Homeland Security Grant Program Risk-Based Distribution Methods

Presentation to Congressional Committees - November 14, 2008 and December 15, 2008 Gao ID: GAO-09-168R December 23, 2008

This report formally transmits the briefing in response to P.L. 110-329, the Consolidated Security, Disaster Assistance and Continuing Appropriations Act, that required GAO for the fourth year to review the methodology the Department of Homeland Security (DHS) and the Federal Emergency Management Agency (FEMA) use to allocate Homeland Security Grant Program (HSGP) grants, including the risk assessment methodology they use to determine which urban areas are eligible to apply for grants. HSGP includes the State Homeland Security Program (SHSP) and Urban Areas Security Initiative (UASI) grants. Our objective was to identify any changes in the methodology for risk assessment and grant allocation for 2009 and to assess the reasonableness of the methodology. We analyzed DHS and FEMA documents including the fiscal year 2008 and 2009 risk analysis models and grant guidance and interviewed DHS and FEMA officials about the changes in the 2009 model. We did our work between October and December 2008 in accordance with generally accepted government auditing standards. We briefed the mandated reporting committees with two briefings in November 2008 and December 2008 on the results of our analysis.

DHS has adopted a process of continuing improvement in its methods for assessing risk and measuring grant applicants' effective use of resources. SHSP and UASI grant allocations continue to be based on a three-step process: (1) risk assessments to determine areas eligible to apply for grants, (2) effectiveness assessments of the grant applicants' investment justifications, and (3) final grant allocations. The methodology is described in detail in our 2008 report. There were minor changes in the risk assessment for 2009 and no changes in the process used for the effectiveness assessment and final grant allocations. Generally, we found that DHS has constructed a reasonable methodology to assess risk and allocate funds. DHS uses empirical risk analysis and policy judgments to select the urban areas eligible for grants (all SHSP grantees are guaranteed a specified minimum percentage of available grant funds) and to allocate SHSP and UASI funds. DHS continued to include three basic variables in its risk assessment--threat, vulnerability, and consequences. For fiscal year 2009, DHS changed some elements of the inputs used for the threat, economic, and national security indexes used in the model. The value of each of these indices is given a specific weight in the risk assessment (for example, the threat index is weighted at 20 percent and the population index at 40 percent of the final risk score). DHS continued to consider all areas of the nation equally vulnerable to a successful terrorist attack and assigned every state and urban area a vulnerability score of 1.0 in the risk analysis model. Thus, as a practical matter, the final risk scores are determined by the threat and consequences scores. The result of the UASI risk assessment is a list of UASI jurisdictions eligible for grants. A total of 62 urban areas were eligible for grants in 2009 (60 were eligible in 2008). In response to grantee feedback, in 2009, DHS for the first time provided each eligible State and UASI area its estimated target grant allocation in the Fiscal Year 2009 Homeland Security Grant Program Guidance and Application Kit. FEMA believes this change will enable grantees to better target their investment justifications in their grant applications as the amounts requested should more closely match final actual allocations. Applicants may submit applications for up to 110 percent of their targeted allocation. Final 2009 allocations will be based on the targeted allocations as adjusted by applicants' effectiveness scores, up to a maximum of plus or minus 10 percent of their targeted allocation. As in 2008, the seven urban areas with the highest risk scores (Tier I) will be collectively allocated 55 percent of total available fiscal year 2009 funds and the remaining 55 urban areas (Tier II) will be collectively allocated 45 percent.



GAO-09-168R, Homeland Security Grant Program Risk-Based Distribution Methods: Presentation to Congressional Committees - November 14, 2008 and December 15, 2008 This is the accessible text file for GAO report number GAO-09-168R entitled 'Homeland Security Grant Program Risk-Based Distribution Methods: Presentation to Congressional Committees - November 14, 2008 and December 15, 2008' which was released on December 24, 2008. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. GAO-09-168R: United States Government Accountability Office: Washington, DC 20548: December 23, 2008: Congressional Committees: Subject: Homeland Security Grant Program Risk-Based Distribution Methods: Presentation to Congressional Committees - November 14, 2008 and December 15, 2008: This report formally transmits the attached briefing in response to P.L. 110-329, the Consolidated Security, Disaster Assistance and Continuing Appropriations Act, that required GAO for the fourth year to review the methodology the Department of Homeland Security (DHS) and the Federal Emergency Management Agency (FEMA) use to allocate Homeland Security Grant Program (HSGP) grants, including the risk assessment methodology they use to determine which urban areas are eligible to apply for grants. HSGP includes the State Homeland Security Program (SHSP) and Urban Areas Security Initiative (UASI) grants. Our objective was to identify any changes in the methodology for risk assessment and grant allocation for 2009 and to assess the reasonableness of the methodology. We analyzed DHS and FEMA documents including the fiscal year 2008 and 2009 risk analysis models and grant guidance and interviewed DHS and FEMA officials about the changes in the 2009 model. We did our work between October and December 2008 in accordance with generally accepted government auditing standards. We briefed the mandated reporting committees with two briefings in November 2008 and December 2008 on the results of our analysis. A copy of the final briefing is enclosed. DHS has adopted a process of continuing improvement in its methods for assessing risk and measuring grant applicants' effective use of resources. SHSP and UASI grant allocations continue to be based on a three-step process: (1) risk assessments to determine areas eligible to apply for grants, (2) effectiveness assessments of the grant applicants' investment justifications, and (3) final grant allocations. The methodology is described in detail in our 2008 report.[Footnote 1] There were minor changes in the risk assessment for 2009 and no changes in the process used for the effectiveness assessment and final grant allocations. Generally, we found that DHS has constructed a reasonable methodology to assess risk and allocate funds. DHS uses empirical risk analysis and policy judgments to select the urban areas eligible for grants (all SHSP grantees are guaranteed a specified minimum percentage of available grant funds) and to allocate SHSP and UASI funds. DHS continued to include three basic variables in its risk assessment- -threat, vulnerability, and consequences. For fiscal year 2009, DHS changed some elements of the inputs used for the threat, economic, and national security indexes used in the model. The value of each of these indices is given a specific weight in the risk assessment (for example, the threat index is weighted at 20 percent and the population index at 40 percent of the final risk score). DHS continued to consider all areas of the nation equally vulnerable to a successful terrorist attack and assigned every state and urban area a vulnerability score of 1.0 in the risk analysis model. Thus, as a practical matter, the final risk scores are determined by the threat and consequences scores. The result of the UASI risk assessment is a list of UASI jurisdictions eligible for grants. A total of 62 urban areas were eligible for grants in 2009 (60 were eligible in 2008). In response to grantee feedback, in 2009, DHS for the first time provided each eligible State and UASI area its estimated target grant allocation in the Fiscal Year 2009 Homeland Security Grant Program Guidance and Application Kit. FEMA believes this change will enable grantees to better target their investment justifications in their grant applications as the amounts requested should more closely match final actual allocations. Applicants may submit applications for up to 110 percent of their targeted allocation. Final 2009 allocations will be based on the targeted allocations as adjusted by applicants' effectiveness scores, up to a maximum of plus or minus 10 percent of their targeted allocation. As in 2008, the seven urban areas with the highest risk scores (Tier I) will be collectively allocated 55 percent of total available fiscal year 2009 funds and the remaining 55 urban areas (Tier II) will be collectively allocated 45 percent. We are not making any new recommendations for congressional consideration or agency action. However, we note that DHS has not taken action to address our recommendation from last year's report that "the Secretary of DHS formulate a method to measure vulnerability that captures variations across states and urban areas, and apply this vulnerability measure in future iterations of this risk-based grant allocation model." FEMA and DHS concurred with the recommendation. In its comments on a draft of our briefing slides, FEMA officials stated that their ability to make a substantial change to the vulnerability calculation was limited by (1) the timing of the fiscal year 2009 roll- out "on the heels" of the fiscal year 2008 allocations and (2) DHS leadership's desire to minimize year-to-year changes. We continue to believe that FEMA should formulate a method to measure vulnerability that captures variations across jurisdictions. DHS has completed vulnerability assessments for critical infrastructure and surface transportation modes that could be of potential use in assessing variations in vulnerability across jurisdictions. FEMA's officials also told us that the Grant Directorate is developing a Cost-to-Capability (C2C) initiative that could, among its other purposes, potentially serve as a proxy measure for vulnerability to an international terrorist incident. Still in its early stages, C2C focuses on efforts to measure a jurisdiction's capability to prevent and respond to various types of disasters compared to a target level of capability. To measure capability, the C2C initiative will use DHS's 15 National Planning Scenarios of terrorist and nonterrorist disaster incidents, and the target capabilities developed using those scenarios. Those target capabilities are currently being revised. With regard to vulnerability, the concept behind C2C is that the more capable an area is to prevent and respond to a terrorist attack, the less vulnerable it is. However, as designed, C2C results will not directly measure vulnerability. In its agency comments FEMA noted that the extent to which C2C will help measure vulnerability is yet to be determined. We are sending copies of this report to the appropriate congressional committees, the Secretary of Homeland Security, and other interested parties. This report will also be available at no charge on our Web site at [hyperlink, http://www.gao.gov]. Should you or your staff have any questions concerning this report, please contact me at (202) 512- 8757 or jenkinsWO@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report were Chris Keisling, Assistant Director; Charles Bausell, Assistant Director; John Vocino; Orlando Copeland; and Perry Lusk. Signed by: William O. Jenkins: Director, Homeland Security and Justice Issues: List of Committees: The Honorable Robert C. Byrd, Chairman: The Honorable Thad Cochran, Ranking Member: Committee on Appropriations: United States Senate: The Honorable David R. Obey, Chair: The Honorable Jerry Lewis, Ranking Member: Committee on Appropriations: House of Representatives: [End of section] Enclosure: Briefing Slides: Homeland Security Grant Program (HSGP) Risk-Based Distribution Methods: Presentation to Congressional Committees: November 14, 2008 and December 15, 2008: Introduction: According to the Department of Homeland Security (DHS): * DHS will make available approximately $1.7 billion to states and urban areas through its FY 2009 Homeland Security Grant Program (HSGP) to prevent, protect against, respond to, and recover from acts of terrorism or other catastrophic events. * The HSGP risk-based allocation process is used for the State Homeland Security Program (SHSP) and Urban Areas Security Initiative (UASI). * DHS‘s grant programs are managed by the Federal Emergency Management Agency‘s (FEMA) Grants Program Directorate. Objectives: Since FY 2006, GAO has responded to a legislative mandate to review the grant program and assess its allocation method. This year we are addressing the following question: * What methodology did DHS use to allocate HSGP funds, including any changes DHS made to the eligibility and allocation processes, and how reasonable is DHS‘s methodology? Scope and Methodology: We analyzed DHS documents including the FY 2008 and FY 2009 risk analysis models and grant guidance, and interviewed DHS officials about: * The changes, if any, to the HSGP FY 2009 grant eligibility and allocation processes: - The process by which DHS‘s risk analysis model is used to estimate relative risk: Risk = Threat x ’Vulnerability & Consequences.“ - How the effectiveness assessment process is conducted. - How final allocation decisions are made. We did our work from October 2008 to December 2008 in accordance with generally accepted government auditing standards. We initially briefed congressional staff on November 14, 2008, adding information on the Cost-to-Capability initiative for the December 15 briefing. Results in Brief: Our 2009 review found that compared to 2008: * There was no change in DHS‘s basic approach. * Allocation method remains reasonable, but Vulnerability measure remains limited. * DHS used same three-step process: (1) risk analysis to determine eligible UASI areas, (2) effectiveness assessment of applicants‘ investment proposals, and (3) final allocation decisions. - Risk analysis model = minimal changes. - Criteria for one Threat Index tier changed. - Data source within Economic Index changed; two sources added in National Security Index. - Risk analysis results in list of UASI areas eligible for funding. New in FY 2009, DHS provided grantees their estimated target allocations in the Homeland Security Grant Program Guidance and Application Kit. - Effectiveness assessment process = no changes. - Final grant allocation = no changes. Background: We‘ve reviewed this program for the last four grant cycles. In previous reviews we reported: * Inherent uncertainty is associated with estimating risk of terrorist attack, requiring the application of policy and analytic judgments. The use of sensitivity analysis can help to gauge what effects key sources of uncertainty have on outcomes. * DHS has adopted a process of ’continuing improvement“ to its methods for estimating risk and measuring applicants‘ effectiveness. Background: Evolution of DHS‘s Risk-Based Formula: Figure: Timeline: [Refer to PDF for image] Department of Justice-run program: 2001; 9/11/2001: Begin Stage 1; Stage 1: R=P; Fiscal years 2001-2003; 10/26/2001: USA Patriot Act; 11/25/2002: Homeland Security Act. Stage 2: R=T+Cl+PD; Fiscal years 2004-2005; Stage 3: R=T*V*C*; Fiscal year 2006. Stage 4: R=T* "V&C"; Fiscal years 2007-2008; 08/03/2008: 9/11 Act. Source: GAO analysis based on Congressional Research Service. Definitions for the formulas above: R=P: represents Risk equals population; R=T+Cl+PD: represents Risk equals Threat plus Critical Infrastructure plus Population Density; R=T*V*C*: represents Risk equals Threat times Vulnerability times Consequences; R=T* "V&C": represents DHS's presentation of the risk calculation formula used in their risk analysis model for 2007-2009. [End of figure] Background: Overview of the HGSP Grant Determination Process (UASI and SHSP): Since 2006, DHS has applied a three-step process”using analytical methods and policy judgments”to select eligible urban areas and allocate SHSP and UASI funds: 1. Use of a risk analysis formula (R = T times ’V&C“) with the same basic indices (e.g., threat, economic), and weights results in list of eligible UASI areas. 2. Implementation of an effectiveness assessment, including a peer review process, to assess and score the effectiveness of the proposed investments submitted by the eligible applicants. 3. Calculation of a final allocation of funds based on state‘s and urban areas‘ risk scores as adjusted by their effectiveness scores. Background: Overview of the Grant Allocation Methodology for UASI and SHSG: Figure: Grant Allocation Methodology for UASI and SHSG: [Refer to PDF for image] UASI: Phase I: Risk Analysis; Relative risk estimate; produces risk score for urban areas; Phase II: Effectiveness assessment: Peer review of investment justifications; Effectiveness score is produced; Phase III: Final allocation; Effectiveness/risk matrix is used to determine grant allocation. SHSP: Phase I: Risk Analysis; Relative risk estimate; produces risk score for states and territories; Phase II: Effectiveness assessment: Peer review of investment justifications; Effectiveness score is produced; Phase III: Final allocation; Effectiveness/risk matrix is used to determine grant allocation; Statutory minimum: .365%[A]. Source: GAO analysis of DHS documents and information provided in interviews. [A] Statutory minimum for FY 2009: 0.365% of the total amount of funds appropriated for SHSP plus IASI grants. [End of figure] Risk Analysis in FY 2009: Model Used in Determining Relative Risk Scores: Figure: Model Used in Determining Relative Risk Scores: [Refer to PDF for image] Risk equals: Threat Index times Vulnerability and Consequence Index. Components of Threat Index: * Data: Ongoing plotlines, credible reporting, relevant investigations to create threat tiers; * Source: Intelligence Community reporting. Components of Vulnerability and Consequence Index V&C=(P+E+I+N): * Population Index: Data: Population (nighttime, Commuter, Visitor) and Population Density; Source: Census, Smith Travel. * Economic Index: Data: Gross Domestic Product; Source: Department of Commerce; Bureau of Economic Statistics. * National Infrastructure Index: Data: # Tier 1 Assets (x3) + # Tier 3 Assets; Source: DHS/QIP, SSAs, states and territories. * National Security Index: Data: Number of Defense Industrial Base (DIB) Facilities, Military Personnel, International Border Crossings, Presence of Coastline, International Border; Source: DOD. DHS/CBP. Population Index: 40%; Economic Index: 20%; Threat Index: 20%; National Infrastructure Index: 15%; National Security Index: 5%. Source: DHS. Note: "DHS/OIP" Stands for DHS's Office of Infrastructure Protection. "SSAs" stands for Sector-Specific Agencies, which are federal departments and agencies identified in the National Infrastructure Plan as responsible for critical infrastructure protection activities. "DOD" stands for the Department of Defense. "DHS/CBP" stands for the DHS's Customs and Border Protection. [End of figure] Risk Analysis Model: Calculating Threat: Threat Index: * Reflects the intelligence community‘s best assessment of areas of the country and potential targets most likely to be attacked. * Process considers threat information from the intelligence community of ongoing plotlines and credible threats from international terrorist networks and affiliates. For FY 2009 model, criteria for one of the four threat tiers changed to reflect updated intelligence assessment. DHS”Intelligence and Analysis (I&A)”reported additional processes implemented to consult with states on threat information. Risk Analysis Model: Calculating Vulnerability and Consequences (’V&C“): * Few changes made to the model, primarily data and process improvements, according to DHS officials. * Vulnerability is still considered to be constant across all jurisdictions and in the risk formula is assigned a value of 1.0 for all jurisdictions. Consequences: Population Index: * No changes. Economic Index: * Data source changed from that of a private company to an annually updated data set from the U.S. Commerce Department‘s Bureau of Economic Analysis. National Infrastructure Index: * No changes. National Security Index: * Additional data sources were added to improve the index. 1. The number of military personnel and the number of critical defense industrial base facilities. 2. Presence of borders or coastline as determined by U.S. Customs and Border Protection inspection. - Each jurisdiction received either full credit or none. Vulnerability is a crucial component of risk assessment. In June 2008, we reported that[Footnote 2]: * While DHS has constructed a reasonable methodology to allocate funds within a given year, the Department needs to measure Vulnerability to capture variations in vulnerability across states and urban areas. As a result, we recommended: * ’that the Secretary of DHS formulate a method to measure Vulnerability that captures variations across states and urban areas, and apply this Vulnerability measure in future iterations of this risk- based grant allocation model.“ Vulnerability Element of DHS‘s Risk Analysis Model Has Limitations that Reduce Its Value: Status of DHS‘s response to our recommendation: * FEMA and I&A agreed that the current methodology for determining Vulnerability is not the optimum approach. * FEMA officials told us they have not identified a means of measuring Vulnerability effectively across all states and urban areas, but had little time between the 2008 and 2009 cycles to consider alternatives. * Instead, FEMA‘s Grant Directorate has focused its resources on launching an inverse approach called Cost-to-Capability (C2C) that is in its early stages. C2C focuses on efforts to measure a jurisdiction‘s capability to prevent and respond to various types of disasters compared to a target level of capability. * As its organizing structure, the C2C initiative uses DHS‘s National Planning Scenarios of terrorist and nonterrorist disaster incidents, and the target capabilities developed using those scenarios. Grant Programs Directorate‘s Cost to Capability Initiative (C2C) Being Developed: C2C is being developed by FEMA‘s Grant Management Directorate and is intended to be a decision support system to enable that Directorate to effectively manage FEMA‘s grant portfolio and to assist grant recipients optimize the use of their grant funds. One critical element of C2C”identifying the importance of each capability to each of the 15 planning scenarios used to develop target capabilities”is still under development. FEMA‘s intends to provide C2C as a tool that uses a common language and analytical framework to help state and local stakeholders make better investment decisions. Grantee use of C2C will not be mandatory. As designed, C2C results will not directly measure Vulnerability or preparedness. Cost to Capability Initiative (C2C) Faces Implementation Challenges: To date, national capability assessments have been based on state self- assessments whose comparability, reliability, accuracy, and data validity are uncertain. Input data for C2C is to be based on self assessments of capabilities from state preparedness plans, estimates of baseline capability, and the estimated relative capability improvement expected from a requested level of investment. For states to use C2C effectively, the state and local data used for assessing state and local capabilities must be in the common language of Target Capabilities and must have metrics that are compatible with C2C. These metrics are being developed by FEMA‘s National Preparedness Directorate. The potential for successful use of C2C as a national capability assessment tool is limited by the variations in the analytical skill levels across state and local users of C2C, according to FEMA. FEMA/Grant Programs Directorate‘s Cost to Capability Initiative (C2C): Figure: FEMA/Grant Programs Directorate‘s Cost to Capability Initiative (C2C): [Refer to PDF for image] Step 1: Connect Grant Dollars Awarded to Planned Activities: Analysis of Investment Purpose: Grant Applications, Progress Reporting, Monitoring Reports, and Grant Closeout Reports. Analysis of Investment Cost: Award Notices, Progress Reporting, Grant Closeout Reports. Step 2: Use a Capability Framework to Align Grant Dollars to Common Variables: Capability Framework: Built from the Target Capabilities List and other Industry Standards: Common Variables: V1 = Capacity; Capability A: Measure 1; Measure 2; Measure 3; Capability B: Measure 1; Measure 2. Common Variables: V2= Resiliency; Capability A: Measure 1; Measure 2; Capability B: Measure 1. Common Variables: V3= Sustainment; Capability A: Measure 1; Measure 2; Capability B: Measure 1; Measure 2. Common Variables: V4= To be determined; Capability A: Measure 1; Measure 2; Capability B: Measure 1; Measure 2; Measure 3. Step 3: Cost-to-Capability Analysis (Note: The Cost-to-Capability Requirements Documents and Concept of Operations are scheduled for release in August 2008): Integrate external factors which affect the relationship between cost and capability (e.g., population). Cost-to-Capability Approach: (Utilizing stakeholder input at each step): Gather data; Pulse SMEs to quantify relationships between data; Inform Budget Formulation, Policy Decisions, and Programmatic Decisions; Identify data needed to inform key decisions. Source: FEMA/Grants Programs Directorate. [End of figure] DHS Has Not Used Data that Could Inform Risk Model Vulnerability Inputs: DHS has made some efforts to measure vulnerability for specific assets across the nation. We reported in 2007 that DHS had[Footnote 3] * Assessed vulnerability of assets within surface transportation modes (mass transit, freight rail, and highway infrastructure). * Conducted over 2,600 vulnerability assessments on every critical infrastructure sector through the Comprehensive Review program, the Buffer Zone Protection program, and the Site Assistance Visit program. [Footnote 4] DHS and FEMA could evaluate how these assessments could be used to provide some differentiation in measures of Vulnerability used for its risk model formula. Sensitivity of the Risk Analysis Model: GAO‘s analysis of the FY 2009 model: * It takes moderate changes to the weights of the model‘s risk indices, such as the weights given to the threat or economic indices, to change the urban areas that compose the Tier 1 list, which are those areas with the highest risk scores. * The current model is more sensitive than the FY 2008 model. * For those urban areas ranked near the bottom of the Tier 2 list, modest changes in the weights for the indices used to quantify risk can result in changes in eligibility.[Footnote 5] * The current model is more sensitive than the FY 2008 model. Effectiveness Assessment: * No change in process for FY 2009. Final Allocation Process – FY 2009 Grants Based on Both Risk and Effectiveness Scores: DHS/FEMA plans to allocate FY 2009 funds based on the risk scores of states and urban areas, adjusted by a maximum of +/-10% by their effectiveness scores. 2009 HSGP Grant Guidance provided grantees with their estimated target grant allocations, rather than get allocations after effectiveness assessment: * FEMA responded to grantees‘ input in the 2008 grant after-action conference. * FEMA believes it enables grantees to better target the grant justifications in their applications as amounts requested should more closely match final actual allocations. * FEMA officials anticipate this change will encourage grantees to develop more targeted and realistic proposals that will be better linked to capabilities and performance measures. Final Allocation Process – Ranking UASI Grantees by Tiered Groups: 62 eligible UASI areas in FY 2009 (60 in 2008): * Tier 1 = 7 highest risk areas and eligible for 55% of available funds. * Tier 2 = 55 areas (2 more than FY 2008) and eligible for 45% of available funds. * Same allocation between Tiers 1 and 2 as 2008. According to DHS officials: * Expansion from 60 to 62 eligible UASI areas for FY 2009 is a policy decision driven by desire to provide program consistency for grantees. * Department intends to review all Urban Areas for next grant cycle -- with the new DHS leadership -- to determine the appropriate number for the UASI program. Concluding Observations: The FY 2009 HSGP risk allocation method continues the same approach we deemed reasonable in 2008 and provides program continuity. FEMA‘s continuing improvement efforts are reflected in changes including data sets used, and providing grantees their target allocations at the beginning of the FY 2009 grant cycle. Previously, grantees did not receive target allocations, but only their final allocations following the completion of the effectiveness assessment. GAO‘s 2008 recommendation on Vulnerability measure remains unaddressed. * FEMA‘s C2C initiative does not address our concerns about measuring Vulnerability. GAO is not issuing new recommendations with this report. Agency Comments: FEMA provided comments on both the November 14 and December 15 versions drafts of this briefing. With respect to the Vulnerability element of DHS‘s Risk Analysis Model, FEMA provided written comments via e-mail that: * It believes its ability to make a substantial change to the Vulnerability calculation was limited by (1) the timing of its FY 2009 roll-out ’on the heels“ of FY 2008 and (2) the department's leadership desire to minimize year-to-year changes. * ’it has been suggested that DHS should identify a distinct Vulnerability term for each of the four risk indices and multiply it against the Consequence terms, which would result in a more precise risk allocation that reflects Vulnerability as well as Threat and Consequence.“ FEMA also provided technical comments that we incorporated as appropriate. [End of briefing slides] Footnotes: [1] GAO, Homeland Security: DHS Risk-Based Methodology is Reasonable, But Current Version's Measure of Vulnerability is Limited, [hyperlink, http://www.gao.gov/products/GAO-08-852] (Washington, D.C.: June 2008). [2] GAO, Homeland Security: DHS Risk-Based Grant Methodology Is Reasonable, But Current Version's Measure of Vulnerability is Limited, [hyperlink, http://www.gao.gov/products/GAO-08-852] (Washington, D.C.: June 2008). [3] GAO, Department Of Homeland Security: Progress Report on Implementation of Mission and Management Functions, [hyperlink, http://www.gao.gov/products/GAO-07-454] (Washington, D.C.: August 2007). [4] DHS describes the Comprehensive Review as a structured, collaborative government and private sector analysis of high value critical infrastructure and key resources facilities. Through the Buffer Zone Protection Program, and with the support of DHS, local authorities develop Buffer Zone Protection Plans, which DHS reported have several purposes, including identifying specific threats and vulnerabilities associated with the buffer zone and analyzing the level of risk associated with each vulnerability. DHS describes the Site Assistance Visit Program as an information gathering visit with several goals, such as better understanding and prioritizing vulnerabilities of critical infrastructure and key resources and increasing awareness of threats and vulnerabilities among critical infrastructure and key resources owners and operators. [5] The specific data on these changes is Sensitive Security information. [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Phone: The price of each GAO publication reflects GAO‘s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO‘s Web site, [hyperlink, http://www.gao.gov/ordering.htm]. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.