Information Sharing Environment
Definition of the Results to Be Achieved in Improving Terrorism-Related Information Sharing Is Needed to Guide Implementation and Assess Progress
Gao ID: GAO-08-492 June 25, 2008
The attacks on 9/11 underscored the federal government's need to facilitate terrorism-related information sharing among government, private sector, and foreign stakeholders. In response, the Intelligence Reform and Terrorism Prevention Act of 2004 mandated the creation of the Information Sharing Environment (ISE), which is described as an approach for the sharing of terrorism-related information. A presidentially appointed Program Manager oversees ISE development with assistance from the Information Sharing Council (ISC), a forum for 16 information sharing officials from federal agencies and departments. GAO was asked to report on (1) what actions have been taken to guide the design and implementation of the ISE and (2) what efforts have been made to report on progress in implementing the ISE. To perform this work, GAO reviewed related laws, directives, guidance, and ISE planning and reporting documents and interviewed officials from the Program Manager's office and key agencies who serve on the ISC.
To guide ISE design and implementation, the Program Manager has issued an implementation plan, completed a number of tasks therein, and included other information sharing initiatives in the ISE, but the plan does not include some important elements to implement the ISE. The plan provides an initial structure and approach for ISE design and implementation. For example, the plan includes steps toward protecting information privacy and describes a two-phased approach for implementing the ISE by June 2009 consisting of 89 action items. Completed activities include, among others, development of proposed common terrorism information sharing standards. In addition, other federal, state, and local initiatives to enhance information sharing across the government are being incorporated in the ISE. These initiatives include partnering with state and local area fusion centers--created primarily to improve information sharing within a state or local area--to develop a national network of these centers. Nevertheless, Office of the Program Manager officials said that the 89 action items do not address all the activities that must be completed to implement the ISE. Work remains, including defining and communicating the ISE's scope, such as determining all terrorism-related information that should be part of the ISE, and communicating that information to stakeholders involved in the development of the ISE. In addition, the desired results to be achieved by the ISE, that is, how information sharing is to be improved, the specific milestones, and the individual projects--or initiatives--to achieve these results have not yet been determined. Defining the scope of a program, desired results, milestones, and projects are essential in providing a road map to effectively implement a program. Without such a road map, the Program Manager and stakeholders risk not being able to effectively manage implementation of the ISE. To report on progress in implementing the ISE, the Program Manager issued an annual report in September 2007, which highlighted individual accomplishments and included several annual performance goals, and has since begun to develop performance measures, but neither effort provides for an assessment of overall progress in ISE implementation and of how much work remains. Some individual accomplishments contributing to the ISE occurred under the implementation plan; others, prior to and separate from ISE creation efforts. In keeping with federal guidance, GAO's work, and the work of others in strategic planning, performance measurement, and program management, the implementation plan contained six strategic goals and the annual report four performance goals for 2008. Also, the Program Manager has begun to develop some performance measures, but they focus on counting activities accomplished rather than results achieved. For example, the measures include the number of ISE organizations with a procedure in place for suspicious activity reports, but not how the reports are used and what difference they are making in sharing to help prevent terrorist attacks. GAO acknowledges that creating such measures is difficult, particularly since the program is still being designed, but until these measures are refined, future attempts to measure and report on progress will be hampered.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-08-492, Information Sharing Environment: Definition of the Results to Be Achieved in Improving Terrorism-Related Information Sharing Is Needed to Guide Implementation and Assess Progress
This is the accessible text file for GAO report number GAO-08-492
entitled 'Information Sharing Environment: Definition of the Results to
Be Achieved in Improving Terrorism-Related Information Sharing Is
Needed to Guide Implementation and Assess Progress' which was released
on July 18, 2008.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to Congressional Requesters:
United States Government Accountability Office:
GAO:
June 2008:
Information Sharing Environment:
Definition of the Results to Be Achieved in Improving Terrorism-Related
Information Sharing Is Needed to Guide Implementation and Assess
Progress:
Information Sharing Environment:
GAO-08-492:
GAO Highlights:
Highlights of GAO-08-492, a report to congressional requesters.
Why GAO Did This Study:
The attacks on 9/11 underscored the federal government‘s need to
facilitate terrorism-related information sharing among government,
private sector, and foreign stakeholders. In response, the Intelligence
Reform and Terrorism Prevention Act of 2004 mandated the creation of
the Information Sharing Environment (ISE), which is described as an
approach for the sharing of terrorism-related information. A
presidentially appointed Program Manager oversees ISE development with
assistance from the Information Sharing Council (ISC), a forum for 16
information sharing officials from federal agencies and departments.
GAO was asked to report on (1) what actions have been taken to guide
the design and implementation of the ISE and (2) what efforts have been
made to report on progress in implementing the ISE. To perform this
work, GAO reviewed related laws, directives, guidance, and ISE planning
and reporting documents and interviewed officials from the Program
Manager‘s office and key agencies who serve on the ISC.
What GAO Found:
To guide ISE design and implementation, the Program Manager has issued
an implementation plan, completed a number of tasks therein, and
included other information sharing initiatives in the ISE, but the plan
does not include some important elements to implement the ISE. The plan
provides an initial structure and approach for ISE design and
implementation. For example, the plan includes steps toward protecting
information privacy and describes a two-phased approach for
implementing the ISE by June 2009 consisting of 89 action items.
Completed activities include, among others, development of proposed
common terrorism information sharing standards. In addition, other
federal, state, and local initiatives to enhance information sharing
across the government are being incorporated in the ISE. These
initiatives include partnering with state and local area fusion
centers”created primarily to improve information sharing within a state
or local area”to develop a national network of these centers.
Nevertheless, Office of the Program Manager officials said that the 89
action items do not address all the activities that must be completed
to implement the ISE. Work remains, including defining and
communicating the ISE‘s scope, such as determining all terrorism-
related information that should be part of the ISE, and communicating
that information to stakeholders involved in the development of the
ISE. In addition, the desired results to be achieved by the ISE, that
is, how information sharing is to be improved, the specific milestones,
and the individual projects”or initiatives”to achieve these results
have not yet been determined. Defining the scope of a program, desired
results, milestones, and projects are essential in providing a road map
to effectively implement a program. Without such a road map, the
Program Manager and stakeholders risk not being able to effectively
manage implementation of the ISE.
To report on progress in implementing the ISE, the Program Manager
issued an annual report in September 2007, which highlighted individual
accomplishments and included several annual performance goals, and has
since begun to develop performance measures, but neither effort
provides for an assessment of overall progress in ISE implementation
and of how much work remains. Some individual accomplishments
contributing to the ISE occurred under the implementation plan; others,
prior to and separate from ISE creation efforts. In keeping with
federal guidance, GAO‘s work, and the work of others in strategic
planning, performance measurement, and program management, the
implementation plan contained six strategic goals and the annual report
four performance goals for 2008. Also, the Program Manager has begun to
develop some performance measures, but they focus on counting
activities accomplished rather than results achieved. For example, the
measures include the number of ISE organizations with a procedure in
place for suspicious activity reports, but not how the reports are used
and what difference they are making in sharing to help prevent
terrorist attacks. GAO acknowledges that creating such measures is
difficult, particularly since the program is still being designed, but
until these measures are refined, future attempts to measure and report
on progress will be hampered.
What GAO Recommends:
GAO recommends that the Program Manager and stakeholders (1) more fully
define the scope and results to be achieved by the ISE and (2) develop
a comprehensive set of performance measures that show the extent to
which the ISE has been implemented and sharing improved. The Program
Manager generally agreed with these recommendations.
To view the full product, including the scope and methodology, click on
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-492]. For more
information, contact Eileen Larence 202-512-8777, LarenceE@gao.gov, or
David Powner, 202-512-9286, pownerd@gao.gov.
[End of section]
Contents:
Letter:
Results in Brief:
Background:
Initial Steps to Define a Structure and Approach to Implement the ISE
Have Been Taken, but Work Remains to Define What the ISE Is to Include,
to Design How it Will Operate, and to Outline Measurable Steps and Time
Frames to Achieve Implementation and Desired Results:
The Program Manager Has Issued the First Annual Report and Is
Developing Initial Performance Measures, but Neither Can Yet Be Used to
Determine How Much Progress Has Been Made and What Remains:
Conclusions:
Recommendations:
Agency Comments and Our Evaluation:
Appendix I: Status of Phase I Action Items as of March 1, 2008:
Appendix II: Comments from Office of the Program Manager for the
Information Sharing Environment:
Appendix III: GAO Contacts and Acknowledgments:
Tables:
Table 1: 7 Priority Areas in the ISE Implementation Plan:
Table 2: Strategic Goals Contained in the Implementation Plan:
Table 3: 2008 Annual Performance Goals Listed in the Annual Report:
Table 4: Comparison of Action Item Status in July 2007 and March 2008:
Abbreviations:
CUI: controlled unclassified information:
DHS: Department of Homeland Security:
DNI: Director of National Intelligence:
DOJ: Department of Justice:
ISC: Information Sharing Council:
ISE: Information Sharing Environment:
ISE EAF: Information Sharing Environment Enterprise Architecture
Framework:
FEA: Federal Enterprise Architecture:
ITACG: Interagency Threat Assessment Coordination Group:
NCTC: National Counterterrorism Center:
NIST: National Institute of Standards and Technology:
PM-ISE: Program Manager for the Information Sharing Environment:
TSC: Terrorist Screening Center:
United States Government Accountability Office:
Washington, DC 20548:
June 25, 2008:
Congressional Requesters:
Following the terrorist attacks of 2001, the Congress and the Executive
Branch took numerous actions aimed explicitly at establishing a range
of new security measures to strengthen the nation's ability to
identify, detect, and deter terrorism-related activities and protect
national assets and infrastructure from attack.[Footnote 1] One theme
common to nearly all these efforts was the need to share current
information on terrorism-related matters with a variety of critical
stakeholders across all levels of government, the private sector, and
foreign countries. Recognizing the need to facilitate this sharing, the
Intelligence Reform Act directed the President to create the
Information Sharing Environment (ISE).[Footnote 2] As amended by the 9/
11 Commission Act, the Intelligence Reform Act defines the ISE as "an
approach that facilitates the sharing of terrorism and homeland
security information, which may include any method determined necessary
and appropriate." In implementing this approach the Program Manager--
appointed by the President and responsible for planning for,
overseeing, and managing this new approach--envisions an ISE that will
be comprised of policies, procedures, and technologies that link
people, systems, and information among all critical stakeholders.
In coordinating implementation of the ISE, the Program Manager depends
on other federal departments and agencies. In particular, the
Information Sharing Council (ISC)--comprised of senior representatives
from 16 federal departments and agencies, some of who possess and
acquire terrorism-related information--was established in accordance
with the Intelligence Reform Act to assist the President and the
Program Manager with their ISE responsibilities. The ISC is to advise
in developing policies, procedures and guidelines, roles, and
standards. In providing such assistance, the ISC, which is chaired by
the Program Manager, is responsible for activities such as working to
ensure coordination among federal departments and agencies
participating in the ISE to establish, implement, and maintain the ISE.
In addition to the ISC member departments and agencies, the Program
Manager must involve and consider the needs of other stakeholders, to
include additional federal departments and agencies; state, local, and
tribal entities; the private sector; and foreign partners and allies.
It is critical that all of these stakeholders participate in
development of the ISE because they both possess and require terrorism-
related information in the performance of their missions. Coordinating
with this large number of stakeholders--each with its own individual
agency's interests, business processes, and technical capabilities--
adds to the complexity of creating the ISE.
Our work since 2001 indicates that the federal government has improved
the sharing of terrorism-related information but has struggled in the
process. In January 2005, we designated information sharing for
homeland security a high-risk function because the government had
continued to face formidable challenges in analyzing and disseminating
key terrorism-related information in a timely, accurate, and useful
manner.[Footnote 3] We reported, at the time, that in the absence of
comprehensive information-sharing plans, many aspects of homeland
security information sharing remained ineffective and fragmented. We
noted, as well, that information is a crucial tool in fighting
terrorism and that its timely dissemination is absolutely critical to
maintaining the security of our nation.
In March 2006, our report on information-sharing issues stated that
more than 4 years after September 11, the nation still lacked the
governmentwide policies and processes called for in law to provide a
framework for guiding and integrating a myriad of ongoing efforts to
share terrorism-related information critical to protecting our
homeland.[Footnote 4] In that report, we recommended that the Director
of National Intelligence, among other things, assess progress in
implementing the ISE and identify barriers to achieving ISE deadlines
included in an interim implementation plan. The Program Manager is in
the process of implementing these recommendations, and this report
provides an update on their status. We also suggested in that report
and subsequently in a November 2006 report, that the ISE effort was
among the areas that needed additional congressional
oversight.[Footnote 5]
You requested that we provide observations on the ISE and how it is
being implemented. This report answers the following two questions:
* What actions have been taken to guide the design and implementation
of the ISE?
* What efforts have been made to report on progress in implementing the
ISE?
To answer these questions, we identified and reviewed key statutes
setting out requirements for the Information Sharing Environment,
including the Intelligence Reform Act and the 9/11 Commission Act. We
further considered the Government Performance and Results Act of
1993,[Footnote 6] related guidance issued by OMB,[Footnote 7] and our
prior[Footnote 8] work on results oriented government, program
management, and federal coordination and collaboration. We also
reviewed literature on program management principles, such as the
Project Management Institute's The Standard for Program
Management[Footnote 9] and Carnegie Mellon's Capability Maturity Model
Integration (CMMI®).[Footnote 10] Based on our review of these laws,
guidance, and literature, we identified standard practices in program
and project management for defining, designing, and executing programs.
These practices focus on several critical aspects of program
management, strategic planning, and performance measurement.
The scope of our review was limited to those ISE activities performed
since the Information Sharing Environment Implementation Plan
(implementation plan) was issued in November 2006 through March 1,
2008. Applying these identified standard practices in program
management, we reviewed key ISE planning and reporting documents--the
November 2006 implementation plan and the September 2007 Annual Report
to The Congress on the Information Sharing Environment (annual report)-
-as well as other ISE-related strategic planning and performance
measurement documents and activities. We further interviewed officials
at the Office of the Program Manager for the Information Sharing
Environment (PM-ISE) and examined planning and reporting documents
housed at the office to determine the extent to which actions listed in
the implementation plan for the first phase of ISE implementation were
complete as of March 1, 2008. We also interviewed officials from five
key federal agencies--the departments of Defense, Homeland Security,
Justice, and State as well as the Office of the Director of National
Intelligence--who serve on the ISE's Information Sharing Council. These
federal agencies were chosen because they were identified by the PM-ISE
as key participants expected to support the ISE since they collect
defense, homeland security, law enforcement, foreign affairs, and
intelligence information deemed critical for homeland security. We
conducted this performance audit from February 2007 through June 2008,
in accordance with generally accepted government auditing standards.
Those standards require that we plan and perform the audit to obtain
sufficient, appropriate evidence to provide a reasonable basis for our
findings and conclusions based on our audit objectives. We believe the
evidence obtained provides a reasonable basis for our findings and
conclusions based on our audit objectives.
Results in Brief:
To guide ISE design and implementation, the Program Manager has issued
an implementation plan, a number of tasks therein have been completed,
and other independent and ongoing information sharing initiatives by
federal, state, and local stakeholders have been integrated into the
ISE, but the plan does not include some important elements needed to
implement the ISE. Issued in November 2006, the plan provides an
initial structure and approach for designing and implementing the ISE
and addresses ways to meet the ISE requirements set in the Intelligence
Reform Act as well as guidelines the administration set for
implementation, as the following examples illustrate:
* The plan includes steps toward standardizing procedures for managing,
handling, and disseminating sensitive but unclassified information--
information that is generally restricted from public disclosure but not
designated as classified national security information--as well as
protecting information privacy.
* The plan maps out a timeline for further defining what information,
business processes, and technologies are to be included in the ISE and
exploring approaches for implementing them, describing a two-phased
approach for implementing the ISE by June 2009. Phase 1 generally
covers set-up activities and building relationships among stakeholders,
and Phase 2 covers design as well as implementation of the ISE. The two
phases are comprised of 89 total action items organized by priority
areas, such as improved terrorism information handling. While 48 action
items were to be completed by June 2007, at the end of Phase 1, only 18
were completed on time. An additional 15 were completed as of March
2008. Completed activities include development of proposed common
terrorism information sharing standards and implementation of
electronic directory services pages to help identify sources where
terrorism information may be located within the federal government. The
incomplete action items are generally those that require a greater
level of stakeholder involvement and, according to officials at the
Office of the Program Manager, are taking longer than anticipated to
complete.
* Design and implementation incorporate ongoing federal, state, and
local initiatives to enhance information sharing across the government.
These initiatives include partnering with state and local area fusion
centers--collaborative efforts to detect, prevent, investigate, and
respond to criminal and terrorist activity--and developing a national
network of these centers to improve sharing among federal, state, and
local entities, as well as the Terrorist Screening Center to
consolidate information on known or suspected terrorists who operate
within the United States for dissemination to federal agencies that use
the information to screen individuals.
In accordance with standard practices for program and project
management, the ISE implementation plan identified action items and
strategic goals to be achieved. However, work remains in defining and
communicating the scope and desired results to be achieved by the ISE,
the specific milestones to be attained, the individual projects--or
initiatives--and the sequence in which they need to be executed to
achieve these results and implement the ISE. For example, in terms of
scope, work to determine all the terrorism-related information that
should be part of the ISE is yet to be completed. In addition, the
desired results to be achieved by the ISE--that is, how information
sharing is to be improved and the specific milestones (e.g., time
frames), and the projects to achieve these results--have not yet been
determined. Although the plan contains 89 action items, officials at
the Office of the Program Manager stated that the action items do not
address all of the activities that must be completed to implement the
ISE. This is because, at the time the plan was produced, agreement on
how the ISE is to function and what it is to include had not been
reached among the stakeholders and work toward reaching these
agreements remains ongoing. Therefore, ISE officials stated that an
assessment of the ISE's progress based on the action items identified
in the plan alone would not give a true sense of progress toward a
fully functioning and executed ISE. In accordance with standard program
management practices, specific desired outcomes or results should be
conceptualized and defined in the planning process as part of a road
map, along with the appropriate projects needed to achieve those
results, supporting resources, stakeholder responsibilities, and
milestones. Without such a road map, the Program Manager and
stakeholders risk not being able to effectively manage and implement
the ISE.
To report on progress in implementing the ISE, the Program Manager
issued an annual report on the ISE in September 2007 that highlighted
individual accomplishments and included several annual performance
goals as well as developed some performance measures, but did not
provide an assessment of how much progress has been achieved in
implementing the ISE and how much remains to be done. More
specifically, the report cites accomplishments achieved as part of the
implementation plan as well as others achieved prior to the enactment
of the Intelligence Reform Act in December 2004 and its requirement to
implement the ISE. Federal guidance as well as our work and the work of
others in strategic planning, performance measurement, and program
management hold that programs should have overarching strategic goals
that are outcome oriented and are expressed so that progress in
achieving the goals can be tracked and measured. Moreover, these longer-
term strategic goals should be supported by interim performance goals
(e.g., annual performance goals) that are also measurable and provide
for a way to measure and track annual and overall progress (e.g.,
through measures and metrics). In keeping with these practices, the
implementation plan contained six overall strategic goals, and the
annual report contained four performance goals for 2008. In addition,
the Program Manager has begun to develop some annual performance
measures, but they focus on counting activities accomplished rather
than results achieved to show the extent of ISE implementation or
progress towards attaining the ISE strategic goals. For example,
performance measures developed include the number of ISE organizations
with a procedure in place for acquiring and processing reports on
suspicious activities potentially related to terrorism. This measure is
an important first step in providing quantifiable data for assessing
progress made, but does not measure for results, such as what
difference the reports are making in sharing to help prevent terrorist
attacks. According to officials at the Office of the Program Manager,
these performance measures are being refined in consultation with the
ISC to provide the needed framework to measure progress made. Yet, our
review of a draft of these performance measures showed that they
continue to focus on counting activities accomplished rather than
results achieved. We acknowledge that creating such measures is
difficult, particularly since the program is still being designed, but
until these measures are refined to account for and communicate
progress and results, future attempts to measure and report on progress
will be hampered.
Thus, to help ensure that the ISE is on a measurable track to success,
we are recommending that the Program Manager, with full participation
of relevant stakeholders (e.g., agencies and departments on the ISC),
(1) more fully define the scope and specific results to be achieved by
the ISE along with the key milestones and individual projects or
initiatives needed to achieve these results and (2) develop performance
measures that show the extent to which the ISE has been implemented and
sharing improved--including, at a minimum, what has been and remains to
be accomplished--so as to more effectively account for and communicate
progress and results.
We requested comments on a draft of this report from the Secretaries of
Defense, Homeland Security, and State; the Attorney General; the
Director of National Intelligence; and the Program Manager for the ISE
or their designees. The Program Manager provided written comments which
are summarized below and included in their entirety in appendix II. The
Program Manager generally agreed with our recommendations, but made
several comments regarding the report's content. For example, he stated
that the ISE is a governmentwide transformational effort and an
evolutionary process, not a traditional "program" that can be audited
within those parameters. While we agree that the ISE is not a
traditional "program," in that it is not operated and funded by a
single department or agency, it is an activity that does receive
government funding and can be reviewed using program and project
management principles. With regards to assessing the ISE's progress,
the Program Manager discussed efforts that our report acknowledges.
However, our review showed that the performance measures used to assess
the ISE's progress focus on counting activities accomplished rather
than results achieved and are not presented in a way that explains how
they represent progress toward attaining strategic goals. The
Secretaries of Defense, Homeland Security, and State; the Attorney
General; and the Director of National Intelligence responded that they
did not have any comments on the report. Officials in the Office of the
Program Manager also provided technical comments on the draft that have
been incorporated, as appropriate.
Background:
Federal Law and Policy Call for the Development of an ISE:
Because of the information-sharing weaknesses among federal departments
and agencies that became apparent after September 11, the Congress and
the administration have called for a number of terrorism-related
information-sharing initiatives, including the development of an ISE,
as the following instances illustrate:
* Section 1016 of the Intelligence Reform and Terrorism Prevention Act
of 2004 (Intelligence Reform Act), enacted December 17, 2004, as
amended by the Implementing Recommendations of the 9/11 Commission Act
of 2007 (9/11 Commission Act), enacted August 3, 2007, requires the
President to take action to facilitate the sharing of terrorism-related
information by establishing an ISE.[Footnote 11] The Act required the
President to, among other things, appoint a Program Manager to plan
for, oversee implementation of, and manage the ISE, and established an
ISC to assist the President and Program Manager in these duties. In
addition, the Act required the President, with the assistance of the
Program Manager, to submit to Congress a report containing an
implementation plan for the ISE no later than 1 year after the date of
enactment (enacted December 17, 2004) and specified 11 elements to be
included in the plan. These elements include, among other things, the
function, capabilities, resources, and concept for the design of the
ISE; project plan; budget estimates; performance metrics and measures;
and defined roles for all stakeholders.[Footnote 12] The Act also
required annual performance management reports, beginning not later
than 2 years after enactment, on the state of the ISE and of
information sharing across the federal government.
* On December 16, 2005, the President issued a memorandum to implement
measures consistent with establishing and supporting the ISE.[Footnote
13] The memorandum sets forth five information sharing guidelines: (a)
defining common standards for how information is acquired, accessed,
shared, and used within the ISE; (b) developing a common framework for
sharing information between and among executive departments and
agencies; state, local, and tribal governments; law enforcement
agencies; and the private sector; (c) standardizing the procedures for
sensitive but unclassified information; (d) facilitating the sharing of
information between executive departments and agencies and foreign
governments; and (e) protecting the information privacy rights and
other legal rights of Americans. The memorandum also directs the heads
of executive departments and agencies to actively work to promote a
culture of information sharing within their respective agencies and
that ongoing information-sharing efforts be leveraged in the
development of the ISE.
* In October 2007, the President issued a National Strategy for
Information Sharing. The strategy is focused on improving the sharing
of homeland security, terrorism, and law enforcement information
related to terrorism within and among all levels of government and the
private sector and articulates the administration's vision on terrorism-
related information sharing. The strategy notes guiding principles and
efforts taken to improve information sharing across all levels of
government, the private sector, and foreign partners to date. It also
contains an appendix that elaborates on the roles of federal, state,
local, and tribal authorities in information sharing and expands on the
role of state and major urban area fusion centers.
Scope and Purpose of the ISE:
The ISE is not bounded by a single federal agency or component. While
the Program Manager has been placed within the Office of the Director
of National Intelligence, from an operational perspective, the ISE is
to reach across all levels of government as well as the private sector
and foreign partners. As such, the program is a broad-based
coordination and collaboration effort among various stakeholders. In
essence, the ISE can be viewed as a set of cross-cutting communication
links--encompassing policies, processes, technologies--among and
between the various entities that gather, analyze, and share terrorism-
related information. According to officials at the Office of the
Program Manager, their focus is primarily to ensure that all
appropriate terrorism-related information is made available to analysts
and others who need it when they need it. The Program Manager is not
responsible for the collection or analysis of terrorism-related
information.
The ISE implementation plan, released by the Program Manager in
November 2006, is to be the guiding document describing how the ISE is
to be implemented. This plan addressed at a very general and
preliminary level the ISE's information-sharing strategy, roles, and
needs. The document set out to include: (1) an operational concept; (2)
the implementation overview; (3) a summary of desired operational
capabilities; (4) means to develop an architecture and standards; (5)
an approach to sharing with non-federal partners; (6) ISE enabling
activities; (7) implementation management; (8) recommendations on a
structure for expansion and future management; and (9) a summary of
implementation actions. The plan also acknowledged numerous challenges
to be addressed, including promoting a culture of information sharing,
protecting information privacy, and handling terrorism-related
information. Under the plan, the ISE is comprised of five "communities
of interest," encompassing intelligence, law enforcement, defense,
homeland security, and foreign affairs. Each community may comprise
multiple federal organizations and other stakeholders; information is
to be shared across these communities.
Key ISE Players and Roles:
ISE leadership lies with the presidentially appointed Program Manager,
for whom the Intelligence Reform Act, as amended, lays out specific
requirements. Pursuant to the Act, the Program Manager, in consultation
with the head of any affected department or agency, has governmentwide
authority over the sharing of terrorism-related information within the
scope of the ISE and is required to plan for, oversee implementation
of, and manage the ISE. For example, the Program Manager, in
consultation with the ISC and consistent with the direction and
policies issued by the President, the Director of National
Intelligence, and the Director of the Office of Management and Budget,
is to issue governmentwide procedures, guidelines, instructions, and
functional standards, as appropriate, for the management, development,
and proper operation of the ISE. In fulfilling this responsibility, the
Program Manager must, among other things, take into account the varying
missions and security requirements of agencies participating in the ISE
and ensure the protection of privacy and civil liberties. The
implementation plan further described areas of responsibility in broad
terms for the Program Manager. The plan states, for example, that the
Program Manager is to "act as the central agent to improve terrorism-
related information sharing among ISE participants by working with them
to remove barriers, facilitate change, and ensure that ISE
implementation proceeds efficiently and effectively." In interpreting
these responsibilities, the Program Manager has exercised discretion by
focusing on, for example, facilitating information sharing across the
five ISE communities. To support the development of the ISE, as of June
2008 the Program Manager has a staff of about 11 government staff and
31 contractors organized into three divisions--technology, policy and
planning, and business process.
Interagency support and advice to the Program Manager on the
development of the ISE is provided through the ISC. The ISC is chaired
by the Program Manager and is currently composed of 16 other members,
each designees of: the Secretaries of State, Treasury, Interior,
Transportation, Health and Human Services, Commerce, Energy, and
Homeland Security; the Department of Defense's Office of the Secretary
of Defense as well as the Joint Chiefs of Staff; the Attorney General;
the Director of National Intelligence; the Director of the Central
Intelligence Agency; the Director of the Office of Management and
Budget; the Director of the FBI; and the Director of the National
Counterterrorism Center. The ISC is an advisory body, which among other
things, is expected to:
* advise the President and the Program Manager on development of
policies, procedures, guidelines, roles, and standards necessary to
establish, implement, and maintain the ISE;
* work to ensure coordination among the federal agencies participating
in the establishment, implementation, and maintenance of the ISE; and:
* identify and recommend solutions to gaps between existing
technologies, programs, and systems used by federal agencies for
sharing information and the parameters of the proposed information-
sharing environment.
The ISC and Program Manager are supported by various task and working
groups. For example, the Foreign Government Information Sharing Working
Group, with coordination and assistance from the PM-ISE, helped develop
a checklist of issues to be taken into account in negotiating
international agreements. Similarly, an Alerts and Notifications
Working Group was established to assist the PM-ISE and ISC members in
their efforts to identify the alerts and notifications to be available
to federal and non-federal ISE participants.
Another area of roles and responsibilities for the ISE lies with
individual federal agencies (including those that belong to the ISC and
those that do not), state and local governments, and private sector
entities. In accordance with the Intelligence Reform Act, as amended,
any federal department or agency using or possessing intelligence or
terrorism-related information, operating a system in the ISE, or
otherwise participating or expecting to participate in the ISE must
fully comply with information-sharing policies, procedures, guidelines,
rules and standards established pursuant to the ISE. The departments
and agencies must further ensure the provision of adequate resources
for systems and activities supporting operation of and participation in
the ISE, ensure full department or agency cooperation in the
development of the ISE to implement governmentwide information sharing,
and submit, as requested, any reports on the implementation of ISE
requirements within the department or agency. State and local
governments also play a role in the ISE through, for example, their law
enforcement efforts to prevent crimes. As such, these governments are
coordinated with and participate in implementing the ISE. Private
sector organizations may share terrorism-related information on a
voluntary basis through existing or newly developed ISE mechanisms as
well. For example, the ISE leverages existing national plans such as
the National Infrastructure Protection Plan, which established
mechanisms for public and private sector organizations to share
critical infrastructure information on 17 critical infrastructure
sectors, such as banking and finance, energy, chemical, and
transportation.
Initial Steps to Define a Structure and Approach to Implement the ISE
Have Been Taken, but Work Remains to Define What the ISE Is to Include,
to Design How It Will Operate, and to Outline Measurable Steps and Time
Frames to Achieve Implementation and Desired Results:
To guide the design and implementation of the ISE, the Program Manager
has issued an implementation plan, completed a number of tasks
contained in it, and other independent and ongoing information-sharing
initiatives have been integrated into the ISE, but the plan does not
include some important elements needed to implement the ISE. The plan
provides an initial structure and approach for ISE design and
implementation, as well as describes a two-phased approach for
implementing the ISE by June 2009. Completed activities include, among
other things, development of proposed common terrorism information
sharing standards (CTISS) for sharing terrorism-related information. In
addition, other federal, state, and local initiatives to enhance
information sharing across the government have been or are being
incorporated into the ISE. Based on existing federal guidance as well
as our prior work and the work of others, standard practices in program
and project management for defining, designing, and executing programs
include (1) defining the program's scope, roles and responsibilities,
and specific results to be achieved, along with the individual projects
needed to achieve these results, and (2) developing a road map, or
program plan, to establish an order for executing specific projects
needed to obtain defined programmatic results within a specified time
frame and measuring progress and cost in doing so. While efforts to
date may represent the groundwork needed to facilitate terrorism-
related information sharing in the future, work remains to define and
communicate the scope and desired results to be achieved by the ISE,
the specific milestones and time frames for achieving the results, and
the individual projects and the sequence of projects needed to achieve
these results. Without such elements the Program Manager risks not
being able to effectively manage and implement the ISE.
The Implementation Plan Provides an Initial Structure and Approach for
Designing and Implementing the ISE:
Issued in November 2006, the implementation plan provides an initial
structure and approach for ISE design and implementation and
incorporates Presidential Guidelines as well as ISE requirements
spelled out in the Intelligence Reform Act. For example, the plan
includes steps towards developing standardized procedures for managing,
handling, and disseminating sensitive but unclassified information as
well as protecting information privacy, as called for in the
Presidential Guidelines. For the most part, the plan also maps out a
timeline for further defining what information, business processes, and
technologies are to be included in the ISE and exploring approaches for
implementing the ISE. For example, the plan describes a two-phased
approach to implementing the ISE by June 2009, with Phase 1 scheduled
for the November 2006 to June 2007 time frame and generally covering
set-up activities and building relationships among stakeholders and
Phase 2, beginning July 2007, covering design as well as
implementation. This approach is intended to develop the ISE
incrementally over a 3-year period. The two phases are comprised of 89
action items organized by priority areas. These priority areas address
important aspects of the ISE, from defining information-sharing
capabilities and technologies to protecting privacy and measuring
performance (see table 1).
Table 1: 7 Priority Areas in the ISE Implementation Plan:
Priority area: Protecting information privacy and civil liberties in
the ISE;
Description: Helping ensure that the information privacy and other
legal rights of Americans are protected in the development and use of
the ISE.
Priority area: Improved terrorism information handling;
Description: Creating standardized, consistent policies and procedures
for handling classified and unclassified terrorism information.
Priority area: Sharing with partners outside the federal government;
Description: Improving coordination at the national level for the
production and dissemination of terrorism information, and sharing
responsibility between federal and state governments for the timely
processing and dissemination of information at every level to meet the
needs of all end users.
Priority area: Architecture and standards;
Description: Constructing, integrating, and maintaining information
resource infrastructures across the federal government;
state, local, and tribal governments;
the private sector;
and foreign partners.
Priority area: ISE enabling activities;
Description: Developing performance management and planning tools as
well as programming and budgeting documents.
Priority area: ISE operational capabilities;
Description: Developing the information technology services needed to
maximize information sharing.
Priority area: Promoting a culture of information sharing;
Description: Developing a culture that promotes information sharing
across the ISE.
Source: Information Sharing Environment Implementation Plan.
[End of table]
Forty-eight of the action items, all part of Phase 1, were to be
completed by June 2007. Of these 48, 18 were completed on time and an
additional 15 were completed by March 2008 (see app. I for details).
Examples of completed activities covered by these action items include:
* The development of proposed common terrorism information sharing
standards--a set of standard operating procedures intended to govern
how information is to be acquired, accessed, shared, and used within
the ISE. According to the Program Manager, the proposed standards
document the rules, conditions, guidelines, and characteristics of
business processes, production methods, and products supporting
terrorism-related information sharing. These standards are intended to
address the Presidential Guideline that required the Director of
National Intelligence--in coordination with the Secretaries of State,
Defense, Homeland Security, and the Attorney General--to develop and
issue such standards. These standards are an important early activity
because of the structure they are intended to establish for sharing
across all ISE stakeholders.
* The development of procedures and markings for sensitive but
unclassified information to facilitate the exchange of information
among ISE participants.[Footnote 14] We reported in March 2006 that
federal agencies use numerous sensitive but unclassified designations
that govern how this information must be handled, protected, and
controlled and that the confusion caused by these multiple designations
creates information-sharing challenges.[Footnote 15] Therefore, we
recommended the issuance of a policy that consolidates sensitive but
unclassified designations where possible and addresses their consistent
application across agencies. Consistent with our recommendation, in May
2008 the Administration established controlled unclassified information
(CUI) as the single categorical designation throughout the executive
branch and established a corresponding CUI framework for designating,
marking, safeguarding, and disseminating information designated as CUI.
Once implemented, this effort could help improve access to information
and improve information sharing.
* Establishment of an initial operating capability for the Interagency
Threat Assessment and Coordination Group (ITACG). The purpose of the
ITACG is to support the efforts of the National Counterterrorism Center
to produce federally-coordinated terrorism-related information products
intended for dissemination to state, local, tribal, and private sector
partners through existing channels established by federal departments
and agencies. This effort is expected to help address concerns that
federally produced terrorism-related information that state, local,
tribal, and private sector organizations need for law enforcement and
homeland security purposes is sometimes conflicting or not getting to
them.
* The establishment of a Federal Fusion Center Coordination Group to
identify federal resources to support the development and maintenance
of a network of state-sponsored fusion centers. Most states and many
local governments have created state and local fusion centers to
address gaps in information sharing, such as those that occurred on 9/
11. These centers are collaborative efforts to detect, prevent,
investigate, and respond to criminal and terrorist activities. In
October 2007, we issued a report on the characteristics of and
challenges for fusion centers and stated that the centers were
particularly concerned about sustaining their operations over the long
term.[Footnote 16] We recommended that this group, through the ISC and
the Program Manager, determine and articulate the federal government's
role in, and whether it expects to provide resources to, fusion centers
over the long-term to help ensure their sustainability. According to
ISE program management officials, work is ongoing to (1) complete a
baseline capability assessment of designated state and major urban-area
fusion centers and (2) develop a coordinated federal support plan that
articulates resources being provided to the fusion centers.
* The implementation of electronic directory services pages to help
identify sources where terrorism information may be located within the
federal government, as called for in the Intelligence Reform Act. In
meeting this requirement, the electronic directory services are
described as a collection of directories that enables ISE users to
search for and locate information by accessing the appropriate people,
organizations, data, and services related to the counterterrorism
mission. The Program Manager expects to develop similar directories for
state, local, and tribal stakeholders.
Furthermore, work has been done towards accomplishing some action items
that are not yet complete. For example, agencies, with leadership from
the PM-ISE, have been working to develop a core training module
intended to provide an introduction to the ISE and to further promote
the development of a culture of information sharing. The incomplete
action items are generally those that require a greater level of
stakeholder involvement and, according to officials at the Office of
the Program Manager are taking longer than anticipated to complete, but
will not delay work on Phase 2 items. However, the action items do not
address all the activities that must be completed to implement the ISE,
according to officials at the Office of the Program Manager, and
several activities identified in the implementation plan will not be
implemented as identified in the plan. For example, one activity
identified in the plan included the implementation of an electronic
directory of services containing green pages in the unclassified
domain. As identified in the plan, the green pages were to provide a
searchable listing of counterterrorism-related information-sharing
resources, systems, and data repositories to support users searching
for specific data and capabilities. Further, the pages were to provide
system descriptions and technical and operational contact information
for gaining access. However, according to officials at the Office of
the Program Manager, aggregating the information for the green pages
would no longer enable the information to be posted in an unclassified
domain. Therefore, the green pages will no longer be completed for the
sensitive but unclassified security domain. Appendix I provides further
detail on the status of each Phase 1 action item.
Federal, State, and Local Agency Initiatives Are Being Leveraged to
Enhance Information Sharing and Guide Implementation of the ISE:
Federal, state, and local agencies have their own initiatives to
enhance information sharing across the government that are being
leveraged in designing and implementing the ISE. Examples of these
initiatives include:
* The Director of National Intelligence (DNI) issued a 100-day plan in
April 2007, followed by a 500-day plan in September 2007 that focused
on integrating the intelligence agencies and their missions in a
collaborative manner.[Footnote 17] One area of focus in these plans is
improved information sharing. As a result of this effort, the DNI
reported that an implementation plan was developed to standardize
identity and access policies across agencies, networks, and systems.
The 100-day plan notes that as it is implemented, its results are
intended to be leveraged by the Program Manager as part of the ISE
because it is anticipated to improve communication within the
intelligence community--one of the five communities that have been
designated as critical to the ISE.
* The National Counterterrorism Center (NCTC) was established in 2004
in response to recommendations from the 9/11 Commission to operate as a
partnership of intelligence agencies so that they can analyze and
disseminate national intelligence data. The center works to ensure that
intelligence agencies have access to and receive all-source
intelligence support needed to execute their counterterrorism plans or
perform independent, alternative, and mission-oriented analysis.
* As previously noted, in recognition of fusion centers as important
mechanisms for information sharing, the federal government--including
the Department of Homeland Security (DHS), the Department of Justice
(DOJ), and the Program Manager--is taking steps to partner with these
centers. Although they were created primarily to improve information
sharing within the state or local area, the implementation plan
identifies the creation of an integrated national network of fusion
centers to promote two-way sharing with the federal government, as
discussed earlier. Toward developing this network, the Program Manager
and stakeholder agencies have sponsored fusion center conferences and
provided staff, technical assistance, and funding to these centers.
* The FBI's Terrorist Screening Center (TSC)--established in September
2003--maintains the U.S. government's consolidated watch list of known
or suspected terrorists and sends records from the list to agencies to
support terrorism-related screening. The 9/11 Commission determined
that agencies' failures to share information they had on several of the
terrorists was a major factor in the lead-up to the 9/11 attacks, and
we recommended in a 2003 report[Footnote 18] that agencies develop such
a consolidated database of terrorist records. In response, the TSC
created its consolidated database, which was completed in 2004. The TSC
receives the majority of its watch list records from the NCTC, which
compiles the information on known or suspected international terrorists
from federal agencies. The FBI provides information on known or
suspected terrorists who operate within the United States. The TSC
consolidates this information and sends it to federal agencies that use
it for screening purposes, such as the screening of visa applicants and
airline passengers. As noted in the annual report, the founding of the
TSC is considered to be a key milestone in establishing the ISE. We and
the Inspector General for the Department of Justice have also
recommended ways in which agencies can enhance the watch list and
agencies' terrorist-screening processes, such as addressing
vulnerabilities and creating an interagency governing entity.[Footnote
19]
Further Detailing What the ISE Is to Achieve and How It Will Operate
Should Better Guide Implementation:
The Program Manager, together with the ISE stakeholders, have followed
standard practices in program and project management for defining,
designing, and executing programs by identifying action items and
strategic goals to be achieved in the implementation plan. However,
work remains in, among other things, defining and communicating the
scope and desired results to be achieved by the ISE, the specific
milestones to be attained, and the individual projects--or initiatives-
-and execution sequence needed to achieve these results and implement
the ISE. Standard practices in program and project management include
(1) defining the program scope, roles and responsibilities, and
specific results to be achieved, along with the individual projects
needed to achieve these results, and (2) developing a road map, or
program plan, to establish an order for executing specific projects
needed to obtain defined programmatic results within a specified time
frame and measuring progress and cost in doing so.
Further Defining and Communicating Key Elements of the ISE Will Help
Address the Limitations of the ISE and Further Describe How the ISE Is
to Operate:
First, toward defining the scope of the ISE, the implementation plan
restates the text of the Intelligence Reform Act, noting that the ISE
encompasses "the sharing of terrorism information in a manner
consistent with national security and with applicable legal standards
relating to privacy and civil liberties" and that the ISE is defined as
"an approach that facilitates the sharing of terrorism
information."[Footnote 20] Indeed, this is a broad scope requiring the
Program Manager and stakeholders, such as members of the Information
Sharing Council, to further define what the ISE, as a program, is to
include as well as the scope of what it can address. Fundamentally, the
Program Manager and stakeholders are still trying to fully define the
scope and design of the ISE, and a more complete set of activities
needed to achieve it than those that were included in the
implementation plan, including, for example:
* all of the terrorism-related information that should be a part of the
ISE;
* what types of terrorism-related information ISE participants have and
where such information resides;
* how the information can be put into a "shared space" so that a cross-
sector of users can easily access and study information from different
agencies;
* how this access can be provided while still protecting sensitive
information and privacy interests;
* what information systems and networks will be integrated as part of
the ISE and how; and:
* methods for motivating agencies to invest in the ISE, be held
accountable for ensuring that all relevant information is made
available to ISE stakeholders, and identifying and implementing the
specific projects needed to ensure the ISE runs effectively.
Further, the plan notes that the Intelligence Reform Act requires that
the ISE ensure direct and continuous online electronic access to
information[Footnote 21] and presents several action items intended to
identify approaches for sharing information, including the use of
technologies. However, the plan does not lay out a set of action items
with related milestones for identifying, among other things, needed
resources such as all the information to be made available as part of
the ISE, the source of the information, and what limitations exist in
making this counter-terrorism information available. In accordance with
standard practices for program management, these are all elements
critical for conveying the scope of what the ISE is to include,
garnering an understanding among stakeholders of needs to be met as
part of implementing the ISE, and identifying restrictions in
stakeholder abilities to do so.
We recognize that defining all of these elements is a complex
undertaking, especially because of the numerous ISE stakeholders that
need to coordinate and the many existing and often stovepiped or
independent methods stakeholders use for meeting their information
needs that often were not developed with sharing in mind. Nevertheless,
further defining and communicating key elements of the ISE, such as the
scope and expected results, along with a road map for meeting needs in
accordance with standard practices for program management will help,
among other things, communicate the breadth and limitations of the ISE
as a program and further describe how the ISE is to operate.
Second, the plan does not communicate the scope, or parameters, of
stakeholder roles and responsibilities in such a way that stakeholders
can understand what they will be held accountable for in implementing
and operating the ISE. For example, the plan identifies the Program
Manager's role as responsible for information sharing across the
government, overseeing the implementation of and managing the ISE, and
working together with the ISC, but does not articulate aspects of how
the Program Manager has interpreted this role in contrast to that of
other stakeholders. For instance, the officials at the Office of the
Program Manager noted:
* The Program Manager's office works on developing or improving
existing business processes that affect information sharing among two
or more of the five ISE communities, but does not focus on processes
that are internal to ISE members unless they directly impact the wider
ISE. Agencies, therefore, are to define ISE related business processes
and other requirements internal to their organizations along with how
the information will be used and drive their own analytical efforts.
* The Program Manager's role focuses on determining if a policy,
business process, legal or technical issue is preventing the sharing of
information between two or more communities and on helping to resolve
these types of issues rather than issues that impact sharing within a
community, such as homeland security.
This information on the parameters of the Program Manager's role and
responsibilities was not transparently communicated in the plan but is
critical for stakeholders, the Congress, and other policy makers to
clearly understand, provide for accountability, and ensure the ISE is
effectively implemented. Without clearly understanding their roles and
responsibilities, stakeholders may not adequately prepare for and
provide each other the information and services needed to prevent
terrorist attacks. According to officials at the Office of the PM-ISE,
departments and agencies, not the Program Manager alone, are
responsible for defining the ISE's scope and expected end state.
Accordingly, in November 2007 they held a first-time off-site with ISC
members to focus on ISE priorities, clarify responsibilities, and
emphasize the importance of everyone's active participation and
leadership. Moreover, the meeting was held to rectify any
misperceptions and reinforce that all ISE stakeholders are to define
the ISE. However, according to officials at the Office of the Program
Manager, problems in department and agency participation make it
difficult for the ISC to function as an advisory body for ISE
implementation. Among other things, officials noted that departments
and agencies do not always provide representatives with the authority
to speak on behalf of the agency and inconsistent attendance by ISC
representatives has been an issue.
Since issuance of the plan, on October 31, 2007, the National Strategy
for Information Sharing[Footnote 22] was issued, in part, further
communicating the scope of the ISE and stakeholder roles. The strategy
reaffirmed that stakeholders at all levels of government, the private
sector, and foreign allies play a role in the ISE. The strategy also
outlined some responsibilities for ISE stakeholders at the state,
local, and tribal government levels. In addition, the strategy further
defined the role of the Program Manager as also assisting in the
development of ISE standards and practices. However, the strategy did
not further clarify the parameters of the Program Manager's role and
what is within the scope of his responsibilities in "managing" the ISE
and improving information sharing versus other ISE stakeholders.
Third, the Program Manager and stakeholders are still in the process of
defining the programmatic results to be achieved by the ISE as well as
the associated milestones and projects needed, as standard practices in
program management suggest for effective program planning and
performance measurement. Existing federal guidance as well as our work
and the work of others indicates that programs should have overarching
strategic goals that state the program's aim or purpose, that define
how it will be carried out over a period of time, are outcome[Footnote
23] oriented, and that are expressed so that progress in achieving the
goals can be tracked and measured.[Footnote 24] Moreover, these longer-
term strategic goals should be supported by interim performance
goals[Footnote 25] (e.g., annual performance goals) that are also
measurable, define the results to be achieved within specified time
frames, and provide for a way to track annual and overall progress
(e.g., through measures and metrics). The implementation plan, as an
early step in planning for the ISE, identifies six strategic ISE goals
to be achieved. These goals include, for instance, to the maximum
extent possible, the ISE is to function in a decentralized,
distributed, and coordinated manner. However, the plan does not define
what this goal means, set up interim or annual goals and associated
time sensitive milestones to be built upon to achieve the overall goal,
or define how agencies will measure and ensure progress in meeting this
goal in the interim or overall. Instead, the plan notes that
performance measures will be developed at a later date. Moreover, the
plan does not present the projects and the sequence in which they need
to be implemented to achieve this strategic goal in the near term or in
the future, or the specific resources needed and stakeholder
responsibilities. Therefore, work remains in developing the road map
for achieving this strategic goal. Since the plan's issuance, officials
in the office of the Program Manager and stakeholders have developed
several performance measures and, as of March 2008, were in the process
of further refining them. Yet, our review of a draft of these
performance measures showed that they continue to focus on counting
activities accomplished rather than results achieved and do not yet
outline the sequence of projects needed to implement the ISE and
measurably report on progress in doing so.
Further, the plan identifies seven priority areas to be addressed in
implementing the ISE. These include, for example, sharing with partners
outside the federal government, promoting a culture of information
sharing, and establishing ISE operational capabilities. But like the
strategic goals, the priority areas represent general tasks and themes
to be addressed as part of the ISE and do not define expected results
in a measurable form, along with supporting performance goals,
measures, and deadlines for achieving the programmatic results. Without
these elements, ISE stakeholders may not understand the interim or
final ISE they are to achieve, assess progress towards implementing the
ISE, or hold stakeholders accountable for their contributions in
ensuring that the ISE succeeds.
Fourth, although required by the Intelligence Reform Act, the
implementation plan did not provide a budget estimate that identified
the incremental costs associated with designing, testing, integrating,
deploying, and operating the ISE but indicated that steps to develop a
budget estimate would be taken in the future. In part, this is because
the ISE was in such an early stage of development that it would be
difficult for agencies to know what to cost out for an estimate.
Developing a budget estimate, however, is a commonly used tool for
effective program management. While the Program Manager has been
working with agencies and the Office of Management and Budget to
determine the cost of implementing the ISE, officials at the Office of
the Program Manager stated that the total cost of the ISE has not yet
been accounted for and that attaining an overall estimate may not be
achievable. This is because it is difficult for agencies to isolate and
separate out what actions they are undertaking solely to implement the
ISE versus ongoing operations. We recognize that attaining an accurate
and reliable cost estimate for the ISE is a difficult undertaking,
complicated further by the fact that stakeholders are still defining
the scope of the ISE, results to be attained, and the projects to
support it. However, without information on how much the ISE will cost,
Congress and stakeholders will be unable to determine whether the
expenses associated with the ISE are worth the results attained and in
some cases unable to determine what has been accomplished given the
expended resources. Toward addressing this cost issue, the PM-ISE, in
collaboration with OMB, has since issued program guidance intended to
assist in estimating and tracking ISE costs in ISE priority areas, such
as suspicious activity reporting, developing ISE shared space, and
alerts, warnings, and notifications.
Finally, while the implementation plan states that Phase 1 will
conclude with the development of a detailed plan for implementation,
including goals, measures, and targets, a revised plan will not be
issued. Instead, officials at the Office of the Program Manager
indicated that they consider the implementation plan to be a living
document with initiatives identified at the outset of development being
refined as needed based on experience. Officials at the Office of the
Program Manager acknowledged that the 89 action items contained in the
plan do not address all of the activities that must be completed to
implement the ISE. This is because at the time the plan was produced,
agreement on how the ISE is to function and what it is to include had
not been reached among the stakeholders. Work toward reaching these
agreements remains ongoing. Therefore, program officials stated that an
assessment of the ISE's progress based on the action items identified
in the plan alone would not give a true sense of progress toward a
fully functioning and executed ISE. Accordingly, the PM-ISE intends to
adjust the plan, beginning with refinements in the next annual report.
For example, according to officials at the Office of the Program
Manager, to avoid delaying progress, the office plans to revise and
update certain implementation plan actions in the course of developing
the June 2008 Annual Report. In addition, officials at the Office of
the Program Manager stated that based on their experience in Phase 1,
they are deleting action items that are no longer valid and updating
others to reflect the ISE's current approach for implementation.
Making midcourse corrections to further determine and articulate the
end design of the ISE, or at least more accurately specify what is to
be achieved in the near term and at various milestones thereafter, is
in accordance with standard practices in program and project
management. However, given the ISE's many stakeholders and the work
that remains to be done in defining the scope of the ISE, the desired
results to be achieved, and the supporting projects and milestones, it
is important that the revisions, in accordance with standard practices
for program management, provide for an effective road map to implement
the ISE and measure achieved progress in implementing the ISE and in
improving information sharing. Without such a road map, the Program
Manager and stakeholders risk not being able to effectively manage and
implement the ISE.
An ISE Enterprise Architecture Framework Has Been Developed, but Its
Usefulness May Be Limited without Further Defining ISE Results:
Subsequent to the implementation plan, in August 2007, the Program
Manager issued the ISE Enterprise Architecture Framework Version 1.0
(ISE EAF), a planning document and tool intended to further inform ISE
implementation efforts, but its usefulness in guiding the ISE to meet
terrorism-related information-sharing needs may be hindered by the lack
of defined programmatic results to be achieved. As reported by the
Program Manager, the ISE EAF is to help improve information-sharing
practices, reduce barriers to sharing, and institutionalize sharing by
providing a new construct, or framework, for planning, installing, and
operating nationwide information resources within the ISE. Such
resources may include, for example, business processes and information
technologies. Further, as noted in the EAF, it is to be used to guide
the implementation of the ISE, accounting for current capabilities and
setting the direction and steps towards the envisioned or To-Be
capabilities. Because the ISE is composed of many organizations, the
ISE EAF can be looked at as a collection of independent stakeholder
enterprise architectures[Footnote 26] that were initially designed to
support individual missions, but are now being leveraged to facilitate
terrorism-related information sharing among these organizations. In
doing so, the ISE EAF is to assist in identifying the relationships
needed to facilitate terrorism information sharing among these
organizations and is to serve as a tool for understanding what, where,
and for what purpose current capabilities and resources, such as
information technology systems, may exist.
Enterprise architectures generally use strategic planning elements to
align potential system solutions with program needs. While the ISE EAF
is intended to augment organizations' enterprise architectures for the
purpose of sharing terrorism-related information, work remains to
determine the ISE's desired program outcomes or specific results to be
achieved, potentially limiting the effectiveness of the ISE EAF in
guiding the ISE to meet terrorism-related information sharing needs.
Unlike agency enterprise architectures, the ISE EAF does not seek to
identify, for example, business processes and information flows at an
operational level, the level at which organizations determine how
specific investments in technologies will be used to support business
needs and provide needed information. Instead, the ISE EAF relies on
the prerogative of individual departments and agencies to define
operational processes and information flows as part of their enterprise
architectures. Officials at the Office of the Program Manager noted
that OMB and the ISC agencies were very specific about the level of
detail the ISE EAF was to take, noting that the ISE EAF helps inform,
but not direct, how departments and agencies do their work at the
operational level--individually or together. However, without further
defining outcomes to be achieved and identifying how individual
agencies are to work together to meet ISE information-sharing needs at
the level where work is done, the ISE EAF may be limited in its
usefulness for improving the sharing of terrorism-related information.
The Program Manager Has Issued the First Annual Report and Is
Developing Initial Performance Measures, but Neither Can Yet Be Used to
Determine How Much Progress Has Been Made and What Remains:
To describe progress in implementing the ISE to date, the Program
Manager issued an annual report--in response to the Intelligence Reform
Act's requirement for a yearly performance management report--in
September 2007 that highlighted individual accomplishments and included
annual performance goals and has since developed some performance
measures, but neither effort shows how much measurable progress has
been made toward implementing the ISE and how much remains to be done.
In keeping with federal guidance, our work, and the work of others in
strategic planning, performance measurement, and program management,
the annual report contained four performance goals for 2008.
Additionally, some initial performance measures have been developed,
but they do not address all aspects of the annual performance goals or
strategic goals and do not show how they represent interim milestones
to ensure attainment of desired results or outcomes. According to
officials at the Office of the Program Manager, these performance
measures are currently being refined in consultation with the ISC to
provide the needed framework to measure real progress made. We
acknowledge that creating such measures is difficult, particularly
since the program is still being designed, but until these measures are
refined to account for and communicate progress and results, future
attempts to measure and report on progress will be hampered.
The Annual Report Cited Accomplishments Made in Implementing the ISE,
but Not the Extent of Progress Achieved and Remaining Work:
The annual report conveyed individual ISE-related accomplishments as of
September 2007 but did not provide Congress and policy makers with
information on what portion of the ISE has been completed as a result
of this work and what portion remains. The report lists the preliminary
actions taken to prepare for establishing the ISE, such as designation
of the Program Manager, the President's memorandum providing guidelines
for the ISE, and submission of the implementation plan to the Congress.
The report also cites individual accomplishments that contribute to the
ISE, some of which were accomplished under the implementation plan--
such as establishment of an electronic directory service for users to
find contact information for organizations that have counter-terrorism
missions--and others achieved prior to and or separate from efforts to
create the ISE. For instance, the report cites several accomplishments
attained prior to the December 2004 Intelligence Reform Act and its
call for an ISE, including the creation of the National
Counterterrorism Center (NCTC) in August 2004 and the establishment of
the Terrorist Screening Center (TSC) in 2003. In part, because ISE
implementation remains in the early stages, the annual report
highlighted these discrete accomplishments without putting them in an
overall context that showed how much progress has been made and remains
toward implementing the ISE. While, as previously noted, the
implementation plan identified a two phased approach for implementing
the ISE along with 89 action items--the only means presented in the
implementation plan for tracking completion of ISE implementation--the
report did not provide a one-for-one reporting on the status of these
action items as steps for implementing the ISE or identify how much of
the implementation had been completed. Thus, the Congress and policy
makers do not yet have the information they need to assess the amount
and rate of progress, remaining gaps, and the need for any intervening
strategies.
Performance Measures Are Being Developed Although They Do Not Yet
Address All Aspects of the Annual Performance Goals:
In accordance with existing federal guidance as well as our work and
the work of others in strategic planning, performance measurement, and
program management, programs should have overarching strategic goals
that state the program's aim or purpose, define how it will be carried
out over a period of time, are outcome oriented, and are expressed so
that progress in achieving the goals can be tracked and measured.
Moreover, these longer-term strategic goals should be supported by
interim performance goals[Footnote 27] (e.g., annual performance goals)
that are also measurable, define the results to be achieved within
specified time frames, and provide for a way to measure and track
annual and overall progress (e.g., through measure and metrics).
Accordingly, the implementation plan contained six overall strategic
goals and the annual report contained four annual performance goals for
2008, as shown in tables 2 and 3.
Table 2: Strategic Goals Contained in the Implementation Plan:
1. Facilitate the establishment of a trusted partnership among all
levels of government, the private sector, and foreign partners.
2. Promote an information-sharing culture among ISE partners by
facilitating the improved sharing of timely, validated, protected, and
actionable terrorism information supported by extensive education,
training, and awareness programs for ISE participants.
3. To the maximum extent possible, function in a decentralized,
distributed, and coordinated manner.
4. Develop and deploy incrementally, leveraging existing information
sharing capabilities while also creating new core functions and
services.
5. Enable the federal government to speak with one voice on terrorism-
related matters, and to promote more rapid and effective interchange
and coordination among federal departments and agencies and state,
local, and tribal governments, the private sector, and foreign
partners, thus ensuring effective multi-directional sharing of
information.
6. Ensure sharing procedures and policies protect information privacy
and civil liberties.
Source: Information Sharing Environment Implementation Plan, November
2006.
[End of table]
Table 3: 2008 Annual Performance Goals Listed in the Annual Report:
ISE functional areas: Improving sharing practices;
2008 ISE performance goals: Establish a set of activities and strategic
approaches to facilitate sharing among all levels of government,
private sector, and foreign partners.
ISE functional areas: Creating a culture of sharing;
2008 ISE performance goals: Develop a shared set of values that change
behavior of ISE participants through established training programs,
trained personnel, incentive programs, and privacy protections among
ISE participants.
ISE functional areas: Reducing barriers to sharing;
2008 ISE performance goals: Establish operability that facilitates
sharing through a common ISE information technology security framework
to include approved ISE-wide information assurance solutions,
governmentwide physical and personnel security practices, as well as
controlled unclassified information framework across the ISE.
ISE functional areas: Institutionalizing sharing;
2008 ISE performance goals: Establish capabilities that allow ISE
participants to create and use quality terrorism-related information by
improving business processes, developing a common enterprise
architecture framework, refining common standards, and instituting
effective resource management for governmentwide programs.
Source: Annual Report to the Congress on the Information Sharing
Environment, September 2007.
[End of table]
While not reflected in the first annual report, the Program Manager and
agencies have begun to develop performance measures to improve future
reporting on progress in implementing the ISE and information sharing
overall, but these measures focus on counting activities accomplished
rather than results achieved to show the extent of ISE implementation
and attaining the ISE's strategic goals. In accordance with our work
and federal guidance on strategic planning and performance measurement,
the newly developed measures represent an effort to more concretely and
quantitatively assess progress in implementing the ISE and improving
information sharing. The performance measures include, for example, the
number of ISE organizations with a procedure in place for acquiring and
processing reports on suspicious activities potentially related to
terrorism, but not how the reports are used and what difference they
are making in sharing to help prevent terrorist attacks. Similarly, the
measures attempt to assess the creation of a culture of sharing by
tabulating the percentage of relevant ISE organizations that have an
information-sharing governance body or process in place, but not by
measuring the outcome--such as how and to what extent cultural change
is being achieved. Indeed, these measures are an important first step
in providing quantitative data for assessing progress made in
information sharing and help to inform Congress and other stakeholders
on specific information sharing improvements. But, taking the measures
to the next step--from counting activities to results or outcomes--
while difficult, is important to assess results achieved.
The Program Manager and ISE stakeholders have not yet developed
measures to address all aspects of the annual performance goals. For
example, one 2008 performance goal identified in the annual report is
to establish capabilities that allow ISE participants to create and use
quality terrorism-related information by improving business processes,
developing a common enterprise architecture framework, refining common
standards, and instituting effective resource management for
governmentwide programs. Based on the description of this performance
goal, one ISE performance measure that supports this goal includes
attaining the percentage of applicable ISE organizations that have
adopted the common terrorism information sharing standards during the
past or preceding fiscal year(s). However, performance measures in
support of all topics identified in the goal, such as instituting
effective resource management for governmentwide programs, have not
been developed. Further, the performance measures are not presented in
a way that explains how they represent milestones toward attaining the
strategic goals or intended outcomes. According to officials at the
Office of the Program Manager, as of March 2008, they are refining
their measures in consultation with the ISC to provide an improved
framework to measure progress made. Yet, our review of a draft of these
performance measures showed that they continue to focus on counting
activities accomplished rather than results achieved. We acknowledge
that creating such measures is difficult, particularly since the
program is still being designed, but until these measures are refined
to account for and communicate progress and results, future attempts to
measure and report on progress will be hampered.
Conclusions:
Although the Program Manager and stakeholders have made progress in
implementing a number of initiatives, successfully implementing the ISE
remains a daunting task. While efforts to date may represent the
groundwork needed to facilitate terrorism-related information sharing
in the future, over 3 years after passage of the Intelligence Reform
Act, the ISE is still without a clear definition of the specific
results to be achieved as part of the ISE or the projects, stakeholder
contributions, and other means needed to achieve these results. The
Program Manager, together with the ISE stakeholders, have followed
standard practices in program and project management for defining,
designing, and executing programs by identifying action items and
strategic goals to be achieved in the implementation plan. However,
work remains in, among other things, defining and communicating the
scope and desired results to be achieve by the ISE, specific milestones
to achieve the results, and the individual projects and execution
sequence needed to achieve these results and implement the ISE. Until
this work is complete, further efforts may result in independent
contributions to improving information sharing rather than an ISE with
improved and coordinated sharing of terrorism-related information among
stakeholders, a critical need exposed by the terrorist attacks of
September 11. Given that the ISE requires extensive buy-in from
stakeholders and the Program Manager is relying on stakeholders to
provide technology and other resources to make the ISE work, it is
critical to develop a road map for implementing the ISE and improving
information sharing that communicates the scope and specific results to
be achieved by the ISE, the key milestones and individual projects
needed to implement the ISE, needed resources, and stakeholder
responsibilities. Without such a road map, the Program Manager risks
not being able to effectively manage and implement the ISE.
Furthermore, efforts to report on progress to date have provided
examples of individual actions taken to improve information sharing but
have not yet included an accounting of how far the Program Manager and
stakeholder agencies are in achieving an effectively functioning ISE
and what remains to be done. By not doing so, stakeholders do not have
a measurable way to ensure that the sharing of terrorism-related
information has improved and by how much, nor the information needed to
understand the resources and time frames required to achieve the
intended results of the ISE. Until the Program Manager and stakeholders
more fully define the specific results the ISE is to attain and develop
a set of measures to assess progress in achieving the goals--including,
at a minimum, what has been done and what remains to be accomplished--
Congress and stakeholders will not know how far the nation has come in
implementing an ISE intended to improve governmentwide information
sharing.
Recommendations:
To help ensure that the ISE is on a measurable track to success, we are
recommending that the Program Manager, with full participation of
relevant stakeholders (e.g., agencies and departments on the ISC), take
the following two actions:
* more fully define the scope and specific results to be achieved by
the ISE along with the key milestones and individual projects or
initiatives needed to achieve these results, and:
* develop a set of performance measures that show the extent to which
the ISE has been implemented and sharing improved--including, at a
minimum, what has been and remains to be accomplished--so as to more
effectively account for and communicate progress and results.
Agency Comments and Our Evaluation:
We requested comments on a draft of this report from the Secretaries of
Defense, Homeland Security, and State, as well as the Attorney General,
the Director of National Intelligence, and the Program Manager for the
ISE or their designees. In a June 6, 2008, letter, the Program Manager
for the ISE provided written comments, which are summarized below and
included in their entirety in appendix II.
The Program Manager generally agreed with our recommendations to more
fully define the scope and results to be achieved by the ISE and
develop a comprehensive set of performance measures that show the
extent to which the ISE has been implemented and sharing improved.
While the Program Manager agreed with our recommendations, he commented
that the ISE is a governmentwide transformational effort--emphasizing
that the ISE is an evolutionary process--and not a traditional
"program." Therefore, according to the Program Manager, trying to audit
this interagency initiative strictly within program parameters presents
problems. We agree that the ISE is a governmentwide transformational
effort, that it is not a traditional "program," and that it involves an
evolutionary process. In fact, our report states that the ISE is not
bounded by a single federal agency or component and that it is a broad-
based coordination and collaboration effort among various stakeholders.
While we agree that the ISE is not a traditional "program," in that it
is not operated and funded by a single department or agency, it is an
activity that does receive government funding and can be reviewed using
program and project management principles. As such, we based our
evaluation of the ISE on a broad set of program and project management
criteria, including the Government Performance and Results Act of 1993,
related guidance issued by OMB, and our prior work on results-oriented
government, program management, and federal coordination and
collaboration. Further, while we recognize that approaches to
implementing the ISE and improving information sharing may evolve over
time as technologies and needs change, calling the ISE an evolutionary
process does not exempt it from following the practices outlined in our
report. Following these practices will help ensure that reports of
progress by the Program Manager on behalf of the ISE at large are based
on measures of results achieved toward implementing the ISE--that is
measured based on what the ISE is to be, include, and accomplish in,
for example, 3 years--rather than ad-hoc claims of progress.
With regard to efforts for assessing the ISE's progress, the Program
Manager noted that in the 2007 annual report he introduced a
performance management approach and his office has since established a
performance baseline--in the fall of 2007--and measured agencies'
progress against this baseline through an assessment performed in the
spring of 2008. Our report acknowledges these efforts. However, our
review of the performance measures developed in support of the
performance management approach shows that these measures: (1) focus on
counting activities accomplished rather than results achieved to show
the extent of ISE implementation and attaining the ISE's strategic
goals and (2) are not presented in a way that explains how the measures
represent milestones toward attaining the strategic goals identified in
the implementation plan or intended outcomes. In his comments, the
Program Manager further noted that the June 2008 annual report, which
was not released by the time we issued this report, would provide more
current data on performance measurement. However, our review of a draft
of the measures to be incorporated in the 2008 report showed that they
continue to focus on counting activities accomplished rather than
results achieved. Unless the 2008 report corrects these shortfalls and
establishes a performance management mechanism whereby short-term
annual goals serve as steps for assessing the ISE's progress towards
achieving longer-term strategic goals, it and future reports on
progress will fail to provide the Congress and other policy makers the
meaningful information needed to understand what progress has been made
in attaining the defined strategic results for the ISE and improving
information sharing.
Finally, the Program Manager said that although the report mentions
that one of the challenges of the ISE is interagency attention and
priority to ISE initiatives, the report does not make any
recommendations in this regard. We agree that interagency collaboration
in the ISE is a challenge and individual departments and agencies, not
the Program Manager alone, have responsibilities in implementing the
ISE. However, to effectively hold these agencies accountable for ISE
progress, existing issues identified in our report--such as defining
the outcomes to be achieved and defining clear roles and
responsibilities--must first be addressed. Given the ISE's many
stakeholders and recognizing the Program Manager's key leadership role
for managing the ISE, we maintain that these issues must be addressed
by the Program Manager, with full participation of relevant
stakeholders (e.g., agencies and departments on the ISC). Without doing
so, the Program Manager may continue to face challenges in attaining
agency buy-in and holding stakeholders accountable for ISE progress.
Officials in the Office of the Program Manager also provided technical
comments on the draft that have been incorporated, as appropriate.
The Secretaries of Defense, Homeland Security, and State; the Attorney
General; and the Director of National Intelligence responded that they
did not have any comments on the report.
As agreed with your offices, unless you publicly release the contents
of this report earlier, we plan no further distribution until 30 days
from the report date. We will then send copies of this report to the
Program Manager for the ISE, the Director of National Intelligence, and
the Secretaries of the Departments of Defense, Homeland Security,
Justice, and State; and interested congressional committees. In
addition, this report will be available at no charge on the GAO Web
site at [hyperlink, http://www.gao.gov].
If you or your staff have any questions concerning this report, please
contact either Eileen Larence at 202-512-8777 or larencee@gao.gov, or
David Powner at 202-512-9286 or pownerd@gao.gov. Contact points for our
Office of Congressional Relations and Public Affairs may be found on
the last page of this report. GAO staff who made major contributions to
this report are listed in appendix III.
Signed by:
Eileen R. Larence:
Director, Homeland Security and Justice Issues:
Signed by:
David A. Powner:
Director, Information Technology Management Issues:
List of Congressional Requesters:
The Honorable Joseph Lieberman:
Chairman:
The Honorable Susan Collins:
Ranking Member:
Committee on Homeland Security and Government Affairs:
United States Senate:
The Honorable Daniel K. Akaka:
Chairman:
Subcommittee on Oversight of Government Management, the Federal
Workforce and the District of Columbia:
Committee on Homeland Security and Governmental Affairs:
United States Senate:
The Honorable Bennie G. Thompson:
Chairman:
Committee on Homeland Security:
House of Representatives:
The Honorable Jane Harman:
Chair:
Subcommittee on Intelligence, Information Sharing, and Terrorism Risk
Assessment:
Committee on Homeland Security:
House of Representatives:
[End of section]
Appendix I: Status of Phase I Action Items as of March 1, 2008:
Table 1 below provides the status of each of the 48 Phase 1 action
items identified in the ISE implementation plan as of July 9, 2007,
nine days after their planned completion date and as of March 1, 2008.
These action items encompass many areas for development in the ISE,
ranging from activities such as identifying capabilities and technology
to privacy protection and performance measures. As the table indicates,
based on our analysis of status information reported by the Program
Manager, at the end of phase one's scheduled completion, 18 of 48
action items had been completed and 30 remained incomplete. Eight
months later, 33 of 48 action items had been completed, with 15
remaining incomplete. In determining the status of the action items, we
reviewed documentation provided by the Program Manager, but did not
evaluate the effectiveness of the actions taken.
Table 4: Comparison of Action Item Status in July 2007 and March 2008:
Action item: 1.01 The Program Manager for the Information Sharing
Environment (PM-ISE) and Information Sharing Council (ISC) members will
identify the alerts and notifications to be available to federal and
non-federal ISE participants and the enabling policies and business
processes necessary to implement the alert and notification capability.
(Planned completion: March 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Not complete but in process;
Description of status as of March 1, 2008: An initial survey of alerts
and notifications has been conducted to identify, among other things,
the alerts and warnings that departments and agencies provide to ISE
partners as well as the method for distributing the alerts and
notifications. According to officials at the PM-ISE, ISC agency
representatives are validating this survey and preliminary findings,
with draft information flows for major alerts and warnings functions
being developed for potential including in the next published version
of the Information Sharing Environment Enterprise Architecture
Framework (ISE EAF). These officials further noted that expected future
activities include further assessing the remaining ISC agencies' alerts
and warnings efforts, surveying state, local, and tribal participants,
and developing an ISE-wide framework for terrorism-related alerts,
warnings, and notifications.
Action item: 1.02 The PM-ISE and ISC members will identify existing
technologies, capabilities, and programs (e.g., Homeland Security
Presidential Directive-12 and Federal Information Processing Standard
201) that provide easier user access, but still support identity
management through audits, authentication, and access controls. The ISC
will assess the technologies and pilot programs to determine whether or
not the technologies support its user base and are suitable for ISE
adoption. (Planned completion: June 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Not complete but in process;
Description of status as of March 1, 2008: According to PM-ISE
officials, the action specified in Task 1.02 did not adequately support
the needs of the ISE, resulting in an altered approach for addressing
identity management and user access across the ISE. PM-ISE officials
told us that existing identity management solutions support the
individual participant's mission needs, but the many differing identity
management schemes throughout the ISE participants' networks do not
directly support the ISE as a whole. Therefore, the ISE expects to
leverage existing identity management schemes, but not create a new
identity management solution specific to the ISE. Accordingly, in
December 2007, the PM-ISE's Business Process Working Group produced the
Business Process Analysis Paper on Access Process. This paper
identified five requirements to enable ISE user access to terrorism-
related information. According to PM-ISE officials, these requirements
are being incorporated into ISE architecture documents and are expected
to enable departments and agencies to derive lower level requirements.
Further, according to officials, this paper is being used in an ongoing
initiative to evaluate PM-ISE sponsored pilots that demonstrated
capabilities in remote wireless access, federated identity management
(referenced in Action 1.03) and role-based search.
Action item: 1.03 The PM-ISE and ISC members will determine what ISE-
wide identity management capabilities are practical and develop a
detailed set of requirements and Project Plan for implementation of
such capabilities in a time frame consistent with technology maturity
and available budgetary resources. (Planned completion: June 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Not complete but in process;
Description of status as of March 1, 2008: The PM-ISE is currently
sponsoring a pilot project on identity management and access intended
to demonstrate an initial capability to share electronic identity
information and use that information to enable assured access to
information stored across the different ISE communities. According to
PM-ISE officials, the pilot is building an operational, federated
access management capability by leveraging existing identity management
solutions and evaluating technologies, policies, and procedures for
potential ISE identity management solutions. The completion of the
pilot is expected to result in documenting which identity management
capabilities may provide the most value to the ISE.
Action item: 1.04 The PM-ISE and ISC members will investigate existing
or emerging capabilities that discover data and information within the
federal government and industry. The initial implementation of
enterprise search will apply a search engine to index both structured
and unstructured data. This activity will include the evaluation of
several ongoing pilot programs using technologies that integrate data
across heterogeneous networks and data stores to enhance the
"findability" of relevant information and the interoperability of data
and information. (Planned completion: June 2007);
Status as of July 9, 2007: Complete;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.05 The PM-ISE and the ISC will work with the Cross
Domain Management Office to establish a process to ensure that cross-
domain solutions developed through this office meet the needs of ISE
participants. (Planned completion: March 2007);
Status as of July 9, 2007: Complete;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.06 The PM-ISE and ISC members will identify existing
collaborative tools that are used and operational in the
counterterrorism or other analytic or investigative communities and
review the feasibility of adopting common tools for use across the ISE.
(Planned completion: March 2007);
Status as of July 9, 2007: Complete;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.07 The PM-ISE and ISC members will develop requirements
to implement new and emerging collaborative technologies. (Planned
completion: June 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Not complete but in process;
Description of status as of March 1, 2008: A Business Process Analysis
paper on the Collaboration Process, dated October 1, 2007, has been
developed. The stated purpose of the document includes conveying key
user requirements, implementation considerations, and describing a
future-state process description for the ISE Collaboration Process.
According to officials at the office of the PM-ISE, this paper was
disseminated to the Business Process Working Group in December 2007 as
part of a larger analysis of ISE service processes. They further noted
that the requirements identified through this effort are being
incorporated into the ISE EAF documents.
Action item: 1.08 The PM-ISE and the ISC members will implement the
Electronic Directory Services Blue, Yellow, and Green Pages in the
sensitive compartmented information, secret, and sensitive but
unclassified security domains. (Planned completion: June 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete;
(Note: The PM-ISE subsequently altered this action item, deciding it
would no longer complete the Green Pages in the sensitive-but-
unclassified security domain due to aggregation issues. According to
officials at the Office of the PM-ISE, aggregating the information for
the Green Pages would no longer enable the information to be posted in
an unclassified domain.)
Action item: 1.09 The PM-ISE and the ISC members will implement
Electronic Directory Services White Pages in the secret compartmented
information and secret security domains. (Planned completion: June
2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete;
(Note: The ISC altered this action item, deciding it would no longer
complete the White Pages in the secret security domain).
Action item: 1.10 The PM-ISE, in consultation with the ISC, will
publish a preliminary version of the ISE Enterprise Architecture
Framework (ISE EAF) Document providing the models with major portions
of the ISE and their attributes. (Planned completion: December 2006);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.11 The Office of Management and Budget, in the Federal
Enterprise Architecture (FEA) Business Reference Model, will include
"Information Sharing" as a new government subfunction, Business
Reference Model code 143, with the "Information and Technology
Management" Line of Business, Business Reference Model code 404.
(Planned completion: December 2006);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete;
(Note: Action item 1.11 is complete, except the code 143 is actually
262.)
Action item: 1.12 The PM-ISE will work with National Security Agency,
the National Institute of Standards and Technology, Director of
National IntelIigence/Chief Information Officer, and the Committee on
National Security Systems on incorporating network security and
information assurance policies and practices for the ISE EAF and
associated functional standards. (Planned completion: March 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.13 The PM-ISE, in consultation with the ISC, will
publish a fully documented ISE EAF Document and a Federal Enterprise
Architecture-ISE profile. The development process will be worked in
collaboration with the Office of Management and Budget, department and
agency chief information officers, and ISC members. (Planned
completion: March 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Not complete but in process;
Description of status as of March 1, 2008: Version 1.0 of the ISE EAF
has been published and a draft version of the ISE profile has been
developed and is undergoing review by the Chief Information Officers
Council as a formal FEA Profile in the E-Gov program. Officials at the
Office of the PM-ISE noted that an approval letter for the FEA Profile
is pending signature by the Office of Management and Budget.
Action item: 1.14 The PM-ISE, in consultation with the ISC, will
develop a configuration management process for the control and
management of updates to the ISE EAF document and Federal Enterprise
Architecture-ISE profile. (Planned completion: December 2006);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.15 The Office of Management and Budget, in the Federal
Enterprise Architecture Reference Models, will add the ISE EAF and the
Federal Enterprise Architecture-ISE profile as compliance requirements
in the Federal Transition Framework, a catalog of cross-agency
initiatives, and the Federal Enterprise Architecture Program:
Enterprise Architecture Assessment Framework, the maturity assessment
guide for Federal enterprise architectures. (Planned completion: March
2007);
Status as of July 9, 2007: Complete;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.16 DHS will work with the PM-ISE to review existing
policies and procedures for ascertaining relevant and effective
approaches to migrate the ISE EAF models and attributes into the
private sector. (Planned completion: June 2007);
Status as of July 9, 2007: Complete;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.17 The PM-ISE will convene and chair a new working
group, the Common Terrorism Information Sharing Standards Working
Group, with representatives from all ISC members, the National
Communications System, the National Institute of Standards and
Technology (NIST), and the Committee on National Security Systems
tasked with selecting and issuing information-sharing standards,
approved through the ISC, and formally published by NIST. The Common
Terrorism Information Sharing Standards may include new standards that
agencies will introduce to affect on-going investment activities as
project schedules and funding permit. Future funded investments
incorporating the Common Terrorism Information Sharing Standards will
be compatible with the federal enterprise architecture and national
security system enterprise architectures, and identified in normal
agency submittals to the Office of Management and Budget. The Common
Terrorism Information Sharing Standards Working Group will issue common
terrorism information sharing standards recommendations to the ISC for
information sharing standards for non-federal government agencies.
(Planned completion: December 2006);
Status as of July 9, 2007: Complete;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.18 Departments and agencies will begin to incorporate
the common terrorism information sharing standards into investment
planning, consistent with ISE EAF incorporation, with full common
terrorism information sharing standards incorporation into investments
beginning execution in fiscal year 2009. This will include both civil
and national security system investments. Agencies will also
incorporate the common terrorism information sharing standards into
information resource lifecycle processes to include capital planning
and investment control processes. The common terrorism information
sharing standards will provide the source of functional standards for
information sharing in the Federal Enterprise Architecture's Technical
and Data Reference Models. (Planned completion: June 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Not complete but in process;
Description of status as of March 1, 2008: In December 2006, the Office
of Management and Budget released the Federal Transition Framework
Version 1.0. The Office of Management and Budget described the Federal
Transition Framework as a single source for clear and consistent
information describing government-wide information technology policy
objectives and cross-agency initiatives, such as the E-Gov and line of
business initiatives. According to officials at the Office of the PM-
ISE, having the ISE descriptions in the Federal Transition Framework
was a first step in ensuring that the PM-ISE and the Common Terrorism
Information Sharing Standards are part of each agency's capital
planning and investment control investment life-cycle; In October 2007
the Common Terrorism Information Sharing Standards Program Manual,
Version 1.0 was published. According to PM- ISE officials, they plan to
conduct ISE management reviews (IMRs) with departments and agencies to
assess if departments and agencies have incorporated the Common
Terrorism Information Sharing Standards into investment planning. These
reviews are expected to occur in April or May of 2008. PM-ISE officials
further noted that they, in conjunction with the Office of Management
and Budget, plan to conduct enterprise architecture reviews with
departments and agencies in March 2008 that, in part, are based on the
Federal Transition Framework Catalog.
Action item: 1.19 The PM-ISE, in consultation with the ISC, will
develop the common terrorism information sharing standards, version 2.0
addressing additional processes, including those with foreign partners,
and releasing priority functional standards supporting suspicious
activity reports, cargo management and tracking, and general identity
management. (Planned completion: June 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Not complete but in process;
Description of status as of March 1, 2008: The Common Terrorism
Information Sharing Standards Program Manual, Version 1.0, was
published in October 2007. According to PM-ISE officials, specific
functional standards will be developed and published as required.
According to officials at the Office of the PM-ISE, efforts to date
include: development of functional standards for ISE suspicious
activity reports;; coordination of cargo management and tracking
standards currently underway; and; efforts to evaluate identify
management technologies and processes remain underway through the
Identity Management Pilot. Best practices and recommendations are to be
developed as a result of this pilot and are intended to lead to the
development of functional standards, as appropriate; According to PM-
ISE officials, efforts to coordinate with foreign partners will
commence with the initiation of the second phase of the Foreign
Government Information Sharing Working Group and Guideline 4 efforts.
Action item: 1.20 Within 30-days of approval of the proposed Guideline
2 framework, the PM-ISE, in consultation with the ISC, will establish a
Senior Level Advisory Group--consisting of ISC members or their
designees--to ensure accountability, oversight, and governance for the
effective operation of the framework. The advisory group will report
the results of its oversight to the PM-ISE and the ISC. The advisory
group will meet at least once per month during the first year of
implementation. (Planned completion: December 2006);
Status as of July 9, 2007: Complete;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.21 Within seven days of approval of the proposed
framework, there will be established an implementation team--comprised
of representatives from the Department of Defense; the Department of
the Interior; the Department of Homeland Security; the Federal Bureau
of Investigation; the National Counterterrorism Center; appropriate
state, local, tribal, and private sector advocates; and the PM-ISE--to
develop an implementation plan for the Interagency Threat Assessment
and Coordination Group framework and to ensure its timely execution.
The implementation team will develop and implement plans to notify
state, local, and tribal officials of the Interagency Threat Assessment
and Coordination Group's mission and responsibilities. (Planned
completion: December 2006);
Status as of July 9, 2007: Complete;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.22 The Interagency Threat Assessment and Coordination
Group implementation team will submit semiannual reports to the PM-ISE
that identify successes and shortcomings in implementing and operating
the ISE within the Guideline 2 framework and outline steps to refine
and improve the framework's operation. (Planned completion: Ongoing
with first report due in the first quarter of Calendar Year 2007);
Status as of July 9, 2007: Complete;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.23 The PM-ISE will establish a federal fusion center
coordination group to identify federal resources to support the
development of a network of state-sponsored fusion centers charged to
share information at all levels of the ISE and will recommend funding
options. (Planned completion: December 2006);
Status as of July 9, 2007: Complete;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.24 The Department of Justice and the Department of
Homeland Security will work with governors or other senior state and
local leaders to designate a single fusion center to serve as the
statewide or regional hub to interface with the federal government and
through which to coordinate the gathering, processing, analysis, and
dissemination of terrorism information. (Planned completion: March
2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.25 The Department of Justice and the Department of
Homeland Security, to the extent possible and practicable, will assume
the responsibility for technical assistance and training to support the
establishment and operation of these fusion centers. (Planned
completion: March 2007);
Status as of July 9, 2007: Complete;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.26 Appropriate federal departments and agencies will
assess resources and develop and coordinate plans to assign
representative personnel to state and local fusion centers. These
representatives will work to the extent possible to further integrate-
-and where appropriate collocate--federal and state/regional resources.
(Planned completion: March 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Not complete but in process;
Description of status as of March 1, 2008: A DHS/FBI Joint Deployment
Plan was drafted in response to this action item, but remained in draft
form at the end of Phase 1. This deployment plan is seen as a first
step with additional coordination with stakeholders remaining to fully
address this action item.
Action item: 1.27 The Private Sector Subcommittee will produce a plan
that implements elements of the framework as it affects the private
sector. This plan must be consistent with statutes and presidential
direction and ensure that information and privacy and legal rights are
adequately protected. (Planned completion: June 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Not complete but in process;
Description of status as of March 1, 2008: A plan for implementing this
action item was not in place by the end of Phase 1. However, several
steps were taken towards meeting this action item. For example, DHS and
members of the Critical Infrastructure Partnership Advisory Council
jointly established a working group on information-sharing. The PM-ISE
stated that this working group is expected to be the ISC conduit into
the Critical Infrastructure Partnership Advisory Council and its
private sector members, consisting of designated representatives from
all the critical infrastructure and key resources sectors. The
responsibilities of this working group are expected to include
supporting the universe of government information- sharing initiatives
coordinated by the PM-ISE that require engagement with the private
sector (critical infrastructure and key resources owner/operator
representatives) under the Critical Infrastructure Partnership Advisory
Council structure. Further, an initial framework for private sector
participation was drafted.
Action item: 1.28 The Foreign Government Information Sharing Working
Group, with coordination and assistance from the PM-ISE, will develop
recommendations on Privacy Act systems of records notices and routine
uses for the Guideline 5 Working Group. (Planned completion: March
2007);
Status as of July 9, 2007: Complete;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.29 The Foreign Government Information Sharing Working
Group, with coordination and assistance from the PM-ISE, will develop a
checklist of issues that need to be taken into account in negotiating
international agreements, including privacy protections and possible
review procedures. (Planned completion: June 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.30 Federal departments and agencies, with coordination
and assistance from the PM-ISE, will encourage bilateral and
multilateral efforts whenever feasible and appropriate to develop "best
practices" on terrorism information sharing (e.g., protocols on what to
do if there is a "hit"). (Planned completion: Ongoing with a first
progress report in the second quarter of Calendar Year 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Not complete but in process;
Description of status as of March 1, 2008: Work towards this action
item was underway at the end of phase 1. For example, according to
officials at the Office of the PM-ISE, work towards establishing a
baseline on information-sharing agreements was underway. Further, an
initial progress report on this effort is expected to be provided as
part of an overall project plan from implementation guideline 4, which
addresses facilitating information- sharing with foreign partners.
Action item: 1.31 The Department of State's Foreign Service Institute,
supported by the working group of ISC training representatives, will
develop the core training module that will serve as the common
educational baseline for the ISE. (Planned completion: June 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Not complete but in process;
Description of status as of March 1, 2008: Development of the core
training module to serve as the common educational baseline for the ISE
has been underway. To date, the Foreign Service Institute and ISC have
undergone several iterations of review and comment on draft versions of
the training course. According to PM-ISE officials, a November 2007
review of the course by the ISC led to further revision and updating of
the course outline and content, with the intent to incorporate
additional computer based training capabilities. Also, in February 2008
a focus group met to further revise the course content and structure.
Action item: 1.32 The PM-ISE, in consultation with the ISC, will review
departmental incentives for sharing of terrorism information and will
measure their effectiveness. (Planned completion: June 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Not complete but in process;
Description of status as of March 1, 2008: According to a PM-ISE status
report on the identification of incentives for information-sharing, the
PM-ISE is in the process of developing guidance to federal departments
and agencies to assist them, where necessary, in expanding current or
developing new capabilities to recognize efforts that further promote a
culture of terrorism information sharing across federal agencies and
non-federal government entities. Also, an initial measure to identify
whether or not departments and agencies have adopted incentives for
sharing has been developed. As an initial step towards assessing the
effectiveness of these incentives, the PM-ISE is also seeking to
collect information on how best practices for incentives have been
shared.
Action item: 1.33 Each agency will ensure that one or more ISE Privacy
Officials are designated in accordance with paragraph 12.a of the
privacy guidelines. (Planned completion: December 2006);
Status as of July 9, 2007: Complete;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.34 The PM-ISE will establish and designate a chair for
the ISE Privacy Guidelines Committee. (Planned completion: December
2006);
Status as of July 9, 2007: Complete;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.35 The PM-ISE, in consultation with the ISE Privacy
Guidelines Committee and the ISC, will establish a process for ensuring
that non-Federal organizations participating in the ISE implement
appropriate policies and procedures that provide protections that are
at least as comprehensive as those contained in the Guidelines.
(Planned completion: March 2007);
Status as of July 9, 2007: Complete;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.36 The ISE Privacy Guidelines Committee will provide an
assessment of the privacy and civil liberties protections of the ISE,
including actions taken in the preceding year to implement or enforce
privacy and civil liberties protections, to be included in the
President's first annual ISE performance report. (Planned completion:
June 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.37 The Guideline 3 Coordinating Committee will complete
its work and submit recommendations for sensitive but unclassified
standardization through the White House policy process to the Assistant
to the President for Homeland Security and Counterterrorism and the
Assistant to the President for National Security Affairs. (Planned
completion: March 2007);
Status as of July 9, 2007: Complete;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.38 To align timelines, the PM-ISE will work with ISC
members and other partners to establish cut-off dates for the yearly
ISE performance management reports. (Planned completion: March 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.39 Federal departments and agencies will use their
information sharing and terrorism-related Fiscal Year 2006 goals,
measures, and outcomes as input to the ISE Performance Management
Report. (Planned completion: June 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete;
(Note: According to officials at the Office of the PM-ISE, federal
departments and agencies will be expected to use the performance
management framework defined in the 2007 annual report to management
information sharing performance in 2008.)
Action item: 1.40 Federal departments and agencies will reflect ISE
goals in their individual performance management plans. (Planned
completion: March 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Not complete but in process;
Description of status as of March 1, 2008: While departments and
agencies provided examples of terrorism-related information sharing
accomplishments they have participated in, reflecting ISE goals in
individual department and agency performance management plans remains a
work in process.
Action item: 1.41 Federal departments and agencies will specify support
to the ISE as part of their strategic plans and performance management
efforts for the 2006-2007 cycle. (Planned completion: June 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Not complete but in process;
Description of status as of March 1, 2008: The September 2007 annual
report contained the first set of ISE performance goals. Performance
management efforts at individual departments and agencies have
incorporated elements of these goals. For example, as reported to the
PM-ISE, 10 of 12 ISE related departments and agencies responding the
Program Manager's request for baseline information reported that they
have established governance bodies specifically to handle information
sharing issues.
Action item: 1.42 Federal departments and agencies will work with the
PM-ISE to develop specific ISE-wide program outcome goals and measures
(performance measures and threshold values), as appropriate, for the
goals listed in Section 1.5. (Planned completion: June 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Not complete but in process;
Description of status as of March 1, 2008: The September 2007 annual
report contained the first set of annual performance goals for the ISE.
Work remains in developing outcome oriented goals and measures for the
ISE. Nevertheless, performance measures, with ISC contributions, were
developed and distributed to agencies for a baseline assessment in
September of 2007. These measure have been further refined for use the
Spring 2008 assessment and are expected to inform the June 2008 Annual
Performance Management Report.
Action item: 1.43 Federal departments and agencies will provide their
mid-year reviews of goals and measures to the PM-ISE (midyear reviews
are required by the Information Sharing Guidelines and Requirements).
(Planned completion: June 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete; (Note: According
to PM-ISE officials, this action item was met by completing the ISE's
initial baseline assessment of goals and measures conducted in Fall
2007.)
Action item: 1.44 The PM-ISE, in coordination with the Office of the
Director of National Intelligence, will illustrate interdependencies
through a "crosswalk" of the ISE, National Intelligence Strategy, and
National Implementation Plan goals and measures. The "crosswalk" will
be completed by or before December 2006. (Planned completion: December
2006);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.45 The PM-ISE and ISC members will develop performance
objectives and measures, in cooperation with state, local, and tribal
and private sector subcommittees, to address progress against the
Guideline 2 framework. (Planned completion: June 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.46 The PM-ISE will support the Office of Management and
Budget, which will provide federal departments and agencies with budget
guidance for fiscal year 2008. (Completed: September 2006);
Status as of July 9, 2007: Complete;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.47 The PM-ISE will work with the Office of Management
and Budget during the fall budget process to review federal
departments' and agencies' investments with ISE priorities and the
Office of Management and Budget will provide additional budget guidance
to departments and agencies, as appropriate. (Planned completion:
December 2006);
Status as of July 9, 2007: Complete;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Action item: 1.48 The PM-ISE, with support from the Office of
Management and Budget and the ISC, will begin planning for subsequent
budget cycles. (Planned completion: March 2007);
Status as of July 9, 2007: Not complete but in process;
Status as of March 1, 2008: Complete;
Description of status as of March 1, 2008: Complete.
Total complete;
Status as of July 9, 2007: 18;
Status as of March 1, 2008: 33;
Description of status as of March 1, 2008: [Empty].
Total not complete;
Status as of July 9, 2007: 30;
Status as of March 1, 2008: 15;
Description of status as of March 1, 2008: [Empty].
Source: GAO analysis based on the Program Manager's reporting.
[End of table]
[End of section]
Appendix II: Comments from Office of the Program Manager for the
Information Sharing Environment:
Office Of The Director Of National Intelligence Program Manager,
Information Sharing Environment:
Washington, DC 20511:
6 June 2008:
Ms. Eileen Larence:
Director, Homeland Security and Justice Issues:
U.S. Government Accountability Office 441 G Street, N.W.:
Washington, DC 20548:
Dear Ms. Larence:
The PM-ISE appreciates the efforts of GAO in developing this assessment
of the Information Sharing Environment, GAO-08-492. We have worked
closely with your very good team throughout this audit and will
continue to make every effort to accommodate the principal GAO
recommendations to (1) "more fully define the scope and results to be
achieved by the ISE and (2) develop a comprehensive set of performance
measures that show the extent to which the ISE has been implemented and
sharing improved."
Your report attempts to present the ISE Implementation Plan (November
2006) actions in summary fashion. I suggest that a more up-to-date
status report on the ISE can be found in the 2008 ISE Annual Report to
Congress (June 2008), which is more current than the data used for this
report. The Office of the PM-ISE has now had three years' experience
working the information sharing problem. We are pioneering, at least
within the Federal Government, in building a true, extensive government-
wide information sharing environment. No one, to my knowledge, has
attempted this before. No one, to my knowledge, knows with certainty
the correct path, or sees a clear end state of the ISE. Indeed, there
is no end state in the true meaning of that term, only a vision.
Of course, many of the principles and practices of program management
cited in this report correctly apply to the ISE. But, I do not need to
emphasize to you that there is no "school solution" to the problem of
information sharing; one size does not fit all; and implementation
plans must be flexible and dynamic to adjust to the unforeseen and the
unintended.
In retrospect, I deem it a PM-ISE responsibility to convey a better
appreciation to GAO for the evolutionary nature of these activities and
for what actually has been accomplished in the two particular areas
cited in this report. However, I also caution that the ISE is not a
traditional "program" as the report describes, and therefore trying to
audit an interagency initiative strictly within program parameters
presents problems. We are not suggesting that the Program Manager or
the Interagency should not be held responsible and accountable for
progress, but rather, that trying to audit the ISE as if it were a
formal "program" with clearly identified resources can distract
decision and policy makers from understanding actual progress, as well
as existing impediments.
Scope of the ISE”"What the ISE is to include":
I would emphasize that the ISE is an evolutionary process that requires
attention to both structure and function. ISE stakeholders have been
involved in the incremental development of processes, protocols and
technology standards that have been documented in a series of
publications -- key aspects of which are summarized here to facilitate
the task of communicating a better understanding of the full scope and
purpose of the ISE. These include the foundations, vision, and purpose
for the ISE, as well as a description of the framework and the process
invoked to build the ISE.
Foundations: The foundations of the ISE were set forth in the
President's information sharing guidelines and requirements, refined in
the ISE Implementation Plan (IP), and fully synthesized in the National
Strategy for Information Sharing (NSIS). The President's guidelines
described ISE capabilities in terms of interrelated policies, business
processes, standards, and systems, which together constitute the
sharing environment envisioned in the Intelligence Reform and Terrorism
Prevention Act (IRTPA) and the NSIS. The NSIS recognizes progress made
in information sharing to date and describes the Administration's
"expectations and plans for achieving improvements in the gathering and
sharing of information related to terrorism." It also reaffirmed the
vision, goals, and strategies embodied in the ISE Implementation Plan,
while acknowledging that today's sharing environment serves as a
platform from which to continuously improve the sharing of terrorism-
related information among all levels of government, the private sector,
and foreign partners.
Vision: The critical question addressed by PM-ISE in developing the
future ISE was how best to deliver this vision of the environment”of "a
trusted partnership between all levels of government in the United
States, the private sector, and our foreign partners, to detect,
prevent, disrupt, preempt, and mitigate the effects of terrorism
against the territory, people, and interests of the United States of
America by the effective and efficient sharing of terrorism
information." The challenge lay in reconciling myriad policy, process
and technology differences among multiple organizations tasked to
perform a variety of disparate missions. These differences posed real
impediments to ISE success, including conflicting or incompatible
policies, processes, and procedures for information classification,
access vetting, security and privacy; incompatible or non-interoperable
legacy systems and data formats; conflicting approaches to information
sharing; and conflicting management structures for overseeing
information sharing partners. With these challenges in mind, PM-ISE, in
consultation with the Information Sharing Council, has pursued the
following clearly defined purpose for the ISE.
Purpose: The purpose of the ISE is to rationalize, standardize, and
simples the policies, business processes, standards, and systems used
to share information. Although the ISE strives to achieve as much
uniformity as possible, actual implementation varies from community to
community due to disparate mission needs and the immediate capabilities
of each. By way of example, State and local processes and policies will
not be identical to those of the Federal Government; nor will the needs
of most cities be the same as those of major urban areas. Accordingly,
rather than striving to develop identical implementation across the
ISE, the intent has consistently focused on being able to achieve the
best possible capabilities”based on a common framework supplemented by
mutually agreed, mostly common policies, business processes, standards,
and systems”but flexibly tailored to diverse ISE participant
requirements.
Requirements:
In an evolutionary process without a fixed end point, policies,
business processes, standards, and systems all have to be regularly
reviewed and refreshed”through discrete phases or maturity levels”from
"ad hoc" to "managed" to "defined," and ultimately, to "optimized." The
current state of the ISE is that it is moving from "managed" to
"defined" as a result of the significant steps taken to break down
barriers and improve sharing practices in selected critical areas. To
reach the "optimized" phase, organizational cultures must progress to a
point where sharing is fully institutionalized and ingrained into all
aspects of day-to-day operations.
The ISE Implementation Plan (which formed the basis for the majority of
the GAO conclusions and recommendations in this report), is a
particularly useful document that accomplished its intended purpose”to
prepare the effort of building the ISE. The ISE Implementation Plan was
not intended, however, to control every step made in furtherance of the
ISE. It was a plan to implement a vision, not to complete a program.
What made sense in the 2006 plan requires reassessment and modification
at each juncture in the development process. That plan was developed in
response to a number of drivers. Among them was the need:
* to further define and scope the ISE;
* to identify a course of action that was timely and strategically
responsive to Congress (IRTPA) and the President (Guidelines and
Requirements);
* to meet immediate, tactical requirements of ISE participants –
federal, state, local, tribal governments, the private sector, and
foreign allies and partners;
Creating the ISE defined by Congress”an "approach that facilitates the
sharing of terrorism information "”required the PM-ISE to establish a
plan to incrementally examine the full range of available, but
evolving, technology, policy and governance structures, and the
dimensions of structural transformation. Absent any specific ownership
of the information sharing problem – it requires highly decentralized
systems and networks capable of serving the full range of ISE
stakeholders with the equities of each taken into account.
Performance Measures – what has been achieved:
Progress in implementing the ISE is a function of four steps: (1)
identifying, prioritizing, and measuring continuous improvements to ISE
capabilities by modifying processes or creating new ones; (2) issuing
guidance and standards to ISE participants; (3) providing demonstrable
evidence of the effects of these changes through selected information
sharing pilots and evaluation environments; and (4) incorporating these
improvements into established government resource management processes.
The following paragraphs describe how ISE progress is being measured
and how it influences department and agency investment strategies.
PM-ISE introduced a performance management approach in the 2007 Annual
Report to Congress to systematically assess ISE implementation,
identify improvement opportunities, comply with applicable mandates,
and bolster long-term, sustainable performance management. This
approach aligns ISE performance measurement areas to each of the 2008
Performance Goals, which in turn are aligned to the four ISE functional
areas presented in the 2008 Annual Report. PM-ISE developed 2008
Performance Goals for each of the functional areas to articulate the
expected results of ISE implementation, and established measurement
areas, including a suite of both current and planned measures, to
demonstrate progress for each of the Performance Goals. Using that
approach and the performance measures, PM-ISE established an ISE
baseline of performance in fall 2007, and measured agencies' progress
against this baseline through an assessment performed in spring 2008.
The result provided better insight into how the ISE fared in response
to the 2008 Performance Goals. Performance goals for 2009 have also
been revised to ensure alignment with relevant ISE IP and NSIS themes.
For the first time, the fall 2007 and spring 2008 performance
assessments provided the PM-ISE with fact-based data to support
decisions and report ISE implementation progress against the
information sharing mandates of IRTPA, the 9/11 Commission Act, the
President's Guidelines and Requirements, and the NSIS. The
comprehensive set of performance measures required to assess ISE
implementation as well as improvements in the state of information
sharing were developed in conjunction with ISE stakeholders. The 2008
ISE Performance Goals reflect corresponding ISE functional areas and
provide the target levels of performance against which actual
achievement can be compared. These performance measures are now being
applied successfully; each is reported more fully in the 2008 Annual
Report to Congress.
Conclusion:
There is mention in the report that one of the challenges of the ISE is
interagency attention and priority to ISE initiatives. However, there
is no accompanying recommendation that, as the President clearly
delineated in his December 2005 Guidelines and Requirements Memorandum
(addressed directly to "Heads of Executive Branch Departments and
Agencies), and then re-emphasized in his October 2007 NSIS, that such
"heads of executive departments and agencies must actively work to
create a culture of information sharing within their respective
departments or agencies by assigning personnel and dedicating resources
to terrorism information sharing, by reducing disincentives to such
sharing, and by holding their senior managers and officials accountable
for improved and increased sharing of such information." Agencies and
their leaders must be evaluated and held directly accountable for ISE
progress and they must put effective information sharing strategies and
programs in place within their agencies.
The ISE is a government-wide transformational effort that needs to be
evaluated as such. It must not be looked at as simply a project or
program of the PM-ISE. This is not to say that programmatic evaluations
are not useful, helpful, and necessary in a broader evaluation of the
ISE effort; they are. But they are not sufficient.
We appreciate the opportunity to work with you on this assessment and
look forward to a continued dialog.
Sincerely,
Signed by:
Thomas E. McNamara:
[End of section]
Appendix III: GAO Contacts and Acknowledgments:
GAO Contacts:
Eileen R. Larence (202) 512-8777 or larencee@gao.gov, or David A.
Powner at 202-512-9286 or pownerd@gao.gov:
Acknowledgments:
In addition to the contact named above, Susan H. Quinlan, Assistant
Director; Richard Ascarate; Jason Barnosky; Amy Bernstein; Joseph Cruz;
Thomas Lombardi; Lori Martinez; and Marcia Washington made key
contributions to this report.
[End of section]
Footnotes:
[1] These actions included issuance of the National Strategy for
Homeland Security, the National Strategy to Secure Cyberspace and the
National Strategy for the Physical Protection of Critical
Infrastructures and Key Assets; issuance of Homeland Security
Presidential Directives 6 and 7, calling, respectively, for the
consolidation of the government's approach to terrorism screening and a
national policy for identifying and prioritizing critical
infrastructures and key resources and protecting them from terrorist
attacks, among other things; and the enactment of legislation calling
for, among other things, efforts to facilitate the sharing of terrorism-
related information. See Intelligence Reform and Terrorism Prevention
Act of 2004 (Intelligence Reform Act), Pub. L. No. 108-458, 118 Stat.
3638; Homeland Security Act of 2002, Pub. L. No. 107-296, 116 Stat.
2135.
[2] See Pub. L. No. 108-458, § 1016 Stat. at 3664-70, amended by
Implementing Recommendations of the 9/11 Commission Act of 2007 (9/11
Commission Act), Pub. L. No. 110-53, § 504, 121 Stat. 266, 313-17. See
also Pub. L. No. 107-296, § 892, 116 Stat. at 2253-54 (requiring the
establishment of procedures for the sharing of homeland security
information, as defined by this section).
[3] GAO, High Risk Series: An Update, GAO-05-207 (Washington, D.C.:
January 2005).
[4] GAO, Information Sharing: The Federal Government Needs to Establish
Policies and Processes for Sharing Terrorism-Related and Sensitive but
Unclassified Information, GAO-06-385 (Washington, D.C.: Mar. 17, 2006).
[5] GAO, Suggested Areas for Oversight for the 110th Congress, GAO-07-
235R (Washington, D.C.: Nov. 17, 2006).
[6] Pub. L. No. 103-62, 107 Stat. 285 (1993).
[7] Office of Management and Budget, Circular A-11, Preparation,
Submission, and Execution of the Budget (July 2007) and Circular A-130,
Management of Federal Information Resources (Nov. 28, 2000).
[8] See for example, GAO, Results-Oriented Government: GPRA Has
Established a Solid Foundation for Achieving Greater Results, GAO-04-38
(Washington, D.C.: Mar. 10, 2004); GAO, Executive Guide: Effectively
Implementing the Government Performance and Results Act, GAO/GGD-96-118
(Washington, D.C.: June 1996); GAO, Agency Performance Plans: Examples
of Practices That Can Improve Usefulness to Decisionmakers, GAO/GGD/
AIMD-99-69 (Washington, D.C.: Feb. 26, 1999); GAO, Results-Oriented
Government: Practices That Can Help Enhance and Sustain Collaboration
among Federal Agencies, GAO-06-15 (Washington, D.C.: October 2005);
GAO, Information Technology: Foundational Steps Being Taken to Make
Needed FBI Systems Modernization Management Improvements, GAO-04-842
(Washington, D.C. Sept. 10, 2004); GAO, Homeland Security: US-VISIT
Program Faces Operational, Technological, and Management Challenges,
GAO-07-632T (Washington, D.C. Mar. 20, 2007); and GAO, Information
Technology Management: Governmentwide Strategic Planning, Performance
Measurement, and Investment Management Can Be Further Improved, GAO-04-
49 (Washington, D.C. Jan. 12, 2004).
[9] The Project Management Institute, The Standard for Program
Management© (2006).
[10] CMMI is registered with the U.S. Patent and Trademark Office by
Carnegie Mellon University.
[11] See Pub. L. No. 108-458, § 1016, 118 Stat. at 3664-70, amended by
Pub. L. No. 110-53, § 504, 121 Stat. at 313-17. The term "terrorism-
related information" encompasses the definitions of "terrorism
information," "homeland security information," and "weapons of mass
destruction information" in accordance with the Intelligence Reform
Act, as amended, as well as law enforcement information relating to
terrorism or the security of the homeland, in accordance with the ISE
Implementation Plan.
[12] See Pub. L. No. 108-458, § 1016(e), 118 Stat. at 3666-67. The
Program Manager issued the ISE Implementation Plan in November 2006
and, as such, the contents of the Plan may not fully reflect amendments
made by the 9/11 Commission Act. For example, whereas before the
amendments the ISE focused on the sharing of "terrorism information" as
defined in the Act, the ISE now explicitly encompasses "homeland
security information," as defined by the Homeland Security Act, as well
as terrorism information, which now includes "weapons of mass
destruction information," as defined by the 9/11 Commission Act.
[13] See Presidential Memorandum, Memorandum from the President for the
Heads of Executive Departments and Agencies, Subject: Guidelines and
Requirements in Support of the Information Sharing Environment (ISE)
(Dec. 16, 2005).
[14] Sensitive but unclassified information encompasses a large but
unquantifiable amount of information--for example, security plans for
federal agency buildings--that does not meet the standards established
by executive order for classified national security information but
that an agency nonetheless considers sufficiently sensitive to warrant
safeguarding and restricted dissemination.
[15] GAO, Information Sharing: The Federal Government Needs to
Establish Policies and Processes For Sharing Terrorism-Related and
Sensitive but Unclassified (SBU) Information, GAO-06-385 (Washington,
D.C.: Mar. 17, 2006).
[16] GAO, Homeland Security: Federal Efforts Are Helping Alleviate Some
Challenges Encountered by State and Local Fusion Centers, GAO-08-35
(Washington, D.C.: Oct. 30, 2007).
[17] Under the Intelligence Reform Act, the intelligence community was
reorganized under a Director of National Intelligence who oversees the
17 departments and agencies that make up the intelligence community.
The intelligence community is one of the 5 communities of interest for
the ISE and the Director of National Intelligence is a member of the
ISC.
[18] GAO, Information Technology: Terrorist Watch Lists Should be
Consolidated to Promote Better Integration and Sharing. GAO-03-322
(Washington, D.C.: Apr. 15, 2003).
[19] GAO, Terrorist Watch List Screening: Opportunities Exist to
Enhance Management Oversight, Reduce Vulnerabilities in Agency
Screening Processes, and Expand Use of the List. GAO-08-110
(Washington, DC.: Oct. 11, 2007) and U.S. Department of Justice Office
of the Inspector General, Follow-Up Audit of the Terrorist Screening
Center, Audit Report 07-41 (September 2007).
[20] Program Manager, Information Sharing Environment, Information
Sharing Environment Implementation Plan (Washington, D.C.: November
2006). As noted earlier, the Program Manager issued the Implementation
Plan before the 9/11 Commission Act amendments that expressly broadened
the scope of information to be shared within the ISE.
[21] Program Manager, Information Sharing Environment, Information
Sharing Environment Implementation Plan.
[22] The White House, National Strategy For Information Sharing:
Successes and Challenges in Improving Terrorism-Related Information
Sharing. (Washington, D.C.: Oct. 31, 2007).
[23] In describing outcomes and output measures, OMB guidance notes the
following: Outcomes describe the intended result of carrying out a
program or activity. They define an event or condition that is external
to the program or activity and that is of direct importance to the
intended beneficiaries and/or the public. For a tornado warning system,
an outcome measure could be the number of lives saved and property
damage averted. In contrast, an output measure is one that describes
the level of activity that will be provided over a period of time,
including a description of the characteristics (e.g., timeliness)
established as standards for the activity. Outputs refer to the
internal activities of a program (i.e., the products and services
delivered). For example, an output could be the percentage of warnings
that occur more than 20 minutes before a tornado forms. While
performance measures must distinguish between outcomes and outputs,
there must be a reasonable connection between them, with outputs
supporting (i.e., leading to) outcomes in a logical fashion. According
to OMB, outcome measures are the most informative measures about
performance because they are the ultimate results of a program that
benefit the public.
[24] See, for example, GAO, Results-Oriented Government: GPRA Has
Established a Solid Foundation for Achieving Greater Results, GAO-04-38
(Washington, D.C.: Mar. 10, 2004); GAO, Executive Guide: Effectively
Implementing the Government Performance and Results Act, GAO/GGD-96-118
(Washington, D.C.: June 1996); Office of Management and Budget,
Circular A-11, Preparation, Submission, and Execution of the Budget
(July 2007); and The Project Management Institute, The Standard for
Program Management© (2006).
[25] Performance goals are comprised of performance measures, with
targets and time frames, which serve as an indicator to gauge program
performance against the goals.
[26] Generally speaking, an enterprise architecture is to connect an
organization's strategic plan with program and system solution
implementations by providing the details needed to guide investments in
a consistent, coordinated, and integrated fashion. An enterprise
architecture is intended to provide a clear and comprehensive picture
of an entity, whether it is an organization (e.g., federal department)
or a functional or mission area that cuts across more than one
organization (e.g., homeland security). This picture is to consist of
snapshots of both the enterprise's current or "As Is" operational and
technological environment and its target or "To Be" environment, as
well as a capital investment road map for transitioning from the
current to the target environment.
[27] Performance goals are comprised of performance measures, with
targets and time frames, which serve as indicators to gauge program
performance against the goals.
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "E-mail Updates."
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office:
441 G Street NW, Room LM:
Washington, D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Ralph Dawn, Managing Director, dawnr@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, D.C. 20548:
Public Affairs:
Chuck Young, Managing Director, youngc1@gao.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, D.C. 20548: