Homeland Security Grant Program Risk-Based Distribution Methods
Presentation to Congressional Committees - November 14, 2008 and December 15, 2008
Gao ID: GAO-09-168R December 23, 2008
This report formally transmits the briefing in response to P.L. 110-329, the Consolidated Security, Disaster Assistance and Continuing Appropriations Act, that required GAO for the fourth year to review the methodology the Department of Homeland Security (DHS) and the Federal Emergency Management Agency (FEMA) use to allocate Homeland Security Grant Program (HSGP) grants, including the risk assessment methodology they use to determine which urban areas are eligible to apply for grants. HSGP includes the State Homeland Security Program (SHSP) and Urban Areas Security Initiative (UASI) grants. Our objective was to identify any changes in the methodology for risk assessment and grant allocation for 2009 and to assess the reasonableness of the methodology. We analyzed DHS and FEMA documents including the fiscal year 2008 and 2009 risk analysis models and grant guidance and interviewed DHS and FEMA officials about the changes in the 2009 model. We did our work between October and December 2008 in accordance with generally accepted government auditing standards. We briefed the mandated reporting committees with two briefings in November 2008 and December 2008 on the results of our analysis.
DHS has adopted a process of continuing improvement in its methods for assessing risk and measuring grant applicants' effective use of resources. SHSP and UASI grant allocations continue to be based on a three-step process: (1) risk assessments to determine areas eligible to apply for grants, (2) effectiveness assessments of the grant applicants' investment justifications, and (3) final grant allocations. The methodology is described in detail in our 2008 report. There were minor changes in the risk assessment for 2009 and no changes in the process used for the effectiveness assessment and final grant allocations. Generally, we found that DHS has constructed a reasonable methodology to assess risk and allocate funds. DHS uses empirical risk analysis and policy judgments to select the urban areas eligible for grants (all SHSP grantees are guaranteed a specified minimum percentage of available grant funds) and to allocate SHSP and UASI funds. DHS continued to include three basic variables in its risk assessment--threat, vulnerability, and consequences. For fiscal year 2009, DHS changed some elements of the inputs used for the threat, economic, and national security indexes used in the model. The value of each of these indices is given a specific weight in the risk assessment (for example, the threat index is weighted at 20 percent and the population index at 40 percent of the final risk score). DHS continued to consider all areas of the nation equally vulnerable to a successful terrorist attack and assigned every state and urban area a vulnerability score of 1.0 in the risk analysis model. Thus, as a practical matter, the final risk scores are determined by the threat and consequences scores. The result of the UASI risk assessment is a list of UASI jurisdictions eligible for grants. A total of 62 urban areas were eligible for grants in 2009 (60 were eligible in 2008). In response to grantee feedback, in 2009, DHS for the first time provided each eligible State and UASI area its estimated target grant allocation in the Fiscal Year 2009 Homeland Security Grant Program Guidance and Application Kit. FEMA believes this change will enable grantees to better target their investment justifications in their grant applications as the amounts requested should more closely match final actual allocations. Applicants may submit applications for up to 110 percent of their targeted allocation. Final 2009 allocations will be based on the targeted allocations as adjusted by applicants' effectiveness scores, up to a maximum of plus or minus 10 percent of their targeted allocation. As in 2008, the seven urban areas with the highest risk scores (Tier I) will be collectively allocated 55 percent of total available fiscal year 2009 funds and the remaining 55 urban areas (Tier II) will be collectively allocated 45 percent.
GAO-09-168R, Homeland Security Grant Program Risk-Based Distribution Methods: Presentation to Congressional Committees - November 14, 2008 and December 15, 2008
This is the accessible text file for GAO report number GAO-09-168R
entitled 'Homeland Security Grant Program Risk-Based Distribution
Methods: Presentation to Congressional Committees - November 14, 2008
and December 15, 2008' which was released on December 24, 2008.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
GAO-09-168R:
United States Government Accountability Office:
Washington, DC 20548:
December 23, 2008:
Congressional Committees:
Subject: Homeland Security Grant Program Risk-Based Distribution
Methods: Presentation to Congressional Committees - November 14, 2008
and December 15, 2008:
This report formally transmits the attached briefing in response to
P.L. 110-329, the Consolidated Security, Disaster Assistance and
Continuing Appropriations Act, that required GAO for the fourth year to
review the methodology the Department of Homeland Security (DHS) and
the Federal Emergency Management Agency (FEMA) use to allocate Homeland
Security Grant Program (HSGP) grants, including the risk assessment
methodology they use to determine which urban areas are eligible to
apply for grants. HSGP includes the State Homeland Security Program
(SHSP) and Urban Areas Security Initiative (UASI) grants. Our objective
was to identify any changes in the methodology for risk assessment and
grant allocation for 2009 and to assess the reasonableness of the
methodology. We analyzed DHS and FEMA documents including the fiscal
year 2008 and 2009 risk analysis models and grant guidance and
interviewed DHS and FEMA officials about the changes in the 2009 model.
We did our work between October and December 2008 in accordance with
generally accepted government auditing standards. We briefed the
mandated reporting committees with two briefings in November 2008 and
December 2008 on the results of our analysis. A copy of the final
briefing is enclosed.
DHS has adopted a process of continuing improvement in its methods for
assessing risk and measuring grant applicants' effective use of
resources. SHSP and UASI grant allocations continue to be based on a
three-step process: (1) risk assessments to determine areas eligible to
apply for grants, (2) effectiveness assessments of the grant
applicants' investment justifications, and (3) final grant allocations.
The methodology is described in detail in our 2008 report.[Footnote 1]
There were minor changes in the risk assessment for 2009 and no changes
in the process used for the effectiveness assessment and final grant
allocations. Generally, we found that DHS has constructed a reasonable
methodology to assess risk and allocate funds. DHS uses empirical risk
analysis and policy judgments to select the urban areas eligible for
grants (all SHSP grantees are guaranteed a specified minimum percentage
of available grant funds) and to allocate SHSP and UASI funds.
DHS continued to include three basic variables in its risk assessment-
-threat, vulnerability, and consequences. For fiscal year 2009, DHS
changed some elements of the inputs used for the threat, economic, and
national security indexes used in the model. The value of each of these
indices is given a specific weight in the risk assessment (for example,
the threat index is weighted at 20 percent and the population index at
40 percent of the final risk score). DHS continued to consider all
areas of the nation equally vulnerable to a successful terrorist attack
and assigned every state and urban area a vulnerability score of 1.0 in
the risk analysis model. Thus, as a practical matter, the final risk
scores are determined by the threat and consequences scores.
The result of the UASI risk assessment is a list of UASI jurisdictions
eligible for grants. A total of 62 urban areas were eligible for grants
in 2009 (60 were eligible in 2008). In response to grantee feedback, in
2009, DHS for the first time provided each eligible State and UASI area
its estimated target grant allocation in the Fiscal Year 2009 Homeland
Security Grant Program Guidance and Application Kit. FEMA believes this
change will enable grantees to better target their investment
justifications in their grant applications as the amounts requested
should more closely match final actual allocations. Applicants may
submit applications for up to 110 percent of their targeted allocation.
Final 2009 allocations will be based on the targeted allocations as
adjusted by applicants' effectiveness scores, up to a maximum of plus
or minus 10 percent of their targeted allocation. As in 2008, the seven
urban areas with the highest risk scores (Tier I) will be collectively
allocated 55 percent of total available fiscal year 2009 funds and the
remaining 55 urban areas (Tier II) will be collectively allocated 45
percent.
We are not making any new recommendations for congressional
consideration or agency action. However, we note that DHS has not taken
action to address our recommendation from last year's report that "the
Secretary of DHS formulate a method to measure vulnerability that
captures variations across states and urban areas, and apply this
vulnerability measure in future iterations of this risk-based grant
allocation model." FEMA and DHS concurred with the recommendation. In
its comments on a draft of our briefing slides, FEMA officials stated
that their ability to make a substantial change to the vulnerability
calculation was limited by (1) the timing of the fiscal year 2009 roll-
out "on the heels" of the fiscal year 2008 allocations and (2) DHS
leadership's desire to minimize year-to-year changes. We continue to
believe that FEMA should formulate a method to measure vulnerability
that captures variations across jurisdictions. DHS has completed
vulnerability assessments for critical infrastructure and surface
transportation modes that could be of potential use in assessing
variations in vulnerability across jurisdictions.
FEMA's officials also told us that the Grant Directorate is developing
a Cost-to-Capability (C2C) initiative that could, among its other
purposes, potentially serve as a proxy measure for vulnerability to an
international terrorist incident. Still in its early stages, C2C
focuses on efforts to measure a jurisdiction's capability to prevent
and respond to various types of disasters compared to a target level of
capability. To measure capability, the C2C initiative will use DHS's 15
National Planning Scenarios of terrorist and nonterrorist disaster
incidents, and the target capabilities developed using those scenarios.
Those target capabilities are currently being revised. With regard to
vulnerability, the concept behind C2C is that the more capable an area
is to prevent and respond to a terrorist attack, the less vulnerable it
is. However, as designed, C2C results will not directly measure
vulnerability. In its agency comments FEMA noted that the extent to
which C2C will help measure vulnerability is yet to be determined.
We are sending copies of this report to the appropriate congressional
committees, the Secretary of Homeland Security, and other interested
parties. This report will also be available at no charge on our Web
site at [hyperlink, http://www.gao.gov]. Should you or your staff have
any questions concerning this report, please contact me at (202) 512-
8757 or jenkinsWO@gao.gov. Contact points for our Offices of
Congressional Relations and Public Affairs may be found on the last
page of this report. Key contributors to this report were Chris
Keisling, Assistant Director; Charles Bausell, Assistant Director; John
Vocino; Orlando Copeland; and Perry Lusk.
Signed by:
William O. Jenkins:
Director, Homeland Security and Justice Issues:
List of Committees:
The Honorable Robert C. Byrd, Chairman:
The Honorable Thad Cochran, Ranking Member:
Committee on Appropriations:
United States Senate:
The Honorable David R. Obey, Chair:
The Honorable Jerry Lewis, Ranking Member:
Committee on Appropriations:
House of Representatives:
[End of section]
Enclosure: Briefing Slides:
Homeland Security Grant Program (HSGP) Risk-Based Distribution Methods:
Presentation to Congressional Committees:
November 14, 2008 and December 15, 2008:
Introduction:
According to the Department of Homeland Security (DHS):
* DHS will make available approximately $1.7 billion to states and
urban areas through its FY 2009 Homeland Security Grant Program (HSGP)
to prevent, protect against, respond to, and recover from acts of
terrorism or other catastrophic events.
* The HSGP risk-based allocation process is used for the State Homeland
Security Program (SHSP) and Urban Areas Security Initiative (UASI).
* DHS‘s grant programs are managed by the Federal Emergency Management
Agency‘s (FEMA) Grants Program Directorate.
Objectives:
Since FY 2006, GAO has responded to a legislative mandate to review the
grant program and assess its allocation method.
This year we are addressing the following question:
* What methodology did DHS use to allocate HSGP funds, including any
changes DHS made to the eligibility and allocation processes, and how
reasonable is DHS‘s methodology?
Scope and Methodology:
We analyzed DHS documents including the FY 2008 and FY 2009 risk
analysis models and grant guidance, and interviewed DHS officials
about:
* The changes, if any, to the HSGP FY 2009 grant eligibility and
allocation processes:
- The process by which DHS‘s risk analysis model is used to estimate
relative risk: Risk = Threat x ’Vulnerability & Consequences.“
- How the effectiveness assessment process is conducted.
- How final allocation decisions are made.
We did our work from October 2008 to December 2008 in accordance with
generally accepted government auditing standards.
We initially briefed congressional staff on November 14, 2008, adding
information on the Cost-to-Capability initiative for the December 15
briefing.
Results in Brief:
Our 2009 review found that compared to 2008:
* There was no change in DHS‘s basic approach.
* Allocation method remains reasonable, but Vulnerability measure
remains limited.
* DHS used same three-step process: (1) risk analysis to determine
eligible UASI areas, (2) effectiveness assessment of applicants‘
investment proposals, and (3) final allocation decisions.
- Risk analysis model = minimal changes.
- Criteria for one Threat Index tier changed.
- Data source within Economic Index changed; two sources added in
National Security Index.
- Risk analysis results in list of UASI areas eligible for funding. New
in FY 2009, DHS provided grantees their estimated target allocations in
the Homeland Security Grant Program Guidance and Application Kit.
- Effectiveness assessment process = no changes.
- Final grant allocation = no changes.
Background:
We‘ve reviewed this program for the last four grant cycles. In previous
reviews we reported:
* Inherent uncertainty is associated with estimating risk of terrorist
attack, requiring the application of policy and analytic judgments. The
use of sensitivity analysis can help to gauge what effects key sources
of uncertainty have on outcomes.
* DHS has adopted a process of ’continuing improvement“ to its methods
for estimating risk and measuring applicants‘ effectiveness.
Background: Evolution of DHS‘s Risk-Based Formula:
Figure: Timeline:
[Refer to PDF for image]
Department of Justice-run program: 2001;
9/11/2001: Begin Stage 1;
Stage 1: R=P; Fiscal years 2001-2003;
10/26/2001: USA Patriot Act;
11/25/2002: Homeland Security Act.
Stage 2: R=T+Cl+PD; Fiscal years 2004-2005;
Stage 3: R=T*V*C*; Fiscal year 2006.
Stage 4: R=T* "V&C"; Fiscal years 2007-2008;
08/03/2008: 9/11 Act.
Source: GAO analysis based on Congressional Research Service.
Definitions for the formulas above:
R=P: represents Risk equals population;
R=T+Cl+PD: represents Risk equals Threat plus Critical Infrastructure
plus Population Density;
R=T*V*C*: represents Risk equals Threat times Vulnerability times
Consequences;
R=T* "V&C": represents DHS's presentation of the risk calculation
formula used in their risk analysis model for 2007-2009.
[End of figure]
Background: Overview of the HGSP Grant Determination Process (UASI and
SHSP):
Since 2006, DHS has applied a three-step process”using analytical
methods and policy judgments”to select eligible urban areas and
allocate SHSP and UASI funds:
1. Use of a risk analysis formula (R = T times ’V&C“) with the same
basic indices (e.g., threat, economic), and weights results in list of
eligible UASI areas.
2. Implementation of an effectiveness assessment, including a peer
review process, to assess and score the effectiveness of the proposed
investments submitted by the eligible applicants.
3. Calculation of a final allocation of funds based on state‘s and
urban areas‘ risk scores as adjusted by their effectiveness scores.
Background: Overview of the Grant Allocation Methodology for UASI and
SHSG:
Figure: Grant Allocation Methodology for UASI and SHSG:
[Refer to PDF for image]
UASI:
Phase I: Risk Analysis;
Relative risk estimate; produces risk score for urban areas;
Phase II: Effectiveness assessment:
Peer review of investment justifications;
Effectiveness score is produced;
Phase III: Final allocation;
Effectiveness/risk matrix is used to determine grant allocation.
SHSP:
Phase I: Risk Analysis;
Relative risk estimate; produces risk score for states and territories;
Phase II: Effectiveness assessment:
Peer review of investment justifications;
Effectiveness score is produced;
Phase III: Final allocation;
Effectiveness/risk matrix is used to determine grant allocation;
Statutory minimum: .365%[A].
Source: GAO analysis of DHS documents and information provided in
interviews.
[A] Statutory minimum for FY 2009: 0.365% of the total amount of funds
appropriated for SHSP plus IASI grants.
[End of figure]
Risk Analysis in FY 2009: Model Used in Determining Relative Risk
Scores:
Figure: Model Used in Determining Relative Risk Scores:
[Refer to PDF for image]
Risk equals: Threat Index times Vulnerability and Consequence Index.
Components of Threat Index:
* Data: Ongoing plotlines, credible reporting, relevant investigations
to create threat tiers;
* Source: Intelligence Community reporting.
Components of Vulnerability and Consequence Index V&C=(P+E+I+N):
* Population Index:
Data: Population (nighttime, Commuter, Visitor) and Population Density;
Source: Census, Smith Travel.
* Economic Index:
Data: Gross Domestic Product;
Source: Department of Commerce; Bureau of Economic Statistics.
* National Infrastructure Index:
Data: # Tier 1 Assets (x3) + # Tier 3 Assets;
Source: DHS/QIP, SSAs, states and territories.
* National Security Index:
Data: Number of Defense Industrial Base (DIB) Facilities, Military
Personnel, International Border Crossings, Presence of Coastline,
International Border;
Source: DOD. DHS/CBP.
Population Index: 40%;
Economic Index: 20%;
Threat Index: 20%;
National Infrastructure Index: 15%;
National Security Index: 5%.
Source: DHS.
Note: "DHS/OIP" Stands for DHS's Office of Infrastructure Protection.
"SSAs" stands for Sector-Specific Agencies, which are federal
departments and agencies identified in the National Infrastructure Plan
as responsible for critical infrastructure protection activities. "DOD"
stands for the Department of Defense. "DHS/CBP" stands for the DHS's
Customs and Border Protection.
[End of figure]
Risk Analysis Model: Calculating Threat:
Threat Index:
* Reflects the intelligence community‘s best assessment of areas of the
country and potential targets most likely to be attacked.
* Process considers threat information from the intelligence community
of ongoing plotlines and credible threats from international terrorist
networks and affiliates.
For FY 2009 model, criteria for one of the four threat tiers changed to
reflect updated intelligence assessment.
DHS”Intelligence and Analysis (I&A)”reported additional processes
implemented to consult with states on threat information.
Risk Analysis Model: Calculating Vulnerability and Consequences
(’V&C“):
* Few changes made to the model, primarily data and process
improvements, according to DHS officials.
* Vulnerability is still considered to be constant across all
jurisdictions and in the risk formula is assigned a value of 1.0 for
all jurisdictions.
Consequences:
Population Index:
* No changes.
Economic Index:
* Data source changed from that of a private company to an annually
updated data set from the U.S. Commerce Department‘s Bureau of Economic
Analysis.
National Infrastructure Index:
* No changes.
National Security Index:
* Additional data sources were added to improve the index.
1. The number of military personnel and the number of critical defense
industrial base facilities.
2. Presence of borders or coastline as determined by U.S. Customs and
Border Protection inspection.
- Each jurisdiction received either full credit or none.
Vulnerability is a crucial component of risk assessment.
In June 2008, we reported that[Footnote 2]:
* While DHS has constructed a reasonable methodology to allocate funds
within a given year, the Department needs to measure Vulnerability to
capture variations in vulnerability across states and urban areas.
As a result, we recommended:
* ’that the Secretary of DHS formulate a method to measure
Vulnerability that captures variations across states and urban areas,
and apply this Vulnerability measure in future iterations of this risk-
based grant allocation model.“
Vulnerability Element of DHS‘s Risk Analysis Model Has Limitations that
Reduce Its Value:
Status of DHS‘s response to our recommendation:
* FEMA and I&A agreed that the current methodology for determining
Vulnerability is not the optimum approach.
* FEMA officials told us they have not identified a means of measuring
Vulnerability effectively across all states and urban areas, but had
little time between the 2008 and 2009 cycles to consider alternatives.
* Instead, FEMA‘s Grant Directorate has focused its resources on
launching an inverse approach called Cost-to-Capability (C2C) that is
in its early stages. C2C focuses on efforts to measure a jurisdiction‘s
capability to prevent and respond to various types of disasters
compared to a target level of capability.
* As its organizing structure, the C2C initiative uses DHS‘s National
Planning Scenarios of terrorist and nonterrorist disaster incidents,
and the target capabilities developed using those scenarios.
Grant Programs Directorate‘s Cost to Capability Initiative (C2C) Being
Developed:
C2C is being developed by FEMA‘s Grant Management Directorate and is
intended to be a decision support system to enable that Directorate to
effectively manage FEMA‘s grant portfolio and to assist grant recipients
optimize the use of their grant funds.
One critical element of C2C”identifying the importance of each
capability to each of the 15 planning scenarios used to develop target
capabilities”is still under development.
FEMA‘s intends to provide C2C as a tool that uses a common language
and analytical framework to help state and local stakeholders make
better investment decisions.
Grantee use of C2C will not be mandatory.
As designed, C2C results will not directly measure Vulnerability or
preparedness.
Cost to Capability Initiative (C2C) Faces Implementation Challenges:
To date, national capability assessments have been based on state self-
assessments whose comparability, reliability, accuracy, and data
validity are uncertain.
Input data for C2C is to be based on self assessments of capabilities
from state preparedness plans, estimates of baseline capability, and the
estimated relative capability improvement expected from a requested
level of investment.
For states to use C2C effectively, the state and local data used for
assessing state and local capabilities must be in the common language of
Target Capabilities and must have metrics that are compatible with C2C.
These metrics are being developed by FEMA‘s National Preparedness
Directorate.
The potential for successful use of C2C as a national capability
assessment tool is limited by the variations in the analytical skill
levels across state and local users of C2C, according to FEMA.
FEMA/Grant Programs Directorate‘s Cost to Capability Initiative (C2C):
Figure: FEMA/Grant Programs Directorate‘s Cost to Capability Initiative
(C2C):
[Refer to PDF for image]
Step 1: Connect Grant Dollars Awarded to Planned Activities:
Analysis of Investment Purpose:
Grant Applications, Progress Reporting, Monitoring Reports, and Grant
Closeout Reports.
Analysis of Investment Cost:
Award Notices, Progress Reporting, Grant Closeout Reports.
Step 2: Use a Capability Framework to Align Grant Dollars to Common
Variables:
Capability Framework: Built from the Target Capabilities List and other
Industry Standards:
Common Variables: V1 = Capacity;
Capability A: Measure 1; Measure 2; Measure 3;
Capability B: Measure 1; Measure 2.
Common Variables: V2= Resiliency;
Capability A: Measure 1; Measure 2;
Capability B: Measure 1.
Common Variables: V3= Sustainment;
Capability A: Measure 1; Measure 2;
Capability B: Measure 1; Measure 2.
Common Variables: V4= To be determined;
Capability A: Measure 1; Measure 2;
Capability B: Measure 1; Measure 2; Measure 3.
Step 3: Cost-to-Capability Analysis (Note: The Cost-to-Capability
Requirements Documents and Concept of Operations are scheduled for
release in August 2008):
Integrate external factors which affect the relationship between cost
and capability (e.g., population).
Cost-to-Capability Approach: (Utilizing stakeholder input at each
step):
Gather data;
Pulse SMEs to quantify relationships between data;
Inform Budget Formulation, Policy Decisions, and Programmatic
Decisions;
Identify data needed to inform key decisions.
Source: FEMA/Grants Programs Directorate.
[End of figure]
DHS Has Not Used Data that Could Inform Risk Model Vulnerability
Inputs:
DHS has made some efforts to measure vulnerability for specific assets
across the nation. We reported in 2007 that DHS had[Footnote 3]
* Assessed vulnerability of assets within surface transportation modes
(mass transit, freight rail, and highway infrastructure).
* Conducted over 2,600 vulnerability assessments on every critical
infrastructure sector through the Comprehensive Review program, the
Buffer Zone Protection program, and the Site Assistance Visit program.
[Footnote 4]
DHS and FEMA could evaluate how these assessments could be used to
provide some differentiation in measures of Vulnerability used for its
risk model formula.
Sensitivity of the Risk Analysis Model:
GAO‘s analysis of the FY 2009 model:
* It takes moderate changes to the weights of the model‘s risk indices,
such as the weights given to the threat or economic indices, to change
the urban areas that compose the Tier 1 list, which are those areas
with the highest risk scores.
* The current model is more sensitive than the FY 2008 model.
* For those urban areas ranked near the bottom of the Tier 2 list,
modest changes in the weights for the indices used to quantify risk
can result in changes in eligibility.[Footnote 5]
* The current model is more sensitive than the FY 2008 model.
Effectiveness Assessment:
* No change in process for FY 2009.
Final Allocation Process – FY 2009 Grants Based on Both Risk and
Effectiveness Scores:
DHS/FEMA plans to allocate FY 2009 funds based on the risk scores of
states and urban areas, adjusted by a maximum of +/-10% by their
effectiveness scores.
2009 HSGP Grant Guidance provided grantees with their estimated target
grant allocations, rather than get allocations after effectiveness
assessment:
* FEMA responded to grantees‘ input in the 2008 grant after-action
conference.
* FEMA believes it enables grantees to better target the grant
justifications in their applications as amounts requested should more
closely match final actual allocations.
* FEMA officials anticipate this change will encourage grantees to
develop more targeted and realistic proposals that will be better linked
to capabilities and performance measures.
Final Allocation Process – Ranking UASI Grantees by Tiered Groups:
62 eligible UASI areas in FY 2009 (60 in 2008):
* Tier 1 = 7 highest risk areas and eligible for 55% of available
funds.
* Tier 2 = 55 areas (2 more than FY 2008) and eligible for 45% of
available funds.
* Same allocation between Tiers 1 and 2 as 2008.
According to DHS officials:
* Expansion from 60 to 62 eligible UASI areas for FY 2009 is a policy
decision driven by desire to provide program consistency for grantees.
* Department intends to review all Urban Areas for next grant cycle --
with the new DHS leadership -- to determine the appropriate number for
the UASI program.
Concluding Observations:
The FY 2009 HSGP risk allocation method continues the same approach we
deemed reasonable in 2008 and provides program continuity.
FEMA‘s continuing improvement efforts are reflected in changes including
data sets used, and providing grantees their target allocations at the
beginning of the FY 2009 grant cycle. Previously, grantees did not
receive target allocations, but only their final allocations following
the completion of the effectiveness assessment.
GAO‘s 2008 recommendation on Vulnerability measure remains unaddressed.
* FEMA‘s C2C initiative does not address our concerns about measuring
Vulnerability.
GAO is not issuing new recommendations with this report.
Agency Comments:
FEMA provided comments on both the November 14 and December 15 versions
drafts of this briefing. With respect to the Vulnerability element of
DHS‘s Risk Analysis Model, FEMA provided written comments via e-mail
that:
* It believes its ability to make a substantial change to the
Vulnerability calculation was limited by (1) the timing of its FY 2009
roll-out ’on the heels“ of FY 2008 and (2) the department's leadership
desire to minimize year-to-year changes.
* ’it has been suggested that DHS should identify a distinct
Vulnerability term for each of the four risk indices and multiply it
against the Consequence terms, which would result in a more precise
risk allocation that reflects Vulnerability as well as Threat and
Consequence.“
FEMA also provided technical comments that we incorporated as
appropriate.
[End of briefing slides]
Footnotes:
[1] GAO, Homeland Security: DHS Risk-Based Methodology is Reasonable,
But Current Version's Measure of Vulnerability is Limited, [hyperlink,
http://www.gao.gov/products/GAO-08-852] (Washington, D.C.: June 2008).
[2] GAO, Homeland Security: DHS Risk-Based Grant Methodology Is
Reasonable, But Current Version's Measure of Vulnerability is Limited,
[hyperlink, http://www.gao.gov/products/GAO-08-852] (Washington, D.C.:
June 2008).
[3] GAO, Department Of Homeland Security: Progress Report on
Implementation of Mission and Management Functions, [hyperlink,
http://www.gao.gov/products/GAO-07-454] (Washington, D.C.: August
2007).
[4] DHS describes the Comprehensive Review as a structured,
collaborative government and private sector analysis of high value
critical infrastructure and key resources facilities. Through the
Buffer Zone Protection Program, and with the support of DHS, local
authorities develop Buffer Zone Protection Plans, which DHS reported
have several purposes, including identifying specific threats and
vulnerabilities associated with the buffer zone and analyzing the level
of risk associated with each vulnerability. DHS describes the Site
Assistance Visit Program as an information gathering visit with several
goals, such as better understanding and prioritizing vulnerabilities of
critical infrastructure and key resources and increasing awareness of
threats and vulnerabilities among critical infrastructure and key
resources owners and operators.
[5] The specific data on these changes is Sensitive Security
information.
[End of section]
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "E-mail Updates."
Order by Phone:
The price of each GAO publication reflects GAO‘s actual cost of
production and distribution and depends on the number of pages in the
publication and whether the publication is printed in color or black and
white. Pricing and ordering information is posted on GAO‘s Web site,
[hyperlink, http://www.gao.gov/ordering.htm].
Place orders by calling (202) 512-6000, toll free (866) 801-7077, or
TDD (202) 512-2537.
Orders may be paid for using American Express, Discover Card,
MasterCard, Visa, check, or money order. Call for additional
information.
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Ralph Dawn, Managing Director, dawnr@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, D.C. 20548:
Public Affairs:
Chuck Young, Managing Director, youngc1@gao.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, D.C. 20548: