Homeland Security
DHS Improved its Risk-Based Grant Programs' Allocation and Management Methods, But Measuring Programs' Impact on National Capabilities Remains a Challenge
Gao ID: GAO-08-488T March 11, 2008
Since 2002, the Department of Homeland Security (DHS) has distributed over $19 billion in homeland security grants to enhance the nation's preparedness and response capabilities. The Federal Emergency Management Agency (FEMA) is responsible for all preparedness efforts including allocating and managing these grants. This testimony examines (1) the process and methods to allocate homeland security grants to state and local governments, (2) how DHS communicates with states and localities in making grant allocation decisions, (3) what challenges affect the expeditious spending of DHS grant funds by states and localities; and (4) the extent that DHS measured program outcomes as part of its efforts to monitor the expenditure of grant dollars. GAO's testimony is based on products issued from April 2005 through July 2007 on DHS's grant management system, and on GAO's ongoing mandated work related to FEMA's risk-based grant distribution processes for fiscal years 2007 and 2008. To conduct this work, GAO reviewed relevant documents on FEMA's risk analysis model and interviewed agency officials.
DHS uses an evolving risk-based methodology to identify the urban areas eligible for homeland security grants and the amount of funds states and urban areas receive. DHS designed the methodology to measure the relative risk of a given state or urban area using a risk analysis model that defined Risk as the product of Threat times Vulnerability and Consequences (R = T * (V & C)). Given the uncertainties inherent in risk assessment, the methodology uses a combination of empirical data (e.g., population, asset location) and policy judgment (e.g., the nature of the threat for specific areas and the weights to be assigned to specific variables in the model such as critical infrastructure, population, and population density). According to FEMA officials and GAO's review of homeland security grant assistance documents, FEMA communicates with its state and local stakeholders by (1) providing individual threat assessments that DHS is using for its risk analysis model to each state and urban area, (2) validating the nonpublic national infrastructure data that are also part of the risk analysis model, (3) reviewing states' and urban areas' draft investment proposals that are later submitted and rated during DHS's effectiveness assessment process, (4) providing technical assistance as states and urban areas prepare grant applications, and (5) holding post-award conferences to solicit stakeholder feedback. In April 2005, GAO reported that the ability of states and localities to spend grant funds expeditiously was complicated by the need to fulfill legal and procurement requirements, which in some cases added months to the purchasing process. GAO also reported a variety of steps that had been taken by states, DHS, and the Congress to streamline the expenditure of grant funds. However, GAO was unable to examine trends in obligations and expenditures for grant programs across fiscal years because the budget data FEMA provided did not specify grant expenditures by fiscal year and reporting categories were not consistent across fiscal years. Although DHS has taken some steps to establish goals, gather information, and measure progress, its monitoring of homeland security grant expenditures does not provide a means to measure the achievement of desired program outcomes. FEMA's current efforts do not provide information on the effectiveness of those funds in improving the nation's capabilities or reducing risk. DHS leadership has identified this issue as a high priority, and is trying to develop a more quantitative approach to accomplish the goal of using this information for the more strategic purpose of monitoring the achievement of program goals, according to FEMA officials.
GAO-08-488T, Homeland Security: DHS Improved its Risk-Based Grant Programs' Allocation and Management Methods, But Measuring Programs' Impact on National Capabilities Remains a Challenge
This is the accessible text file for GAO report number GAO-08-488T
entitled 'Homeland Security: DHS Improved its Risk-Based Grant
Programs' Allocation and Management Methods, But Measuring Programs'
Impact on National Capabilities Remains a Challenge' which was released
on March 11, 2008.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Testimony Before the Subcommittee on Homeland Security, Committee on
Appropriations, House of Representatives:
United States Government Accountability Office:
GAO:
For Release on Delivery Expected at 2:00 p.m. EDT:
Tuesday, March 11, 2008:
Homeland Security:
DHS Improved its Risk-Based Grant Programs' Allocation and Management
Methods, But Measuring Programs' Impact on National Capabilities
Remains a Challenge:
Statement of William O. Jenkins, Jr., Director:
Homeland Security and Justice Issues:
GAO-08-488T:
GAO Highlights:
Highlights of GAO-08-488T, a testimony before the Subcommittee on
Homeland Security, Committee on Appropriations, House of
Representatives.
Why GAO Did This Study:
Since 2002, the Department of Homeland Security (DHS) has distributed
over $19 billion in homeland security grants to enhance the nation‘s
preparedness and response capabilities. The Federal Emergency
Management Agency (FEMA) is responsible for all preparedness efforts
including allocating and managing these grants. This testimony examines
(1) the process and methods to allocate homeland security grants to
state and local governments, (2) how DHS communicates with states and
localities in making grant allocation decisions, (3) what challenges
affect the expeditious spending of DHS grant funds by states and
localities; and (4) the extent that DHS measured program outcomes as
part of its efforts to monitor the expenditure of grant dollars. GAO‘s
testimony is based on products issued from April 2005 through July 2007
on DHS‘s grant management system, and on GAO‘s ongoing mandated work
related to FEMA‘s risk-based grant distribution processes for fiscal
years 2007 and 2008. To conduct this work, GAO reviewed relevant
documents on FEMA‘s risk analysis model and interviewed agency
officials.
What GAO Found:
DHS uses an evolving risk-based methodology to identify the urban areas
eligible for homeland security grants and the amount of funds states
and urban areas receive. DHS designed the methodology to measure the
relative risk of a given state or urban area using a risk analysis
model that defined Risk as the product of Threat times Vulnerability
and Consequences (R = T * (V & C)). Given the uncertainties inherent in
risk assessment, the methodology uses a combination of empirical data
(e.g., population, asset location) and policy judgment (e.g., the
nature of the threat for specific areas and the weights to be assigned
to specific variables in the model such as critical infrastructure,
population, and population density).
According to FEMA officials and GAO‘s review of homeland security grant
assistance documents, FEMA communicates with its state and local
stakeholders by (1) providing individual threat assessments that DHS is
using for its risk analysis model to each state and urban area, (2)
validating the nonpublic national infrastructure data that are also
part of the risk analysis model, (3) reviewing states‘ and urban areas‘
draft investment proposals that are later submitted and rated during
DHS‘s effectiveness assessment process, (4) providing technical
assistance as states and urban areas prepare grant applications, and
(5) holding post-award conferences to solicit stakeholder feedback.
In April 2005, GAO reported that the ability of states and localities
to spend grant funds expeditiously was complicated by the need to
fulfill legal and procurement requirements, which in some cases added
months to the purchasing process. GAO also reported a variety of steps
that had been taken by states, DHS, and the Congress to streamline the
expenditure of grant funds. However, GAO was unable to examine trends
in obligations and expenditures for grant programs across fiscal years
because the budget data FEMA provided did not specify grant
expenditures by fiscal year and reporting categories were not
consistent across fiscal years.
Although DHS has taken some steps to establish goals, gather
information, and measure progress, its monitoring of homeland security
grant expenditures does not provide a means to measure the achievement
of desired program outcomes. FEMA‘s current efforts do not provide
information on the effectiveness of those funds in improving the
nation‘s capabilities or reducing risk. DHS leadership has identified
this issue as a high priority, and is trying to develop a more
quantitative approach to accomplish the goal of using this information
for the more strategic purpose of monitoring the achievement of program
goals, according to FEMA officials.
What GAO Recommends:
GAO has made recommendations to DHS in prior reports to measure
emergency response capabilities and improve grant allocation decisions.
DHS generally concurred with these recommendations and is making
progress implementing them.
To view the full product, including the scope and methodology, click on
[hyperlink, http://www.GAO-08-488T]. For more information, contact
William O. Jenkins, Jr. at (202) 512-8777 or jenkinswo@gao.gov.
[End of section]
Mr. Chairman and Members of the Subcommittee:
Thank you for the opportunity to discuss the allocation and use of
federal grants to enhance the nation's preparedness for and response to
major and catastrophic disasters. The goal of disaster preparedness and
response is easy to state but difficult to achieve and can be stated as
follows:
To prevent where possible, prepare for, mitigate, and respond to
disasters of any size or cause with well-planned, well-coordinated, and
effective actions that minimize the loss of life and property and set
the stage for a quick recovery.
Achieving this goal for major and catastrophic disasters is a difficult
task. It takes hard work, attention to details, and effective pre-and
post-disaster coordination and cooperation among different levels of
government, nongovernmental organizations, and the private sector.
Individuals can also contribute to success through such things as
knowing evacuation routes, complying with evacuation orders, and having
a family and individual disaster preparation plan and supplies.
Homeland security grants are the federal government's primary tool for
enhancing state, local, and tribal governments' emergency preparedness
and response capabilities. Since 2002, the Department of Homeland
Security (DHS) has distributed over $19 billion in federal funding for
planning, equipment, and training to enhance the nation's capabilities
to respond to terrorist attacks and, to a lesser extent, natural and
accidental disasters.[Footnote 1] The Post-Katrina Emergency
Management Reform Act places responsibility for allocating and managing
DHS grants with the Federal Emergency Management Agency
(FEMA).[Footnote 2] Prior to the act, the organization within DHS
principally responsible for administering such grants had no
operational responsibilities for disaster response. The act also
includes provisions to strengthen FEMA's organizational capacity to
coordinate with states and localities in preparing for and responding
to major and catastrophic disasters regardless of cause by
consolidating federal emergency preparedness and response
responsibilities and authorities within FEMA. Now that FEMA has the
consolidated responsibilities and associated authorities for national
emergency preparedness, the agency has a unique opportunity to evaluate
how it can most effectively target the grants by viewing the grant
programs collectively, rather than only in terms of the individual
programs' objectives.
My statement describes GAO's past work as well as ongoing work on DHS's
grant management system, specifically, the grant management efforts
that are now the responsibility of FEMA and addresses the following
questions:
(1) What methods does DHS use to allocate homeland security grants to
state and local governments?
(2) How does DHS communicate with states and localities in making
federal grant allocation decisions?
(3) What are the challenges that affect the expeditious spending of DHS
grant funds by states and localities?
(4) To what extent does DHS measure program outcomes as part of its
efforts to monitor the expenditure of grant dollars?
My comments are based on GAO's historical body of work on DHS grants
management, including prior reviews of DHS's (1) risk management
efforts,[Footnote 3] (2) methodology for allocating Urban Area Security
Initiative (UASI) grants for fiscal years 2006 and 2007,[Footnote 4]
(3) processes for managing their state homeland security[Footnote 5]
and transportation sector-specific grants,[Footnote 6] and (4)
preparedness for disasters, including FEMA's reorganization based on
the Post-Katrina Reform Act.[Footnote 7] In addition, my comments are
based on our ongoing mandated work examining the risk-based grant
distribution processes used by FEMA to distribute the fiscal year 2008
Homeland Security Grant Program (HSGP). This program includes the UASI
grants as well as the State Homeland Security Program (SHSP) which
provides funding for state, local, and tribal governments. For our
ongoing work, we analyzed DHS documents including the fiscal years 2007
and 2008 risk analysis models, grant guidance, and presentations, and
interviewed DHS officials about the HSGP grant determination process in
fiscal year 2007 as well as any changes to the fiscal year 2008
process. We conducted this work according to generally accepted
government auditing standards. Those standards require that we plan and
perform the audit to obtain sufficient, appropriate evidence to provide
a reasonable basis for our findings and conclusions based on our audit
objectives. We believe that the evidence obtained provides a reasonable
basis for our findings and conclusions based on our audit objectives.
Summary:
For fiscal years 2005 through 2008, DHS has used an evolving risk-based
methodology to identify the urban areas eligible for HSGP grants and
the amount of funds states and urban areas receive.[Footnote 8] DHS
designed the methodology to measure the relative risk of a given state
or urban area using a risk analysis model based on information about
each state and urban area. Initially, this relative risk measurement
relied primarily on information related to population and population
density, but the data DHS included in the model and how DHS used those
data to measure relative risk have evolved with each year's risk
assessment. Since fiscal year 2006, DHS has adopted a more
sophisticated risk-based grant allocation approach to (1) determine
both states and urban areas' potential risk relative to other areas
that includes empirical analytical methods and policy judgments, and
(2) assess and score the effectiveness of the proposed investments
submitted by the eligible applicants and determine the final amount of
funds awarded. For the HSGP allocation process in fiscal year 2007, DHS
defined Risk as the product of Threat times Vulnerability and
Consequences (R= T* (V & C)).[Footnote 9] Our ongoing work has shown
that DHS has defined risk in the same manner for fiscal year 2008.
According to FEMA officials and HSGP grant assistance documents, FEMA
communicates with its state and local stakeholders by (1) providing to
each state and urban area the individual threat assessments DHS is
using for its risk analysis model, (2) validating the nonpublic
national infrastructure data that are also part of the risk analysis
model, (3) reviewing states' and urban areas' draft investment
proposals that are later submitted and rated during DHS's effectiveness
assessment process, (4) providing technical assistance as states and
urban areas prepare grant applications, and (5) holding post-award
conferences to solicit stakeholder feedback.
We reported in April 2005 that the ability of states and localities to
spend grant funds expeditiously was complicated by the need to fulfill
these state and local legal and procurement requirements, which in some
cases added months to the purchasing process. For example, once grant
funds are awarded to the states and then subgranted to the local
jurisdictions or urban areas, certain legal and procurement
requirements may have to be met, such as a city council's approval to
accept grant awards. Or, if the state legislature must approve how the
grant funds will be expended and is not in session when the grant funds
are awarded, it could take as long as 4 months to obtain state approval
to spend the funds. We also reported a variety of steps that had been
taken by states, DHS, and the Congress to streamline the expenditure of
grant funds such as some states establishing centralized purchasing
systems and the Congress passing a provision that exempted some
homeland security grant programs from requirements in the Cash
Management Improvement Act so that grantees could receive grant funds
in advance of the time that funds were needed to liquidate obligations
(e.g., pay for goods and services received). DHS has obligated about
$20 billion in grants for emergency preparedness and response from
fiscal years 2002 through 2007, about $7 billion was unexpended as of
January 2008. Because of inconsistencies in DHS's reporting of grant
expenditures over time, we are unable to analyze expenditure trends by
grant and fiscal year to determine if funds are now being spent more
quickly.
DHS has taken steps to establish goals, gather information, and measure
progress, yet its monitoring of grant expenditures does not provide a
means to measure the achievement of desired program outcomes to
strengthen the nation's homeland security capabilities. We still know
little about how states have used federal funds to build their
capabilities or reduce risks. This is because neither FEMA nor its
predecessor for grant management (from fiscal years 2003 through 2007)
has yet developed a system to compile grant information in a manner
that allows for effective analysis of the obligation, expenditure, and
use of homeland security grants funds. For example, FEMA officials said
that they currently rely on the grant monitoring process to assess the
extent that states and urban areas are building capabilities. However,
these efforts do not provide information on how states and localities
finance their efforts in this area, how federal funds have been used,
the extent to which federal funds supplement or supplant ongoing state
and local expenditures, and the effectiveness of those funds in
improving the nation's capabilities or reducing risk. According to FEMA
officials, DHS leadership has identified this issue as a high priority,
and is trying to come up with a more quantitative approach to
accomplish the goal of using this information for the more strategic
purpose of monitoring the achievement of program goals.
Background:
Risk management has been endorsed by the Congress, the President, and
Secretary of DHS as a way to direct finite resources to those areas
that are most at risk of terrorist attack under conditions of
uncertainty. The purpose of risk management is not to eliminate all
risks, as that is an impossible task. Rather, given limited resources,
risk management is a structured means of making informed trade-offs and
choices about how to use available resources effectively and monitoring
the effect of those choices. Thus, risk management is a continuous
process that includes the assessment of threats, vulnerabilities, and
consequences to determine what actions should be taken to reduce or
eliminate one or more of these elements of risk. Risk management
includes a feedback loop that continually incorporates new information,
such as changing threats or the effect of actions taken to reduce or
eliminate identified threats, vulnerabilities, and/or consequences.
Because we have imperfect information for assessing risks, there is a
degree of uncertainty in the information used for risk assessments
(e.g., what the threats are and how likely they are to be realized). As
a result, it is inevitable that assumptions and policy judgments must
be used in risk analysis and management. It is important that key
decision makers understand the basis for those assumptions and policy
judgments and their effect on the results of the risk analysis and the
resource decisions based on that analysis.
Since fiscal year 2006, DHS has applied a three-step process which
incorporates analyses of risk and effectiveness, to select eligible
urban areas and allocate UASI and SHSP funds (see fig. 1):
1. Implementation of a risk analysis model to calculate scores for
states and urban areas, defining relative Risk, as the product of
Threat, Vulnerability, and Consequences.
2. Implementation of an effectiveness assessment, including a peer
review process, to assess and score the effectiveness of the proposed
investments submitted by the eligible applicants.
3. Calculation of a final allocation of funds based on states' and
urban areas' risk scores as adjusted by their effectiveness scores.
Figure 1: Overview of the Grant Allocation Methodology for UASI and
SHSP:
[See PDF for image]
This figure is an illustration of the Overview of the Grant Allocation
Methodology for UASI and SHSP. The following information is depicted:
UASI:
Phase 1: Risk Analysis;
Risk estimator: R = T x (V&C) [Relative risk estimate];
Relative risk is presented as a graph. Where relative risk drops and a
cutoff point of about 42 urban areas is established, the result is a
risk score.
Phase 2: Effectiveness assessment:
Peer review of Investment Justifications: yields an Effectiveness
score.
Phase 3: Final allocation:
Effectiveness/risk matrix: Left axis is risk score; right axis is
effectiveness score. As both score increase, allocations increase.
SGSG:
Phase 1: Risk Analysis;
Risk estimator: R = T x (V&C) [Relative risk estimate];
Relative risk is presented as a graph. Where relative risk drops versus
the number of states and territories, the result is a risk score.
Phase 2: Effectiveness assessment:
Peer review of Investment Justifications: yields an Effectiveness
score.
Phase 3: Final allocation:
Effectiveness/risk matrix: Left axis is risk score; right axis is
effectiveness score. As both score increase, allocations increase.
There is a statutory minimum of .375%[A].
[A] The statutory minimum of 0.375 percent of the total funds
appropriated for SHSP and UASI is for fiscal year 2008. In fiscal years
2006 and 2007, the statutory per state minimum equaled 0.75 percent of
funds appropriated for SHSP only.
Source: GAO analysis of DHS documents and information provided in
interviews.
[End of figure]
As a result of the Post-Katrina Emergency Reform Act, FEMA is now
responsible for the nation's homeland security preparedness effort to
define what needs to be done, where, and by whom (roles and
responsibilities); how it should be done; and how well it should be
done--that is, according to what standards. This is a complex but
critically important responsibility. The principal national documents
designed to address each of these are, respectively, the National
Response Framework (and its associated annexes), the National Incident
Management System, and the National Preparedness Guidelines. To develop
preparedness goals and determine the tasks and capabilities needed by
first responders on a nationwide basis, DHS used an approach known as
capabilities-based planning to develop the national Target Capabilities
List. The list includes specific goals, requirements, and metrics for
36 capabilities needed at the local, state, or federal level to prepare
for, respond to, and recover from natural or man-made disasters. DHS
defined these capabilities generically and expressed them in terms of
desired operational outcomes and essential characteristics, rather than
dictating specific, quantifiable responsibilities to the various
jurisdictions. Because no single jurisdiction or agency would be
expected to perform every task, possession of a target capability could
involve enhancing and maintaining local resources, ensuring access to
regional and federal resources, or some combination of the two. The
original list has since been refined, and FEMA released the most recent
version of the list, with 37 capabilities, in September 2007.
The Implementing Recommendations of the 9/11 Commission Act (9/11 Act)
of 2007 further defined FEMA's role and coordination processes for
working with states and urban areas in awarding homeland security
grants.[Footnote 10] For example, the 9/11 Act requires FEMA to provide
eligible metropolitan areas with the opportunity to submit relevant
information prior to FEMA's initial assessment of the relative threat,
vulnerability, and consequences each area faces from acts of terrorism.
This opportunity is to allow potential grantees to correct any
erroneous or incomplete information that will be the basis of FEMA's
initial assessment.[Footnote 11]
DHS Has Used an Evolving Risk-Based Methodology to Allocate Federal
Grant Funds:
DHS has used an evolving risk-based methodology to identify the states
and urban areas eligible for HSGP grants and the amount of funds they
receive. For example, the fiscal year 2005 risk analysis model largely
relied on measures of population and population density to determine
the relative risk of potential grant recipients. The fiscal year 2006
process introduced assessments of threat, vulnerability and
consequences of a terrorist attack in assessing risk. The fiscal year
2006 risk analysis model estimated relative risk from two perspectives-
-asset-based and geographic--then combined the assessments, assigning
twice as much weight to geographic as asset-based risk. In DHS's view,
asset-based and geographic risks are complementary and provide a
"micro-and macro-" perspective of risk, respectively. In calculating
these relative risk scores and addressing the uncertainties in
estimating relative risk, policy and analytic judgments were required.
For example, according to DHS officials, DHS made the judgment to
assign geographic risk a weight of 1.0 and asset-based risk a weight of
0.5, since a potential loss of lives within an area would contribute to
how geographic risk is assessed. Some of the factors used in the fiscal
year 2006 risk analysis model included: the number of specific types of
reports or events, such as reports of suspicious incidents; the number
of visitors a state or urban area received from countries of interest;
and population. In addition to modifications to DHS's risk analysis
model, DHS adopted an effectiveness assessment for fiscal year 2006 to
determine the anticipated effectiveness of the various risk mitigation
investments urban areas proposed, which affected the final amount of
funds awarded to eligible areas.
The risk analysis method for fiscal year 2007--which is largely
unchanged for fiscal year 2008, according to our ongoing work--was
changed substantially from the fiscal year 2006 process, and further
exemplifies the continuing evolution in DHS's approach to its risk
methodology for grant allocation.[Footnote 12] Given the uncertainties
inherent in risk assessment, the methodology uses a combination of
empirical data (e.g., population, asset location) and policy judgment
(e.g., the nature of the threat for specific areas and the weights to
be assigned to specific variables in the model such as critical
infrastructure, and population and population density). According to
DHS officials, the fiscal year 2007 risk analysis model integrates the
separate analyses for asset-based and geographic-based risk used in
fiscal year 2006, and includes more sensitivity analysis in determining
what the final results of its risk analysis should be.[Footnote 13] DHS
officials said the primary goal was to make the process more
transparent and more easily understood, focusing on key variables and
incorporating comments from a variety of stakeholders regarding the
fiscal year 2006 process. Figure 2 provides an overview of the factors
included in the risk analysis model for fiscal year 2007 and, according
to our ongoing work, for fiscal year 2008 and their relative weights.
The maximum relative risk score possible for a given area was 100. The
Threat Index accounted for 20 percent of the total risk score;
Vulnerability and Consequences accounted for 80 percent. For the
purposes of the model, DHS considered all areas of the nation equally
vulnerable to attack and assigned every state and urban area a
vulnerability score of 1.0. Thus, as a practical matter, the final risk
score for fiscal years 2007 and 2008 is determined by the threat and
consequences scores.
Figure 2: DHS's Model Used in Determining Relative Risk Scores:
[See PDF for image]
This figure is an illustration of DHS's Model Used in Determining
Relative Risk Scores. The following information is provided:
Risk = Threat Index (T) x Vulnerability and Consequence Index (V&C =
[P+E+I+N]):
Threat Index (T):
Data: On-going plot lines, credible reporting, relevant investigations
to create threat tiers;
Source: DHS Chief Intelligence Officer, intelligence community data.
Vulnerability and Consequence Index:
* Population Index (P):
Data: Total population (nighttime, commuter, visitor, military
dependent) and population density (constrained to 50 percent impact);
Source: Census, LandScan, Smith Travel, and DOD.
* Economic Index (E):
Data: Gross Metropolitan Product (UASI)/percent GDP (state analysis);
Source: Global Insight/Department of Commerce, Bureau of Economic
Statistics.
* National Infrastructure Index (I):
Data: # Tier 1 Assets (x3) plus # Tier 2 assets;
Source: DHS/OIP, SSAs, States.
* National Security Index (N):
Data: Presence of Military Bases (yes/no) plus # DIB plus #
International border crossings;
Source: DOD, DHS/CBP.
Risk Scores:
Population index: 40%;
Economic index: 20%;
Threat index: 20%;
National Infrastructure index: 15%;
National Security index: 5%.
Source: DHS.
Note: "On-going plot lines" reflects DHS analysis of threat information
having a nexus with international terrorism or its affiliates. "DHS/
OIP" stands for DHS's Office of Infrastructure Protection, "SSAs"
stands for Sector-Specific Federal Agencies, "DHS/CBP" stands for the
DHS's Customs and Border Protection, and "DIB" stands for "defense
industrial base."
[End of figure]
Threat: The Threat Index accounted for 20 percent of the total risk
score, which was calculated by the intelligence community by assessing
threat information for multiple years (generally, from 9/11 forward)
for all candidate urban areas and categorizing urban areas into one of
four tiers. Tier I included those at highest threat, relative to the
other areas, and tier IV included those at lowest threat relative to
the others. DHS's Office of Intelligence and Analysis performed this
review and provided these threat assessments and corresponding threat
values for each urban area. In contrast, for the 2006 grant cycle, DHS
used total counts of threats and suspicious incidents and incorporated
these into its model. The final threat assessments are approved by the
intelligence community--the Federal Bureau of Investigation, Central
Intelligence Agency, National Counter-Terrorism Center, and the Defense
Intelligence Agency--along with the DHS Under Secretary for
Intelligence & Analysis and the Secretary of DHS, according to DHS
officials.
Vulnerability and Consequences: Vulnerability and Consequences
accounted for 80 percent of the total risk score and were represented
by the following four indexes:
* Population Index (40 percent): This variable included nighttime
population and military dependent populations for states and urban
areas, based upon U.S. Census Bureau and Department of Defense inputs.
In addition, for urban areas, population density, commuters, and
visitors were also factored into this variable, using data from private
entities.
* Economic Index (20 percent): This variable considered the economic
value of the goods and services produced in either a state or an urban
area. For states, this index was calculated using U.S. Department of
Commerce data on their percentage contribution to Gross Domestic
Product. For UASI urban areas, a parallel calculation of Gross
Metropolitan Product was incorporated.
* National Infrastructure Index (15 percent): This variable focused on
over 2,000 Tier I and Tier II critical infrastructure/key resource
assets that were identified by DHS's Office of Infrastructure
Protection. Tier I assets or systems are those that if attacked could
trigger major national or regional impacts similar to those experienced
during Hurricane Katrina or 9/11. Tier II assets are other highly
consequential assets with potential national or regional impacts if
attacked.
* National Security Index (5 percent): This variable considered the
presence of three key national security factors: whether military bases
are present in the state or urban area; how many critical defense
industrial base facilities are located in the state or urban area; and
the total number of people traversing international borders.
Information on these inputs comes from the Department of Defense and
DHS.
To assess vulnerability and consequences, DHS specifically wanted to
capture key land and sea ports of entry into the United States and the
location of defense industrial base facilities and nationally critical
infrastructure facilities.[Footnote 14] For fiscal year 2007 and,
according to our ongoing work, for fiscal year 2008, DHS considered
most areas of the country equally vulnerable to a terrorist attack,
given freedom of movement within the nation; and focused on the
seriousness of the consequences of a successful terrorist attack.
Nationwide more than 2,000 critical infrastructure assets were included
in the risk model and selected on the basis of analysis by DHS
infrastructure protection analysts, sector-specific federal agencies,
and the states. According to DHS, these critical infrastructure assets
were grouped into two tiers: Tier 1 assets encompassed those that if
attacked could cause major national or regional impacts similar to
those from Hurricane Katrina or 9/11, while Tier 2 assets were those
with potential national or regional impacts if attacked. On the basis
of DHS's Office of Infrastructure Protection analysis, Tier I assets
were weighted using an average value three times as great as Tier II
assets. According to DHS officials, defense industrial base assets were
included in the national security index and all other assets in the
national infrastructure index.
Effectiveness Assessment Used to Adjust Risk Scores:
Since fiscal year 2006, DHS has also implemented an Effectiveness
Assessment to assess and score the effectiveness of the proposed
investments submitted by grant applicants in addition to determining
relative risk using the risk analysis model. This effectiveness
assessment process has remained largely unchanged since it was first
introduced by DHS. To assess the anticipated effectiveness of the
various risk mitigation investments that states and urban areas
proposed, DHS required states and urban areas to submit investment
justifications as part of their grant application. The investment
justifications included up to 15 "investments" or proposed solutions to
address homeland security needs, which were identified by the states
and urban areas through their strategic planning process. DHS used
subject-matter experts as peer reviewers to assess these investment
justifications. The criteria reviewers used to score the investment
justifications included the following categories: relevance to the
National Preparedness Guidance and to state and local homeland security
plans, anticipated impact, sustainability, regionalism, and the
implementation of each proposed investment. Reviewers on each panel
assigned scores for these investment justifications, which according to
DHS officials were averaged to determine a final effectiveness score
for each state and urban area applicant. DHS then used these
effectiveness assessment scores to calculate the final allocation of
funds to states and urban areas.
DHS Has a Variety of Mechanisms in Place to Communicate with States and
Localities about Grant Allocation Decisions:
According to DHS officials and HSGP grant assistance documents we
reviewed, DHS communicates with its state and local stakeholders by:
(1) providing to each state and urban area the individual threat
assessments that DHS is using to calculate the risk analysis model's
Threat Index; (2) validating the nonpublic, critical infrastructure
assets that comprise the risk analysis model's National Infrastructure
Index; (3) providing midpoint reviews of states' and urban areas' draft
investment justification proposals that are later reviewed during DHS's
effectiveness assessment process; (4) providing technical assistance as
states and urban areas prepare the documentation for their grant
applications; and (5) convening conferences to solicit stakeholder
feedback.
DHS provides threat assessments for state and urban areas. DHS's Office
of Intelligence and Analysis (I&A) officials said they develop and
provide threat assessments to the states' and urban areas' grant
applicants prior to the grant application process for their review.
State and urban area strategic planning and grant planning officials
use this information to develop their grant investment justifications,
according to DHS officials. I&A officials said they provide secret and
nonsecret versions of the information so that state or urban area
officials who do not have the appropriate clearances required to view
the secret version of their threat assessments will still have access
to some of the threat information. They said they are working with
local law enforcement agencies on a way to address such clearance
issues.
DHS validates the nonpublic, critical infrastructure assets used in the
risk analysis model. DHS officials also said that the agency uses a
collaborative, multistep process to create a list of national critical
infrastructure assets for use in the National Infrastructure Index, one
of the four indices that comprise the Vulnerability and Consequences
component of the risk analysis model. According to DHS officials, they
use a step-by-step process to identify the nation's Tier 1 and Tier 2
critical infrastructure assets. First, DHS's Office of Infrastructure
Protection (OIP) works with sector-specific agencies to develop
criteria used to determine which assets should be placed in a threat
tier. Second, private-sector companies vet the criteria through sector-
specific councils that review the criteria and provide feedback to DHS
OIP. Third, the infrastructure office finalizes the criteria list and
provides the list to the sector-specific agencies and asks states to
nominate assets within their jurisdictions that match the criteria.
Finally, the infrastructure office and the sector-specific agencies
review nominated assets to decide which assets comprise the final Tier
1/Tier 2 list. In 2007, DHS began to allow sector-specific agencies to
resubmit for reconsideration assets that are not initially selected for
the list to ensure the consideration of potential critical
infrastructure assets in future years.
Enacted in August 2007, the 9/11 Act required DHS to provide eligible
metropolitan areas with the opportunity to submit information that they
believe to be relevant to the determination of the threat,
vulnerability, and consequences they face from acts of terrorism, prior
to FEMA conducting each initial assessment, so that any erroneous or
incomplete information can be corrected.[Footnote 15] According to FEMA
officials, DHS implemented this provision mainly through the outreach
and communication efforts described above.
DHS provides midpoint reviews of states' and urban areas' investment
proposals. FEMA officials said that, for the fiscal year 2007
effectiveness assessment process, DHS offered a midpoint technical
review of states' and urban areas' draft 2007 Investment Justifications
prior to the formal submission of these proposals to FEMA's peer review
process. DHS officials said that they performed an after-action
analysis of this effort and found states and urban areas that made use
of the midpoint reviews had effectiveness scores that on average were 6
percent higher than those for states and urban areas that did not take
advantage of this DHS service.
DHS provides technical assistance as states and urban areas prepare
investment documentation. DHS also provides Program Management
Technical Assistance, and Investment Planning Technical Assistance
workshops to assist states and urban areas. For example, the Program
Management Technical Assistance service is designed to help the State
Administrative Agency with day-to-day program management in planning,
managing, and evaluating state programs in the context of the National
Preparedness Guidance, according to DHS. They said Program Management
Technical Assistance helps state administrators use DHS's Program
Management Handbook to manage programs that span agencies,
jurisdictions, and disciplines, including the private sector. DHS also
offers guidance on how to enhance existing state and urban area
Homeland Security Strategies and Enhancement Plans.
DHS convenes conferences to solicit stakeholder feedback. Finally, DHS
has convened conferences in an effort to solicit stakeholder feedback
after the fiscal years 2006 and 2007 grants were awarded. In July 2006,
DHS convened a Homeland Security Grant Program After-Action conference
to gather feedback on the UASI grant award process. DHS also assembled
working groups to discuss and assess homeland security planning, the
HSGP guidance and application, the risk assessment, and the
effectiveness assessment. DHS officials told us that the conference
provided a feedback loop intended to bolster stakeholder support and
promote transparency. The state and local partners who participated in
the working groups at the conference developed 32 recommendations to
improve the HSGP process. For example, one of the risk assessment
working group's recommendations was that DHS should provide detailed
briefings to state and local partners on the core components of the
risk methodology used in the fiscal year 2006 process as one step to
improve the transparency of the risk analysis process. DHS also
convened a similar after-action conference in early August 2007 to
solicit stakeholder feedback on the fiscal year 2007 HSGP and hosted
three regional conferences in the fall of 2007 to foster collaboration
among regional partners and seek additional feedback.
Prior DHS Efforts Improved the Timeliness of Transferring Grant Funds
to States and Localities:
From fiscal years 2002 through 2007, DHS obligated about $19.6 billion
in grants, the purpose of which was to strengthen the capabilities of
state, local, and tribal governments and others to prepare for and
respond to major disasters of any type or cause. About $7 billion of
this total was unexpended as of January 2008. As might be expected, the
more recent the fiscal year, the higher the unexpended balance (see
fig. 3). For example, the Homeland Security and UASI grant awards are
announced in May or June of each year--or about 3 to 4 months before
the end of the fiscal year. The awards for fiscal year 2007 were
announced in May 2007. Thus, one would expect large unexpended balances
for the most recent fiscal year because the grant recipients would have
had only a few months to use their funds prior to the end of the fiscal
year.
Figure 3: Percent of Obligated DHS Grant Funds for Fiscal Years 2002
through 2007 That Were Unexpended as of January 2008:
[See PDF for image]
This figure is a stacked bar graph depicting the percent of Obligated
DHS Grant Funds for fiscal years 2002 through 2007 that were unexpended
as of January 2008. The following data is depicted:
Fiscal year: 2002;
Total obligated: $904,896,644;
Total unexpended balance: $8,778,762;
Percentage of obligated funds remaining unexpended: 0.97%.
Fiscal year: 2003;
Total obligated: $4,212,657,367;
Total unexpended balance: $134,507,771;
Percentage of obligated funds remaining unexpended: 3.19%.
Fiscal year: 2004;
Total obligated: $4,115,804,654;
Total unexpended balance: $231,166,967;
Percentage of obligated funds remaining unexpended: 5.62%.
Fiscal year: 2005;
Total obligated: $3,613,950,575;
Total unexpended balance: $964,860,220;
Percentage of obligated funds remaining unexpended: 26.70%.
Fiscal year: 2006;
Total obligated: $2,870,988,081;
Total unexpended balance: $1,961,627,924;
Percentage of obligated funds remaining unexpended: 68.33%.
Fiscal year: 2007;
Total obligated: $3,847,052,100;
Total unexpended balance: $3,731,808,088;
Percentage of obligated funds remaining unexpended: 97.00%.
Source: FEMA, as of January, 2008.
[End of figure]
In 2005, we reported on DHS's efforts to distribute grants and found
that the Congress, DHS, states, and localities had acted to expedite
grant awards and distribution by setting time limits for the grant
application, award, and distribution processes and by instituting other
procedures.[Footnote 16] We concluded that the ability of states and
localities to spend grant funds expeditiously was complicated by the
need to fulfill state and local legal and procurement requirements,
which in some cases added months to the purchasing process. We also
reported that some states had modified their procurement practices and
DHS was identifying best practices to aid in the effort, but challenges
remained, such as continuing legal and procurement requirements that
slowed the process. For example, once the grant funds are awarded to
the states and then subgranted to the local jurisdictions or urban
areas, certain legal and procurement requirements may have to be met,
such as a city council's approval to accept grant awards. Or, if the
state legislature must approve how the grant funds will be expended and
is not in session when the grant funds are awarded, it could take as
long as 4 months to obtain state approval to spend the funds.[Footnote
17] We reported a variety of steps that had been taken by states, DHS,
and the Congress to streamline the expenditure of grant funds. For
example:
* Some states, in conjunction with DHS, had modified their procurement
practices to expedite the procurement of equipment and services by
establishing centralized purchasing systems that allow equipment and
services to be purchased by the state on behalf of local jurisdictions,
freeing them from some local legal and procurement requirements.
Several states had developed statewide procurement contracts that allow
local jurisdictions to buy equipment and services using a prenegotiated
state contract.
* DHS had enhanced equipment procurement options through agreements
with the U.S. Department of Defense's Defense Logistics Agency and the
Marine Corps Systems Command, to allow state and local jurisdictions to
purchase equipment directly from their prime vendors. These agreements
provide an alternative to state and local procurement processes and,
according to DHS, often result in a more rapid product delivery at a
lower cost.
* The fiscal year 2005 DHS appropriations legislation included a
provision that exempted formula-based grants (e.g., the State Homeland
Security Grant Program grants) and discretionary grants, including the
Urban Areas Security Initiative and other grants, from requirements in
the Cash Management Improvement Act that provide for reimbursement to
states and localities only after they have incurred an obligation, such
as a purchase order, to pay for goods and services. Subsequent DHS
guidance allowed states and localities to draw down funds up to 120
days prior to expenditure.
We do not know the extent to which the actions that states and
localities have taken to address the obstacles that affected their
ability to use funds expeditiously (but effectively) have succeeded. We
were unable to examine trends in expended and unexpended obligations
for individual grants across fiscal years due to limitations in the
budget data provided by FEMA for this hearing. For example, we were
unable to track HSGP funding data across multiple fiscal years, such as
the amount of fiscal year 2005 funds that were expended in fiscal years
2005, 2006, and 2007. In addition, we found that reporting categories
were not consistent across fiscal years. Grant program data were
collapsed in one fiscal year and compiled differently in another year.
According to one DHS official, while the consolidation of all DHS grant
programs into FEMA provides FEMA with an opportunity to standardize and
enhance its management of grant allocation and distribution, this
administrative transition has also resulted in some reorganization of
accounting functions, and institutionalizing the maintenance of grant
funding data is still being addressed at this time. Whatever the cause,
the inconsistency in reporting on grant expenditures across fiscal
years could hinder FEMA's ability to provide the Congress with
information on trends in expenditures over time for specific grants. As
part of our ongoing work in reviewing DHS grant allocation and
management efforts, we plan to determine whether the data FEMA
maintains on grant expenditures across fiscal years allows FEMA to
analyze trends in grant obligations and expenditures.
DHS Does Not Yet Have a Means to Measure Program Outcomes to Further
the Nation's Homeland Security Preparedness Goals:
While DHS has distributed over $19 billion in federal emergency
preparedness funding to states, localities, and territories since
fiscal year 2002, and taken steps to gather information, establish
goals and measures, and measure progress, we still know little about
how states have used federal funds to build their capabilities or
reduce risks. Nor do we know how effective this national investment has
been because DHS's monitoring of homeland security grant expenditures
does not provide a means to measure the achievement of desired program
outcomes to strengthen the nation's homeland security capabilities. In
March 2007, we testified before this Committee that a comprehensive and
in-depth oversight agenda requires assessing state and local
capabilities and the use of federal grants in building and sustaining
those capabilities. However, all levels of government are still
struggling to define and act on the answers to basic--but hardly
simple--questions about emergency preparedness and response: What is
important (that is, what are our priorities)? How do we know what is
important (e.g., risk assessments, performance standards)? How do we
measure, attain, and sustain success? On what basis do we make
necessary trade-offs, given finite resources? DHS has limited
information on which to base the answers to these questions.
We have identified the need for such capabilities-based assessment and
reporting of the effectiveness of federal grant investments in several
DHS grant programs. For example, in our review of cargo tanker
emergency response in December 2007, we recommended that the Secretary
of Homeland Security work with federal, state, and local stakeholders
to develop explicit performance measures for emergency response
capabilities and use them in risk-based analyses to set priorities for
DHS grant programs in acquiring needed response resources.[Footnote 18]
DHS responded that it was taking the recommendation under advisement
and was exploring approaches to address our recommendation. Similarly,
in our review of DHS's efforts to improve interoperable communications
in April 2007, we reported that no process has been established for
ensuring that states' grant requests are consistent with their
statewide plans and long-term objectives for improving
interoperability.[Footnote 19] We recommended that DHS assess how
states' grant requests support their statewide communications plans and
include the assessment as a factor in making DHS grant allocation
decisions. Although DHS did not comment on this recommendation at the
time, in August 2007 DHS officials told us they were working to ensure
that all grant funding is tied to statewide interoperable
communications plans.[Footnote 20]
In a May 2007 testimony, we noted that more immediate congressional
attention might focus on evaluating the construction and effectiveness
of the National Preparedness System, which is mandated under the Post-
Katrina Reform Act. DHS has taken steps to develop and issue key
components of the system, including a national domestic all-hazards
preparedness goal and readiness metrics and standards for preparedness
in the form of target capabilities.[Footnote 21] Specifically, in
September 2007, DHS issued a goal for national preparedness, now
referred to as the National Preparedness Guidelines. According to DHS,
the guidelines establish "a vision for national preparedness and
provide a systematic approach for prioritizing preparedness efforts
across the Nation," and generally define a goal for the National
Preparedness system. The guidelines are based on a capability-based
planning process that identified target capabilities that are to be
then used to establish measures for preparedness.
According to DHS officials, one way DHS is attempting to monitor the
development of emergency preparedness capabilities is through the
Effectiveness Assessment described above, that began as part of DHS's
fiscal year 2006 HSPG grant guidance. According to program
requirements, eligible recipients must provide an "investment
justification" with their grant application that links their
investments to the initiatives outlined in their state's Program and
Capability Enhancement Plan. DHS officials have said that they cannot
yet assess how effective the actual investments from grant funds are in
enhancing preparedness and mitigating risk because they do not yet have
the metrics to do so and there is insufficient historical information
from the grant monitoring process to assess the extent to which states
and urban areas are building capabilities.
The Post-Katrina Reform Act established a requirement to create another
source of information on state capabilities. The act calls for an
annual preparedness report from all states by January 4, 2008, and
annually thereafter, but FEMA has extended the deadline for this
requirement.[Footnote 22] In December 2007, FEMA extended the State
Preparedness Report deadline from January 4 to March 31, 2008 and
requested that each state administrative agency submit a brief letter
providing a status update on its State Preparedness Report by early
this year. The state reports are to include assessments of:
* State compliance with the national preparedness system, the National
Response Framework, the National Incident Management System, and other
related plans and strategies.
* Current capability levels and a description of target capability
levels.
* Resource needs to meet the preparedness priorities established in
conjunction with the Target Capabilities List, including (1) an
estimate of the amount of expenditure required to attain the
preparedness priorities, and (2) the extent to which the use of federal
assistance during the preceding fiscal year achieved the preparedness
priorities.
Beginning in October 2007, DHS is also responsible for an annual
federal preparedness report that is to include, among other things, an
assessment of the extent to which the use of federal assistance during
the preceding fiscal year achieved the preparedness priorities
established under the act.
Since 2005, DHS has produced an Annual Report on Preparedness Funding,
which includes data on the obligation, expenditure status, and use of
funds for all major federal preparedness grants--including non-DHS
grants--awarded to states, localities, and other nonfederal entities.
According to DHS, this effort is designed to provide decision makers
with critical preparedness funding information as they determine how to
best allocate resources to achieve target levels of capability to
prevent, prepare, respond to, and recover from major events, especially
terrorism. However, the report notes the information is of limited
usefulness because federal departments and agencies interpret and
define the terms obligation, expenditure status, and use of funds
differently. The report provides a national-level summary of the use of
grant funds such as equipment or training, rather than an assessment of
state capability enhancements provided as a result of federal grant
funding. According to DHS, subsequent reports may provide more detailed
analysis and findings, as consistent procedures and definitions are
implemented across grant programs and departments.
Conclusions:
The task of enhancing first responder capabilities across the nation is
a complex and daunting one. DHS must continue to support FEMA's efforts
to work with state, local, and tribal governments, and the private
sector on the tasks it has begun. At the same time, these stakeholders
must recognize that the process is iterative, will include periodic
adjustments and refinements, and that risks are not equally distributed
across the nation. As the principal federal agency now responsible for
preparedness and response, FEMA has a unique opportunity to evaluate
how it can most effectively target and integrate grants with its other
efforts to enhance the nation's all-hazard disaster preparedness and
response system. This can best be done by viewing these grants
collectively, rather than individually. It is also important that FEMA
and grant recipients be able to assess and report on how the grants
have been used to enhance emergency preparedness and response
capabilities and reduce risk.
We look forward to working constructively with this Committee, FEMA,
and DHS in the future to continue to build a national emergency
preparedness system that we all want and our nation deserves.
Mr. Chairman, this concludes my statement. I would be pleased to answer
any questions that you or other members of the Subcommittees may have
at this time.
Contacts and Staff Acknowledgments:
For further information about this statement, please contact William O.
Jenkins Jr., Director, Homeland Security and Justice Issues, on (202)
512-8777 or jenkinswo@gao.gov.
In addition to the contact named above, the following individuals from
GAO's Homeland Security and Justice Team also made major contributors
to this testimony: Chris Keisling, Assistant Director; John Vocino,
Analyst-in-Charge; Michael Blinde, Analyst; and Linda Miller,
Communications Analyst.
[End of section]
Related GAO Products:
Department of Homeland Security: Progress Report on Implementation of
Mission and Management Functions. GAO-07-454. Washington, D.C.: August
17, 2007.
Homeland Security: Observations on DHS and FEMA Efforts to Prepare for
and Respond to Major and Catastrophic Disasters and Address Related
Recommendations and Legislation. GAO-07-1142T. Washington, D.C.: July
31, 2007.
Homeland Security: Observations on DHS and FEMA Efforts to Prepare for
and Respond to Major and Catastrophic Disasters and Address Related
Recommendations and Legislation, GAO-07-835T Washington, D.C.: May 15,
2007.
Homeland Security: Observations on DHS and FEMA Efforts to Prepare for
and Respond to Major and Catastrophic Disasters and Address Related
Recommendations and Legislation. GAO-07-835T. Washington, D.C.: May 15,
2007.
First Responders: Much Work Remains to Improve Communications
Interoperability, GAO-07-301 Washington, D.C.: Apr. 2, 2007.
Homeland Security: Preparing for and Responding to Disasters. GAO-07-
395T. Washington, D.C.: March 9, 2007.
Passenger Rail Security: Federal Strategy and Enhanced Coordination
Needed to Prioritize and Guide Security Efforts. GAO-07-583T.
Washington, D.C.: March 7, 2007.
Homeland Security: Applying Risk Management Principles to Guide Federal
Investments. GAO-07-386T. Washington, D.C.: February 7, 2007.
Homeland Security Grants: Observations on Process DHS Used to Allocate
Funds to Selected Urban Areas. GAO-07-381R. Washington, D.C.: February
7, 2007.
Homeland Security First Responder Grants: Cash Management Improvement
Act Exemption and Cash Advance Funding Require Additional DHS
Oversight. GAO-07-68. Washington, D.C.: December 22, 2006.
Emergency Preparedness and Response: Some Issues and Challenges
Associated with Major Emergency Incidents. GAO-06-467T. Washington,
D.C.: February 23, 2006.
Homeland Security: Managing First Responder Grants to Enhance Emergency
Preparedness in the National Capital Region. GAO-05-889T. Washington,
D.C.: July 14, 2005.
Homeland Security: DHS' Efforts to Enhance First Responders' All-
Hazards Capabilities Continue to Evolve. GAO-05-652. Washington, D.C.:
July 11, 2005.
Homeland Security: Management of First Responder Grant Programs and
Efforts to Improve Accountability Continue to Evolve. GAO-05-530T .
Washington, D.C.: April 12, 2005.
Homeland Security: Management of First Responder Grant Programs Has
Improved, but Challenges Remain. GAO-05-121. Washington, D.C.: February
2, 2005.
Homeland Security: Effective Regional Coordination Can Enhance
Emergency Preparedness. GAO-04-1009. Washington, D.C.: September 15,
2004.
Homeland Security: Federal Leadership Needed to Facilitate
Interoperable Communications Between First Responders. GAO-04-1057T .
Washington, D.C.: September 8, 2004.
Homeland Security: Coordinated Planning and Standards Needed to Better
Manage First Responder Grants in the National Capital Region. GAO-04-
904T. Washington, D.C.: June 24, 2004.
Homeland Security: Management of First Responder Grants in the National
Capital Region Reflects the Need for Coordinated Planning and
Performance Goals. GAO-04-433. Washington, D.C.: May 28, 2004.
Emergency Preparedness: Federal Funds for First Responders. GAO-04-
788T. Washington, D.C.: May 13, 2004.
[End of section]
Footnotes:
[1] This figure includes such DHS grant programs as the Homeland
Security Grant Program (HSGP), Infrastructure Protection Programs, and
the Emergency Management Performance Grants.
[2] The Post-Katrina Emergency Management Reform Act of 2006 was
enacted as Title VI of the Department of Homeland Security
Appropriations Act, 2007, Pub. L. No. 109-295, 120 Stat. 1355, 1394
(2006).
[3] GAO, Homeland Security: Applying Risk Management Principles to
Guide Federal Investments, GAO-07-386T (Washington, D.C.: Feb. 7,
2007).
[4] GAO, Homeland Security Grants: Observations on Process DHS Used to
Allocate Funds to Selected Urban Areas, GAO-07-381R (Washington, D.C.:
Feb. 7, 2007); and Homeland Security Assistance for Nonprofits:
Department of Homeland Security Delegated Selection of Nonprofits to
Selected States and States Used a Variety of Approaches to Determine
Awards, GAO-06-663R (Washington, D.C.: May 22, 2006).
[5] GAO, Homeland Security: Management of First Responder Grant
Programs Has Improved, but Challenges Remain, GAO-05-121 (Washington,
D.C.: Feb. 2, 2005); and Homeland Security: Management of First
Responder Grant Programs and Efforts to Improve Accountability Continue
to Evolve, GAO-05-530T (Washington, D.C.: Apr. 12, 2005).
[6] GAO, Passenger Rail Security: Federal Strategy and Enhanced
Coordination Needed to Prioritize and Guide Security Effort,
GAO-07-583T (Washington, D.C.: Mar. 7, 2007).
[7] GAO, Homeland Security: Preparing for and Responding to Disasters,
GAO-07-395T (Washington, D.C.: Mar. 9, 2007); Homeland Security:
Observations on DHS and FEMA Efforts to Prepare for and Respond to
Major and Catastrophic Disasters and Address Related Recommendations
and Legislation, GAO-07-835T (Washington, D.C.: May 15, 2007); and
Homeland Security: Observations on DHS and FEMA Efforts to Prepare for
and Respond to Major and Catastrophic Disasters and Address Related
Recommendations and Legislation, GAO-07-1142T (Washington, D.C.: July
31, 2007).
[8] All states receive a statutorily specified minimum under the State
Homeland Security Grant program.
[9] For this formula, DHS defined Threat as international threat of
terrorism to locations and critical assets in the United States,
Vulnerability as the susceptibility of an area to successful attack,
and Consequences as the personal, physical, and economic consequences
to an area of a successful attack.
[10] Pub. L. No. 110-53, tit. I, 121 Stat. 266, 271-94.
[11] 6 U.S.C. § 604(b)(2)(B).
[12] Fiscal year 2008 is the first year that FEMA has had
responsibility for the risk assessment and grant allocations for these
grants.
[13] Sensitivity analysis can help gauge what effects key sources of
uncertainty have on outcomes, which provides decision makers with
additional data on alternative risk estimates and funding allocations
resulting from analyses of varying data, judgments, and assumptions.
[14] Ports of entry are government-designated locations where DHS
inspects persons and goods to determine whether they may be lawfully
admitted into the country.
[15] 6 U.S.C. § 604(b)(2)(B).
[16] GAO, Homeland Security: Management of First Responder Grant
Programs Has Improved, but Challenges Remain, GAO-05-121, (Washington,
D.C.: Feb. 2, 2005).
[17] Once these requirements are satisfied, states, local
jurisdictions, and urban areas can then obligate their funds for first
responder equipment, exercises, training, and services. Generally, when
a local jurisdiction or urban area directly incurs an expenditure, it
submits related procurement documents, such as invoices, to the state.
The state then draws down the funds.
[18] GAO, Maritime Security: Federal Efforts Needed to Address
Challenges in Preventing and Responding to Terrorist Attacks on Energy
Commodity Tankers, GAO-08-141 (Washington, D.C.: Dec. 10, 2007).
[19] GAO, First Responders: Much Work Remains to Improve Communications
Interoperability, GAO-07-301 (Washington, D.C.: Apr. 2, 2007).
[20] GAO, Department of Homeland Security: Progress Report on
Implementation of Mission and Management Functions, GAO-07-454
(Washington, D.C.: Aug. 17, 2007).
[21] GAO, Homeland Security: Observations on DHS and FEMA Efforts to
Prepare for and Respond to Major and Catastrophic Disasters and Address
Related Recommendations and Legislation, GAO-07-835T (Washington,
D.C.: May 15, 2007).
[22] In December 2007, FEMA extended the State Preparedness Report
deadline from January 4, to March 31, 2008, and required each state
administrative agency to submit a brief letter providing a status
update on its State Preparedness Report by January, 2008.
[End of section]
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "Subscribe to Updates."
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office:
441 G Street NW, Room LM:
Washington, D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Ralph Dawn, Managing Director, dawnr@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, D.C. 20548:
Public Affairs:
Chuck Young, Managing Director, youngc1@gao.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, D.C. 20548: