for
Release 5/Drop A1:
* Operational Readiness Review (planned for August 23, 2007) and:
* Live operations (planned for August 25, 2007).
Open recommendation 2: Develop the range of realistic ACE performance
measures and targets needed to support an outcome-based, results-
oriented accountability framework, including user satisfaction with
ACE.
Status: Complete:
We have previously reported on both the absence of meaningful
performance measures to understand ACE progress, quality, and results,
and have raised concerns about the practicality and applicability of
some measures that have been defined. Most recently, we
reported[Footnote 38] that defined ACE performance targets are not
always realistic and that goals, expected mission benefits, and
performance measures are not fully defined and adequately aligned.
In response, the program office has established an initial set of
performance measures that are tied to program objectives and related
performance goals, and it has established processes for the collecting,
analyzing, and integrating performance data for each measure. Among
other things, these performance measures address user satisfaction,
efficiency, and productivity. Moreover, these measures have been made
an integral part of the ACE accountability framework and they were
approved by the CBP Commissioner and the DHS CIO on June 30 and July 6,
2006, respectively.
Objective 2: Open Recommendations:
Performance Measures:
According to program officials, these initial measures will continue to
be revised and augmented, and thus will evolve over time based on
lessons learned, changes to existing release capabilities, and
refinements of requirements for future releases. For example, the
program office reported in March 2007 that new measures are still being
developed, reviewed, and evaluated for Releases 2, 3, and 4 at the same
time that performance data is being collected and reported for existing
measures for these releases. According to program officials, the new
measures will be combined with existing performance measures.
In addition, CBP‘s December 2006 quarterly congressional report stated
that performance measures for future releases, such as Release 5, are
being scheduled for identification and development and that changes are
being made to existing measures when they are determined to be
inappropriate. For example, the program office learned that the
performance measure "percentage of truck manifests being filed
electronically" did not recognize that empty trucks are not required to
file manifests, and thus it revised the metric used to divide the
number of electronically filed truck manifests by the total number of
required truck manifests instead of the total number of trucks in order
to get a more meaningful reflection of ACE performance.
To assist in managing these performance measures, the program has
established a life cycle process for performance measures as well as a
database tool to record and manage modifications.
Objective 2: Open Recommendations:
Performance Measures Alignment:
Open recommendation 3: Explicitly align ACE program goals, benefits,
desired business outcomes, and performance measures.
Status: Complete:
As just discussed, the program office has developed an initial set of
ACE program measures that are tied to program goals, among other
things, and they intend to continue to update and evolve these as the
program moves forward. In addition, the program office has developed an
ACE Performance Reference Model that explicitly aligns the CBP
strategic goals, objectives, strategies, and desired results applicable
to the ACE program with specific performance measures. For example,
Table:
CBP Strategic Goal;
Preventing terrorism at ports of entry: Prevent terrorists and
terrorist weapons, including weapons of mass destruction and weapons of
mass effect, from entering the U. S..
CBP Objective;
Improve information and targeting.
CBP Strategy;
Use advanced passenger and cargo information (NTC, ATS-Air, ATS,
Screening and Targeting-ACE) to pre-screen, target, and identify
potential terrorists and terrorist shipments and any related activity.
Desired Result;
Increased use of targeting.
Performance Measure;
Number of security-focused selections generated by system (= or above
intensive threshold) by type.
Further, this model links the measures to specific ACE releases. For
example, the above performance measure applies to Screening Foundation
(S1) and Targeting Foundation (S2).
Objective 2: Open Recommendations:
Management Improvement Measures:
Open recommendation 4: Define measures and collect and use associated
metrics for determining whether prior and future program management
improvements are successful.
Status: Planned:
As we have previously reported,[Footnote 39] investments in program
management improvements should include defined measures of progress and
results. To date, the program office has implemented a number of such
improvements; however, it has not had measures or metrics to determine
the success of the improvements. Moreover, the December 2006 quarterly
congressional report stated that the program anticipates more changes,
including:
* creation of a cargo requirement management board to decide the
disposition of all change requests to production systems;
* establishment of a new invoice review policy; and:
* co-location of personnel within a given business area.
According to its December 2006 quarterly reports to Congress, the
program office plans to measure the impact of future management
improvements. However, program officials told us that they have yet to
define them and thus are not yet using such measures.
Objective 2: Open Recommendations:
Legislative Conditions:
Open recommendation 5: Fully address those legislative conditions
associated with measuring ACE performance and results and employing
effective IV&V practices.
Status: Complete:
Among the legislative conditions that ACE expenditure plans have been
required to meet are satisfaction of OMB guidance, including that
associated with measuring program performance and results and use of
effective IV&V practices. These conditions reflect good program
management practices and, if implemented properly, can reduce program
risks.
Performance and Results:
As previously discussed in this briefing, the program office has
developed a range of ACE performance measures and taken steps to align
them with program, CBP, and DHS strategic goals and outcomes. According
to program officials, they plan to continue to evolve and refine the
performance measures and include the measures in the ACE accountability
framework.
IV&V Practices:
In January 2006, the DHS CIO certified that an IV&V agent was under
contract for the ACE program, but noted several issues, including
these:
* mechanisms were needed to ensure that products were complete, of
sufficient quality, and met the needs of the user and:
* a more explicit technical approach, describing when and how certain
activities should (or should not be) performed, was needed.
Moreover, we subsequently reported[Footnote 40] that the scope of the
contractor‘s activities did not extend to both IV&V of key system
products and development processes.
On October 24, 2006, the Deputy CIO again certified that an IV&V agent
was under contract and stated that the previous issues had been
addressed. Since then, the program office has also developed an IV&V
Implementation Management Plan that addresses the concerns raised by
the DHS CIO and us. In particular, the plan:
* requires an IV&V program consistent with the industry standard;
* provides a set of objectives, guidelines, and expectations for IV&V
activities, including periodic independent reports on status,
observations, recommendations, and activities; and:
* addresses satisfaction of quality standards for ACE products and user
needs.
Program officials told us that IV&V has allowed early identification
and correction of program process and product weakness.
Objective 2: Open Recommendations:
Reconciliation of Cost Estimates:
Open recommendation 6: Ensure that future expenditure plans are based
on cost estimates that are reconciled with independent cost estimates.
Status: Complete:
It is important that expenditure plans be based on reliable estimates
of costs, to include reconciling differences between government and
independent cost estimates. We recently reported[Footnote 41] that the
cost estimate in the fiscal year 2006 expenditure plan was based on
government and independent cost estimates that had been compared and
found to be consistent.
For the fiscal year 2007 expenditure plan, our analysis showed that the
government and independent cost estimates differed by about 15 percent.
According to program officials, they reconciled these differences in
January 2007, and concluded that the results did not warrant changes to
the expenditure plan because the government estimates used in the
expenditure plan were more accurate.
According to program officials, two primary factors account for the
difference in estimates. Specifically,
* The estimates assumed different timelines for completing development
of all releases. The independent estimate assumed development
completion by fiscal year 2010, while the government estimate assumed
fiscal year 2011. According to program office officials, this accounts
for about five percent of the difference.
* The government estimate included a number of items that the
independent estimator did not. For example, the independent estimator
did not include training and outreach items, such as the cost of
conferences with trade associations, training materials, and associated
travel. As a result, the government estimated training and outreach
costs over the life of the program to be about $90 million, while the
independent estimate put these costs at about $39 million. The
independent estimate has since been amended to include the missing
items, and the reconciliation process is continuing.
Objective 2: Open Recommendations:
Rigorous Cost Estimation:
Open recommendation 7: Develop and implement a rigorous and
analytically verifiable cost estimating program that embodies the
tenets of effective estimating.[Footnote 42]
Status: Complete:
The reliability of cost estimates is largely a function of the quality
of the estimating process used to derive them. We previously
reported[Footnote 43] that the program did not have a well-defined cost
estimating process, but that it has since made progress in
strengthening its cost estimating program. Specifically, the program
office has:
* defined and documented processes for estimating program costs
(including management reserve costs) and:
* hired a contractor to develop costs estimates that were independent
of the government estimates.
In September 2006, an ACE support contractor reported that both the
government and independent cost estimation processes demonstrated
significant conformance to effective estimating practices and concluded
that the program is using a rigorous and verifiable cost estimating
approach.
Objective 2: Open Recommendations:
Earned Value Management:
Open recommendation 8: Use EVM in developing all existing and future
releases.
Status: Complete:
EVM is a program management tool to measure progress by comparing,
during a given period of time, the value of work accomplished with the
amount of work expected to be accomplished. This comparison permits
performance to be evaluated based on calculated variances from the
planned (baselined) cost and schedule. EVM is both an industry accepted
practice and an OMB requirement.
We recently reported[Footnote 44] that the program office was not using
EVM for all releases (e.g., Release 5) due to changes to release
baselines and the lack of familiarity on the part of program staff with
EVM practices.
Since then, the program office has established the performance
baselines needed to implement EVM for Release 5/Drops A1 and A2,
Screening 3, and Release 6/Drop M1.
For these releases, the program office reports that it has also applied
EVM standards in establishing baselines and included EVM data in the
accountability framework for management and decision-making purposes.
Program officials also reported that they plan to implement EVM on
future releases and task orders.
Objective 2: Open Recommendations:
ACE Infrastructure:
Open recommendation 9: Have future ACE expenditure plans specifically
address any proposals or plans, whether tentative or approved, for
extending and using ACE infrastructure to support other homeland
security applications, including any impact on ACE of such proposals
and plans.
Status: Complete:
Together, the fiscal year 2007 expenditure plan and the quarterly
reports to Congress address ACE‘s relationships with other trade
processing and DHS applications. For example, the plan discusses
efforts to work with participating government agencies in defining and
deploying the International Trade Data System (ITDS). The stated goal
is to deliver ACE/ITDS in an integrated and coordinated manner. In this
regard, the plan discusses workshops to gather requirements from
participating agencies for Release 6/Drop M2 (first held on July 19,
2006), a working group to address these agencies‘ HAZMAT issues
(established on July 17, 2006), and efforts to develop data element
inputs for ACE from other government agencies.
In addition, the quarterly reports to Congress cite coordination
efforts with related homeland security programs. For example, the
report for the first quarter of 2007 states that:
* Container Security Initiative will be supported by ACE Release 6 and
Screening 1-3 capabilities;
* Customs-Trade Partnership Against Terrorism is coordinating with ACE
Release 5/Drop A1 capabilities to provide both CBP and trade
representatives with the ability to view the status of CBP programs;
and:
* U.S.-Mexico Border Partnership Plan will coordinate with ACE to
implement any cargo screening standards derived from partnership plan
agreements.
In addition, CBP reports that ACE and other CBP applications[Footnote
45] share infrastructure (desktops, clients, and local area networks)
at the ports of entry. This infrastructure is purchased and maintained
by CBP‘s OIT Program Integration Division. Each application, including
ACE, is responsible for complying with OIT‘s infrastructure standards.
Objective 2: Open Recommendations:
Overlap and Concurrence:
Open recommendation 10: Minimize the degree of overlap and concurrency
across ongoing and future ACE releases and capture and mitigate the
associated risks of any residual concurrence.
Status: In progress:
Significant overlap and concurrency among major program activities,
such as releases, introduce considerable cost and schedule risks as
they can create contention for limited resources among the releases. We
have continued to report on extensive overlap and concurrence in ACE
releases and the cost overruns and schedule delays that have resulted.
Most recently, we reported[Footnote 46] that the ACE schedule continued
to provide for such overlap and concurrency and that the risks
associated with doing so were not being effectively addressed. Since
then, the program office has reduced this overlap and concurrence. For
example, it has:
* decoupled (i.e., reduced dependencies among) certain ACE program
components by separating Screening 1-3 from Releases 4-6 and:
* aligned the development and delivery of functionality for different
releases with the availability of required hardware environments.
Recent quarterly congressional reports stated that CBP has taken
actions to reduce potential contention for limited resources. Examples
include:
* dividing releases into smaller subreleases, called drops, to provide
more flexibility in scheduling;
* improving planning for development, integration, testing, and
training activities and milestones to better schedule use of
development and test environments; and:
* centralizing management of shared software services to address, among
other things, allocation of resources and responsiveness to workload
peaks and use of consistent technical management approaches across
releases. Moreover, the program‘s risk database identifies overlap and
concurrency-related risks. However, the mitigation strategies for these
risks contain vague or incomplete data. These data limitations make it
difficult to determine the status or the effectiveness of the efforts
to reduce the risks associated with overlap and concurrence among
releases. (See the observations section of this briefing for additional
information on program risk management.)
The program office is also conducting regular integration meetings with
the teams supporting each release to discuss concerns, decisions, and
schedules associated with resource availability and is using a software
tool to track and mitigate release- specific concurrency risks.
Notwithstanding these steps, the program continues to face challenges
in managing dependencies among releases, which any associated
concurrency in the program‘s development exacerbates. For example, the
schedule slips expected with Release 5/Drop A2 will affect Release
6/Drop M1, as resources have been shifted from M1 to address the A2
delay. In addition, further delays in A1 and A2 will impact the
implementation of M1.
Objective 2: Open Recommendations:
Legislative Conditions:
Open recommendation 11: Direct the appropriate departmental officials
to fully address those legislative conditions associated with having an
approved privacy impact assessment (PIA)[Footnote 47] and ensuring
architectural alignment.
Status: In progress:
The department approved the ACE PIA for Release 4 in July 2006,
however, this assessment does not cover other completed releases.
Further, DHS has determined that ACE is aligned with DHS architecture,
but we have yet to receive documentation to adequately understand and
verify the determination.
PIA (In progress):
In March 2006, DHS developed guidance on the development and content of
a PIA. As we have previously reported,[Footnote 48] the purpose of a
PIA is to ensure that there is no collection, storage, access, use, or
dissemination of identifiable personal or business information that is
not both needed and permitted. Development and use of a PIA are both a
requirement of OMB and the E-Government Act of 2002.[Footnote 49]
The program office has developed a PIA for Release 4 of the ACE e-
Manifest: Trucks and the International Trade Data System, and DHS
approved it on July 14, 2006. As noted earlier, our analysis shows that
this PIA addresses the major elements of DHS‘s guidance. Program
officials stated that they would update the assessment for each ACE
release. This assessment does not cover other recently completed
screening releases (i.e., S1 and S2). However, program officials told
us that S1 and S2 are considered to be part of the Automated Targeting
System (ATS), and are therefore covered by the ATS PIA. However, our
analysis of the ATS PIA showed that while it addresses screening and
targeting functions, it does not specifically identify or address
releases S1 and S2.
Architectural Alignment (in progress):
As discussed in the legislative conditions section of this briefing,
DHS has determined that ACE is aligned with the DHS EA.
For example,
* In December 2006, DHS‘s EA Center of Excellence determined that ACE
was conditionally compliant with the DHS architecture, but that the
program needed to take actions to address four conditions.
* On March 2007, the DHS EA Board reported that ACE had satisfied three
of the conditions and recommended approval of ACE‘s request for program
alignment with one remaining condition”alignment with the DHS Technical
Reference Model.
* In May 2007, DHS EA officials reported that all required products and
technologies were aligned with the Technical Reference Model and that
ACE was thus aligned with the DHS EA.
However, as was also discussed earlier in this briefing, we have yet to
receive sufficient documentation describing the criteria and
methodology used to make these determinations or verifiable analysis
supporting the determinations. Moreover, the determinations were based
on technical alignment and did not address other relevant aspects of
program alignment to an EA, such as data alignment. Thus, the program
is at risk of being designed and implemented in a way that is not
consistent with all relevant aspects of the DHS EA, such as data
structures and standards, and thus does not support optimized DHS-wide
operations, performance, and results.
Objective 2: Open Recommendations:
Human Capital Practices:
Open recommendation 12: Develop and implement key human capital
management practices.
Status: In progress:
As we have previously reported,[Footnote 50] effective strategic
management of program human capital includes, among other things,
defining the skill sets needed to perform program functions, assessing
and inventorying the skill sets of the program‘s current workforce and
assessing any associated skill gaps in meeting future needs, and
developing strategies to fill any identified gaps. Moreover, it
includes having a well-defined plan that provides for effective
implementation of these processes.
In June 2006, CBP executives approved the OIT Strategic Human Capital
Management Plan. The plan is intended to be a road map for supporting
CBP‘s workforce vision and ensuring effective management of human
capital resources across OIT to address enterprise-wide priorities. An
ACE-specific plan was included as an appendix to the CBP plan. This
appendix was intended to provide better near- and long-term human
capital management practices for the OIT offices involved in ACE
development.
Neither the OIT nor the ACE-specific plan addresses the basic tenets of
effective human capital management. For example, neither provides for:
* defining the positions needed (including core competencies) to
perform core program functions;
* assessing and inventorying current workforce skills and abilities;
* assessing any gaps between needed and existing workforce levels and
capabilities; and:
* filling identified gaps via such means as hiring new staff, training
existing staff, and augmenting staff with contractor support.
OIT officials acknowledged these limitations in the plans and stated
that they are developing an implementation plan to address these
shortfalls. The officials stated that the implementation plan will
include accountability, timeframes, and metrics to carry out the larger
OIT Strategic Human Capital Management Plan.
According to these officials, this implementation plan was to be
completed in January 2007, following presentation to the OIT Deputy
Director's Council and approval by the OIT Office Directors and
Assistant Commissioner. However, as of July 2007, it had not yet been
approved and thus was not available for our review.
In the interim, OIT and program officials reported taking various steps
to address ACE human capital needs. These include, for example,
* Using various methods to fill staff vacancies. As of May 2007, the
program reports that it has 62 full-time employees and one vacancy and
that additional staff are working on ACE either full- or part-time.
* Lobbying OPM for more flexibility in recruiting, to include higher
salaries and direct hiring authority.
• Reorganizing OIT into six program offices aligned to major mission
areas so that the number of government personnel responsible for ACE
development activities can be augmented by IT functional program
management expertise.
* Offering training to improve the skills of staff.
Nevertheless, these steps have not been guided by a well-defined plan
and thus represent activities that are not tied to strategic goals and
outcomes and thus cannot be measured against them. Without a plan, it
is unlikely that the program will be able to adequately ensure that it
has the right people at the right time to deliver ACE successfully.
Objective 2: Open Recommendations:
Quarterly Reports:
Open recommendation 13: Include in the June 30, 2006, quarterly update
report to the appropriations committees a strategy for managing ACE
human capital needs and the ACE framework for managing performance and
ensuring accountability.
Status: In progress:
The June 30, 2006 quarterly report to the House and Senate
Appropriations Committees included the program‘s strategy for meeting
its human capital needs and its accountability framework.
Human Capital Strategy (In Progress):
The June 30, 2006, quarterly report to Congress included a description
of the previously described ACE-specific appendix to the OIT Strategic
Human Capital Management Plan, including the plan‘s five goals and
strategies. Moreover, the report states that this ACE-specific plan is
aligned with OPM‘s Human Capital Assessment and Accountability
Framework.[Footnote 51] As previously stated, however, this ACE-
specific plan does not meet the basic tenets of strategic human capital
management, as defined in this framework and other relevant guidance.
Objective 2: Open Recommendations:
Quarterly Reports:
According to program officials, they are developing a new OIT human
capital strategy and implementation plan, but they have yet to provide
us with a date when it will be completed.
Accountability Framework (Complete):
The June 30, 2006, quarterly report included a description of the ACE
accountability framework. As previously discussed, this framework is
the means by which the program measures performance relative to
promised ACE capabilities, costs, schedules, earned value, risks, and
mission values and benefits. The report also included an appendix
illustrating the format and content of the accountability framework
tool. At that time, CBP reported that it would continue to work with
stakeholders to further enhance the format, readability, and utility of
the framework as a program management and reporting tool.
Since June 2006, the program office has refined and implemented the
accountability framework. The framework covers all program commitment
areas and key system aspects to support executive decision making and
provides external program stakeholders with information on the program.
Objective 2: Open Recommendations:
Quarterly Report on Open Recommendations:
Open recommendation 14: Report quarterly to the House and Senate
Appropriations Committees on efforts to address open GAO
recommendations.
Status: Complete:
CBP has submitted quarterly reports on ACE to both the House and the
Senate Appropriations Subcommittees since November 2002, including
reports for each quarter of fiscal year 2006 and the first and second
quarters of fiscal year 2007. These reports have addressed CBP‘s
efforts to address open GAO recommendations.
Objective 2: Open Recommendations:
Accurately Report on Open Recommendations:
Open recommendation 15: Accurately report to the appropriations
committees on CBP's progress in implementing our prior recommendations.
Status: In progress:
As previously stated, CBP has included information on progress in
meeting GAO‘s recommendations in its quarterly reports[Footnote 52] to
the appropriations committees since November 2002. However, some of
this information is dated and thus inaccurate due to the time lapse
between when the reports are produced and when they are provided to the
appropriations committees. Recently, this time lapse has been between
about two and seven months. According to program officials, they are
exploring ways to accelerate the review process and thereby improve the
timeliness and accuracy of their reports to Congress. DHS officials
also told us that they have ongoing efforts to improve the review
process; however, the process has not improved consistently or
significantly.
Objective 3: Observations:
Requirements Limitations Likely to Cause Major Delays:
Observation 1: Redefinition of requirements for several ACE releases is
now under way to address limitations in completeness of originally
defined requirements, and this redefinition is likely to introduce
program schedule delays and cost increases.
A key aspect of successful system acquisition programs is having well-
defined requirements. Among other things, requirements should be
complete, and to accomplish this, best practices advocate engaging all
key stakeholders in the requirements definition and management process.
In defining ACE requirements, the program office discovered that its
original requirements definition approach did not adequately engage all
key stakeholders, and to its credit, has since taken steps to address
this. Specifically,
* In the spring of 2004, the program office and the ACE support team
conducted more than 300 business process workshops with the ACE user
community to help define ACE requirements for the future releases. This
requirements definition approach was referred to as the Global Business
Blueprint (GBB) effort.
Objective 3: Observations:
Requirements Limitations Likely to Cause Major Delays:
* In June and July of 2005, a key group of ACE stakeholders that were
not originally involved in the GBB (application programmers familiar
with the legacy system that ACE is to replace) raised questions about
the completeness of the requirements. To address these questions, the
program office examined the GBB‘s completeness by first reverse-
engineering the legacy software for a small number of legacy system
programs and then comparing the reverse-engineered requirements to the
GBB-derived requirements. Based on this, which is referred to as legacy
code decomposition, the program office found that the GBB-derived
requirements were missing about 20 percent of needed ACE functionality.
* In August 2005, the program office decided that it needed to
decompose all of the legacy system code in order to completely capture
the requirements for all ACE releases. Work began with decomposition of
the legacy code related to ACE Release 5/Drop A2 (Entry Summary
Accounts and Revenue).
* In September 2006, the program office determined that the legacy code
decomposition approach alone was not sufficient to gain a full
understanding of the requirements given the size and complexity of A2.
As a result, the requirements definition process was expanded to engage
another key stakeholder group (business process subject matter
experts). Under the expanded approach, referred to as legacy code
decomposition and collaboration, legacy system software programmers and
subject matter experts were to examine the code line by line in
defining ACE requirements.
* In November 2006, the legacy system code decomposition and
collaboration effort for Release 5/Drop A2 fell behind schedule because
of lack of personnel with legacy system expertise and experience. The
schedule for A2 was tentatively revised, but at the time of our review,
the schedule was still under review, had not yet been approved, and
thus was not yet available for our review.
The program office has identified the A2 legacy code decomposition and
collaboration process as a high risk item that will significantly
impact the A2 schedule. For example, the decomposition and
collaboration process for part of the functionality on A2‘s critical
path”the Authorized Broker Interface Entry Summary”is not expected to
be completed before early 2008, at the earliest.
According to program officials, delays for other releases/drops, such
as Release 5/Drop A1 and Release 6/Drop M1, will not be as significant.
They also said that, while they have not yet estimated how long A2 will
be delayed and what the associated cost implications are, they do not
expect the cost increases to breach the current acquisition program
baseline of $3.3 billion, which translates into a cost increase of less
than $200 million. Moreover, they said that several actions have been
taken to minimize the impact of the delays. For example,
* A2 functionality necessary for M1 has been given priority in order to
support M1 deployment as originally planned and:
* A2 scope is being divided into increments to allow some functionality
to be delivered sooner and to minimize the impact on other drops.
However, these actions carry consequences, such as missed opportunities
to combine field training and an increase in the number of legacy
interfaces, thus increasing the potential for introducing software
problems.
In addition, program officials told us that they are considering
changes to the A2 and M1 deployment strategies to address stakeholder
concerns, and they said that these changes could also minimize the
magnitude of the A2 and M1 delays. Specifically, they said that they
had planned to deploy on a national basis, meaning that A2 and M1
functionality would be deployed to all ports at the same time and
concurrently adopted by all users nationwide. However, deployment may
change to a filer-by-filer basis, meaning that A2 and M1 functionality
would be deployed to all ports at the same time, but not all filers
would begin using it at the same time.
Objective 3: Observations:
Requirements Limitations Likely to Cause Delays:
According to program officials, they believe that the change in the
deployment strategy would both address stakeholder concerns and
minimize any A2 and M1 schedule delays caused by the redefinition of
requirements. However, they added that these changes have yet to be
approved, and the full extent of the cost and schedule implications are
not yet known. Moreover, neither the fiscal year 2007 expenditure plan
nor the ACE quarterly reports have disclosed the A2 and M1 requirements
redefinition and its impact, and neither has addressed any changes to
their deployment strategies.
Objective 3: Observations:
Key COTS Product Being Replaced:
Observation 2: Significant changes to ACE requirements have, in turn,
led to reevaluation and replacement of a key commercial off-the-shelf
product (COTS) previously selected and being prepared for use.
When acquiring commercial component-based systems, like ACE, best
practices advocate basing decisions on whether to employ a given COTS
product on thorough, rigorous, and continuous analysis of a number of
factors, including how well competing products satisfy defined system
requirements.
To the program office‘s credit, it reports having followed the CBP
system life cycle methodology to determine which COTS product would
best meet the requirements for Release 5/Drop A2. These analyses
include:
* In 2002, the program office reviewed, in general terms, various COTS
packages and determined that a solution using SAP (formerly Systems
Application and Products), a COTS provider, combined with other
commercial solutions and customized development, provided the best
combination of capability, performance, and cost for ACE.
* In 2004, a more detailed analysis was conducted as part of the
previously mentioned GBB process, which was intended to define and
allocate ACE requirements to future ACE releases and provide the basis
for, among other things, selecting a specific SAP product. At that
time, the SAP Enterprise Portal product was selected for Release 5/Drop
A2.
* In December 2006, the ACE Chief System Architect recommended that the
Internet Transaction Server (ITS) technology already used by CBP should
be adopted instead of the SAP Enterprise Portal, based on the
determination that all currently planned SAP functionality could be
presented using the ITS technology. This decision was based on improved
understanding of the requirements and previous analyses of ITS.
On the basis of these analyses and the Chief System Architect‘s
recommendation, the program office subsequently stopped work on SAP
Enterprise Portal design and configuration efforts and, in March 2007,
the program reported that the SAP Internet Transaction Server would be
used for Release 5/Drop A2 instead of the SAP Enterprise Portal. While
this decision was expected to have some near-term schedule impact
because much of the completed work for A2 had been based on the planned
use of SAP Enterprise Portal, the program office reports that these
impacts are offset by the cost advantages of other ACE releases already
using the Internet Transaction Server technology.
However, in March 2007, program officials identified a risk of
inadequate response time for the Internet Transaction Server”thus
negatively impacting user productivity”and that there was high
probability of significant cost and schedule impacts. Actions are
underway to mitigate the risk through performance modeling and test
planning.
Neither the fiscal year 2007 expenditure plan nor the quarterly reports
to Congress disclose this COTS product change, its impact on release
schedules and cost estimates, or risk to future system performance.
Objective 3: Observations:
Risks Not Being Effectively Managed:
Observation 3: All program risks are not being effectively managed.
Risk management is a continuous, forward-looking process that is
intended to either prevent program cost, schedule, and performance
problems from occurring or to minimize the impact if they occur.
According to relevant guidance and best practices, effective risk
management involves proactively identifying, assessing, and disclosing
risks; defining and implementing cost-effective strategies for
mitigating these risks; and measuring and disclosing progress in doing
so. To its credit, the program office has developed a process guide and
implemented an automated tool (database) for managing ACE risks in
accordance with relevant guidance and best practices. Among other
things, the database contains the description, level (high, medium, or
low), and mitigation strategy (including start and end dates, exit
criteria, and implementation status) for each risk.
However, the completeness and quality of the information on each of the
risks in the risk database[Footnote53] vary. For example,
* many risks were missing information on the status of efforts to
implement the mitigation strategy and:
* many risks (18) were missing criteria for completing mitigation
steps, clear descriptions of what the risk entailed, and start and end
dates for planned mitigation activities.
Because of such database limitations, we could not determine the status
of and mitigation progress on 17 risks. Moreover, these database
limitations were reflected in the documentation used at key program
events, such as PMRs. This means that the program does not have the
risk-related information that it needs to inform its program decisions
and to reduce the chances of potential problems becoming actual
problems.
Program officials, including the official responsible for risk
management, stated that risk management is immature and needs to be
strengthened. The reasons they gave for these risk management
weaknesses are due to:
* all staff not being trained on how to use the tool (last training was
provided in 2003, and the since then a number of people have joined the
program);
* the tool is unique to the ACE program and thus no CBP guidance exists
on its use); and:
* each ACE group addresses risk differently in its weekly meetings.
To improve ACE risk management, program officials told us that they
are:
* establishing a group to ensure the quality and completeness of the
database;
* holding regular group meetings with contract staff and team leads to
discuss risks and their impacts; and:
* conducting risk management training.
If implemented effectively, such steps should result in more meaningful
information about program risks that can be useful to DHS in managing
the program and to Congress in overseeing it. To date, however, ACE
program risks have not been communicated to oversight organizations
through the 2007 expenditure plan or recent quarterly reports to the
House and Senate Appropriations Committees.
Conclusions:
Over the past 7 years, CBP and DHS have worked to fulfill legislatively
mandated annual expenditure plan requirements and to implement dozens
of our recommendations related to these plans and management of the
program. Among other things, these requirements and recommendations
have promoted effective program management and accountability for
performance and results. As a result of these years of efforts, the ACE
program is better positioned today for delivering promised capabilities
and benefits than it has been in the past.
Nevertheless, key program management practices relating to, for
example, human capital management, requirements management, and risk
management continue to remain a challenge, and other management areas,
such as information security and architecture alignment, continue to
require attention. As a result, avoiding major program schedule delays
and cost overruns remains a challenge as more of each appear to be on
the horizon.
To further improve ACE management and minimize its exposure to risk, it
is important for CBP and DHS to remain vigilant in their efforts to
satisfy ACE legislative requirements and to fully implement our prior
recommendations. Moreover, it is important that they keep the Congress
fully informed on where the program stands and what changes are planned
to address emerging cost overruns and schedule delays.
Recommendations for Executive Action:
To further strengthen ACE management and promote accountability for ACE
performance and results, we are making the following recommendation to
the Secretary of Homeland Security to direct the CBP Commissioner to
ensure that future quarterly reports to the House and Senate
Appropriations Committees disclose:
(1)the risks and associated mitigation strategies of not having fully
satisfied the expenditure plan legislative conditions and not having
completed implementation of all our prior recommendations;
(2)the status and impacts on the program‘s estimated cost and schedule
and lessons learned from ongoing efforts to redefine requirements and
to implement a different COTS product than originally selected; and:
(3)the program‘s plans and actions for improving ACE risk management
and its current inventory of program risks, including their associated
mitigation strategies and the status of the strategies‘ implementation.
Agency Comments:
In oral comments on a draft of this briefing, DHS and CBP officials
agreed with our conclusions and recommendations, and provided
clarifying information and technical comments that we incorporated in
the briefing, as appropriate.
Attachment 1:
Scope and Methodology:
To accomplish our objectives, we analyzed the ACE fiscal year 2007
expenditure plan and supporting documentation, and compared them to
relevant federal requirements and guidance, applicable best practices,
and our prior recommendations. We also interviewed DHS and CBP
officials and ACE program contractors. In particular, we reviewed
* DHS and CBP investment management practices, using OMB A-11, part 7;
* DHS and CBP certification activities for ensuring ACE compliance with
the DHS enterprise architecture;
* DHS and CBP acquisition management efforts, using SEI‘s SA-CMM;
* CBP cost estimating program and cost estimates, using SEI‘s
institutional and project-specific estimating guidelines;[Footnote 54]
* independent verification and validation (IV&V) activities using the
Institute of Electrical and Electronics Engineers standard for software
verification and validation;[Footnote 55]
* CBP actions to coordinate ACE with related programs;
* CBP‘s reorganization documentation, including the organizational
charts and roles and responsibilities matrix;
* ACE‘s accountability framework; and:
* cost and schedule data and program commitments from program
management documentation.
For DHS-, CBP-, and contractor-provided data that we did not
substantiate, we have made appropriate attribution indicating the
data's source.
We conducted our work at CBP headquarters and contractor facilities in
the Washington, D.C., metropolitan area from December 2006 through July
2007 in accordance with generally accepted government auditing
standards.
Attachment 2:
Related GAO Products:
ACE Expenditure Plans:
Information Technology: Customs Has Made Progress on Automated
Commercial Environment System, but IT Faces Long-Standing Management
Challenges and New Risks. GAO-06-580. Washington, D.C.: May 31, 2006.
Information Technology: Customs Automated Commercial Environment
Program Progressing, but Need for Management Improvements Continues.
GAO-05-267. Washington, D.C.: March 14, 2005.
Information Technology: Early Releases of Customs Trade System
Operating, but Pattern of Cost and Schedule Problems Needs to Be
Addressed. GAO-04-719. Washington, D.C.: May 14, 2004.
Customs Service Modernization: Automated Commercial Environment
Progressing, but Further Acquisition Management Improvements Needed.
GAO-03-406. Washington, D.C.: February 28, 2003.
Customs Service Modernization: Third Expenditure Plan Meets Legislative
Conditions, but Cost Estimating Improvements Needed. GAO-02-908.
Washington, D.C.: August 9, 2002.
[End of section]
Appendix II: Comments from the Department of Homeland Security:
U.S. Department of Homeland Security:
Washington, DC 20528:
[hyperlink, http://www.dhs.gov]
October 10, 2007:
Mr. Randolph C. Hite:
Director, Information Technology Architecture and Systems Issues:
U.S. Government Accountability Office:
441 G Street, NW:
Washington, DC 20548:
Dear Mr. Hite:
Re: Draft Report GAO-08-46, Information Technology: Improvements for
Acquisition of Customs Trade Processing System Continue, but Further
Efforts Needed to Avoid More Cost and Schedule Shortfalls (GAO Job Code
310634)
The Department of Homeland Security (DHS) appreciates the opportunity
to review and comment on the draft report referenced above. Consistent
with the Fiscal Year 2007 DHS appropriations act, DHS is to develop and
submit an expenditure plan for the Automated Commercial Environment
(ACE) that satisfies certain conditions, including being reviewed by
the U.S. Government Accountability Office (GAO). The report correctly
notes that the expenditure plan satisfies many of the legislative
conditions specified in the act and that the Department continues to
make progress.
GAO recognizes that we have implemented eight GAO recommendations made
during the last four years and that seven other recommendations made
during that time are in the process of being implemented. Department
and U.S. Customs and Border Protection (CBP) officials are committed to
fully addressing these remaining open recommendations regarding the ACE
accountability framework; measures and associated program management
metrics for determining success of improvements; minimizing the degree
of overlap and concurrency across ACE releases and mitigating
associated risks; meeting the legislative conditions regarding a
privacy impact assessment and ensuring architectural alignment;
implementing key human capital management practices; managing human
capital needs; and reporting progress implementing GAO recommendations
to Congress quarterly.
GAO recommends three actions involving program information disclosure
to the House and Senate Appropriations Committees designed to further
strengthen ACE management and accountability for ACE performance and
results. U.S. Customs and Border
Protection officials agree with the recommendations. The new
recommendations and CBP's planned corrective actions follow.
Recommendation 1: [Future quarterly reports disclose] the risks and
associated mitigation strategies of not having fully satisfied the
expenditure plan legislative conditions and not having completed
implementation of all prior GAO recommendations.
Response: GAO concluded that CBP satisfied four of six legislative
conditions but only partially satisfied the following two conditions:
(1) Meet the capital planning and investment control review
requirements established by the Office of Management and Budget (OMB),
including OMB Circular A-11, Preparation, Submission, and Execution of
the Budget, Part 7 [Planning, Budgeting, Acquisition and Management of
Capital Assets]. The risk of not completely satisfying this requirement
as part of the expenditure plan is minimal as CBP does meet OMB's
requirements, but must better demonstrate compliance in future
expenditure plan submissions. Full alignment to OMB's investment
management requirements can be demonstrated via the Office of
Management and Budget Exhibit 300 form [ACE Exhibit 300] that will be
attached to all future ACE Expenditure Plan submissions.
(2) Comply with the DHS enterprise architecture. DHS officials
determined in May 2007 that all required ACE products and technologies
were aligned with the DHS technical reference model and that ACE was
thus aligned with the DHS enterprise architecture. CBP agrees with GAO
that a compliance determination is not a one- time event but a series
of determinations that occurs throughout an investment's life cycle.
CBP will continue to address DHS architectural requirements as DHS
evolves its alignment methodology and criteria to meet GAO
expectations.
Recommendation 2: [Future quarterly reports disclose] the status and
impacts on the program's estimated cost and schedule and lessons
learned from ongoing efforts to redefine requirements and to implement
a different commercial off-the-shelf product than originally selected.
Response: ACE program officials intend to disclose this information in
future quarterly reports.
Recommendation 3: Future quarterly reports disclose] the program's
plans and actions for improving ACE risk management and its current
inventory of program risks, including their associated mitigation
strategies and the status of the strategies' implementation.
Response: Officials responsible for ACE plan to strengthen risk
management by:
(1) Undertaking a new round of risk identification efforts to include
the appropriate contractor technical and management personnel as well
as government personnel.
The first session was held on September 14, 2007. After these
identification sessions, the list of risks will be analyzed and
prioritized. A response strategy will be developed for each risk.
(2) The risks will be categorized and linked to the 19 risk categories
in the OMB 300 document for information technology programs. This
effort will ensure that the critical areas of risk are covered.
(3) Reports from the risk management software will be made available to
the appropriate oversight personnel. The reports will include the
mitigation strategy and status of its implementation.
The foregoing actions should enable CBP to ensure that future
Congressional reports provide complete and current information
regarding program risks and attendant mitigation strategies, as well as
the status of efforts to mitigate these risks.
Sincerely,
Signed by:
Steven J. Pecinovsky:
Director:
Departmental GAO/OIG Liaison Office:
[End of section]
Appendix III: Contact and Staff Acknowledgments:
GAO Contact:
Randolph C. Hite, (202) 512-3459:
Staff Acknowledgments:
In addition to the person named above, Daniel Castro, Dawn Day, Neil
Doherty, Nancy Glover, Paula Moore, Jamelyn Payan, Nik Rapelje, and
Karen Talley made key contributions to this report.
[End of section]
Footnotes:
[1] Pub. L. No. 109-295 (Oct. 4, 2006).
[2] Two related open recommendations have been combined.
[3] We did not evaluate the compliance of the ACE program with respect
to the Federal Acquisition Regulation or OMB directives, but we did
evaluate its compliance with established best practices models that
incorporate IT investment requirements for federal agencies.
[4] This recommendation has multiple conditions, of which three are
completed and two are in progress. A sixth condition of this
recommendation--that the ACE accountability framework clearly and
unambiguously delineate roles and responsibilities of the government
and the prime contractor--was previously completed. See Information
Technology: Customs Has Made Progress on Automated Commercial
Environment System, but It Faces Long-Standing Management Challenges
and New Risks, GAO-06-580 (Washington, D.C.: May 31, 2006).
[5] 44 U.S.C. § 3501 note.
[6] The U.S. Customs and Border Protection (CBP), formerly the Bureau
of Customs and Border Protection, was formed in 2003 under the new
Department of Homeland Security from the former U.S. Customs Service
and other entities with border protection responsibilities.
[7] Pub. L. No. 109-295, (October 4, 2006).
[8] OMB Circular A-11 establishes policy for planning, budgeting,
acquisition, and management of federal capital assets.
[9] The purpose of the IRB is to integrate capital planning and
investment control, budgeting, acquisition, and management of
investments. It is also to ensure that spending on investments directly
supports and furthers the mission and that this spending provides
optimal benefits and capabilities to stakeholders and customers.
[10] Two related open recommendations have been combined.
[11] 19 U.S.C. Section 1411.
[12] This partnership was formerly known as the e-Customs partnership.
It includes Lockheed Martin, Bearing Point, Sandler and Travis,
Computer Sciences Corporation, and a number of small businesses.
[13] CBP national account managers work with the largest importers to
ensure their compliance with trade laws.
[14] Brokers obtain licenses from CBP to conduct business on behalf of
the importers by filling out paperwork and obtaining a bond; carriers
are individuals or organizations engaged in transporting goods for
hire.
[15] Manifests are lists of passengers or invoices of cargo for a
vehicle, such as a truck, ship, or plane.
[16] Systems Applications and Products (SAP) is a commercial enterprise
resource planning software that has multiple modules, each performing
separate but integrated business functions. ACE will use SAP to support
many of its business processes and functions. In addition, the CBP‘s
Modernization Office is using SAP as part of a joint project with its
Office of Finance to support financial management, procurement,
property management, cost accounting, and general ledger processes.
[17] The multimodal manifest involves the processing and tracking of
cargo as it transfers between different modes of transportation, for
example, cargo arrives by ship, is transferred to a truck, and then is
loaded onto an airplane.
[18] An import activity summary statement is a summary of an importer‘s
shipment activities over a specific period of time that is transmitted
electronically to CBP on a periodic basis by importers and brokers.
[19] These accounts include importers, brokers, carriers, authorized
service providers, and other members of the trade community who utilize
ACE.
[20] OMB Circular A-11, part 7 establishes policy for planning,
budgeting, acquisition, and management of federal capital assets.
[21] EVM is a management tool for measuring progress and is both an
industry accepted practice and an OMB requirement.
[22] Guide for the Security Certification and Accreditation of Federal
Information Systems, NIST Special Publication 800-37. NIST,
Gaithersburg, MD, May 2004.
[23] A technical reference model is list of approved IT industry
standards, hardware, and software products that ensures that IT
solutions developed by individual programs (such as ACE) are consistent
within DHS as a whole.
[24] For this condition, we did not evaluate the compliance of the ACE
program with respect to the Federal Acquisition Regulation, OMB
directives, or other governmentwide requirements.
[25] See, for example, the Clinger-Cohen Act of 1996 (P.L. No. 104-106,
40 U.S.C. §§11101 through §§11704) and OMB Circular A-130.
[26] GAO-06-580; GAO-05-267. As with our prior reviews of ACE
expenditure plans, the evaluation does not include compliance with
federal acquisition regulations or other federal rules and requirements
beyond those encompassed by SEI‘s Capability Maturity Models.
[27] The SA-CMM® is consistent with the acquisition guidelines and
systems acquisition management practices of the federal government, and
provides a management framework that defines acquisition practices for
such process areas as acquisition planning, solicitation, requirements
development and management, project management, contract tracking and
oversight, and evaluation.
[28] ACE‘s level 2 rating indicated that CBP had instituted basic
acquisition management processes and practices consistent with the
acquisition guidelines and management practices of the federal
government in the following areas: acquisition planning, solicitation,
requirements development and management, project management, contract
tracking and oversight, and evaluation.
[29] Level 3 capability is more advanced than level 2 and indicates
that acquisition management processes have been defined throughout the
organization.
[30] The program office refers to these plans, processes, and
procedures as assets.
[31] GAO-06-580.
[32] GAO-06-580.
[33] Quarterly reports should be received by Congress approximately 60
days after the end of the quarter.
[34] GAO-06-580.
[35] GAO-06-580.
[36] This is a combination of two prior recommendations. From GAO-05-
267, "Define and implement an ACE accountability framework that
—ensures use of criteria for exiting key readiness milestones that
adequately consider indicators of system maturity, such as severity of
open defects“ and from GAO-06-580, ’Document key milestone decisions in
a way that reflects the risks associated with proceeding with
unresolved severe defects and provides for mitigating these risks."
[37] GAO-06-580.
[38] GAO-06-580.
[39] GAO-04-719.
[40] GAO-06-580.
[41] GAO-06-580.
[42] See, for example, models developed by the Carnegie Mellon
University SEI, Checklists and Criteria for Evaluating the Cost and
Schedule Estimating Capabilities of Software Organizations, CMU/SEI-95-
SR-005 (Pittsburgh, Pa.: Carnegie Mellon University, 1995) and A
Manager's Checklist for Validating Software Cost and Schedule
Estimates, CMU/SEI-95-SR-004 (Pittsburgh, Pa.: Carnegie Mellon
University,1995).
[43] GAO-04-719, GAO-05-267, GAO-06-580.
[44] GAO-06-580.
[45] CBP applications include IT systems that provide tools and
information to help front-line officers ensure the security of our
nation. This includes applications for the United States Visitor and
Immigrant Status Indicator Technology (US-VISIT), Container Security
Initiative and Automated Targeting System.
[46] GAO-06-580.
[47] 44 U.S.C. § 3501 note.
[48] GAO-06-580.
[49] OMB, Guidance for Implementing the Privacy Provisions of the
EGovernment Act of 2002, OMB M-03-22 (Sept. 26, 2003).
[50] GAO-06-580.
[51] As revised by OPM in 2005, this framework reflects guidance from
the collaboration of OMB, OPM, and GAO.
[52] The reports are due to Congress approximately 60 days after the
completion of a fiscal quarter. ACE quarterly reports are due to DHS
approximately 30 days after the end of the quarter, and then DHS has 30
days to review the report and submit it to Congress.
[53] As of May 23, 2007 the risk database contained 46 risks.
[54] SEI's Institutional and project-specific estimating guidelines are
defined in Robert E. Park, Checklists and Criteria for Evaluating the
Cost and Schedule Estimating Capabilities of Software Organizations,
CMU/SEI-95-SR-005 (Pittsburgh, Pa.: Carnegie Mellon University Software
Engineering Institute, 1995) and A Manager's Checklist for Validating
Software Cost and Schedule Estimates, CMU/SEI-95-SR-004 (Pittsburgh,
Pa: 1995), respectively.
[55] Institute of Electrical and Electronics Engineers (IEEE) Computer
Society, Standard for Software Verification and Validation 1012-1998
(June 8, 2005).
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "Subscribe to Updates."
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office:
441 G Street NW, Room LM:
Washington, D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Gloria Jarmon, Managing Director, JarmonG@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, D.C. 20548:
Public Affairs:
Chuck Young, Managing Director, youngc1@gao.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, D.C. 20548: