Department of Homeland Security

Assessments of Selected Complex Acquisitions Gao ID: GAO-10-588SP June 30, 2010

Department of Homeland Security (DHS) acquisitions represent hundreds of billions of dollars in life-cycle costs to support a wide range of missions. Creating acquisition policies and processes to provide insight into the performance of a wide array of complex investments, while also providing oversight for many component agencies new to acquisition management, has been an ongoing challenge for DHS. GAO performed this review because DHS implementation and transformation is on GAO's high risk list. This report (1) provides an update on DHS's efforts to implement acquisition oversight for all investments; (2) describes acquisition performance and common challenges across selected programs; and (3) provides individual profiles for 18 selected programs, 15 of which were major programs that had initiated acquisition activities. GAO selected programs based on relevance to frontline homeland security missions and assessed cost and schedule performance and acquisition planning challenges.

DHS continues to develop its acquisition oversight function and has begun to implement a revised acquisition management directive that includes more detailed guidance for programs to use when informing component and departmental decision making. The senior-level Acquisition Review Board (ARB) has begun to meet more frequently and has provided programs decision memorandums with action items to improve performance. The ARB reviewed 24 major acquisition programs in fiscal years 2008 and 2009; however, more than 40 major acquisition programs had not been reviewed, and programs have not consistently implemented review action items by established deadlines. Additionally, DHS has developed a database to capture and track key program information, including cost and schedule performance, contract awards, and program risks. At the component level, oversight officials are establishing new acquisition executive positions to manage acquisition processes, but departmental leadership has limited their decision authority due to staffing levels and inconsistencies between component- and department-level acquisition policies. Further, DHS acquisition management processes do not inform budget decisions as required by DHS policy, and as a result DHS is at risk of failing to maximize resources and ultimately meet critical mission needs. GAO has found that program performance metrics for cost and schedule can provide useful indicators of the health of acquisition programs and can be valuable tools for improving insight and oversight of programs. Further, realistic program baselines with stable requirements, an adequate and skilled program office workforce, and knowledge of long-term support requirements are important factors to successful acquisitions. However, program performance cannot be accurately assessed without valid baseline requirements established at the program start, particularly those that establish the minimum acceptable threshold required to satisfy user needs. Using the best available information, GAO found that of the 15 major programs that had started acquisition activities, 12 reported cost growth, and almost all programs reported schedule delays. DHS policy requires acquisition oversight officials to assess the accuracy of life-cycle cost estimates for all major programs estimated to exceed $1 billion and provides guidance for programs to develop life-cycle cost estimates. The responsible DHS acquisition oversight officials have raised concerns about the accuracy of cost estimates for most major programs, making it difficult to assess the significance of the reported cost growth. Further, over half of the programs GAO reviewed initiated acquisition activities without approved key planning documents that set operational requirements and establish program baselines. Programs also experienced other acquisition planning challenges, such as staffing shortages, and lack of sustainment planning, as well as execution challenges related to technical capability, partner dependence, and funding issues. DHS's success in improving acquisition depends on further implementation of needed improvements and sustained management attention. GAO is not making any new recommendations as this is intended as a status report. However, GAO has previously made numerous recommendations intended to improve acquisition management. DHS generally agreed with the findings and noted actions taken and efforts under way to improve the Department's acquisition review process.



GAO-10-588SP, Department of Homeland Security: Assessments of Selected Complex Acquisitions This is the accessible text file for GAO report number GAO-10-588SP entitled 'Department Of Homeland Security: Assessments of Selected Complex Acquisitions' which was released on July 1, 2010. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Addressees: United States Government Accountability Office: GAO: June 2010: Department Of Homeland Security: Assessments of Selected Complex Acquisitions: GAO-10-588SP: GAO Highlights: Highlights of GAO-10-588SP, a report to congressional addressees. Why GAO Did This Study: Department of Homeland Security (DHS) acquisitions represent hundreds of billions of dollars in life-cycle costs to support a wide range of missions. Creating acquisition policies and processes to provide insight into the performance of a wide array of complex investments, while also providing oversight for many component agencies new to acquisition management, has been an ongoing challenge for DHS. GAO performed this review because DHS implementation and transformation is on GAO‘s high risk list. This report (1) provides an update on DHS‘s efforts to implement acquisition oversight for all investments; (2) describes acquisition performance and common challenges across selected programs; and (3) provides individual profiles for 18 selected programs, 15 of which were major programs that had initiated acquisition activities. GAO selected programs based on relevance to frontline homeland security missions and assessed cost and schedule performance and acquisition planning challenges. What GAO Found: DHS continues to develop its acquisition oversight function and has begun to implement a revised acquisition management directive that includes more detailed guidance for programs to use when informing component and departmental decision making. The senior-level Acquisition Review Board (ARB) has begun to meet more frequently and has provided programs decision memorandums with action items to improve performance. The ARB reviewed 24 major acquisition programs in fiscal years 2008 and 2009; however, more than 40 major acquisition programs had not been reviewed, and programs have not consistently implemented review action items by established deadlines. Additionally, DHS has developed a database to capture and track key program information, including cost and schedule performance, contract awards, and program risks. At the component level, oversight officials are establishing new acquisition executive positions to manage acquisition processes, but departmental leadership has limited their decision authority due to staffing levels and inconsistencies between component- and department-level acquisition policies. Further, DHS acquisition management processes do not inform budget decisions as required by DHS policy, and as a result DHS is at risk of failing to maximize resources and ultimately meet critical mission needs. GAO has found that program performance metrics for cost and schedule can provide useful indicators of the health of acquisition programs and can be valuable tools for improving insight and oversight of programs. Further, realistic program baselines with stable requirements, an adequate and skilled program office workforce, and knowledge of long-term support requirements are important factors to successful acquisitions. However, program performance cannot be accurately assessed without valid baseline requirements established at the program start, particularly those that establish the minimum acceptable threshold required to satisfy user needs. Using the best available information, GAO found that of the 15 major programs that had started acquisition activities, 12 reported cost growth, and almost all programs reported schedule delays. DHS policy requires acquisition oversight officials to assess the accuracy of life-cycle cost estimates for all major programs estimated to exceed $1 billion and provides guidance for programs to develop life-cycle cost estimates. The responsible DHS acquisition oversight officials have raised concerns about the accuracy of cost estimates for most major programs, making it difficult to assess the significance of the reported cost growth. Further, over half of the programs GAO reviewed initiated acquisition activities without approved key planning documents that set operational requirements and establish program baselines. Programs also experienced other acquisition planning challenges, such as staffing shortages, and lack of sustainment planning, as well as execution challenges related to technical capability, partner dependence, and funding issues. DHS‘s success in improving acquisition depends on further implementation of needed improvements and sustained management attention. What GAO Recommends: GAO is not making any new recommendations as this is intended as a status report. However, GAO has previously made numerous recommendations intended to improve acquisition management. DHS generally agreed with the findings and noted actions taken and efforts under way to improve the Department‘s acquisition review process. View [hyperlink, http://www.gao.gov/products/GAO-10-588SP] or key components. For more information, contact John P. Hutton at (202) 512- 4841 or huttonj@gao.gov. [End of section] Contents: Forward: Letter: DHS Continues To Develop and Implement Acquisition Oversight: Acquisition Performance and Program Challenges: Program Assessments: Agency Comments and Our Evaluation: Appendix I: Objectives, Scope and Methodology: Appendix II: Comments From The Department Of Homeland Security: Appendix III: The Acquisition Life Cycle, Systems Engineering Life Cycle and Key Acquisition Documents at DHS: Related GAO Products: Tables: Table 1: DHS Oversight Officials' Roles and Responsibilities: Table 2: Comparison of Department and Component-Level Review under Acquisition Management Directive 102-01 (Interim) and Management Directive 1400: Table 3: Acquisition Decision Memo Action Items (fiscal years 2008 and 2009): Table 4: DHS Major Acquisition Program Costs: Table 5: Summary of Major Program Planning Challenges: Table 6: Status of Integrated Logistics Support Plans (ILSP): Figures: Figure 1: Summary of DHS Acquisition Programs Assessed: Figure 2: Programs with Estimated Schedule Delay to Full Capability: Figure 3: Key Document Approval Timeframes: Figure 4: DHS Major Program Government Staff and Contractor Support: Abbreviations: APB: Acquisition Program Baseline: ARB: Acquisition Review Board: C4ISR: Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance: CAE: Component Acquisition Executive: CBP: Customs and Border Protection: CDC: Centers for Disease Control: DCI: Data Collection Instrument: DHS: Department of Homeland Security: DOD:; Department of Defense: EDS: Explosive Detection System: FBI: Federal Bureau of Investigations: FDA: Food and Drug Administration: FEMA: Federal Emergency Management Agency: FOC: Full Operating Capability: ILSP: Integrated Logistics Support Plans: IOC: Initial Operating Capability: NASA: National Aeronautics and Space Administration: OMB: Office of Management and Budget: SBInet: Secure Border Initiative Network: TSA: Transportation Security Administration: USDA: United States Department of Agriculture: US-VISIT: United States Visitor and Immigrant Status Indicator Technology: [End of section] United States Government Accountability Office: Washington, DC 20548: June 30, 2010: Congressional Addressees: I am pleased to present GAO's assessment of complex acquisitions at the Department of Homeland Security (DHS). This report provides a snapshot of DHS acquisition oversight, planning, and execution--a topic that has been of interest since DHS was created in 2003. Soon after DHS began operations, we designated its implementation and transformation as a high-risk area due to the enormous management challenge of integrating 22 disparate agencies, and the size, complexity, and importance of the effort to the nation's security. [Footnote 1] Our prior work has highlighted the issues DHS has faced in designing and implementing the necessary management structure and processes to support some of the broadest and most complex needs among federal agencies. Critical issues include the need for sound acquisition planning to reduce program management challenges that lead to cost and schedule growth, and the department's need to integrate acquisition review and budgeting for major investments. In order to accomplish a wide range of frontline homeland security missions, as well as provide management information capabilities, DHS's acquisition spending has increased by 66 percent--from $8.5 billion in fiscal year 2004 to $14.2 billion in fiscal year 2009[Footnote 2]--and its portfolio of complex acquisitions continues to expand. While DHS has made recent progress in clarifying acquisition oversight processes, much remains to be done to ensure proper implementation and department wide coordination. In a time of fiscal constraints, it is increasingly important that DHS's acquisitions maximize resources to effectively meet critical homeland security missions. Signed by: Gene L. Dodaro: Acting Comptroller General of the United States: [End of section] United States Government Accountability Office: Washington, DC 20548: June 30, 2010: Congressional Addressees: In fiscal year 2009, the Department of Homeland Security (DHS) had 67 major acquisitions intended to support a wide range of missions including securing our borders, mitigating natural disasters, and investigating security threats. Our work on major acquisitions at other federal departments and agencies has provided a framework for assessing DHS's acquisitions.[Footnote 3] We have found that a program must have a sound business case that includes firm requirements, a knowledge-based acquisition strategy, and realistic cost estimates in order to reduce program challenges.[Footnote 4] Further, we have found that acquisition oversight is more effective when regular reviews are held, an adequate workforce has been developed, and reliable cost, schedule and performance metrics are available.[Footnote 5] These conditions provide a program a reasonable chance of meeting its challenges yet delivering on time and within budget. The department's acquisitions, representing hundreds of billions of dollars in life-cycle costs, are managed by 12 components and offices through a structure of dual accountability. While the Undersecretary for Management serves as the Chief Acquisition Officer and bears responsibility for acquisition policy, the component heads bear responsibility for individual programs designed to achieve mission specific goals and objectives. Many of the 67 major acquisition programs existed prior to the creation of DHS and were managed by 1 of the 22 separate agencies that merged to form the department. Creating acquisition policies and processes to provide insight into the performance of a wide array of complex acquisitions, while also providing oversight for many component agencies new to acquisition management, has been an ongoing need. Our work over the past several years has consistently pointed to the challenges involved in effectively managing and overseeing this large and varied acquisition portfolio to meet performance expectations. We have raised these concerns in the context of our work on the department's acquisition oversight and in assessments of specific acquisitions across various components. We have reported that DHS's implementation of its investment review process generally resulted in investment decisions that were inconsistent with established policy and oversight, and weaknesses in some component management practices further compounded the problem. [Footnote 6] The department has not always reviewed its major investments at key phases in the acquisition life cycle, employed reliable cost and schedule estimating practices, or used effective requirements development and test management practices. These management weaknesses have led to major programs aimed at delivering important mission capabilities not living up to expectations.[Footnote 7] For example, we reported that the Rescue 21 program did not follow established processes for managing requirements which contributed to deployment delays and limited the Coast Guard's ability to conduct search and rescue missions.[Footnote 8] U.S. Visitor and Immigrant Status Indicator Technology (US-VISIT) did not sufficiently define what capabilities and benefits would be delivered, by when, and at what cost, which contributed to development and deployment delays. [Footnote 9] Secure Border Initiative Network (SBInet) did not adequately define requirements, perform testing, or oversee contractors, delaying security of the southwest border.[Footnote 10] The department has acknowledged many of these issues and is making efforts to address them at the departmental and program levels. Because DHS relies on its complex acquisitions to fulfill critical homeland security missions, we assessed the department's oversight and implementation of complex acquisitions. This report (1) provides an update on the department's efforts to implement acquisition oversight for all acquisitions; (2) describes acquisition performance and common challenges across selected programs; and (3) provides individual profiles for each of the selected programs. To provide an update on acquisition oversight, we assessed the department's efforts to implement its interim acquisition management directive. We reviewed the department's acquisition management directives, acquisition decision memorandums, and key program tracking documents, and we interviewed departmental acquisition oversight officials. At the component level, we interviewed acquisition officials at the six components in our review--Customs and Border Protection, Federal Emergency Management Agency, National Protection and Programs Directorate, Office of Health Affairs, Transportation Security Administration, and the United States Coast Guard--about their policies and practices, staffing, departmental coordination, and relevant challenges. We did not, however, specifically assess the extent to which the department's acquisition guidance is consistent with best practices.[Footnote 11] To assess the implementation of complex acquisitions, we focused on acquisition planning. We selected 18 programs across six components-- 16 major acquisition programs, as well as 2 smaller programs critical to DHS's mission based on several factors, including total projected funding for fiscal years 2007 through 2012, current stage in the DHS acquisition life cycle, and relevance to front-line homeland security missions. The 18 programs selected represent about $100 billion in life-cycle costs and about $38 billion in acquisition costs. We developed a data collection instrument to obtain key data on program cost, schedule, performance, and staffing, for the selected programs, and we reviewed it with program offices to clarify data requested in advance of completion. We also researched cost data reported in the Office of Management and Budget's (OMB) Exhibit 300 as part of the executive branch capital planning process and Coast Guard's Quarterly Acquisition Reports to Congress. We based our analysis on these sources as they represented more complete and official data used for making important planning and budgeting decisions. We interviewed officials from the 18 program offices to learn more about acquisition performance and program challenges. We also reviewed relevant GAO and DHS Inspector General reports on the selected acquisitions. The analysis of acquisition performance and common challenges across the selected programs focuses on 15 programs for which data were available.[Footnote 12] The profiles of the selected programs include all 18 programs selected for our review. All data were current as of 2009, with the exception of latest estimates of program costs obtained from OMB Exhibits 300, which were current as of either January or February 2010. We assessed program data using criteria based on best practices established in prior work on major acquisitions. We have frequently reported on the importance of using a solid, executable business case before committing resources to a new acquisition. Our body of work on best practices has shown that a sound business case is one that provides demonstrated evidence that (1) needs are valid and can best be met with the chosen concept; and (2) the chosen concept can be developed and produced within existing resources. If a valid business case is not established by the start of an acquisition program, then requirements are likely to change, which can lead to significant cost increases and schedule delays as the government and contractor gain a better understanding of requirements. Program cost, schedule, and performance, and changes in these factors over time can provide useful indicators of the health of acquisition programs. When assessed regularly for changes and the reasons that cause changes, such indicators can be valuable tools for improving insight and oversight of individual programs as well as total portfolio of major acquisitions.[Footnote 13] However, performance metrics are of little value without knowledge-based, realistic program baselines, which are critical to acquisition programs achieving goals. Without realistic baselines established at the start of a program, there is no foundation for accurately measuring the knowledge and health of programs. We conducted our work from March 2009 to June 2010 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. See appendix I for additional information on our scope and methodology. We do not make recommendations in this report; however, we have previously made numerous recommendations intended to improve the department's acquisition management and oversight, and DHS is taking steps to address them. We provided a draft of this report to DHS for review and comment. DHS generally concurred with our findings citing the review of actions taken and efforts under way to improve the acquisition review process, particularly the development and implementation of the department's acquisition management directive. The department's comments are reprinted in appendix II. DHS also provided technical comments which we incorporated as appropriate and where supporting documentation was provided. DHS Continues To Develop and Implement Acquisition Oversight: DHS continues to develop its acquisition oversight function and has produced and begun to implement a revised acquisition management directive. As part of the implementation process, the senior-level Acquisition Review Board (ARB) has begun to meet more frequently and has provided decision memorandums with action items to improve program performance. The ARB reviewed 24 major acquisition programs in fiscal years 2008 and 2009; however, more than 40 major acquisition programs had not been reviewed, and programs have not consistently implemented review action items by established deadlines. The acquisition oversight office has created a tracking system to monitor key program information for all acquisitions. At the component level, acquisition oversight offices have begun to update policies and staff capacity needed to oversee program activities. While these efforts are positive steps toward improving acquisition management and oversight, the department has not yet established a departmentwide requirements oversight body for all acquisitions or integrated the acquisition review and budget processes as required by DHS policy. As a result, DHS is at risk of failing to maximize resources and ultimately meet critical mission needs. DHS's success in improving acquisition depends on further implementation and sustained management attention. Acquisition Management Directive: In 2008, we reported that DHS had not effectively implemented its investment review process, and as a result, the department had not provided the oversight needed to identify and address cost, schedule, and performance problems for its major acquisitions.[Footnote 14] Since the time of that review, DHS has established a revised oversight process and begun to implement an interim acquisition management directive and an accompanying guidebook explaining how the department should meet the directive's requirements.[Footnote 15] The interim directive includes more detailed guidance than the previous 2006 management directive for programs to use in preparing key documentation to support component and departmental decision making. For example, the interim directive, in effect at the time we reviewed the selected acquisitions, establishes four acquisition life-cycle phases: (1) identify a capability need; (2) analyze and select the means to provide that capability; (3) obtain the capability; and (4) produce, deploy and support the capability. The directive requires ARB review of each major acquisition program at least three times at key acquisition decision events during a program's acquisition life cycle. Table 1 describes the roles and responsibilities of the entities involved in the review process. Table 1: DHS Oversight Officials' Roles and Responsibilities: Officials: Acquisition Review Board members; Roles: Officials that comprise the departmental executive board that reviews major acquisition programs; The chair of the Board is the Acquisition Decision Authority; individual authority differs depending on the level of the acquisition; Members include the Under Secretary for Management, Assistant Secretary for Policy, General Counsel, Chief Financial Officer, Chief Procurement Officer, Chief Information Officer, Chief Administrative Officer, Chief Security Officer, Director of Operational Test and Evaluation, and user representatives from components sponsoring the capability, and other representatives as appropriate; Responsibilities: Review Level 1 and Level 2 acquisitions for executable business strategy, resources, management, accountability, and alignment to strategic initiatives. Support the Acquisition Decision Authority as it reviews acquisitions to ensure compliance with Acquisition Management Directive AD 102-01, and approves acquisitions to proceed to their next acquisition life-cycle phases upon satisfaction of applicable criteria. Officials: Chief Acquisition Officer; Roles: Normally serves as the Acquisition Decision Authority for Level 1 and Level 2 acquisitions (see table 2); Designates the Component Acquisition Executives; Responsibilities: Management, administration, and oversight of the department's acquisition policies and procedures. Officials: Director of the Acquisition Program Management Division, Office of the Chief Procurement Officer; Roles: Serves as the DHS executive agent and coordinator for the acquisition review process and as the executive secretary of the Acquisition Review Board; Responsibilities: Developing and maintaining acquisition policy, procedures, and guidance; providing support and assistance to department acquisition and acquisition personnel. Officials: Director of the Cost Analysis Division, Office of the Chief Procurement Officer; Roles: Serves as the focal point within DHS for policy, process, and procedures regarding acquisition cost estimating and analysis; Responsibilities: Assessing life-cycle cost estimates for Level 1 acquisitions, assisting acquisition management offices by providing guidance and support regarding data sources, methodology, modeling, and documentation. Officials: Component Head; Roles: The highest ranking individual within a component, nominates the Component Acquisition Executive; Responsibilities: Oversees acquisition within the component in accordance with DHS acquisition policies and procedures, and ensures sound management, review, support, approval, and oversight of all types of acquisitions within the component. Officials: Component Acquisition Executive; Roles: Nominated by the component head and designated by the Chief Acquisition Officer, the senior acquisition official within a component; Responsibilities: Establishing acquisition processes within the component; managing the component's acquisition portfolio; and serving as the Acquisition Decision Authority for Level 3 acquisitions, and Level 2 acquisitions if assigned by the Chief Acquisition Officer (see table 2). Source: GAO presentation of Department of Homeland Security Acquisition Management Directive AD 102-01, interim version, and Acquisition Instruction/Guidebook 102-01-001, interim version. [End of table] ARB reviews provide an opportunity to determine a program's readiness to proceed to the following life-cycle phase. The directive also requires the ARB chairperson to approve key acquisition documents critical to establishing a program's business case, operational requirements, acquisition baseline, and document testing and support plans. See appendix III for the four phases of the acquisition life cycle, related acquisition decision events, and key acquisition documents, such as the Mission Need Statement, Operational Requirements Document and Acquisition Program Baseline. The directive also changes the basis for program reviews from total acquisition costs to total life-cycle costs and assigns specific oversight responsibilities to the DHS components based on life-cycle cost estimates.[Footnote 16] The Under Secretary for Management can delegate authority for oversight of major acquisition programs with life-cycle cost estimates of less than $1 billion to a designated Component Acquisition Executive (CAE) with responsibility for managing the acquisition functions at each component.[Footnote 17] See table 2 for a comparison of program review responsibilities based on dollar thresholds for the interim and previous acquisition management directive. Table 2: Comparison of Department and Component-Level Review under Acquisition Management Directive 102-01 (Interim) and Management Directive 1400: Acquisition Management Directive 102-01: Cost basis and level of review for each management directive: Life- cycle cost estimate; Level 1: $1 billion or greater (major programs); Level 2: $300 million to $1 billion (major programs); Level 3: Less than $300 million (nonmajor programs). Cost basis and level of review for each management directive: Level of review; Level 1: Department; Level 2: Department or component; Level 3: Component. Management Directive 1400: Cost basis and level of review for each management directive: Life- cycle cost estimate (for information technology investments); Level 1: Greater than $200 million; Level 2: Between $100 million and $200 million; Level 3: Between $20 million and $100 million. Cost basis and level of review for each management directive: Acquisition cost (for other than information technology investments); Level 1: Greater than $100 million; Level 2: Between $50 million and $100 million; Level 3: N/A. Cost basis and level of review for each management directive: Level of review; Level 1: Department; Level 2: Department; Level 3: Department. Source: GAO presentation of information in Acquisition Management Directive 102-01 and Management Directive 1400. [End of table] Acquisition Review Board Activities: DHS has increased its departmental oversight activities, reviewing 7 programs in fiscal year 2008 and 25 programs--10 more than originally planned--in fiscal year 2009.[Footnote 18] However, at the end of fiscal year 2009, only 24 of 67 major acquisition programs had been reviewed by the ARB. As they have not yet been able to review all programs, DHS oversight officials told us they have prioritized ARB reviews based on program funding levels and a program's stage in the acquisition life cycle. Officials also indicated they may waive some oversight requirements on a case-by-case basis, without clear criteria, for programs that have passed certain phases--such as departmental approval of a Mission Need Statement for a program that has already deployed a capability.[Footnote 19] Additionally, to provide some level of departmental oversight for major programs not yet reviewed by the ARB, DHS acquisition oversight staff worked with selected components to conduct brief reviews of acquisition portfolios and examined 61 of 67 major acquisition programs during fiscal year 2009. These reviews have helped DHS to identify and prioritize programs for the more detailed ARB reviews. DHS acquisition oversight officials said that funding and staffing levels have limited the number of programs they can review. The department's oversight office increased its staff from 8 government employees in 2008 to 22 government employees by the end of fiscal year 2009 and plans to hire another 11 government employees in 2010. However, budget documentation suggests this staffing level will not provide the capacity needed to support the 50 to 60 annual ARB meetings that acquisition oversight officials said would be needed to oversee all of DHS's major acquisitions. DHS has not produced a plan identifying overall staffing and skill levels needed to meet the department's acquisition oversight needs. We have previously recommended that DHS identify and align sufficient management resources to implement oversight reviews in a timely manner throughout the investment life cycle.[Footnote 20] In 2008, we found that limitations in the department's ability to conduct formal investment reviews led DHS component officials to seek approval directly from the Deputy Secretary; as a result, some decisions were very informal and DHS officials said they did not always know whether a decision had been made. We recommended that DHS ensure investment decisions are transparent and documented as required. Oversight officials have since documented ARB decisions with Acquisition Decision Memorandums including action items and timeframes for addressing them. Memorandums from fiscal years 2008 and 2009 ARB meetings most often instructed programs to draft or redraft key acquisition documents that help present business cases. Our work at the Department of Defense (DOD) has found that a program must have the key elements of a business case before any measurement of its performance can be valuable.[Footnote 21] Action items also instructed programs to identify alternative acquisition approaches; document testing, implementation or support plans; and produce summaries of related activities within DHS and DOD, including similar acquisitions. Oversight officials and program officials said they work together to address action items and noted that it can be an iterative process. As of September 2009, oversight officials reported that 13 of 26 programs [Footnote 22] had not addressed all action items by established deadlines, and approximately a quarter of all action items were completed late or overdue, as shown in table 3. Table 3: Acquisition Decision Memorandum Action Items (fiscal years 2008 and 2009): Action items: Completed; Assigned: 57; Late or overdue: 17. Action items: Outstanding; Assigned: 98; Late or overdue: 24. Action items: Total; Assigned: 155; Late or overdue: 41. Source: GAO presentation of DHS data for 26 programs reviewed in fiscal years 2008 and 2009. [End of table] Tracking Program Status: In 2008, we found DHS had not fully implemented the periodic reporting system intended to track program performance data, and many programs had cost, schedule, or performance shortfalls, while nearly 80 percent of major programs lacked basic acquisition documents, such as program baselines. We recommended that DHS establish a mechanism to track on a regular basis major investments and ensure compliance with department- level decisions. DHS's directive requires major programs to participate in an acquisition reporting process, and DHS has developed the Next Generation Periodic Reporting System, to capture and track key program information, including cost and schedule performance, contract awards, and program risks. The database became fully operational in September 2009, and DHS expects program offices to update program data each month. As of November 2009, DHS told us that 108 major and nonmajor programs were reporting into the database. Acquisition oversight officials review these data in preparation for upcoming reviews; however, the database relies on self-reported data, which is not independently verified outside of the program. Component Oversight: With regard to component oversight, the DHS guidebook allows the Under Secretary for Management to delegate acquisition decision authority for Level 2 acquisition programs provided that (1) the respective component has a departmentally approved Component Acquisition Executive (CAE) in place, (2) the component has working policies and processes consistent with the current acquisition management directive, and (3) the component's CAE has adequate support staff commensurate with the size of the delegated portfolio. In 2008, we found that component review processes were not fully in place, and we recommended that DHS ensure that components have established processes to manage major investments consistent with departmental policies and establish a mechanism to ensure major investments comply with established component and departmental investment review policy standards. In 2008, DHS established the position of CAE to implement, manage, and oversee the components' acquisition processes. As of November 2009, the Under Secretary for Management had approved CAE nominations at seven components, but had not yet delegated decision authority because components are still in the process of developing policies consistent with the department's revised directive and reaching staff levels sufficient to oversee their respective acquisition programs. Component acquisition oversight activities vary across components. While officials from five of the six component acquisition oversight offices we met with said that they had accounted for and were tracking all of their major acquisition programs, Federal Emergency Management Agency acquisition officials said they were still working to identify all of their major acquisitions, and that they had only assessed programs accounting for about $5 billion of $30 billion in estimated life-cycle costs for their acquisition portfolio. [Footnote 23] Furthermore, four of the components we reviewed reported challenges involving staffing levels, and two of the four specifically stated that staff vacancies were preventing them from further supporting oversight efforts. Acquisition Oversight and Budget Decisions: In 2008, we found that the acquisition review process had not appropriately informed DHS's annual budget process for funding major programs, and that many major programs received funding without validation of mission needs and requirements, largely because department-level reviews were seldom conducted. We reported that the Joint Requirements Council, which is responsible for validating program requirements, stopped meeting in 2006 and had not effectively carried out its responsibilities involving identification of crosscutting opportunities and overlapping or common requirements. We recommended that the department ensure that budget decisions are informed by the results of investment reviews including approved acquisition information and life-cycle cost estimates and reinstate the Joint Requirements Council or establish another departmental oversight board to perform this function. The department's guidebook states that both the Joint Requirements Council and the ARB should inform the department's budget decisions, and that they must do so effectively in order to deliver needed capabilities to end users. However, while the ARB has begun to meet more frequently, most major programs have not been reviewed. Further, acquisition management processes do not inform budget decisions as required by DHS policy. DHS has not reestablished the Joint Requirements Council, although DHS oversight officials said that by fall 2010, they expect to complete a proposal for DHS leadership to consider and approve that would address this need. Shortly thereafter, DHS plans to initiate a limited pilot program, which will not review all programs departmentwide. Acquisition Performance and Program Challenges: Our prior work has found that program performance metrics for cost and schedule can provide useful indicators of the health of acquisition programs and, when assessed regularly for changes and the reasons that cause changes, such indicators can be valuable tools for improving insight and oversight of individual programs as well as the total portfolio of major acquisitions.[Footnote 24] We have also found that the following factors are important to successful acquisitions delivering capabilities within cost and schedule: realistic program baselines with stable requirements for cost, schedule, and performance; an adequate and skilled program office workforce; and knowledge of long-term support requirements.[Footnote 25] Importantly, program performance cannot be accurately assessed without valid baseline requirements established at the program start, particularly those that establish the minimum acceptable threshold required to satisfy user needs.[Footnote 26] Most of the selected DHS programs we reviewed exhibited cost growth and schedule delays from initial estimates. DHS acquisition oversight officials have raised concerns about the accuracy of cost estimates for most major programs, making it difficult to assess the significance of the cost growth we identified. Further, over half of the programs we reviewed awarded contracts to initiate acquisition activities without component or department approval of documents essential to planning acquisitions, setting operational requirements, and establishing acquisition program baselines. Programs also experienced other acquisition planning challenges--potential and realized program issues that contribute to negative performance outcomes--such as staffing shortages, and lack of sustainment planning as well as common execution challenges related to a range of technical capability, partner dependence, and funding issues. We selected 18 DHS programs for this review--16 major programs and two nonmajor programs. The two nonmajor programs selected, and one major program that had not started acquisition activities at the time of our review,[Footnote 27] were excluded from the analysis of overall acquisition performance and program challenges. As a result, we reviewed cost or schedule data for 15 major programs. Schedule data were not complete for two programs--the Automated Commercial Environment and US-VISIT.[Footnote 28] Figure 1 provides the status of the selected programs at the time of our review. Figure 1: Summary of DHS Acquisition Programs Assessed: [Refer to PDF for image: vertical bar graph] Total programs reviewed: 18: Excluded from analysis: Nonmajor programs: 2; Excluded from analysis: Pre-acquisition programs: 1; Programs included in analysis: 15; Programs with incomplete schedule data: 2; Programs with cost growth or schedule delays: 12; Programs without cost growth or schedule delays: 1. Source: GAO analysis of DHS data. [End of figure] Most Programs Experienced Cost Increases and Schedule Delays: We assessed life-cycle cost and acquisition cost data for the 15 major acquisition programs in our review. Accurate cost estimates are critical to making funding decisions, evaluating resource requirements, and developing performance measurement baselines. Life- cycle costs include all resources and associated cost elements required to develop, produce, deploy, and sustain a particular program from initial concept through operations, support, and disposal. Acquisition costs include costs for all supplies and services for a designated investment. DHS policy requires acquisition oversight officials to assess the accuracy of life-cycle cost estimates for all major programs estimated to exceed $1 billion. The DHS guidebook includes an appendix on life-cycle cost estimates.[Footnote 29] The responsible officials have raised concerns that many programs used cost estimation methods that did not follow established best practices, such as fully defining program requirements, accounting for sustainment costs, and including costs for the full life cycle of a program. As a result, officials have doubts about the credibility, comprehensiveness, and accuracy of most program cost estimates. Officials said they are working to address this concern by assisting programs in developing cost estimates, and obtaining independent cost estimates for selected high-risk programs. [Footnote 30] To provide additional support, they have temporarily placed cost analysis specialists within selected components. Most programs we reviewed reported cost growth from initial to latest estimates. Inaccurate or incomplete cost estimates were likely a factor in cost growth for the programs we reviewed, according to DHS officials. In some cases, programs reported that changes in scope or requirements contributed to cost growth. Further, initial cost estimates for most programs were developed after the start of acquisition activities, so they do not capture earlier cost changes. Because DHS does not have one consistent source for acquisition and life-cycle cost estimates, we analyzed the best available data reported to OMB and congressional appropriations committees for each of the major programs in our review.[Footnote 31] Table 4 summarizes the changes to life-cycle and acquisition cost estimates for the programs in our review. Table 4: DHS Major Acquisition Program Costs: Customs and Border Protection: Automated Commercial Environment; Acquisition cost estimate (then-year dollars in millions): Initial: $2,125; Acquisition cost estimate (then-year dollars in millions): Current: $2,222; Acquisition cost estimate (then-year dollars in millions): Percentage change: 5%; Life-cycle cost estimate (then-year dollars in millions): Initial: $4,776; Life-cycle cost estimate (then-year dollars in millions): Current: $4,532; Life-cycle cost estimate (then-year dollars in millions): Percentage change: -5%; Months between initial and current estimates: 37. SBInet; Acquisition cost estimate (then-year dollars in millions): Initial: $284; Acquisition cost estimate (then-year dollars in millions): Current: $1,885; Acquisition cost estimate (then-year dollars in millions): Percentage change: 564%; Life-cycle cost estimate (then-year dollars in millions): Initial: $579; Life-cycle cost estimate (then-year dollars in millions): Current: $3,738; Life-cycle cost estimate (then-year dollars in millions): Percentage change: 546%; Months between initial and current estimates: 42. TECS Modernization; Acquisition cost estimate (then-year dollars in millions): Initial: $406; Acquisition cost estimate (then-year dollars in millions): Current: $410; Acquisition cost estimate (then-year dollars in millions): Percentage change: 1%; Life-cycle cost estimate (then-year dollars in millions): Initial: $888; Life-cycle cost estimate (then-year dollars in millions): Current: $1,104; Life-cycle cost estimate (then-year dollars in millions): Percentage change: 24%; Months between initial and current estimates: 24. Western Hemisphere Travel Initiative; Acquisition cost estimate (then-year dollars in millions): Initial: $312; Acquisition cost estimate (then-year dollars in millions): Current: $311; Acquisition cost estimate (then-year dollars in millions): Percentage change: 0%; Life-cycle cost estimate (then-year dollars in millions): Initial: $863; Life-cycle cost estimate (then-year dollars in millions): Current: $1,362; Life-cycle cost estimate (then-year dollars in millions): Percentage change: 58%; Months between initial and current estimates: 24. National Protection and Programs Directorate: National Cybersecurity Protection System; Acquisition cost estimate (then-year dollars in millions): Initial: $664; Acquisition cost estimate (then-year dollars in millions): Current: $546; Acquisition cost estimate (then-year dollars in millions): Percentage change: -18%; Life-cycle cost estimate (then-year dollars in millions): Initial: $1,366; Life-cycle cost estimate (then-year dollars in millions): Current: $1,257; Life-cycle cost estimate (then-year dollars in millions): Percentage change: -8%; Months between initial and current estimates: 8. US-VISIT Unique Identity; Acquisition cost estimate (then-year dollars in millions): Initial: $160; Acquisition cost estimate (then-year dollars in millions): Current: $79; Acquisition cost estimate (then-year dollars in millions): Percentage change: -51%; Life-cycle cost estimate (then-year dollars in millions): Initial: $225; Life-cycle cost estimate (then-year dollars in millions): Current: $132; Life-cycle cost estimate (then-year dollars in millions): Percentage change: -41%; Months between initial and current estimates: 8. Transportation Security Administration: Electronic Baggage Screening Program; Acquisition cost estimate (then-year dollars in millions): Initial: $11,360; Acquisition cost estimate (then-year dollars in millions): Current: $15,316; Acquisition cost estimate (then-year dollars in millions): Percentage change: 35%; Life-cycle cost estimate (then-year dollars in millions): Initial: $19,930; Life-cycle cost estimate (then-year dollars in millions): Current: $23,696; Life-cycle cost estimate (then-year dollars in millions): Percentage change: 19%; Months between initial and current estimates: 17. Passenger Screening Program; Acquisition cost estimate (then-year dollars in millions): Initial: $1,872; Acquisition cost estimate (then-year dollars in millions): Current: $2,559; Acquisition cost estimate (then-year dollars in millions): Percentage change: 37%; Life-cycle cost estimate (then-year dollars in millions): Initial: $2,593; Life-cycle cost estimate (then-year dollars in millions): Current: $4,306; Life-cycle cost estimate (then-year dollars in millions): Percentage change: 66%; Months between initial and current estimates: 17. Secure Flight; Acquisition cost estimate (then-year dollars in millions): Initial: $97; Acquisition cost estimate (then-year dollars in millions): Current: $153; Acquisition cost estimate (then-year dollars in millions): Percentage change: 59%; Life-cycle cost estimate (then-year dollars in millions): Initial: $685; Life-cycle cost estimate (then-year dollars in millions): Current: $1,362; Life-cycle cost estimate (then-year dollars in millions): Percentage change: 99%; Months between initial and current estimates: 28. United States Coast Guard: C4ISR; Acquisition cost estimate (then-year dollars in millions): Initial: $1,353; Acquisition cost estimate (then-year dollars in millions): Current: $1,353; Acquisition cost estimate (then-year dollars in millions): Percentage change: 0%; Life-cycle cost estimate (then-year dollars in millions): Initial: $1,353; Life-cycle cost estimate (then-year dollars in millions): Current: $1,353; Life-cycle cost estimate (then-year dollars in millions): Percentage change: 0%; Months between initial and current estimates: 28. Maritime Patrol Aircraft; Acquisition cost estimate (then-year dollars in millions): Initial: $1,706; Acquisition cost estimate (then-year dollars in millions): Current: $2,223; Acquisition cost estimate (then-year dollars in millions): Percentage change: 30%; Life-cycle cost estimate (then-year dollars in millions): Initial: $22,773; Life-cycle cost estimate (then-year dollars in millions): Current: $12,285; Life-cycle cost estimate (then-year dollars in millions): Percentage change: -46%; Months between initial and current estimates: 42. National Security Cutter; Acquisition cost estimate (then-year dollars in millions): Initial: $3,450; Acquisition cost estimate (then-year dollars in millions): Current: $4,749; Acquisition cost estimate (then-year dollars in millions): Percentage change: 38%; Life-cycle cost estimate (then-year dollars in millions): Initial: $22,998; Life-cycle cost estimate (then-year dollars in millions): Current: $24,277; Life-cycle cost estimate (then-year dollars in millions): Percentage change: 6%; Months between initial and current estimates: 42. Rescue 21; Acquisition cost estimate (then-year dollars in millions): Initial: $827; Acquisition cost estimate (then-year dollars in millions): Current: $1,067; Acquisition cost estimate (then-year dollars in millions): Percentage change: 29%; Life-cycle cost estimate (then-year dollars in millions): Initial: $1,639; Life-cycle cost estimate (then-year dollars in millions): Current: $2,693; Life-cycle cost estimate (then-year dollars in millions): Percentage change: 64%; Months between initial and current estimates: 28. Response Boat-Medium; Acquisition cost estimate (then-year dollars in millions): Initial: $401; Acquisition cost estimate (then-year dollars in millions): Current: $610; Acquisition cost estimate (then-year dollars in millions): Percentage change: 52%; Life-cycle cost estimate (then-year dollars in millions): Initial: $1,210; Life-cycle cost estimate (then-year dollars in millions): Current: $1,419; Life-cycle cost estimate (then-year dollars in millions): Percentage change: 17%; Months between initial and current estimates: 68. Sentinel; Acquisition cost estimate (then-year dollars in millions): Initial: $3,206; Acquisition cost estimate (then-year dollars in millions): Current: $3,928; Acquisition cost estimate (then-year dollars in millions): Percentage change: 23%; [Empty]; Life-cycle cost estimate (then-year dollars in millions): Initial: $22,256; Life-cycle cost estimate (then-year dollars in millions): Current: $14,475; Life-cycle cost estimate (then-year dollars in millions): Percentage change: -35%; Months between initial and current estimates: 31. Source: GAO analysis of official cost data reported in Acquisition Program Baselines and Quarterly Acquisition Reports to Congress to the House and Senate Appropriations Committees for the Maritime Patrol Aircraft, National Security Cutter, Response Boat-Medium and Sentinel Class programs. For all other programs, GAO analyzed official cost data in the Exhibit 300 required by OMB. [End of table] Changes in life-cycle cost estimates ranged widely from decreases of over 40 percent to an increase of over 500 percent. Nine of the 15 programs reported cost growth from initial to current estimates. The three programs reporting significant cost decreases also reported inconsistencies in estimating life-cycle costs. The interval of initial and latest cost estimates varied from 8 months to over 5 years for the programs we reviewed, and as a result some programs had a longer period of time to incur cost growth. Changes in acquisition cost estimates also ranged widely--from a decrease of 50 percent to an increase of over 500 percent. Of the 11 programs with acquisition cost growth, 8 programs reported cost growth of over 25 percent. Almost all of the selected major acquisition programs experienced delays in delivering system capabilities. We assessed schedule performance for delivering both initial capabilities, when initial end- users would receive the new system and could use it operationally, as well as delivery of full capabilities, the point at which all end- users would receive the system. DHS guidance requires major programs to set a formal schedule baseline prior to the start of an acquisition in order to measure program performance in achieving its goals.[Footnote 32] Schedule delays can lead to loss of program credibility with stakeholders, increased acquisition costs, new systems not being available to meet department needs, and continued use of less capable systems. Fifteen of the major programs we reviewed reported estimated or actual schedule delays in delivery of initial operating capability of an average of 12 months, and eight programs reported delays of a year or more. Thirteen programs reporting data on delivery of full operating capability indicated estimated delays of over 2 years on average. None of the selected programs reported delivering full operating capability for all increments. Figure 2 summarizes the estimated schedule delays to full operating capability for major programs reporting data. Figure 2: Programs with Estimated Schedule Delay to Full Capability: [Refer to PDF for image: vertical bar graph] On time: 3 programs; Up to 2 years late: 4 programs; Over 2 years to 4 years late: 1 program; More than 4 years late: 5 programs. Source: GAO analysis of DHS data. Note: Programs do not total to 15 as 2 programs did not report: Automated Commercial Environment and US-VISIT. [End of figure] Several Program Challenges Affect Ability to Deliver Within Cost and on Time: The major acquisition programs we assessed experienced similar planning challenges affecting cost and schedule outcomes: unapproved or unstable baseline requirements; program office workforce shortages; long-term support, and acquisition cost planning. Table 5 summarizes the program planning challenges for each of the programs we reviewed. Our prior work has shown that establishing a sound business case is key to a successful acquisition that delivers capabilities within cost and schedule and minimizes the challenges we identified.[Footnote 33] The first, and perhaps best, opportunity to reduce acquisition risk is in the planning phase, when critical decisions are made that have significant implications for the overall success of an acquisition. We also identified execution challenges related to a range of technical capability, partner dependence, and funding issues. Table 5: Summary of Major Program Planning Challenges: Customs and Border Protection: Automated Commercial Environment; Major program planning challenges: Baseline requirements: Unapproved or unstable baseline requirements: Customs and Border Protection: [Check]; Major program planning challenges: Baseline requirements: Lack of timely approval of acquisition documents[A]: [Check]; Major program planning challenges: [Empty]; Major program planning challenges: Program office workforce shortages: [Empty]; Lack of sustainment planning: [Check]; Performance: Cost growth[B]: [Check]; Performance: Schedule delays: N/A[D]. SBInet, Block 1[C]; Major program planning challenges: Baseline requirements: Unapproved or unstable baseline requirements: Customs and Border Protection: [Empty]; Major program planning challenges: Baseline requirements: Lack of timely approval of acquisition documents[A]: [Check]; Major program planning challenges: [Empty]; Major program planning challenges: Program office workforce shortages: [Check]; Lack of sustainment planning: [Empty]; Performance: Cost growth[B]: [Check]; Performance: Schedule delays: [Check]. TECS Modernization; Major program planning challenges: Baseline requirements: Unapproved or unstable baseline requirements: Customs and Border Protection: [Check]; Major program planning challenges: Baseline requirements: Lack of timely approval of acquisition documents[A]: [Check]; Major program planning challenges: [Empty]; Major program planning challenges: Program office workforce shortages: [Empty]; Lack of sustainment planning: [Check]; Performance: Cost growth[B]: [Check]; Performance: Schedule delays: [Check]. Western Hemisphere Travel Initiative; Major program planning challenges: Baseline requirements: Unapproved or unstable baseline requirements: Customs and Border Protection: [Empty]; Major program planning challenges: Baseline requirements: Lack of timely approval of acquisition documents[A]: [Check]; Major program planning challenges: [Empty]; Major program planning challenges: Program office workforce shortages: [Empty]; Lack of sustainment planning: [Check]; Performance: Cost growth[B]: [Check]; Performance: Schedule delays: [Check]. National Protections and Programs Directorate: National Cybersecurity Protection System; Major program planning challenges: Baseline requirements: Unapproved or unstable baseline requirements: Customs and Border Protection: [Empty]; Major program planning challenges: Baseline requirements: Lack of timely approval of acquisition documents[A]: [Check]; Major program planning challenges: [Empty]; Major program planning challenges: Program office workforce shortages: [Check]; Lack of sustainment planning: [Check]; Performance: Cost growth[B]: [Empty]; Performance: Schedule delays: [Empty]. US-VISIT Unique Identity; Major program planning challenges: Baseline requirements: Unapproved or unstable baseline requirements: Customs and Border Protection: [Check]; Major program planning challenges: Baseline requirements: Lack of timely approval of acquisition documents[A]: [Check]; Major program planning challenges: [Empty]; Major program planning challenges: Program office workforce shortages: [Check]; Lack of sustainment planning: [Check]; Performance: Cost growth[B]: [Empty]; Performance: Schedule delays: N/A[D]. Transportation Security Administration: Electronic Baggage Screening Program; Major program planning challenges: Baseline requirements: Unapproved or unstable baseline requirements: Customs and Border Protection: [Check]; Major program planning challenges: Baseline requirements: Lack of timely approval of acquisition documents[A]: [Check]; Major program planning challenges: [Empty]; Major program planning challenges: Program office workforce shortages: [Check]; Lack of sustainment planning: [Empty]; Performance: Cost growth[B]: [Check]; Performance: Schedule delays: [Check]. Passenger Screening Program; Major program planning challenges: Baseline requirements: Unapproved or unstable baseline requirements: Customs and Border Protection: [Check]; Major program planning challenges: Baseline requirements: Lack of timely approval of acquisition documents[A]: [Check]; Major program planning challenges: [Empty]; Major program planning challenges: Program office workforce shortages: [Empty]; Lack of sustainment planning: [Empty]; Performance: Cost growth[B]: [Check]; Performance: Schedule delays: [Check]. Secure Flight; Major program planning challenges: Baseline requirements: Unapproved or unstable baseline requirements: Customs and Border Protection: [Check]; Major program planning challenges: Baseline requirements: Lack of timely approval of acquisition documents[A]: [Check]; Major program planning challenges: [Empty]; Major program planning challenges: Program office workforce shortages: [Empty]; Lack of sustainment planning: [Check]; Performance: Cost growth[B]: [Check]; Performance: Schedule delays: [Check]. United States Coast Guard: C4ISR; Major program planning challenges: Baseline requirements: Unapproved or unstable baseline requirements: Customs and Border Protection: [Check]; Major program planning challenges: Baseline requirements: Lack of timely approval of acquisition documents[A]: [Check]; Major program planning challenges: [Empty]; Major program planning challenges: Program office workforce shortages: [Empty]; Lack of sustainment planning: [Empty]; Performance: Cost growth[B]: [Empty]; Performance: Schedule delays: [Check]. Maritime Patrol Aircraft; Major program planning challenges: Baseline requirements: Unapproved or unstable baseline requirements: Customs and Border Protection: [Check]; Major program planning challenges: Baseline requirements: Lack of timely approval of acquisition documents[A]: [Check]; Major program planning challenges: [Empty]; Major program planning challenges: Program office workforce shortages: [Check]; Lack of sustainment planning: [Check]; Performance: Cost growth[B]: [Check]; Performance: Schedule delays: [Check]. National Security Cutter; Major program planning challenges: Baseline requirements: Unapproved or unstable baseline requirements: Customs and Border Protection: [Check]; Major program planning challenges: Baseline requirements: Lack of timely approval of acquisition documents[A]: [Check]; Major program planning challenges: [Empty]; Major program planning challenges: Program office workforce shortages: [Empty]; Lack of sustainment planning: [Check]; Performance: Cost growth[B]: [Check]; Performance: Schedule delays: [Check]. Rescue 21; Major program planning challenges: Baseline requirements: Unapproved or unstable baseline requirements: Customs and Border Protection: [Check]; Major program planning challenges: Baseline requirements: Lack of timely approval of acquisition documents[A]: [Empty]; Major program planning challenges: [Empty]; Major program planning challenges: Program office workforce shortages: [Empty]; Lack of sustainment planning: [Empty]; Performance: Cost growth[B]: [Check]; Performance: Schedule delays: [Check]. Response Boat-Medium; Major program planning challenges: Baseline requirements: Unapproved or unstable baseline requirements: Customs and Border Protection: [Check]; Major program planning challenges: Baseline requirements: Lack of timely approval of acquisition documents[A]: [Empty]; Major program planning challenges: [Empty]; Major program planning challenges: Program office workforce shortages: [Check]; Lack of sustainment planning: [Check]; Performance: Cost growth[B]: [Check]; Performance: Schedule delays: [Check]. Sentinel; Major program planning challenges: Baseline requirements: Unapproved or unstable baseline requirements: Customs and Border Protection: [Empty]; Major program planning challenges: Baseline requirements: Lack of timely approval of acquisition documents[A]: [Empty]; Major program planning challenges: [Empty]; Major program planning challenges: Program office workforce shortages: [Empty]; Lack of sustainment planning: [Empty]; Performance: Cost growth[B]: [Check]; Performance: Schedule delays: [Check]. Source: GAO analysis of DHS data: [A] We assessed whether key acquisition documents were approved at either the component or department level. [B] Cost Growth refers to either acquisition or life-cycle cost growth or both. [C] Cost performance refers to the entire SBInet program. [D] N/A indicates that reportable data were not available. [End of table] Baseline Requirements: Our prior work has found that program performance cannot be accurately assessed without valid baseline requirements established at the program start[Footnote 34]. According to DHS guidance, the baseline requirements must include a threshold value that is the minimum acceptable value which, in the user's judgment, is necessary to satisfy the need. If threshold values are not achieved, program performance is seriously degraded, the program may be too costly, or the program may no longer be timely. Failure to achieve a threshold would require rebaselining or termination of the program based upon a decision by the Acquisition Decision Authority. Inadequate knowledge of program requirements is a key cause of poor acquisition outcomes, and as programs move into the execution phase of the acquisition process, problems become much more costly to fix. DHS's acquisition guidance states that the program baseline is the contract between the program and departmental oversight officials regarding cost, schedule, and technical performance of the program. Over half of the programs we reviewed awarded contracts to initiate acquisition activities without component or department approval of documents essential to planning acquisitions, setting operational requirements, and establishing acquisition program baselines. Our prior work has shown that the development, review, and approval of these key documents minimize the risks of poorly defined requirements and plans negatively affecting program performance.[Footnote 35] The Federal Acquisition Streamlining Act of 1994 requires agencies to approve or define the cost, performance, or schedule goals for major acquisition programs. Although DHS policy has required major acquisition programs to set cost, schedule, and performance goals prior to the start of an acquisition since its first acquisition policy was issued in 2003,[Footnote 36] 7 of 15 programs in our review did not have approved baselines until 2 years or more after program start. For example, the Secure Flight program did not have an approved program baseline until over 4 years after program start, and the TECS Modernization program did not have a component or department approved baseline after more than 6 years. Among the 15 programs, delays ranged from 1 month to over 4 years after contract award for other key acquisition documents, such as the Mission Need Statement and the Operational Requirements Document. The Mission Need Statement outlines the specific functional capabilities required to accomplish DHS's mission and objectives, along with deficiencies and gaps in these capabilities. The Operational Requirements Document includes key performance parameters and describes the mission, capabilities, and objectives to provide needed capabilities. Figure 3 shows programs with key documents and when they were approved. Figure 3: Key Document Approval Time frames: [Refer to PDF for image: vertical bar graph] On time: Mission Need Statement: 6 programs; Operational Requirements Document: 3 programs; Acquisition Program Baseline: 7 programs. Up to 1 year late: Mission Need Statement: 4 programs; Operational Requirements Document: 2 programs; Acquisition Program Baseline: 0. More than 1 year late: Mission Need Statement: 5 programs; Operational Requirements Document: 10 programs; Acquisition Program Baseline: 8 programs. Source: GAO analysis of DHS data. [End of figure] Most of the programs that had established baseline requirements changed or plan to change them. For example, seven programs with an approved program baseline changed key requirements after their initial approval. An additional three programs were revising baseline requirements, pending APB approval, at the time we completed our review. Program Office Workforce: Program offices reported filling 79 percent of all government staff positions; however, programs also reported high levels of government staff vacancies for certain positions.[Footnote 37] Our prior work at DHS found shortcomings in acquisition workforce planning, including a lack of sufficient data to assess gaps in skills and staffing levels. [Footnote 38] Lack of adequate staff, both in terms of skill and staffing levels, increases the risk of insufficient program planning and contractor oversight, and has been associated with negative cost and schedule outcomes in major acquisition programs, emphasizing the importance of sufficient, experienced staff for successful acquisition outcomes.[Footnote 39] Figure 4 provides more details on government and contractor staff for the programs we reviewed. Figure 4: DHS Major Program Government Staff and Contractor Support: [Refer to PDF for image: stacked horizontal bar graph] Total workforce: Government staff: 40%; Contractor staff: 60%; Total: 1,760. Customs and Border Protection: Automated Commercial Environment: Government staff: 63%; Contractor staff: 37%; Total: 108. SBInet: Government staff: 50%; Contractor staff: 50%; Total: 175. TECS Modernization: Government staff: 57%; Contractor staff: 43%; Total: 7. Western Hemisphere Travel Initiative: Government staff: 23%; Contractor staff: 77%; Total: 88. National Protection and Programs Directorate: National Cybersecurity Protection System: Government staff: 8%; Contractor staff: 92%; Total: 133. US-VISIT: Government staff: 38%; Contractor staff: 62%; Total: 421. Transportation Security Administration: Electronic Baggage Screening Program: Government staff: 23%; Contractor staff: 77%; Total: 116. Passenger Screening Program: Government staff: 33%; Contractor staff: 67%; Total: 48. Secure Flight: Government staff: 38%; Contractor staff: 62%; Total: 300. U.S. Coast Guard: C4ISR: Government staff: 31%; Contractor staff: 69%; Total: 103. Maritime Patrol Aircraft: Government staff: 85%; Contractor staff: 15%; Total: 7. National Security Cutter: Government staff: 63%; Contractor staff: 37%; Total: 79. Rescue 21: Government staff: 81%; Contractor staff: 19%; Total: 80. Response Boat-Medium: Government staff: 56%; Contractor staff: 44%; Total: 71. Sentinel Class Patrol Boat: Government staff: 54%; Contractor staff: 46%; Total: 24. Source: GAO analysis of DHS data. Note: US-VISIT totals include staff for all investments within the program. [End of figure] Filled government positions for each program ranged from 42 percent to 100 percent. Over half of the major programs reported that contractors comprised 50 percent or more of all staff supporting program offices. Similarly, our review of major acquisitions at the DOD found that, in 2009, contractors filled 51 percent of program office positions. [Footnote 40] Further, our work on contractors in the workforce has noted that use of contractors to perform certain functions can place the government at risk of transferring government responsibilities to contractors, and potentially result in loss of government control over and accountability for policy and program decisions.[Footnote 41] We previously found that DHS used contractor support to provide services related to planning activities, acquisition support, and policy development--services that closely supported inherently governmental functions. As a result, we recommended that DHS establish guidance for determining the appropriate mix of government and contractor staff to meet mission needs, and assess program office staff and expertise necessary to provide sufficient oversight of contractor services.[Footnote 42] DHS is still working to address this recommendation. All programs we reviewed report having a permanently assigned program manager certified to manage a major acquisition as required by DHS policy. By comparison, in 2007, 40 percent of major DHS programs lacked a program manager with the required acquisition certification level.[Footnote 43] Four programs reported program manager tenure of 3 or more years, and six programs report program manager tenure of 1 year or less. Our prior work has found frequent program manager turnover can result in a lack of accountability for a program's business case and performance outcomes.[Footnote 44] Sustainment Planning: Prior to the start of an acquisition, DHS acquisition policy requires an approved Integrated Logistics Support Plan for all major programs. This plan defines the program's sustainment and supportability strategy and can comprise a significant portion of total life-cycle costs--approximately 60 percent or more according to DHS guidance. OMB's capital planning guide also calls for sustainment planning to properly plan for and actively manage investments throughout the program. Our prior work has found that understanding how programs will be sustained in future years, along with the associated costs, is a prerequisite for valid life-cycle cost estimates.[Footnote 45] Most programs reported that they have developed a support plan, but only six programs have a support plan approved at the component level, and none of the programs in our review had a plan approved by DHS, as required. Table 6 shows the status of the plans for the 15 programs reporting. Table 6: Status of Integrated Logistics Support Plans (ILSP): Component: Customs and Border Protection: Program: Automated Commercial Environment; ILSP (approved or unapproved): [Empty]; Component-approved ILSP: [Empty]; DHS-approved ILSP: [Empty]. Program: SBInet, Block 1; ILSP (approved or unapproved): [Check]; Component-approved ILSP: [Check]; DHS-approved ILSP: [Empty]. Program: TECS Modernization; ILSP (approved or unapproved): [Check]; Component-approved ILSP: [Empty]; DHS-approved ILSP: [Empty]. Program: Western Hemisphere Travel Initiative; ILSP (approved or unapproved): [Check]; Component-approved ILSP: [Empty]; DHS-approved ILSP: [Empty]. Component: National Protections and Programs Directorate: Program: National Cybersecurity Protection System; ILSP (approved or unapproved): [Check]; Component-approved ILSP: [Empty]; DHS-approved ILSP: [Empty]. Program: US-VISIT Unique Identity; ILSP (approved or unapproved): [Check]; Component-approved ILSP: [Empty]; DHS-approved ILSP: [Empty]. Component: Transportation Security Administration: Program: Electronic Baggage Screening Program; ILSP (approved or unapproved): [Check]; Component-approved ILSP: [Check]; DHS-approved ILSP: [Empty]. Program: Passenger Screening Program; ILSP (approved or unapproved): [Check]; Component-approved ILSP: [Check]; DHS-approved ILSP: [Empty]. Program: Secure Flight; ILSP (approved or unapproved): [Check]; Component-approved ILSP: [Empty]; DHS-approved ILSP: [Empty]. Component: United States Coast Guard: Program: C4ISR; ILSP (approved or unapproved): [Check]; Component-approved ILSP: [Check]; DHS-approved ILSP: [Empty]. Program: Maritime Patrol Aircraft; ILSP (approved or unapproved): [Check]; Component-approved ILSP: [Empty]; DHS-approved ILSP: [Empty]. Program: National Security Cutter; ILSP (approved or unapproved): [Check]; Component-approved ILSP: [Empty]; DHS-approved ILSP: [Empty]. Program: Rescue 21; ILSP (approved or unapproved): [Check]; Component-approved ILSP: [Check]; DHS-approved ILSP: [Empty]. Program: Response Boat-Medium; ILSP (approved or unapproved): [Check]; Component-approved ILSP: [Empty]; DHS-approved ILSP: [Empty]. Program: Sentinel Class Patrol Boat; ILSP (approved or unapproved): [Check]; Component-approved ILSP: [Check]; DHS-approved ILSP: [Empty]. Number of programs: ILSP (approved or unapproved): 14; Component-approved ILSP: 6; DHS-approved ILSP: 0. Total number of programs with available data: ILSP (approved or unapproved): 15; Component-approved ILSP: 15; DHS-approved ILSP: 15. Source: GAO analysis of DHS-provided data. [End of table] Program Execution Challenges: In addition to challenges related to acquisition planning, the programs we reviewed reported program execution challenges related to technical capability, partner dependence, and funding. While the challenges we identify below are not exhaustive, this summary provides insight into the issues programs reported. Technical capability includes hardware or software functionality, such as the operation of radar equipment in the case of SBInet, or legacy equipment nearing the end of its useful life in the case of the Electronic Baggage Screening Program. Testing helps to ensure that programs meet technical requirements to deliver needed capabilities, and our prior work has found that programs proceeding with acquisitions prior to completion of testing can result in delays in achieving technical capability. Several programs in our review reported substantial investment in acquisitions prior to completion of testing. For example, three Coast Guard programs we reviewed, Maritime Patrol Aircraft, Response Boat-Medium and Sentinel, reported placing orders for or receiving significant numbers of units prior to completing testing to demonstrate that what the programs are buying meets Coast Guard needs. Our prior work has found that resolution of problems discovered during testing can sometimes require costly redesign or rework.[Footnote 46] Programs also raised dependence on corporations, other agencies, or other programs as a challenge to delivering certain capabilities. For example, Secure Flight officials reported dependence on commercial aircraft operators complying with the implementation schedule as the greatest program risk. In another case, Customs and Border Protection's delays in network upgrades have negatively affected response times for the Western Hemisphere Travel Initiative. Almost half of all programs reported concerns over funding, although the nature and cause of those concerns varied among programs. Our prior work found that the budget process for funding major acquisitions and the investment review process were not aligned. As a result, many major DHS investments received funding without determining that mission needs and requirements were justified. For example, after DHS approved and funded the Automated Commercial Environment program, program officials found that they did not have a full understanding of all requirements and have experienced cost growth. Program officials said the future of the program is dependent on departmental funding decisions. In addition, our past work found that many major acquisition budget decisions were reached without life- cycle cost estimates, which are essential to making informed budget decisions. For example, the Electronic Baggage Screening Program reported that annual compliance costs and recapitalization expenses, when combined with recurring programwide costs, have sometimes exceeded the budget. In future years, program costs could grow significantly as cost estimates are reassessed to include new requirements. DHS has been working toward validating the program's cost estimate. Changes in mandated requirements, such as legal or regulatory changes that require system changes, can also affect program budgets. For example, Rescue 21 reported cost increases due to new protocols and external technology standards. Program Assessments: The two-page assessments of the 18 programs we reviewed provide an overview of each program and describe the reported challenges. On the first page of the assessment, we present a general description; a program status narrative; a timeline identifying key dates for the program; essential information about the program; a table showing the initial and latest estimates of cost, schedule, and quantities; and key program issues under "Program Challenges." We present approval dates for key program documents requiring departmental or component approval depending on the phase of the acquisition. On the second page of the assessment, we provide background information, a description of program performance, and an analysis of key program challenges. The assessments are based on program office reported information as of 2009 with the exception of the cost data. We based our analysis of cost on OMB's Exhibit 300s as of January or February 2010 and the Coast Guard's Quarterly Acquisition Reports to Congress as these sources represented more complete and official data used for making important planning and budgeting decisions. See appendix I for more information on our scope and methodology for reporting on cost and schedule data, program challenges, and program office workforces. [End of section] Customs and Border Protection: Automated Commercial Environment: [Photograph: Source: Automated Commercial Environment Program] The Automated Commercial Environment is the commercial trade processing system being developed by U.S. Customs and Border Protection (CBP) that aims to facilitate the movement of legitimate trade, strengthen border security, and serve as the single point of collection and access for trade data among federal agencies. Current Status: The initial software releases delivered between 2003 and 2005 significantly exceeded their estimated costs. Three remaining software releases will not be completed as initially planned and future releases will be funded based on individual business cases. Timeline: Start of acquisition (5/01); Initial capability (Release 1) (2/03); Release 2 (10/03); DHS program approval (11/03); Release 3 (8/04); Release 4 (4/05); Advanced targeting (9/07); Reference data (1/09); Additional entry summary types (2/10); Full operating capability (TBD). Program Essentials: Component: Customs and Border Protection; Major contractor(s): International Business Machines Global Services; Fiscal year 2010 funding requested: $268 million; Program office workforce: 68 total government positions planned; 68 total government staff employed; 40 support contractors. Program Challenges: * Unstable and undefined requirements; * Software testing issues; * Schedule delays; * Cost growth and lack of funding. Performance (then-year dollars): Total acquisition cost: Initial estimate: $2,125 million[A]; Total acquisition cost: Latest estimate: $2,222 million[A]; Life-cycle cost estimate: Initial estimate: $4,776 million[A]; Life-cycle cost estimate: Latest estimate: $4,532 million[A]; Quantity: Initial estimate: N/A; Quantity: Latest estimate: N/A; Initial capability: Initial estimate: Feb. 2003; Initial capability: Latest estimate: Feb. 2003; Full capability: Initial estimate: Sept. 2010; Full capability: Latest estimate: TBD. [A] Note: Estimates submitted to the Office of Management and Budget for 2008 and 2011. Program officials do not expect ACE to deliver all initially planned capabilities. Key Program Documents: Initial version of:Acquisition Program Baseline; Department approval date: Jan. 2006. Initial version of:Mission Need Statement; Department approval date: Oct. 2004. Initial version of:Operational Requirements Document; Department approval date: Not yet approved. Initial version of:Acquisition Plan; Department approval date: Oct. 2004. Initial version of:Integrated Logistics Support Plan; Department approval date: Not yet approved. Automated Commercial Environment: Background: Initiated in 2001 to support Title VI of the North American Free Trade Agreement, commonly known as the Customs Modernization Act, the Automated Commercial Environment program seeks to replace and supplement existing cargo processing technology. Deployed in phases, the program incrementally provides capabilities across all modes of transportation, replacing existing systems with a single, multimodal manifest system for land, air, rail, and sea cargo. The program will serve as the central data collection system for federal agencies needing access to international trade data, and is expected to deliver these capabilities in a secure, paper-free, web- enabled environment. Operational capabilities already delivered by the program include screening cargo and conveyances, analyzing data to support targeting of high-risk entities, and processing truck manifests electronically. Performance: The initial software releases delivered between 2003 and 2005 significantly exceeded their estimated costs. ACE's software lines of code increased from the acquisition program baselines's figure of 1,156,566 to 4,255,000. According to program officials, the remaining software releases will not be completed in accordance with the program baseline, due to the program lacking sufficient funding to complete them as planned. The estimated cost growth for these releases is not yet included in the latest cost estimate, pending a decision being made on the future of the program. Due to limited funding, one release will likely be eliminated from the program and the two others will likely be disaggregated into a number of smaller projects, some of which will be discontinued. The decision as to which projects will be continued or cut will be based on available funding. The program office found in 2005 that it did not have a full understanding of all requirements and that existing requirements were missing about 20 percent of needed functionality. Program officials acknowledged the development of some software releases was not divided into sufficiently manageable blocks and requirements were not well defined from the outset of the program. Additionally, software integration testing of a key project was incomplete and allowed poor code to enter the system, although this code was not deployed. This resulted in a much longer system integration testing period than originally estimated, leading to programwide schedule delays. Challenges: The program has been executed using component-approved operational requirements that are not yet approved by DHS. Program officials said requirements growth and lack of requirements definition contributed to the schedule delays and contract cost overruns. Program officials said the future of the program is dependent on a number of factors, such as DHS funding decisions and the results of software testing. Program officials expect the remaining planned projects to move to smaller programs so they will have better-defined and more manageable requirements. Officials believe that simply restructuring the existing program would result in additional cost growth and schedule delays. The program is working with the department to better manage future requirements and program risks. For example, the department has recently tasked a high-level component official with taking the lead on the program's requirements' oversight and prioritization. Program Office Comments: The program office provided technical comments on a draft of this assessment, which were incorporated as appropriate. [End of section] Customs and Border Protection: SBInet Block 1: [Photograph: Source: SBInet Program Office] SBInet Block 1 is a surveillance, command, control, communications, and intelligence system being fielded in Arizona that is intended to mitigate or eliminate vulnerabilities along the international border between ports of entry. Block 1 is an element of DHS's Secure Border Initiative, a comprehensive, multiyear plan to secure the borders of the United States and reduce illegal cross border activities such as smuggling of economic migrants, illegal drugs, and people with terrorist intent. Current Status: DHS plans to complete Block 1 operational testing and evaluation and complete final acceptance of systems at the initial Block 1 sites by March 2011. Future project funding is being delayed by DHS until an assessment of SBInet is completed. Timeline: Start of acquisition (9/06); Preliminary design review (4/07); Procurement start (6/08); Program baseline approval (3/09); Operational testing complete (3/11); Nogales/Sonoita deployments (12/11); Ajo-2/Casa Grande deployments (3/12); Naco/Douglas/Wilcox deployments (6/12) Full operating capability (12/13). Program Essentials: Component: Customs and Border Protection; Major contractor(s): The Boeing Company; Fiscal year 2010 funding requested: $297.2 million; Program Office workforce: 161 total government positions planned; 87 total government staff employed; 88 support contractors. Program Challenges: * Delayed approval of program baseline; * Schedule delays; * Technical problems; * Understaffing. Performance (then-year dollars): Total acquisition cost: Initial estimate: $284 million[A]; Total acquisition cost: Latest estimate: $1,885 million[A]; Life-cycle cost estimate: Initial estimate: $579 million[A]; Life-cycle cost estimate: Latest estimate: $3,738 million[A]; Quantity: Initial estimate: 1; Quantity: Latest estimate: 1; Initial capability: Initial estimate: Oct. 2008 Initial capability: Latest estimate: Mar. 2011 Full capability: Initial estimate: Dec. 2008 Full capability: Latest estimate: Dec. 2013 [A] Note: Cost estimates are for overall SBInet program submitted to the Office of Management and Budget for 2008 and 2011. Key Program Documents: Initial version of: Acquisition Program Baseline; Department approval date: Mar. 2009. Initial version of: Mission Need Statement; Department approval date: Not yet approved. Initial version of: Operational Requirements Document; Department approval date: Mar. 2007. Initial version of: Acquisition Plan; Department approval date: Not yet approved. Initial version of: Integrated Logistics Support Plan; Department approval date: Not yet approved. SBInet Block 1: Background: SBInet Block 1 is a border security system being developed and deployed to help secure portions of the international border in Arizona. The system will detect and track intruders using a set of fixed surveillance towers. The program is initially deploying to two sites, known as Tucson-1 and Ajo-1. The program plans to complete testing before DHS approves deployment at additional Block 1 sites. Tucson-1, the planned site of Block 1 operational testing and evaluation, covers 23 miles of border in one of CBP's busiest areas. We have reported since 2007 on acquisition and information technology management issues that increase the risk of SBInet underperformance. Systems previously deployed in the Tucson area under the SBInet Project 28 pilot in 2008 did not fully meet CBP's expectations; Block 1 will replace these systems. Our reviews and covert tests conducted over the years identified numerous security vulnerabilities along U.S. international borders and operational issues in program delays that limited SBInet usefulness to CBP. CBP told us in 2008 that Block 1 would help address these vulnerabilities. Performance: The December 2006 SBInet Expenditure Plan that was approved by DHS planned for SBInet to be deployed in the Tucson and Yuma Sectors by December 2008. However, program officials now expect system deployments to continue until December 2013. They expect to complete operational testing and final acceptance of the initial Block 1 systems at the Tucson-1 and Ajo-1 sites by March 2011. The Block 1 program baseline currently requires the deployment of SBInet at all sites in Arizona by September 2011. Program officials told us that a decision on the deployment of SBInet beyond Block 1 at other locations would be made in the future. Contract cost estimates related to the Block 1 deployments have risen significantly higher than the initially estimated amounts. Program officials said that Block 1's delays, have led to substantial cost growth, and they expect to have an updated program cost estimate before SBInet's next department-level review. The program office reported that systems at Tucson-1 were operational and used by Border Patrol for night operations as of March 2010. The Homeland Security Secretary ordered a reassessment of the SBInet program in January 2010 citing unacceptable delays. In March 2010, she announced that $50 million in program funding is being reallocated to other border security technologies, and that funding for future projects is on hold, pending the completion of an assessment of SBInet. Challenges: DHS approved the Block 1 acquisition program baseline more than 2 years after the start of the SBInet acquisition, and 4 months after completion of the critical design review, precluding the initial design from being informed by approved program requirements. As of the fall of 2009, the program had identified several high and moderate risks that could prevent SBInet from delivering a system that meets the Border Patrol's needs under the existing schedule. Among these risks are problems with radar functionality, problems with image clarity, a lack of program analysis tools, and system security and sustainment risks. Program officials said that the radar may be modified to a point that it is no longer a commercial off-the-shelf item, possibly leading to higher costs and to the program not meeting a program requirement for using unmodified commercial equipment. Program officials identified risks related to unique environmental requirements at certain sites that could cause some systems deployed after Tucson-1 to undergo significant rework or not meet program requirements for correctly identifying detected subjects. Additionally, the SBInet program office is staffed substantially below planned staffing levels for government positions. Program Office Comments: The program office provided technical comments, which were incorporated as appropriate. As of March 2010, SBInet program officials indicated they did not expect any previously identified challenges to delay the completion of Tucson-1 or interfere with other currently planned program activities. [End of section] Customs and Border Protection: TECS Modernization: [Photograph: Source: Customs and Border Protection] The Department of the Treasury brought TECS online in the 1980s. DHS is now responsible for the system. Customs and Border Protection uses the mainframe-based application to disseminate data to support inspections of travelers at ports of entry. The TECS Modernization program plans to improve search capabilities, enhance data integration, provide the flexibility necessary to respond to evolving threats, and eliminate older, unreliable technology. Current Status: Customs and Border Protection plans to execute the modernization program in five segments. Customs and Border Protection has begun segments 1, 2 and 3, and expects to achieve full operating capability for all five segments by the end of fiscal year 2015. Timeline: Start of acquisition (12/07); Segment 1 and 2 start (4/08); Segment 3 start (11/09); Initial operating capability (3/10); Segment 4 start (10/10); Segment 5 start (1/12); Full operating capability (9/15). Program Essentials: Component: Customs and Border Protection; Major contractor(s): BART & Associates and Mythics; Fiscal year 2010 funding requested: $50 million; Program office workforce: 1 total government position planned; 4 government staff employed*; 3 support contractors. * Government staff numbers refer to full time equivalents. Program Challenges: * Schedule delays due to funding constraints; * Lack of approved baseline, requirements and planning documents; * Understaffing. Performance (then-year dollars): Total acquisition cost: Initial estimate: $406 million[A]; Total acquisition cost: Latest estimate: $410 million[A]; Life-cycle cost estimate: Initial estimate: $888 million[A]; Life-cycle cost estimate: Latest estimate: $1,104 million[A]; Quantity: Initial estimate: Not applicable; Quantity: Latest estimate: Not applicable; Initial capability: Initial estimate: Mar. 2010; Initial capability: Latest estimate: Mar. 2010; Full capability: Initial estimate: Sept. 2013; Full capability: Latest estimate: Sept. 2015. [A] Note: Cost estimates submitted to the Office of Management and Budget for 2009 and 2011, represent both Customs and Border Protection and Immigration and Customs Enforcement efforts. Key Program Documents: Initial version of: Acquisition Program Baseline; Department approval date: Not yet approved. Initial version of: Mission Need Statement; Department approval date: Not yet approved. Initial version of: Operational Requirements Document; Department approval date: Not yet approved. Initial version of: Acquisition Plan; Department approval date: Not yet approved. Initial version of: Integrated Logistics Support Plan; Department approval date: Not yet approved. TECS Modernization: Background: TECS is increasingly difficult to maintain because of technology obsolescence, and inability to support new requirements, particularly those involving access to other systems. Customs and Border Protection is migrating the system to a new architecture in order to meet DHS's mission requirements. Additionally, Immigration and Customs Enforcement manages a parallel but independent project modernizing the functionality of TECS unique to its respective mission. Performance: The modernization program lacks an approved baseline, Operational Requirements Document, and Acquisition Plan. Customs and Border Protection expected full operating capability by the end of fiscal year 2013, but program officials state that milestone has slipped by 2 years due to funding constraints. The program has consolidated several projects originally identified as independently providing capability. In September 2008, the program office planned to execute system modernization through 16 discrete projects, but by June 2009, the program office had reduced that number to 13. In September 2009, these projects were further consolidated into 5 discrete projects due to departmental guidance. The program office also determined that its original cost estimation approach did not accurately capture costs as part of the life-cycle cost estimate. Costs considered part of the acquisition effort in 2007 were recategorized as part of the maintenance effort in 2009, and program planning cost estimates increased because the program office was required to maintain its planning function after the system achieved full operating capability, and therefore needed to include those costs in the estimates. Challenges: The system modernization program office submitted the program's Operational Requirements Document, Acquisition Program Baseline, Test Evaluation Master Plan, and Integrated Logistics Support Plan to DHS oversight officials who reviewed the documents in July and August 2009. These documents were returned to Customs and Border Protection to be revised, and had not yet been approved as of February 2010. The program office requested and received funding to hire one full- time government staff member in fiscal year 2009. In addition, three other personnel funded through the Passenger Systems Program Office were assigned to the system modernization program as of September 2009. The DHS Chief Information Officer reviewed the program in October 2009, and stated that the program office appears understaffed with respect to the size and scope of the program. Program Office Comments: DHS provided technical comments on a draft of this assessment, which were incorporated as appropriate. Additionally, DHS emphasized that the consolidation of projects did not reduce the scope of the program, and that the planned full operating capability date changed to 2015 because anticipated funding increases for fiscal years 2011 through 2013 failed to materialize. [End of section] Customs and Border Protection: Western Hemisphere Travel Initiative: [Photograph: Source: Western Hemisphere Travel Initiative] The Western Hemisphere Travel Initiative acquisition program intends to enable Customs and Border Protection to effectively and efficiently address new traveler documentation requirements. The program deploys Radio Frequency Identification and License Plate Reader (RFID/LPR) hardware and Vehicle Primary Client (VPC) software to land ports of entry to improve traveler processing. The program has completed the installation of VPC software. Current Status: The first phase of the program achieved full operating capability in fiscal year 2009. However, program officials explained that the program has been expanded and now expect a second phase to continue through the end of fiscal year 2010. Timeline: Start of acquisition (9/06); Cost benefit analysis (10/07); VPC preliminary and critical design review (11/07); RFID/LPR preliminary design review (2/08); RFID/LPR critical design review (4/08); Initial operating capability (9/08); Phase I full operating capability (6/09); Phase II full operating capability (9/10). Program Essentials: Component: Customs and Border Protection; Major contractor(s): IBM, Unisys Corp., and ITS Services; Fiscal year 2010 funding requested: $168 million; Program office workforce: 20 total government positions planned; 20 government staff employed; 68 support contractors. Program Challenges: * Increased program scope; * Unfunded requirements; * Delays in Customs and Border Protection network upgrades. Performance (then-year dollars): Total acquisition cost: Initial estimate: $312 million[A]; Total acquisition cost: Latest estimate: $311 million[A]; Life-cycle cost estimate: Initial estimate: $863 million[A]; Life-cycle cost estimate: Latest estimate: $1,362 million[A]; Quantity (RFID/LPR): Initial estimate: 354; Quantity (RFID/LPR): Latest estimate: 487; Initial capability: Initial estimate: Oct. 2008; Initial capability: Latest estimate: Sept. 2008; Full capability: Initial estimate: June 2009; Full capability: Latest estimate: Sept. 2010. [A] Note: Cost estimates submitted to the Office of Management and Budget for 2009 and 2011; latest cost estimate does not account for any acquisition costs beyond fiscal year 2010. Key Program Documents: Initial version of: Acquisition Program Baseline; Department approval date: Jan. 2009. Initial version of: Mission Need Statement; Department approval date: Feb. 2007. Initial version of: Operational Requirements Document; Department approval date: Apr. 2008. Initial version of: Acquisition Plan; Department approval date: Not yet approved. Initial version of: Integrated Logistics Support Plan; Department approval date: Not yet approved. Western Hemisphere Travel Initiative: Background: The Intelligence Reform and Terrorism Prevention Act of 2004 required the Secretary of Homeland Security in consultation with the Secretary of State to develop and implement a plan, known as the Western Hemisphere Travel Initiative, which requires all travelers to present a passport or other acceptable document denoting identity and citizenship when entering the United States. Customs and Border Protection determined that the initiative could increase costs to the traveling public and increase the agency's workload. Improved processes, technology and facilities were needed to prevent longer inspection processing times, and the program is expected to limit potential border crossing delays created by new traveler requirements. Performance: In June 2009, the program provided the full operating capability originally expected. However, the program's scope and capability requirements have been expanded, and a second phase of the program is now scheduled to continue through September 2010. Customs and Border Protection decided to increase the number of RFID/LPR deployed as well as VPC installations. Additionally, the RFID/LPR equipment was originally required to be compatible with four different types of identification documents, but was revised to be compatible with twelve. Program officials expect the program's acquisition costs, including phase 2, to be $1 million lower than originally estimated due to lower costs for the technology and individual RFID/LPR and VPC installations. Challenges: Although the current acquisition cost estimate is lower than the program's original estimate, program officials anticipate total funding shortfalls for fiscal years 2011 through 2015 because program funding does not fully cover life-cycle cost estimates. This shortfall would likely require the program to scale back operations and maintenance efforts and delay future enhancements. Additionally, program officials expect DHS to expand the program's scope beyond the second phase during fiscal year 2010 to address new requirements for pedestrian and outbound vehicle processing. Further, schedule delays for a Customs and Border Protection effort to upgrade local and wide area network bandwidth capacity at ports of entry could jeopardize program performance, particularly in terms of response times. Originally scheduled for completion by June 2009, as of January 2010, Customs and Border Protection had not yet determined when the wide area network upgrades would occur at 19 of 151 sites, or when local area network upgrades would occur at 144 of 163 sites. However, actual response times exceeded the objective performance levels from June 2009 to June 2010. Program Office Comments: The program office generally concurred with the assessment and provided technical comments which were incorporated as appropriate. Additionally, DHS emphasized that the program provided the full operating capability originally expected in June 2009, and that the rollout of the second phase caused the change in the full capability date. [End of section] Federal Emergency Management Agency: Integrated Public Alert and Warning System: [Illustration: Source: Federal Emergency Management Agency] The Integrated Public Alert and Warning System is the nation's next- generation infrastructure of alert and warning networks expanding upon the traditional audio-only radio and television Emergency Alert System by providing one message over more media to more people before, during, and after a disaster. When complete, the program is planned as a "system of systems" forming the country's comprehensive public alert system. Current Status: The program is awaiting component approval of key program documentation, including the initial acquisition program baseline and the first operational requirements document. Timeline: Start of acquisition (9/06); Preliminary design review (3/10); Critical design review (9/10); Test readiness review (12/10); Initial operating capability (3/12); Full operating capability (TBD). Program Essentials: Component: Federal Emergency Management Agency; Major contractor(s): Booz Allen Hamilton, CACI, and Acuity Consulting; Fiscal year 2010 funding requested: $16.8 million; Program office Workforce: 11 total government positions planned; 10 total government staff employed; 23 support contractors. Program Challenges: * Requirements instability; * Lacking approved baseline, requirements, and planning documents; * Turnover in program leadership and staffing. Performance (then-year dollars): Total acquisition cost: Initial estimate: $115 million[A]; Total acquisition cost: Latest estimate: $136 million[A]; Life-cycle cost estimate: Initial estimate: $279 million[A]; Life-cycle cost estimate: Latest estimate: $264 million[A]; Quantity*: Initial estimate: 32; Quantity*: Latest estimate: 32; Initial capability: Initial estimate: TBD; Initial capability: Latest estimate: Not available; Full capability: Initial estimate: Mar. 2012; Full capability: Latest estimate: Not available. [A] Note: Cost data provided by program office. * Quantities are for Primary Entry Point stations. Key Program Documents: Initial version of: Acquisition Program Baseline; Department approval date: Not available. Initial version of: Mission Need Statement; Department approval date: Not available. Initial version of: Operational Requirements Document; Department approval date: Not available. Initial version of: Acquisition Plan; Department approval date: Not available. Initial version of: Integrated Logistics Support Plan; Department approval date: Not available. Integrated Public Alert and Warning System: Background: Through the Integrated Public Alert and Warning System program, the Federal Emergency Management Agency (FEMA) seeks to expand the Emergency Alert System to include more modern technologies. Since the program began awarding contracts in 2005, program requirements have changed. The program originally planned to build an infrastructure to deliver state and local alerts through multiple pathways. However, program officials told us their vision changed to focus exclusively on disseminating presidential messages and setting alert and warning technical standards in 2007. In early 2009, the program shifted focus to again include infrastructure for state and local alerts. We have previously reported that FEMA has not systematically assessed program outcomes or lessons learned from pilot projects, and has not periodically reported on program progress as required by a June 2006 Executive Order. Our prior work has shown that without validated requirements or a program baseline, DHS will not know whether the program expenditures fully satisfy department needs, how well the program is executed, or whether further investments are warranted. Performance: Although the program was initiated in 2004, FEMA has not yet approved an acquisition program baseline for the program or other key program documents. According to program office officials, the program did not begin to develop programwide life-cycle cost estimates until 2009, and these estimates have not yet been finalized or approved. Program officials told us that they are working with stakeholders to better define requirements, and have drafted an operational requirements document and acquisition program baseline. These documents are currently under review by FEMA, which oversees the program as a nonmajor acquisition. Program officials said that they are transitioning to operate under the November 2008 Department of Homeland Security acquisition guidance. Challenges: The program must overcome significant challenges in order to deliver a comprehensive public alert and warning system. Program officials said they face challenges in upgrading some Primary Entry Point stations, which are radio stations providing emergency information, to meet changing survivability requirements”as they are subject to legal restrictions concerning the enhancement of private property using government funds. This could have a significant negative impact on system reliability and operations. Moreover, frequent changes in organizational leadership and other staffing-related issues have affected program performance. The program office recently hired its fourth Program Director in 5 years. FEMA officials acknowledge that leadership changes and high turnover make it difficult to consistently manage the program. Program Office Comments: The program office provided technical comments, which were incorporated as appropriate. Program officials indicated that Acquisition Review Board reviews by both FEMA and DHS were planned to occur by May 2010, and all required program documentation has been drafted. Program officials stated that a recent FEMA program management review provided top scores for scope, performance, cost, schedule, and risk management controls and processes on the program. [End of section] National Protection and Programs Directorate: National Cybersecurity Protection System: [Photograph: Source: National Cybersecurity Protection System Program Office] The National Cybersecurity Protection System is intended to reduce the federal government's vulnerabilities to cyber threats by decreasing the frequency of cyberspace disruptions, and by minimizing the duration and damage of those disruptions. The program consists of four discrete "blocks," including the current state and three follow-on end- to-end system upgrades. Current Status: The block 1.0 deployment began in 2003 and was completed after deploying capabilities at 31 sites. DHS is currently deploying block 2.0, and plans to complete the deployment by March 2013. DHS plans to deploy block 2.1 during fiscal years 2010 and 2011. DHS has classified the block 3.0 deployment schedule. Timeline: Start of acquisition (6/08); Block 2.0 operational readiness review (2/09); Block 2.0 initial operating capability (8/09); Block 2.1 operational readiness review (12/09); Block 2.1 initial operating capability (9/10); Block 2.1 full operating capability (6/11); Block 2.0 full operating capability (3/13). Program Essentials: Component: National Protection and Programs Directorate; Major contractor(s): General Dynamics Advanced Information Systems; Fiscal year 2010 funding requested: $186 million; Program office workforce: 26 total government positions planned; 11 total government staff employed; 122 support contractors. Program Challenges: * Schedule slippage; * Unstable architecture and deployment strategy; * Lacks risk mitigation and key project management capabilities. Performance (then-year dollars): Total acquisition cost: Initial estimate: $664 million[A]; Total acquisition cost: Latest estimate: $546 million[A]; Life-cycle cost estimate: Initial estimate: $1,366 million[A]; Life-cycle cost estimate: Latest estimate: $1,257 million[A]; Quantity: Initial estimate: 100; Quantity: Latest estimate: 100; Initial capability (Block 2.0): Initial estimate: June 2009; Initial capability (Block 2.0): Latest estimate: Aug. 2009; Full capability (Block 2.0): Initial estimate: Mar. 2013; Full capability (Block 2.0): Latest estimate: Mar. 2013. [A] Note: Cost estimates submitted to the Office of Management and Budget for 2010 and 2011. Key Program Documents: Initial version of: Acquisition Program Baseline; Department approval date: Feb. 2009. Initial version of: Mission Need Statement; Department approval date: Feb. 2009. Initial version of: Operational Requirements Document; Department approval date: Oct. 2009. Initial version of: Acquisition Plan; Department approval date: Not yet approved. Initial version of: Integrated Logistics Support Plan; Department approval date:Not yet approved. National Cybersecurity Protection System: Background: We have reported over the last several years that DHS has yet to fully satisfy its cybersecurity responsibilities. In response to National Security Presidential Directive 54/Homeland Security Presidential Directive 23, and the Comprehensive National Cybersecurity Initiative, the National Cyber Security Division of the National Protection and Programs Directorate established two programs”the National Cybersecurity Protection Program and the National Cybersecurity Protection System. The program encompasses the people, activities, processes, and technologies intended to fulfill DHS's cyber mission, and the system is expected to integrate the hardware and software procured to support the program. Block 1.0 currently provides flow collection and data storage capabilities. Block 2.0 will add intrusion detection capabilities. Block 2.1 will enhance visualization capabilities. Block 3.0 capabilities are classified. DHS also plans future blocks to improve inter-department information sharing and add near real-time detect-and- protect capabilities; however, schedules for these blocks have not yet been determined. The Consolidated Security, Disaster Assistance, and Continuing Appropriations Act, 2009 and the Department of Homeland Security Appropriations Act of 2010 required DHS to submit an expenditure plan for House and Senate Appropriations Committees' approval prior to receiving 50 percent of the National Cyber Security Division's budget. Performance: In July 2009, program officials notified component and department- level oversight officials that the program needed to reschedule the deployments of blocks 2.1 and 3.0. The block 2.1 full operating capability date slipped from the third quarter of fiscal year 2010 to the third quarter of fiscal year 2011. The new deployment schedule for block 3.0 is classified. Program officials attributed the rescheduling to a delay in receiving half of 2009 funding based on approval of the National Cyber Security Division's fiscal year 2009 expenditure plan. The funding was made available in June 2009. Program officials said delayed funding also delayed the implementation of the program's continuity of operations plan by 7 months. Program officials said that the plan is expected to ensure that the system can continue to operate despite disruptions, and will improve system data services, which cannot currently handle block 2.0 data volume and replication requirements. Program officials now expect completion of the plan by the end of 2011. Challenges: The acquisition program's architecture and deployment strategy has not been stabilized for blocks 2.0 and 3.0, although the block 2.0 deployment has begun, and DHS is planning to accelerate development and implementation of certain block 3.0 activities. DHS has acknowledged that the acquisition program lacks risk mitigation and key project management capabilities. DHS has stated that the program has efforts planned and under way to implement more effective controls. Program officials said that they are developing a risk mitigation plan based on an exercise concluding in 2010 or 2011, depending on the decision to execute an additional, optional phase. Program Office Comments and Our Response: The program office provided technical comments to a draft of this assessment, which were incorporated as appropriate. Regarding the statement that the architecture and deployment strategy has not been stabilized, the program office suggested that the December 2008 baseline provided such a strategy. However, in December 2008, the program reported to the DHS acquisition oversight board that this instability was a program risk, and the program also reported the risk to us in July and October 2009. [End of section] National Protection and Programs Directorate: US-VISIT Unique Identity: [Photograph: Source: US-VISIT] United States Visitor and Immigrant Status Indicator Technology (US- VISIT) collects, maintains, and shares information on foreign nationals, including biometric identifiers, acquired by several source agencies. Unique Identity, one of several investments under US-VISIT, is modernizing the current biometric data system by introducing 10- print finger scans and adding identity management capabilities such as data sharing and interoperability with Department of Defense (DOD) and Federal Bureau of Investigation (FBI) systems. Current Status: US-VISIT does not have an approved program baseline including all relevant investments as DHS is restructuring the program. According to program documents, Unique Identity will achieve full operating capability in September 2014. Timeline: Start of Unique Identity acquisition (6/04); Interoperability preliminary design review (3/08); Interoperability critical design review (6/08); Interoperability initial operating capability (10/08); 10-print initial operating capability (3/09); Unique Identity full operating capability (9/14). Program Essentials: Component: National Protection and Programs Directorate; Major contractor(s): Accenture LLP; Fiscal year 2010 funding requested: $28.7 million; Program office: Not available for the separate workforce investments under US-VISIT. Program Challenges: * Unstable and unapproved requirements; * Lack of approved program baseline; * Dependence on outside agency to achieve full operating capability. Performance (then-year dollars): Total acquisition cost: Initial estimate: $160 million[A]; Total acquisition cost: Latest estimate: $79 million[A]; Life-cycle cost estimate: Initial estimate: $225 million[A]; Life-cycle cost estimate: Latest estimate: $132 million[A]; Quantity: Initial estimate: Not applicable; Quantity: Latest estimate: Not applicable; Initial capability: Initial estimate: Sept. 2008; Initial capability: Latest estimate: Mar. 2009; Full capability: Initial estimate: Not defined; Full capability: Latest estimate: Sept. 2014. [A] Note: Estimates submitted to the Office of Management and Budget for Unique Identity 2010 and 2011. Key Program Documents: Initial version of: Acquisition Program Baseline; Department approval date: Not yet approved. Initial version of: Mission Need Statement; Department approval date: Not yet approved. Initial version of: Operational Requirements Document; Department approval date: Not yet approved. Initial version of: Acquisition Plan; Department approval date: June 2009. Initial version of: Integrated Logistics Support Plan; Department approval date: Not yet approved. US-VISIT Unique Identity: Background: The US-VISIT program was started to meet congressional mandates to record the entry and exit of foreign nationals. The program currently provides identity management services through operations and maintenance of IDENT”the current automated biometric identification system, the Arrival and Departure Information System, and US-VISIT's analytic support services. At the time of our review, US-VISIT was restructuring the program into individual investments to provide better visibility and traceability of investment dollars to individual projects. Because of the restructuring, the program was unable to provide complete data at either the program or project level. As a result, we were not able to fully assess the program in its entirety. US-VISIT development and deployment efforts consist of two ongoing projects: (1) Unique Identity and (2) Comprehensive Exit. In fiscal year 2015, Unique Identity is projected to enter the operations and maintenance phase and become part of the overall IDENT investment. We did not include Comprehensive Exit in our review because DHS did not request fiscal year 2010 funds for this project. We have previously reported on limitations and made recommendations to improve DHS's efforts to plan and execute its efforts to deliver a Comprehensive Exit capability. Program Performance: US-VISIT, which includes the Unique Identity investment, lacks an approved acquisition program baseline and other acquisition planning and requirements documents. The Enhanced Border Security and Visa Entry Reform Act of 2002, as amended, mandated the use of a biometric standard developed under the USA Patriot Act to track entry and exit of foreign nationals by 2005. The program partially meets that requirement, capturing fingerprint data for all foreign nationals entering the U.S., transmitting the data to a central database, and analyzing that data. Currently, an entry capability operates at almost 300 U.S. ports of entry but a Comprehensive Exit capability does not. Although program officials said that the program has largely transitioned from a 2-print to a 10-print system, the program has yet to fully develop and deploy a back-end system to match the 10-prints against other biographic or biometric data. Unique Identity has reached initial operational capability and is interoperable with the FBI's fingerprint database. According to program officials, most responses from the FBI system are completed within 15 minutes; however, this system can require up to 72 hours for results. Full operational capability, which is in the initial planning stage, will include record linking between the US-VISIT and the FBI fingerprint systems, improved response times for searches, and notification capabilities when updating a biometric record. The program reported that cost estimates submitted to the Office of Management and Budget for 2011 reflect Unique Identity cost reductions to fit within budgetary constraints. Challenges: According to program officials, capabilities and requirements constantly change as a result of new legislative and administrative mandates. Officials do not know when US-VISIT will be fully interoperable with the FBI fingerprint database, but they have already agreed on capabilities and requirements work, which is in progress. Interoperability depends upon completion of specific tasks on the FBI's Next Generation biometric and fingerprint system, projected for completion in 2014. Program Office Comments: The program office provided technical comments on a draft of this assessment, which were incorporated as appropriate. Officials also noted that the program has been restructured, increasing the scope of Unique Identity, since our review began. [End of section] Office of Health Affairs: Biosurveillance Common Operating Network: [Illustration: Source: SAIC] The mission of the National Biosurveillance Integration Center is to collect, integrate, analyze, and disseminate information from existing human health, animal, plant, food, and water surveillance systems, and relevant threat and intelligence information to provide early recognition of bioevents in order to mitigate the consequences. The Biosurveillance Common Operating Network, formerly known as National Biosurveillance Integration System 2.0, is the information technology system supporting the Center. Current Status: Program officials said that data backup capability has been delayed a year and consider this delay a significant operational risk. The Network is currently in the operations and maintenance phase. Timeline: Start of acquisition (9/06); Preliminary design review (12/06); Critical design review (3/07); Initial operating capability (3/08); Full operating capability (9/08). Program Essentials: Component: Office of Health Affairs; Major contractor(s): SAIC; Fiscal year 2010 funding requested: $2.1 million; Program office workforce: N/A total government positions planned; 1.25 total government staff employed; 2.5 support contractors. Program Challenges: * Lack of data sharing between agencies; * Delay in data backup; * Operations and maintenance cost increases. Performance (then-year dollars): Total acquisition cost: Initial estimate: $14.3 million[A]; Total acquisition cost: Latest estimate: $13.1 million[A]; Life-cycle cost estimate: Initial estimate: $26.5 million[A]; Life-cycle cost estimate: Latest estimate: $26.5 million[A]; Quantity: Initial estimate: 1; Quantity: Latest estimate: 1; Initial capability: Initial estimate: Nov. 2007; Initial capability: Latest estimate: Mar. 2008; Full capability: Initial estimate: Mar. 2008; Full capability: Latest estimate: Sept. 2008*. * Note: Capabilities delivered varied substantially from initial estimates; the Center was not fully operational as an integration center by Sept. 2008. [A] Program reported cost estimates for 2006 and 2008. Key Program Documents: Initial version of: Acquisition Program Baseline; Department approval date: Not available. Initial version of: Mission Need Statement; Department approval date: Not available. Initial version of: Operational Requirements Document; Department approval date: Not available. Initial version of: Acquisition Plan; Department approval date: Apr. 2006. Initial version of: Integrated Logistics Support Plan; Department approval date:Not available. Biosurveillance Common Operating Network: Background: The Center was created to integrate real-time biosurveillance data from multiple federal agencies such as the Centers for Disease Control (CDC), the Food and Drug Administration (FDA), and the United States Department of Agriculture (USDA) in order to rapidly identify and characterize a bioterrorist attack. Once a potential event is detected, the Center disseminates alerts to enable rapid response to a biological event to mitigate the potential consequences. In July 2007, the DHS Office of Inspector General reported that the Center lacked sustained program leadership and was not a priority, because ownership of the program shifted among department organizations numerous times, with corresponding fluctuations in the program approach, priority, and accomplishments. The original information technology system was designed to process structured data received directly from federal partners, such as CDC, FDA, and USDA. However, the Center receives limited data from federal partners and generally lacks assignments of personnel from other agencies to leverage analytical expertise. As a result, the Network is primarily used to search the Internet for media articles that may contain relevant biosurveillance information for the Center's analysts. Performance: Program officials told us that the Network spent about $1 million less on acquisition costs than initially estimated, although delivery of full operating capability was delayed by 6 months. The program was affected by lack of available biosurveillance data from other federal agencies. The program significantly modified the system design to use unstructured data from public sources rather than structured data from other agencies. The program reduced costs by dropping three of six systems, due to no longer requiring these classified systems. Officials previously told us that they planned to add a software tool to the Network to refine results when performing historical analysis of archived data, but this has been put on hold due to budget constraints. Challenges: We previously reported that the Center does not receive the kind of data it has identified as most critical for supporting its mission” particularly, data generated at the earliest stages of an event. The Center is not fully equipped to carry out its mission because it lacks key resources from its partner agencies”data and personnel”which may be partially attributed to the need for greater collaboration. In interviews with partner agencies, we found confusion, uncertainty, and skepticism as to the value of participation in the interagency community, as well as to the mission and purpose of the Center within that community. Agency officials also expressed a lack of clarity about roles, responsibilities, joint strategies, policies, and procedures for operating across agency boundaries. The program reported that the Network's operations and maintenance costs are greater than originally anticipated, so the data backup capability will be delayed for a year. Program officials consider this delay a significant operational risk. The program reported that no full-time government personnel are dedicated to the Network. The Network and other Center functions share staff, including contractor support. Furthermore, the program does not have an approved sustainment plan although it is in the operations and maintenance phase. Program Office Comments and Our Response: In responding to a draft of this assessment, the program office provided technical comments, which were incorporated as appropriate. Program officials stated that all of the program's key acquisition documents were component approved in December 2004. However, they were unable to provide documentation of this at the time of our review. Because the program is not a major investment, departmental approval of key program documents is not required. [End of section] Office of Health Affairs: BioWatch Generation-3: [Photograph: Source: BioWatch] The BioWatch program's mission is to rapidly detect airborne biological agents in order to speed response and recovery from a terrorist event. BioWatch Generation-3 replaces manually-intensive, primarily outdoor legacy systems with an automated detection capability allowing a quicker response to a biological attack. This is expected to greatly reduce the number of potential fatalities caused by an attack by shortening the time elapsed between exposure and treatment. Current Status: The program is currently evaluating biodetection technologies for a future acquisition. Delivery of an initial capability has been delayed 18 months due to unavailability of vendor equipment, change in testing responsibilities, and additional time required to complete DHS reviews. Timeline: Production readiness review (9/10); Operational testing (9/11); First Generation-3 deployment (9/11); Initial operating capability (6/12); Full operating capability (3/15). Program Essentials: Component: Office of Health Affairs; Major contractor(s): Hamilton Sundstrand Northrup-Grumman; Fiscal year 2010 funding requested: $122 million; Program office workforce: 5 total government positions planned; 3 total government staff employed; 9 support contractors. Program Challenges: * Understaffing; * Technical risk. Performance (then-year dollars): Total acquisition cost: Initial estimate: $407 million[A]; Total acquisition cost: Latest estimate: $493 million[A]; Life-cycle cost estimate: Initial estimate: $921 million[A]; Life-cycle cost estimate: Latest estimate: $2,106 million[A]; Quantity: Initial estimate: 2,570; Quantity: Latest estimate: 2,570; Initial capability: Initial estimate: Dec. 2010; Initial capability: Latest estimate: June 2012; Full capability: Initial estimate: Mar. 2014; Full capability: Latest estimate: Mar. 2015. [A] Note: Estimates submitted to the Office of Management and Budget for 2010 and 2011. Key Program Documents: Initial version of: Acquisition Program Baseline; Department approval date: Not yet approved. Initial version of: Mission Need Statement; Department approval date: Dec. 2009. Initial version of: Operational Requirements Document; Department approval date: Apr. 2009. Initial version of: Acquisition Plan; Department approval date: May 2009. Initial version of: Integrated Logistics Support Plan; Department approval date: Not yet approved. BioWatch Generation-3: Background: Program officials told us that BioWatch Generation 1 and 2 detection systems do not provide a long-term solution, because the collection process is labor intensive and can require up to 36 hours to identify a biological agent. The BioWatch Generation-3 detection system is planned as a fully autonomous, networked biosensor that collects and analyzes samples on-site and autonomously transmits the results to BioWatch labs where the state laboratory directors interpret the signal. Generation-3 is intended to detect all biological agents on BioWatch's list of biological threats. DHS's Office of Health Affairs developed the original Generation-3 requirements in coordination with the Science and Technology Directorate. "Assay" validation-”testing to validate systems that can detect biological agents”-was subsequently transitioned to the BioWatch program. Program officials expect to replace the about 600 existing legacy collection systems and deploy approximately 2,000 additional detection systems. Performance: Program officials said they are in the process of validating vendor technologies to ensure meeting Generation-3 requirements. At the time of our review, plans for testing and evaluation of new technologies were not yet finalized. Program officials said that if no vendor systems are proven to meet requirements, the program will return to developing the technology of the Science and Technology Directorate. The program is preparing for a competitive procurement. Program officials reported that the shift of assay validation from the Science and Technology Directorate to the Office of Health Affairs required the program to establish a capability for evaluating existing assays, leading to cost growth and testing delays as compared with initial estimates. Officials also reported schedule delays due to longer than expected time frames for vendors to deliver equipment and internal review cycles. The program reported a lack of concurrence with the Centers for Disease Control on criteria for actionable assays that contributed to increased cost and schedule delays. To address this issue, BioWatch invested resources with a national lab and the Centers for Disease Control to initiate a detailed plan of action for documenting requirements for public health actionable assays. Challenges: The program reported that the Consolidated Security, Disaster Assistance, and Continuing Appropriations Act, 2009 resulted in the program using a competitive procurement, which prevented the use of the incumbent contractor's more mature technologies developed by the program. Program officials said that inclusion of the more mature technologies would give the existing contractor an unfair advantage in procuring future contracts. DHS officials stated that they expect the currently identified candidate technologies to perform as well or better than the previously developed prototypes. The program currently lacks clear requirements due to lack of agreement between the program office and the Centers for Disease Control on what constitutes a public health assay. However, program officials do not expect this to affect the first phase of the program, because they intend to use contractor assays for this phase. In addition, officials reported that insufficient program staffing contributed to delays in developing plans and required documentation, and that they were in the process of hiring additional staff. Program Office Comments: The program office provided technical comments on a draft of this assessment, which were incorporated as appropriate. [End of section] Transportation Security Administration: Electronic Baggage Screening Program: [Photograph: Source: Transportation Security Administration] The Electronic Baggage Screening Program is responsible for screening all checked airline baggage in the United States, to reduce the probability of a successful terrorist or criminal attack to the air transportation system. The program relies on Explosive Detection System (EDS) equipment and Explosives Trace Detector devices as primary screening technologies. Current Status: The program does not have a required department-approved program baseline or program requirements. The program is acquiring and deploying next-generation explosive detection technology to replace legacy systems and meet emerging threats. The program received $700 million in American Recovery and Reinvestment Act (Recovery Act) funds which it is using to accelerate systems deployment by over 2 years. Timeline: Start of acquisition (8/03); Initial operating capability (12/03); EDS test and evaluation (5/10); Award EDS procurement (1/11); Full operating capability (9/19). Program Essentials: Component: Transportation Security Administration (TSA); Major contractor(s): GE Homeland Protection, L-3 Communications, and Reveal; Fiscal year 2010 funding requested: $336 million; Program office workforce: 35 total government positions planned; 27 total government staff employed; 89 support contractors. Program Challenges: * Unapproved requirements; * Lack of approved program baseline and planning documents; * Technical problems. Performance (then-year dollars): Total acquisition cost: Initial estimate: $11,360 million[A]; Total acquisition cost: Latest estimate: $15,316 million[A]; Life-cycle cost estimate: Initial estimate: $19,930 million[A]; Life-cycle cost estimate: Latest estimate: $23,696 million[A]; Quantity: Initial estimate: Not applicable; Quantity: Latest estimate: Not applicable; Initial capability: Initial estimate: Dec. 2002; Initial capability: Latest estimate: Dec. 2003; Full capability: Initial estimate: Sept. 2029; Full capability: Latest estimate: Sept. 2019. [A] Note: Estimates submitted to the Office of Management and Budget for 2010 and 2011. Key Program Documents: Initial version of: Acquisition Program Baseline; Department approval date: Not yet approved. Initial version of: Mission Need Statement; Department approval date: Not yet approved. Initial version of: Operational Requirements Document; Department approval date: Not yet approved. Initial version of: Acquisition Plan; Department approval date: Not yet approved. Initial version of: Integrated Logistics Support Plan; Department approval date: Not yet approved. Electronic Baggage Screening Program: Background: The Electronic Baggage Screening Program has received substantial increases in funding since September 11, 2001. In addition to receiving large supplemental appropriations in recent years, the program received $700 million in Recovery Act funding to enhance current threat detection capabilities, increase the efficiency of the checked-baggage screening process, and contribute to the long-term development of a flexible security infrastructure capable of accommodating future growth. Program officials explained that requirements could change in response to emerging threats. The program does not directly fund research and development of new technology. Instead, DHS's Science and Technology Directorate or the Transportation Security Administration provide specifications to vendors, allow vendors to build the systems, and then run certification tests to verify that systems meet requirements. If systems qualify, they undergo operational testing at TSA's System Integration Facility. Performance: After a DHS review of the program's life-cycle cost estimate, program officials informed the DHS Acquisition Review Board in November 2009 that the current estimate of $24 billion (then-year dollars) needed more comprehensive detail and that its degree of accuracy could not be determined. Program officials expected a complete estimate validated by DHS in January 2010, after determining solutions for addressing emerging threats and equipment upgrades. Program officials said that other key program documents are moving forward in the approval process. The program intends to award contracts for a competitive procurement for Explosive Detection Systems screening technology by January 2011. Program officials indicated that the sole-source contracts used for legacy equipment were costly for the program. Program officials told us that vendors are expected to meet the minimum subset of the new detection requirements that include three different capability levels for detecting homemade explosives. Program officials reported that full capability will be reached when optimal solutions have been deployed at all airports. However, the time frame depends upon airport readiness and the ability of airports to fund their share of project costs. TSA provides funding for equipment purchase and installation and a portion of facility modification costs, while the airport contributes the remaining share of the funding. Challenges: Program officials indicated that some schedule delays have been caused by activities related to testing, including data collection activities, development of test sets, equipment availability, and test scheduling. Future delays could be caused by new threats leading to new requirements and a need for additional vendor development and testing. Program officials stated that currently they can only test new requirements based on the minimum level of detection required. Furthermore, a substantial portion of legacy equipment is now nearing the projected end of its useful life. In July 2009, the program reported that annual compliance costs and recapitalization expenses, when combined with recurring programwide costs, sometimes exceed the budget. In future years, program costs could grow significantly as cost estimates are reassessed to include new requirements. Additionally, the program has no department-approved program documents. Program Office Comments and Our Response: The program office provided technical comments on a draft of this assessment, which were incorporated as appropriate. Program officials commented that detection requirements changed in January 2010 as a result of a change in threats, rather than a failure to manage requirements changes. However, detection requirements are only a portion of program requirements, and the program does yet not have a department-approved baseline. [End of section] Transportation Security Administration: Passenger Screening Program: [Photograph: Source: Transportation Security Administration] The Passenger Screening Program tests, deploys, and sustains screening equipment to identify threats at airport terminal passenger screening checkpoints. The program relies primarily on commercial-off-the-shelf software technologies to meet requirements. Current Status: The Passenger Screening Program deploys next generation detection systems to address existing security gaps and detect a wider variety of threats (such as new explosive materials and nonmetallic weapons). The program received $300 million in American Recovery and Reinvestment Act (Recovery Act) funds to accelerate deployment of new equipment by more than 3 years. Timeline: Start of acquisition (9/03); Advanced Imaging Technology initial operating capability (3/10); Bottled Liquids Scanner full operating capability (6/11); Enhanced Metal Detector full operating capability (3/15); Explosives Trace Detector 2 full operating capability (6/15). Program Essentials: Component: Transportation Security Administration; Major contractor(s): Smiths Detection, Rapiscan, and L-3 Communications; Fiscal year 2010 funding requested: $155.1 million; Program office workforce: 20 total government positions planned; 16 total government staff employed; 32 support contractors. Program Challenges: * Unstable requirements; * Technical problems; * Sustainment funding. Performance (then-year dollars): Total acquisition cost: Initial estimate: $1,872 million[A]; Total acquisition cost: Latest estimate: $2,559 million[A]; Life-cycle cost estimate: Initial estimate: $2,593 million[A]; Life-cycle cost estimate: Latest estimate: $4,306 million[A]; Quantity: Initial estimate: Not applicable; Quantity: Latest estimate: Not applicable; Initial capability: Initial estimate: Dec. 2002; Initial capability: Latest estimate: Apr. 2006; Full capability: Initial estimate: Dec. 2009; Full capability: Latest estimate: June 2015. [A] Note: Estimates submitted to the Office of Management and Budget for 2010 and 2011. Key Program Documents: Initial version of: Acquisition Program Baseline; Department approval date: May 2006. Initial version of: Mission Need Statement; Department approval date: Sept. 2008. Initial version of: Operational Requirements Document; Department approval date: Not yet approved. Initial version of: Acquisition Plan; Department approval date: Not yet approved. Initial version of: Integrated Logistics Support Plan; Department approval date: Not yet approved. Passenger Screening Program: Background: The Transportation Security Administration reported meeting the statutory deadline for screening passengers and baggage in 2002, but with some capability shortfalls and the opportunity to improve effectiveness and efficiency of passenger screening checkpoints and equipment. Since fiscal year 2002, DHS invested over $921 million in airline passenger screening technologies. Program officials told us that ever-changing threats necessitate ongoing investment in new and improved technology, to provide the traveling public with optimal security screening benefits. The program is acquiring numerous advanced technological systems and testing and evaluating the systems based on detection and nondetection requirements. Systems need to detect explosives, fit within the constraints of existing airport floor space, and maintain passenger and baggage screening throughput requirements. In 2009, we reported that the Transportation Security Administration had been unable to assess the extent to which technology investments have reduced or mitigated the risk of terrorist attacks. We also reported that Explosives Trace Portals were deployed without resolving performance problems or validating operational requirements, and that these systems have not been proven to increase security at checkpoints. Explosive Trace Portals deployment was halted in June 2006 because of performance problems and high installation costs. Performance: DHS approved the program baseline in 2006; however, according to program officials, the requirements have been revised each year since 2001 due to rapidly changing technologies and threats. DHS asked the program manager to revise the life-cycle cost estimate to include long- term costs. The program is also revising its Acquisition Program Baseline to incorporate updated technologies. Four projects have not begun acquisition activities and an additional four are in the integration and testing phase. Achievement of full operating capability for the program was initially planned for 2009, but has been delayed until June 2015, due in part to changes in technologies. Challenges: Program officials reported they are not able to field new technologies quickly. The program must qualify new technology before the vendor can compete at the direct order level. They also noted that commercial-off- the-shelf technology may not address perceived threats to aviation. Program officials also said that poor test results of new technologies negatively affect the program because they cannot rapidly deploy new technology. According to program officials, it is sometimes difficult for detection systems to meet program requirements and vendors may require multiple attempts to pass tests because they lack access to restricted explosives. The accelerated deployment using the $300 million in Recovery Act funds”almost twice the amount of the program's budget request for fiscal year 2010”places increased demands on the program staff to meet the new schedule. Additionally, the program may not have the maintenance and system sustainment funds to support the accelerated deployment. Program Office Comments: Program office officials provided technical comments which were incorporated as appropriate. Program officials stated that certain key program documents did not previously require departmental approval and that the component has produced life-cycle cost estimates from product acquisition to disposal. However, they also told us that life-cycle cost estimates have not yet been validated. In addition, they stated new capability requirements are added within the existing program, rather than creating new programs as time progresses, which affects program schedule. [End of section] Transportation Security Administration: Secure Flight: [Photograph: Source: Transportation Security Administration] The Secure Flight program allows the Transportation Security Administration (TSA) to compare air passengers' information to Terrorist Screening Center watch lists for international and domestic flights. Aircraft operators collect passenger information and transmit the data to TSA. Secure Flight conducts automated comparisons for all passengers for whom data are submitted, and more than 99 percent will be cleared in advance of their arrival at the airport, according to program officials. Current Status: Program officials reported that Secure Flight achieved initial operating capability in January 2009, and planned to implement the program with all aircraft operators by December 2010. The program is currently in the process of deploying the system to airlines. Timeline: Start of acquisition (2/04); Preliminary design review (5/08); Critical design review (7/08); Production readiness review (12/08); Initial operating capability (1/09); Full operating capability (12/10). Program Essentials: Component: Transportation Security Administration; Major contractor(s): Infozen, Deloitte, and International Business Machines; Fiscal year 2010 funding requested: $85 million; Program office workforce: 113 total government positions planned; 113 total government staff employed; 187 support contractors. Program Challenges: * Unstable and unapproved requirements; * Cost growth; * Schedule delays; * Aircraft operator compliance. Performance (then-year dollars): Total acquisition cost: Initial estimate: $97 million[A]; Total acquisition cost: Latest estimate: $153 million[A]; Life-cycle cost estimate: Initial estimate: $685 million[A]; Life-cycle cost estimate: Latest estimate: $1,362 million[A]; Quantity: Initial estimate: Not applicable; Quantity: Latest estimate: Not applicable; Initial capability: Initial estimate: Dec. 2008; Initial capability: Latest estimate: Jan. 2009; Full capability: Initial estimate: Dec. 2009; Full capability: Latest estimate: Dec. 2010. [A] Note: Cost estimates submitted to the Office of Management and Budget for 2009 and 2011. Key Program Documents: Initial version of: Acquisition Program Baseline; Department approval date: Dec. 2006. Initial version of: Mission Need Statement; Department approval date: Oct. 2006. Initial version of: Operational Requirements Document; Department approval date: Not yet approved. Initial version of: Acquisition Plan; Department approval date: Apr. 2008. Initial version of: Integrated Logistics Support Plan; Department approval date: Not yet approved. Secure Flight: Background: Prior to the Secure Flight program, aircraft operators were responsible for screening passengers based on watch list data provided to airlines by the Transportation Security Administration. This resulted in inconsistent screening processes from airline to airline, as well as limited control over sensitive homeland security data after watch list information was distributed outside the U.S. government. When Secure Flight is fully implemented, it will provide passenger watch list matching for all covered airline flights, including flights into and out of the U.S., flights over the continental U.S., and international flights conducted by covered U.S. airlines. Secure Flight intends to provide more consistent matching, enhanced redress procedures, and improved privacy controls. In January 2009, Secure Flight started implementing the program with a small number of volunteer airlines and officials estimate full implementation with all covered aircraft operators by December 2010. Program officials estimate that Secure Flight will screen more than 2.5 million passengers daily at full capacity. We reported in May 2009 that Secure Flight had generally achieved 9 of 10 statutory requirements for the program, and had conditionally achieved the last requirement regarding reliable cost and schedule estimates. We have since concluded that the program has met the last requirement. Performance: The Secure Flight program achieved initial operating capability in January 2009, without significant delay to the milestone. However, the estimated date of full operating capability has slipped by a year, to December 2010. Program acquisition cost estimates have increased by $57 million, or 59 percent over 2 years. Life-cycle cost estimates have also increased by nearly 100 percent ($677 million). Secure Flight officials attribute schedule delays and cost growth to the program needing to increase total system capacity as a result of system requirements changes during the rulemaking process. As the program progressed, officials became more aware of the system size requirements and aircraft operator system capabilities, which led to cost increases for the volume and number of records to be processed. Also, program scope increased as the initial schedule did not include implementation with foreign airlines, according to officials. Challenges: In 2006, Secure Flight made significant changes in program requirements due to privacy and security concerns. Requirements have changed further since 2006, and only two of six performance requirements remained the same in the revised 2008 acquisition program baseline. For example, the program added requirements regarding the Service Center, the Secure Flight customer service center that provides resolution of airline operator inquiries. Program officials report the risk of aircraft operators not complying with the implementation schedule as the greatest program challenge. Officials said that they are working with aircraft operators on a daily basis to address schedule compliance. Some operators have expressed concern about meeting the schedule because of the complexity and the cost of system upgrade requirements. The program also faces risk with the Service Center government and contractor personnel not receiving timely security clearances. Program Office Comments and Our Response: Program officials emphasized that the cost increases and schedule delays since 2006 were due to expanded program scope and modification of the implementation strategy that resulted in rebaselining. They point out that cost growth has been minimal since the rebaselining in 2008. They noted that performance requirements were altered in 2008 to better measure the key metrics of quality for the program, but they do not think that this indicates requirements instability. [End of section] U.S. Coast Guard: Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR): [Illustration: Source: U.S. Coast Guard] The Coast Guard's Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) program is designed to be an interoperable network that combines information from Coast Guard assets and sensors, allowing the Coast Guard to see, comprehend, and communicate rapidly. Current Status: C4ISR is being developed incrementally: the first increment became operational in 2009, the second is currently in design development, and a third is in the "need" or requirements development phase. Timeline: Start of acquisition (6/02); Segment 1 initial operating capability (4/09); Segment 2, Spiral 1 preliminary design review (6/09) Segment 2, Spiral 1 critical design review (9/09); Full operating capability (2014). Program Essentials: Component: United States Coast Guard; Major contractor(s): Integrated Coast Guard Systems; Fiscal year 2010 funding requested: $35 million; Program office workforce: 38 total government positions planned; 32 government staff employed; 71 support contractors. Program Challenges: * Schedule delays; * Development risk; * Lack of approved requirements and acquisition planning documents. Performance (then-year dollars): Total acquisition cost: Initial estimate: $1,353 million[A]; Total acquisition cost: Latest estimate: $1,353 million[A]; Life-cycle cost estimate: Initial estimate: $1,353 million[A]; Life-cycle cost estimate: Latest estimate: $1,353 million[A]; Quantity: Initial estimate: Not applicable; Quantity: Latest estimate: Not applicable; Initial capability: Initial estimate: June 2007; Initial capability: Latest estimate: Apr. 2009; Full capability: Initial estimate: Sept. 2014; Full capability: Latest estimate: Sept. 2014. [A] Note: Cost estimates submitted to the Office of Management and Budget for 2009 and 2011. Key Program Documents: Initial version of: Acquisition Program Baseline; Department approval date: May 2007. Initial version of: Mission Need Statement; Department approval date: Apr. 2005. Initial version of: Operational Requirements Document; Department approval date: Not yet approved. Initial version of: Acquisition Plan; Department approval date: Not yet approved. Initial version of: Integrated Logistics Support Plan; Department approval date: Not yet approved. C4ISR: Background: The Coast Guard is currently developing an infrastructure for C4ISR that would introduce new sensors and communications systems in its future, as well as some existing, assets. As designed, this infrastructure will collect, integrate, and present information into a single common operating picture to facilitate mission execution. The Coast Guard is developing C4ISR in an evolutionary fashion, with more functionality and assets added in increments, also referred to as segments. Segment 2, which is currently in development, will produce two spirals of capability intended to correct issues found in Segment 1, update software to avoid obsolescence, and add some new functionality in the way that data are displayed, recorded, and managed. Program officials state that development of the third segment has been delayed due to funding constraints, although development of capabilities for key assets, such as the Offshore Patrol Cutter, will continue. Performance: According to program officials, the Coast Guard lacked visibility into the software development processes and the requirements used by Integrated Coast Guard Systems as a basis for Segment 1 development. According to Coast Guard and contractor officials, costs grew as the Coast Guard refined requirements to better meet their needs. Although development and acquisition of C4ISR continues, DHS continues to reevaluate and review C4ISR requirements, schedule, and costs. Despite the lack of a department-approved acquisition program baseline, the Coast Guard approved an acquisition strategy and awarded a contract” authorized by DHS”for the design and development of Segment 2, which includes options for up to $78 million worth of work through 2011. Challenges: According to program officials, the timely completion of acquisition documentation is one of their challenges, especially as responsibility for development shifts from Integrated Coast Guard Systems to the Coast Guard, and could result in delays to future contract awards and schedule. A second challenge is the dependence of requirements for Segment 3 on the development of the Offshore Patrol Cutter. C4ISR could be at risk of schedule delays if the Offshore Patrol Cutter does not develop as anticipated. A second challenge reported by program officials is the ability to keep communications secure, especially in transferring classified information. To maintain this capability, the Coast Guard must upgrade key software and systems to remain in compliance with the regulations of the agencies maintaining the architecture for secure communications. If not planned and executed properly, the need for upgrades to, or replacement of, key systems could result in cost growth that delays the delivery of future capabilities. To facilitate timely system upgrades and replacement, Coast Guard officials state that they have obtained all the necessary data rights and software code for Segment 1, and intend to develop future increments of capability in a manner allowing the Coast Guard to support C4ISR systems. Program Office Comments and Our Response: The program office provided technical comments, which were incorporated as appropriate. Program officials indicated in their comments that the planned full operating capability date for C4ISR has been delayed to fiscal year 2018. However, the most recent Coast Guard Quarterly Acquisition Report to Congress indicates the date as 2014. [End of section] U.S. Coast Guard: Maritime Patrol Aircraft: [Photograph: Source: Integrated Coast Guard Systems] The Maritime Patrol Aircraft is intended to be a transport and surveillance, fixed-wing aircraft used to perform search and rescue missions, enforce laws and treaties, and transport cargo and personnel. The aircraft is to use the Mission System Pallet, a suite of electronic equipment designed to provide the aircraft with improved surveillance sensors and operational awareness, to complete homeland security and other missions. Current Status: The program plans to procure 36 aircraft. Eight of the 11 aircraft under contract were delivered, and 9 more have been approved for low- rate production. The program expects to have its full-rate production decision after the completion of operational test and evaluation, in fiscal year 2012. Timeline: Start of acquisition (5/03); Preliminary design review (12/04); Critical design review (6/05); Production readiness review (2/06); Initial operating capability (4/09); Operational testing completed (9/12); Full operating capability (9/20). Program Essentials: Component: United States Coast Guard; Major contractor(s): Integrated Coast Guard Systems; Fiscal year 2010 funding requested: $175 million; Program office workforce: 7 total government positions planned; 5.5 total government staff employed; 1 support contractor. Program Challenges: * Planning significant procurement before completion of operational testing; * Understaffing; * Lacking approved requirements and planning documents. Performance (then-year dollars): Total acquisition cost: Initial estimate: $1,706 million[A]; Total acquisition cost: Latest estimate: 2,223 million[A]; Life-cycle cost estimate: Initial estimate: $22,773 million[A]; Life-cycle cost estimate: Latest estimate: $12,285 million[A]; Quantity: Initial estimate: 36; Quantity: Latest estimate: 36; Initial capability: Initial estimate: Dec. 2007; Initial capability: Latest estimate: Apr. 2009; Full capability: Initial estimate: Sept. 2016; Full capability: Latest estimate: Sept. 2020. [A] Note: Estimates based on May 2007 baseline and Dec. 2009 U.S. Coast Guard Quarterly Report to Congress. Key Program Documents: Initial version of: Acquisition Program Baseline; Department approval date: Feb. 2009. Initial version of: Mission Need Statement; Department approval date: Apr. 2005, Initial version of: Operational Requirements Document; Department approval date: Not yet approved. Initial version of: Acquisition Plan; Department approval date: Not yet approved. Initial version of: Integrated Logistics Support Plan; Department approval date: Not yet approved. Maritime Patrol Aircraft: Background: The Maritime Patrol Aircraft program plans to procure and maintain 36 aircraft, each equipped with a Mission Systems Pallet. Initially part of the Deepwater program, in February 2009, DHS approved a separate acquisition program baseline for the program. In that same month, the Coast Guard submitted a test plan to DHS with the intent of obtaining approval for full-rate production based on the results of a November 2008 operational assessment. In April 2009, the DHS Director, Operational Test and Evaluation, approved the plan for testing leading up to initial operational test and evaluation, but required the Coast Guard to update and resubmit the plan before operational testing begins. DHS and Coast Guard policy require operational testing to be conducted before approval of full-rate production. The Coast Guard has made a significant investment in this program before operational testing can demonstrate that what it is buying meets Coast Guard needs. Performance: According to the February 2009 Program Baseline document, the program is 4 years behind schedule for delivering full capability, due to aircraft and mission system pallet cost increases, delays in the mission system pallet, and funding limitations. However, the program is currently on schedule to procure 16 aircraft by fiscal year 2014. Should the schedule slip further, the service life of the legacy aircraft may be extended, which may lead to additional legacy aircraft sustainment costs. Challenges: With 8 of 36 Maritime Patrol Aircraft delivered, and another 3 under contract, the Coast Guard has made a significant investment before testing can demonstrate that the product meets Coast Guard needs. The Coast Guard plans to procure 16 aircraft by the end of fiscal year 2014. According to the senior official responsible for managing aviation assets, budget constraints may limit the total amount procured on low- rate production contracts to 17 of 20 aircraft. DHS has not approved the operational requirements for the program, which could increase the risk of having an unrealistic program baseline. Further, the Coast Guard manages the program with 5.5 full-time equivalent government staff and one support contractor. Program Office Comments: The program office provided technical comments on a draft of this assessment, which were incorporated as appropriate. In March 2010, program officials said that the program's latest life-cycle cost estimate is $23,879 million, $11,594 million more than reported to Congress in December, 2009. Program officials also said that the program's Acquisition Plan and requirements documents were Coast Guard approved in accordance with relevant guidance at the time of their approvals. Program officials told us the program office workforce is assisted by staff working for other Coast Guard offices, including staff at the Aviation Logistics Center, the Aviation Training Center, and various Coast Guard technical authorities on integrated product teams. [End of section] U.S. Coast Guard: National Security Cutter: [Photograph: Source: U.S. Coast Guard] The Coast Guard's National Security Cutter is intended to be the flagship of the Coast Guard's fleet. The 418-foot cutter is designed to achieve a 12,000 nautical mile range and to provide an extended on- scene presence and the capability to perform long transits and forward deployment. The cutter and its aircraft and boat assets are to operate worldwide. Each cutter is expected to have a 30 year service life. Current Status: Two of the eight cutters have been delivered and the Coast Guard expects operational testing to be complete by September 2011. Delivery of full operating capability is expected in 2018”more than 3 years later than initially planned. Timeline: Start of acquisition (7/02); Preliminary design review (3/03); Critical design review (6/03); Production readiness review (5/04); Initial operating capability (6/08); Operational assessment (4/10); Operational testing completed (9/11); Full operating capability: (6/18). Program Essentials: Component: United States Coast Guard; Major contractor(s): Integrated Coast Guard Systems; Fiscal year 2010 funding requested: $281.5 million; Program office workforce: 50 total government positions planned; 50 total government staff employed; 29 support contractors. Program Challenges: * Limitations in operational performance; * Insufficient support assets; * Lacking approved operational requirements and planning documents. Performance (then-year dollars): Total acquisition cost: Initial estimate: $3,450 million[A]; Total acquisition cost: Latest estimate: $4,749 million[A]; Life-cycle cost estimate: Initial estimate: $22,998 million[A]; Life-cycle cost estimate: Latest estimate: $24,277 million[A]; Quantity: Initial estimate: 8; Quantity: Latest estimate: 8; Initial capability: Initial estimate: Sept. 2008; Initial capability: Latest estimate: June 2008; Full capability: Initial estimate: Sept. 2014; Full capability: Latest estimate: June 2018. [A] Note: Estimates based on 2006 baseline and 2009 U.S. Coast Guard Quarterly Report to Congress. Key Program Documents: Initial version of: Acquisition Program Baseline; Department approval date: May. 2007. Initial version of: Mission Need Statement; Department approval date: Apr. 2005. Initial version of: Operational Requirements Document; Department approval date: Not yet approved. Initial version of: Acquisition Plan; Department approval date: Not yet approved. Initial version of: Integrated Logistics Support Plan; Department approval date: Not yet approved. National Security Cutter: Background: The National Security Cutter program is projected to take delivery of a total of eight cutters between 2008 and 2018 and operate them for 30 years. In May 2008, the Coast Guard took delivery of the first-in- class Bertholf, and took delivery of the second-in-class Waesche in November 2009. In 2002, the Coast Guard awarded a contract to Integrated Coast Guard Systems to produce and manage the National Security Cutter and other Deepwater assets as systems integrator. After a series of project failures, the Coast Guard announced in April 2007 that it would take over the system integrator role for all Deepwater assets, including the National Security Cutter. DHS subsequently approved an acquisition program baseline for the Cutter separate from other Deepwater projects in December 2008. Performance: The Cutter program has experienced significant cost growth, which the program partially attributes to changes in economic factors, such as labor and commodity prices and international currency exchange rate fluctuations. Program officials stated that completion of operational testing and evaluation has been delayed by a year beyond the initially estimated date to allow for extended testing. The eighth and final cutter, planned for 2014 in the original baseline, is now expected to be fully operational in June 2018 based on current production plans. Challenges: According to Coast Guard officials, the cutters face deficiencies that need to be addressed before the first and second cutters can be certified as fully operational, currently planned for the fourth quarter of fiscal year 2011 for the first-in-class Bertholf. The cutters currently lack a shipboard classified information facility required for participation in certain Department of Defense missions and exercises. According to the Coast Guard, installation of this facility is meeting schedule goals. However, as of July 2009, full installation of sub-systems that aid the movement of helicopters into the Cutter's two hangars was not yet complete, as the helicopters accompanying the Cutter had not yet been modified to use this subsystem. Additionally, the Coast Guard plans to deploy the first cutter without unmanned aircraft”key support assets intended to operate with the National Security Cutter. The Coast Guard is conducting an analysis of alternatives to address this issue and also assessing a Navy unmanned helicopter. Continued delays in the delivery of these assets will result in the cutter's operating with less capability than originally planned. Operational requirements and acquisition planning documents are not yet DHS approved, although they have been approved by the Coast Guard. Program Office Comments: The program office provided technical comments on a draft of this assessment, which were incorporated as appropriate. Program officials stated that key program documents did not require departmental approval at the time they were created. They reported the Coast Guard approved the program baseline and requirements documents in 2005-2006 and the Acquisition Plan in 2008. [End of section] U.S. Coast Guard: Rescue 21: [Illustration: Source: U.S. Coast Guard] Rescue 21 is an advanced command, control, and communications system designed to improve the Coast Guard's ability to execute all missions in the coastal zone, and is essential to its search and rescue mission. The system seeks to leverage technology to more accurately locate distress calls, enhance distress call clarity, reduce coverage gaps, and provide significantly increased operational availability. Current Status: The Rescue 21 program is currently deployed in 24 out of 39 locations. The program plans to deliver full capability at all locations by the end of fiscal year 2017, 9 years later than the date established in its 2005 program baseline. Timeline: Start of acquisition (9/02); Developmental test and evaluation (2/05); Operational test and evaluation (3/05); Initial operating capability (9/06); Low-rate initial production (12/06); Western Rivers project deployed (9/12); Full operating capability (9/17). Program Essentials: Component: United States Coast Guard; Major contractor(s): General Dynamics C4 Systems; Fiscal year 2010 funding requested: $117 million; Program office workforce: 71 total planned government positions; 65 total government staff employed; 15 support contractors. Program Challenges: * Cost growth; * Tower availability; * Technical problems; * Risk of technology becoming obsolete. Performance (then-year dollars): Total acquisition cost: Initial estimate: $827 million Total acquisition cost: Latest estimate: $1,067 million Life-cycle cost estimate: Initial estimate: $1,639 million Life-cycle cost estimate: Latest estimate: $2,693 million Quantity: Initial estimate: 46; Quantity: Latest estimate: 39; Initial capability: Initial estimate: Sept. 2005; Initial capability: Latest estimate: Sept. 2006; Full capability: Initial estimate: Sept. 2008; Full capability: Latest estimate: Sept. 2017. [A] Note: Estimates submitted to the Office of Management and Budget for 2009 and 2011. Key Program Documents: Initial version of: Acquisition Program Baseline; Department approval date: Apr. 2006; Initial version of: Mission Need Statement; Department approval date: Not yet approved. Initial version of: Operational Requirements Document; Department approval date: Not yet approved. Initial version of: Acquisition Plan; Department approval date: Not yet approved. Initial version of: Integrated Logistics Support Plan; Department approval date: Not yet approved. Rescue 21: Background: Rescue 21 is replacing antiquated communications systems used to monitor the international distress frequency, coordinate rescue operations, and communicate with vessels. The program is deploying systems to 39 locations across the United States. The program's contract with the prime contractor covers 34 locations and is scheduled to end in fiscal year 2012. The Coast Guard is currently the system integrator for the Ohio River Valley, the Lower Mississippi, Upper Mississippi, and two Alaska locations. DHS decided not to exercise additional contract options because the contractor's system would require extensive modifications to work at remote Alaska sites, and the Coast Guard had experience maintaining legacy systems fielded before Rescue 21. Performance: Rescue 21 has experienced significant cost growth and delays. Since its initial cost estimate under DHS in 2003, total program costs increased by 131 percent. Achievement of full operating capability has been delayed by 9 years since 2005. The program identified several factors contributing to cost growth, including: underestimation of costs for program management, deployment, operations, and maintenance; schedule delays; a 6-year extension of the system's planned useful life to 2027; and an unfunded mandate related to protocols and standards requirements. Changes in out-year funding projections required the program to modify its deployment tactic, resulting in schedule delays. According to program officials, Rescue 21's direction finding capability”which allows the Coast Guard to locate boaters in distress” is only possible in approximately one-third of the 65 tower sites in the Alaska region. However, we have previously reported that the direction-finding capability is more accurate and more reliable than the legacy system, so regions lacking direction finding capability will continue to be at risk of performing larger and potentially more costly searches. Challenges: The Coast Guard is facing unanticipated challenges at some fielded antenna tower sites. These challenges include availability of towers, tower leasability, environmental concerns, electronic interference with other communication systems, and telephone system outages. Program officials acknowledge that challenges related to selecting future antenna tower sites may put the program at risk of additional schedule delays. Each site has unique factors being addressed individually by the program. Program officials said they must continually stay abreast of external technology standards in order for the system to continue to operate properly. According to officials, the program monitors technology standards in order to mitigate any risk of the program not keeping up with standards changes and has attempted to build related costs into program cost estimates. The program reported that its operational requirements and acquisition planning documents have been approved by the Coast Guard, although they have not yet received DHS approval. Program Office Comments: The program office provided technical comments on a draft of this assessment, which were incorporated as appropriate. Program officials stated that Rescue 21's key program documents did not require DHS approval at the time they were created. Program officials also said that the Rescue 21 system is mature and operational, and that the program's remaining challenge is related to technical standards, rather than system technical problems. [End of section] U.S. Coast Guard: Response Boat-Medium: [Photograph: Source: U.S. Coast Guard] The Response Boat-Medium replaces aging 41-foot utility boats and other larger nonstandard boats to perform the Coast Guard's missions of Search and Rescue, law enforcement, drug and migrant interdiction, and homeland security. The boats will operate along the coasts of the United States and its territories, as well as in larger lakes and rivers. Current Status: The program has completed operational testing and evaluation of the boats and has achieved initial operating capability and entered full rate production. During full production, the program plans to order 30 boats per year contingent upon program funding. Timeline: Start of acquisition (6/06); Critical design review (7/07); Production review (7/07); First asset delivered (3/08); Initial operating capability (4/10); Full operating capability (9/15). Program Essentials: Component: United States Coast Guard Major contractor(s): Marinette Marine Corp. Fiscal year 2010 funding requested: $103 million; Program office workforce: 63 total government positions planned; 40 total government staff employed; 31 support contractors. Program Challenges: * Funding issues; * Understaffing; * Acquisition strategy risks. Performance (then-year dollars): Total acquisition cost: Initial estimate: $401 million[A]; Total acquisition cost: Latest estimate: $610 million[A]; Life-cycle cost estimate: Initial estimate: $1,210 million[A]; Life-cycle cost estimate: Latest estimate: $1,419 million[A]; Quantity: Initial estimate: 180; Quantity: Latest estimate: 180; Initial capability: Initial estimate: Sept. 2008; Initial capability: Latest estimate: Apr. 2010; Full capability: Initial estimate: Sept. 2013; Full capability: Latest estimate: Sept. 2015. [A] Note: Estimates based on 2005 baseline and 2009 U.S. Coast Guard Quarterly Report to Congress. Key Program Documents: Initial version of: Acquisition Program Baseline; Department approval date: Sept. 2006. Initial version of: Mission Need Statement; Department approval date: Not yet approved. Initial version of: Operational Requirements Document; Department approval date: Not yet approved. Initial version of: Acquisition Plan; Department approval date: Not yet approved. Initial version of: Integrated Logistics Support Plan; Department approval date: Not yet approved. Response Boat-Medium: Background: The Response Boat-Medium program, authorized in 2002, plans to procure 180 medium-size boats intended to replace the aging 41-foot Utility boat, as well as other nonstandard large boats in the Coast Guard fleet. While the 41-foot Utility boat was designed to primarily engage in Search and Rescue missions, the Response Boat-Medium will have greater speed and range than its predecessor to fulfill expanding operations in Ports, Waterways and Coastal Security consistent with homeland security needs. The Coast Guard has awarded a contract to Marinette Marine Corporation to produce the boats at facilities in Kent, Washington, and Green Bay, Wisconsin. The program had ordered 66 boats as of September 2009, and the program reports receiving delivery of 16 boats. The program expects to reach full operating capability by the end of fiscal year 2015. Performance: According to Coast Guard officials, the new boats have successfully met all technical requirements such as speed and range. While there have been some modifications to boats, the program considers them minor, and reports that costs of modifications have been within the change order budget. For example, the program found performance issues in air conditioning systems and seat design. The program's projected acquisition costs grew $209 million (52 percent) from the initial estimate. Program officials attribute the increase to contract costs, among others. The program awarded the prime contract after the initial estimate, and the award price was higher than originally projected. Logistics planning expenses also increased over original estimates. Program officials reported that they had planned to revise the life-cycle cost estimate before making a full production decision in December 2009, and they expect further cost growth related to maintenance and personnel expenses not included in the current estimate. Currently 2 years behind schedule, the program has also experienced significant schedule delays. Program officials attribute the schedule delays to bid protests that delayed the contract award. Challenges: With over one-third of boats ordered as of September 2009, the program has made a substantial investment before the completion of operational testing. The program reports that initial testing results have been positive with no major design issues identified. Program officials reported a shortage of government staff to support full-rate production. For example, the Green Bay production facility has been understaffed, and the program has used contractors to meet needs where possible. The contract includes terms to increase unit price if the program does not order a minimum number of boats in a given year, according to officials. Program officials indicated they have not incurred any price increases for late orders, but there is a risk that future-year budgets will not be sufficient to maintain the order schedule. The program schedule could also slip if the program does not order a minimum number of boats. Program Office Comments and Our Response: Program officials stated that Response Boat-Medium completed operational testing and evaluation in December 2009, and has entered full-rate production. They stated that required personnel for full- rate production have been approved and the Green Bay production facility is now appropriately staffed. However, program office data show that the program remains understaffed. Program officials stated that key program documents did not require departmental approval at the time they were approved. The program provided us with a revised cost estimate, approved by the Coast Guard in January 2010 that shows life-cycle costs increased to over $2 billion. The cost increase is primarily due to operating crew personnel costs previously not included in life-cycle estimates, as well as increased fuel costs. [End of section] U.S. Coast Guard: Sentinel Class Patrol Boat: [Photograph: Source: Bollinger Shipyards, Inc.] The Sentinel class patrol boat, previously known as the Fast Response Cutter, is conceived as a patrol boat with high readiness, speed, adaptability, and endurance to perform a wide range of missions. After terminating previous design efforts under a systems integrator, the Coast Guard pursued acquisition of a modified, commercially available patrol boat. The Sentinel class will replace the legacy 110 foot patrol boats. Current Status: In December 2009 the Coast Guard awarded a contract for three low-rate production boats, bringing the total number of boats under contract to four. Delivery is scheduled to begin in December 2011 with 58 boats planned at a total acquisition cost of $3.9 billion. Timeline: Start of acquisition (9/08); Preliminary design review (4/09); Critical design review (11/09); Low-rate production decision (12/09); Initial operating capability (12/12); Full operating capability (9/22). Program Challenges: * Cost increases; * Schedule delays; * Test and integration risks; * Lack of approved requirements. Program Essentials: Component: United States Coast Guard; Major contractor(s): Bollinger Shipyards; Fiscal year 2010 funding requested: $243 million; Program office workforce: 14 total government positions planned; 13 total government staff employed; 11 support contractors. Performance (then-year dollars): Total acquisition cost: Initial estimate: $3,206 million[A]; Total acquisition cost: Latest estimate: $3,928 million[A]; Life-cycle cost estimate: Initial estimate: $22,256 million[A]; Life-cycle cost estimate: Latest estimate: $14,475 million[A]; Quantity: Initial estimate: 58; Quantity: Latest estimate: 58; Initial capability: Initial estimate: Sept. 2011; Initial capability: Latest estimate: Dec. 2012; Full capability: Initial estimate: Sept. 2016; Full capability: Latest estimate: Sept. 2022. [A] Note: Estimates based on 2007 baseline and 2009 U.S. Coast Guard Quarterly Acquisition Report to Congress. Key Program Documents: Initial version of: Acquisition Program Baseline; Department approval date: May 2007. Initial version of: Mission Need Statement; Department approval date: Apr. 2005. Initial version of: Operational Requirements Document; Department approval date: Not yet approved. Initial version of: Acquisition Plan; Department approval date: Oct. 2009. Initial version of: Integrated Logistics Support Plan; Department approval date: Not yet approved. Sentinel Class Patrol Boat: Background: In February 2008, the Coast Guard terminated the original patrol boat designs proposed by Integrated Coast Guard Systems, the primary contractor for Deepwater, after approximately $39 million had been allocated. Since the need for a new patrol boat was pressing, the Coast Guard pursued acquisition of a modified commercially available patrol boat with similar performance capabilities to the original design”now known as the Sentinel class patrol boat. In December 2009, after Department of Homeland Security (DHS) authorization, the Coast Guard awarded a contract to Bollinger Shipyards for low-rate initial production of three boats, bringing the total number of boats on contract to four. Performance: The project is currently estimated at approximately $722 million over its original $3.2 billion baseline for acquisition cost, though the number of planned boats has not changed. According to program officials, the estimated life-cycle cost has decreased by over $7.8 billion due to an adjustment of the expected service life and use of actual costs for support. Previous estimates for service life of the two proposed Integrated Coast Guard Systems designs were 35 years and 15 years. The Sentinel class is expected to have a service life of 20 years, which reduces the years in service overall and, therefore, the costs expected over the life cycle. Due to program restructuring and contract delays, the project has experienced delays in the achievement of both initial and full operating capability. Challenges: Because of the pressing need for the Sentinel class patrol boats, the Coast Guard awarded a design and construction contract for the first patrol boat before completing all the acquisition reviews and documentation required. According to Coast Guard officials, DHS reviewed the operational requirements document for Sentinel in December 2009, prior to authorization and award of the low-rate initial production contract, but further revisions are necessary before approving the document. The Coast Guard acknowledges that due to its accelerated schedule the Sentinel class program faces testing, integration, and software challenges. Currently the Coast Guard plans to place on contract up to 15 boats before completing operational testing and evaluation. This could lead to expensive changes to the design once production has begun if significant weaknesses are found in testing, a challenge the Coast Guard acknowledges and expects to mitigate through the design and review processes. Though the Coast Guard uses an existing design for the Sentinel class, there may be challenges with integrating the required sensors and antennae in a way that minimizes interference. The Navy's Naval Surface Warfare Center in Dahlgren, Virginia, will assess the placement of the sensors and antennae and provide recommendations to the Coast Guard to mitigate this problem. The Coast Guard's plan to use existing government command and control software to utilize many of these sensors may result in software and hardware integration challenges. To address this challenge, the Coast Guard plans to test the software on two operational mock-ups prior to installation. Program Office Comments: The operational requirements document for the Sentinel class patrol boat received approval from the Coast Guard in September 2009 and DHS in March 2010. Other technical comments were incorporated as appropriate. [End of section] Agency Comments and Our Evaluation: We provided a draft of this report to DHS for review and comment. DHS generally concurred with our findings, citing the review of actions taken and efforts under way to improve the acquisition review process, particularly the development and implementation of the department's acquisition management directive. The department's comments are reprinted in appendix II. DHS also provided technical comments which we incorporated as appropriate and where supporting documentation was provided. DHS provided specific comments on four areas of our findings, as follows. With regard to our review of DHS's acquisition oversight, DHS noted that we reported that more than 40 major programs have not yet been reviewed by the ARB, and stated that the department complemented the ARB process with a portfolio review process used for 61 of 67 major acquisition programs in fiscal year 2009, which were used to prioritize programs for ARB reviews. We acknowledge in our report that in order to provide some level of departmental oversight for major programs not yet reviewed by the ARB, DHS acquisition oversight staff worked with selected components to conduct these portfolio reviews. However, it is important to observe that these portfolio reviews do not take the place of formal ARB reviews, do not include the senior officials who comprise the ARB, and are not part of the acquisition review process as described in DHS's acquisition management directive. In response to a point in the report indicating that DHS may waive some oversight requirements on a case-by-case basis, without clear criteria, for programs that have passed certain phases, DHS stated that flexibility was built into the acquisition review process to allow programs to tailor some documentation requirements. DHS further commented that this "tailoring criterion provides clear (albeit not explicit) guidance" to program managers and the Acquisition Program Management Division. However, DHS did not provide any examples of how these requirements are tailored or how these waivers are applied and documented, and we have no evidence that this is clearly understood by program managers. With regard to our statement that acquisition management processes do not inform budget decisions as required by DHS policy, the department stated that they designed acquisition policy to "interlink" with both the budgeting and strategic requirements key decision processes. Specifically, the Acquisition Program Management Division participates in the budget formulation process. We agree that this is positive collaboration. However, we reported in 2008 that DHS's previous investment review process also highlighted links to the budget, yet the results of oversight reviews did not consistently inform budget decisions. While DHS's interim acquisition management directive more clearly creates a link between the budget and requirements processes, DHS has not provided evidence that budget decisions are informed by the acquisition review process. Further, DHS has not yet reestablished the Joint Requirements Council, which the department's revised acquisition management directive states should inform the department's budget decisions in order to deliver needed capabilities to end users. With regard to our analysis of program cost, DHS stated that we chose to use OMB's Exhibit 300 data for the programs we reviewed in lieu of life-cycle cost estimates. DHS further stated that the Exhibit 300 data are based on the approved budget for a particular program, and most of these data for existing DHS programs are not based on validated cost estimates. Therefore, DHS believes that there is a likelihood of significant error in cost growth comparisons and analyses using these data. We explain in our analysis in the report that we used the official Exhibit 300 data DHS reports to OMB because DHS expressed concerns about the cost data programs reported to us in our data collection instrument, and DHS was unable to provide us with one consistent source for acquisition and life-cycle cost estimates. The Exhibit 300 data, as part of the executive branch capital planning process, are designed to meet the requirement for reports to the Congress to ensure reliable business cases for investments[Footnote 47] and the data reported are intended to represent valid acquisition and life-cycle cost estimates. Our analysis of cost growth provides insights into how planned investment amounts for some acquisitions have significantly increased over time, which can result in insufficient funding to fulfill future mission requirements. While DHS has made recent progress in clarifying acquisition oversight processes, much remains to be done to ensure proper implementation and departmentwide coordination. Managing hundreds of billions of dollars of investments to maximize resources and effectively meet critical homeland security missions will require DHS to ensure consistent oversight, evaluation of affordability and trade-offs, and accurate cost estimates for making investment decisions. We are sending copies of this report to interested congressional committees, the Secretary of Homeland Security, and the Director of the Office of Management and Budget. In addition, the report will be available at no charge on GAO's Web site at [hyperlink, http://www.gao.gov] . If you or your staff have questions about this report, please contact me at (202) 512-4841 or huttonj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Principal contributors to this report were Amelia Shachoy, Assistant Director; Sean Seales; Celina Davidson; Daniel Novillo; LeAnna Parkey; Nathan Tranquilli; J. Kristopher Keener; Kenneth Patton; Sylvia Schatz; Morgan Delaney Ramaker; and Robert Swierczek. Signed by: John P. Hutton, Director: Acquisition and Sourcing Management: List of Addressees: The Honorable Joseph I. Lieberman: Chairman: The Honorable Susan M. Collins: Ranking Member: Committee on Homeland Security and Governmental Affairs: United States Senate: The Honorable Frank R. Lautenberg: Interim Chairman: Subcommittee on Homeland Security: Committee on Appropriations: United States Senate: The Honorable Claire C. McCaskill: Chairman: Ad Hoc Subcommittee on Contracting Oversight: Committee on Homeland Security and Governmental Affairs: United States Senate: The Honorable Bennie G. Thompson: Chairman: Committee on Homeland Security: House of Representatives: The Honorable Edolphus Towns: Chairman: The Honorable Darrell E. Issa: Ranking Member: Committee on Oversight and Government Reform: House of Representatives: The Honorable David E. Price: Chairman: The Honorable Harold Rogers: Ranking Member: Subcommittee on Homeland Security: Committee on Appropriations: House of Representatives: The Honorable Gus M. Bilirakis: Ranking Member: Subcommittee on Management, Investigations, and Oversight: Committee on Homeland Security: House of Representatives: [End of section] Appendix I: Objectives, Scope and Methodology: Our objectives were to (1) provide an update on DHS's efforts to implement acquisition oversight for all acquisitions; (2) describe acquisition performance and common challenges across selected programs; and (3) provide individual profiles for each of the selected programs. To provide an update on acquisition oversight, we reviewed the department's interim acquisition management directive that was in effect during the period of our review--Acquisition Management Directive 102-01--and related guidance, and we identified whether fiscal year 2009 oversight activities for all 67 major acquisition programs were completed in accordance with the directive. To do this, we collected and analyzed Acquisition Review Board (ARB) decision memorandums, summary tracking documents, and program documents for key decision events for major acquisitions. We identified ARB decision memorandum action items, and characterized and identified the status of those items. We also reviewed recommendations from our prior work and the status of their implementation. To obtain a better understanding of departmental oversight initiatives, we interviewed officials responsible for acquisition oversight, including representatives of the Chief Procurement Officer's Acquisition Program Management and Cost Analysis Division, the Office of Policy's Screening Coordination Office, and the Science and Technology Directorate's Test & Evaluation and Standards Division. To learn more about component-level oversight, we reviewed which components had nominated and received departmental approval of Component Acquisition Executives (CAE), and we interviewed acquisition officials at the six components in our review--Customs and Border Protection, Federal Emergency Management Agency, National Protection and Programs Directorate, Office of Health Affairs, Transportation Security Administration, and the United States Coast Guard--about their acquisition policies and practices, staffing, departmental coordination, and relevant challenges. We did not, however, specifically assess the extent to which the department's acquisition guidance is consistent with best practices. To describe acquisition performance and common challenges and to profile selected programs, we took several steps. We selected 18 programs across six components--16 major acquisition programs, as well as 2 smaller programs critical to DHS's mission--based on several factors, including total projected funding for fiscal years 2007 through 2012, current stage in the DHS acquisition life cycle, and relevance to front-line homeland security missions. The 18 programs selected represent about $100 billion in life-cycle costs and about $38 billion in acquisition costs. The analysis of acquisition performance and common challenges across the selected programs focused on 15 programs. We did not include in this analysis two nonmajor programs, which are not subject to the same requirements as major programs--Biosurveillance Common Operating Network and the Integrated Public Alert and Warning System--and one major program that had not started acquisition activities at the time of our review, BioWatch Generation-3. The profiles of the selected programs include all 18 programs selected for our review. To evaluate the program data, we drew on criteria from our prior work on acquisition management, including the methodologies we used for assessments of Department of Defense (DOD) and the National Aeronautics and Space Administration (NASA) programs;[Footnote 48] acquisition guidance from DHS and other federal agencies; and OMB's guidance on capital planning.[Footnote 49] We also reviewed relevant GAO and DHS Inspector General reports on the selected acquisitions. Data Collection and Limitations: To collect program data, we developed a standardized data collection instrument (DCI) for key data on performance and challenges for the selected programs, and we met with the program offices to clarify data requested in advance of completion. The DCI was organized by categories including program contracts; issues; cost; schedule; requirements; staffing; technology; design; and software. To confirm the DCI data, we reviewed available official documents from each program, including: the Acquisition Program Baseline; Acquisition Plan; Acquisition Decision Memorandums; Program Management Review and other relevant briefings; cost performance or Earned Value Management reports; and Integrated Master Schedule. To learn more about program data and issues, we interviewed program officials for each of the 18 programs we reviewed. Because DHS acquisition oversight officials expressed concerns about the reliability of the cost data reported by program offices in the DCI, we also researched DHS Exhibit 300 cost data reported to OMB as part of the executive branch capital planning process.[Footnote 50] For four Coast Guard programs,[Footnote 51] we also reviewed the Coast Guard's Quarterly Acquisition Reports to Congress and Acquisition Program Baselines to obtain the best available data. We based our analysis on these sources as they represented more complete and official data used for making important planning and budgeting decisions. In addition, not all programs reported data for all of the categories in the DCI because some requested data did not apply to the program, or the program could not obtain the requested data. We excluded these programs from certain analyses. DCI information was self-reported by the program offices, and we did not independently verify the data provided, but we took appropriate steps to address data reliability including reviewing related documentation; interviewing knowledgeable agency officials; testing of data; and reviewing related internal controls. Those data that were found to be sufficiently reliable were used to report on the condition of selected DHS acquisition programs. Findings from program data analysis cannot be generalized to the total DHS portfolio of acquisition programs. All data was current as of 2009, with the exception of latest estimates of program costs obtained from OMB Exhibits 300, which were current as of January or February 2010. Cost and Schedule Analysis: To assess cost and schedule performance across the selected DHS major programs, we aggregated official program data and compared initial cost and schedule estimates to latest available estimates. We used initial cost and schedule estimates since 2003, after the creation of DHS, although some of the 18 programs were initiated by other federal agencies prior to 2003. All cost data are presented in nominal "then year" dollars consistent with cost data available from OMB Exhibit 300s, the Coast Guard's Quarterly Acquisition Reports to congressional appropriations committees, and official Acquisition Program Baselines. [Footnote 52] BioWatch Generation-3, which had not started acquisition activities at the time of our review, and two nonmajor programs in our review--Biosurveillance Common Operating Network and Integrated Public Alert and Warning System--were excluded from the overall analysis. To assess schedule performance, we calculated the average delay from initial to latest estimates for Initial Operating Capability (IOC) and Full Operating Capability (FOC) for all selected programs having available data. Initial capabilities are delivered when initial end- users have received the new system and can use it operationally, and delivery of full capabilities occurs when all end-users have received the system. Some programs reported multiple IOC or FOC dates. In these cases we used the first and last planned delivery of capabilities to operational users as the basis for the program-level IOC and FOC date. In some cases, programs reported schedule milestones using a period of time, such as a month or year, and in these cases we used the last date of the given period as the basis for the estimated date. Two programs, Automated Commercial Environment and US-VISIT Unique Identity, were unable to provide complete schedule data due to unavailable information and, therefore, we excluded these programs from all or part of the schedule analysis. Common Program Challenges Analysis: As federal acquisition policy and guidance emphasize the importance of sound acquisition planning, we focused in particular on acquisition planning issues. To assess common challenges for the selected programs, we analyzed information programs reported on requirements, key acquisition documents, program office staffing, and sustainment planning across the programs. We also analyzed relevant program documentation and assessed information from interviews with program officials. Three programs were excluded from the assessment of overall performance: the two nonmajor programs, the Biosurveillance Common Operating Network and Integrated Public Alert and Warning System, and the BioWatch Generation-3 program, which was pre-acquisition at the time we collected the data. Challenges we identified do not represent an exhaustive list; however, past work identifies these challenges as detrimental to program performance. To assess baseline requirements stability, we analyzed delays in setting baseline requirements as well as changes to existing requirements. According to DHS guidance, the baseline requirements must include a threshold value that is the minimum acceptable value which, in the user's judgment, is necessary to satisfy the need. If threshold values are not achieved, program performance may be seriously degraded, the program may be too costly, or the program may no longer be timely. Baseline requirements, also referred to as Key Performance Parameters, were categorized as cost, performance or schedule requirements. We compared requirements from initial baselines from 2003 or later, to most recent Acquisition Program Baseline (APB) requirements. We also examined the approval of key acquisition documents, including the Mission Need Statement, Operational Requirements Document, and Acquisition Program Baseline, prior to initiation of acquisition activities. We evaluated whether key acquisition documents were approved at either the component or department level prior to awarding contracts to initiate acquisition activities. To assess staffing levels, we evaluated planned and filled positions for government staff and contractor support. We analyzed government vacancy levels by primary function and calculated the ratios of government staff and contractor support to total reported positions. We obtained data on acquisition program managers, including certification level, length of time as program manager, and permanent assignment to the program. To assess sustainment planning, we reviewed approval dates for the Integrated Logistics Support Plan, and whether the plan was approved beyond the program, at either the component or department level, as required by DHS guidance. To identify common program execution challenges, we analyzed challenges reported in data collection instruments, program documents, and interviews. We developed the following broad categories for execution challenges: technical capability, partner dependence, and funding issues. The execution challenges we identified are not exhaustive; however, they provide a sense of the issues programs reported. Individual Program Assessments: To assess each of the 18 selected acquisition programs, we summarized individual program data in a two-page report format. We prepared the individual program assessments based on DCI data and supporting documentation, interviews with program officials, and our prior work. Each individual program assessment outlines essential program information including a description of program objectives and purpose; current status, cost, and schedule performance; major contractors; 2010 budget request; staffing profile; a summary of program challenges; and status of department-or component-level approval of key acquisition documents. In addition, we provide a summary of program background, performance, and challenges. To present cost and schedule performance data, we compared initial cost and schedule estimates to latest available estimates. We used initial cost and schedule estimates since 2003, after the start of DHS, although some of the 18 programs were initiated prior to this time. All cost data are presented in then-year dollars, consistent with official program budget documents, with the exception of the Integrated Public Alert and Warning System program cost data which were available in constant dollars only. To assess schedule performance, we compared initial and latest estimates for IOC and FOC. Other schedule milestones were also reported on the program timeline including Preliminary Design Review; Critical Design Review; Production Readiness Review; and First Asset Delivery. In some cases, a milestone significant to the program was also included in the timeline. To assess the challenges for each program, we reviewed the data reported by category in the DCI and official program documents, and we interviewed the program office representatives about the information reported. For individual programs we collected program data on potential challenges, including requirements stability; staffing; sustainment planning; contracting activity; technology maturity; design maturity; and software development. Our analysis of requirements stability, staffing and sustainment planning is consistent with methods discussed above. For programs reporting on technology maturity and design data, we requested data based on best practice indicators[Footnote 53] for technology maturity and design stability drawn from our body of work established in DOD and NASA assessments of selected systems. However, the selected DHS programs reported limited data on technology maturity and design data as they do not consistently use technology readiness- level data for critical technologies, and programs used varying metrics to measure design stability. Furthermore, many of the programs make extensive use of commercial-off-the-shelf products not developed by the program. We conducted our work from March 2009 to June 2010 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. [End of section] Appendix II: Comments from the Department of Homeland Security: U.S. Department of Homeland Security: Washington, DC 20528: June 22, 2010: Mr. John P. Hutton: Director, Acquisition and Sourcing Management: U.S. Government Accountability Office: 441 G Street, NW: Washington, DC 20548: Dear Mr. Hutton: The Department of Homeland Security (DHS) appreciates the opportunity to comment on the draft Government Accountability Office (GAO) report, GAO-10-588SP, entitled "Assessments of Selected Complex Acquisitions." The Department is encouraged that the draft report cites the progress that we have made over the past several years to improve acquisition processes. We have instituted several major changes that are beginning to show results. The development and implementation of Directive 102- 01 (Acquisition Management) has provided improved discipline and structure to the Department's acquisition and governance processes. The improved Acquisition Review Board (ARB) process has been used over sixty times since March 2008. The ARB provides a focused, issue- oriented governance process ensuring that major programs are accurately evaluated, and that decisions and actions are properly documented and tracked to completion. The establishment of the Acquisition Program Management Division and the Cost Analysis Division in the Office of the Chief Procurement Officer has provided a knowledgeable cadre of acquisition-experienced individuals that support the governance process, and provide assistance to acquisition programs on a day-to-day basis. Between these accomplishments, and other initiatives currently underway, we expect to see additional improvements in the near future. DHS does wish to point out several areas where the Department evaluation differs from that of GAO in this report: * GAO identified that more than forty major programs have not yet been reviewed by the ARB. - DHS complements the ARB process with a portfolio review process executed by the Acquisition Program Management Division in conjunction with the Component Acquisition Executive (CAE) or the Component's senior acquisition staff. This review process, in its second year of operation, executes a focused, collaborative review of each Component's major program portfolio with APMD, and helps identify program issues, including programs which need to proceed to an ARB on an accelerated basis. In FY 2009, the portfolio process reviewed 61 of the 67 DHS major acquisition programs. * GAO evaluated the DHS acquisition management processes as not sufficiently informing budget processes as required by DHS policy. - DHS designed the revised acquisition policy to "interlink" with both the budgeting and the strategic requirements key decision processes. Key leaders in both these decision processes sit the Acquisition Review Team and the Acquisition Review Board, ensuring that these processes' perspectives are incorporated in the decisions made by the ARB. In turn, APMD participates reciprocally with both processes. Specifically, APMD is a standing team member with the Program Analysis and Evaluation (PA&E) division in the review of submitted Resource Allocation Proposals, and in the execution of the annual Program Review Board process (a key component of DHS' annual budget formulation process). * GAO elected to use the OMB 300 budget submissions for the current state of program costs, for the assessed major programs in this report, in lieu of life cycle cost estimates (LCCEs). This was done due to the early stage of LCCE implementation in DHS. - DHS notes that OMB 300 data is based on the approved budget for the particular program. Since LCCE information for DHS programs is in its infancy, most OMB 300 data for existing programs is not based on validated program LCCEs. Since the OMB 300 data in many cases is not derived from validated cost estimates, DHS believes that there is the likelihood of significant error in cost growth comparisons and analyses using this data. * GAO identified that DHS may "waive some oversight requirements on a case-by-case basis, without clear criteria, for programs that passed certain phases--such as departmental approval of a Mission Need Statement for a program that has already deployed capability." - DHS, in implementing the Directive 102-01 acquisition policy and process in November 2008, was faced with the task of transitioning 67 operating major acquisition programs to this new directive. Flexibility was built into the new process to allow programs that were well into the "obtain" or "produce /deploy/support" phases of the D- 102-01 Acquisition Life Cycle to tailor some D-102-01 requirements (for instance, not to generate documentation from earlier phases of the life cycle). That tailoring criterion provides clear (albeit not explicit) guidance to the program manager and APMD as each program is assessed upon its entry into the new policy. Technical comments are provided as an enclosure to this letter. DHS wishes to thank you and the GAO audit team for the professionalism and excellent dialog which characterized the execution of this audit. This was particularly important given the challenges in implementing this particular complex audit process (which will be re-executed on an annual basis) in a way that addresses the specifics of this Department's processes. DHS looks forward to continuing our partnership, with the common goal of improving the Department's execution of its acquisition responsibilities. Sincerely, Signed by: Jerald E. Levine: Director: Departmental GAO/OIG Liaison Office: Enclosure: [End of section] Appendix III: The Acquisition Life Cycle, Systems Engineering Life Cycle and Key Acquisition Documents at DHS: [Figure: Refer to PDF for image: Life cycle map] Acquisition decision Event: ADE 1; Acquisition Life Cycle Phase: Need; Documents Requiring Department Approval: MNS; CDP; AP. Acquisition decision Event: ADE 2A; Acquisition Life Cycle Phase: Analyze/Select; Systems Engineering Life Cycle Phase: Solution Engineering; Documents Requiring Department Approval: APB; ILSP; AP; ORD. Acquisition decision Event: ADE 2B; Acquisition Life Cycle Phase: Obtain; Systems Engineering Life Cycle Phase: Planning; Documents Requiring Department Approval: APB; ILSP; TEMP; SELC/SE TP; Systems Engineering Life Cycle Phases: Requirements Definition; Design; Development; Integration and Testing; Implementation; Acquisition Decision Event: ADE 3; Acquisition Life Cycle Phase: Produce/Deploy/Support; Systems Engineering Life Cycle Phase: Operations and Maintenance; Disposition; Documents Requiring Department Approval: APB; ILSP. MNS: Mission Need Statement; CDP: Capability Development Plan; AP: Acquisition Plan; APB: Acquisition Program Baseline; ILSP: Integrated Logistics Support Plan; ORD: Operational Requirements Document; TEMP: Test and Evaluation Master Plan; SELC/SE TP: Systems Engineering Life Cycle Tailoring Plan. Source: DHS Acquisition Instruction/Guidebook 102-01-001, interim, version 1.9, Nov. 7, 2008. [End of figure] Table: Key Acquisition Documents Requiring Department-level Approval: Document Name: Mission Need Statement; Description: Provides a high-level description of the mission need, whether from a current or impending gap, based on business-case planning. The Mission Need Statement, prepared by the Component, outlines only the concept of the solution to fill the gap and does not provide information on specific acquisitions/types of acquisition that could provide that capability. Document Name: Capability Development Plan; Description: Serves as the agreement between the Component Head, the Program/Project Manager, and the Acquisition Decision Authority on the activities, cost, schedule, and performance boundaries of the work to be performed in the Analyze/Select phase. Document Name: Acquisition Plan; Description: A living document that spans the life of the acquisition. It provides a top-level strategy for future sustainment and support and a recommendation for the overall acquisition approach and types of acquisition. Document Name: Acquisition Program Baseline; Description: A summary of the critical cost, schedule, and performance parameters, expressed in measurable, quantitative terms, which must be met in order to accomplish the goals of the investment. Document Name: Integrated Logistics Support Plan; Description: The formal acquisition management document that describes the management approach for obtaining a highly supportable capability with an affordable and effective support structure. Document Name: Operational Requirements Document; Description: The Operational Requirements Document captures the business or operational user Key Performance Parameters. They are overarching documents that describe the mission, objectives, and capabilities in operationally relevant terms. Document Name: Test and Evaluation Master Plan; Description: The basic "top-level" planning document for Test and Evaluation related activities for major acquisition programs. Describes the necessary Developmental Test and Evaluation and Operational Test and Evaluation that needs to be conducted to determine system technical performance, operational effectiveness/suitability, and limitations. Document Name: Systems Engineering Life Cycle Tailoring Plan; Description: This plan tailors the phases, products and reviews in the system engineering life cycle to meet the specific needs of each program and project. Source: DHS Acquisition Instruction/Guidebook 102-01-001 Version 1.9 and Appendices D and L. [End of table] [End of section] Related GAO Products: GAO Review of the Department of Homeland Security's Certification of the Secure Flight Program--Cost and Schedule Estimates. [hyperlink, http://www.gao.gov/products/GAO-10-535R]. Washington, D.C.: April 5, 2010. Defense Acquisitions: Assessments of Selected Weapon Programs. [hyperlink, http://www.gao.gov/products/GAO-10-388SP]. Washington, D.C.: March 30, 2010. NASA: Assessments of Selected Large-Scale Projects. [hyperlink, http://www.gao.gov/products/GAO-10-227SP]. Washington, D.C.: February 1, 2010. Secure Border Initiative: DHS Needs to Address Testing and Performance Limitations That Place Key Technology Program at Risk. [hyperlink, http://www.gao.gov/products/GAO-10-158]. Washington, D.C.: January 29, 2010. Defense Acquisitions: Managing Risk to Achieve Better Outcomes. [hyperlink, http://www.gao.gov/products/GAO-10-374T]. Washington, D.C.: January 20, 2010. Biosurveillance: Developing a Collaboration Strategy Is Essential to Fostering Interagency Data and Resource Sharing. [hyperlink, http://www.gao.gov/products/GAO-10-171]. Washington, D.C.: December 18, 2009. Homeland Security: Key US-VISIT Components at Varying Stages of Completion, but Integrated and Reliable Schedule Needed. [hyperlink, http://www.gao.gov/products/GAO-10-13]. Washington, D.C.: November 19, 2009. Information Technology: Agencies Need to Improve the Implementation and Use of Earned Value Techniques to Help Manage Major System Acquisitions. [hyperlink, http://www.gao.gov/products/GAO-10-2]. Washington, D.C.: October 8, 2009. Aviation Security: DHS and TSA Have Researched, Developed, and Begun Deploying Passenger Checkpoint Screening Technologies, but Continue to Face Challenges. [hyperlink, http://www.gao.gov/products/GAO-10-128]. Washington, D.C.: October 7, 2009. Secure Border Initiative: Technology Deployment Delays Persist and the Impact of Border Fencing Has Not Been Assessed. [hyperlink, http://www.gao.gov/products/GAO-09-1013T]. Washington, D.C.: September 17, 2009. Homeland Security: Despite Progress, DHS Continues to Be Challenged in Managing Its Multi-Billion Dollar Annual Investment in Large-Scale Information Technology Systems. [hyperlink, http://www.gao.gov/products/GAO-09-1002T]. Washington, D.C.: September 15, 2009. Secure Border Initiative: Technology Deployment Delays Persist and the Impact of Border Fencing Has Not Been Assessed. [hyperlink, http://www.gao.gov/products/GAO-09-896]. Washington, D.C.: September 9, 2009. Emergency Preparedness: Improved Planning and Coordination Necessary for Modernization and Integration of Public Alert and Warning System. [hyperlink, http://www.gao.gov/products/GAO-09-834]. Washington, D.C.: September 9, 2009. Coast Guard: Better Logistics Planning Needed to Aid Operational Decisions Related to the Deployment of the National Security Cutter and Its Support Assets. [hyperlink, http://www.gao.gov/products/GAO-09-497]. Washington, D.C.: July 17, 2009. Coast Guard: As Deepwater Systems Integrator, Coast Guard Is Reassessing Costs and Capabilities but Lags in Applying Its Disciplined Acquisition Approach. [hyperlink, http://www.gao.gov/products/GAO-09-682]. Washington, D.C.: July 14, 2009. Aviation Security: TSA Has Completed Key Activities Associated with Implementing Secure Flight, but Additional Actions Are Needed to Mitigate Risks. [hyperlink, http://www.gao.gov/products/GAO-09-292]. Washington, D.C.: May 13, 2009. Defense Acquisitions: Measuring the Value of DOD's Weapon Programs Requires Starting with Realistic Baselines. [hyperlink, http://www.gao.gov/products/GAO-09-543T]. Washington, D.C.: April 1, 2009. Defense Acquisitions: Assessments of Selected Weapon Programs. [hyperlink, http://www.gao.gov/products/GAO-09-326SP]. Washington, D.C.: March 30, 2009. Defense Acquisitions: DOD Must Prioritize Its Weapon System Acquisitions and Balance Them with Available Resources. [hyperlink, http://www.gao.gov/products/GAO-09-501T]. Washington, D.C.: March 18, 2009. GAO Cost Estimating and Assessment Guide: Best Practices for Developing and Managing Capital Program Costs. [hyperlink, http://www.gao.gov/products/GAO-09-3SP]. Washington, D.C.: March 2, 2009. High-Risk Series: An Update. [hyperlink, http://www.gao.gov/products/GAO-09-271SP]. Washington, D.C.: January 22, 2009. Department of Homeland Security: A Strategic Approach Is Needed to Better Ensure the Acquisition Workforce Can Meet Mission Needs. [hyperlink, http://www.gao.gov/products/GAO-09-30]. Washington, D.C.: November 19, 2008. Department of Homeland Security: Billions Invested in Major Programs Lack Appropriate Oversight. [hyperlink, http://www.gao.gov/products/GAO-09-29]. Washington, D.C.: November 18, 2008. Secure Border Initiative: DHS Needs to Address Significant Risks in Delivering Key Technology Investment. [hyperlink, http://www.gao.gov/products/GAO-08-1086]. Washington, D.C.: September 22, 2008. Critical Infrastructure Protection: DHS Needs to Better Address Its Cybersecurity Responsibilities. [hyperlink, http://www.gao.gov/products/GAO-08-1157T]. Washington, D.C.: September 16, 2008. Secure Border Initiative Fiscal Year 2008 Expenditure Plan Shows Improvement, but Deficiencies Limit Congressional Oversight and DHS Accountability. [hyperlink, http://www.gao.gov/products/GAO-08-739R]. Washington, D.C.: June 26, 2008. Coast Guard: Change in Course Improves Deepwater Management and Oversight, but Outcome Still Uncertain. [hyperlink, http://www.gao.gov/products/GAO-08-745]. Washington, D.C.: June 24, 2008. Border Security: Summary of Covert Tests and Security Assessments for the Senate Committee on Finance, 2003-2007. [hyperlink, http://www.gao.gov/products/GAO-08-757]. Washington, D.C.: May 16, 2008. Department of Homeland Security: Better Planning and Assessment Needed to Improve Outcomes for Complex Service Acquisitions. [hyperlink, http://www.gao.gov/products/GAO-08-263]. Washington, D.C.: April 22, 2008. Privacy: Government Use of Data from Information Resellers Could Include Better Protections. [hyperlink, http://www.gao.gov/products/GAO-08-543T]. Washington, D.C.: March 11, 2008. Homeland Security: Strategic Solution for US-VISIT Program Needs to Be Better Defined, Justified, and Coordinated. [hyperlink, http://www.gao.gov/products/GAO-08-361]. Washington, D.C.: February 29, 2008. Secure Border Initiative: Observations on the Importance of Applying Lessons Learned to Future Projects. [hyperlink, http://www.gao.gov/products/GAO-08-508T]. Washington, D.C.: February 27, 2008. Military Readiness: Navy Is Making Progress Implementing Its Fleet Response Plan, but Has Not Fully Developed Goals, Measures, and Resource Needs. [hyperlink, http://www.gao.gov/products/GAO-08-264]. Washington, D.C.: February 1, 2008. Terrorist Watch List Screening: Recommendations to Promote a Comprehensive and Coordinated Approach to Terrorist-Related Screening. [hyperlink, http://www.gao.gov/products/GAO-08-253T]. Washington, D.C.: November 8, 2007. Information Technology: Improvements for Acquisition of Customs Trade Processing System Continue, but Further Efforts Needed to Avoid More Cost and Schedule Shortfalls. [hyperlink, http://www.gao.gov/products/GAO-08-46]. Washington, D.C.: October 25, 2007. Department of Homeland Security: Improved Assessment and Oversight Needed to Manage Risk of Contracting for Selected Services. [hyperlink, http://www.gao.gov/products/GAO-07-990]. Washington, D.C.: September 17, 2007. United States Coast Guard: Improvements Needed in Management and Oversight of Rescue System Acquisition. [hyperlink, http://www.gao.gov/products/GAO-06-623]. Washington, D.C.: May 31, 2006. Defense Acquisitions: Actions Needed to Ensure Adequate Funding for Operation and Sustainment of the Ballistic Missile Defense System. [hyperlink, http://www.gao.gov/products/GAO-05-817]. Washington, D.C.: September 6, 2005. Homeland Security: Successes and Challenges in DHS's Efforts to Create an Effective Acquisition Organization. [hyperlink, http://www.gao.gov/products/GAO-05-179]. Washington, D.C.: March 29, 2005. Defense Acquisitions: Information for Congress on Performance of Major Programs Can Be More Complete, Timely, and Accessible. [hyperlink, http://www.gao.gov/products/GAO-05-182]. Washington, D.C.: March 28, 2005. [End of section] Footnotes: [1] GAO, High-Risk Series: An Update, [hyperlink, http://www.gao.gov/products/GAO-09-271SP] (Washington, D.C.: Jan. 22, 2009). [2] In 2009 constant dollars. [3] GAO, Defense Acquisitions: Assessments of Selected Weapon Program, [hyperlink, http://www.gao.gov/products/GAO-10-388SP] (Washington, D.C.: Mar. 30, 2010) and NASA: Assessments of Selected Large-Scale Projects, [hyperlink, http://www.gao.gov/products/GAO-10-227SP] (Washington, D.C.: Feb. 1, 2010). [4] GAO, Defense Acquisitions: Managing Risk to Achieve Better Outcomes, [hyperlink, http://www.gao.gov/products/GAO-10-374T] (Washington, D.C.: Jan. 20, 2010). [5] GAO, Department of Homeland Security: Billions Invested in Major Programs Lack Appropriate Oversight, [hyperlink, http://www.gao.gov/products/GAO-09-29] (Washington, D.C.: Nov. 18, 2008); Homeland Security: Challenges in Creating an Effective Acquisition Organization, [hyperlink, http://www.gao.gov/products/GAO-06-1012T] (Washington, D.C.: July 27, 2006); and Defense Acquisitions: Measuring the Value of DOD's Weapon Programs Requires Starting with Realistic Baselines, [hyperlink, http://www.gao.gov/products/GAO-09-543T] (Washington, D.C.: Apr. 1, 2009). [6] GAO, Department of Homeland Security: Billions Invested in Major Programs Lack Appropriate Oversight, [hyperlink, http://www.gao.gov/products/GAO-09-29] (Washington, D.C.: Nov. 18, 2008). [7] GAO, Homeland Security: Despite Progress, DHS Continues to Be Challenged in Managing Its Multi-Billion Dollar Annual Investment in Large-Scale Information Technology Systems, [hyperlink, http://www.gao.gov/products/GAO-09-1002T] (Washington, D.C.: Sept.15, 2009). [8] [hyperlink, http://www.gao.gov/products/GAO-09-29] and [hyperlink, http://www.gao.gov/products/GAO-09-1002T]. [9] [hyperlink, http://www.gao.gov/products/GAO-09-1002T]. [10] [hyperlink, http://www.gao.gov/products/GAO-09-1002T]. [11] In a September 2009 testimony we did, however, discuss how DHS acquisition and investment management processes had not adequately addressed how DHS determines and ensures that an investment is aligned with its Enterprise Architecture. See GAO-09-1002T. [12] The two nonmajor programs selected--the Biosurveillance Common Operating Network and the Integrated Public Alert and Warning System-- and one major program that had not started acquisition activities at the time of our review, BioWatch Generation-3, were excluded from the analysis of overall acquisition performance and program challenges. Nonmajor programs at DHS are not subject to the same acquisition planning requirements as major programs. Because BioWatch Generation-3 had not awarded contracts, it was considered pre-acquisition according to our methodology. [13] [hyperlink, http://www.gao.gov/products/GAO-09-543T]. [14] GAO, Department of Homeland Security: Billions Invested in Major Programs Lack Appropriate Oversight, [hyperlink, http://www.gao.gov/products/GAO-09-29] (Washington, D.C.: Nov.18, 2008). [15] The department operated under the March 2006 Management Directive No. 1400 on the Investment Review Process until November 2008 when DHS issued Acquisition Management Directive 102-01, interim version, which superseded Management Directive No. 1400. In January, 2010, DHS issued Directive Number 102-01, Revision Number 01, which DHS officials stated does not differ substantially from the interim acquisition management directive. [16] Acquisition costs include costs for all items and services for a designated investment. Life-cycle costs include all resources and associated cost elements required to develop, produce, deploy, and sustain a particular program from initial concept through operations, support, and disposal. [17] DHS Acquisition Management Directive 102-01, interim version, and DHS Acquisition Instruction/Guidebook 102-01-001, Interim Version 1.9 (Nov. 7, 2008). [18] Fiscal year 2008 and fiscal year 2009 reviews included 5 nonmajor programs, and 3 programs reviewed in fiscal year 2008 were again reviewed in fiscal year 2009. [19] Directive 102-01, Revision number 01 states that it applies to acquisitions in existence on the directive's issuance date to the maximum extent possible and to all future acquisitions; whereas, the interim Directive 102-01 stated that it applied to all acquisitions regardless of their life-cycle stage. [20] [hyperlink, http://www.gao.gov/products/GAO-09-29] and GAO, Homeland Security: Successes and Challenges in DHS's Efforts to Create an Effective Acquisition Organization, [hyperlink, http://www.gao.gov/products/GAO-05-179] (Washington, D.C.: Mar. 29, 2005). [21] GAO, Defense Acquisitions: Measuring the Value of DOD's Weapon Programs Requires Starting with Realistic Baselines, [hyperlink, http://www.gao.gov/products/GAO-09-543T] (Washington, D.C.: Apr. 1, 2009). [22] As of September 2009, 26 programs were assigned action items: 16 major acquisition programs reviewed by the ARB; 7 major acquisition programs not reviewed by the ARB but assigned action items as part of DHS oversight reviews; 3 nonmajor acquisition programs reviewed by the ARB. Additionally, 8 major acquisition programs reviewed by the ARB in fiscal years 2008 or 2009 had not yet been assigned action items. [23] The acquisition portfolio for the Federal Emergency Management Agency includes both programs and major services, as defined by DHS's acquisition management directive. The $5 billion assessed represents programs. Officials said they were still working to identify additional programs and the major services. [24] [hyperlink, http://www.gao.gov/products/GAO-09-543T]. [25] GAO, Defense Acquisitions: Managing Risk to Achieve Better Outcomes, [hyperlink, http://www.gao.gov/products/GAO-10-374T] (Washington, D.C.: Jan. 20, 2010). [26] [hyperlink, http://www.gao.gov/products/GAO-09-543T]. [27] The two nonmajor programs are Biosurveillance Common Operating Network and the Integrated Public Alert and Warning System. BioWatch Generation-3 had not started acquisition activities at the time of our review. [28] Automated Commercial Environment and US-VISIT programs could not provide both initial and latest schedule estimates for reaching full capability. [29] This appendix is based on GAO, Cost Assessment Guide: Best Practices for Estimating and Managing Program Costs, [hyperlink, http://www.gao.gov/products/GAO-07-1134SP] (Washington, D.C.: July 2007). [30] DHS officials report that three programs--Secure Flight, Sentinel Class Patrol Boat and Western Hemisphere Travel Initiative--have validated life-cycle cost estimates. [31] For four Coast Guard programs, we analyzed the Quarterly Acquisition Reports to Congress to the Senate and House appropriators. For the nine other programs, we analyzed data reported in the Exhibit 300 required by OMB Circular No. A-11, Part 7: Planning, Budgeting, Acquisition and Management of Capital Assets. [32] According to DHS guidance, the program manager sets the point at which initial operating capability is met during planning. The initial operating capability milestone is not a specific time reference, but reflects a point that indicates there is a major new capability with measurable program benefit available to the designated user. [33] [hyperlink, http://www.gao.gov/products/GAO-10-374T]. [34] [hyperlink, http://www.gao.gov/products/GAO-09-543T]. [35] GAO, Defense Acquisitions: DOD Must Prioritize Its Weapon System Acquisitions and Balance Them with Available Resources, [hyperlink, http://www.gao.gov/products/GAO-09-501T] (Washington, D.C.: Mar. 25, 2009). [36] DHS, Management Directive No. 1400, Investment Review Process (Washington, D.C.: 2006) and DHS Acquisition Instruction Guidebook 102- 01-001 Version 1.9 (Washington, D.C.: Nov. 7, 2008). [37] All programs did not report data for all categories of program office staffing requested in the data collection instrument. 15 programs reported total staffing data; 8 programs reported government staffing data by function; and 6 reported contractor staffing by function. Of the programs reporting government staffing by function, programs indicated high levels of vacancies for scientist, program management, financial management, and test and evaluation positions. All workforce data are as of 2009. [38] GAO, Department of Homeland Security: A Strategic Approach Is Needed to Better Ensure the Acquisition Workforce Can Meet Mission Needs, [hyperlink, http://www.gao.gov/products/GAO-09-30] (Washington, D.C.: Nov. 19, 2008). [39] GAO, Department of Homeland Security: Better Planning and Assessment Needed to Improve Outcomes for Complex Service Acquisitions, [hyperlink, http://www.gao.gov/products/GAO-08-263] (Washington, D.C.: Apr. 22, 2008). [40] GAO, Defense Acquisitions: Assessments of Selected Weapon Programs, [hyperlink, http://www.gao.gov/products/GAO-10-388SP] (Washington, D.C.: Mar. 30, 2010). [41] [hyperlink, http://www.gao.gov/products/GAO-10-374T]. [42] GAO, Department of Homeland Security: Improved Assessment and Oversight Needed to Manage Risk of Contracting for Selected Services, [hyperlink, http://www.gao.gov/products/GAO-07-990] (Washington, D.C.: Sept. 17, 2007). [43] [hyperlink, http://www.gao.gov/products/GAO-09-30]. [44] GAO, Defense Acquisitions: Assessments of Selected Weapon Programs, [hyperlink, http://www.gao.gov/products/GAO-08-467SP] (Washington, D.C.: Mar. 31, 2008). [45] GAO, GAO Cost Estimating and Assessment Guide: Best Practices for Developing and Managing Capital Program Costs, [hyperlink, http://www.gao.gov/products/GAO-09-3SP] (Washington, D.C.: Mar. 2, 2009). [46] See for example: GAO, Best Practices: High Levels of Knowledge at Key Points Differentiate Commercial Shipbuilding from Navy Shipbuilding, [hyperlink, http://www.gao.gov/products/GAO-09-322] (Washington, D.C.: May 13, 2009); Joint Strike Fighter: Significant Challenges and Decisions Ahead, [hyperlink, http://www.gao.gov/products/GAO-10-478T] (Washington, D.C.: Mar. 24, 2010); and Cost Increases in the Airborne Laser Program, GAO-04-643R (Washington, D.C.: May 17, 2004). [47] 41 U.S.C. § 263 [48] GAO, Defense Acquisitions: Assessments of Selected Weapon Programs, [hyperlink, http://www.gao.gov/products/GAO-09-326SP] (Washington, D.C.: Mar. 30, 2009); NASA: Assessments of Selected Large- Scale Projects, [hyperlink, http://www.gao.gov/products/GAO-10-227SP] (Washington, D.C.: Feb. 1, 2010). [49] OMB, Circular A-11, Part 7: Planning, Budgeting, and Acquisition of Capital Assets, Capital Programming Supplement. 2006. [50] We used OMB Exhibit 300 reports for all programs except four Coast Guard programs: Sentinel Class, Maritime Patrol Aircraft, Response Boat-Medium, and National Security Cutter. An Exhibit 300 must be submitted for all executive branch agency major investments, and is designed to coordinate collection of agency information for reports to Congress required by the Federal Acquisition Streamlining Act of 1994 (FASA Title V). FASA requires agencies to establish cost, schedule and measurable performance goals for all major acquisition programs and achieve on average 90 percent of those goals. The Exhibit 300 is a component of the total performance budget justification for executive agencies. Agencies are required to report total estimated life-cycle costs and acquisition costs for programs in the Exhibit 300. [51] The four Coast Guard programs are: Sentinel Class, Maritime Patrol Aircraft, Response Boat-Medium, and National Security Cutter. [52] We used official program acquisition program baselines for initial cost estimates, and Quarterly Acquisition Reports to congressional appropriations committees as current cost estimates for the Sentinel Class, Maritime Patrol Aircraft, Response Boat-Medium, and National Security Cutter programs. Acquisition program baselines (APB) formally document a program's critical cost parameters, including acquisition costs and life-cycle costs. The Quarterly Acquisition Report to congressional appropriations committees includes Total Acquisition Costs and Life-Cycle Cost Estimates reported to Congress for Coast Guard programs. [53] Our prior work has identified certain knowledge metrics regarding technology and design. Specifically, our body of work on best practices in product development indicates that (1) focus should be on achieving a high level of technology maturity at the start of system development in that critical technologies needed to meet essential product requirements must be demonstrated to work in their intended environment. The technology readiness level for each critical technology is the metric we use to measure technology maturity; and (2) product's design is stable as evidenced by the development of engineering prototypes and the completion of engineering drawings for an integrated product at the system design review. A best practice is to achieve design stability at the system-level critical design review, usually held midway through development. [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Phone: The price of each GAO publication reflects GAO‘s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO‘s Web site, [hyperlink, http://www.gao.gov/ordering.htm]. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.