Information Security
Homeland Security Needs to Enhance Effectiveness of Its Program
Gao ID: GAO-07-1003T June 20, 2007
To protect and mitigate threats and attacks against the United States, 22 federal agencies and organizations were merged to form the Department of Homeland Security (DHS) in 2002. One of the department's components, U.S. Customs and Border Protection (CBP), is responsible for securing the nation's borders. DHS and CBP rely on a variety of computerized information systems to support their operations and assets. GAO has reported for many years that poor information security is a widespread problem with potentially devastating consequences. In reports to Congress since 1997, GAO has identified information security as a governmentwide high-risk issue. In this testimony, GAO discusses DHS's information security program and computer security controls for key information systems. GAO based its testimony on agency, inspector general, and GAO issued and draft reports on DHS information security.
Shortcomings in DHS's information security program remain, although progress has been made. In 2005, GAO reported that DHS had not fully implemented a comprehensive, departmentwide information security program to protect the information and information systems that support its operations and assets. For example, the department did not have a complete inventory of its systems, and component agencies did not fully or effectively perform key program activities such as developing risk assessments, preparing security plans, testing and evaluating the effectiveness of security controls, completing remedial action plans, and developing and testing continuity of operations plans. GAO recommended that DHS take specific actions to address these problems. Since then, DHS has taken steps to improve its security program. In fiscal year 2006, it prepared a complete inventory of its major applications and systems for the first time. DHS has also implemented key program activities--such as contingency plan testing, security control testing, and system certification and accreditation--on an increasing percentage of its systems. However, the quality or effectiveness of these activities was not assured and deficiencies continue to exist. These program deficiencies contribute to significant weaknesses in computer security controls that threaten the confidentiality, integrity, and availability of key DHS information and information systems. For example, DHS's independent auditors reported that security over the department's financial systems was a material weakness in internal control for fiscal year 2006. In addition, GAO determined that CBP did not implement controls to effectively prevent, limit, and detect access to certain computer networks, systems, and information since it did not (1) adequately identify and authenticate users; (2) sufficiently limit access to information and information systems; (3) ensure that controls adequately protected external and internal boundaries; (4) effectively implement physical security at several locations; (5) consistently encrypt sensitive data traversing the communication network; and (6) provide adequate logging or user accountability for the mainframe, workstations, or servers. CBP also did not always ensure that responsibilities for system development and system production were sufficiently segregated. As a result, increased risk exists that unauthorized individuals, internal and external to the organization, could read, copy, delete, add, and modify sensitive and personally identifiable information and disrupt service on DHS systems. Until DHS and its components act to fully and effectively implement the department's security program and mitigate known weaknesses, they will have limited assurance that sensitive information and computer systems will be sufficiently safeguarded or that departmental missions and goals will be achieved. Implementation of GAO's recommendations will assist DHS in mitigating the deficiencies described above.
GAO-07-1003T, Information Security: Homeland Security Needs to Enhance Effectiveness of Its Program
This is the accessible text file for GAO report number GAO-07-1003T
entitled 'Information Security: Homeland Security Needs to Enhance
Effectiveness of Its Program' which was released on June 20, 2007.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Testimony:
Before the Subcommittee on Emerging Threats, Cybersecurity, and Science
and Technology, Committee on Homeland Security, House of
Representatives:
For Release on Delivery:
United States Government Accountability Office:
2:00 p.m. EDT:
Wednesday, June 20, 2007:
GAO:
Information Security:
Homeland Security Needs to Enhance Effectiveness of Its Program:
Statement of:
Gregory C. Wilshusen:
Director, Information Security Issues:
Keith A. Rhodes,
Chief Technologist:
GAO-07-1003T:
GAO Highlights:
Highlights of GAO-07-1003T, a testimony before the Subcommittee on
Emerging Threats, Cybersecurity, and Science and Technology, Committee
on Homeland Security, House of Representatives
Why GAO Did This Study:
To protect and mitigate threats and attacks against the United States,
22 federal agencies and organizations were merged to form the
Department of Homeland Security (DHS) in 2002. One of the department‘s
components, U.S. Customs and Border Protection (CBP), is responsible
for securing the nation‘s borders. DHS and CBP rely on a variety of
computerized information systems to support their operations and
assets.
GAO has reported for many years that poor information security is a
widespread problem with potentially devastating consequences. In
reports to Congress since 1997, GAO has identified information security
as a governmentwide high-risk issue.
In this testimony, GAO discusses DHS‘s information security program and
computer security controls for key information systems. GAO based its
testimony on agency, inspector general, and GAO issued and draft
reports on DHS information security.
What GAO Found:
Shortcomings in DHS‘s information security program remain, although
progress has been made. In 2005, GAO reported that DHS had not fully
implemented a comprehensive, departmentwide information security
program to protect the information and information systems that support
its operations and assets. For example, the department did not have a
complete inventory of its systems, and component agencies did not fully
or effectively perform key program activities such as developing risk
assessments, preparing security plans, testing and evaluating the
effectiveness of security controls, completing remedial action plans,
and developing and testing continuity of operations plans. GAO
recommended that DHS take specific actions to address these problems.
Since then, DHS has taken steps to improve its security program. In
fiscal year 2006, it prepared a complete inventory of its major
applications and systems for the first time. DHS has also implemented
key program activities”such as contingency plan testing, security
control testing, and system certification and accreditation”on an
increasing percentage of its systems. However, the quality or
effectiveness of these activities was not assured and deficiencies
continue to exist.
These program deficiencies contribute to significant weaknesses in
computer security controls that threaten the confidentiality,
integrity, and availability of key DHS information and information
systems. For example, DHS‘s independent auditors reported that security
over the department‘s financial systems was a material weakness in
internal control for fiscal year 2006. In addition, GAO determined that
CBP did not implement controls to effectively prevent, limit, and
detect access to certain computer networks, systems, and information
since it did not (1) adequately identify and authenticate users; (2)
sufficiently limit access to information and information systems; (3)
ensure that controls adequately protected external and internal
boundaries; (4) effectively implement physical security at several
locations; (5) consistently encrypt sensitive data traversing the
communication network; and (6) provide adequate logging or user
accountability for the mainframe, workstations, or servers. CBP also
did not always ensure that responsibilities for system development and
system production were sufficiently segregated. As a result, increased
risk exists that unauthorized individuals, internal and external to the
organization, could read, copy, delete, add, and modify sensitive and
personally identifiable information and disrupt service on DHS systems.
Until DHS and its components act to fully and effectively implement the
department‘s security program and mitigate known weaknesses, they will
have limited assurance that sensitive information and computer systems
will be sufficiently safeguarded or that departmental missions and
goals will be achieved. Implementation of GAO‘s recommendations will
assist DHS in mitigating the deficiencies described above.
What GAO Recommends:
To enhance departmental security, GAO has previously made
recommendations to DHS in implementing its information security program
and is making additional recommendations in two draft reports currently
being reviewed by the department.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-1003T].
To view the full product, including the scope and methodology, click on
the link above. For more information, contact Gregory C. Wilshusen,
wilshuseng@gao.gov, (202) 512-6244, or Keith A. Rhodes,
rhodesk@gao.gov, (202) 512-6412.
[End of section]
Abbreviations:
CBP: U.S. Customs and Border Protection:
DHS: Department of Homeland Security:
FISMA: Federal Information Security Management Act:
IG: inspector general:
Mr. Chairman and Members of the Subcommittee:
Thank you for inviting us to participate in today's hearing on
information security at the Department of Homeland Security (DHS).
Information security is a critical consideration for any organization
that depends on information systems and computer networks to carry out
its mission or business. It is especially important for government
agencies such as DHS, where the public's trust is essential. For many
years, GAO has reported that poor information security is a widespread
problem with potentially devastating consequences. In reports to the
Congress since 1997,[Footnote 1] GAO identified information security as
a governmentwide high-risk issue.
In this testimony, we discuss DHS's departmentwide information security
program and computer security controls for key information systems. We
based this testimony, in part, on our previously issued
reports[Footnote 2] and our draft report--which has been provided to
DHS for review and comment--on computer security controls for certain
information systems operated by U.S. Customs and Border Protection
(CBP). We also considered our analysis of the department's annual
Federal Information Security Management Act (FISMA)[Footnote 3] reports
for 2005 and 2006 and the department's performance and accountability
report for 2006. The work on which this testimony is based was
performed in accordance with generally accepted government auditing
standards.
Results in Brief:
Shortcomings in DHS's information security program remain, although
progress has been made. In 2005, we reported that DHS had not fully
implemented a comprehensive, departmentwide information security
program to protect the information and information systems that support
its operations and assets. For example, the department did not have a
complete inventory of its systems and component agencies did not fully
or effectively perform key program activities such as developing risk
assessments, preparing security plans, testing and evaluating the
effectiveness of security controls, completing remedial action plans,
and developing and testing continuity of operations plans. We
recommended that DHS take specific actions to address these problems.
Since our 2005 report, DHS has taken steps to improve its security
program. In fiscal year 2006, DHS completed its first comprehensive
inventory of its major applications and systems. DHS has also
implemented a departmentwide tool that incorporates the guidance
required to adequately complete a certification and accreditation for
all systems and has implemented key program activities--such as
contingency plan testing, security control testing, and system
certification and accreditation--on an increasing percentage of its
systems. However, the quality or effectiveness of these activities was
not assured and deficiencies continue to exist.
These program deficiencies contribute to significant weaknesses in
computer security controls that threaten the confidentiality,
integrity, and availability of key DHS information and information
systems. For example, DHS's independent auditors reported that security
over the department's financial systems was a material weakness in
internal control for fiscal year 2006. In addition, GAO determined that
CBP did not implement controls to effectively prevent, limit, and
detect access to certain computer networks, systems, and information
since it did not (1) adequately identify and authenticate users; (2)
sufficiently limit access to information and information systems; (3)
ensure that controls adequately protected external and internal
boundaries; (4) effectively implement physical security at several
locations; (5) consistently encrypt sensitive data traversing the
communication network; and (6) provide adequate logging or user
accountability for the mainframe, workstations, or servers. CBP also
did not always ensure that responsibilities for system development and
system production were sufficiently segregated. As a result, increased
risk exists that unauthorized individuals, internal and external to the
organization, could read, copy, delete, add, and modify sensitive and
personally identifiable information and disrupt service on DHS systems.
Until DHS and its components act to fully and effectively implement its
security program and mitigate known weaknesses, they will have limited
assurance that sensitive information and computer systems will be
sufficiently safeguarded or that departmental missions and goals will
be achieved. Implementation of GAO's recommendations will assist DHS in
mitigating the deficiencies described in this statement.
Background:
To address the challenge of responding to current and potential threats
to homeland security--one of the federal government's most significant
challenges--the Homeland Security Act of 2002 mandated the merging of
22 federal agencies and organizations to create DHS. Not since the
creation of the Department of Defense in 1947 has the federal
government undertaken a transformation of this magnitude. Each of the
22 agencies and organizations brought their own management challenges,
distinct missions, unique information technology infrastructures and
systems, and policies and procedures, thereby making the implementation
and integration of an effective departmentwide information security
program a significant challenge.
DHS's mission, in part, is to prevent and deter terrorist attacks
within the United States,[Footnote 4] reduce the vulnerability of the
United States to terrorism, and to minimize the damage and assist in
the recovery from terrorist attacks that do occur.[Footnote 5] One of
the department's components, CBP, is responsible for securing the
nation's borders.
Virtually all DHS and CBP operations are supported by automated systems
and electronic data, and the agency would find it difficult, if not
impossible, to carry out its mission and account for its resources
without these information assets. Hence, the degree of risk caused by
security weaknesses is high. For example, as a result of such
weaknesses, resources (such as payments and collections) could be lost
or stolen, data could be modified or destroyed, and computer resources
could be used for unauthorized purposes or to launch attacks on other
computer systems. Sensitive information could be inappropriately
disclosed, browsed, or copied for improper or criminal purposes.
Critical operations could be disrupted, such as those supporting
homeland security and emergency services. Finally, DHS's missions could
be undermined by embarrassing incidents, diminishing confidence in its
ability to conduct operations and fulfill its fiduciary
responsibilities.
According to FISMA, the Secretary of DHS is responsible for providing
information security protections commensurate with the risk and
magnitude of harm resulting from unauthorized access, use, disclosure,
disruption, modification, or destruction of information and information
systems used by the agency or by a contractor on behalf of the agency.
The Secretary has delegated to the DHS Chief Information Officer (CIO)
responsibility for ensuring compliance with federal information
security requirements and reporting annually to the Secretary on the
effectiveness of the department's information security program. The CIO
designated the Chief Information Security Officer (CISO) to:
* develop and maintain a departmentwide information security program,
as required by FISMA;
* develop departmental information security policies and procedures to
address the requirements of FISMA;
* provide the direction and guidance necessary to ensure that
information security throughout the department is compliant with
federal and departmental information security requirements and
policies; and:
* advise the CIO on the status and issues involving security aspects of
the departmentwide information security program.
Shortcomings in DHS Information Security Program Remain Although
Progress Has Been Made:
In 2005, GAO reported[Footnote 6] that DHS had not fully or effectively
implemented a comprehensive, departmentwide information security
program to protect the information and information systems that support
its operations and assets. Although DHS had developed and documented
policies and procedures that could provide a framework for implementing
the department's program, certain departmental components had not yet
fully implemented key program activities. Components' weaknesses in
implementing these activities included (1) incomplete risk assessments
for determining the required controls and the level of resources that
should be expended on them; (2) missing required elements from
information system security plans for providing a full understanding of
the existing and planned information security requirements; (3)
incomplete or nonexistent test and evaluation of security controls for
determining the effectiveness of information security policies and
procedures; (4) missing required elements from remedial action plans
for identifying the resources needed to correct or mitigate identified
information security weaknesses; and (5) incomplete, nonexistent, or
untested continuity of operations plans for restoring critical systems
in the case of unexpected events.
The table below indicates with an "x" where GAO found weaknesses with
key information security program activities for six systems and
applications reviewed at four components.
Figure 1: Table 1: Weaknesses in Information Security Program
Activities for Selected Systems:
[See PDF for image]
Source: GAO analysis of information security documentation for the
United States Visitor and Immigration Status Indicator Technology(US-
VISIT). Immigration and Customns Enforcement (ICE), Transportation
Security Administration (TSA), and Emergency Preparedness and Response
(EP&R) systems.
[A] For each system, we obtained and reviewed all documentation
contained in the certification and accreditation package-with the
exception of US-VISIT-in this case, we reviewed only the security plan.
[End of figure]
We also reported that DHS had not yet fully developed a complete and
accurate systems inventory and had used an enterprise management tool
(known as Trusted Agent FISMA) that contained unreliable data for
overseeing the components' reported performance data on their
compliance with key information security activities. The DHS Inspector
General reported that the data in the tool were not verified, there was
no audit trail capability, material weaknesses were not consistently
reported or linked to plans of action and milestones, and plans of
action and milestones that had been identified and documented were not
current.
To assist DHS in addressing these issues, we recommended that it
establish milestones for verifying the components' reported performance
data in Trusted Agent FISMA and instruct its component agencies to:
* develop complete risk assessments;
* document comprehensive security plans;
* fully perform testing and evaluation of security controls;
* complete remedial action plans; and:
* develop, document, and test continuity of operations plans.
DHS Has Taken Steps to Improve Security Program, but Deficiencies
Persist:
In response to our recommendations, the department has made several
improvements in its information security program. For example, DHS
officials stated that they had developed a plan to address all of the
recommendations in our 2005 report. For the first time since its
creation, DHS completed a comprehensive inventory of its major
applications and general support systems, including contractor and
national security systems, for all organizational components in fiscal
year 2006. DHS also implemented a departmentwide tool that incorporated
the guidance required to complete a certification and
accreditation[Footnote 7] for all systems. The completion of these two
tasks eliminated two factors that had significantly impeded the
department from achieving some success in establishing its security
program over the previous two years. In addition, the CISO revised the
baseline information technology security policies and procedures and
mandated that the components ensure that their systems meet the
requirements specified in the DHS baseline configuration guides.
With the exception of providing security awareness training to
employees, the department has also implemented key program activities
such as conducting specialized security training, testing and
evaluating controls, testing contingency plans, and certifying and
accrediting systems, for an increasing percentage of its systems or
personnel in fiscal year 2006 (see figure below).
Figure 2: Performance Measure Percentage for Selected Information
Security Requirements:
[See PDF for image]
Source: GAO analysis of DHS FEMA reports.
[End of figure]
However, the quality or effectiveness of certain information security
program activities has not been assured. Although CBP has made
important progress in implementing the department's information
security program, it has not fully or effectively implemented key
program activities. For example,
* risk assessments performed for systems supporting a key border
protection program did not always fully characterize risks to the
systems;
* interconnection security agreements listed in the security plan for a
key system were not current;
* procedures for testing and evaluating the effectiveness of security
controls were not sufficient and did not reveal problems with a
mainframe computer that potentially allowed unauthorized users to read,
copy, change, delete, and modify sensitive information;
* CBP did not always address significant deficiencies in a remedial
action plan thereby exposing sensitive information to increased risk of
unauthorized disclosure or modification;
* CBP did not adequately establish and implement tools and processes to
ensure timely detection and handling of security incidents; and:
* CBP had incomplete or out-of-date privacy documents for systems
supporting a key border protection program.
Significant Control Weaknesses Place Sensitive Information and
Operations at Risk:
Significant weaknesses in computer security controls threaten the
confidentiality, integrity, and availability of key DHS information and
information systems.
Independent external auditors identified over 130 information
technology control weaknesses affecting the department's financial
systems during the audit of its fiscal year 2006 financial statements.
Weaknesses existed in all key general controls and application
controls. For example,
* systems were not certified and accredited in accordance with
departmental policy;
* policies and procedures for incident response were inadequate;
* background investigations were not properly conducted; and:
* security awareness training did not always comply with departmental
requirements.
Additionally, users had weak passwords on key servers that process and
house DHS financial data, and workstations, servers, and network
devices were configured without necessary security patches. Further,
changes to sensitive operating system settings were not always
documented; individuals were able to perform incompatible duties such
as changing, testing, and implementing software; and service continuity
plans were not consistently or adequately tested. As a result, material
errors in DHS's financial data may not be detected in a timely manner.
Although CBP has made progress in addressing security vulnerabilities,
significant problem areas still remain. Certain CBP systems supporting
a key border protection program were riddled with control weaknesses
that placed sensitive and personally identifiable information at
increased risk of unauthorized disclosure and modification, misuse, and
destruction possibly without detection, and placed program operations
at increased risk of disruption. Weaknesses existed in all control
areas and computing device types reviewed. Deficiencies in controls
intended to prevent, limit, and detect access to information and
information systems exposed CBP's mainframe computer, network
infrastructure, servers, and workstations to insider and external
threats, as the following examples demonstrate. Specifically, CBP did
not:
* adequately identify and authenticate users in systems; for example,
passwords were transmitted over the network in clear text and were
stored using weak encryption;
* sufficiently limit access to information and information systems; for
example, over one thousand users with command line access could put a
program designed to bypass security rules into a special system
library;
* ensure that controls adequately protected external and internal
network boundaries; for example, internal network traffic was not
segregated; moreover, workstations and many servers did not have host
based firewalls;
* effectively implement physical security at several locations; for
example, CBP did not control access to its restricted information
technology spaces since its physical access systems were controlled by
local authorities;
* consistently apply encryption to protect sensitive data traversing
the communication network; for example, network routers, switches, and
network management servers used unencrypted network protocols so that
files traversing the network could be read;
* adequately provide audit logging or user accountability for the
mainframe computer, workstations, or servers; for example, monitoring
lists for key operating system libraries did not capture needed data
for all sensitive libraries in the desired locations;
* always ensure that responsibilities for system development and system
operations or production were sufficiently segregated; for example,
mainframe system programmers were allowed to access application
production data and developmental staff could access mainframe
operating system libraries; moreover, developmental staff had update
access to the application production data;
* consistently maintain secure configurations on the mainframe,
applications servers, and workstations we reviewed at the data center
and ports of entry; for example, production servers and workstations
were missing critical operating system and software application
security patches.
As a result, increased risk exists that unauthorized individuals,
internal and external to the organization could read, delete, add, and
modify sensitive and personally identifiable information and disrupt
service on DHS systems.
To assist enhance departmental security, GAO has previously made
recommendations to DHS in implementing its information security program
and is making additional recommendations in two draft reports currently
being reviewed by the department. Implementation of these
recommendations will facilitate improvements in the department's
information security posture.
In summary, DHS has made progress in implementing its departmentwide
information security program. However, the effectiveness of its program
is not assured. Deficiencies in key program activities continue to
exist and contribute to significant computer security control
weaknesses that place (1) sensitive information and information systems
at increased risk of unauthorized disclosure, use, modification, or
destruction, possibly without detection, and (2) agency operations at
risk of disruption.
Ensuring that weaknesses are promptly mitigated and that controls are
effective will require senior management support and leadership,
disciplined processes, and effective coordination between DHS and its
components. It also requires consistent oversight from the Secretary of
DHS and the Congress. Until DHS and its components act to fully and
effectively implement the department's information security program and
mitigate known weaknesses, limited assurance will exist that sensitive
information will be sufficiently safeguarded against unauthorized
disclosure, modification, and destruction, or that DHS components will
achieve their goals.
Mr. Chairman, this concludes our statement. We would be happy to answer
your questions.
Contacts and Acknowledgements:
If you have any questions about this statement, please contact Gregory
C. Wilshusen at (202) 512-6244 or Keith A. Rhodes at (202) 512-6412. We
can also be reached by e-mail at w [Hyperlink, wilshusenw@gao.gov]
ilshuseng@gao.gov or r [Hyperlink, rhodesk@gao.gov] hodesk@gao.gov,
respectively.
Other key contributors to this statement include Bill Wadsworth
(Assistant Director), Ed Alexander, Lon Chin, West Coile, Kirk
Daubenspeck, Neil Doherty, Patrick Dugan, Denise Fitzpatrick, Ed
Glagola, David Hayes, David Plocher, Henry Sutanto, Amos Tevelow, and
Christopher Warweg.
(310599):
FOOTNOTES
[1] GAO, High-Risk Series: An Update, GAO-07-310 (Washington, D.C.:
January 2007).
[2] GAO, Information Security: Department of Homeland Security Needs to
Fully Implement Its Security Program, GAO-05-700 (Washington, D.C.:
June 2005) and Information Security: Department of Homeland Security
Faces Challenges in Fulfilling Statutory Requirements, GAO-05-567T
(Washington, D.C.: April 2005).
[3] FISMA was enacted as title III, E-Government Act of 2002, Pub. L.
No. 107-347 (Dec. 17, 2002) and requires agencies and their inspectors
general or independent external auditors to report annually on the
effectiveness of their security policies and compliance with the
requirements of the Act. GAO, Information Security: Agencies Report
Progress But Sensitive Data Remains at Risk, GAO-07-935T (Washington,
D.C.: June 2007) describes the results of GAO's analysis of the 2006
FISMA reports for 24 agencies including DHS.
[4] 6 U.S.C. § 113(a).
[5] 6 U.S.C. § 111(b).
[6] GAO-05-700.
[7] Certification is the comprehensive evaluation of the management,
operational, and technical security controls in an information system
to determine the effectiveness of these controls and identify existing
vulnerabilities. Accreditation is the official management decision to
authorize operation of an information system. This authorization
explicitly accepts the risk remaining after the implementation of an
agreed-upon set of security controls.
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site (www.gao.gov). Each weekday, GAO posts
newly released reports, testimony, and correspondence on its Web site.
To have GAO e-mail you a list of newly posted products every afternoon,
go to www.gao.gov and select "Subscribe to Updates."
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office 441 G Street NW, Room LM
Washington, D.C. 20548:
To order by Phone: Voice: (202) 512-6000 TDD: (202) 512-2537 Fax: (202)
512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Gloria Jarmon, Managing Director, JarmonG@gao.gov (202) 512-4400 U.S.
Government Accountability Office, 441 G Street NW, Room 7125
Washington, D.C. 20548:
Public Affairs:
Paul Anderson, Managing Director, AndersonP1@gao.gov (202) 512-4800
U.S. Government Accountability Office, 441 G Street NW, Room 7149
Washington, D.C. 20548: