Major Management Challenges and Program Risks
Department of Justice
Gao ID: GAO-03-105 January 1, 2003
In its 2001 performance and accountability report on the Department of Justice, GAO identified five major management challenges. Justice has since made progress on (1) developing measurable performance targets in reducing illegal drugs and (2) improving management of its asset forfeiture program. However, three challenges remain and a fourth managing the FBI's transformation was added. GAO prepared this report to bring these major challenges to the attention of the Congress and Justice. This is part of a special series of reports on governmentwide and agency-specific issues.
The terrorist attacks of September 11, 2001, changed the nation forever and drew the country's attention to the mission of the Department of Justice (Justice). In fulfilling its mission, Justice and its components confront several performance and accountability challenges in 2003. Congress recently passed legislation calling for the new Department of Homeland Security to absorb certain functions currently performed by Justice'such as some information analysis and infrastructure protection capabilities and immigration enforcement and services. Regardless of which agency has responsibility for such functions, management challenges will persist. Transform the Federal Bureau of Investigation (FBI): After September 11, 2001, the FBI began transforming its culture to be more proactive and preventive in responding to terrorism. The FBI faces several challenges in reorganizing, including realigning staff to address terrorism, building analytic capabilities, improving information sharing and information technology, recruiting employees with specialized skills, and managing the ripple effect of reorganization on the law enforcement community. Although the Department of Homeland Security will absorb some of the FBI's information analysis and infrastructure protection capabilities, the FBI still faces challenges that will require considerable attention. Enforce Immigration Laws and Provide Immigration Services: In carrying out its enforcement and service functions, the Immigration and Naturalization Service (INS) faces many challenges, including unfocused or ineffective efforts at combating benefit fraud, unauthorized employment, and alien smuggling; and problems with workload and information technology management. Although the INS will be transferred to the new Department of Homeland Security, these organizational, management, and programmatic challenges will remain. Support State and Local Efforts to Reduce Crime: While the Office of Justice Programs has taken steps to achieve more effective grant management procedures and systems, it has not resolved long-standing problems with monitoring grant programs, including data collection and sufficiently rigorous impact evaluation studies. Achieve Financial Accountability: Although Justice achieved an unqualified audit opinion on its fiscal year 2001 financial statements, material weaknesses remain in general and application controls over financial management systems, recording financial transactions, and preparing financial statements.
GAO-03-105, Major Management Challenges and Program Risks: Department of Justice
This is the accessible text file for GAO report number GAO-03-105
entitled 'Major Management Challenges and Program Risks: Department of
Justice' which was released on January 01, 2003.
This text file was formatted by the U.S. General Accounting Office
(GAO) to be accessible to users with visual impairments, as part of a
longer term project to improve GAO products‘ accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
January 2003:
MAJOR MANAGEMENT CHALLENGES AND PROGRAM RISKS:
Department of Justice:
GAO-03-105:
Agency at a Glance:
The Department of Justice‘s mission includes:
* enforcing the law and defending U.S. interests according to the law,
* providing federal leadership in preventing and controlling crime,
* seeking just punishment for those guilty of unlawful behavior,
* ensuring fair and impartial administration of justice for all
Americans, and;
* administering and enforcing the nation‘s immigration laws fairly and
effectively. [These immigration functions are transferring to the
new Department of Homeland Security]:
Figure: The Department of Justice‘s Budgetary and Staff Resources:
[See PDF for image]
[End of figure]
This Series:
This report is part of a special GAO series, first issued in 1999
and updated in 2001, entitled the Performance and Accountability
Series: Major Management Challenges and Program Risks. The 2003
Performance and Accountability Series contains separate reports
covering each cabinet department, most major independent agencies,
and the U.S. Postal Service. The series also includes a
governmentwide perspective on transforming the way the government does
business in order to meet 21st century challenges and address long-term
fiscal needs. The companion 2003 High-Risk Series: An Update identifies
areas at high risk due to either their greater vulnerabilities to
waste,
fraud, abuse, and mismanagement or major challenges associated with
their
economy, efficiency, or effectiveness. A list of all of the reports in
this series is included at the end of this report.
GAO Highlights:
Highlights of GAO-03-105, a report to Congress included as part of
GAO‘s
Performance and Accountability Series:
January 2003:
Performance and Accountability Series:
Department of Justice:
Why GAO Did This Report:
In its 2001 performance and accountability report on the Department
of Justice, GAO identified five major management challenges. Justice
has since made progress on (1) developing measurable performance
targets
in reducing illegal drugs and (2) improving management of its asset
forfeiture program. However, three challenges remain and a fourth”
managing the FBI‘s transformation”was added. GAO prepared this report
to bring these major challenges to the attention of the Congress and
Justice. This is part of a special series of reports on governmentwide
and agency-specific issues.
What GAO Found:
The terrorist attacks of September 11, 2001, changed the nation
forever and drew the country‘s attention to the mission of the
Department of Justice (Justice). In fulfilling its mission, Justice
and its components confront several performance and accountability
challenges in 2003. Congress recently passed legislation calling for
the new Department of Homeland Security to absorb certain functions
currently performed by Justice”such as some information analysis and
infrastructure protection capabilities and immigration enforcement
and services. Regardless of which agency has responsibility for such
functions, management challenges will persist.
* Transform the Federal Bureau of Investigation (FBI): After September
11, 2001, the FBI began transforming its culture to be more proactive
and preventive in responding to terrorism. The FBI faces several
challenges in reorganizing, including realigning staff to address
terrorism, building analytic capabilities, improving information
sharing and information technology, recruiting employees with
specialized skills, and managing the ripple effect of reorganization
on the law enforcement community. Although the Department of Homeland
Security will absorb some of the FBI‘s information analysis and
infrastructure protection capabilities, the FBI still faces
challenges that will require considerable attention.
* Enforce Immigration Laws and Provide Immigration Services: In
carrying out its enforcement and service functions, the Immigration
and Naturalization Service (INS) faces many challenges, including
unfocused or ineffective efforts at combating benefit fraud,
unauthorized employment, and alien smuggling; and problems with
workload and information technology management. Although the INS
will be transferred to the new Department of Homeland Security,
these organizational, management, and programmatic challenges will
remain.
* Support State and Local Efforts to Reduce Crime: While the Office
of Justice Programs has taken steps to achieve more effective grant
management procedures and systems, it has not resolved long-standing
problems with monitoring grant programs, including data collection
and sufficiently rigorous impact evaluation studies.
* Achieve Financial Accountability: Although Justice achieved an
unqualified audit opinion on its fiscal year 2001 financial
statements, material weaknesses remain in general and application
controls over financial management systems, recording financial
transactions, and preparing financial statements.
What Remains to Be Done:
GAO believes Justice should;
* manage the FBI‘s transformation,
* improve enforcement of immigration laws and the provision of
immigration services,
* better manage programs that support state and local crime reduction
efforts, and;
* achieve financial accountability for fiscal year 2002 and beyond.
www.gao.gov/cgi-bin/getrpt?GAO-03-105.
To view the full report, click on the link above.
For more information, contact Norman J. Rabkin at 202-512-9110 or
rabkinn@gao.gov:
Contents:
Transmittal Letter:
Major Performance and Accountability Challenges:
GAO Contacts:
Related GAO Products:
Performance and Accountability Series:
This is a work of the U.S. Government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. It may contain
copyrighted graphics, images or other materials. Permission from the
copyrighted materials separately from GAO‘s product.
Transmittal Letter:
January 2003:
The President of the Senate:
The Speaker of the House of Representatives:
This report addresses the major management challenges and program risks
facing the U.S. Department of Justice (Justice) as it works to carry
out its multiple and highly diverse missions. The report discusses the
actions that Justice has taken and that are under way to address the
challenges GAO identified in its Performance and Accountability Series
2 years ago, and major events that have occurred which significantly
influence the environment in which the department carries out its
mission. Also, GAO summarizes the challenges that remain, new ones that
have emerged, and further actions that GAO believes are needed.
This analysis should help the new Congress and the administration carry
out their responsibility and improve government for the benefit of the
American people. For additional information about this report, please
contact Norman J. Rabkin, Managing Director, at (202) 512-9110 or at
rabkinn@gao.gov.
David M. Walker:
Comptroller General of the United States:
Signed by David M. Walker:
Major Performance and Accountability Challenges:
The terrorist attacks of September 11, 2001, changed the nation forever
and drew the country‘s attention to the mission of the Department of
Justice (Justice). According to its mission statement, Justice enforces
the law and defends U.S. interests according to the law, leads the
federal effort to prevent and control crime, seeks punishment for the
guilty, and ensures fair and impartial administration of justice for
all Americans. With budgetary resources for fiscal year 2002 at an
estimated $36 billion and staff resources at 136,000, Justice‘s
responsibilities are divided among a number of components, including
the Federal Bureau of Investigation (FBI), Immigration and
Naturalization Service (INS), Office of Justice Programs (OJP), Drug
Enforcement Administration (DEA), and U.S. Marshals Service (USMS). In
helping Justice meet its overall mission, these components confront
several major performance and accountability challenges.
In our last report of January 2001, we identified five major
performance and accountability challenges for Justice and its
components. These included (1) improving the enforcement of immigration
laws and the provision of immigration and naturalization services, (2)
better managing programs designed to support state and local efforts to
reduce crime, (3) developing measurable performance targets to help the
DEA determine its progress in reducing the availability of illegal
drugs, (4) achieving excellence in financial management, and (5)
improving the management and accountability of Justice‘s asset
forfeiture program. We noted the specific steps Justice had taken to
address the challenges, while pointing out areas in which Justice had
not made enough progress.
Since Justice has made significant progress and commitment in
addressing two of the five challenges addressed in our last report, we
have removed these from consideration in this report. For the challenge
of developing measurable performance targets in reducing illegal drugs,
the DEA has developed management plans to help measure program
effectiveness and provide organizational accountability for priority
performance targets; established performance targets for disrupting and
dismantling international and domestic drug trafficking organizations;
and developed an automated system to capture, verify, and validate data
on all priority projects. In June 2002, the Justice Office of the
Inspector General initiated a review to determine whether the DEA has
developed strategic goals and objectives; established performance
measures to evaluate achievement of its goals and objectives; and
established a data collection, analysis, and reporting system for its
performance measures. The other challenge we dropped from this report
is improving management of Justice‘s asset forfeiture program. We
believe Justice has made good faith efforts to respond to our concern
that it reduce its program‘s administrative costs by taking advantage
of opportunities for cooperation and for sharing agency and contractor
resources with the Department of the Treasury‘s asset forfeiture
program.[Footnote 1]
Three challenges, however, continue to confront Justice--enforcing
immigration laws while providing immigration services, managing
programs that support state and local efforts to reduce crime, and
achieving excellence in financial management. Furthermore, given the
increased emphasis on homeland security, we have added one new
challenge to Justice‘s list--managing the transformation of the FBI.
Addressing these four challenges will require sustained managerial
attention and commitment, as well as oversight and evaluations from
independent organizations.
On November 22, 2002, Congress passed legislation calling for the newly
established Department of Homeland Security to absorb certain functions
currently performed by Justice.[Footnote 2] For example, part of the
FBI‘s National Infrastructure Protection Center and all of the INS will
be transferred to the new department. Regardless of which agency has
responsibility for such functions, these organizational, management,
and programmatic challenges will remain.
Figure: Performance and Accountability Challenges:
[See PDF for image]
[End of figure]
Manage the FBI‘s Transformation:
In December 2001 and May 2002, the Director of the FBI unveiled the
first two phases of a plan to reorganize the Bureau. The first phase is
designed to strengthen the FBI‘s management structure, enhance
accountability, reduce executive span of control, and establish two new
divisions for Records Management and Security. The second phase is
designed to build an FBI with a national terrorism response capability
that is larger and more mobile, agile, and flexible by shifting some
resources from long-standing areas of focus, such as drugs, to
counterterrorism and intelligence; building analytic capacity; and
recruiting to address selected skill gaps. In light of the events of
September 11, 2001, this shift is clearly not unexpected and is, in
fact, consistent with the FBI‘s 1998 Strategic Plan as well as the
current Department of Justice Strategic Plan, and is intended to move
the FBI to be more proactive and preventive in fighting terrorism
rather than reactive and investigative.
We discussed the FBI‘s proposed reorganization and realignment efforts
and the challenges yet to be faced in a June 2002 testimony.[Footnote
3] Our fundamental message was that any changes at the FBI must be part
of, and consistent with, broader governmentwide transformations that
are taking place. This is especially true as the establishment of a
Department of Homeland Security is put into place. Some steps are
critical and time sensitive. As a result, the FBI needs to develop a
comprehensive transformation plan with key milestones and assessment
points to guide its overall transformation efforts.
To effectively meet the challenges of the post-September 11
environment, the FBI should consider employing the major elements of
successful transformation efforts used by leading organizations here
and abroad. These begin with gaining the commitment of the agency head
and all in senior level leadership. It requires a redefinition and
communication of priorities and values; a performance management system
that will reinforce agency priorities; and a fundamental reassessment
of the organizational layers, levels, units, and locations. Any
realignment must support the agency‘s strategic plan and desired
transformation. Organizations that have successfully undertaken
transformation efforts also typically use best practices for strategic
planning; strategic human capital management; senior leadership and
accountability; realignment of activities, processes, and resources;
and internal and external collaboration among others.[Footnote 4]
Realign Staff to Address Terrorism:
The reorganization plan redirects about 5 percent of FBI‘s fiscal year
2002 agent workforce from drug, white-collar, and violent crime
investigations ’to ensure that all available energies and resources are
focused on the highest priority threat to the nation, i.e. terrorism.“
Careful monitoring will be needed to ensure that the agents working in
counterterrorism can be appropriately used and to what extent
additional resources will be needed.
Specifically, the FBI intends to shift a total of 518 agents from drug
(400), white-collar crime (59), and violent crime (59) investigations
to work on counterterrorism, security improvements, and training. This
shift represents about 30 percent of the staff currently assigned to
drug enforcement moving to counterterrorism, while for white-collar and
violent crime the shift is not as substantial, representing about 2.5
percent and 3 percent of their staff years, respectively.
Counterterrorism resources go from about 15 percent of total agent
resources to just under 20 percent. The plan also calls for building up
the FBI headquarters‘ Counterterrorism Division through the transfer of
150 counterterrorism agents from field locations to Washington, D.C.
These 150 positions would then be backfilled in the field through
recruitment of new agents.
Other staff realignment issues include (1) reconsideration of the 56
office structure in the field; (2) whether more de-layering of
management is needed to optimize the functioning of the organization;
and (3) significant succession planning issues--about 25 percent of the
special agent workforce is eligible for retirement through 2005 and 80
percent of the Senior Executive Corps was eligible to retire in 2001.
Build Analytic and Information-Sharing Capabilities:
The FBI‘s 1998 strategic plan identified shortcomings in its analytical
capabilities. For example, many analysts lacked academic or other
experience in the subject matter for which they were responsible and
most had little or no training in intelligence analysis. To build the
capacity to prevent future terrorist attacks, the FBI plans to expand
its Office of Intelligence, which was created in December 2001. The
Office will focus on improving the FBI‘s capacity to gather, analyze,
and share critical national security information. In addition, the FBI
plans to support the new Office by training analysts on the latest
tools and techniques for both strategic and tactical analysis.
The FBI Director also indicated that he has taken and will take
additional steps to enhance communication with the Central Intelligence
Agency (CIA) and other outside organizations. Although there are
certain legal restrictions in sharing information in a law enforcement
setting, the recently passed USA PATRIOT Act, Public Law 107-56,
contains a number of provisions that authorize information sharing and
coordination of efforts relating to foreign intelligence
investigations. For example, section 905 of the PATRIOT Act requires
the Attorney General to disclose to the CIA Director foreign
intelligence information acquired by Justice in the course of a
criminal investigation, subject to certain exceptions. Internally, the
plan includes new provisions that provide more authority to FBI field
offices to initiate and continue investigations.
Comprehensive Written Policy Needed for National Infrastructure
Protection Center:
The National Infrastructure Protection Center (NIPC) at the FBI is the
’national focal point“ for providing comprehensive analyses on threats,
vulnerabilities and attacks; issuing timely warnings on threats and
attacks; and coordinating the federal government‘s response to
computer-based incidents. In April 2001[Footnote 5] we reported that
the development of NIPC‘s analysis and warning capabilities were
limited by multiple factors, including the lack of a comprehensive
governmentwide or national framework for promptly obtaining and
analyzing information on imminent attacks, a shortage of skilled staff,
the need to ensure that NIPC does not raise undue alarm for
insignificant incidents, and the need to ensure that sensitive
information is protected. We recommended that NIPC develop a
comprehensive written policy for establishing analysis and warning
capabilities. Although the Director of NIPC generally agreed with our
findings, we are not aware of any actions taken to address this
recommendation. In addition, the 2002 Homeland Security Act transfers
the NIPC (except for its Computer Investigations and Operations
Section) out of the FBI and into the Department of Homeland Security.
Recruitment may Be More Difficult Due to Increased Competition for
Specialized Skills:
The FBI‘s planned recruitment of additional agents, analysts,
translators, and others with certain specialized skills and backgrounds
may become more difficult because other law enforcement and commercial
entities may be competing for the same qualified candidates
(particularly those with specialized technology, language, and science
skills). In total, the FBI is expected to hire 900 agents this year--
about 500 to replace agents who are projected to be leaving the agency
and 400 to fill newly created positions.
Hiring new agents with foreign language proficiency, especially those
with skills in Middle Eastern and Asian languages, is essential but
could be difficult given competing market demands for their skills. In
January 2002 we reported on the FBI‘s need for additional translators
and interpreters.[Footnote 6] Of a total of about 11,400 FBI special
agents, just under 1,800 have some foreign language proficiency, with
fewer than 800 (about 7 percent) having language skills sufficient to
easily interact with native speakers. Obtaining security clearances and
basic training will add additional time to the process of enhancing the
FBI‘s strength in language proficiency. While the FBI has shared
linguistic resources with other agencies, more opportunities for
pooling these scarce resources should be considered.
Improve Communications and Information Technology:
Long-standing communication problems for the FBI, such as antiquated
computer hardware and software and the lack of a fully functional e-
mail system, hamper the FBI‘s ability to share time sensitive
information internally and with other intelligence and law enforcement
agencies. Sharing investigative information encompasses legal
requirements related to law enforcement sensitive and classified
information and its protection through methods such as
encryption.[Footnote 7] There are also cultural barriers related to a
tradition of agents holding investigative information close so as not
to jeopardize evidence in a case. The need for more functional
communication will be essential for successful partnering with other
law enforcement agencies and the intelligence community. We do not
believe the FBI will be able to successfully change its mission and
effectively transform itself without significantly upgrading its
communications and information technology (IT) capabilities.
In February 2002 we reported that the FBI needed to fully establish the
management foundation that is necessary to begin successfully
developing, implementing, and maintaining an enterprise
architecture.[Footnote 8] Enterprise architecture is a comprehensive
and systematically derived description of an organization‘s operations,
both in logical and technical terms, that has been shown to be
essential to successfully building major IT systems. While the FBI
implemented most of the core elements associated with establishing the
management foundation, it had not yet established a steering committee
or group that has responsibility for directing and overseeing the
development of the architecture. The FBI needs to fully implement the
practices associated with effective enterprise architecture
management, including having a written and approved policy for
developing and maintaining the enterprise architecture and requiring
that IT investments comply with the architecture. We have ongoing work
evaluating the FBI‘s management of IT.
The Justice OIG shares similar concerns about the FBI‘s management of
its IT investments. In a December 2002 report,[Footnote 9] the OIG
reiterated the findings of our February 2002 report and added that the
FBI does not have effective IT investment management processes,
including lacking the architectural context for making internal IT
investment decisions. In addition, the FBI Director has designated IT
as one of the agency‘s 10 priorities.
Develop Internal Control System to Protect Civil Liberties:
Although the FBI wishes to become a more proactive agency, it also
needs to be cognizant of individuals‘ civil liberties. Guidelines
created in the 1970s to stem abuses of civil liberties resulting from
the FBI‘s domestic intelligence activities have recently been revised
to permit agents to be more proactive. For example, permitting FBI
presence at public gatherings, which generally had been inhibited by
the prior guidelines. No information obtained from such visits can be
retained unless it relates to potential criminal or terrorist activity.
To better ensure that these new investigative tools do not infringe on
civil liberties, appropriate internal controls, such as training and
supervisory review, must be developed, implemented, and monitored.
Manage Reorganization‘s Ripple Effect on Law Enforcement Community:
These FBI reorganization changes may have a ripple effect on the nature
and volume of work of other Justice Department units and their resource
needs, including DEA, the Office of Intelligence Policy and Review, the
U.S. Attorneys Offices, and the Criminal Division‘s Terrorism and
Violent Crime Section. For example, if the volume of FBI
counterterrorism investigations increases substantially, one could
expect an increased volume of Foreign Intelligence Surveillance Act
requests to the Office of Intelligence Policy and Review.[Footnote 10]
Moreover, should those requests be approved and subsequent surveillance
or searches indicate criminal activity, U.S. Attorneys Offices and the
Terrorism and Violent Crime Section would be brought in to apply their
resources to those investigations. In addition, one could expect more
legal challenges to the admissibility of the evidence obtained and to
the constitutionality of the surveillance or search.[Footnote 11] State
and local law enforcement are also likely to be affected by a change in
FBI focus. Although the major gap that state and local law enforcement
may have to help fill because of this realignment is in the drug area,
if additional FBI resources are needed for counterterrorism, state and
local law enforcement may have to take on greater responsibility in
other areas of enforcement as well.
Improve Enforcement of Immigration Laws and Provision of Immigration
Services:
The U.S. government, primarily the INS[Footnote 12] with aid from other
federal agencies such as the State Department, is faced with the
formidable task of enforcing the nation‘s immigration laws and
providing immigration services to eligible legal aliens. Immigration
enforcement is a complex, multifaceted function that includes, among
other things, patrolling 8,000 miles of international boundaries to
prevent illegal entry into the U.S.; inspecting over 500 million
travelers each year to determine their admissibility; apprehending,
detaining, and removing criminal and illegal aliens; disrupting and
dismantling organized smuggling and trafficking; and investigating and
prosecuting those who engage in benefit fraud, document abuse, and the
willful hiring of undocumented workers. Immigration services include
providing benefits, such as employment authorization and
naturalization, to those who legally enter and reside in the United
States. In this capacity, INS is expected to process millions of
applications each year, make the right adjudicative decision in
approving or denying the applications, and render decisions in a timely
manner. INS‘s responsibilities in carrying out its enforcement and
service functions are daunting and its past challenges are many.
Congress has continued to express concern about INS‘s ability to carry
out its enforcement and service functions, and over the last several
years has significantly increased INS‘s budget and staffing to help it
deal with its considerable workload. INS‘s fiscal year 2003 budget
request calls for a total of $6.3 billion in budget authority for
enforcement, services and support activities, almost three times its
fiscal year 1995 budget, and 37,100 in authorized positions, about 77
percent more than in fiscal year 1995. (See fig. 1.) Since the
September 11 attacks on the United States, concerns about shortcomings
in this country‘s immigration enforcement system have been highlighted.
INS received $549 million in emergency counterterrorism funding
following September 11, augmenting the $3.3 billion that had already
been allocated to enforcement activities.
Figure 1: INS Budget Authority (immigration enforcement, services and
support activities), Fiscal Years 1994-2003:
[See PDF for image]
[End of figure]
INS still has many challenges before it can achieve the intended
results of both effective enforcement and service delivery. Those
challenges relate to how the government‘s immigration function should
be managed; that is, how to manage efforts to implement programs to
control the border and reduce alien smuggling, reduce immigration
benefit fraud, reduce unauthorized alien employment, remove criminal
aliens, manage the immigration benefit application workload, and risks
posed by the State Department‘s visa operations. In addition, INS is
faced with significant IT challenges as it moves forward to implement
legislation and other initiatives passed since the September 11
attacks. Although INS‘s functions will be transferred to the new
Department of Homeland Security, many of the management and
programmatic challenges that we and others have identified will
continue if these challenges are not addressed by the new department.
INS Estimates That Significantly More INS Resources and Time Needed to
Fully Implement Border Control Strategy, Yet Overall Effectiveness
Still Unknown:
The INS Border Patrol is responsible for preventing and deterring
aliens from illegally entering the United States between ports of
entry. We reported in August 2001 that the Border Patrol was in the
seventh year of implementing a border control strategy.[Footnote 13] At
that time it was in the second phase of a four-phase strategy that
called for allocating additional Border Patrol resources along the
southwest border. The Justice Office of the Inspector General (OIG)
reported in 2002 that INS developed a northern border strategy in 2000,
but implementation was initially delayed because of changes in
administration and in INS leadership, and the events of September 11,
2001.[Footnote 14] While INS has taken steps since our January 2001
management challenges report to begin evaluating its southwest border
strategy, it remains to be seen how reliable and meaningful the results
of the assessment will be.
Before September 11, INS had generally allocated its agents in
accordance with the strategy; that is, deploying agents and other
resources first to the areas with the highest levels of illegal
activity. In response to the September 11 terrorist attacks, INS
accelerated deployment of personnel and resources to the northern
border and plans to continue doing so in fiscal year 2003. In fiscal
year 2002, 245 Border Patrol agents were allocated to the northern
border, a tenfold increase compared to the 24 allocated in fiscal year
2001. The southwest border had nearly 9,200 Border Patrol agents as of
August 2002. (See fig. 2.) We reported in August 2001 that INS‘s
preliminary estimates indicated that gaining control of the southwest
border could take at least 5 more years and between 11,700 and 14,000
Border Patrol agents, additional support personnel, and hundreds of
millions of dollars in technology and infrastructure. It is unclear
what impact redirecting resources to the northern border will have on
gaining control of the southwest border.
Figure 2: Onboard U.S. Border Patrol Agents on the Southwest Border,
Fiscal Years 1993 to August 2002:
[See PDF for image]
Note: The number of agents for fiscal year 2002 is as of August 2002.
[End of figure]
In addition to taking longer to control the southwest border than INS
originally thought, questions about the overall effectiveness of the
southwest border strategy remain. We reported in August 2001 that the
primary discernable effect of the southwest border strategy appeared to
be a shifting of illegal alien traffic, and at that time there was no
clear indication that overall illegal entry had declined along the
southwest border.[Footnote 15] However, after a relatively steady
increase in yearly apprehensions between fiscal years 1993 and 2000,
apprehensions declined 43 percent from 1.64 million in 2000 to 0.93
million in 2002. Although INS maintained data on apprehended aliens in
its automated fingerprint system, it had not analyzed the data to
determine how many aliens had been arrested, how many times they had
been arrested, where they had been arrested, and how the numbers
changed over time in response to border enforcement efforts. Such
information would provide a better understanding of the relationship
between INS‘s strategy and overall illegal entry along the southwest
border. In response to our recommendation that it use the data in its
automated fingerprint system to help measure the results of border
control efforts and refine its border enforcement strategy, INS
established a working group to examine how the data could be used in
such a manner.
In February 2002, INS issued a plan for evaluating its southwest border
strategy. The plan listed numerous indicators INS will use to evaluate
the overall effects of the strategy. For example, the plan indicated
that INS would measure changes over time in the number apprehensions of
illegal aliens between the ports of entry, locations of apprehensions,
alien smuggling patterns, fees charged by smugglers, and the number of
fraudulent entry attempts at the ports of entry. (See fig. 3.) It is
too early to tell how INS will conduct its evaluation or the extent to
which the study will yield reliable and meaningful results. INS‘s plan
did not specify the time frame for completing the evaluation.
Figure 3: U.S. Border Patrol Apprehensions on the Southwest Border,
Fiscal Years 1993-2002:
[See PDF for image]
[End of figure]
Fragmented and Unfocused INS Efforts to Combat Immigration Benefit
Fraud:
In January 2002,[Footnote 16] we noted that fraud to obtain immigration
benefits was a significant problem that threatened the integrity of the
legal immigration system because it results in INS granting valuable
benefits to ineligible aliens. Fraud involves attempts by aliens to
obtain benefits--such as naturalization, work authorization, and
adjustment of status--through illegal means (e.g. using fraudulent
documents). INS officials told us that they believed the problem was
’pervasive and serious“ and that some aliens were using the benefit
application process to carry out illegal activities, such as crimes of
violence, narcotics trafficking, and terrorism. While the extent of
immigration benefit fraud is unknown, INS investigations have uncovered
various schemes involving the filing of thousands of fraudulent
applications.
Although immigration benefit fraud has grown more serious,
institutionally, INS has not positioned itself to combat this
significant problem. As we reported in January 2002, several
difficulties have hampered INS‘s immigration benefit fraud
investigations. Immigration benefit fraud has been a comparatively low
priority within INS and resources devoted to it have been limited. For
example, four INS services centers receive several million applications
for immigration benefits yearly, yet in 2000, INS had only 40 positions
dedicated to fraud detection and analysis. As we reported, INS lacked a
comprehensive plan on how its different investigative components are to
coordinate their immigration benefit fraud investigations and how INS
had not established guidance to ensure the highest priority cases are
investigated. In addition, INS lacked an agencywide case tracking and
management capability to maintain important data on targets of fraud
investigations. Finally, INS staff who adjudicate applications for
immigration benefits did not have access to the data they needed to
ensure that only eligible aliens obtain immigration benefits.
INS agreed with our January 2002 report that it should more effectively
detect fraudulent applications and process applications in a more
timely manner, and has begun to implement some of our recommendations.
For example, in response to our recommendation that it better integrate
its many units involved in benefit fraud enforcement, INS developed a
strategic plan for combating immigration fraud describing, among other
things, how its different investigative components were to coordinate
their immigration benefit fraud investigations. In response to our
recommendation that it develop a method to track and manage benefit
fraud investigations, in April 2002, INS mandated that all
investigative components begin using the automated agencywide Criminal
Investigative Reporting System to track and manage all criminal
investigations. Also following the September 11 attacks, the Attorney
General mandated certain changes in processing immigration benefit
applications. For example, he required that all applications be checked
against a federal law enforcement database. Our ongoing work will
evaluate changes made to the immigration benefit application process
since the September 11 attacks.
Efforts to Reduce Unauthorized Employment Face Impediments:
Many immigration experts believe that as long as opportunities for
employment exist, the incentive to enter the United States illegally or
overstay visas will persist and that efforts at the U.S. borders to
prevent illegal entry will be undermined. The Census Bureau estimated
that there were about 8 million illegal aliens in the United States in
2000.[Footnote 17] We testified in June 2002[Footnote 18] that hundreds
of thousands of aliens unauthorized to work in the United States have
used fraudulent documents to circumvent the process designed to prevent
employers from hiring them. Employers who hire unauthorized workers
face little chance of being investigated by INS, in part because
resources for work site enforcement have been relatively small. In
1998, INS devoted slightly over 300 work years to work site
enforcement, which declined to about 124 work years in fiscal year
2002. How much INS can accomplish with its limited work site
enforcement resources is questionable. Although there has been a slight
increase in the number of work years devoted to work site enforcement
since September 11 (specifically, 124 work years in fiscal year 2002
compared to 109 work years for fiscal year 2001), the resources
allocated to work site enforcement continue to be limited. Therefore,
we concluded that INS needed to ensure that it is making the best use
of its limited enforcement resources.
Another impediment we testified about in June 2002 pertained to
difficulty INS had coordinating work site enforcement with the
Department of Labor. While INS implemented our 1999
recommendations[Footnote 19] to seek assistance from state labor
agencies in disseminating information to employers about its pilot
programs for verifying employees‘ eligibility to work, coordinating
these efforts with Labor was difficult because the two agencies have
different enforcement missions. Labor stated that if employees thought
that Labor investigators were trying to determine their immigration
status, the employees‘ willingness to report workplace violations to
Labor could be jeopardized.
As a result of the September 11 attacks, INS has changed its priorities
regarding the types of employers that it will investigate. Prior to
September 11, INS focused its work site investigations on employers in
industries that traditionally relied on unauthorized workers, such as
restaurants, hotels, and construction. INS now plans to turn its
attention to employers in industries critical to the nation‘s
infrastructure, such as airports and municipal water supplies. For
example, after September 11, INS launched Operation Tarmac to focus on
companies employing individuals who have direct access to commercial
aircraft or who provide airport security. According to a June 2002 INS
testimony, Operation Tarmac had resulted in over 500 arrests of
unauthorized aliens and over 260 criminal charges. INS also initiated a
similar operation focusing on nuclear power facilities.[Footnote 20] As
a result, INS plans to limit the number of investigations of
’traditional“ employers of unauthorized aliens. How this shift in focus
will affect unauthorized employment by these traditional employers is
unknown. Conceivably, it could reduce unauthorized employment in the
more sensitive national security areas, leaving the general problem
unsolved.
Improvements Needed in Identifying and Removing Criminal Aliens:
Based on nationwide data, we reported in 1997[Footnote 21] and again in
1999[Footnote 22] that INS efforts to identify and remove imprisoned
aliens needed improvement. INS had failed to identify all deportable
criminal aliens, including aggravated felons. As a result, INS did not
fully comply with the legal requirements that it (1) place criminal
aliens who had committed aggravated felonies in removal proceedings
while they are incarcerated or (2) take those aggravated felons into
custody upon their release from prison. Therefore, many aggravated
felons were released from prison without being taken into INS custody
and subsequently rearrested for such crimes as assault, robbery, and
drug offenses. In September 2002 the Justice OIG reached the same
conclusion. Based on data primarily from California and Florida, the
OIG reported that INS has not effectively managed its national program
to identify and remove criminal aliens.[Footnote 23]
In June 2001,[Footnote 24] the OIG reported that INS was placing the
traveling public at potential risk because it was not consistently
following its policy of providing INS escorts for violent aliens being
removed from the United States via commercial airlines. As a result,
some potentially violent aliens were removed without escorts on
commercial airlines. In addition, INS‘s escort policy failed to require
escorts for some aliens who may pose a danger to the public. The
Inspector General made a number of recommendations to INS for improving
its escort procedures through actions such as training staff in the use
of INS‘s escort standard, monitoring, verifying adherence to escort
standard, and clarifying its responsibilities.
Shortcomings in Alien Antismuggling Efforts:
We, along with the Justice Inspector General,[Footnote 25] have issued
reports identifying weaknesses in INS‘s antismuggling efforts. We
reported in May 2000[Footnote 26] and in our last management challenges
report, that alien smuggling was a significant and growing enforcement
problem. Although INS had developed an antismuggling strategy with both
domestic and international components, we found that INS‘s ability to
implement and evaluate the domestic component of its strategy was
impeded by several factors. First, INS‘s antismuggling program lacked
program coordination, which resulted in multiple antismuggling units
overlapping in their jurisdictions, made inconsistent decisions about
which cases to open, and functioned autonomously and without a single
chain of command. Second, INS lacked an agencywide automated case
tracking and management system that prevented antismuggling program
managers from being able to monitor their ongoing investigations,
determining if other antismuggling units were investigating the same
target, or knowing if previous investigations had been conducted on a
particular target. Third, INS had limited performance measures to
assess the strategy‘s effectiveness to deter and disrupt alien
smuggling.
We concluded that without improvements in its investigations and
intelligence programs, INS‘s antismuggling efforts would continue to be
hampered and INS would find it difficult, if not impossible, to meet
the challenges posed by increasingly sophisticated major smuggling
organizations. Since our January 2001 management challenges report, INS
implemented our recommendation that it set up a case tracking and
management system to facilitate sharing of case information and prevent
duplication of effort. As noted earlier in this report, in April 2002,
INS mandated that all investigative components begin using the
automated agencywide Criminal Investigative Reporting System to track
and manage all criminal investigations. INS also agreed to implement
our other recommendations that it establish (1) criteria for opening
antismuggling cases to help ensure that resources are focused on the
highest priority cases, and (2) performance measures to gauge the
effects of its efforts. INS also agreed to implement the Inspector
General‘s recommendations that it examine coordination, program
structure, and communication issues to make improvements in its
antismuggling program.
Problems Managing INS‘s Application Workload:
Despite years of increasing budgets and staff, INS has continued to
experience significant problems managing its workload of processing
applications for such services and benefits as naturalization,
immigrant status adjustment, employment authorization, and granting
asylum. Even though aliens pay fees to INS for processing their
applications, and even though INS‘s budget for processing immigration
benefit applications increased sevenfold from fiscal year 1994 to 2002,
aliens have faced long waits for decisions on their cases and have had
difficulty obtaining accurate information on how long they can expect
to wait. As of October 2002, INS had a backlog of 5.2 million
applications, an almost fivefold increase since October 1994.
We reported in May 2001[Footnote 27] that better automation capability
and a more streamlined application process would enable INS to provide
improved levels of service. Automation improvements would provide INS
with the necessary information to determine whether (1) all the
applications received are processed, (2) applications are worked on in
the order in which they are received, (3) prompt and correct responses
are provided to applicants inquiring about the status of their cases,
and (4) aliens have been waiting very long to have their applications
processed. Although INS believed that additional staff would reduce its
application backlog problem, it was not in a position to determine the
extent to which staff shortages played a part in this problem. INS did
not know how to deploy its staff to process applications in a timely
fashion because it lacked a systematically developed staff resource
allocation model. We made a number of recommendations that would help
INS improve the application process and its management of it. INS
concurred with our recommendations and has begun to implement some of
them. For example, in response to our recommendation that INS develop
guidance and training on how to screen adjustment of status
applications in order to reduce errors in granting work authorization,
INS developed standard operating procedures. INS said it has
implemented the procedures and also instituted quality assurance
reviews of the adjudication process.
The Justice‘s Inspector General said that since the September 11
terrorist attacks, INS has made efforts to decrease the times needed to
process applications for changing immigration status and extending
stays.[Footnote 28] However, although INS made processing these
applications a priority shortly after September 11, its processing
times slowed because it had to meet a new requirement to run the
applications through the Interagency Border Inspection System (IBIS)
database before rendering a decision. In addition, in 2002, the
President announced a 5-year, $500 million initiative to eliminate the
backlogs of applications for immigration benefits and maintain a 6-
month processing time standard for all applications by the end of
fiscal year 2003.
Problems Coordinating with State Department on Using the Visa Process
to Screen for Potential Terrorists:
Given the events of September 11, 2001, there is public concern that
terrorists or other criminals may be exploiting the visa granting
process to gain entry into the United States. Generally, citizens of
foreign countries must apply for and obtain a nonimmigrant visa travel
document at U.S. embassies or consulates abroad before arriving at U.S.
ports of entry for business, tourism, and other reasons.[Footnote 29]
State Department consular officers issued 7.6 million visas in fiscal
year 2001. All 19 of the September 11, 2001, terrorist hijackers were
issued nonimmigrant visas. The granting of visas is a State Department
responsibility. However, Justice entities, most importantly the FBI,
are responsible for assisting the State Department by doing name checks
of selected visa applicants to determine if they are potential
terrorists and, therefore, should be denied a visa on terrorism grounds
under section 212(a)(3)(B) of the Immigration and Nationality Act
(INA).
In the months following the terrorist attacks, the State Department
instituted two new name check procedures for selected categories of
applicants. Until recently, the FBI had not implemented these two name
checks in a thorough or timely manner. As a result of the initial
delays, the Foreign Terrorist Tracking Task Force[Footnote 30] began
conducting one of the two name checks for the FBI in late April 2002.
Of the estimated 38,000 special name checks processed by August 1,
2002, the task force had identified about 280 visa applicants who
should be denied a visa under the INA‘s terrorism provision. The task
force either believed these applicants are suspected terrorists, or, in
the majority of the cases, needed additional information to determine
the applicant‘s true identity. As a result of delays in the FBI‘s name
check processing, State received the refusal recommendation for about
200 of these applicants after overseas posts had already issued them
visas. The State Department revoked the visas in these cases as a
prudent measure and notified the INS. In mid-September 2002, the
executive branch changed the name check procedures in an attempt to
reduce the review time for applicants subject to the name checks. In
October 2002[Footnote 31] we recommended that the Assistant to the
President for Homeland Security coordinate with the appropriate
agencies to (1) reassess interagency headquarters security checks to
verify that all are necessary and ensure their timely coordination
among U.S. agencies; (2) consider reassessing, on an interagency basis,
visas issued before the implementation of the new security checks for
selected categories of applicants who may pose security risks; and (3)
ensure that law enforcement and intelligence agencies are promptly
providing information to the State Department on persons who may pose a
security risk and who, therefore, should not receive a visa.
Also, Justice and State have different views on how to apply the INA‘s
terrorism provision, section 212(a)(3)(B), to visa applicants whose
names have resulted in a possible match against FBI or Foreign
Terrorist Tracking Task Force databases.[Footnote 32] According to the
State Department, it requires specific evidence to prove an applicant
ineligible under this provision. State says that consular officers must
know the specific actions or associations that may render an applicant
ineligible to legally deny a visa. Justice, however, believes that a
consular officer need not have specific evidence that the applicant
participated in terrorist activities or associations to justify a visa
denial. In addition, Justice believes that it will often be impossible
to know for sure whether a visa applicant is indeed the same person
contained in the relevant databases, even after all the applicant‘s
information is shared between the two departments. In that situation,
State thinks it is appropriate to proceed cautiously and deny a visa on
the theory that the name check match does provide the consular officer
a ’reasonable ground to believe“ that the applicant presents a threat
to national security and is, therefore, ineligible for admission. We
recommended that the Assistant to the President for Homeland Security
coordinate with the appropriate agencies to establish a governmentwide
policy on the level of evidence needed to deny a visa on terrorism
grounds.
The President‘s Department of Homeland Security proposal calls for visa
policy-making authority to be transferred to this new department, while
retaining administration of visas within the Department of State.
Congress is studying this proposal and considering how the visas
functions should be organized.
INS‘s Information Technology Management Weaknesses:
Each year INS has invested hundreds of millions of dollars on IT
systems and activities to carry out its core missions of (1) preventing
aliens from entering the United States illegally and removing aliens
who succeed in doing so and (2) providing services or benefits to
facilitate entry, residence, employment, and naturalization of legal
immigrants. However, the September 11TH terrorist attacks and INS‘s
critical role in preventing future attacks have increased INS‘s need
for effectively leveraging technology to achieve mission goals. To
illustrate, INS reportedly obligated about $297 million on IT
activities in fiscal year 2001, and about $459 million in fiscal year
2002, a 50 percent increase.
Despite the importance and prevalence of IT systems in accomplishing
its core missions, INS has not yet established and implemented
effective controls for managing its IT resources. Over the last decade,
Justice‘s OIG has reported that INS was not following established IT
project management procedures. Most recently, the OIG reported in
August 2001[Footnote 33] that despite having spent $31.2 million on its
Automated I-94 system,[Footnote 34] INS did not know whether the system
was meeting its intended performance goals. The root cause of the INS
system problems has been an absence of effective enterprise
architecture management and IT investment management. In August and
December 2000, we reported on INS‘s management weaknesses in both of
these areas and concluded that INS was not in a position to know
whether its ongoing and planned IT investments are the right things to
do or that they are being done the right way.[Footnote 35] That is, INS
does not know whether these investments will produce value commensurate
with costs and risk, whether they are aligned with an agencywide
blueprint (enterprise architecture) defining how the agency plans to
function in the future (operationally and technologically), or whether
each investment is meeting its cost, schedule, and performance
commitments.
To address these weaknesses, we made a series of recommendations in
August and December 2000. In response to the recommendations, INS has
developed an enterprise architecture, including a current and target
architecture, and a transition plan. Similarly, INS has taken steps to
implement rigorous and disciplined investment management controls. In
particular, it has (1) developed policies and procedures for
implementing its investment management process and (2) established
selection criteria for assessing the relative merits of each IT
investment that address cost, schedule, benefits, and risk. While these
are positive steps, much remains to be done before INS can fully
implement effective investment management controls and be in a position
to make informed IT investment decisions.
Adding to these problems is the urgency for INS to strengthen its
border security operations, which means that INS needs to expeditiously
involve new system capabilities while it addresses its IT management
shortcomings. In October 2001,[Footnote 36] we testified that the
recent terrorist attacks and the demands that they have placed on INS‘s
border security mission will require INS to effectively leverage
technology as part of its response to these demands. Accordingly, we
stated that INS will have to actively compensate for missing management
controls by ensuring that the requisite human capital skills and
expertise are brought to bear on IT projects supporting its border
security mission; and in the long term, INS will need to establish
controls for implementing and maintaining its enterprise architecture
and follow through on its ongoing efforts to establish and implement
effective investment management process controls.
Better Manage Programs Designed to Support State and Local Efforts to
Reduce Crime:
Justice provides support to state and local efforts to prevent and
control crime, administer justice, and assist crime victims. As part of
its role, Justice awards grants to organizations, including state and
local governments, through the Office of Justice Programs (OJP).
Programs overseen by OJP include those administered by the Violence
Against Women Office (VAWO),[Footnote 37] the Office of Juvenile
Justice and Delinquency Prevention (OJJDP), the Executive Office for
Weed and Seed (EOWS), the Office of Police Corps (OPC), and the Bureau
of Justice Assistance (BJA), which includes the Drug Courts Program
Office (DCPO). Our work over the past 5 years on a number of programs
administered by these offices has (1) shown long-standing problems with
OJP grant monitoring and (2) raised questions about the methodological
rigor of some of OJP‘s impact evaluation studies. Monitoring and
evaluations are needed to identify whether programs are operating as
intended, reaching those who should be served, and ultimately making a
difference in the fight against crime and delinquency.
Problems with OJP Grant Monitoring:
In March 2002[Footnote 38] we testified that our work at OJP since 1996
has shown continuing grant monitoring problems among some bureaus and
offices.[Footnote 39] We found that files for certain discretionary
grants often lacked the documentation necessary to ensure that required
monitoring activities occurred. Neither OJP nor our office could
determine the level of grant monitoring performed by grant managers
required by OJP and the comptroller general‘s internal control
standards, which call for documentation of all transactions and
significant events to ensure that management directives are carried
out.[Footnote 40] As a result, we recommended that OJP (1) study and
propose ways to systematically test or review grant files to ensure
consistent documentation across OJP and (2) explore ways to
electronically compile and maintain documentation of monitoring
activities to facilitate more consistent documentation, more accessible
management oversight, and sound performance measurement.
Others, including OJP and Justice‘s OIG, have identified problems with
grant monitoring. In 1996, an OJP-wide working group found that grant
monitoring was not standardized in OJP and that a tracking system was
needed to facilitate control of the monitoring process. In 2000, an
independent contractor found that OJP lacked consistent procedures and
practices for performing grant management functions across the
agency.[Footnote 41] The contractor recommended that, among other
things, OJP develop an agencywide, coordinated, and integrated
monitoring strategy; standardize procedures for conducting site visits
and other monitoring activities; and mandate the timeliness and filing
of monitoring reports. Finally, the OIG reported on OJP-wide monitoring
problems, having identified grant management as 1 of the 10 major
management challenges facing Justice in 2000 and 2001.[Footnote 42]
Among other things, the OIG stated that Justice‘s multibillion dollar
grant programs are a high risk for fraud, given the amount of money
involved and the tens of thousands of grantees. Additionally, past OIG
reviews determined that many grantees did not submit the required
progress and financial reports and that program officials‘ on-site
reviews did not consistently address all grant conditions.
Too Early to Gauge Effectiveness of OJP Efforts to Resolve Grant
Monitoring Problems:
It is too early to tell how effective OJP‘s efforts to resolve grant
monitoring problems will be. In its Fiscal Year 2000 Performance Report
and Fiscal Year 2002 Performance Plan, OJP established a goal to
achieve effective grant management--in part by progressing toward fully
implementing a new grant management system. This new system is intended
to help set priorities for program monitoring and facilitate timely
program and financial reports from grantees. At the time of our review
in 2001, the new system covered grants for some organizations up to the
award stage.[Footnote 43] When fully operational, it is envisioned to
produce reports in response to informational requests, provide
information pertaining to grantees and all resources provided by OJP,
and maintain information from the opening to the closing of a grant
award. However, it was still unclear whether the new system will
include the full range and scope of monitoring activities.
We also reported that OJP had been working on other key efforts, such
as new OJP-wide guidance for grant administration, including grant
monitoring. In January 2001, OJP released its Grant Management Policies
and Procedures Manual to update and codify OJP‘s policies and
procedures regarding its business practices.[Footnote 44] At the time
of our review, OJP had trained over 300 grant managers and had plans to
train supervisors about the new guidance. However, there were no plans
to test or systematically monitor compliance with the new guidelines to
ensure that grant managers were fulfilling their responsibilities.
OJP‘s bureaus and program offices have taken steps to respond to our
reports. For example, with respect to our 1999 Weed and Seed
report,[Footnote 45] EOWS said it recognized the need to improve
program monitoring and documentation of all monitoring visits. In a
July 2000 letter, EOWS officials reported it had taken steps to improve
program monitoring, including documentation of site monitoring visits.
Also, VAWO has developed an internal monitoring manual that is intended
to enhance accountability in performing oversight and help improve
monitoring quality, consistency, and uniformity. OPC, another OJP
program highlighted in the 2001 issue of this report, continues to make
progress in obligating funds and establishing interagency agreements.
By the end of September 2002 OPC plans to award a total of $53 million
to 27 participating states, 22 of which are actively recruiting and
training. Although OPC‘s service agreements with 1,402 police corps
candidates[Footnote 46] is fewer than the 2,128 slots authorized, it
does reflect moderate program expansion.
Concerns about Methodological Rigor of Impact Evaluation Studies:
We have also issued reports questioning the methodological rigor of OJP
grant program impact evaluation studies. For example, as we reported in
March 2002,[Footnote 47] three impact evaluations examining VAWO
programs had methodological problems that question whether the
evaluations will produce definitive results. These evaluations are
particularly arduous because of variations in program implementation.
In addition, VAWO sites participating in the impact evaluations did not
appear to represent their programs, thereby limiting the evaluators‘
ability to generalize the results. Further, the lack of nonprogram
participant comparison groups hindered isolating external factors from
the program‘s impact alone. Finally, data collection and analytical
problems (e.g. related to statistical tests, assessment of change)
compromised the evaluators‘ ability to draw appropriate conclusions
from the results. We recommended, among other things, that OJP assess
its evaluation process and develop approaches to mitigate potential
methodological design and implementation problems. The assistant
attorney general agreed with the substance of our recommendations and
has begun or plans to take steps to address them.
Our October 2001 review[Footnote 48] of 10 OJJDP impact evaluations
undertaken since 1995 also raised some concerns about whether many of
the evaluations would produce definitive results. Two of the
evaluations that were in their later stages and three of those that
were in their formative stages at the time of our review lacked
specific plans for comparison groups. Furthermore, three of the five
evaluations that were well into implementation at the time of our
review had developed data collection problems. We recommended that
OJJDP assess the five impact evaluations that were in their formative
stages to address potential problems and intervene if necessary to help
ensure definitive results. In commenting on a draft of our report, the
assistant attorney general said that OJP would use our report to
improve the quality of its evaluations and design programs to achieve
greater impact. Two months after our report‘s issuance, OJP told us
that OJJDP had decided to discontinue the one evaluation that was to
use a comparison group because it was unable to identify a comparison
site. In addition, OJJDP was considering scaling back and refocusing
the scope of another evaluation because the program being studied did
not lend itself to an impact evaluation with comparison groups.
Better Data Collection and Evaluation Efforts Needed to
Measure Impact of Federally Funded Drug Court Programs:
Despite the increasing number of drug court programs[Footnote 49]
required to collect and maintain performance and outcome data, and
despite our recommendations in 1997[Footnote 50] to improve evaluation
efforts, Justice‘s DCPO continues to lack vital information on the
impact of its programs. Although certain DCPO programs must collect and
provide performance measurement and outcome data, Justice has not
effectively managed this effort because of (1) its inability to readily
identify the universe of DCPO-funded drug court programs, including
those subject to DCPO‘s data collection reporting requirements; (2) its
inability to accurately determine the number of drug court programs
responding to DCPO‘s semiannual data collection survey; (3)
inefficiencies in the administration of DCPO‘s semiannual data
collection effort; (4) the elimination of post-program impact questions
from DCPO‘s data collection survey effort; and (5) insufficient use of
the Drug Court Clearinghouse. Also, because of various administrative
and research factors that have hampered Justice‘s ability to complete
the two-phase National Institute of Justice-sponsored national impact
evaluation study, Justice cannot provide Congress and drug court
program stakeholders with reliable information on program performance
and impact.
To improve data collection on the performance and impact of federally
funded drug court programs, we recommended in April 2002[Footnote 51]
that the Attorney General (1) develop and implement a management
information system to track and identify the universe of DCPO-funded
drug court programs; (2) take steps to ensure and sustain an adequate
grantee response rate to DCPO‘s data collection efforts; (3) take
corrective actions toward grantees who do not comply; (4) reinstate the
collection of post-program data, selectively spot checking grantee
responses to ensure accurate reporting; (5) analyze performance and
outcome data collected from grantees and report annually on the
results; and (6) consolidate the multiple drug court program-related
data collection efforts to ensure the primary focus is on DCPO-funded
drug court programs. We also recommended that the Attorney General
accelerate the funding and implementation of a methodologically sound
national impact evaluation, consider ways to reduce the time needed to
provide information on overall program impact, and implement
appropriate oversight of this evaluation effort.
In response to our recommendations, Justice plans to (1) develop an
management information system that would track the universe of DCPO-
funded drug court programs and (2) revamp DCPO‘s data collection
efforts in conjunction with the National Institute on Drug Abuse. Both
are expected to be completed in 2003. However, we believe that it is
unclear whether Justice‘s plans will address all of the insufficiencies
we have cited or how well Justice will monitor grantee compliance with
data collection, reporting, and evaluation requirements. Until Justice
fully implements our recommendations, Congress, the public, and other
stakeholders will continue to lack sufficient information to measure
long-term program benefits and to assess how these programs affect
criminal behavior of substance abuse offenders and whether these
programs are an effective use of federal funds.
Achieve Financial Accountability for Fiscal Year 2002 and Beyond:
Justice achieved an unqualified audit opinion on its fiscal year 2001
departmentwide financial statements, which was one of the Attorney
General‘s foremost priorities. Justice improved from receiving a mixed
audit opinion on its fiscal year 2000 departmentwide financial
statements[Footnote 52] to receiving an unqualified audit opinion in
2001.[Footnote 53] One of key improvements made since we last reported
is the financial statement audit results of the INS. INS was the only
component of Justice that did not receive an overall unqualified audit
opinion in fiscal year 2000. For the fiscal year 2001 financial
statements, INS received its first overall unqualified audit opinion
after gathering appropriate accounting records and documents to support
its deferred revenue and vendor payable accounts. However, the auditors
continued to report material internal control weaknesses at the INS and
several other components. While obtaining an unqualified audit opinion
on the fiscal year 2001 financial statements for Justice as a whole and
for each of its components was an important milestone, it is not an end
in and of itself. The end goal is to achieve financial accountability
by having systems and controls in place that provide accurate, timely,
and useful financial information to manage Justice and its components
on a day-to-day basis.
Justice has 10 components for financial reporting purposes: (1) Assets
Forfeiture Fund and Seized Asset Deposit Fund (AFF); (2) Working
Capital Fund (WCF); (3) Offices, Boards, and Divisions (OBD); (4) USMS;
(5) OJP; (6) DEA; (7) FBI; (8) INS; (9) Federal Bureau of Prisons
(BOP); and (10) Federal Prison Industries, Incorporated (FPI). Five of
these 10 components continue to have significant systems and material
internal control weaknesses that preclude them from achieving the goal
of financial accountability. The weaknesses identified can be
categorized into three major areas: (1) ineffective general and
application controls over financial management systems of various
components, (2) lack of adherence to established policies and
procedures for recording financial transactions in accordance with
generally accepted accounting principles, and (3) ineffective financial
statement preparation processes. Furthermore, the auditors for the same
five components reported that they found internal control weaknesses
that were significant departures from the systems requirements of the
Federal Financial Management Improvement Act of 1996 (FFMIA). Until
these material weaknesses are addressed, Justice, regardless of the
type of audit opinion received, will continue to be at risk for errors,
fraud, or noncompliance that may not be promptly detected.
The auditors reported a total of 13 material weaknesses[Footnote 54]
for the Justice components for fiscal year 2001, compared to 15 and 14
material weaknesses reported for fiscal years 2000 and 1999,
respectively. While the 2001 results represent some improvement over
prior years, the large number of remaining material weaknesses
continues to indicate a lack of financial accountability in most
Justice components. As previously noted, these material weaknesses are
categorized into three main areas, which will be discussed in more
detail in the next section.
Material Weaknesses in General and Application Controls over Component
Financial Management Systems:
The auditors for 4 out of the 10 components reported weaknesses in
general and application controls over financial management information
systems. Specific concerns were found in the areas of entity-wide
security, access controls, application software development and change
controls, service continuity, segregation of duties, and system
software. For example, the component auditors reported that:
* Several of the DEA‘s data processing systems (1) have an expired
certification/accreditation, (2) cannot track personnel who are granted
access to the system or whose access should be terminated, (3) do not
have documented procedures for handling software changes, and (4)
cannot trace data entries to source documents.
* Security plans have not been completed for two financial management
applications at the USMS, and contingency plans were either outdated or
incomplete.
* Although the financial management system of record at the INS has
been
in development for almost 5 years, the implementation is not complete,
requiring the majority of INS‘s transactions to be entered into its
legacy system, which has many inherent control weaknesses. Auditors
reported that collectively, the DEA process presents significant risks
to the continued operation of INS‘s financial management system as a
whole.
The material weaknesses identified over program and application
controls increase the risk that programs and data processed on these
components‘ systems are not adequately protected from unauthorized
access or service disruption. These weaknesses could compromise
Justice‘s ability to ensure security over sensitive programmatic or
financial data, reliability of its financial reporting, and compliance
with applicable laws and regulations. Furthermore, without adequate
controls over financial management systems, the components could
experience a loss or manipulation of data as well as potential
financial losses from expensive efforts to recover such system or data
losses.
Material Weaknesses in Recording Financial Transactions in Accordance
with Generally Accepted Accounting Principles:
The auditors reported that 4 of 10 components did not always follow
policies or procedures in place to ensure that financial transactions
were recorded in accordance with generally accepted accounting
principles. Specifically, various component entities did not record
financial transactions in accordance with certain Statements of Federal
Financial Accounting Standards (SFFAS), which include the following:
* SFFAS No. 1, Accounting for Selected Assets and Liabilities--FBI
auditors reported that inefficient vendor invoice approval and payment
processes contributed to the initial under-reporting of liabilities and
increased FBI payments for interest and penalties under the Prompt Pay
Act. Auditors also reported that the DEA continues to have significant
unreconciled differences between the collections and disbursements
recorded in its accounting records and those recorded by the U.S.
Treasury.
* SFFAS No. 3, Accounting for Inventory and Related Property--FPI
auditors reported that financial accounting system deficiencies
continue to exist in the capture, processing, reporting, and use of
inventory data. These deficiencies affect the ability of the FPI to
reasonably estimate overhead rates and consistently value finished
goods inventories.
* SFFAS No. 5, Accounting for Liabilities of the Federal Government--
Auditors of the DEA, INS, and FBI reported that components‘ processes
to estimate accounts payable were not adequate or were not completed in
a timely manner. Specifically, some methods used were not well
supported, used noncurrent information, and did not properly record
some obligations.
* SFFAS No. 7, Accounting for Revenue and Other Financing Sources--
Auditors of the INS and FPI reported that improvements are needed in
the components‘ accounting for earned and deferred revenues. In some
instances, the components could not provide regular and timely support
for general ledger entries, consistently or adequately perform
collection efforts, or invoice customers in a timely manner.
The specific reporting deficiencies described raised concerns over the
components‘ abilities to make reasonable estimates, ensure the security
of assets, value and support recorded transactions appropriately, and
reduce unnecessary manual processing at year-end. Despite these
concerns over ongoing compliance with the SFFAS, an unqualified opinion
over the Justice‘s financial statements was obtained due to significant
manual correction efforts at year-end, which compensated for the lack
of integrated systems sufficient to support accounting operations.
However, the failure to address these reporting deficiencies may not
only affect future audit opinions, but may also result in the failure
to provide Justice management with meaningful information throughout
the year that is essential in making timely operational decisions.
Material Weaknesses in Financial Statement Preparation Processes:
The auditors for 2 of the 10 components reported material weaknesses in
the financial statement preparation process. In response to prior
auditor recommendations, the Justice Management Division issued a
number of departmentwide policies and held periodic meetings with the
Justice‘s components to discuss accounting and financial reporting
requirements. A key product of these efforts was the issuance of
Justice‘s Financial Statement Requirements and Preparation Guide. This
guide helped provide a solid foundation for improved financial
reporting in 2001, however, the auditors continued to identify material
weaknesses in the financial statement preparation process. For example,
component auditors reported that:
* Draft financial statements and Managements‘ Discussion and Analysis
(MD&A) submitted for audit by several components were not properly
prepared in accordance with existing Justice reporting requirements and
were not adequately reviewed by management. The drafts were found to
contain clerical errors, incomplete disclosures, and inconsistencies in
the financial statements and note disclosures.
* Accrual-based financial transaction processing at DEA was not
performed
on an ongoing basis, resulting in substantial year-end efforts to
obtain and analyze financial data necessary for financial statement
preparation.
* The FBI‘s financial management department lacked the staff to perform
the many tasks needed to produce annual financial statements and,
therefore, could not fully comply with Justice‘s financial reporting
requirements.
* Requirements to accumulate and report interagency elimination entries
to Justice were not consistently followed and resulted in the failure
to meet internal timelines, data not being provided in required
formats, and having financial activity among the components to go
unconfirmed.
* The reconciliation of intragovernmental transactions with other
federal
agencies was not fully completed and increased the risk of inaccurate
data being reported.
Proper financial management and reporting must be performed throughout
the year and must be complete in order to eliminate extensive manual
financial statement preparation efforts at the end of the fiscal year.
These year-end efforts are more susceptible to error and increase the
risk of misstatement in the Justice‘s and components‘ financial
statements. The reduction of these manual efforts is especially
important given the new financial reporting requirements of the Office
of Management and Budget (OMB) for interim financial statements and the
acceleration of 2002 year-end financial statement deadlines by
approximately 1 month. Without improvements or fundamental changes to
how Justice and its components manage their financial activities, there
is a serious risk that the preparation and audit of Justice‘s fiscal
year 2002 financial statements will not comply with required deadlines.
This could result in a modification to the auditors‘ reports on
Justice‘s and its component‘s financial statements, internal controls,
and compliance with laws and regulations.
GAO Contacts:
Subjects covered in this report; Manage the FBI‘s Transformation;
Realign staff; Build analytic capability; Need for comprehensive
policy for National Infrastructure Protection Center; Recruitment
may be more difficult due to increased competition for specialized
skills; Improve communications and information technology; Develop
an internal control system to protect civil liberties; Manage the
ripple effect on the law enforcement community; Better Manage
Programs Designed to Support State and Local Efforts to Reduce Crime;
Problems with OJP grant monitoring; Too early to gauge effectiveness
of OJP efforts to resolve grant monitoring problems; Concerns about
methodological rigor of impact evaluation studies; Better DOJ
data collection and evaluation needed to measure impact of federally
funded drug court programs; Contact person: Laurie K. Ekstrand,
Director; (202) 512-8777; ekstrandl@gao.gov.
Subjects covered in this report; INS estimated that significantly
more INS resources and time needed to fully implement border control
strategy, yet overall effectiveness still unknown; ; Efforts to combat
immigration benefit fraud fragmented and unfocused; ; Efforts to reduce
unauthorized employment face impediments; ; Improvements needed in
identifying and removing criminal aliens; ; Shortcomings in alien
antismuggling efforts; ; Problems managing application workload;
Contact person: Richard M. Stana, Director; (202) 512-8777;
stanar@gao.gov.
Subjects covered in this report; Problems coordinating with State
Department on using the visa process to screen for potential
terrorists;
Contact person: Jess T. Ford, Director; International Affairs and
Trade;
(202) 512-4128; fordj@gao.gov.
Subjects covered in this report; INS‘s information technology
management
weaknesses; Contact person: Randolph C. Hite, Director; Information
Technology Architecture and Systems Issues; (202) 512-6204;
hiter@gao.gov.
Subjects covered in this report; Weaknesses in general and application
controls over component financial management systems; ; Weaknesses in
recording financial transactions in accordance with generally accepted
accounting principles; ; Weaknesses in financial statement preparation;
Contact person: Linda M. Calbom, Director; Financial Management and
Assurance.; (202) 512-8341; calboml@gao.gov.
[End of table]
Related GAO Products:
Manage FBI‘s Transformation:
FBI Reorganization: Initial Steps Encouraging but Broad Transformation
Needed. GAO-02-865T. Washington, D.C.: June 21, 2002.
A Model of Strategic Human Capital Management, GAO-02-373SP.
Washington, D.C.: March 15, 2002.
Information Technology: Enterprise Architecture Use Across the Federal
Government Can Be Improved. GAO-02-6. Washington, D.C.: February 19,
2002.
Foreign Languages: Human Capital Approach Needed to Correct Staffing
and Proficiency Shortfalls. GAO-02-375. Washington, D.C.: January 31,
2002.
Critical Infrastructure Protection: Significant Challenges in
Developing National Capabilities. GAO-01-323. Washington, D.C.: April
25, 2001.
Information Security: Advances and Remaining Challenges to Adoption of
Public Key Infrastructure Technology. GAO-01-277. Washington, D.C.:
February 26, 2001.
Management Reform: Elements of Successful Improvement Initiatives. GAO/
T-GGD-00-26. Washington. D.C.: October 15, 1999.
Agencies‘ Annual Performance Plans Under the Results Act: An Assessment
Guide to Facilitate Congressional Decisionmaking. GAO/GGD/AIMD-
10.1.18. Washington, D.C.: February 1, 1998.
Agencies‘ Strategic Plans Under GPRA: Key Questions to Facilitate
Congressional Review. GAO/GGD-10.1.16. Washington, D.C.: May 1, 1997.
Executive Guide: Effectively Implementing the Government Performance
and Results Act. GAO/GGD-96-118. Washington, D.C.: June 1, 1996.
Improve the Enforcement of Immigration Laws and Provision of
Immigration Services:
Border Security: Visa Process Should Be Strengthened as an
Antiterrorism Tool. GAO-03-132NI. Washington, D.C.: October 21, 2002:
Immigration Enforcement: Challenges to Implementing the INS Interior
Enforcement Strategy. GAO-02-861T. Washington, D.C.: June 19, 2002.
Immigration Benefit Fraud: Focused Approach Is Needed to Address
Problems. GAO-02-66. Washington, D.C.: January 31, 2002.
Immigration and Naturalization Service: Overview of Recurring
Management Challenges. GAO-02-168T. Washington, D.C.: October 17, 2001.
Securing America‘s Borders: INS Faces Information Technology Planning
and Implementation Challenges. GAO-02-148T. Washington, D.C.: October
11, 2001.
INS‘ Southwest Border Strategy: Resource and Impact Issues Remain After
Seven Years. GAO-01-842. Washington, D.C.: August 2, 2001.
Immigration Benefits: Several Factors Impede Timeliness of Application
Processing. GAO-01-488. Washington, D.C.: May 4, 2001.
Alien Smuggling: Management and Operational Improvements Needed to
Address Growing Problem. GAO/GGD-00-103. Washington, D.C.: May 1, 2000.
Information Technology: INS Needs to Strengthen Its Investment
Management Capability. GAO-01-146. Washington, D.C.: December 29, 2000.
Information Technology: INS Needs to Better Manage the Development of
Its Enterprise Architecture. GAO/AIMD-00-212. Washington, D.C.: August
1, 2000.
Illegal Aliens: Significant Obstacles to Reducing Unauthorized Alien
Employment Exist. GAO/GGD-99-33. Washington, D.C.: April 2, 1999.
Criminal Aliens: INS‘ Efforts to Identify and Remove Imprisoned Aliens
Continue to Need Improvement. GAO/T-GGD-99-47. Washington, D.C.:
February 25, 1999.
INS Management: Follow-up on Selected Problems. GAO/GGD-97-132.
Washington, D.C.: July 22, 1997.
Criminal Aliens: INS‘ Efforts to Identify and Remove Imprisoned Aliens
Need to be Improved. GAO/T-GGD-97-154. Washington, D.C.: July 15, 1997.
Better Manage Programs Designed to Support State and Local Efforts to
Reduce Crime:
Drug Courts: Better DOJ Data Collection and Evaluation Efforts Needed
to Measure Impact of Drug Court Programs. GAO-02-434. Washington, D.C.:
April 18, 2002.
Violence Against Women: Problems with Grant Monitoring and Concerns
about Evaluation Studies. GAO-02-641T. Washington, D.C.: April 16,
2002.
Office of Justice Programs: Problems with Grant Monitoring and Concerns
about Evaluation Studies. GAO-02-507T. Washington, D.C.: March 7, 2002.
Justice Impact Evaluations: One Byrne Evaluation Was Rigorous; All
Reviewed Violence Against Women Office Evaluations Were Problematic.
GAO-02-309. Washington, D.C.: March 7, 2002.
Justice Discretionary Grants: Byrne Program and Violence Against Women
Office Grant Monitoring Should Be Better Documented. GAO-02-25.
Washington, D.C.: November 28, 2001.
Juvenile Justice: OJJDP Reporting Requirements for Discretionary and
Formula Grantees and Concerns About Evaluation Studies. GAO-02-23.
Washington, D.C.: October 30, 2001.
Juvenile Justice: Better Documentation of Discretionary Grant
Monitoring is Needed. GAO-02-65. Washington, D.C.: October 10, 2001.
Internal Control: Standards for Internal Control in the Federal
Government. GAO/AIMD-00-21.3.1. Washington, D.C.: November 1999.
Federal Grants: More Can Be Done to Improve Weed and Seed Program
Management. GAO/GGD-99-110. Washington, D.C.: July 16, 1999.
Drug Courts: Overview of Growth, Characteristics, and Results. GAO/
GGD-97-106. Washington, D.C.: July 31, 1997.
Juvenile Justice: Selected Issues Relating to OJJDP‘s Reauthorization.
GAO/T-GGD-96-103. Washington, D.C.: May 8, 1996.
Achieve Financial Accountability for Fiscal Year 2002 and Beyond:
Critical Infrastructure Protection: Significant Challenges Need to Be
Addressed. GAO-02-961T. Washington, D.C.: July 24, 2002.
Information Security: Additional Actions Needed to Fully Implement
Reform Legislation. GAO-02-470T Washington, D.C.: March 6, 2002.
Computer Security: Improvements Needed to Reduce Risk to Critical
Federal Operations and Assets. GAO-02-231T. Washington, D.C.: November
9, 2001.
Performance and Accountability Series:
Major Management Challenges and Program Risks: A Governmentwide
Perspective. GAO-03-95.
Major Management Challenges and Program Risks: Department of
Agriculture. GAO-03-96.
Major Management Challenges and Program Risks: Department of Commerce.
GAO-03-97.
Major Management Challenges and Program Risks: Department of Defense.
GAO-03-98.
Major Management Challenges and Program Risks: Department of Education.
GAO-03-99.
Major Management Challenges and Program Risks: Department of Energy.
GAO-03-100.
Major Management Challenges and Program Risks: Department of Health and
Human Services. GAO-03-101.
Major Management Challenges and Program Risks: Department of Homeland
Security. GAO-03-102.
Major Management Challenges and Program Risks: Department of Housing
and Urban Development. GAO-03-103.
Major Management Challenges and Program Risks: Department of the
Interior. GAO-03-104.
Major Management Challenges and Program Risks: Department of Justice.
GAO-03-105.
Major Management Challenges and Program Risks: Department of Labor.
GAO-03-106.
Major Management Challenges and Program Risks: Department of State.
GAO-03-107.
Major Management Challenges and Program Risks: Department of
Transportation. GAO-03-108.
Major Management Challenges and Program Risks: Department of the
Treasury. GAO-03-109.
Major Management Challenges and Program Risks: Department of Veterans
Affairs. GAO-03-110.
Major Management Challenges and Program Risks: U.S. Agency for
International Development. GAO-03-111.
Major Management Challenges and Program Risks: Environmental Protection
Agency. GAO-03-112.
Major Management Challenges and Program Risks: Federal Emergency
Management Agency. GAO-03-113.
Major Management Challenges and Program Risks: National Aeronautics and
Space Administration. GAO-03-114.
Major Management Challenges and Program Risks: Office of Personnel
Management. GAO-03-115.
Major Management Challenges and Program Risks: Small Business
Administration. GAO-03-116.
Major Management Challenges and Program Risks: Social Security
Administration. GAO-03-117.
Major Management Challenges and Program Risks: U.S. Postal Service.
GAO-03-118.
High-Risk Series: An Update. GAO-03-119.
High-Risk Series: Strategic Human Capital Management. GAO-03-120.
High-Risk Series: Protecting Information Systems Supporting the Federal
Government and the Nation‘s Critical Infrastructures. GAO-03-121.
High-Risk Series: Federal Real Property. GAO-03-122.
FOOTNOTES
[1] We also removed the 2001 high-risk designation of Justice and
Treasury‘s asset forfeiture programs from our 2003 High-Risk Series: An
Update, GAO-03-119 (Washington, D.C.: Xxx. XX, 2003).
[2] The Homeland Security Act of 2002 (H.R. 5005) established the
Department of Homeland Security, was signed by the President on
November 25, 2002, and became public law P.L. 107-296.
[3] U.S. General Accounting Office, FBI Reorganization: Initial Steps
Encouraging but Broad Transformation Needed, GAO-02-865T (Washington,
D.C.: June 21, 2002).
[4] For GAO reports discussing the elements of successful
transformation in more detail, see Management Reform: Elements of
Successful Improvement Initiatives, GAO/T-GGD-00-26 (Washington. D.C.:
Oct. 15, 1999); Executive Guide: Effectively Implementing the
Government Performance and Results Act, GAO/GGD-96-118 (Washington,
D.C.: June 1, 1996); Agencies‘ Strategic Plans Under GPRA: Key
Questions to Facilitate Congressional Review, GAO/GGD-10.1.16 (Version
1) (Washington, D.C.: May 1, 1997); Agencies‘ Annual Performance Plans
Under the Results Act: An Assessment Guide to Facilitate Congressional
Decisionmaking, GAO/GGD/AIMD-10.1.18 (Washington, D.C.: Feb. 1, 1998);
and A Model of Strategic Human Capital Management, GAO-02-373SP
(Washington, D.C.: Mar. 15, 2002).
[5] U.S. General Accounting Office, Critical Infrastructure Protection:
Significant Challenges in Developing National Capabilities, GAO-01-323
(Washington, D.C.: Apr. 25, 2001).
[6] U.S. General Accounting Office, Foreign Languages: Human Capital
Approach Needed to Correct Staffing and Proficiency Shortfalls, GAO-02-
375 (Washington, D.C.: Jan. 31, 2002).
[7] U.S. General Accounting Office, Information Security: Advances and
Remaining Challenges to Adoption of Public Key Infrastructure
Technology, GAO-01-277 (Washington, D.C.: Feb. 26, 2001).
[8] U.S. General Accounting Office, Information Technology: Enterprise
Architecture Use Across the Federal Government Can Be Improved, GAO-02-
6 (Washington, D.C.: Feb. 19, 2002).
[9] U.S. Department of Justice, Office of the Inspector General, Audit
Report: Federal Bureau of Investigation‘s Management of Information
Technology Investments, Report Number 03-09 (Washington, D.C.: December
2002).
[10] The Foreign Intelligence Surveillance Act of 1978 (P.L. 95-511),
as amended, among other things, established legal standards and a
process for seeking electronic surveillance and physical search
authority in national security investigations seeking to obtain foreign
intelligence and counterintelligence information within the United
States.
[11] U.S. General Accounting Office, FBI Intelligence Investigations:
Coordination Within Justice on Counterintelligence Criminal Matters is
Limited, GAO-01-780 (Washington, D. C.: July 16, 2001).
[12] P.L. 107-296 directed the abolishment of INS after its functions
are transferred to the new Department of Homeland Security. INS‘s
Border Patrol, detention, removal, intelligence, investigations, and
inspections programs will transfer to the new Bureau of Border
Security, and its adjudication functions of immigrant visa petitions,
naturalization petitions, asylum and refugee applications, and of its
service centers will transfer to the new Bureau of Citizenship and
Immigration Services.
[13] U.S. General Accounting Office, INS‘ Southwest Border Strategy:
Resource and Impact Issues Remain After Seven Years, GAO-01-842
(Washington, D.C.: Aug. 2, 2001).
[14] U.S. Department of Justice, Office of the Inspector General,
Follow-up Report on Border Patrol‘s Efforts to Improve Northern Border
Security (Redacted Version), Report No. I-2002-004 (Washington, D.C.:
Feb. 2002)
[15] A July 2002 research report by the Public Policy Institute of
California, which we did not independently assess, went even further by
concluding that increased enforcement along the U.S.-Mexican border has
failed to reduce unauthorized immigration.
[16] U.S. General Accounting Office, Immigration Benefit Fraud: Focused
Approach Is Needed to Address Problems, GAO-02-66 (Washington, D.C.:
Jan. 31, 2002).
[17] U.S. Census Bureau, ESCAP II: Demographic Analysis Results,
Executive Steering Committee for A.C.E. Policy II, Report No. 1
(Washington, D.C.: Oct. 13, 2001).
[18] U.S. General Accounting Office, Immigration Enforcement:
Challenges to Implementing the INS Interior Enforcement Strategy, GAO-
02-861T (Washington, D.C.: June 19, 2002).
[19] U.S. General Accounting Office, Illegal Aliens: Significant
Obstacles to Reducing Unauthorized Alien Employment Exist, GAO/GGD-99-
33 (Washington, D.C.: April 1999).
[20] Statement of Joseph R. Greene, Assistant Commissioner for
Investigations, before the House Subcommittee on Immigration and
Claims, regarding the INS Interior Enforcement Strategy, June 19, 2002.
[21] U.S. General Accounting Office, Criminal Aliens: INS‘ Efforts to
Identify and Remove Imprisoned Aliens Need to be Improved, GAO/T-GGD-
97-154 (Washington, D.C.: July 15, 1997).
[22] U.S. General Accounting Office, Criminal Aliens: INS‘ Efforts to
Identify and Remove Imprisoned Aliens Continue to Need Improvement,
GAO/T-GGD-99-47 (Washington, D.C.: Feb. 25, 1999).
[23] U.S. Department of Justice, Office of the Inspector General,
Immigration and Naturalization Service Institutional Removal Program,
Audit Report No. 02-41 (Washington, D.C.: September 2002).
[24] U.S. Department of Justice, Office of the Inspector General, The
INS Escort of Criminal Aliens, Report No. I-2001-005 (Washington, D.C.:
June 2001).
[25] U.S. Department of Justice, Office of the Inspector General,
Survey of INS‘s Anti-Smuggling Units, Report No. I-2001-03 (Washington,
D.C.: March 2001).
[26] U.S. General Accounting Office, Alien Smuggling: Management and
Operational Improvements Needed to Address Growing Problem, GAO/GGD-00-
103 (Washington, D.C.: May 1, 2000).
[27] U.S. General Accounting Office, Immigration Benefits: Several
Factors Impede Timeliness of Application Processing, GAO-01-488
(Washington, D.C.: May 4, 2001).
[28] U.S. Department of Justice, Office of the Inspector General, The
Immigration and Naturalization Service‘s Contacts with Two September 11
Terrorists: A Review of the INS‘s Admission of Mohamed Atta and Marwan
Alshehhi, its Processing of their Change of Status Applications, and
its Efforts to Track Foreign Students in the United States (Washington,
D.C.: May 20, 2002).
[29] The United States also grants visas to people who intend to
immigrate to the United States. In this report section, we use the term
’visa“ to refer to nonimmigrant visas only. Citizens of 28 countries
that participate in the visa waiver program, Canada, and certain other
locations are not required to obtain visas for business or pleasure
stays of short duration.
[30] The President established the Foreign Terrorist Tracking Task
Force, an interagency group under the auspices of the Department of
Justice, on October 30, 2001. The task force was to ensure that, to the
maximum extent permitted by law, federal agencies coordinate programs
to (1) deny U.S. entry of aliens who are associated with, suspected of
being engaged in, or supporting terrorist activity, and (2) locate,
detain, prosecute, or deport any such aliens already present in the
United States. The task force does not have legal authority to
adjudicate visa applications or applications for immigration benefits.
[31] U.S. General Accounting Office, Border Security: Visa Process
Should Be Strengthened as an Antiterrorism Tool, GAO-03-132NI
(Washington, D.C.: Oct. 21, 2002).
[32] As of August 1, 2002, this dispute applied to 567 visa applicants
whose names matched information in Foreign Terrorist Tracking Task
Force databases.
[33] U.S. Department of Justice, Office of the Inspector General, The
Immigration and Naturalization Service‘s Automated I-94 System, Report
Number 01-18 (August 6, 2001).
[34] The Automated I-94 system electronically captured arrival and
departure data for nonimmigrants at four airports. The system was
retired in February 2002.
[35] U.S. General Accounting Office, Information Technology: INS Needs
to Better Manage the Development of Its Enterprise Architecture, GAO/
AIMD-00-212 (Washington, D.C.: Aug. 1, 2000) and Information
Technology: INS Needs to Strengthen Its Investment Management
Capability, GAO-01-146 (Washington, D.C.: Dec. 29, 2000).
[36] U.S. General Accounting Office, Securing America‘s Borders: INS
Faces Information Technology Planning and Implementation Challenges,
GAO-02-148T (Washington, D.C.: Oct. 11, 2001).
[37] VAWO was renamed the Office on Violence Against Women (OVAW) in
July 2002 as part of an OJP reorganization.
[38] U.S. General Accounting Office, Office of Justice Programs:
Problems with Grant Monitoring and Concerns about Evaluation Studies,
GAO-02-507T (Washington, D.C.: Mar. 7, 2002).
[39] U.S. General Accounting Office, Justice Discretionary Grants:
Byrne Program and Violence Against Women Office Grant Monitoring Should
Be Better Documented, GAO-02-25 (Washington, D.C.: Nov. 28, 2001);
Juvenile Justice: OJJDP Reporting Requirements for Discretionary and
Formula Grantees and Concerns About Evaluation Studies, GAO-02-23
(Washington, D.C.: Oct. 30, 2001); Juvenile Justice: Better
Documentation of Discretionary Grant Monitoring is Needed, GAO-02-65
(Washington, D.C.: Oct. 10, 2001); and Juvenile Justice: Selected
Issues Relating to OJJDP‘s Reauthorization, GAO/T-GGD-96-103
(Washington, D.C.: May 8, 1996).
[40] U.S. General Accounting Office, Internal Control: Standards for
Internal Control in the Federal Government, GAO/AIMD-00-21.3.1
(Washington, D.C.: Nov. 1999).
[41] Dougherty and Associates, Final Report of Finding &
Recommendations for Improvement of the Grant Management Process
(Alexandria, Va., 2000).
[42] U.S. Department of Justice, Office of the Inspector General, Top
Management Challenges in the Department of Justice - 2000, usdoj.gov/
oig/challenges/2000.htm (Washington, D.C.: Dec. 1, 2000) and 2001,
usdoj.gov/oig/challenges/2001.htm (Washington, D.C.: Dec. 31, 2001).
[43] Since then, OJP created a chief information officer position
charged with overseeing an agencywide grant management system.
[44] This document superseded OJP Handbook: Policies and Procedures for
the Administration of OJP Grants (Washington, D.C., 1992).
[45] U.S. General Accounting Office, Federal Grants: More Can Be Done
to Improve Weed and Seed Program Management, GAO/GGD-99-110
(Washington, D.C.: July 16, 1999).
[46] This number is current as of July 5, 2002.
[47] U.S. General Accounting Office, Justice Impact Evaluations: One
Byrne Evaluation Was Rigorous; All Reviewed Violence Against Women
Office Evaluations Were Problematic, GAO-02-309 (Washington, D.C.: Mar.
7, 2002).
[48] U.S. General Accounting Office, Juvenile Justice: OJJDP Reporting
Requirements for Discretionary and Formula Grantees and Concerns About
Evaluation Studies, GAO-02-23 (Washington, D.C.: Oct. 30, 2001).
[49] The main purpose of a drug court program is to use the court‘s
authority to reduce crime by changing the defendants‘ substance abuse
behavior. In exchange for the possibility of dismissed charges or
reduced sentences, defendants are diverted to drug court programs.
[50] U.S. General Accounting Office, Drug Courts: Overview of Growth,
Characteristics, and Results, GAO/GGD-97-106 (Washington, D.C.: July
31, 1997).
[51] U.S. General Accounting Office, Drug Courts: Better DOJ Data
Collection and Evaluation Efforts Needed to Measure Impact of Drug
Court Programs, GAO-02-434 (Washington, D.C.: Apr. 18, 2002).
[52] INS and Justice received an unqualified opinion on the Balance
Sheet and Statement of Custodial Activity and a qualified opinion on
the Statements of Net Cost, Changes in Net Position, and Budgetary
Resources and Financing for fiscal year 2000.
[53] In our prior report on management challenges at Justice issued in
January 2001, we reported that Justice had improved from receiving a
disclaimer of opinion on its fiscal year 1998 departmentwide financial
statements to receiving a qualified opinion on its fiscal year 1999
departmentwide financial statements.
[54] A material weakness is a condition in which the design or
operation of one or more of the internal control components does not
reduce, to a relatively low level, the risk that errors or
irregularities, in amounts that would be material to the financial
statements, may occur and not be detected promptly by employees in the
normal course of performing their duties.
GAO‘s Mission:
The General Accounting Office, the investigative arm of Congress,
exists to support Congress in meeting its constitutional
responsibilities and to help improve the performance and accountability
of the federal government for the American people. GAO examines the use
of public funds; evaluates federal programs and policies; and provides
analyses, recommendations, and other assistance to help Congress make
informed oversight, policy, and funding decisions. GAO‘s commitment to
good government is reflected in its core values of accountability,
integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through the Internet. GAO‘s Web site ( www.gao.gov ) contains
abstracts and full-text files of current reports and testimony and an
expanding archive of older products. The Web site features a search
engine to help you locate documents using key words and phrases. You
can print these documents in their entirety, including charts and other
graphics.
Each day, GAO issues a list of newly released reports, testimony, and
correspondence. GAO posts this list, known as ’Today‘s Reports,“ on its
Web site daily. The list contains links to the full-text document
files. To have GAO e-mail this list to you every afternoon, go to
www.gao.gov and select ’Subscribe to daily E-mail alert for newly
released products“ under the GAO Reports heading.
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. General Accounting Office
441 G Street NW,
Room LM Washington,
D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470:
Public Affairs:
Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S.
General Accounting Office, 441 G Street NW, Room 7149 Washington, D.C.
20548: