Department of Homeland Security

Progress Made in Implementation of Management and Mission Functions, but More Work Remains Gao ID: GAO-08-457T February 13, 2008

The Department of Homeland Security (DHS) began operations in March 2003 with missions that include preventing terrorist attacks from occurring within the United States, reducing U.S. vulnerability to terrorism, minimizing damages from attacks that occur, and helping the nation recover from any attacks. GAO has reported that the implementation and transformation of DHS is an enormous management challenge and that the size, complexity, and importance of the effort make the challenge especially daunting and critical to the nation's security. GAO's prior work on mergers and acquisitions found that successful transformations of large organizations, even those faced with less strenuous reorganizations than DHS, can take at least 5 to 7 years to achieve. This testimony is based on GAO's August 2007 report evaluating DHS's progress between March 2003 and July 2007, selected reports issued since July 2007, and our institutional knowledge of homeland security issues.

Since its establishment, DHS has made progress in implementing its management and mission functions in the areas of acquisition, financial, human capital, information technology, and real property management; border security; immigration enforcement and services; aviation, surface transportation, and maritime security; emergency preparedness and response; critical infrastructure protection; and science and technology. In general, DHS has made more progress in its mission areas than in its management areas, reflecting an initial focus on protecting the homeland. While DHS has made progress in implementing its functions in each management and mission area, we identified challenges remaining in each of these areas. These challenges include providing appropriate oversight for contractors; improving financial management and controls; implementing a performance-based human capital management system; implementing information technology management controls; balancing trade facilitation and border security; improving enforcement of immigration laws, enhancing transportation security; and effectively coordinating the mitigation and response to all hazards. Key issues that have affected DHS's implementation efforts are agency transformation, strategic planning and results management, risk management, information sharing, partnerships and coordination, and accountability and transparency. For example, GAO designated DHS's implementation and transformation as high-risk. While DHS has made progress in transforming its component agencies into a fully functioning department, it has not yet addressed key elements of the transformation process, such as developing a comprehensive transformation strategy. The Homeland Security Act of 2002, as amended, requires DHS to develop a transition and succession plan to guide the transition of management functions to a new Administration; DHS is working to develop and implement its approach for managing the transition. DHS has begun to develop performance goals and measures in some areas in an effort to strengthen its ability to measure its progress in key areas. We commend DHS's efforts and have agreed to work with the department to provide input to help strengthen established measures. DHS also has not yet fully adopted and applied a risk management approach in implementing its mission functions. Although some DHS components have taken steps to do so, this approach has not yet been implemented departmentwide. DHS's 5-year anniversary provides an opportunity for the department to review how it has matured as an organization. As part of our broad range of work reviewing DHS's management and mission programs, GAO will continue to assess DHS's progress in addressing high-risk issues. In particular, GAO will continue to assess the progress made by the department in its transformation and information sharing efforts.



GAO-08-457T, Department of Homeland Security: Progress Made in Implementation of Management and Mission Functions, but More Work Remains This is the accessible text file for GAO report number GAO-08-457T entitled 'Department of Homeland Security: Progress Made in Implementation of Management and Mission Functions, but More Work Remains' which was released on February, 2008. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Testimony: Before the Subcommittee on Homeland Security, Committee on Appropriations, House of Representatives: United States Government Accountability Office: GAO: For Release on Delivery Expected at 10:00 a.m. EST: Wednesday, February 13, 2008: Department Of Homeland Security: Progress Made in Implementation of Management and Mission Functions, but More Work Remains: Statement of David M. Walker: Comptroller General of the United States: GAO-08-457T: GAO Highlights: Highlights of GAO-08-457T, testimony before the Subcommittee on Homeland Security, Committee on Appropriations, House of Representatives. Why GAO Did This Study: The Department of Homeland Security (DHS) began operations in March 2003 with missions that include preventing terrorist attacks from occurring within the United States, reducing U.S. vulnerability to terrorism, minimizing damages from attacks that occur, and helping the nation recover from any attacks. GAO has reported that the implementation and transformation of DHS is an enormous management challenge and that the size, complexity, and importance of the effort makes the challenge especially daunting and critical to the nation‘s security. GAO‘s prior work on mergers and acquisitions found that successful transformations of large organizations, even those faced with less strenuous reorganizations than DHS, can take at least 5 to 7 years to achieve. This testimony is based on GAO‘s August 2007 report evaluating DHS‘s progress between March 2003 and July 2007; selected reports issued since July 2007; and our institutional knowledge of homeland security issues. What GAO Found: Since its establishment, DHS has made progress in implementing its management and mission functions in the areas of acquisition, financial, human capital, information technology, and real property management; border security; immigration enforcement and services; aviation, surface transportation, and maritime security; emergency preparedness and response; critical infrastructure protection; and science and technology. In general, DHS has made more progress in its mission areas than in its management areas, reflecting an initial focus on protecting the homeland. While DHS has made progress in implementing its functions in each management and mission area, we identified challenges remaining in each of these areas. These challenges include providing appropriate oversight for contractors; improving financial management and controls; implementing a performance-based human capital management system; implementing information technology management controls; balancing trade facilitation and border security; improving enforcement of immigration laws, enhancing transportation security; and effectively coordinating the mitigation and response to all hazards. Key issues that have affected DHS‘s implementation efforts include agency transformation, strategic planning and results management, risk management, information sharing, partnerships and coordination, and accountability and transparency. For example, GAO designated DHS‘s implementation and transformation as high-risk. While DHS has made progress in transforming its component agencies into a fully functioning department, it has not yet addressed key elements of the transformation process, such as developing a comprehensive transformation strategy. DHS must also develop a transition and succession plan to guide the transition of management functions to a new Administration, as required by legislation. DHS has set a target time frame for completing this plan. DHS also has not always implemented effective strategic planning efforts and has not yet fully developed performance measures for some of its programs. DHS has begun to develop performance goals and measures in an effort to strengthen its ability to measures its progress in key areas. We commend DHS‘s efforts and have agreed to work with the department to provide input to help strengthen established measures. DHS also has not yet fully adopted and applied a risk management approach in implementing its mission functions. Although some DHS components have taken steps to do so, this approach has not yet been implemented departmentwide. DHS‘s 5 year anniversary provides an opportunity for the department to review how it has matured as an organization. As part of our broad range of work reviewing DHS management and mission programs, GAO will continue to assess DHS‘s progress in addressing high-risk issues. In particular, GAO will continue to assess the progress made by the department in its transformation and information sharing efforts, and assessing whether any progress made is sustainable over the long term. What GAO Recommends: While this testimony contains no new recommendations, GAO has made approximately 900 recommendations to DHS to strengthen departmental operations. DHS has implemented some of these recommendations and taken actions to address others. To view the full product, including the scope and methodology, click on [hyperlink, http://www.GAO-08-457T]. For more information, contact Norm Rabkin at (202) 512-8777. [End of section] Mr. Chairman and Members of the Subcommittee: I appreciate the opportunity to appear today to discuss the Department of Homeland Security's (DHS) efforts to implement its management and mission functions. DHS began operations in March 2003 with missions that include preventing terrorist attacks from occurring within the United States, reducing U.S. vulnerability to terrorism, minimizing damages from attacks that occur, and helping the nation recover from any attacks. The department has initiated and continued the implementation of various policies and programs to address these missions as well as its nonhomeland security functions.[Footnote 1] DHS has also taken a number of actions designed to integrate its management functions and to transform its component agencies into an effective cabinet-level department. Prior to the creation of DHS, we testified on whether the reorganization of government agencies might better address the nation's homeland security needs.[Footnote 2] At that time, we identified that the nation had a unique opportunity to create an effective and performance-based organization to strengthen the nation's ability to protect its borders and citizens. We noted that the magnitude of the challenges that the new department would face would require substantial time and effort to overcome and that the implementation of the new department would be extremely complex. In 2003 we designated the implementation and transformation of DHS as high-risk because it represented an enormous undertaking that would require time to achieve in an effective and efficient manner.[Footnote 3] We further identified that the components that became part of the department already faced a wide array of existing challenges, and any failure to effectively carry out its mission would expose the nation to potentially serious consequences. In designating the implementation and transformation of DHS as high-risk, we noted that building an effective department would require consistent and sustained leadership from top management to ensure the needed transformation of disparate agencies, programs, and missions into an integrated organization. Our prior work on mergers and acquisitions, undertaken before the creation of DHS, found that successful transformations of large organizations, even those faced with less strenuous reorganizations than DHS, can take at least 5 to 7 years to achieve. Given our nation's current fiscal condition, it is critically important for federal departments--including DHS--to operate as efficiently as possible in carrying out their missions. I have spoken extensively about the fiscal crisis our nation faces with the coming retirement of the baby boom generation and the related growth in entitlement spending. The current financial condition in the United States is worse than is widely understood and is not sustainable. Meeting the long-term fiscal challenge will require (1) significant entitlement reform; (2) reprioritizing, restructuring, and constraining other spending programs; and (3) additional revenues--such as through a reformed tax system. These efforts will require bipartisan cooperation and compromise. In August 2007, we reported on the progress DHS had made since its inception in implementing its management and mission functions.[Footnote 4] We identified specific actions that DHS was to achieve based on legislation, homeland security presidential directives, DHS strategic planning documents, and other sources, and reported on the progress the department made in implementing these actions. My testimony addresses the progress made by DHS in implementing its management and mission functions in the areas of acquisition, financial, human capital, information technology, and real property management; border security; immigration enforcement; immigration services; aviation, surface transportation, and maritime security; emergency preparedness and response; critical infrastructure and key resources protection; and science and technology. My testimony also addresses key issues that have affected the department's implementation efforts. These key issues include agency transformation, strategic planning and results management, risk management, information sharing, partnerships and coordination, and accountability and transparency. My statement is based on the results of our August 2007 report evaluating the extent to which DHS has achieved congressional and Administration expectations set out for DHS in its management and mission areas; selected products we issued on DHS since July 2007; and our institutional knowledge of homeland security and various government organizational and management issues. For our August 2007 report on DHS progress, we conducted our work from September 2006 to July 2007. We updated this work with selected reports in February 2008. We conducted our work in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Summary: DHS has made progress in implementing its management and mission functions. For example, in its management areas DHS has made progress in: * implementing a strategic sourcing program to increase the effectiveness of its buying power; * taking steps to prepare corrective action plans for its internal control weaknesses; * issuing plans for its human capital system; * taking actions to establish and institutionalize information technology management controls; and: * developing an asset management plan for its real property. In its mission areas, DHS has made progress in: * refining the screening of foreign visitors to the United States and providing training for border personnel; * conducting immigration enforcement actions at worksites and reducing its backlog of immigration benefit applications; * strengthening passenger, baggage, and air cargo screening at airports; * establishing security standards and conducting assessments and inspections of surface transportation modes; * developing programs for collecting information on incoming ships and working with the private sector to improve and validate supply chain security; * enhancing emergency preparedness and response capabilities, such as issuing a revised National Response Framework; * identifying and assessing critical infrastructure threats and vulnerabilities; and: * coordinating with federal, state, local, and private sector entities on homeland security technologies. However, we identified challenges remaining in each of these areas. These challenges include: * providing appropriate oversight for contractors; * improving financial management controls and correcting internal control weaknesses; * implementing a performance-based human capital management system; * refining and implementing controls for information technology management; * improving the regulation of commercial trade while ensuring protection against the entry of illegal goods and dangerous visitors at U.S. ports of entry; * improving enforcement of immigration laws, including worksite immigration laws, and the provision of immigration services; * fully integrating risk-based decision-making into some transportation security programs; and: * coordinating with states and first responders as they train and practice under a revised National Response Framework. A variety of cross-cutting issues have affected DHS's efforts to implement its management and mission functions. These key issues are agency transformation, strategic planning and results management, risk management, information sharing, partnerships and coordination, and accountability and transparency. * We initially designated the implementation and transformation of DHS as a high-risk area because it represented an enormous undertaking that would require time to achieve and the components that were merged into DHS already faced a wide array of existing challenges. We continued this designation in 2005 and 2007 in part because DHS's management systems and functions were not yet fully integrated and wholly operational.[Footnote 5] We have recommended, among other things, that agencies on the high-risk list produce a corrective action plan that defines the root causes of identified problems, identifies effective solutions to those problems, and provides for substantially completing corrective measures in the near term. As of February 2008, DHS had not yet completed such a corrective action plan. Moving forward, it will also be important for DHS to develop comprehensive plans for managing the upcoming transition between administrations to ensure continuity in operations and minimize vulnerabilities, as required by legislation. & DHS has not always implemented effective strategic planning efforts and has not yet fully developed performance measures or put in place structures to help ensure that the agency is managing for results. For example, we have reported that some DHS component agencies have encountered challenges in developing outcome-based goals and measures to assess the performance of its programs. Since issuance of our August 2007 report, DHS has begun to develop performance goals and measures for some areas in an effort to strengthen its ability to measures its progress in key management and mission areas. We commend DHS's efforts to measure its progress in these areas and have agreed to work with the department to provide input to help strengthen established measures. * Although the Secretary of Homeland Security has identified risk-based decision making as a cornerstone of departmental policy, we have reported that DHS can strengthen its efforts in applying risk-based principles in support of its investment decisions. Some DHS component agencies, such as the Coast Guard, have taken steps to apply risk-based decision making in implementing some of its mission functions. However, other components have not utilized such an approach or could strengthen risk management efforts. To help support the application of risk-based principles in homeland security investment decisions, I convened an expert forum on risk management in October 2007 to discuss effective risk management practices, challenges in implementing risk management in homeland security, and solutions to address existing challenges. We expect to share the results of this forum over the next few months. * We designated information sharing for homeland security as high-risk in part because the nation lacked an implemented set of governmentwide policies and processes for sharing terrorism-related information. The federal government has issued a strategy for how it will put in place the overall framework and policies for sharing information with critical partners and an implementation plan for the "information sharing environment" required by the Intelligence Reform and Terrorism Prevention Act of 2004, as amended. However, this environment remains in the planning stage, and we have noted that completing the environment is a complex task that will take multiple years and long- term administration and congressional support and oversight and will pose cultural, operational, and technical challenges that will require a collaborated response. DHS has taken some steps to implement its information sharing responsibilities, such as providing support for information "fusion" centers.[Footnote 6] * DHS has faced some challenges in developing effective partnerships with other federal, state, local, private and nonprofit sector, and international stakeholders, and in clarifying the roles and responsibilities of these various partners. The National Strategy for Homeland Security underscores the importance of DHS partnering with other stakeholders. DHS has taken action to strengthen partnerships and coordination efforts with public and private sector entities, such as partnering with the Department of Transportation to strengthen the security of surface modes of transportation, airlines to improve aviation passenger and cargo screening, and the maritime shipping industry to facilitate containerized cargo inspections. However, more work remains as DHS seeks to form effective partnerships to leverage resource and effectively carry out its homeland security responsibilities. * Accountability and transparency are critical to the department effectively integrating its management functions and implementing its mission responsibilities. We have reported that it is important that DHS make its management or operational decisions transparent enough so that Congress can be sure that it is effectively, efficiently, and economically using the funding it receives annually[Footnote 7]. We have encountered delays at DHS in obtaining access to needed information. Over the past year, we have discussed ways to resolve access issues with DHS, and our access has improved in certain areas. For example, TSA has worked with us to improve their process for providing us access to documentation. However, we continue to believe that DHS needs to make systematic changes to its policies and procedures for providing information to GAO to increase the transparency of its efforts. Legislation enacted in December 2007 reinforces this position by restricting a portion of funds appropriated to the DHS Office of Secretary and Executive Management until DHS certifies and reports that it has revised its departmental guidance for working with GAO and the DHS Office of Inspector General (IG) and directing DHS to make these revisions in consultation with GAO and the DHS I[Footnote 8]G. We look forward to collaborating with the department on proposed revisions to its guidance. Background: In July 2002 President Bush issued the National Strategy for Homeland Security. The strategy set forth overall objectives to prevent terrorist attacks within the United States, reduce America's vulnerability to terrorism, and minimize the damage and assist in the recovery from attacks that occur. The strategy further identified a plan to strengthen homeland security through the cooperation and partnering of federal, state, local, and private sector organizations on an array of functions. It also specified a number of federal departments, as well as nonfederal organizations, that have important roles in securing the homeland, with DHS having key responsibilities in implementing established homeland security mission areas. This strategy was updated and reissued in October 2007. In November 2002 the Homeland Security Act of 2002 was enacted into law, creating DHS. The act defined the department's missions to include preventing terrorist attacks within the United States; reducing U.S. vulnerability to terrorism; and minimizing the damages and assisting in the recovery from attacks that occur within the United States. The act further specified major responsibilities for the department, including the analysis of information and protection of infrastructure; development of countermeasures against chemical, biological, radiological, and nuclear, and other emerging terrorist threats; securing U.S. borders and transportation systems; and organizing emergency preparedness and response efforts. DHS began operations in March 2003. Its establishment represented a fusion of 22 federal agencies to coordinate and centralize the leadership of many homeland security activities under a single department.[Footnote 9] We have evaluated many of DHS's management functions and programs since the department's establishment and have issued over 400 related products. In particular, in August 2007 we reported on the progress DHS had made since its inception in implementing its management and mission functions.[Footnote 10] We also reported on broad themes that have underpinned DHS's implementation efforts, such as agency transformation, strategic planning, and risk management. Over the past 5 years, we have made approximately 900 recommendations to DHS on ways to improve operations and address key themes, such as to develop performance measures and set milestones for key programs and implement internal controls to help ensure program effectiveness. DHS has implemented some of these recommendations, taken actions to address others, and taken other steps to strengthen its mission activities and facilitate management integration. DHS Has Made Progress in Implementing Its Management and Mission Functions but Has Faced Challenges in Its Implementation Efforts: DHS has made progress in implementing its management and mission functions in the areas of acquisition, financial, human capital, information technology, and real property management; border security; immigration enforcement; immigration services; aviation, surface transportation, and maritime security; emergency preparedness and response; critical infrastructure and key resources protection; and science and technology. Overall, DHS made more progress in implementing its mission functions than its management functions, reflecting an initial focus on implementing efforts to secure the homeland. DHS has had to undertake these critical missions while also working to transform itself into a fully functioning cabinet department--a difficult undertaking for any organization and one that can take, at a minimum, 5 to 7 years to complete even under less daunting circumstances. As DHS continues to mature as an organization, we have reported that it will be important that it works to strengthen its management areas since the effectiveness of these functions will ultimately impact its ability to fulfill its mission to protect the homeland. Management Areas: Acquisition Management. DHS's acquisition management efforts include managing the use of contracts to acquire goods and services needed to fulfill or support the agency's missions, such as information systems, new technologies, aircraft, ships, and professional services. Overall, DHS has made progress in implementing a strategic sourcing program to increase the effectiveness of its buying power and in creating a small business program. However, DHS's progress toward creating a unified acquisition organization has been hampered by various policy decisions. In September 2007 we reported on continued acquisition oversight issues at DHS, identifying that the department had not fully ensured proper oversight of its contractors providing services closely supporting inherently government functions.[Footnote 11] For example, we found that DHS program officials did not assess the risk that government decisions may be influenced by, rather than independent from, contractor judgments. Federal acquisitions policy requires enhanced oversight of contractors providing professional and management support services that can affect government decision making, support or influence policy development, or affect program management. However, most of the DHS program officials and contracting officers we spoke with were unaware of this requirement, and, in general, did not believe that their professional and management support service contracts required enhanced oversight. We made several recommendations to DHS to address these issues, including that DHS establish strategic-level guidance for determining the appropriate mix of government and contractor employees to meet mission needs; assess program office staff and expertise necessary to provide sufficient oversight of selected contractor services; and review contracts for selected services as part of the acquisition oversight program. Financial Management. DHS's financial management efforts include consolidating or integrating component agencies' financial management systems. In general, since its establishment, DHS has been unable to obtain an unqualified or "clean" audit opinion on its financial statements. For fiscal year 2007, the independent auditor issued a disclaimer on DHS's financial statements and identified eight significant deficiencies in DHS's internal controls over financial reporting, seven of which were so serious that they qualified as material weaknesses. DHS has taken steps to prepare corrective action plans for its internal control weaknesses by, for example, developing and issuing a departmentwide strategic plan for the corrective action plan process and holding workshops on corrective action plans. Until these weaknesses are resolved, DHS will not be in a position to provide reliable, timely, and useful financial data to support day-to-day decision making. Human Capital Management. DHS's key human capital management areas include pay, performance management, classification, labor relations, adverse actions, employee appeals, and diversity management. Congress provided DHS with significant flexibility to design a modern human capital management system, and in October 2004 DHS issued its human capital strategic plan. DHS and the Office of Personnel Management jointly released the final regulations on DHS's new human capital system in February 2005. Although DHS intended to implement the new personnel system in the summer of 2005, court decisions enjoined the department from implementing certain labor management portions of the system. DHS has since taken actions to implement its human capital system. In July 2005 DHS issued its first departmental training plan, and in April 2007, it issued its Fiscal Year 2007 and 2008 Human Capital Operational Plan. However, more work remains for DHS to fully implement its human capital system, including developing a market-based and performance-oriented pay system. Information Technology Management. DHS's information technology management efforts should include developing and using an enterprise architecture, or corporate blueprint, as an authoritative frame of reference to guide and constrain system investments; defining and following a corporate process for informed decision making by senior leadership about competing information technology investment options; applying system and software development and acquisition discipline and rigor when defining, designing, developing, testing, deploying, and maintaining systems; establishing a comprehensive, departmentwide information security program to protect information and systems; having sufficient people with the right knowledge, skills, and abilities to execute each of these areas now and in the future; and centralizing leadership for extending these disciplines throughout the organization with an empowered Chief Information Officer. DHS has undertaken efforts to establish and institutionalize the range of information technology management controls and capabilities noted above that our research and past work have shown are fundamental to any organization's ability to use technology effectively to transform itself and accomplish mission goals. However, the department has significantly more to do before each of its management controls and capabilities is fully in place and is integral to how each system investment is managed. For example, in September 2007 we reported on our assessment of DHS's information technology human capital plan.[Footnote 12] We found that DHS's plan was largely consistent with federal guidance and associated best practices. In particular, the plan fully addressed 15 and partially addressed 12 of 27 practices set forth in the Office of Personnel Management's human capital framework. However, we reported that DHS's overall progress in implementing the plan had been limited. We recommended, among other things, that roles and responsibilities for implementing the information technology human capital plan and all supporting plans be clearly defined and understood. Moreover, DHS has not fully implemented a comprehensive information security program. While it has taken actions to ensure that its certification and accreditation activities are completed, the department has not shown the extent to which it has strengthened incident detection, analysis, and reporting and testing activities. Real Property Management. DHS's responsibilities for real property management are specified in Executive Order 13327, "Federal Real Property Asset Management," and include the establishment of a Senior Real Property Officer, development of an asset inventory, and development and implementation of an asset management plan and performance measures. In June 2006, the Office of Management and Budget (OMB) upgraded DHS's Real Property Asset Management Score from red to yellow after DHS developed an Asset Management Plan, developed a generally complete real property data inventory, submitted this inventory for inclusion in the governmentwide real property inventory database, and established performance measures consistent with Federal Real Property Council standards.[Footnote 13] DHS also designated a Senior Real Property Officer. Mission Areas: Border Security. DHS's border security mission includes detecting and preventing terrorists and terrorist weapons from entering the United States; facilitating the orderly and efficient flow of legitimate trade and travel; interdicting illegal drugs and other contraband; apprehending individuals who are attempting to enter the United States illegally; inspecting inbound and outbound people, vehicles, and cargo; and enforcing laws of the United States at the border. DHS has made some progress in, for example, refining the screening of foreign visitors to the United States and providing training and personnel necessary to fulfill border security missions. In particular, as of December 2006 DHS had a pre-entry screening capability in place in overseas visa issuance offices and an entry identification capability at 115 airports, 14 seaports, and 154 of 170 land ports of entry.[Footnote 14] Furthermore, in November 2007 we reported on traveler inspections at ports of entry and found that U.S. Customs and Border Protection (CBP) had some success in identifying inadmissible aliens and other violators.[Footnote 15] However, we also identified weaknesses in CBP's operations at ports of entry and have reported on challenges DHS faced in implementing its comprehensive border protection system, called SBInet, and in leveraging technology, personnel, and information to secure the border. For example, in our November 2007 report on traveler inspections, we identified weaknesses in CBP's operations, including not verifying the nationality and admissibility of each traveler, which could increase the potential that terrorists and inadmissible travelers could enter the United States. In July 2007, CBP issued detailed procedures for conducting inspections, including requiring field office managers to assess compliance with these procedures. However, CBP had not established internal controls to ensure that field office managers share their assessments with CBP headquarters to help ensure that the new procedures were consistently implemented across all ports of entry and reduced the risk of failed traveler inspections. We recommended that DHS implement internal controls to help ensure that field office directors communicate to agency management the results of their monitoring and assessment efforts and formalize a performance measure for the traveler inspection program that identifies CBP's effectiveness in apprehending inadmissible aliens and other violators. Immigration Enforcement. DHS's immigration enforcement mission includes apprehending, detaining, and removing criminal and illegal aliens; disrupting and dismantling organized smuggling of humans and contraband as well as human trafficking; investigating and prosecuting those who engage in benefit and document fraud; blocking and removing employers' access to undocumented workers; and enforcing compliance with programs to monitor visitors. Over the past several years, DHS has strengthened some aspects of immigration enforcement. For example, since fiscal year 2004 U.S. Immigration and Customs Enforcement (ICE) has reported increases in the number of criminal arrests and indictments for worksite enforcement violations. ICE also has begun to introduce principles of risk management into the allocation of its investigative resources. However, ICE has faced challenges in ensuring the removal of criminal aliens from the United States. The agency has also lacked outcome-based performance goals and measures for some its programs, making it difficult for the agency and others to fully determine whether its programs are achieving their desired outcomes. Immigration Services. DHS's immigration services mission includes administering immigration benefits and working to reduce immigration benefit fraud. Although DHS has made progress in reducing its backlog of immigration benefit applications, improvements are still needed in the provision of immigration services, particularly by strengthening internal controls to prevent fraud and inaccuracy. U.S. Citizenship and Immigration Services (USCIS) has established a focal point for immigration fraud, outlined a fraud control strategy that relies on the use of automation to detect fraud, and has performed some fraud assessments to identify the extent and nature of fraud for certain benefits. However, USCIS has faced challenges in establishing a case management system to manage applications and provide management information and making other technological enhancements to its application and adjudication processes, such as collecting and storing biometric information on applicants and expanding its online application filing capabilities. In July 2007, we reported on USCIS's transformation efforts, noting that USCIS's transformation plans partially or fully addressed most key practices for organizational transformations.[Footnote 16] For example, USCIS had taken initial steps in addressing problems identified during past efforts to modernize by establishing a Transformation Program Office that reports directly to the USCIS Deputy Director to ensure leadership commitment; dedicating people and resources to the transformation; establishing a mission, vision, and integrated strategic goals; focusing on a key set of priorities and defining core values; and involving employees. However, we found that more attention was needed in the areas of performance management, strategic human capital management, communications, and information technology management. We recommended that DHS document specific performance measures and targets, increase focus on strategic human capital management, complete a comprehensive communications strategy, and continue developing sufficient information technology management practices. Aviation Security. DHS's aviation security mission includes strengthening airport security; providing and training a screening workforce; prescreening passengers against terrorist watch lists; and screening passengers, baggage, and cargo. Since the Transportation Security Administration (TSA) was established in 2001, it has focused much of its effort on aviation security and has developed and implemented a variety of programs and procedures to secure commercial aviation. For example, TSA has undertaken efforts to strengthen airport security; hire and train a screening workforce; prescreen passengers against terrorist watch lists; and screen passengers, baggage, and cargo. TSA has implemented these efforts in part to meet numerous mandates for strengthening aviation security placed on the agency following the September 11, 2001, terrorist attacks. However, DHS has faced challenges in developing and implementing a program to match domestic airline passenger information against terrorist watch lists; fielding needed technologies to screen airline passengers for explosives; and fully integrating risk-based decision making into some of its programs. In November 2007, we reported that TSA continued to face challenges in preventing unauthorized items from being taken through airport checkpoints.[Footnote 17] Our independent testing identified that while in most cases transportation security officers appeared to follow TSA's procedures and used technology appropriately, weaknesses and other vulnerabilities existed in TSA's screening procedures. Surface Transportation Security. DHS's surface transportation security mission includes establishing security standards and conducting assessments and inspections of surface transportation modes, including passenger and freight rail, mass transit, highways, commercial vehicles, and pipelines. Although TSA initially focused much of its effort and resources on meeting legislative mandates to strengthen commercial aviation security after September 11, 2001, TSA has more recently placed additional focus on securing surface modes of transportation, including establishing security standards and conducting assessments and inspections of surface transportation modes such as passenger and freight rail. However, more work remains for DHS in developing and issuing security standards for all surface transportation modes and in more fully defining the roles and missions of its inspectors in enforcing security requirements. Maritime Security. DHS's maritime security responsibilities include port and vessel security, maritime intelligence, and maritime supply chain security. DHS has developed national and regional plans for maritime security and response and a national plan for recovery, and it has ensured the completion of vulnerability assessments and security plans for port facilities and vessels. DHS has also developed programs for collecting information on incoming ships and working with the private sector to improve and validate supply chain security. However, DHS has faced challenges in implementing certain maritime security responsibilities including, for example, a program to control access to port secure areas and to screen incoming cargo for radiation. In October 2007, we testified on DHS's overall maritime security efforts as they related to the Security and Accountability for Every (SAFE) Port Act of 2006.[Footnote 18] In that testimony we noted that DHS had improved security efforts by establishing committees to share information with local port stakeholders and taking steps to establish interagency operations centers to monitor port activities, conducting operations such as harbor patrols and vessel escorts, writing port- level plans to prevent and respond to terrorist attacks, testing such plans through exercises, and assessing security at foreign ports. We further reported that DHS had strengthened the security of cargo containers through enhancements to its system for identifying high-risk cargo and expanding partnerships with other countries to screen containers before they are shipped to the United States. However, we reported on challenges faced by DHS in its cargo security efforts, such as CBP's requirement to test and implement a new program to screen 100 percent of all incoming containers overseas--a departure from its existing risk-based programs. Among our recommendations were that DHS develop strategic plans, better plan the use of its human capital, establish performance measures, and otherwise improve program operations. Emergency Preparedness and Response. DHS's emergency management mission, now primarily consolidated in the Federal Emergency Management Agency (FEMA), includes prevention, mitigation, preparedness for, response to, and immediate recovery from major disasters and emergencies of all types, whether the result of nature or acts of man. The goal is to minimize damage from major disasters and emergencies by working with other federal agencies, state and local governments, nongovernment organizations, and the private sector to plan, equip, train, and practice needed skills and capabilities to build a national, coordinated system of emergency management. The Post-Katrina Emergency Management Reform Act of 2006 specifies a number of responsibilities for FEMA and DHS in the area of emergency preparedness and response designed to address many of the problems identified in the various assessments of the preparation for and response to Hurricane Katrina. It addresses such issues as roles and responsibilities, operational planning, capabilities assessments, and exercises to test needed capabilities. DHS has taken some actions intended to improve readiness and response based on our work and the work of congressional committees and the Administration. For example, in January 2008 DHS issued a revised National Response Framework intended to further clarify federal roles and responsibilities and relationships among federal, state, and local governments and responders, among others. However, these revisions have not yet been tested. DHS has also made structural changes in response to the Post-Katrina Emergency Management Reform Act that, among other things, are designed to strengthen FEMA. DHS has also announced a number of other actions to improve readiness and response. However, until states and first responders have an opportunity to train and practice under some of these changes, it is unclear what impact, if any, they will have on strengthening DHS's emergency preparedness and response capabilities. Critical Infrastructure and Key Resources Protection. DHS's critical infrastructure and key resources protection activities include developing and coordinating implementation of a comprehensive national plan for critical infrastructure protection, developing partnerships with stakeholders and information sharing and warning capabilities, and identifying and reducing threats and vulnerabilities. DHS has developed a national plan for critical infrastructure and key resources protection and undertaken efforts to develop partnerships and to coordinate with other federal, state, local and private sector stakeholders. DHS has also made progress in identifying and assessing critical infrastructure threats and vulnerabilities. For example, in July and October 2007 we reported on critical infrastructure sectors' sector-specific plans.[Footnote 19] We reported that although nine of the sector-specific plans we reviewed generally met National Infrastructure Protection Plan requirements and DHS's sector-specific plan guidance, eight plans did not address incentives the sectors would use to encourage owners to conduct risk assessments, and some plans were more comprehensive than others when discussing their physical, human, and cyber assets, systems, and functions. We recommended that DHS better (1) define its critical infrastructure information needs and (2) explain how the information will be used to attract more users. We also reported that the extent to which the sectors addressed aspects of cyber security in their sector-specific plans varied and that none of the plans fully addressed all 30 cyber security-related criteria. DHS officials said that the variance in the plans can primarily be attributed to the levels of maturity and cultures of the sectors, with the more mature sectors--sectors with preexisting relationships and a history of working together--generally having more comprehensive and complete plans than more newly established sectors without similar prior relationships. Regarding cyber security, we recommended a September 2008 deadline for sector-specific agency plans to fully address cyber-related criteria. Although DHS has made progress in these areas, it has faced challenges in sharing information and warnings on attacks, threats, and vulnerabilities and in providing and coordinating incident response and recovery planning efforts. For example, we identified a number of challenges to DHS's Homeland Security Information Network, including its coordination with state and local information sharing initiatives.[Footnote 20] Science and Technology. DHS's science and technology efforts include coordinating the federal government's civilian efforts to identify and develop countermeasures to chemical, biological, radiological, nuclear, and other emerging terrorist threats. DHS has taken steps to coordinate and share homeland security technologies with federal, state, local, and private sector entities. However, DHS has faced challenges in assessing threats and vulnerabilities and developing countermeasures to address those threats. With regard to nuclear detection capabilities, in September 2007 we reported on DHS's testing of next generation radiation detection equipment.[Footnote 21] In particular, we reported that the Domestic Nuclear Detection Office (DNDO) used biased test methods that enhanced the performance of the next generation equipment and that, in general, the tests did not constitute an objective and rigorous assessment of this equipment. We recommended that DNDO delay any purchase of this equipment until all tests have been completed, evaluated, and validated. Cross-cutting Issues Have Hindered DHS's Implementation Efforts: Our work has identified cross-cutting issues that have hindered DHS's progress in its management and mission areas. We have reported that while it is important that DHS continue to work to strengthen each of its core management and mission functions, it is equally important that these key issues be addressed from a comprehensive, departmentwide perspective to help ensure that the department has the structure and processes in place to effectively address the threats and vulnerabilities that face the nation. These issues are: (1) transforming and integrating DHS's management functions; (2) engaging in effective strategic and transition planning efforts and establishing baseline performance goals and measures; (3) applying and improving a risk management approach for implementing missions and making resource allocation decisions; (4) sharing information with key stakeholders; and (5) coordinating and partnering with federal, state, local, and private sector agencies entities. In addition, accountability and transparency are critical to the department effectively integrating its management functions and implementing its mission responsibilities. Agency Transformation: DHS has faced an enormous management challenge in its transformation efforts as it works to integrate 22 component agencies. Each component agency brought differing missions, cultures, systems, and procedures that the new department had to efficiently and effectively integrate into a single, functioning unit. At the same time it has weathered these growing pains, DHS has had to fulfill its various homeland security and other missions. DHS has developed a strategic plan, is working to integrate some management functions, and has continued to form necessary partnerships to achieve mission success. Nevertheless, in 2007 we reported that DHS's implementation and transformation remained high-risk because DHS had not yet developed a comprehensive management integration strategy and its management systems and functionsæespecially related to acquisition, financial, human capital, and information managementæwere not yet fully integrated and wholly operational. We identified that this array of management and programmatic challenges continued to limit DHS's ability to carry out its roles under the National Strategy for Homeland Security in an effective, risk-based way. We have recommended, among other things, that agencies on the high-risk list produce a corrective action plan that defines the root causes of identified problems, identifies effective solutions to those problems, and provides for substantially completing corrective measures in the near term. Such a plan should include performance metrics and milestones, as well as mechanisms to monitor progress. OMB has stressed to agencies the need for corrective action plans for individual high- risk areas to include specific goals and milestones. GAO has said that such a concerted effort is critical and that our experience has shown that perseverance is critical to resolving high-risk issues. In the spring of 2006, DHS provided us with a draft corrective action plan that did not contain key elements we have identified as necessary for an effective corrective action plan, including specific actions to address identified objectives. As of February 2008, DHS had not yet completed a corrective action plan. According to DHS, the department plans to use its revised strategic plan, which is at OMB for final review, as the basis for its corrective action plan. The significant challenges DHS has experienced in integrating its disparate organizational cultures and multiple management processes and systems make it an appropriate candidate for a Chief Operating Officer/ Chief Management Officer (COO/CMO) as a second deputy position or alternatively as a principal undersecretary for management position. Designating the Undersecretary for Management at DHS as the CMO at an Executive Level II is a step in the right direction, but this change does not go far enough. A COO/CMO for DHS with a limited term that does not transition across administrations will not help to ensure the continuity of focus and attention needed to protect the security of our nation. A COO/CMO at the appropriate organizational level at DHS, with a term appointment, would provide the elevated senior leadership and concerted and long-term attention required to marshal its transformation efforts. As part of its transformation efforts, it will be especially important for the department to effectively manage the approaching transition between administrations and sustain its transformation through this transition period. Due to its mission's criticality and the increased risk of terror attacks during changes in administration as witnessed in the United States and other countries, it is important that DHS take steps to help ensure a smooth transition to new leadership. According to the Homeland Security Act of 2002, as amended, DHS is required to develop a transition and succession plan to guide the transition of management functions to a new Administration by December 2008.[Footnote 22] DHS is working to develop and implement plans and initiatives for managing the transition. Moreover, the Homeland Security Advisory Council issued a report in January 2008 on the pending transition, making recommendations in the broad categories of threat awareness, leadership, congressional oversight/action, policy, operations, succession, and training. DHS is taking action to address some challenges of the approaching transition period, including filling some leadership positions traditionally held by political appointees with career professionals. The department is also undertaking training and cross-training of senior career personnel that would address the council's concerns for leadership and operational continuity. However, some other Homeland Security Advisory Council recommendations, such as building a consensus among current DHS officers regarding priority policy issues, could prove more difficult for DHS to implement, particularly in light of the need to clarify roles and responsibilities across the department and its ongoing transformation efforts. Strategic Planning and Results Management: Strategic planning is one of the critical factors necessary for the success of new organizations. This is particularly true for DHS, given the breadth of its responsibility and the need to clearly identify how stakeholders' responsibilities and activities align to address homeland security efforts. However, DHS has not always implemented effective strategic planning efforts and has not yet fully developed performance measures or put into place structures to help ensure that the agency is managing for results. DHS has developed performance goals and measures for some of its programs and reports on these goals and measures in its Annual Performance Report. However, some of DHS's components have not developed adequate outcome-based performance measures or comprehensive plans to monitor, assess, and independently evaluate the effectiveness of their plans and performance. Since the issuance of our August 2007 report, DHS has begun to develop performance goals and measures for some areas in an effort to strengthen its ability to measures its progress in key management and mission areas. We commend DHS's efforts to measure its progress in these areas and have agreed to work with the department to provide input to help strengthen established measures. Risk Management: DHS cannot afford to protect everything against all possible threats. As a result, the department must make choices about how to allocate its resources to most effectively manage risk. Risk management has been widely supported by the President and Congress as a management approach for homeland security, and the Secretary of Homeland Security has made it the centerpiece of departmental policy. A risk management approach can help DHS make decisions more systematically and is consistent with the National Strategy for Homeland Security and DHS's strategic plan, which have all called for the use of risk-based decisions to prioritize DHS's resource investments regarding homeland security-related programs. DHS and several of its component agencies have taken steps toward integrating risk-based principles into their decision-making processes. On a component agency level, the Coast Guard, for example, has developed security plans for seaports, facilities, and vessels based on risk assessments. TSA has also incorporated risk-based decision making into a number of its programs, such as programs for securing air cargo, but has not yet completed these efforts. In October 2007, I convened an expert forum on risk management to assist Congress and federal agencies, including DHS, by advancing the national dialogue on risk management challenges in homeland security and by helping to identify potential solutions to these complex challenges. The forum brought together a diverse array of experts, including representatives from DHS, other government agencies, nonprofit organizations, industry, and academia. The purpose of the forum was to identify: (1) lessons learned from leading organizations regarding the effective use of risk management practices; (2) key challenges faced by public and private organizations in adopting and implementing a risk-based approach for homeland security; and (3) actions that should be taken in the near-and long-term to address the most pressing of these challenges. Several themes emerged from the discussion, including the idea of creating a chief risk officer for government, the need to improve risk communication, and overcoming political obstacles to risk management. The plurality of the participants agreed that improving risk communication was the single greatest challenge in applying principles of risk management to homeland security and suggested a number of ways to use risk communication practices to better educate and inform the public. The participants also proposed a number of steps that could be taken in the near future to strengthen risk management practices and to stimulate public discussion and awareness of risk management concepts. We are working with the department to share ideas raised at the forum to assist them as they work to strengthen their risk-based efforts. We will be issuing a summary of this forum in the coming months. Information Sharing: In 2005, we designated information sharing for homeland security as high-risk and continued that designation in 2007. In doing so, we reported that the nation had not implemented a set of governmentwide policies and processes for sharing terrorism-related information but had issued a strategy on how it would put in place the overall framework, policies, and architecture for sharing with all critical partners--actions that we and others have recommended. The Intelligence Reform and Terrorism Prevention Act of 2004, as amended, requires that the President create an "information sharing environment" to facilitate the sharing of terrorism-related information, yet this environment remains in the planning stage. An implementation plan for the environment, which was released in November 2006, defines key tasks and milestones for developing the information sharing environment, including identifying barriers and ways to resolve them, as we recommended. We have noted that completing the information sharing environment is a complex task that will take multiple years and long- term administration and congressional support and oversight and will pose cultural, operational, and technical challenges that will require a collaborated response. DHS has taken some steps to implement its information sharing responsibilities and support other information sharing efforts. For example, states and localities are creating their own information fusion centers, some with DHS support. In October 2007 we reported that some state and local fusion centers had DHS personnel assigned to them; access to DHS's unclassified information networks or systems, such as the Homeland Security Information Network; and support from DHS grant programs.[Footnote 23] However, some state and local fusion centers reported challenges to accessing DHS's information systems and identified issues in understanding and using federal grant funds. To improve efforts to create a national network of fusion centers, we recommended that the federal government determine and articulate its role in, and whether it expects to provide resources to, fusion centers over the long term to help ensure their sustainability. Partnerships and Coordination: To secure the nation, DHS realizes it must form effective and sustained partnerships among its component agencies and with a range of other entities, including other federal agencies, state and local governments, private and nonprofit sectors, and international partners. The National Strategy for Homeland Security recognizes the importance of partnerships as the foundation for establishing a shared responsibility for homeland security among stakeholders. We have reported on difficulties faced by DHS in its coordination efforts. For example, in September 2005 we reported that TSA did not effectively involve private sector stakeholders in its decision-making process for developing security standards for passenger rail assets. We recommended that DHS develop security standards that reflect industry best practices and can be measured, monitored, and enforced by TSA rail inspectors and, if appropriate, rail asset owners. DHS agreed with these recommendations. DHS has worked to strengthen partnerships and has undertaken a number of coordination efforts with public and private- sector entities. These include, for example, partnering with the Department of Transportation to strengthen the security of surface modes of transportation, airlines to improve aviation passenger and cargo screening, the maritime shipping industry to facilitate containerized cargo inspection, and the chemical industry to enhance critical infrastructure protection at such facilities. In addition, FEMA has worked with other federal, state, and local entities to improve planning for disaster response and recovery. Although DHS has taken action to strengthen partnerships and improve coordination, we found that more work remains to support the leveraging of resources and the effective implementation of its homeland security responsibilities. Accountability and Transparency: Accountability and transparency are critical to the department effectively integrating its management functions and implementing its mission responsibilities. We have reported that it is important that DHS make its management and operational decisions transparent enough so that Congress can be sure that it is effectively, efficiently, and economically using the billions of dollars in funding it receives annually.[Footnote 24] We have encountered delays at DHS in obtaining access to needed information, which has impacted our ability to conduct our work in a timely manner. Since we highlighted this issue last year to this subcommittee, our access to information at DHS has improved. For example, TSA has worked with us to improve their process for providing us with access to documentation. DHS also provided us with access to its national level preparedness exercise. However, we continue to experience some delays in obtaining information from DHS, and we continue to believe that DHS needs to make systematic changes to its policies and procedures for how DHS officials are to interact with GAO. We appreciate the Subcommittee's assistance in helping us seek improved access to DHS information and support the provision in the Consolidated Appropriations Act, 2008, that restricts a portion of DHS's funding until DHS reports on revisions to its guidance for working with GAO and the DHS IG. We look forward to collaborating with the department on proposed revisions to its GAO guidance. Concluding Observations: Next month DHS will be 5 years old, a key milestone for the department. Since its establishment, DHS has had to undertake actions to secure the border and the transportation sector and defend against, prepare for, and respond to threats and disasters while simultaneously working to transform itself into a fully functioning cabinet department. Such a transformation is a difficult undertaking for any organization and can take, at a minimum, 5 to 7 years to complete even under less daunting circumstances. Nevertheless, DHS's 5-year anniversary provides an opportunity for the department to review how it has matured as an organization. As part of our broad range of work reviewing DHS management and mission programs, we will continue to assess in the coming months DHS's progress in addressing high-risk issues. In particular, we will continue to assess the progress made by the department in its transformation and information sharing efforts. Further, as DHS continues to evolve and transform, we will review its progress and performance and provide information to Congress and the public on its efforts. This concludes my prepared statement. I would be pleased to answer any questions you and the Subcommittee Members may have. GAO Contact and Staff Acknowledgments: For further information about this testimony, please contact Norman J. Rabkin, Managing Director, Homeland Security and Justice, at 202-512- 8777 or rabkinn@gao.gov. Other key contributors to this statement were Jason Barnosky, Cathleen A. Berrick, Kathryn Bolduc, Anthony Cheesebrough, Rebecca Gambler, Kathryn Godfrey, Christopher Keisling, Thomas Lombardi, Octavia Parks, and Sue Ramanathan. [End of section] Footnotes: [1] Examples of nonhomeland security functions include Coast Guard search and rescue and naturalization services. [2] GAO, Homeland Security: Critical Design and Implementation Issues, GAO-02-957T (Washington, D.C.: July 17, 2002). [3] GAO, High-Risk Series: An Update, GAO-03-119 (Washington, D.C.: January 2003). [4] GAO, Department of Homeland Security: Progress Report on Implementation of Mission and Management Functions, GAO-07-454 (Washington, D.C.: August 17, 2007). [5] GAO, High-RiskSeries: An Update, GAO-05-207 (Washington, D.C.: January 2005) and GAO, High-Risk Series: An Update, GAO-07-310 (Washington, D.C.: January 2007). [6] In general, a fusion center is a collaborative effort to detect, prevent, investigate, and respond to criminal and terrorist activity. GAO, Homeland Security: Federal Efforts Are Helping to Alleviate Some Challenges Encountered by State and Local Information Fusion Centers, GAO-08-35 (Washington, D.C.: Oct. 30, 2007). [7] GAO-07-454. [8] Consolidated Appropriations Act, 2008, Pub. L. No. 110-161, Div. E, 121 Stat. 1844 (2007). [9] These 22 agencies, offices, and programs were U.S. Customs Service; U.S. Immigration and Naturalization Service; Federal Protective Service; Transportation Security Administration; Federal Law Enforcement Training Center; Animal and Plant Health Inspection Service; Office for Domestic Preparedness; Federal Emergency Management Agency; Strategic National Stockpile and the National Disaster Medical System; Nuclear Incident Response Team; Domestic Emergency Support Team; National Domestic Preparedness Office; Chemical, Biological, Radiological, and Nuclear Countermeasures Program; Environmental Measures Laboratory; National BW Defense Analysis Center; Plum Island Animal Disease Center; Federal Computer Incident Response Center; National Communications System; National Infrastructure Protection Center; Energy Security and Assurance Program; Secret Service; and U.S. Coast Guard. [10] GAO-07-454. [11] GAO, Department of Homeland Security: Improved Assessment and Oversight Needed to Manage Risk of Contracting for Selected Services, GAO-07-990 (Washington, D.C.: Sept. 17, 2007). [12] GAO, Information Technology: DHS's Human Capital Plan Is Largely Consistent with Relevant Guidance, but Improvements and Implementation Steps Are Still Needed, GAO-07-425 (Washington, D.C.: Sept. 10, 2007). [13] The Administration's agency scorecard for real property management was established in fiscal year 2004 to measure each agency's progress in implementing Executive Order 13327 on "Federal Real Property Asset Management." [14] A port of entry is generally a physical location, such as a pedestrian walkway and/or a vehicle plaza with booths, and associated inspection and administration buildings, at a land border crossing point, or a restricted area inside an airport or seaport, where entry into the country by persons and cargo arriving by air, land, or sea is controlled by U.S. Customs and Border Protection. [15] GAO, Border Security: Despite Progress, Weaknesses in Traveler Inspections Exist at Our Nation's Ports of Entry, GAO-08-219 (Washington, D.C.: Nov. 5, 2007). [16] GAO, USICS Transformation: Improvements to Performance, Human Capital, and Information Technology Management Needed as Modernization Proceeds, GAO-07-1013R (Washington, D.C.: July 17, 2007). [17] GAO, Aviation Security: Vulnerabilities Exposed through Covert Testing of TSA's Passenger Screening Process, GAO-08-48T (Washington, D.C.: Nov. 15, 2007). [18] GAO, Maritime Security: The SAFE Port Act: Status and Implementation One Year Later, GAO-08-126T (Washington, D.C.: Oct. 30, 2007). [19] GAO, Critical Infrastructure Protection: Sector Plans and Sector Councils Continue to Evolve, GAO-07-706R (Washington, D.C.: July 10, 2007) and GAO, Critical Infrastructure Protection: Sector-Specific Plans' Coverage of Key Cyber Security Elements Varies, GAO-08-113 (Washington, D.C.: Oct. 31, 2007). [20] The Homeland Security Information Network is DHS's primary conduit for sharing information on domestic terrorist threats, suspicious activity reports, and incident management. [21] GAO, Combating Nuclear Smuggling: Additional Actions Needed to Ensure Adequate Testing of Next Generation Radiation Detection Equipment, GAO-07-1247T (Washington, D.C.: Sept. 18, 2007). [22] See 6 U.S.C. § 341(a)(9)(B). [23] GAO-08-35. [24] GAO-07-454. GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "Subscribe to Updates." Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office: 441 G Street NW, Room LM: Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.