Information Technology

Homeland Security Information Network Needs to Be Better Coordinated with Key State and Local Initiatives Gao ID: GAO-07-822T May 10, 2007

The Department of Homeland Security (DHS) is responsible for coordinating the federal government's homeland security communications with all levels of government, the private sector, and the public. In support of its mission, the department has deployed a Web-based information-sharing application--the Homeland Security Information Network (HSIN)--and operates at least 11 homeland security networks. The department reported that in fiscal years 2005 and 2006, these investments cost $611.8 million to develop, operate, and maintain. In view of the significance of information sharing for protecting homeland security, GAO was asked to testify on the department's efforts to coordinate its development and use of HSIN with two key state and local initiatives under the Regional Information Sharing Systems--a nationwide information-sharing program operated and managed by state and local officials. This testimony is based on a recent GAO report that addresses, among other things, DHS's homeland security networks and HSIN. In performing the work for that report, GAO analyzed documentation on HSIN and state and local initiatives, compared it against the requirements of the Homeland Security Act and federal guidance and best practices, and interviewed DHS officials and state and local officials.

In developing HSIN, its key homeland security information-sharing application, DHS did not work effectively with two key Regional Information Sharing Systems program initiatives. This program, which is operated and managed by state and local officials nationwide, provides services to law enforcement, emergency responders, and other public safety officials. However, DHS did not coordinate with the program to fully develop joint strategies and policies, procedures, and other means to operate across agency boundaries, which are key practices for effective coordination and collaboration and a means to enhance information sharing and avoid duplication of effort. For example, DHS did not engage the program in ongoing dialogue to determine how resources could be leveraged to meet mutual needs. A major factor contributing to this limited coordination was that the department rushed to deploy HSIN after the events of September 11, 2001. In its haste, it did not develop a comprehensive inventory of key state and local information-sharing initiatives, and it did not achieve a full understanding of the relevance of the Regional Information Sharing Systems program to homeland security information sharing. As a result, DHS faces the risk that effective information sharing is not occurring and that HSIN may be duplicating state and local capabilities. Specifically, both HSIN and one of the Regional Information Sharing Systems initiatives target similar user groups, such as emergency management agencies, and all have similar features, such as electronic bulletin boards, "chat" tools, and document libraries. The department has efforts planned and under way to improve coordination and collaboration, including developing an integration strategy to allow other applications and networks to connect with HSIN, so that organizations can continue to use their preferred information-sharing applications and networks. In addition, it has agreed to implement recommendations made by GAO to take specific steps to (1) improve coordination, including developing a comprehensive inventory of state and local initiatives, and (2) ensure that similar coordination and duplication issues do not arise with other federal homeland security networks, systems, and applications. Until DHS completes these efforts, including developing an inventory of key state and local initiatives and fully implementing and institutionalizing key practices for effective coordination and collaboration, the department will continue to be at risk that information is not being effectively shared and that the department is duplicating state and local capabilities.



GAO-07-822T, Information Technology: Homeland Security Information Network Needs to Be Better Coordinated with Key State and Local Initiatives This is the accessible text file for GAO report number GAO-07-822T entitled 'Information Technology: Homeland Security Information Network Needs to Be Better Coordinated with Key State and Local Initiatives' which was released on May 10, 2007. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. United States Government Accountability Office: GAO: Testimony: Before the Subcommittee on Intelligence, Information Sharing and Terrorism Risk Assessment, Committee on Homeland Security, House of Representatives: For Release on Delivery: Expected at 10 a.m. EDT Thursday, May 10, 2007: Information Technology: Homeland Security Information Network Needs to Be Better Coordinated with Key State and Local Initiatives: Statement of David A. Powner, Director: Information Technology Management Issues: GAO-07-822T: GAO Highlights: Highlights of GAO-07-822T, a report to Subcommittee on Intelligence, Information Sharing and Terrorism Risk Assessment, Homeland Security Committee, House of Representatives Why GAO Did This Study: The Department of Homeland Security (DHS) is responsible for coordinating the federal government‘s homeland security communications with all levels of government, the private sector, and the public. In support of its mission, the department has deployed a Web-based information-sharing application”the Homeland Security Information Network (HSIN)”and operates at least 11 homeland security networks. The department reported that in fiscal years 2005 and 2006, these investments cost $611.8 million to develop, operate, and maintain. In view of the significance of information sharing for protecting homeland security, GAO was asked to testify on the department‘s efforts to coordinate its development and use of HSIN with two key state and local initiatives under the Regional Information Sharing Systems”a nationwide information-sharing program operated and managed by state and local officials. This testimony is based on a recent GAO report that addresses, among other things, DHS‘s homeland security networks and HSIN. In performing the work for that report, GAO analyzed documentation on HSIN and state and local initiatives, compared it against the requirements of the Homeland Security Act and federal guidance and best practices, and interviewed DHS officials and state and local officials. What GAO Found: In developing HSIN, its key homeland security information-sharing application, DHS did not work effectively with two key Regional Information Sharing Systems program initiatives. This program, which is operated and managed by state and local officials nationwide, provides services to law enforcement, emergency responders, and other public safety officials. However, DHS did not coordinate with the program to fully develop joint strategies and policies, procedures, and other means to operate across agency boundaries, which are key practices for effective coordination and collaboration and a means to enhance information sharing and avoid duplication of effort. For example, DHS did not engage the program in ongoing dialogue to determine how resources could be leveraged to meet mutual needs. A major factor contributing to this limited coordination was that the department rushed to deploy HSIN after the events of September 11, 2001. In its haste, it did not develop a comprehensive inventory of key state and local information-sharing initiatives, and it did not achieve a full understanding of the relevance of the Regional Information Sharing Systems program to homeland security information sharing. As a result, DHS faces the risk that effective information sharing is not occurring and that HSIN may be duplicating state and local capabilities. Specifically, both HSIN and one of the Regional Information Sharing Systems initiatives target similar user groups, such as emergency management agencies, and all have similar features, such as electronic bulletin boards, ’chat“ tools, and document libraries. The department has efforts planned and under way to improve coordination and collaboration, including developing an integration strategy to allow other applications and networks to connect with HSIN, so that organizations can continue to use their preferred information- sharing applications and networks. In addition, it has agreed to implement recommendations made by GAO to take specific steps to (1) improve coordination, including developing a comprehensive inventory of state and local initiatives, and (2) ensure that similar coordination and duplication issues do not arise with other federal homeland security networks, systems, and applications. Until DHS completes these efforts, including developing an inventory of key state and local initiatives and fully implementing and institutionalizing key practices for effective coordination and collaboration, the department will continue to be at risk that information is not being effectively shared and that the department is duplicating state and local capabilities. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-822T]. To view the full product, including the scope and methodology, click on the link above. For more information, contact David Powner at (202) 512- 9286 or pownerd@gao.gov. [End of section] Madame Chair and Members of the Subcommittee: I appreciate the opportunity to be here today to discuss challenges facing the Department of Homeland Security (DHS) in coordinating efforts on its Homeland Security Information Network (HSIN) with state and local governments and other parties involved in the mission of keeping our nation secure. As you know, DHS is responsible for coordinating the federal government's homeland security communications with all levels of government--including state and local. In support of this mission, the department developed HSIN as part of its goal to establish an infrastructure for sharing homeland security information.[Footnote 1] Besides HSIN, an Internet-based application, DHS also operates at least 11 other networks in support of its homeland security mission. The department reported that in fiscal years 2005 and 2006, these investments cost $611.8 million to develop, operate, and maintain. As agreed, in my remarks today I will discuss the department's efforts to coordinate its development and use of HSIN with key state and local information-sharing initiatives. These remarks are based on our recent report on homeland security networks and applications.[Footnote 2] That report focused on two key initiatives under the Regional Information Sharing Systems program. This nationwide program, operated and managed by state and local officials, provides services (including information sharing) to support law enforcement and criminal justice agencies. Its information-sharing efforts also include emergency responders and public safety officials. In performing the work for the report, we analyzed descriptive data (e.g., type of network, estimated costs) on major networks and Internet- based systems identified by DHS as supporting its homeland security mission, including information sharing. We also reviewed documentation on HSIN and state and local initiatives; compared it against the requirements of the Homeland Security Act, federal guidance, and related best practices; and interviewed DHS officials and state and local officials. This work was performed in accordance with generally accepted government auditing standards. Results in Brief: In developing HSIN, DHS did not effectively coordinate with key state and local initiatives that are part of the Regional Information Sharing Systems program. Specifically, the department did not fully develop joint strategies and coordinated policies, procedures, and other means to operate across agency boundaries and meet mutual needs, which are key practices for effective coordination and collaboration and are a means to enhance information sharing and avoid duplication of effort. For example, DHS did not engage the program in ongoing dialogue to determine how resources could be leveraged to meet mutual needs or work through technical issues and differences in what each organization considers to be terrorism information. A major factor contributing to the limited coordination was that after September 11, 2001, the department expedited its schedule for deploying HSIN. In its haste, it did not develop a comprehensive inventory of key state and local information-sharing initiatives. Consequently, DHS faces the risk that effective information sharing is not occurring. It also faces the risk that the HSIN system may be duplicating state and local capabilities. Specifically, both HSIN and one of the key initiatives target similar user groups, such as emergency management agencies, and all have similar features, such as Web portals,[Footnote 3] electronic bulletin boards, "chat" tools, and document libraries. The department has efforts planned and under way to improve coordination and collaboration. For example, it is forming an HSIN Mission Coordinating Committee and an HSIN Advisory Committee to help ensure that HSIN meets the information-sharing needs of DHS and other users. However, these activities have either just begun or are being planned, with implementation milestones yet to be defined. In addition to the planned improvements, DHS has agreed to implement our recommendations to take steps to ensure that HSIN is effectively coordinated with key state and local government information-sharing initiatives, which include identifying and inventorying such initiatives. We also recommended that DHS determine whether there are coordination and duplication issues with its other homeland security networks and associated systems and applications. Until DHS completes these activities, including developing an inventory of key state and local initiatives, and fully implementing and institutionalizing key practices and guidance for effective coordination and collaboration, it will continue to be at risk of not effectively sharing information with other key state and local information initiatives and duplicating state and local capabilities. Background: DHS is the lead department involved in securing our nation's homeland. Its mission includes, among other things, leading the unified national effort to secure the United States, preventing and deterring terrorist attacks, and protecting against and responding to threats and hazards to the nation. As part of its mission and as required by the Homeland Security Act of 2002,[Footnote 4] the department is also responsible for coordinating efforts across all levels of government and throughout the nation, including with federal, state, tribal, local, and private sector homeland security resources. As we have previously reported, DHS relies extensively on information technology (IT), such as networks and associated system applications, to carry out its mission.[Footnote 5] Specifically, in our recent report, we reported that the department identified 11 major networks it uses to support its homeland security functions, including sharing information with state and local governments.[Footnote 6] Examples of such DHS networks include the Homeland Secure Data Network, the Immigration and Customs Enforcement Network, and the Customs and Border Protection Network. In addition, the department has deployed HSIN, a homeland security information-sharing application that operates on the public Internet. As shown in table 1, of the 11 networks, 1 is categorized as Top Secret, 1 is Secret, 8 are Sensitive but Unclassified, and 1 is unclassified. HSIN is considered Sensitive but Unclassified. Table 1: DHS Information-Sharing Networks and HSIN Application: Name: C Local Area Network (C-LAN); Categories: Top Secret; Users outside DHS: --; Reported cost per fiscal year (dollars in millions): 2005: (a); Reported cost per fiscal year (dollars in millions): 2006: (a); Reported cost per fiscal year (dollars in millions): Total: --. Name: Homeland Secure Data Network (HSDN); Categories: Secret; Users outside DHS: Other federal, state, local; Reported cost per fiscal year (dollars in millions): 2005: $46.2; Reported cost per fiscal year (dollars in millions): 2006: $32.6; Reported cost per fiscal year (dollars in millions): Total: $78.8. Name: Coast Guard Data Network Plus (CGDN+); Categories: Sensitive but Unclassified; Users outside DHS: Other federal; Reported cost per fiscal year (dollars in millions): 2005: 15.0; Reported cost per fiscal year (dollars in millions): 2006: 15.0; Reported cost per fiscal year (dollars in millions): Total: 30.0. Name: Critical Infrastructure Warning Information Network (CWIN); Categories: Sensitive but Unclassified; Users outside DHS: Other federal, state; Reported cost per fiscal year (dollars in millions): 2005: 12.1; Reported cost per fiscal year (dollars in millions): 2006: 12.0; Reported cost per fiscal year (dollars in millions): Total: 24.1. Name: Customs and Border Protection (CBP) Network; Categories: Sensitive but Unclassified; Users outside DHS: --; Reported cost per fiscal year (dollars in millions): 2005: 58.7; Reported cost per fiscal year (dollars in millions): 2006: 63.0; Reported cost per fiscal year (dollars in millions): Total: 121.7. Name: DHS Core Network (DCN); Categories: Sensitive but Unclassified; Users outside DHS: --; Reported cost per fiscal year (dollars in millions): 2005: 13.4; Reported cost per fiscal year (dollars in millions): 2006: 10.3; Reported cost per fiscal year (dollars in millions): Total: 23.7. Name: Homeland Security Information Network (HSIN); Categories: Sensitive but Unclassified; Users outside DHS: Other federal, state, local; Reported cost per fiscal year (dollars in millions): 2005: 11.9; Reported cost per fiscal year (dollars in millions): 2006: 20.5; Reported cost per fiscal year (dollars in millions): Total: 32.4. Name: Immigration and Customs Enforcement Network (ICENet); Categories: Sensitive but Unclassified; Users outside DHS: Other federal, state, local; Reported cost per fiscal year (dollars in millions): 2005: 14.4; Reported cost per fiscal year (dollars in millions): 2006: 19.2; Reported cost per fiscal year (dollars in millions): Total: 33.6. Name: ONENet; Categories: Sensitive but Unclassified; Users outside DHS: --; Reported cost per fiscal year (dollars in millions): 2005: 34.6; Reported cost per fiscal year (dollars in millions): 2006: 40.0; Reported cost per fiscal year (dollars in millions): Total: 74.6. Name: Secret Service Wide Area Network (WAN); Categories: Sensitive but Unclassified; Users outside DHS: --; Reported cost per fiscal year (dollars in millions): 2005: 2.8; Reported cost per fiscal year (dollars in millions): 2006: 3.1; Reported cost per fiscal year (dollars in millions): Total: 5.9. Name: Transportation Security Administration Network (TSANet); Categories: Sensitive but Unclassified; Users outside DHS: Other federal; Reported cost per fiscal year (dollars in millions): 2005: 70.0; Reported cost per fiscal year (dollars in millions): 2006: 105.0; Reported cost per fiscal year (dollars in millions): Total: 175.0. Name: Federal Emergency Management Agency (FEMA) Switched Network; Categories: Unclassified; Users outside DHS: --; Reported cost per fiscal year (dollars in millions): 2005: 6.0; Reported cost per fiscal year (dollars in millions): 2006: 6.0; Reported cost per fiscal year (dollars in millions): Total: 12.0. Name: Total[A]; Categories: [Empty]; Users outside DHS: [Empty]; Reported cost per fiscal year (dollars in millions): 2005: $285.1; Reported cost per fiscal year (dollars in millions): 2006: $326.7; Reported cost per fiscal year (dollars in millions): Total: $611.8. Source: GAO analysis of agency data. [A] Costs for C-LAN are not included, as the information is not publicly available. [End of table] As the table shows, some of these networks are used solely within DHS, while others are also used by other federal agencies, as well as state and local governments. In addition, the total cost to develop, operate, and maintain these networks and HSIN in fiscal years 2005 and 2006, as reported by DHS, was $611.8 million. Of this total, the networks accounted for the vast majority of the cost: $579.4 million. DHS Established HSIN to Provide Information-Sharing Capabilities: DHS considers HSIN to be its primary communication application for transmitting sensitive but unclassified information. According to DHS, this network is an encrypted, unclassified, Web-based communications application that serves as DHS's primary nationwide information-sharing and collaboration tool. It is intended to offer both real-time chat and instant messaging capability, as well as a document library that contains reports from multiple federal, state, and local sources. Available through the application are suspicious incident and pre- incident information and analysis of terrorist threats, tactics, and weapons. The application is managed within DHS's Office of Operations Coordination. HSIN includes over 35 communities of interest, such as emergency management, law enforcement, counterterrorism, individual states, and private sector communities. Each community of interest has Web pages that are tailored for the community and contain general and community- specific news articles, links, and contact information. The community Web pages also provide access to other resources, such as the following: * Document library. Users can search the entire document library within the communities they have access to. * Discussion threads. HSIN has a discussion thread (or bulletin board) feature that allows users to post information that other users should know about and post requests for information that other users might have. Community administrators can also post and track tasks assigned to users during an incident. * Chat tool. HSIN's chat tool, known as Jabber, is similar to other instant message and chat tools--with the addition of security. Users can customize lists of their coworkers and send messages individually or set up chat rooms for more users. Other features include chat logs (which allow users to review conversations), timestamps, and user profiles. States and Local Governments Have Also Established Similar Initiatives: State and local governments have similar IT initiatives to carry out their homeland security missions, including sharing information. A key state and local-based initiative is the Regional Information Sharing Systems (RISS) program. The RISS program helps state and local jurisdictions to, among other things, share information in support of their homeland security missions. This nationwide program, operated and managed by state and local officials, was established in 1974 to address crime that operates across jurisdictional lines. The program consists of six regional information analysis centers that serve as regional hubs across the country. These centers offer services to RISS members in their regions, including information sharing and research, analytical products, case investigation support, funding, equipment loans, and training. Funding for the RISS program is administered through a grant from the Department of Justice. As part of its information-sharing efforts, the RISS program operates two key initiatives (among others): the RISS Secure Intranet (RISSNET) and the Automated Trusted Information Exchange[Footnote 7] (RISS ATIX): * Created in 1996, RISSNET is intended as a secure network serving member law enforcement agencies throughout the United States and other countries. Through this network, RISS offers services such as secure e- mail, document libraries, intelligence databases, Web pages, bulletin boards, and a chat tool. * RISS ATIX offers services similar to those offered by RISSNET to agencies beyond the law enforcement community, including executives and officials from governmental and nongovernmental agencies and organizations that have public safety responsibilities. RISS ATIX is partitioned into 39 communities of interest, such as critical infrastructure, emergency management, public health, and government officials. Members of each community of interest contribute information to be made available within each community. According to RISS officials, the RISS ATIX application was developed in response to the events of September 11, 2001; it was initiated in 2002 as an application to provide tools for information sharing and collaboration among public safety stakeholders, such as first responders and schools. As of July 2006, RISS ATIX supported 1,922 users beyond the traditional users of RISSNET. RISS ATIX uses the technology of RISSNET to offer services through its Web pages. The pages are tailored for each community of interest and contain community-specific news articles, links, and contact information. The pages also provide access to the following features: * Document library. Participants can store and search relevant documents within their community of interest. * Bulletin board. The RISS ATIX bulletin board allows users to post timely threat information in discussion forums and to view and respond to posted information. Users can post documents, images, and information related to terrorism and homeland security, as well as receive DHS information, advisories, and warnings. According to RISS officials, the bulletin boards are monitored by a RISS moderator to relay any information that might be useful for other communities of interest. * Chat tool. ATIXLive is an online, real-time, collaborative communications information-sharing tool for the exchange of information by community members. Through this tool, users can post timely threat information and view and respond to messages posted. * Secure e-mail. RISS ATIX participants have access to e-mail that can be used to provide alerts and related information. According to RISS, this is done in a secure environment. GAO Has Designated Information Sharing as High Risk: The need to improve information sharing as part of a national effort to improve homeland security and preparedness has been widely recognized, not only to improve our ability to anticipate and respond to threats and emergencies, but to avoid unnecessary expenditure of scarce resources. In January 2005,[Footnote 8] and more recently in January 2007,[Footnote 9] we identified establishing appropriate and effective information-sharing mechanisms to improve homeland security as a high- risk area. The Office of Management and Budget (OMB) has also issued guidance that stresses the importance of information sharing and avoiding duplication of effort.[Footnote 10] Nonetheless, although this area has received increased attention, the federal government faces formidable challenges in sharing information among stakeholders in an appropriate and timely manner. As we concluded in October 2005, agencies can help address these challenges by adopting and implementing key practices, related to OMB's guidance, to improve collaboration, such as establishing joint strategies and addressing needs by leveraging resources and developing compatible policies, procedures, and other means to operate across agency boundaries.[Footnote 11] Based on our research and experience, these practices are also relevant for collaboration between federal agencies and other levels of government (e.g., state, local). Until these coordination and collaboration practices are implemented, agencies face the risk that effective information sharing will not occur. Congress and the Administration have made several efforts to address the challenges associated with information sharing. In particular, as we reported in March 2006, the President initiated an effort to establish an Information Sharing Environment that is to combine policies, procedures, and networks and other technologies that link people, systems, and information among all appropriate federal, state, local, and tribal entities and the private sector.[Footnote 12] In November 2006, in response to congressional direction, the Administration issued a plan for implementing this environment and described actions that the federal government intends--in coordination with state, local, tribal, private sector, and foreign partners--to carry out over the next 3 years. Efforts to Coordinate HSIN with Key State and Local Information-Sharing Initiatives Have Been Limited: DHS did not fully adhere to the previously mentioned key practices in coordinating its efforts on HSIN with key state and local information- sharing initiatives. The department's limited use of these practices is attributable to a number of factors: in particular, after the events of September 11, 2001, the department expedited its schedule to deploy HSIN capabilities, and in doing so, it did not develop an inventory of key state and local information initiatives. Until the department fully implements key coordination and collaboration practices and guidance, it faces, among other things, the risk that effective information sharing is not occurring. DHS has efforts planned and under way to improve coordination and collaboration, including implementing the recommendations in our recent report.[Footnote 13] Key Practices Were Not Effectively Implemented: In developing HSIN, DHS did not fully adhere to the practices related to OMB's guidance. First, although DHS officials met with RISS program officials to discuss exchanging terrorism-related documents, joint strategies for meeting mutual needs by leveraging resources have not been fully developed. DHS did not engage the RISS program to determine how resources could be leveraged to meet mutual needs. According to RISS program officials, they met with DHS twice (on September 25, 2003, and January 7, 2004) to demonstrate that their RISS ATIX application could be used by DHS for sharing homeland security information. However, communication from DHS on this topic stopped after these meetings, without explanation. According to DHS officials, they did not remember the meetings, which they attributed to the departure from DHS of the staff who had attended. In addition, although DHS initially pursued a limited strategy of exchanging selected terrorism-related documents with the RISS program, the strategy was impeded by technical issues and by differences in what each organization considers to be terrorism information. For example, the exchange of documents between HSIN and the RISS program stopped on August 1, 2006, because of technical problems with HSIN's upgrade to a new infrastructure. As of May 3, 2007, the exchange of terrorism- related documents had not yet resumed, according to HSIN's program manager. This official also stated that the program is currently working to fix the issue with the goal of having it resolved by June 2007. Finally, DHS has yet to fully develop coordination policies, procedures, and other means to operate across agency boundaries with the RISS program. DHS has not fully developed such means to operate with the RISS program and leverage its available technological resources. Although an operating agreement was established to govern the exchange of terrorism-related documents, according to RISS officials, it did not cover the full range of information available through the RISS program. DHS's Expedited Schedule Was Major Cause for Limited Coordination, Increasing the Risk of Ineffective Information Sharing and Duplication: The extent of DHS's adherence to key practices (and the resulting limited coordination) is attributable to DHS's expedited schedule to deploy an information-sharing application that could be used across the federal government in the wake of the September 11 attacks; in its haste, DHS did not develop a complete inventory of key state and local information initiatives. According to DHS officials, they still do not have a complete inventory of key state and local information-sharing initiatives. DHS's Office of Inspector General also reported that DHS developed HSIN in a rapid and ad hoc manner, and among other things, did not adequately identify existing federal, state, and local resources, such as RISSNET, that it could have leveraged.[Footnote 14] Further, DHS did not fully understand the RISS program. Specifically, DHS officials did not acknowledge the RISS program as a state and local based program with which to partner, but instead considered it to be one of many vendors providing a tool for information sharing. In addition, DHS officials believed that the RISS program was solely focused on law enforcement information and did not capture the broader terrorism-related or other information of interest to the department. Because of this limited coordination and collaboration, DHS is at increased risk that effective information sharing is not occurring. The department also faces the risk that it is developing and deploying capabilities on HSIN that duplicate those being established by state and local agencies. There is evidence that this has occurred with respect to the RISS program. Specifically: * HSIN and RISS ATIX currently target similar user groups. DHS and the RISS program are independently striving to make their applications available to user communities involved in the prevention of, response to, mitigation of, and recovery from terrorism and disasters across the country. For example, HSIN and RISS ATIX are being used and marketed for use at state fusion centers[Footnote 15] and other state organizations, such as emergency management agencies across the country. * HSIN and RISS applications have similar approaches for sharing information with their users. For example, on each application, users from a particular community--such as emergency management--have access to a portal or community area tailored to the user's information needs. The community-based portals have similar features focused on user communities. Both applications provide each community with the following features:[Footnote 16] - Web pages. Tailored for communities of interest (e.g., law enforcement, emergency management, critical infrastructure sectors), these pages contain general and community-specific news articles, links, and contact information. - Bulletin boards. Participants can post and discuss information. - Chat tool. Each community has its own online, real-time, interactive collaboration application. - Document library. Participants can store and search relevant documents. DHS Has Improvements Planned and Under Way, Including Implementing Our Recent Recommendations: According to DHS officials, including the HSIN program manager, the department has efforts planned and under way to improve coordination. For example, the department is in the process of developing an integration strategy that is to include enhancing HSIN so that other applications and networks can interact with it. This would promote integration by allowing other federal agencies and state and local governments to use their preferred applications and networks--such as RISSNET and RISS ATIX--while allowing DHS to continue to use HSIN. Other examples of improvements either begun or planned include the following: * The formation of an HSIN Mission Coordinating Committee, whose roles and responsibilities are to be defined in a management directive. It is expected to ensure that all HSIN users are coordinated in information- sharing relationships of mutual value. * The recent development of engagement, communications, and feedback strategies for better coordination and communication with HSIN, including, for example, enhancing user awareness of applicable HSIN contact points and changes to the system. * The reorganization of the HSIN program management office to help the department better meet user needs. According to the program manager, this reorganization has included the use of integrated process teams to better support DHS's operational mission priorities as well as the establishment of a strategic framework and implementation plan for meeting the office's key activities and vision. * The establishment of a HSIN Advisory Committee to advise the department on how the HSIN program can better meet user needs, examine DHS's processes for deploying HSIN to the states, assess state resources, and determine how HSIN can coordinate with these resources. In addition to these planned improvements, DHS has agreed to implement the recommendations in our recent report. Specifically, we recommended that the department ensure that HSIN is effectively coordinated with key state and local government information-sharing initiatives. We also recommended that this include (1) identifying and inventorying such initiatives to determine whether there are opportunities to improve information sharing and avoid duplication, (2) adopting and institutionalizing key practices related to OMB's guidance on enhancing and sustaining agency coordination and collaboration, and (3) ensuring that the department's coordination efforts are consistent with the Administration's recently issued Information Sharing Environment plan.[Footnote 17] In response to these recommendations, DHS described actions it was taking to implement them. (The full recommendations and DHS's written response to them are in report.) In closing, DHS has not effectively coordinated its primary information- sharing system with two key state and local initiatives. Largely because of the department's hasty approach to delivering needed information-sharing capabilities, it did not follow key coordination and collaboration practices and guidance or invest the time to inventory and fully understand how it could leverage state and local approaches. Consequently, the department faces the risk that effective information sharing is not occurring and that its HSIN application may be duplicating existing state and local capabilities. This also raises the issue of whether similar coordination and duplication issues exist with the other federal homeland security networks and associated systems and applications under the department's purview. DHS recognizes these risks and has improvements planned and under way to address them, including stated plans to implement our recommendations. These are positive steps and should help address shortfalls in the department's coordination practices on HSIN. However, these actions have either just begun or are planned, with milestones for implementation yet to be defined. Until all the key coordination and collaboration practices are fully implemented and institutionalized, DHS will continue to be at risk that the effectiveness of its information sharing is not where it needs to be to adequately protect the homeland and that its efforts are unnecessarily duplicating state and local initiatives. Madame Chair, this concludes my testimony today. I would be happy to answer any questions you or other members of the subcommittee may have. Contacts and Acknowledgements: If you have any questions concerning this testimony, please contact David Powner, Director, Information Technology Management Issues, at (202) 512-9286 or pownerd@gao.gov. Other individuals who made key contributions include Gary Mountjoy, Assistant Director, Barbara Collier; Joseph Cruz; Matthew Grote; and Lori Martinez. FOOTNOTES [1] The Homeland Security Act of 2002 directed DHS to establish communications to share homeland security information with federal agencies, state and local governments, and other specified groups. [2] GAO, Information Technology: Numerous Federal Networks Used to Support Homeland Security Need to Be Better Coordinated with Key State and Local Information Sharing Initiatives, GAO-07-455 (Washington, D.C.: Apr. 16, 2007). [3] A Web portal is generally a site that offers several resources or services, such as search engines, news articles, forums, and other tools. [4] Homeland Security Act of 2002, Pub. L. No. 107-296, 116 Stat. 2135 (Nov. 25, 2002). [5] See, for example, GAO, Information Technology: Major Federal Networks That Support Homeland Security Functions, GAO-04-375 (Washington, D.C.: Sept. 17, 2004) and Information Technology: DHS Needs to Fully Define and Implement Policies and Procedures for Effectively Managing Investments, GAO-07-424 (Washington, D.C.: April 27, 2007). [6] GAO-07-455. [7] Formerly called the Anti-Terrorism Information Exchange. [8] GAO, High-Risk Series: An Update, GAO-05-207 (Washington, D.C.: January 2005). [9] GAO, High-Risk Series: An Update, GAO-07-310 (Washington, D.C.: January 2007). [10] For example, Office of Management and Budget, Management of Federal Information Resources, Circular A-130 (Washington, D.C.: Nov. 30, 2000) and Preparation, Submission, and Execution of the Budget, Circular A-11 (Washington, D.C.: June 30, 2006). [11] GAO, Results-Oriented Government: Practices That Can Help Enhance and Sustain Collaboration among Federal Agencies, GAO-06-15 (Washington, D.C.: October 2005). [12] GAO, Information Sharing: The Federal Government Needs to Establish Policies and Processes for Sharing Terrorism-Related and Sensitive but Unclassified Information, GAO-06-385 (Washington, D.C.: March 2006). [13] GAO-07-455. [14] Department of Homeland Security Office of Inspector General, Office of Information Technology, HSIN Could Support Information Sharing More Effectively, DHS/OIG-06-38 (Washington, D.C.: June 2006). [15] A fusion center is defined as a "collaborative effort of two or more agencies that provide resources, expertise, and information to the center with the goal of maximizing their ability to detect, prevent, investigate, and respond to criminal and terrorist activity." [16] Beyond the collaboration tools listed, RISSNET also provides access to other law enforcement resources, such as analytical criminal data-visualization tools and criminal intelligence databases. [17] As mentioned earlier, this plan is aimed at establishing, in 3 years, the networks and other technologies that link people, systems, and information among all appropriate federal state, local, and tribal entities and the private sector. GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site (www.gao.gov). Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to www.gao.gov and select "Subscribe to Updates." Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000 TDD: (202) 512-2537 Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Gloria Jarmon, Managing Director, JarmonG@gao.gov (202) 512-4400 U.S. Government Accountability Office, 441 G Street NW, Room 7125 Washington, D.C. 20548: Public Affairs: Paul Anderson, Managing Director, AndersonP1@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.