Information Technology

Management Improvements Needed on the Department of Homeland Security's Next Generation Information Sharing System Gao ID: GAO-09-40 October 8, 2008

The Department of Homeland Security (DHS) is responsible for coordinating the federal government's homeland security communications with all levels of government. In support of this mission, DHS implemented, and has been enhancing, the Homeland Security Information Network (HSIN). It also has proposed a follow-on system, called Next Generation HSIN (HSIN Next Gen). GAO was asked to determine whether (1) DHS has stopped further improvements on HSIN and if so, the department's rationale for doing so and plans for acquiring its proposed follow-on system HSIN Next Gen and (2) the department is effectively managing the HSIN Next Gen acquisition. To accomplish this, GAO analyzed documentation, interviewed officials, and compared acquisition management processes and practices defined in industry best practices with those planned and underway by DHS.

DHS halted further improvements on the existing HSIN system in September 2007. Since then, the department has continued to operate and maintain the system while a replacement--HSIN Next Gen--is being planned and acquired. DHS decided in large part to pursue this replacement due to the existing system has security and information-sharing limitations that do not meet department and other users' needs, thus impeding the department's ability to effectively perform its mission; and the new system is to be a key part of a departmentwide consolidation effort to, among other things, reduce the number of systems within DHS that share sensitive but unclassified information. DHS has developed an acquisition strategy for HSIN Next Gen, whereby the system is to be implemented in four phases, each providing for an increasing number of users to be transitioned to the system. For example, DHS plans to begin transitioning existing HSIN users beginning in May 2009. Further, in May 2008, DHS issued a task order engaging a contractor to acquire, deploy, operate, and maintain the new system. The total estimated value of the task order's initial year is $19 million; the order also includes 4 option years that if exercised, are estimated to be worth $62 million. DHS intends to continue to use the existing HSIN with the goal of terminating its use in September 2009 when HSIN Next Gen is to be fully completed. DHS estimates it will cost $3.1 million to operate and maintain HSIN between now and its planned September 2009 termination. DHS is in the process of implementing key acquisition management controls for HSIN Next Gen, but has yet to implement the full set of controls essential to effectively managing information technology system projects in a rigorous and disciplined manner. Specifically, it has not fully implemented key process controls in the areas of project and acquisition planning, requirements development and management, and risk management. DHS officials, including the Office of Operations Coordination and Planning's Chief Information Officer, who is responsible for managing the project, attribute the partial implementation of these key processes in large part to the aggressive schedule for acquiring and deploying HSIN Next Gen. The Chief Information Officer also stated the department plans to address these weaknesses by, for example, tasking its contractor to assist in the development and completion of the risk management process area, but had not yet established dates for when all of these activities will be completed. Until these weaknesses are effectively addressed and DHS implements and institutionalizes the full set of acquisition management controls, the project will be at increased risk of operating in an ad hoc and chaotic manner--potentially resulting in increased project costs, delayed schedules, and performance shortfalls.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-09-40, Information Technology: Management Improvements Needed on the Department of Homeland Security's Next Generation Information Sharing System This is the accessible text file for GAO report number GAO-09-40 entitled 'Information Technology: Management Improvements Needed on the Department of Homeland Security's Next Generation Information Sharing System' which was released on October 8, 2008. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Requesters: United States Government Accountability Office: GAO: October 2008: Information Technology: Management Improvements Needed on the Department of Homeland Security's Next Generation Information Sharing System: GAO-09-40: GAO Highlights: Highlights of GAO-09-40, a report to congressional requesters. Why GAO Did This Study: The Department of Homeland Security (DHS) is responsible for coordinating the federal government‘s homeland security communications with all levels of government. In support of this mission, DHS implemented, and has been enhancing, the Homeland Security Information Network (HSIN). It also has proposed a follow-on system, called Next Generation HSIN (HSIN Next Gen). GAO was asked to determine whether (1) DHS has stopped further improvements on HSIN and if so, the department‘s rationale for doing so and plans for acquiring its proposed follow-on system HSIN Next Gen and (2) the department is effectively managing the HSIN Next Gen acquisition. To accomplish this, GAO analyzed documentation, interviewed officials, and compared acquisition management processes and practices defined in industry best practices with those planned and underway by DHS. What GAO Found: DHS halted further improvements on the existing HSIN system in September 2007. Since then, the department has continued to operate and maintain the system while a replacement”HSIN Next Gen”is being planned and acquired. DHS decided in large part to pursue this replacement due to: * the existing system has security and information-sharing limitations that do not meet department and other users‘ needs, thus impeding the department‘s ability to effectively perform its mission; and: * the new system is to be a key part of a departmentwide consolidation effort to, among other things, reduce the number of systems within DHS that share sensitive but unclassified information. DHS has developed an acquisition strategy for HSIN Next Gen, whereby the system is to be implemented in four phases, each providing for an increasing number of users to be transitioned to the system. For example, DHS plans to begin transitioning existing HSIN users beginning in May 2009. Further, in May 2008, DHS issued a task order engaging a contractor to acquire, deploy, operate, and maintain the new system. The total estimated value of the task order‘s initial year is $19 million; the order also includes 4 option years that if exercised, are estimated to be worth $62 million. DHS intends to continue to use the existing HSIN with the goal of terminating its use in September 2009 when HSIN Next Gen is to be fully completed. DHS estimates it will cost $3.1 million to operate and maintain HSIN between now and its planned September 2009 termination. DHS is in the process of implementing key acquisition management controls for HSIN Next Gen, but has yet to implement the full set of controls essential to effectively managing information technology system projects in a rigorous and disciplined manner. Specifically, it has not fully implemented key process controls in the areas of: * project and acquisition planning, * requirements development and management, and: * risk management. DHS officials, including the Office of Operations Coordination and Planning‘s Chief Information Officer, who is responsible for managing the project, attribute the partial implementation of these key processes in large part to the aggressive schedule for acquiring and deploying HSIN Next Gen. The Chief Information Officer also stated the department plans to address these weaknesses by, for example, tasking its contractor to assist in the development and completion of the risk management process area, but had not yet established dates for when all of these activities will be completed. Until these weaknesses are effectively addressed and DHS implements and institutionalizes the full set of acquisition management controls, the project will be at increased risk of operating in an ad hoc and chaotic manner”potentially resulting in increased project costs, delayed schedules, and performance shortfalls. What GAO Recommends: GAO recommends strengthening acquisition management controls before the department starts to migrate existing users to the new system by, among other things, staffing the program office appropriately, ensuring all user requirements are gathered, and identifying key risks surrounding the project. In written comments on this report, DHS described actions planned and underway to address GAO recommendations. To view the full product, including the scope and methodology, click on [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-09-40]. For more information, contact David A. Powner at (202) 512-9286 or pownerd@gao.gov. [End of section] Contents: Letter1: DHS Has Stopped Current HSIN System Improvements and Is in the Process of Acquiring a Replacement System: DHS Has Yet to Implement the Management Controls Essential to Effectively Manage the HSIN Next Gen Acquisition: Conclusions: Recommendations for Executive Action: Agency Comments and Our Evaluation: Appendix I: Briefing Slides to Congressional Staff: Appendix II: Comments from the Department of Homeland Security: Appendix III: GAO Contact and Staff Acknowledgments: Abbreviations: DHS: Department of Homeland Security: CIO: Chief Information Officer: HSIN: Homeland Security Information Network: HSIN: Next Gen: Next Generation HSIN: IT: information technology: OPS: Office of Operations Coordination and Planning: [End of section] United States Government Accountability Office: Washington, DC 20548: October 8, 2008: The Honorable Joseph I. Lieberman: Chairman: The Honorable Susan M. Collins: Ranking Member: Committee on Homeland Security and Governmental Affairs: United States Senate: The Honorable Bennie G. Thompson: Chairman: Committee on Homeland Security: House of Representatives: The Department of Homeland Security (DHS) is responsible for coordinating the federal government's homeland security communications with all levels of government--including state and local. In support of this mission, the department deployed, and has been making improvements to, the Homeland Security Information Network (HSIN) as part of its goal to establish an infrastructure for sharing homeland security information. In 2005,[Footnote 1] and more recently in January 2007,[Footnote 2] we designated homeland security information sharing as a high-risk area. Consequently, it is important that federal networks and associated systems, applications, and data facilitate this vital information sharing, and do so in a manner that produces effective information sharing among and between the various levels of government. This is particularly crucial for DHS's HSIN, which is the department's primary information technology (IT) system for sharing terrorism and related information. Recently, DHS proposed a follow-on system to HSIN, which it refers to as Next Generation HSIN (HSIN Next Gen). This report responds to your request that we determine whether (1) DHS has stopped further improvements on HSIN and if so, the department's rationale for doing so and plans for acquiring its proposed follow-on system HSIN Next Gen and (2) the department is effectively managing the HSIN Next Gen acquisition. On July 11, 2008, and July 17, 2008, we provided a briefing to staff of the House Homeland Security Committee and Senate Homeland Security and Governmental Affairs Committee, respectively. Prior to these staff briefings (on July 9, 2008), we provided the briefing to responsible DHS officials, who agreed in large part with our findings, conclusions, and recommendations. This report transmits (1) the slides that we used during the briefings and (2) the recommendations that we made to the Secretary of Homeland Security and the Director, Office of Operations Coordination and Planning, who is responsible for managing HSIN and HSIN Next Gen. The full briefing, including our scope and methodology, is reprinted as appendix I. DHS Has Stopped Current HSIN System Improvements and Is in the Process of Acquiring a Replacement System: In September 2007, the department halted further improvements on the existing HSIN system. Since then, DHS has continued to operate and maintain the system while its replacement--HSIN Next Gen--is being planned and acquired. The department decided to pursue the replacement for two reasons. First, the existing system has security and information-sharing limitations that do not meet department and other users' needs. For example, with regard to security, the current HSIN does not support role-based access controls[Footnote 3] and two-factor authentication.[Footnote 4] These limitations hinder the department's ability to effectively perform its mission. Second, the replacement system is to be used as a key part of a departmentwide consolidation effort aimed at reducing the number of multiple portals or Web-based systems within DHS by consolidating the systems across the department that are to share sensitive but unclassified information. In particular, HSIN Next Gen is to provide secure access to DHS sensitive but unclassified information and services for all department user communities, including those in the law enforcement, intelligence, immigration, and emergency and disaster management communities. With regard to DHS plans to acquire HSIN Next Gen, the department has developed an acquisition strategy for the system and plans to have all users on the new system by September 2009. The system will be implemented in four phases, each addressing a functional portion of the requirements and providing for an increasing number of users to be transitioned to the system. Specifically, during the first phase of implementation, the department plans to bring on board up to 20,000 new users from critical infrastructure sectors such as agriculture and food, and transportation systems. In addition, during the second phase (called Initial Operational Capability) and third phase (called Maturing Operational Capability), DHS plans to transition over 26,000 users that currently use the existing HSIN system; this transition of existing HSIN users is to begin in May 2009. To help carry out the strategy, DHS issued a task order in May 2008 engaging a contractor to acquire, deploy, operate, and maintain the new system. The total estimated value of the base year of this arrangement is $19 million, and the total estimated value, if each of the four options is exercised, is $62 million. DHS intends to continue to use the existing HSIN with the goal of terminating its use in September 2009 when HSIN Next Gen is to be fully implemented. DHS estimates it will cost $3.13 million to operate and maintain HSIN between now and its planned September 2009 termination. DHS Has Yet to Implement the Management Controls Essential to Effectively Manage the HSIN Next Gen Acquisition: As we have previously reported,[Footnote 5] the success of critical projects such as HSIN depends on developing and implementing a full set of acquisition management controls to effectively manage the project. While DHS is in the process of implementing key acquisition management controls for HSIN Next Gen, it has yet to implement the full set of controls essential to managing HSIN Next Gen in a disciplined and rigorous manner. Specifically, it has not implemented key process controls in the areas of: * project and acquisition planning, which includes key processes, such as developing a program office and identifying staff roles and responsibilities; * requirements development and management, which involves key processes, such as gathering, analyzing, and validating user requirements; and: * risk management, which includes key processes, such as identifying and analyzing risks and assigning responsibilities for managing risks. With regard to project and acquisition planning, DHS has established a program office for HSIN Next Gen, including filling the position of project manager. However, it has not adequately staffed the HSIN Next Gen program office and identified staff roles and responsibilities. In addition, in the area of requirements development and management, the department has gathered and analyzed requirements from critical infrastructure sector users. However, it has not gathered requirements from all other HSIN users and developed a change control process for managing change to requirements. Further, regarding risk management, DHS has begun to develop a risk management plan that defines staff roles and responsibilities. However, it has yet to identify all key risks surrounding the project and develop risk mitigation plans and completion milestones. DHS officials, including the Office of Operations Coordination and Planning's (OPS) Chief Information Officer (CIO), who is responsible for managing the project, attribute the partial implementation of these key processes in large part to the aggressive schedule for acquiring and deploying HSIN Next Gen. In our view, engaging a contractor and commencing work before implementing mature controls is not a recipe for success. Specifically, our research and experience at federal agencies have shown that the probability of success is low using this approach. The OPS CIO stated the department plans to address these weaknesses by, for example, tasking its contractor to assist in the development and completion of the risk management process area, but had not yet established dates for when all of these activities will be completed. Consequently, until these weaknesses are effectively addressed and DHS implements and institutionalizes the full set of acquisition management controls, the project will be at increased risk of operating in an ad hoc and chaotic manner--potentially resulting in increased project costs, delayed schedules, and performance shortfalls. Conclusions: DHS has been challenged in its ability to efficiently and effectively manage the department's existing primary information-sharing system. In particular, although DHS has invested upwards of $70 million on the system, it still does not fully meet user needs and as a result, has not been fully utilized. DHS intends to address this performance shortfall by, among other things, acquiring a replacement system. A key challenge for DHS in this effort will be ensuring it develops an information-sharing system that effectively addresses its users' needs and in the process, does not waste or unwisely invest critical department resources. To its credit, DHS has initiated some important steps in establishing sound and capable acquisition controls, but much remains to be accomplished before DHS management efforts can be considered effective and thereby minimize the risks associated with HSIN Next Gen delivering promised capabilities and benefits on time and within budget. Investing money given the current state of management controls puts the project at risk. Given what is at stake, it is extremely important that DHS direct its attention to these management issues, and mitigate the associated risks as soon as possible. Recommendations for Executive Action: To minimize risks to the HSIN Next Gen project, we are making six recommendations to the Secretary of Homeland Security aimed at strengthening management of the project. We recommend that the Secretary direct the Director, Office of Operations Coordination and Planning to strengthen program management controls by: * staffing the program office appropriately; * identifying staff roles and responsibilities; * ensuring all requirements are gathered, analyzed, and validated; * developing and implementing a requirements change control process; and: * ensuring effective risk management by identifying all key risks surrounding the project and developing risk mitigation plans and completion milestones. We also recommend that these controls be implemented before the department starts to migrate users to HSIN Next Gen's Initial Operational Capability. Agency Comments and Our Evaluation: In written comments on a draft of this report, which were in a letter signed by DHS's Director of Operations Coordination and Planning and are reprinted in appendix II, the department described actions planned and underway to address our recommendations. These actions are consistent with those described by DHS in response to our July 9, 2008, briefing to the department in which it largely agreed with our findings, conclusions, and recommendations. We are sending copies of this report to interested congressional committees and the Secretary of Homeland Security. We will also make copies available to others on request. In addition, the report will be available at no charge on the GAO Web site at [hyperlink, http://www.gao.gov]. Should you or your staffs have any questions concerning this report, please contact me at 202-512-9286 or by e-mail at pownerd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Signed by: David A. Powner: Director, Information Technology Management Issues: [End of section] Appendix I: Briefing Slides to Congressional Staff: Information Technology: Management Improvements Needed on the Department of Homeland Security's Next Generation Information Sharing System: Briefing to the Staffs of the Senate Committee on Homeland Security and Governmental Affairs: July 17, 2008: House Committee on Homeland Security: July 11, 2008: Table of Contents: Introduction: Objectives, Scope, and Methodology: Results in Brief: Background: Results: * HSIN Is Currently Operational but Further Improvements Have Been Halted; * Acquisition Management Controls Needed; Conclusions: Recommendations: Agency Comments and Our Evaluation: Attachment I: Scope and Methodology: Introduction: The Department of Homeland Security (DHS) is responsible for coordinating the federal government's homeland security communications with all levels of government-including state and local. In support of this mission, the department implemented, and has been enhancing, the Homeland Security Information Network (HSIN) as part of its goal to establish an infrastructure for sharing homeland security information.[Footnote 6] Recently, DHS proposed a follow-on system to HSIN, which it refers to as Next Generation HSIN (HSIN Next Gen). In 2005,[Footnote 7] and more recently in January 2007,[Footnote 8] we designated homeland security information sharing as a high-risk area. Consequently, it is important that federal networks and associated systems, applications, and data facilitate this vital information sharing, and do so in a manner that produces effective information sharing among and between the various levels of government. This is particularly crucial for DHS's HSIN, which is the department's primary information technology (IT) system for sharing terrorism and related information. Objectives, Scope, and Methodology: As agreed, our objectives were to determine whether: * DHS has stopped further improvements on HSIN and if so, the department's rationale for doing so and plans for acquiring its proposed follow-on system called HSIN Next Gen system, and * the department is effectively managing the HSIN Next Gen acquisition. For our first objective, we analyzed documentation and interviewed DHS officials from the office responsible for managing HSIN and HSIN Next Gen, the Office of Operations Coordination and Planning (OPS), to assess efforts planned and underway to implement HSIN system improvements and acquire HSIN Next Gen. For our second objective, we compared processes and practices defined in the Software Engineering Institute's Capability Maturity Model® Integration for Acquisition (CMMI- ACQ)[Footnote 9] and in our prior work analyzing best practices in industry and government[Footnote 10] with those planned and underway by the department to determine the extent of implementation. In judging implementation, we used the following criteria: the processes were (1) fully implemented if all of the related guidance was addressed; (2) partially implemented if some, but not all, of the related guidance was addressed; and (3) not implemented if none of the related guidance was addressed. Details of our scope and methodology are provided in attachment I. We conducted this performance audit from January 2008 to June 2008, in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Results In Brief: Accountability Integrity Reliability DHS halted further improvements on the existing HSIN system in September 2007. Since then, the department has continued to operate and maintain the system while a replacement- called HSIN Next Gen-is being planned and acquired. DHS decided to pursue this replacement for two reasons. * First, the existing system has security and information sharing limitations that do not meet department and other users' needs, thus impeding the department's ability to effectively perform its mission. * Second, the replacement system is to be used as a key part of a departmentwide consolidation effort to reduce the number of duplicative DHS Web-based systems. DHS has developed an acquisition strategy for the system and plans to have all users on the new system by September 2009. DHS intends to continue to use the existing HSIN with the goal of retiring it once HSIN Next Gen has been completed. DHS estimates it will cost $3.13 million to operate and maintain HSIN between now and retirement. DHS is in the process of implementing key acquisition management controls for HSIN Next Gen. For example, DHS has established a program office for HSIN Next Gen, including filling the position of project manager. In addition, DHS has begun to develop a risk management plan that defines staff roles and responsibilities. However, DHS has yet to implement the full set of controls essential to effectively managing IT system projects in a rigorous and disciplined manner. Specifically, it has not fully implemented key process controls in the areas of: * project and acquisition planning, * requirements development and management, and: * risk management; DHS officials, including the OPS Chief Information Officer (CIO), who is responsible for managing the project, attribute the partial implementation of these key processes in large part to the aggressive schedule for acquiring and deploying HSIN Next Gen. DHS has activities planned and underway to address missing controls, but has not established dates for when all of these activities will be completed. Until DHS has implemented these controls, there is increased risk of the project operating in an ad hoc and chaotic manner-potentially resulting in increased project costs, delayed schedules, and performance shortfalls. Accordingly, we are making recommendations to the Secretary of Homeland Security to (1) strengthen management controls, including project and acquisition planning, requirements development and management, and risk management; and (2) ensure that these controls be implemented before users are transitioned to HSIN Next Gen Initial Operational Capability. In orally commenting on a draft of this briefing, DHS officials stated that they agreed with our findings and recommendations and described actions they have initiated to implement our recommendations. They also generally agreed with our conclusions. However, DHS officials stated that the risk raised in our conclusions was mitigated by their IT experience. While experience is important, key process controls, such as rigorous and disciplined requirements and risk management, are also essential to IT project success. DHS is the lead department involved in securing our nation's homeland. Its mission includes, among other things, leading the unified national effort to secure the United States, preventing and deterring terrorist attacks, and protecting against and responding to threats and hazards to the nation. As part of its mission and as required by the Homeland Security Act of 2002,[Footnote 11] the department is also responsible for coordinating efforts across all levels of government and throughout the nation, including with federal, state, tribal, local, and private sector homeland security resources. This includes coordinating the federal government's networks and other communications systems with state and local governments. In 2004, DHS developed and implemented HSIN as the department's primary IT system for sharing terrorism and related information with federal, state, and local agencies, among others. Specifically, this Web-based communication system is to provide a secure and trusted national IT system for sensitive but unclassified information sharing and collaboration among federal, state, local, tribal, territorial, private sector, and international partners engaged in preventing, protecting from, responding to, and recovering from all threats, hazards, and incidents within DHS's authority. HSIN offers both real-time chat and instant messaging capability, as well as a document library that contains reports from multiple federal, state, and local sources. Available through the system are suspicious incident and pre-incident information and analysis of terrorist threats, tactics, and weapons. Each community of interest has Web pages that are tailored for the community and contain general and community- specific news articles, links, and contact information. HSIN is to support a number of homeland security-related mission areas that cover thousands of users across the United States. These mission areas include over 35 user groups, commonly referred to as communities of interest, including: * emergency management, * law enforcement, * counterterrorism, * individual states, and: * private sector communities. Other DHS component organizations, such as the Office of Infrastructure Protection, the Coast Guard, and Federal Emergency Management Agency, use HSIN as a tool to further their respective missions and therefore have assisted in the development, operations and maintenance, and enhancement of HSIN. For example, according to the Office of Infrastructure Protection, it works with the critical infrastructure sectors-that is, groups of similar private and government entities that operate and maintain systems and assets, whether physical or virtual, so vital to the nation that their incapacity or destruction would have a debilitating impact on national security, national economic security, national public health or safety, or any combination of those matters[Footnote 12]-to gather user requirements and develop business processes in order to integrate HSIN into the critical sectors' information-sharing environment. The Office of Operations Coordination and Planning (OPS) CIO is responsible for ensuring that HSIN supports the needs of the department and its partners. This includes managing HSIN operations and maintenance, making necessary enhancements to the current system, and developing and acquiring HSIN Next Gen. The OPS CIO reports directly to the OPS Director who in turn reports directly to the DHS Secretary and Deputy Secretary. Through fiscal year 2007, the department reports it has expended about $70 million on HSIN, and for fiscal year 2008, the department had budgeted about $21 million for operations, maintenance, and enhancement. In April 2007,[Footnote 13] we reported that when coordinating efforts between HSIN and other state and local information-sharing initiatives, DHS did not fully adhere to key practices aimed at enhancing information sharing, collaboration, and avoiding duplication. For example, in developing the system, the department did not work with two key state and local initiatives, which are major parts of the Regional Information Sharing System program, to fully develop joint strategies to meet mutual needs. In addition, it did not develop compatible policies, procedures, and other means to operate across organizational boundaries. DHS's limited use of these practices was attributable to a number of factors, including the department's expediting its schedule to deploy information-sharing capabilities after the events of September 11, 2001, and in doing so not developing a comprehensive inventory of key state and local information- sharing initiatives. Prior GAO Reviews Have Identified Opportunities for Improvement: As a result, we found there was increased risk that, among other things, effective information sharing is not occurring. Additionally, the department risked duplication of state and local capabilities. We recommended, among other things, that DHS: * identify and develop a comprehensive inventory of state and local initiatives; * assess whether there are opportunities for HSIN to improve information sharing and avoid duplication of effort; and: * where there are opportunities, implement effective coordination and collaboration practices. In response, DHS largely agreed with our recommendations and initiated actions to implement them. Examples include the following: * In October 2007 and in February 2008, the HSIN Advisory Council-a HSIN user group composed of representatives from state, tribal, and local governments and the private sector-met to discuss HSIN information-sharing activities and provided strategic-level recommendations to the OPS Director. * The HSIN Mission Coordinating Committee-a user group composed of representatives from DHS's components (e.g., the Office of Infrastructure Protection, the Coast Guard, and the Federal Emergency Management Agency)-has met five times over the past year to address their respective users' requirements for HSIN. In July 2007,[Footnote 14] we reported on challenges the department faced when using HSIN to share information with critical infrastructure sectors. Examples included: * DHS officials responsible for leading the national effort to reduce critical infrastructure risk stated that although they encouraged critical sector entities to use HSIN, the system did not provide the capabilities that were promised, including providing the level of security expected by certain sectors. * An internal DHS review of HSIN determined that the department had not clearly defined the purpose and scope of the system, and that the system had been developed without sufficient planning and project management. Results: Objective 1: HSIN Is Currently Operational but Further Improvements Have Been Halted: DHS Has Stopped Current HSIN System Improvements and Is in the Process of Acquiring a Replacement System: The department halted further HSIN improvements in September 2007 but it continues to operate and maintain the system while its replacement- HSIN Next Gen-is being planned and acquired. DHS decided to pursue a replacement system based on two reasons. First, the current system has security and information-sharing limitations that do not meet its users' needs and thus impedes the department's ability to effectively perform its mission. Second, the new system is to be used as part of a departmentwide effort-referred to as the portal consolidation program-to consolidate multiple portals or Web-based systems and improve sensitive but unclassified information-sharing capabilities within the department. DHS has developed a HSIN Next Gen acquisition strategy and as part of the strategy, issued a May 2008 task order engaging a contractor to develop the system. DHS plans to have all users on the new system by September 2009. In the interim, DHS plans to continue to operate and maintain HSIN as the new system is acquired and deployed and users are transitioned to it. Once user transition is complete, the department intends to retire HSIN. HSIN Improvements Halted Due to System Limitations: In September 2007, DHS executives, including the Undersecretary for Management, Chief Information Officer, Director of Operations Coordination and Planning, and key system user representatives (e.g., Office of Infrastructure Protection), met to discuss HSIN operations. Key representatives said HSIN was not meeting their needs due to system security and information-sharing limitations. System security limitations cited included the system's inability to support * role-based access controls, which limit system functions based on a user's designated role, and: * two-factor authentication, which is a way of verifying someone's identity by using two of the following: something the user knows (password), something the user has (badge), or something unique to the user (fingerprint). Information-sharing limitations included the system's inability to: * enable users to access HSIN and systems outside of DHS (such as the state and local law enforcement's Regional Information Sharing System) using single sign capability (i.e., requiring only one user name and password); * enable users to send alerts and notifications and receive alerts through e-mail or cell phones; * support online meetings and presentations; and: * upload new users into the system in bulk. HSIN Improvements Halted: According to user representatives, these limitations were hindering their ability to perform the mission of the department. For example, representatives from the Office of Infrastructure Protection (which is part of the National Protection and Programs Directorate) stated that without the security controls, private-sector officials from the critical infrastructure sectors were reluctant to share with DHS sensitive information about sector infrastructure that is essential to protecting the homeland, thus inhibiting the department's ability to adequately build trusted relationships with sector officials. In response, the Office of Infrastructure Protection initiated an effort to obtain requirements from HSIN critical infrastructure sectors users, augmenting the requirements the department had for the existing system. Consequently, the executives at the September 2007 meeting (referenced above) decided the best way to implement the missing security and information-sharing capabilities was via a new system, rather than by enhancing the existing system. According to these officials, they based their decision largely on the view that the existing system could not be enhanced to provide these capabilities in a cost-effective manner. These officials also decided at this time to halt any further HSIN enhancements until the new system (HSIN Next Gen) was implemented, at which point they planned to retire the current HSIN system. HSIN Next Gen's Goal Is to Also Eliminate Duplication: In addition, in October 2007 the Under Secretary for Management issued a memorandum detailing how HSIN Next Gen is to be used as an integral part of the department's portal consolidation program. According to the memorandum, the current DHS Web environment consists of more than 100 Web-based systems, which are mostly duplicative in capabilities. HSIN Next Gen is part of a departmentwide program aimed at reducing the number of duplicative Web-based systems within DHS by consolidating the systems across the department that are used to share sensitive but unclassified information, and by replacing portal technologies that limit its information-sharing capabilities. In particular, according to the memorandum, HSIN Next Gen is to provide secure access to DHS information and services for all DHS user communities, including those in the law enforcement, intelligence, immigration, and emergency and disaster management communities. Homeland Security Information Network Next Generation: As part of the system acquisition and implementation strategy, DHS plans to continue operating and maintaining HSIN until September 2009. The department estimates the cost to operate and maintain the current system through September 2009 will be $3.13 million. DHS reports it will have spent a total of $91 million on HSIN by the end of fiscal year 2008. In parallel, the department plans to begin developing and implementing HSIN Next Gen in four phases; the phases-along with a brief description of their functional purpose-are as follows. * Phase one, referred to as Spiral 1, is to establish an operational platform for the HSIN critical sector users' requirements. * The second phase, Initial Operational Capability, is to (1) deliver requirements currently supported by HSIN, as well as provide additional security controls and (2) begin migrating users of the current system to HSIN Next Gen. * Phase three, Maturing Operational Capability, is to migrate all remaining users of the current system to HSIN Next Gen. * The fourth phase, called the Final Operational Capability, is to provide for improved content management; better information discovery and delivery; and improved alert, notification, and public announcement functions. Each phase is intended to, among other things, address a functional portion of the requirements and provide for an increasing number of users to be transitioned to the system. In addition, DHS plans to draw upon the existing HSIN system and capabilities, rather than developing a complete infrastructure replacement. Specifically, where possible, it plans to re-use existing HSIN hardware and software. The department plans to use the contractor (discussed in detail below) to help them do this. However, it has yet to set a date for when this is to be completed. Further, in terms of users, during the first phase of implementation, the department plans to bring on board up to 20,000 critical sector users. In addition, over the second and third phases, DHS plans to transition over 26,000 users that currently use the existing HSIN system. In May 2008, the department issued a task order to a contractor[Footnote 15] to acquire, deploy, operate, and maintain the new system. The total estimated value of the base year of this arrangement is $19 million, and the total estimated value, if each of the four options is exercised, is $62 million. Accountability Integrity Reliability Results: Objective 1 Homeland Security Information Network Next Generation Each of the HSIN Next Gen phases, the timing of their implementation, the percentage of users to be transitioned, and the date the contractor was issued the task order are depicted in figure 1. Figure 1: HSIN Next Generation Phases and Associated Milestones: This figure is a chart showing HSIN Next Generation phases and associated milestones. [See PDF for image] Source: GAO analysis of DHS data. [End of figure] Key dates are: * May 2008 - issued task order to contractor for HSIN Next Gen. * August 2008 - implement Spiral 1 with the goal of supporting up to 20,000 critical sectors users. * May 2009 - complete Initial Operational Capability with 13,000 current users scheduled to transition. * September 2009 - implement Maturing Operational Capability with the transition of the remaining 13,000 users. * November 2009 - complete Final Operational Capability by delivering new functionality to users. Results: Objective 2: Acquisition Management Controls Needed: DHS Has Yet to Implement the Management Controls Essential to Effectively Manage the HSIN Next Gen Acquisition: DHS is in the process of implementing key acquisition management controls, but it has yet to implement the full set of controls essential to managing HSIN Next Gen in a disciplined and rigorous manner. Specifically, it has not implemented key process controls in the areas of: * project and acquisition planning, * requirements development and management, and: * risk management. Until DHS has fully implemented these controls, it increases the risk of the project operating in an ad hoc and chaotic manner-potentially resulting in increased project costs, delayed schedules, and performance shortfalls. As we have previously reported,"[Footnote 16] the success of critical projects such as HSIN depends on developing and implementing a full set of acquisition management controls to effectively manage the project. Leading organizations, such as the Software Engineering Institute and the Chief Information Officer's Council, and our research and experience at federal agencies have shown that such process controls are significant in successful system acquisition and development projects. In particular, the CMMI-ACQ[Footnote 17] has defined a suite of key acquisition process control areas that are necessary to manage system acquisitions in a rigorous and disciplined fashion. These process areas include: * project and acquisition planning, * requirements development and management, and: * risk management. The following table provides a list of key processes within each process area. Table 1: Key Processes for Effectively Managing IT Projects Process area Key processes: Process area: Project and acquisition planning; Key processes: * developing a program office; * obtaining appropriate staff, and ensuring that staff have the skills and knowledge needed to manage the project; * identifying staff roles and responsibilities; * identifying key deliverables and milestones for the project and acquisition. Process area: Requirements development and management; Key processes: * gathering user requirements; * analyzing and validating user requirements; * managing any changes to the requirements in collaboration with stakeholders. Process area: Risk management; * identifying and analyzing risks; * assigning responsibilities for managing risks; * developing mitigation plans and completion milestones for identified risks. Source: GAO summary of leading practices, including practices identified by the Software Engineering Institute, the Chief Information Officer's Council, and the Office of Management and Budget. [End of table] DHS is currently implementing key acquisition controls for the HSIN Next Gen but it has yet to implement the full set of controls essential to effectively managing the project. Table 2 provides a summary of the status of the project relative to each of the key process areas. Table 2: Summary of the Status of HSIN Next Gen Acquisition Management Controls as of June 2008: Process area: Project and acquisition planning; Key processes: * Establish a program office; Status: Key process area implemented. Process area: Project and acquisition planning; Key processes: * Obtain appropriate staff; Status: Key process area not implemented. Process area: Project and acquisition planning; Key processes: * Identify staff roles and responsibilities; Status: Key process area not implemented. Process area: Project and acquisition planning; Key processes: * Identify key deliverables and milestones for project and acquisition; Status: Key process area implemented. Process area: Requirement development and management; Key processes: * Gather user information; Status: Key process area partially implemented. Process area: Requirement development and management; Key processes: * Analyze and validate user requirements; Status: Key process area partially implemented. Process area: Requirement development and management; Key processes: * Manage change to requirements; Status: Key process area not implemented. Process area: Risk management; Key processes: * Identify and analyze risks; Status: Key process area partially implemented. Process area: Risk management; Key processes: Assign responsibilities for managing risks; Status: Key process area implemented. Process area: Risk management; Key processes: * Develop mitigation plans and completion 0 milestones for identified risks; Status: Key process area not implemented. Source: GAO analysis of agency data. [End of table] With regard to project and acquisition planning, DHS has implemented two of the four key processes. Specifically, it has: * established a program office for HSIN Next Gen, including filling the position of the project manager, and developed an April 2008 mission needs statement for HSIN Next Gen; and: * developed a project schedule, identifying key deliverables and milestones, for the HSIN Next Gen project and acquisition. However, having already issued a task order to the contractor for HSIN Next Gen, the department has not filled two positions that it identified it needed to appropriately staff the program office. According to DHS officials, including the OPS CIO, they are in the process of hiring two full-time employees by the end of fiscal year 2008. In addition, the department is in the process of identifying staff roles and responsibilities, but has yet to finalize the effort. Until the program office is adequately staffed and roles and responsibilities have been defined, DHS will be challenged in its ability to manage the HSIN Next Gen acquisition and project, including overseeing the contractor tasked to develop the system. With regard to requirements development and management, DHS has partially implemented two of the three key processes, and has yet to implement the remaining process. Specifically, for Spiral 1, DHS has: * gathered user requirements from the critical infrastructure sector users, and: * analyzed these requirements through the OPS CIO, HSIN stakeholders, and the HSIN Mission Coordinating Committee. The department used these user requirements, the existing HSIN requirements, and pending change requests for the current system to create the Functional Requirements Document dated March 2008. This document defines and outlines the known user requirements for HSIN Next Gen. The Functional Requirements Document was included as part of the HSIN Next Gen solicitation documentation (i.e., request for proposals) used to award the contractor in May 2008. However, while DHS has gathered and analyzed user requirements from critical infrastructure sector users, it has not gathered requirements from all other HSIN users. Moreover, DHS has yet to validate the requirements. In addition, DHS has not developed a change control process for managing change to requirements in collaboration with stakeholders, including developing criteria for evaluation and acceptance of requirements. DHS has efforts planned and underway to address these weaknesses. For example, the department is in the process of establishing an initiative (called the HSIN Mission Integration Effort) to improve its ability to gather user requirements by having a formal outreach process to communicate with HSIN users. According to the OPS CIO, this is part of the department's effort to improve its capability to gather requirements from HSIN users. In addition, DHS plans to validate requirements for each HSIN Next Gen phase before they are completed, which is to be by August 2008 for Spiral 1. Further, DHS plans to establish a change control board to manage HSIN Next Generation requirements by September 2008. While these are steps in the right direction, until they are completed and DHS has fully gathered, analyzed, and validated all user requirements and implemented effective change management, it faces the risk that HSIN Next Gen will not meet user and mission needs, which is a problem it faced with the existing HSIN and why it is currently working on a replacement system. With regard to risk management, DHS has implemented one of the key processes and part of another, and has yet to implement the remaining process. Specifically, DHS's HSIN Next Gen Acquisition Plan (dated February 2008): * assigns responsibility for managing the risks; and: * partially identifies a list of primary risks both internal and external to the department, such as: - insufficient funding to execute future development, - insufficient government staff to execute the project, and: - changes in HSIN user requirements that could negatively impact cost and schedule. In addition to these efforts, DHS has begun to develop a risk management plan that defines staff roles and responsibilities, including procedures for identifying and tracking risks and assessing the probability and impact of individual risks. However, the department has yet to develop risk mitigation plans and completion milestones, which includes recommended courses of action for each critical risk. The department intends to develop such plans, which are to provide risk mitigation strategies with alternatives and mitigation project plans, including activities, schedules, and resource requirements. However, the department has yet to establish a date for when this is to be completed. In addition, the list of primary risks prepared did not include all key risks. For example, HSIN Next Gen's schedule, which has been identified by the OPS CIO as being aggressive, has not been identified as a risk. Until DHS fully implements and institutionalizes risk management, there is increased probability that unanticipated risks may occur that could have a critical impact on HSIN Next Gen's cost, schedule, and performance. The OPS CIO stated that the reason for the partial implementation of these key processes is attributable in large part to an aggressive schedule for acquiring and deploying HSIN Next Gen. In our view, engaging a contractor and commencing work before implementing mature controls is not a recipe for success. Specifically, our research and experience at federal agencies have shown that the probability of success is low using this approach. A case in fact is the existing HSIN system which was acquired and deployed via an overly aggressive schedule with the result being it did not meet all users' needs, necessitating in part the need for the HSIN Next Gen replacement. The OPS CIO stated the department plans to address these weaknesses by, for example, tasking its contractor to assist in the development and completion of the risk management process area. However, until the processes have been implemented and institutionalized, and the full set of acquisition management controls are implemented, the project will be at increased risk of operating in an ad hoc and chaotic manner- potentially resulting in increased project costs, delayed schedules, and performance shortfalls. Conclusions: DHS has been challenged in its ability to efficiently and effectively manage the department's existing primary information-sharing system. In particular, although DHS has invested upwards of $70 million on the system, it still does not fully meet user needs and as a result, has not been fully utilized. DHS intends to address this performance shortfall by, among other things, acquiring a replacement system. A key challenge for DHS in this effort will be ensuring it develops an information-sharing system that effectively addresses its users' needs and in the process, does not waste or unwisely invest critical department resources. To its credit, DHS has initiated some important steps in establishing sound and capable acquisition controls, but much remains to be accomplished before DHS management efforts can be considered effective and thereby minimize the risks associated with HSIN Next Gen delivering promised capabilities and benefits on time and within budget. Investing money given the current state of management controls puts the project at risk. Given what is at stake, it is extremely important that DHS direct its attention to these management issues, and mitigate the associated risks as soon as possible. Recommendations: To minimize risks to the HSIN Next Gen project, we are making recommendations to the Secretary of Homeland Security aimed at strengthening management of the project. We recommend that the Secretary direct the Director, Office of Operations Coordination and Planning to strengthen program management controls by: * staffing the program office appropriately; * identifying staff roles and responsibilities; * ensuring all requirements are gathered, analyzed, and validated; * developing and implementing a requirements change control process; and: * ensuring effective risk management by identifying all key risks surrounding the project and developing risk mitigation plans and completion milestones. We also recommend that these controls be implemented before the department starts to migrate users to HSIN Next Gen's Initial Operational Capability. Agency Comments and Our Evaluation: In oral comments on a draft of this briefing, DHS officials agreed with our findings and recommendations and described actions that they have underway to address our recommendations. In particular, the OPS CIO stated that they have engaged a contractor to help them organize the HSIN program office, which includes identifying staff roles and responsibilities. DHS officials also generally agreed with our conclusions. However, they took exception with the statement in our conclusions that investing money given the current state of management controls puts the project at risk. According to DHS officials, including the OPS CIO, they believe the risks to the project are mitigated by the IT experience of the HSIN staff, including the knowledge it has gained over the past 4 years in operating, maintaining, and enhancing HSIN. While we agree that IT experience is important, our research and experience at federal agencies have shown that, in addition to people, key processes, such as rigorous and disciplined requirements and risk management, are essential to IT project success. DHS officials also provided technical comments, which we have incorporated into the briefing as appropriate. Attachment I: Scope and Methodology: To address our first objective, we: * assessed department efforts to stop HSIN system improvements by analyzing agency documentation and then discussing with agency officials via interviews. For example, we: - reviewed executive-level correspondence, memos, strategies, and related documentation describing the department's plans for the current system, including ceasing system improvements and the reasons for doing this; - reviewed cost estimates to determine the planned costs of the operations and maintenance, and discussed the costs of enhancing the current system with OPS officials; and: - interviewed OPS officials to clarify our understanding of the documentation and the department's rationale for choosing to develop the follow-on system. * analyzed DHS plans for the proposed follow-on system. Specifically, we: - evaluated the HSIN Next Gen acquisition plan, requirements document, request for proposals, and related documentation to determine what activities were planned and when they were to be accomplished; and: - reviewed independent cost estimates to determine the planned costs for the development, operations, and maintenance of the new system. To address our second objective, we assessed the extent to which the department was managing the acquisition of HSIN Next Gen based on the processes defined in the Software Engineering Institute's Capability Maturity Model® Integration for Acquisition (CMMI-ACQ).[Footnote 18] In particular, we analyzed the department's efforts in acquisition planning, requirements development and management, and risk management. In doing so, we: * assessed HSIN Next Gen acquisition and project planning documentation and interviewed OPS officials to obtain key milestones; * reviewed the HSIN Next Gen system requirements and interviewed officials from OPS and the Office of Infrastructure Protection, and representatives from HSIN governance bodies in order to understand how requirements were gathered and managed; and: * evaluated the HSIN Next Gen risks and risk management plan, and interviewed OPS officials to understand how risks were identified and are to be managed. In making these judgments, we used the following criteria: processes were: * fully implemented if all of the related guidance was addressed; * partially implemented if some, but not all, of the related guidance was addressed; and: * not implemented if none of the related guidance was addressed. We conducted our work at DHS headquarters offices in Washington, D.C., and the Office of Infrastructure Protection in Arlington, Virginia. We conducted this performance audit from January 2008 to June 2008, in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. [End of section] Appendix II: Comments from the Department of Homeland Security: Operations Coordination and Planning: U.S. Department of Homeland Security: Washington, DC 20528: Homeland Security: September 19, 2008: David A. Powner: Director, Information Technology Management Issues: U.S. Government Accountability Office: Dear Mr. Powner: The Office of Operations Coordination and Planning (OPS) appreciates the opportunity to comment on the Government Accountability Office (GAO) report, "Information Technology: Management Improvements Needed on the Department of Homeland Security's Next Generation Information Sharing System." OPS in coordination with the DHS Office of the Chief Information Officer (OCIO) are working to establish a secure and trusted information sharing and collaboration environment for Sensitive but Unclassified (SBU) information for use by DHS and non-DHS partners engaged in preventing, protecting from, responding to, and recovering from all threats, hazards, and incidents within the authority of DHS. The decision to upgrade the Homeland Security Information Network (HSIN) technology platform meets the growing needs of HSIN users. The current technology platform does not provide the necessary capabilities required to provide the necessary trust and interoperability. Upgrading HSIN technology addresses current user needs and provides a robust and trusted foundation adjustable over time to meet arising end user information sharing requirements. The project to upgrade the HSIN technology platform is called HSIN NextGen. It is important to understand that HSIN Next Generation (NextGen) is primarily a software upgrade to the current HSIN technology platform rather than an acquisition of a replacement system. The HSIN NextGen project, along with operations and maintenance of the current HSIN platform, is being done within the existing HSIN investment profile and does not require additional money. The HSIN NextGen project will follow a phased implementation approach based on industry best practices. This approach allows the Department to effectively and efficiently move all current HSIN users onto an enhanced platform, constituting initial operating capability (IOC), by October, 2009. The current HSIN technology platform will remain operational throughout the phased implementation to ensure continued service for all users. Phase 1 of the HSIN NextGen project, driven by the HSIN Critical Sectors (HSIN-CS) priority requirements, was achieved on August 25, 2008. The following responses address the recommendations within the report: Recommendation: Staffing the program office appropriately: OPS has advertised for a HSIN Program Requirements Manager and is working with the DHS Office of the Chief Human Capital Officer to fill this position within 60 days. Two GS-I5 leadership and technical positions have been advertised and we anticipate having personnel onboard within 60 to 90 days. The HSIN Program Manager is assisted by an experienced team of professional contracting firms. The roles filled by the contractors include cost, earned value management, schedule, performance, architecture, change process, and other support functions that are typical of a program management office. The OPS CIO plans to fill ten additional billets beginning in Fiscal Year 2009 (FY09), pending Departmental approval. These billets will support architecture, security, privacy, and other functions. These specialists will ensure HSIN addresses statutory and interoperability requirements with partner tools. These resources will provide more robust requirements management and process control. The HSIN program is not currently staffed to support simultaneous, significant outreach initiatives to our partners. To meet this demand, DHS plans to increase overall OPS CIO Division staffing in FY09 and FYI0, subject to Congressional approval of existing budget requests. The augmented HSIN Outreach Team will build on our diverse partner community relationships to facilitate integrating HSIN into the partner communities' day-to-day operations that map to the DHS mission (Awareness, Prevent, Protect, Respond, and Recover). These new funds will be dedicated entirely to mission integration and focused on our Federal, State, local, and private sector partners. Recommendation: Identifying staff roles and responsibilities: In April 2008, the OPS CIO initiated an effort by an outside team to analyze the current OPS CIO Division, which includes HSIN Program Management. This effort provided recommendations for transforming the OPS CIO Division and enable DHS to more effectively meet its complex, integrated mission requirements, both within DHS and across the larger homeland security community. The team conducted extensive research and performed over thirty-five interviews with OPS CIO staff, OPS stakeholders, and DHS-wide leaders. Then, the team applied proven analytical methods to form strategic and tactical views of organization, examining the CIO functions and capabilities it requires for the future. In addition, the team conducted a detailed, bottom-up assessment of existing capabilities and supporting activities. Four key areas were analyzed: * Process: Develop an understanding of the existing and future processes including functions, tasks and activities needed to perform the mission of the OPS CIO Division; * People: Develop an understanding of the existing and future staff and expertise needed to support the mission and processes of the OPS CIO Division; * Technology: Develop an understanding of the existing and future technologies including applications, data and technology standards needed to perform the mission of the OPS CIO Division; * Physical Infrastructure: Develop an understanding of the existing, future facilities and working environment needed to perform the mission of the OPS CIO Division; The recommendation for the future state of the OPS CIO Division includes a detailed description of the organization model, including the processes, people, technology and infrastructure required, to implement the recommended organization. Recommendation: Ensuring all requirements are gathered, analyzed, and validated: User requirements were the primary driver of the decision to upgrade the HSIN environment. These are not the only driver of the process. Initial phases will not meet every user requirement. The prioritization of certain user requirements is necessary. The Department must set timeline milestones in addition to identifying user requirements. This ensures that the awarded task order is completed in a timely manner, while initially ensuring that the Department meets the most urgent system requirements. Phases I through 3 of the HSIN NextGen project address the user needs to provide a secure and trusted information sharing and collaboration platform. The Department determined that the HSIN NextGen project must first address the security and trust requirements identified through HSIN Community of Interest (COl) owners' input. Based upon input from many of the HSIN Community of Interest (COI) owners, the Department determined that the HSIN NextGen project must first address the security and trust requirements identified by all COIs. State, local and tribal first responders have reached out to the Department by requesting changes and sending requirements through the HSIN Helpdesk and/ or through the HSIN Mission Advocates. These change requests and requirements were recorded in the HSIN Change Request Tracking System (CHARTS). Many change requests were made by HSIN-CS and State, local, or tribal users. All change requests and requirements were examined and where possible incorporated into the HSIN NextGen Functional Requirements Document (FRD). The operational user requirements, which include policy, business process, and governance, will be gathered through identified DHS business leads and the HSIN Outreach Team. Using a best practices approach, the HSIN Mission Integration Effort will gather user requirements and establish on-the-ground relationships through HSIN representatives (Mission Advocates). The HSIN Outreach Team is in the initial phase of an important engagement with the Commonwealth of Virginia, among others. Working closely with operational personnel in Virginia, the Department will further the understanding of the Commonwealth's information sharing needs and aid to support the Department partners' homeland security mission. In the future, the Department will engage with more partners to further examine the needs of our State, local, tribal and Federal partners. The Department further determined that the most time sensitive and pressing needs of the existing HSIN COIs were those of the HSIN Critical Sectors (HSIN-CS). HSIN-CS provides a common environment for the critical infrastructure/key resource (CI/KR) stakeholder partners. NPPD has gathered and validated necessary user requirements for this phase from their stakeholders over a two year period. The critical infrastructure/key resource community is a well governed and defined community. The National Protection and Programs Directorate, Office of Infrastructure Protection (NPPD/IP), has determined that implementing the HSIN-CS priority requirements at the earliest moment was an absolute necessity to avoid mission degradation and loss of the voluntary participation of the I8 infrastructure sectors. Recommendation: Developing and implementing a requirements change control process: There must be one overarching requirements process that brings business, functional and technical architecture products into alignment. This is a complex undertaking, given the necessity for interoperability, as well as the depth, breadth, and volunteer nature of potential HSIN user groups. The phased approach to migrating communities onto the upgraded HSIN environment mitigates many risks. The HSIN NextGen project will make the HSIN environment responsive and flexible to user requirements through a single, well-designed requirements process. The diversity of customer requirements and the need for a more standards-based platform, responsive to changing user requirements, is a driver for the HSIN NextGen project. The use of the maturing governance structure will ensure customer needs are met. The Information Sharing Governance Board (ISGB), along with the Information Sharing Coordinating Council (ISCC) and other mission coordination bodies, will work with the HSIN Program Manager to make certain that the requirements are captured, reviewed, and, if appropriate, implemented into the HSIN program change management process. DHS will adapt its tactics and timeline as needed using the phased deployment strategy and a segment architecture approach. Future phases of HSIN NextGen will create improved versions based upon continued input from HSIN users. Currently, and moving forward in future phases, improvements to HSIN have been and will continue to be driven by the input of Federal, State, local, private sector, and tribal users with each phase improving upon the last. We anticipate that once HSIN users have a chance to understand and use the upgraded HSIN capabilities, they will suggest additional improvements or enhancements. These requests will translate into requirements to be submitted into the HSIN change management process and then incorporated into subsequent phases of the HSIN NextGen project. To ensure success, a governance structure was initiated that integrated a larger segment architecture framework and the phased implementation approach. This structure continues to evolve to ensure that all stakeholders are involved and end user requirements are accurately captured, vetted, managed, and implemented. Key program activities and decisions are guided by DHS policies, processes, and procedures for consistency, repeatability, and compliance. The HSIN governance structure allows HSIN program resources to engage with mission leaders from all segments to determine whether HSIN is an appropriate solution for that target segment. If so, the governance structure allows us to identify mission requirements of that segment community and determine whether HSIN can meet those requirements in a timely, cost effective manner. The Department will move forward with the implementation of additional capabilities for new or existing mission areas based on whether HSIN can meet those requirements in a timely, cost effective manner. Once that determination is made, additional capabilities will be designed, developed, and validated with participation from stakeholders. Recommendation: Ensuring effective risk management by identifying all key risks surrounding the project and developing risk mitigation plans and completion milestones: The HSIN Program Team exercises a proactive approach to risk. OPS identifies and mitigate risks before they manifest as schedule slippage, cost overruns, and unsatisfied requirements. Our risk management approach incorporates a continuing, closed-loop review and analysis of technical, programmatic, cost, and schedule risks throughout the entire program lifecycle. OPS uses proven management toolsets for detailed documentation and tracking of all identified risks/problems from point of discovery through risk resolution (e.g. web portals to facilitate user entry, tracking, reporting and maintenance of a centralized repository for all deliverables and product information). Our risk management approach monitors overall program health to ensure goals are being met. The Risk Management Plan consists of the following key areas: * Risk Identification: Project managers are responsible for proactively identifying and documenting potential problems, issues, risks and dependencies at every program level; * Risk Reporting: Project managers conduct regular issue/risk review meetings to ensure risks are reported appropriately and in a timely manner. Prior to the internal program review (IPR), probability-of- occurrence and consequence-of-failure analyses are conducted to quantify and rank all identified risks; * Risk Mitigation Strategy: In addition to routine risk reporting, project manager are responsible for mitigation strategies for every risk that is identified. Impacted areas and/or systems, resources and skills required, as well as potential level of effort to provide resolution, are captured in the strategy; * Risk Escalation: Risks ranked high and medium may require special attention and/or action plans for mitigation, thus the overall Risk Management plans include an escalation path based on risk category and impacted area; I look forward to working with you to ensure that user communities that depend upon HSIN are able to accomplish their missions. If I may be of further assistance, please contact my office. Sincerely, Signed by: Roger T. Rufe, Jr.: [End of section] Appendix III: GAO Contact and Staff Acknowledgments: GAO Contact: David A. Powner, (202) 512-9286 or pownerd@gao.gov: Staff Acknowledgments: In addition to the contact named above, the following staff also made key contributions to this report: Gary Mountjoy, Assistant Director; Barbara Collier; Kaelin Kuhn; Rebecca LaPaze; and Lori Martinez. [End of section] Footnotes: [1] GAO, High-Risk Series: An Update, GAO-05-207 (Washington, D.C.: January 2005). [2] GAO, High-Risk Series: An Update, GAO-07-310 (Washington, D.C.: January 2007). [3] Role-based access controls limit system functions based on a user's designated role. [4] Two-factor authentication is a way of verifying someone's identity by using two of the following: something the user knows (password), something the user has (badge), or something unique to the user (fingerprint). [5] For example, GAO, Information Technology: Management Improvements Needed on Immigration and Customs Enforcement's Infrastructure Modernization Program, GAO-05-805 (Washington, D.C.: Sept. 7, 2005) and Census Bureau: Important Activities for Improving Management of Key 2010 Decennial Acquisitions Remain to be Done, GAO-06-444T (Washington, D.C.: Mar. 1, 2006). [6] The Homeland Security Act of 2002 directed DHS to establish communications to share homeland security information with federal agencies, state and local governments, and other specified groups. [7] GAO, High-Risk Series: An Update, GAO-05-207 (Washington, D.C.: January 2005). [8] GAO, High-Risk Series: An Update, GAO-07-310 (Washington, D.C.: January 2007). [9] Carnegie Mellon Software Engineering Institute, Capability Maturity Model® Integration for Acquisition (CMMI-ACQ), Version 1.2 (November 2007). [10] For example, GAO, Information Technology: Management Improvements Needed on Immigration and Customs Enforcement's Infrastructure Modernization Program, GAO-05-805 (Washington, D.C.: Sept. 7, 2005) and Census Bureau: Important Activities for Improving Management of Key 2010 Decennial Acquisitions Remain to be Done, GAO-06-444T (Washington, D.C.: Mar. 1, 2006). [11] Homeland Security Act of 2002, Pub. L. No. 107-296 (Nov. 25, 2002). [12] The critical infrastructure sectors include agriculture and food; banking and finance; chemical; commercial facilities; commercial nuclear reactors, materials, and waste; communications; critical manufacturing; dams; defense industrial base; drinking water and water treatment systems; emergency services; energy; government facilities; information technology; national monuments and icons; postal and shipping; public health and health care; and transportation systems. [13] GAO, Information Technology: Numerous Federal Networks Used to Support Homeland Security Need to Be Better Coordinated with Key State and Local Information-Sharing Initiatives, GAO-07-455 (Washington, D.C.: April 16, 2007). [14] GAO, Critical Infrastructure Protection: Sector Plans and Sector Councils Continue to Evolve, GAO-07-706R (Washington, D.C.: July 10, 2007). [15] The department issued a cost-plus-fixed-fee task order under the Enterprise Acquisition Gateway for Leading Edge Solutions (EAGLE). EAGLE is a DHS multiple award indefinite-delivery/indefinite-quantity contract, under which DHS conducted a competition for the HSIN Next Gen task order. [16] For example, GAO-05-805 and GAO-06-444T. [17] Carnegie Mellon Software Engineering Institute, Capability Maturity Model Integration for Acquisition (CMMI-ACQ), Version 1.2 (November 2007). [18] Carnegie Mellon Software Engineering Institute, Capability Maturity Model® Integration for Acquisition (CMMI-ACQ), Version 1.2 (November 2007).

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.