Homeland Security
Federal Efforts Are Helping to Address Some Challenges Faced by State and Local Fusion Centers
Gao ID: GAO-08-636T April 17, 2008
Following the September 11 terrorist attacks, state and local governments formed fusion centers, collaborative efforts to detect, prevent, investigate, and respond to criminal or terrorist activity. Recognizing that the centers are a critical mechanism for sharing information, the federal government--including the Department of Homeland Security (DHS), Department of Justice (DOJ), and the Program Manager for the Information Sharing Environment (PM-ISE), which has primary responsibility for governmentwide information sharing--is taking steps to partner with fusion centers. This testimony focuses on (1) the characteristics of fusion centers as of September 2007 and (2) federal efforts to help alleviate challenges centers identified. This testimony is based on GAO's October 2007 report on 58 fusion centers and related federal efforts to support them as well as updated information GAO obtained in March 2008 by reviewing plans describing selected federal efforts and attending the second annual national fusion center conference.
Almost all states and several local governments have established or are in the process of establishing fusion centers that vary in their characteristics. Centers were generally established to address gaps in information sharing, and the majority of the centers GAO contacted had adopted broad missions that could include both counterterrorism and law enforcement-related information. While law enforcement entities, such as state police, are the lead or managing agencies in the majority of the centers GAO contacted, the centers varied in their staff sizes and partnerships with other agencies. The majority of the operational fusion centers GAO contacted had federal personnel, including from DHS or the Federal Bureau of Investigation (FBI), assigned to them as of September 2007. DHS and DOJ have several efforts under way that begin to address challenges fusion center officials identified. DHS and DOJ have provided many fusion centers access to their information systems, but fusion center officials cited challenges accessing and managing multiple information systems. Both DHS and the FBI have provided security clearances for state and local personnel and set timeliness goals for granting clearances. However, officials cited challenges obtaining and using clearances. DHS, DOJ, and the PM-ISE have also taken steps to develop guidance and provide technical assistance to fusion centers, for instance, by issuing guidelines for establishing and operating centers. However, officials at 21 centers cited challenges with the availability of training for mission-specific issues. DHS and DOJ have continued providing a technical assistance program for fusion centers and disseminated a baseline capabilities draft in March 2008 that outlines minimum operational standards for fusion centers. While this support and guidance is promising, it is too soon to determine the extent to which it will address challenges identified by officials contacted. Finally, officials in 43 of the 58 fusion centers contacted reported facing challenges related to obtaining personnel, and officials in 54 centers reported challenges with funding, some of which affected these centers' sustainability. To support fusion centers, both DHS and the FBI have assigned, and continue to assign, personnel to the centers. To help address funding issues, DHS has provided funding for fusion-center related activities. The National Strategy for Information Sharing, issued in October 2007 by the President, states that the federal government will support the establishment of fusion centers and help sustain them through grant funding, technical assistance, and training. However, some fusion center officials raised concerns about how specifically the federal government was planning to assist state and local governments to sustain fusion centers as it works to incorporate fusion centers into the ISE and to implement the strategy.
GAO-08-636T, Homeland Security: Federal Efforts Are Helping to Address Some Challenges Faced by State and Local Fusion Centers
This is the accessible text file for GAO report number GAO-08-636T
entitled 'Homeland Security: Federal Efforts Are Helping to Address
Some Challenges Faced by State and Local Fusion Centers' which was
released on April 17, 2008.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Testimony:
Before the Ad Hoc Subcommittee on State, Local, and Private Sector
Preparedness and Integration, Committee on Homeland Security and
Governmental Affairs, U.S. Senate:
United States Government Accountability Office:
GAO:
For Release on Delivery:
Expected at 2:00 p.m. EDT:
Thursday, April 17, 2008:
Homeland Security:
Federal Efforts Are Helping to Address Some Challenges Faced by State
and Local Fusion Centers:
Statement of Eileen R. Larence, Director: Homeland Security and Justice
Issues:
GAO-08-636T:
GAO Highlights:
Highlights of GAO-08-636T, a testimony before the Ad Hoc Subcommittee
on State, Local, and Private Sector Preparedness and Integration,
Committee on Homeland Security and Governmental Affairs, U.S. Senate.
Why GAO Did This Study:
Following the September 11 terrorist attacks, state and local
governments formed fusion centers, collaborative efforts to detect,
prevent, investigate, and respond to criminal or terrorist activity.
Recognizing that the centers are a critical mechanism for sharing
information, the federal government”including the Department of
Homeland Security (DHS), Department of Justice (DOJ), and the Program
Manager for the Information Sharing Environment (PM-ISE), which has
primary responsibility for governmentwide information sharing”is taking
steps to partner with fusion centers.
This testimony focuses on (1) the characteristics of fusion centers as
of September 2007 and (2) federal efforts to help alleviate challenges
centers identified. This testimony is based on GAO‘s October 2007
report on 58 fusion centers and related federal efforts to support them
as well as updated information GAO obtained in March 2008 by reviewing
plans describing selected federal efforts and attending the second
annual national fusion center conference.
What GAO Found:
Almost all states and several local governments have established or are
in the process of establishing fusion centers that vary in their
characteristics. Centers were generally established to address gaps in
information sharing, and the majority of the centers GAO contacted had
adopted broad missions that could include both counterterrorism and law
enforcement–related information. While law enforcement entities, such
as state police, are the lead or managing agencies in the majority of
the centers GAO contacted, the centers varied in their staff sizes and
partnerships with other agencies. The majority of the operational
fusion centers GAO contacted had federal personnel, including from DHS
or the Federal Bureau of Investigation (FBI), assigned to them as of
September 2007.
DHS and DOJ have several efforts under way that begin to address
challenges fusion center officials identified.
* DHS and DOJ have provided many fusion centers access to their
information systems, but fusion center officials cited challenges
accessing and managing multiple information systems.
*Both DHS and the FBI have provided security clearances for state and
local personnel and set timeliness goals for granting clearances.
However, officials cited challenges obtaining and using clearances.
*DHS, DOJ, and the PM-ISE have also taken steps to develop guidance and
provide technical assistance to fusion centers, for instance, by
issuing guidelines for establishing and operating centers. However,
officials at 21 centers cited challenges with the availability of
training for mission-specific issues. DHS and DOJ have continued
providing a technical assistance program for fusion centers and
disseminated a baseline capabilities draft in March 2008 that outlines
minimum operational standards for fusion centers. While this support
and guidance is promising, it is too soon to determine the extent to
which it will address challenges identified by officials contacted.
* Finally, officials in 43 of the 58 fusion centers contacted reported
facing challenges related to obtaining personnel, and officials in 54
centers reported challenges with funding, some of which affected these
centers‘ sustainability. To support fusion centers, both DHS and the
FBI have assigned, and continue to assign, personnel to the centers. To
help address funding issues, DHS has provided funding for fusion-center
related activities.
The National Strategy for Information Sharing, issued in October 2007
by the President, states that the federal government will support the
establishment of fusion centers and help sustain them through grant
funding, technical assistance, and training. However, some fusion
center officials raised concerns about how specifically the federal
government was planning to assist state and local governments to
sustain fusion centers as it works to incorporate fusion centers into
the ISE and to implement the strategy.
What GAO Recommends:
While this testimony contains no new recommendations, GAO has
recommended that the federal government define and articulate its long-
term fusion center role and whether it expects to provide resources to
help ensure their sustainability. PM-ISE agreed with the recommendation
and is in the process of implementing it.
To view the full product, including the scope and methodology, click on
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-636T]. For more
information, contact Eileen Larence at (202) 512-8777 or
larencee@gao.gov.
[End of section]
Mr. Chairman, Ranking Member, and Members of the Subcommittee:
Thank you for inviting me to participate in today's hearing on fusion
centers. Since the attacks of September 11, 2001, most states and
several local governments have established fusion centers to address
gaps in homeland security and law enforcement information sharing by
the federal government and to provide a conduit of this information
within the state. While fusion centers vary, reflecting differences in
state and local needs, the Implementing Recommendations of the 9/11
Commission Act of 2007 (9/11 Commission Act) defines a fusion center as
a "collaborative effort of two or more federal, state, local, or tribal
government agencies that combine resources, expertise, or information
with the goal of maximizing the ability of such agencies to detect,
prevent, investigate, apprehend, and respond to criminal or terrorist
activity."[Footnote 1]
With information-sharing weaknesses recognized as a major contributing
factor in the nation's lack of preparedness for the September 11
attacks, a number of information-sharing initiatives were mandated in
the Intelligence Reform and Terrorism Prevention Act of 2004
(Intelligence Reform Act). For example, the Intelligence Reform Act, as
amended in August 2007 by the 9/11 Commission Act, requires the
President to take action to facilitate the sharing of terrorism-related
information by establishing an Information Sharing Environment (ISE) to
combine policies, procedures, and technologies that link people,
systems, and information among all appropriate federal, state, local,
and tribal entities and the private sector.[Footnote 2] To oversee
development and implementation of the ISE, the act also required the
President to appoint a program manager, which the President did in
April 2005.[Footnote 3]
The Program Manager for the ISE (PM-ISE), the Department of Homeland
Security (DHS), and the Department of Justice (DOJ) are taking steps to
partner with fusion centers as part of the information sharing
environment. In November 2006, the PM-ISE issued a plan for
implementing the ISE that incorporated presidentially approved
recommendations for federal, state, local, and private-sector
information sharing. The implementation plan acknowledges that the
collaboration between fusion centers and with the federal government
marks a tremendous increase in the nation's overall analytic capacity
that can be used to combat terrorism, and it identifies the creation of
an integrated nationwide network of fusion centers as a way to promote
two-way information sharing with the federal government. Under the
plan, DHS and DOJ are to assume responsibility for technical assistance
and training to support fusion centers. Both DHS and DOJ have
established program offices to oversee their relationships with fusion
centers. In October 2007, the President issued the first National
Strategy for Information Sharing: Success and Challenges in Improving
Terrorism-Related Information Sharing (National Strategy), which
further highlights the importance of state and local fusion centers as
valuable information-sharing resources to be incorporated into the
national information sharing framework.
In addition, the 9/11 Commission Act contains several provisions
related to fusion centers.[Footnote 4] For example, in accordance with
the act, DHS established a fusion center program office. This office is
responsible for providing operational and intelligence advice and
assistance to fusion centers, facilitating coordination and information
flow between fusion centers and DHS, and deploying DHS personnel to
fusion centers. In addition, the act requires that the Secretary of
DHS, in consultation with the Attorney General, establish guidelines
for fusion centers that include standards related to privacy policies
and training.
My testimony today discusses (1) the characteristics of state and local
fusion centers as of September 2007[Footnote 5] and (2) the extent to
which efforts under way by the PM-ISE, DHS, and DOJ are helping to
address some of the challenges identified by fusion centers. My
statement is based on (1) the results of our October 2007 report
[Footnote 6] that discusses the status and characteristics of 58 state
and local fusion centers as well as federal efforts underway to help
address challenges the centers identified; and (2) updated information
we obtained in March 2008 about selected federal efforts to support
fusion centers.[Footnote 7] To obtain updated information, we reviewed
plans and documents describing these federal efforts and attended the
second annual national fusion center conference.[Footnote 8] We
conducted this work according to generally accepted government auditing
standards. Those standards require that we plan and perform the audit
to obtain sufficient, appropriate evidence to provide a reasonable
basis for our findings and conclusions based on our audit objectives.
We believe that the evidence obtained provides a reasonable basis for
our findings and conclusions based on our audit objectives.
Summary:
Fusion centers, which vary in their characteristics, are operating or
being established in almost all states and several local jurisdictions
across the country. Specifically, officials in many (43 of 58) of the
fusion centers we contacted described their centers as operational as
of September 2007.[Footnote 9] These centers were generally created by
state and local governments to improve information sharing across
levels of government and to prevent terrorism or other threats. While 9
of these operational centers had opened within the couple of years
after September 11, 2001, 34 had opened since January 2004. The
majority of the centers had scopes of operations and missions that
included more than just counterterrorism-related activities, such as a
focus on all crimes or all hazards. Adopting a broader focus helped
provide information about all threats and increased the center's
sustainability, for instance, by including additional stakeholders who
could provide staff and support, and is consistent with the definition
of a fusion center in the 9/11 Commission Act. Law enforcement
entities, such as state police, were the lead or managing agencies in
the majority of the operational centers we contacted. While the centers
varied in their staff sizes and partnerships with other agencies, as of
September 2007, at least 34 of the 43 operational fusion centers we
contacted reported that they had federal personnel assigned to their
centers. Twelve of the centers were colocated with Federal Bureau of
Investigation (FBI) field units. Many of the operational centers
reported having access to unclassified and, to a lesser extent,
classified DHS and FBI systems and networks. Thus far, products
disseminated and services provided varied from daily bulletins to in-
depth reports or assessments.
We reported in October 2007 that fusion centers face challenges in
several areas and that--in light of the importance of fusion centers in
facilitating information sharing among levels of government--federal
efforts are under way that begin to address these challenges.[Footnote
10] As of March 2008, many of these efforts are still ongoing.
* DHS, DOJ, and the PM-ISE have taken steps to provide fusion centers
access to federal information systems, but some fusion center officials
cited challenges accessing relevant, actionable information and
managing multiple, competing, or duplicative information systems. For
example, officials in 30 of the 58 centers we contacted reported
challenges related to volume of information or managing multiple
systems. As a result, these center officials said that their ability to
receive and share information with those who need it may be limited.
Ongoing efforts to improve the quality and flow of information include
the Interagency Threat Assessment and Coordination Group's efforts to
provide a nonfederal perspective to the intelligence community and its
products.
* Both DHS and the FBI have provided clearances to numerous state and
local officials and have set timeliness goals for the issuance of new
clearances. However, obtaining and using security clearances
represented a challenge for 44 of the 58 centers we contacted, which
could limit their ability to access and use some information. In
addition, while law and executive order provide that a security
clearance granted by one federal agency should generally be accepted by
other agencies, officials in 19 of the centers encountered difficulties
with federal agencies, particularly DHS and the FBI, accepting each
others' clearances. DHS and DOJ officials reported that they were not
aware of recent fusion center challenges with reciprocity of
clearances. However, they said that there were complications in the
clearance process, for instance, because several federal agencies
conduct their own processes without central coordination.
* Fusion center officials also cited challenges obtaining guidance and
training. In particular, they cited the need for clearer and more
specific guidance in a variety of areas, including standards for
analyst training and information-sharing policies and procedures, to
help address operational challenges. DHS, DOJ, along with the PM-ISE,
continue to take steps to develop guidance and provide technical
assistance and training. For instance, DHS and DOJ disseminated a draft
baseline capabilities document that outlines minimum operational
standards for fusion centers to state and local officials in March 2008
for feedback.
* Notwithstanding DHS and FBI efforts to deploy personnel to fusion
centers and DHS's grant funding to support their establishment and
enhancement, fusion center officials reported challenges obtaining and
retaining qualified personnel and ensuring sufficient funding to
sustain the centers. To improve efforts to create a national network of
fusion centers, in our October 2007 report we recommended--and DHS and
the PM-ISE concurred--that the federal government determine and
articulate its long-term fusion center role and whether it expects to
provide resources to centers to help ensure their sustainability. The
National Strategy, issued by the President in October 2007, states that
the federal government will support the establishment of fusion centers
and help sustain them through grant funding, technical assistance, and
training. However, some fusion center officials raised concerns at the
national conference about how specifically the federal government plans
to assist state and local governments to sustain fusion centers as it
works to incorporate these centers into the ISE and to implement the
strategy.
Most States and Several Local Jurisdictions Have or Are Planning Fusion
Centers That Vary in Their Characteristics:
Almost all states and several local governments have established or are
in the process of establishing a fusion center. Specifically, officials
in 43 of the 58 fusion centers we contacted described their centers as
operational, and officials in 15 centers considered their centers to be
in the planning or early stages of development as of September 2007.
Officials cited a variety of reasons why their state or local area
established a fusion center. To improve information sharing--related to
homeland security, terrorism, and law enforcement--among federal,
state, and local entities and to prevent terrorism or threats after the
attacks of September 11 were the most frequently cited reasons for
establishing a fusion center. Several officials cited the need to
enhance information sharing within their own jurisdictions across
disciplines as the reason why they established a center. While 9
centers opened in the couple of years after the attacks of September
11, 2001, 34 of the 43 operational centers have opened since January
2004 as shown in figure 1.
Figure 1: Number of Operational Fusion Centers GAO Contacted Opened by
Year:
[See PDF for image]
This figure is a horizontal bar graph depicting the following data:
Number of Operational Fusion Centers GAO Contacted Opened by Year:
Year Opened: 2001;
Number of centers: 2.
Year Opened: 2002;
Number of centers: 1.
Year Opened: 2003;
Number of centers: 6.
Year Opened: 2004;
Number of centers: 7.
Year Opened: 2005;
Number of centers: 12.
Year Opened: 2006;
Number of centers: 10.
Year Opened: 2007;
Number of centers: 5.
Source: GAO analysis, information from fusion centers.
[End of figure]
Consistent with the 9/11 Commission Act's definition of a fusion center
and the purpose of a fusion center, as defined in the Fusion Center
Guidelines, officials in 41 of the 43 operational centers we contacted
said that their scopes of operations focused on more than just
counterterrorism. For instance, officials in 22 of these centers
described their centers' scope as all crimes or all crimes and
counterterrorism, and officials in 19 operational centers said that
their scopes of operations included all-hazards information (such as
related to public health and safety or emergency response). Further, 23
of the 36 operational fusion centers that provided us mission
statements had missions that involved collecting, analyzing, and
disseminating criminal as well as terrorism-related information. Eleven
other fusion centers had missions that involved enhancing, supporting,
or coordinating information and intelligence dissemination to both law
enforcement and homeland security agencies. Officials told us that
adopting a broader focus helped provide information about all threats
because of the link of many crimes to terrorist activity and also
increased the centers' sustainability, for instance, by including
additional stakeholders. Indeed, the National Strategy highlights the
importance of the centers fostering a culture that recognizes the
importance of fusing "all crimes with national security implications"
and "all hazards" information, which often involves identifying
criminal activity and other information that might be a precursor to a
terrorist plot.
Law enforcement entities, such as state police or state bureaus of
investigation, were the lead or managing agencies in the majority of
the operational centers we contacted. The centers varied in their staff
sizes and partnerships with other agencies, ranging from fewer than 5
employees to over 80. In addition to a variety of state and local law
enforcement agencies, some centers included personnel detailed from
emergency management, fire, corrections, or transportation partners. As
of September 2007, at least 34 of the 43 operational fusion centers we
contacted reported that they had personnel from at least one federal
agency assigned to their centers. For example, DHS had deployed full-
time intelligence officers to 17 of the 43 operational fusion centers
we contacted and was in the process of staffing 8 additional centers.
About three quarters of the operational centers we contacted reported
that the FBI had assigned personnel, including intelligence analysts
and special agents, to their centers. Additionally, 12 of the
operational centers we contacted were colocated in an FBI field office
or with an FBI task force, such as a Joint Terrorism Task Force or a
Field Intelligence Group. Further, 19 of the operational centers
reported that they had other DHS or DOJ components represented in their
centers, such as personnel from Customs and Border Protection;
Immigration and Customs Enforcement; Transportation Security
Administration; Bureau of Alcohol, Tobacco and Firearms; or Drug
Enforcement Administration.
Many fusion centers reported having access to DHS's and DOJ's
unclassified networks or systems, such as the Homeland Security
Information Network (HSIN) and Law Enforcement Online (LEO),
containing, among other things, terrorism-related information.[Footnote
11] For example, as of September 2007, 40 of the 43 operational centers
reported they had access to HSIN, and 39 reported having access to LEO.
In addition, 16 of the 43 centers said they had or were in the process
of obtaining access to DHS's classified network of secret-level
homeland security data, and 23 reported they had or were in the process
of obtaining access to the FBI's classified systems containing, among
other things, secret-level investigative case files.
Thus far, products disseminated and services provided also varied.
Fusion centers reported that they issued a variety of products, such as
daily and weekly bulletins on general criminal or intelligence
information and assessments that, in general, provided in-depth
reporting on an emerging threat, group, or crime.
Federal Agencies' Efforts to Support Fusion Centers Help Address Some
Reported Challenges:
Fusion center officials identified challenges in establishing and
operating their centers in several areas, such as accessing and
managing multiple information systems, obtaining and using security
clearances, finding sufficient guidance and training, obtaining and
retaining personnel, and obtaining funding. DHS and DOJ, recognizing
the importance of fusion centers in information sharing, have efforts
under way that begin to address many of these challenges.
DHS, DOJ, and PM-ISE Have Some Actions Under Way to Address Fusion
Center Challenges with Accessing and Managing Information Systems:
Fusion center officials reported challenges accessing and managing
multiple information systems. In October 2007, we reported that DHS and
the FBI had provided many operational fusion centers access to their
primary unclassified information systems (HSIN and LEO) and had
outlined plans to provide access to their primary classified networks
to state and local centers that had federal personnel at the center.
However, officials at 31 of the 58 centers we contacted reported
challenges obtaining access to federal information systems or networks.
For instance, officials in some centers cited challenges with DHS and
the FBI not providing fusion center personnel with direct access to
their classified systems. Fusion center personnel in these centers had
to rely on federal personnel who were assigned to the center or other
state personnel assigned to FBI task forces to access these systems,
obtain the relevant information, and share it with them. Further,
officials in 12 fusion centers reported challenges meeting system
security requirements or establishing the technical capabilities
necessary to access information systems, and DHS and the FBI had taken
some steps to address these challenges. For example, we reported that
DHS reviews the fusion centers' security status and assesses its
adequacy in light of its intention to deploy personnel and information
systems to the center. In March 2008, the DHS Under Secretary for
Intelligence and Analysis stated that DHS planned to deploy its secret-
level homeland security data network to 41 fusion centers by the end of
fiscal year 2008.
While officials in many fusion centers cited challenges obtaining
access to systems, primarily classified ones, officials in 30 of the 58
fusion centers we contacted reported that the heavy volume of
information or the existence of multiple systems with often redundant
information was a challenge to manage. Officials in 18 fusion centers
said that they had difficulty with what they perceived to be the high
volume of information their center receives, variously describing the
flow of information as "overwhelming," "information overload," and
"excessive." For example, officials described how center personnel must
sort through the large amount of information, much of which is not
relevant to the center, to find information that is useful or important
to them. In addition, officials in 18 fusion centers found the lack of
integration among these multiple, competing, or duplicative information
systems challenging, or said they wanted a single mechanism or system
through which to receive or send information.
In October 2007, we reported that officials from the PM-ISE's office
were collaborating with other agencies, including DHS and DOJ, to
identify potential opportunities to streamline system access and
improve the quality and flow of information. For example, PM-ISE
officials reported that these entities had completed a review of the
most commonly used systems, such as HSIN, LEO, and the Regional
Information Sharing Systems,[Footnote 12] that included an examination
of users' needs to identify potential areas to streamline system
access. In October 2007, we also reported that such a review was in
accordance with recommendations that fusion centers made during the
first annual national fusion center conference in March 2007 and with
what several officials we contacted told us. Specifically, officials in
23 of the 58 fusion centers told us that DHS and DOJ, to facilitate
implementation of a national network of fusion centers, should reduce
the number of existing systems or develop a unified platform or
mechanism for information sharing with fusion centers. In addition, the
PM-ISE, along with DHS, DOJ, and other federal agencies, are taking
steps to improve the quality and flow of information through the
establishment of an Interagency Threat Assessment and Coordination
Group (ITACG), which was made a statutorily mandated body by the 9/11
Commission Act.[Footnote 13] This group, which is to include state,
local, and tribal representatives detailed to work with the National
Counterterrorism Center, is to provide advice, counsel, and subject-
matter expertise to the intelligence community about the types of
terrorism-related information needed by state, local, and tribal
governments and how these entities use that terrorism-related
information to fulfill their counterterrorism responsibilities. In
doing so, the PM-ISE reported that the ITACG is to enable the timely
production by the National Counterterrorism Center of clear, relevant,
and federally coordinated terrorism-related information products
intended for dissemination to state, local, and tribal officials. In
October 2007, we reported that PM-ISE officials indicated that the
ITACG had achieved an initial operational capability. As of March 2008,
four state and local law enforcement representatives had been detailed
to the ITACG to provide a nonfederal perspective to the intelligence
community in its situational and threat reporting and intelligence
products, by, for example, requesting changes to report language to
better address state and local needs. According to one of the
representatives, these changes have involved requesting that specific
tactical information be included in reports or that, where possible,
the security classification of a report be lowered so that it could be
disseminated more broadly to state and local officials. While these
efforts to improve the quality and flow of information to state and
local users are promising, it is too soon to determine the extent to
which they will address the challenges in accessing and managing
information reported to us by fusion center officials.
DHS and the FBI Provide Clearances to Fusion Center Officials, but
Officials Cited Some Challenges with Obtaining and Using Clearances:
Both DHS and the FBI have provided security clearances for numerous
state and local personnel in order to access classified information and
have set goals to reduce the length of time it takes to obtain a
security clearance. For example, DHS set a goal of 90 days to complete
a Secret clearance, and the FBI set a goal of 45 to 60 days to complete
a Secret clearance and 6 to 9 months to complete a Top Secret
clearance. DHS and the FBI have also provided centers with information
about the security clearance process and time frames, stating that
processing time for individual security clearances can vary, depending
on complexity. However, obtaining and using security clearances
represented a challenge for many of the fusion centers (44 of 58) we
contacted. For instance, officials at 32 of the centers cited
difficulties with the length of time it takes to receive a security
clearance from DHS or the FBI. However, some fusion center officials
acknowledged that that the length of time to conduct the required
background checks was necessary to ensure that clearances were only
given to individuals who meet the requirements.
In October 2007, we also reported that while law and executive order
provide that a security clearance granted by one government agency
should generally be accepted by other agencies, officials in 19 of the
centers we contacted encountered difficulties with federal agencies,
particularly DHS and the FBI, accepting each others' clearances. This
reported lack of reciprocity could hinder the centers' ability to
access facilities, computer systems, and information from multiple
agencies. DHS and DOJ officials said that they were not aware of fusion
centers encountering recent challenges with reciprocity of security
clearances. However, they said that there were complications in the
clearance process because, for example, multiple federal agencies carry
out their own processes and grant clearances without central
coordination.
DHS and DOJ Continue to Provide Guidance, Technical Assistance, and
Training to Fusion Centers:
DHS, DOJ, and the PM-ISE continue to provide fusion centers with
guidance, technical assistance, and training to help address their
challenges in these areas. In October 2007, we reported that DHS and
DOJ had, in August 2006, issued jointly developed Fusion Center
Guidelines that outline 18 recommended elements for establishing and
operating fusion centers. Intended to help ensure that fusion centers
were set up and operated consistently, they cover elements such as
ensuring appropriate security measures are in place for facility, data,
and personnel. Officials in many (48 of 58) of the fusion centers we
contacted said that they found the guidelines generally good and
useful, however others said they were not specific enough to address
their challenges. In addition, officials at 19 fusion centers said that
they lacked guidance on specific information-sharing policies and
procedures, such as privacy and civil liberties issues. Furthermore,
officials at 21 of the centers we contacted said that the availability
of adequate training for mission-related issues, such as training on
intelligence analysis, was a challenge. Officials in 11 centers, most
of which were operational centers that had been in existence for more
than 2 years, expressed a need for the federal government to establish
standards for training fusion center analysts. This could help ensure
that analysts are trained in a similar way nationwide, thereby
facilitating communication amongst fusion center analysts.
DHS and DOJ provide a technical assistance service program for fusion
centers, which, among other services, includes assistance developing a
comprehensive privacy and civil liberties policy,[Footnote 14] and have
ongoing efforts to provide training to fusion centers. Additionally,
along with the PM-ISE and others, DHS and DOJ have sponsored regional
and national conferences, including the second annual national fusion
center conference in March 2008, which was designed to support fusion
centers in building capabilities and understanding their roles and
responsibilities as described in the National Strategy. In addition,
DHS and DOJ, in collaboration with others, disseminated in March 2008 a
draft baseline capabilities document.[Footnote 15] Building on the
Fusion Center Guidelines, the document outlines baseline capabilities
and steps that fusion centers could take to ensure compliance in 12
topic areas, including management and governance, security,
intelligence analysis and production, and intelligence and information
dissemination. The document states that when a fusion center achieves
all of these standards, it is considered to have the standards,
structures, and tools in place to support the gathering, analysis, and
dissemination of terrorism, homeland security, and law enforcement
information. Such a baseline level of capability is critical to
establishing a national, integrated network of fusion centers,
according to the National Strategy. DHS and DOJ solicited the feedback
of state and local officials on this document at the national fusion
center conference--the results of which have yet to be compiled and
released.
Fusion Center Officials Cited Challenges with Personnel and Funding;
DHS and the FBI Are Helping to Address These Issues to Some Extent:
Many fusion center officials we contacted reported challenges related
to obtaining personnel (43 of 58) and obtaining and maintaining funding
when establishing and operating their centers (54 of 58)--challenges
that some of these officials also said affected their centers'
sustainability. For example, officials in 37 centers said they
encountered challenges with federal, state, or local agencies not being
able to detail personnel to their fusion center, particularly in the
face of resource constraints. Fusion centers rely on such details as a
means of staffing the centers and enhancing information sharing with
other state and local agencies. Furthermore, officials in 20 of the
centers we contacted said that they faced challenges finding,
attracting, and retaining qualified personnel. For instance, one
official said that it was challenging to find personnel with the
expertise to understand the concept behind the development of the
center and to use the tools to build the center. While many of these
reported challenges were attributed to difficulties at the state and
local level, we reported that DHS and the FBI had ongoing efforts to
assign personnel to support centers and facilitate information sharing.
Both DHS and the FBI have continued to support fusion centers by
deploying personnel, consistent with the 9/11 Commission Act. As of
March 2008, DHS had deployed 23 officers to fusion centers and has
plans to place officers in as many as 35 centers by the end of fiscal
year 2008, and the FBI had assigned about 200 personnel to 44 fusion
centers, according to DHS and FBI officials respectively.[Footnote 16]
In terms of funding, officials encountered challenges obtaining both
federal and state funding. Specifically, officials in 35 of the 58
centers encountered challenges with the complexity of the federal grant
process, uncertainty as to whether they would receive federal funds, or
declining federal funding, and officials from 28 of the 58 centers
reported having difficulty obtaining state or local funding. They said
that these issues created confusion for their centers over the steps
needed to secure federal funds, made it difficult to plan for the
future, and created concerns about the fusion centers' abilities to
sustain their capabilities for the long term. Fusion center officials
also identified challenges with restrictions on the use of federal
grant funds, unclear and changing grant guidance, and a lack of
understanding of how federal funding decisions are made.[Footnote 17]
For example, officials in 21 fusion centers said that obtaining
adequate funding for personnel was difficult, and officials in 17
fusion centers found federal time limits on the use of grant funds for
personnel challenging.[Footnote 18]
In October 2007, we reported that DHS had provided grant funding for
fusion-related activities and had made some changes to ease the grant
process and adjust some of the restrictions on the timing and use of
grant funds. For example, DHS expanded grant funding in fiscal year
2006 in the area of allowable costs for information sharing and
collaborative efforts. Funds could be used by states to develop and
enhance fusion centers, particularly by hiring contract or government
employees as intelligence analysts; purchasing information-technology
equipment; or hiring consultants to develop and enhance fusion centers.
However, we also reported that, despite this funding, fusion center
officials were concerned about the extent of federal support they could
expect over the long term, especially in relation to the role of their
state or local jurisdictions. Given that at the time, federal plans or
guidance did not articulate the long-term role the federal government
expected to play in fusion centers, we recommended, and the PM-ISE and
DHS concurred, that the federal government determine and articulate its
long-term fusion center role and whether it expects to provide
resources to help ensure their sustainability. Further, we stated that
particular emphasis should be placed on how best to sustain those
fusion center functions that support a national information-sharing
capability as critical nodes of the ISE.
In promoting that fusion centers achieve a baseline level of
capability, the National Strategy states that the federal government
will support the establishment of fusion centers and help sustain them
through grant funding, technical assistance, and training to achieve
such a baseline level of capability. The strategy outlines specific
roles and responsibilities for federal, state, local, and tribal
authorities in five areas that are related to the establishment and
continued operations of fusion centers and for establishing a national
integrated network of centers. It notes that these roles and
responsibilities were developed in partnership with state and local
officials and represent a collective view. While the strategy
acknowledges that fusion centers are owned and managed by state and
local governments, it identifies the objective is to assist state and
local governments in the establishment and sustained operation of these
centers. However, some fusion center officials raised concerns at the
national fusion center conference about how specifically the federal
government was planning to assist state and local governments to
sustain fusion centers. For example, whether federal funding for fusion
centers would continue to be available through DHS's homeland security
grant program or whether in the future there would be fusion-center
specific funding has yet to be determined. In addition, some officials
raised questions about limits on federal funding for personnel. For
example, according to the fiscal year 2008 homeland security grant
program guidance, costs associated with hiring new intelligence
analysts are still allowable for 2 years. After which, the states and
urban areas will be responsible for supporting the sustainment costs of
those intelligence analysts (as well as providing a budget plan for
doing so) after the 2-year federal funding period is over. In our
October 2007 report, we reported on challenges that officials found
with federal time limits on the use of grant funds for personnel. In
particular, some of these officials expressed concerns about
maintaining their personnel levels, and one official told us that the 2-
year limit on the use of DHS grant funds for personnel made retaining
personnel challenging because state and local agencies may lack the
resources to continue funding the position, which could hinder the
center's ability to continue to operate. In discussing the
implementation of the National Strategy at the fusion center
conference, a Homeland Security Council official stated that the
question of federal versus state and local roles in sustaining fusion
centers is a very difficult question and one that is not yet resolved
but is ongoing.
In closing, Mr. Chairman, fusion centers are operating or are being
established in almost all states and several local jurisdictions.
Although fusion centers were primarily established to meet or enhance
information sharing within a state or local area, they have become a
critical component of the federal government's plans as it works to
improve information sharing in accordance with law and policy. Indeed,
the National Strategy recognizes fusion centers as vital assets to
information sharing and critical in the creation of an integrated
national network to promote two-way sharing of terrorism-related
information. Given the federal interest in fusion centers and the
centers' interest in supporting such a national network, it is
important that the federal government continue to provide fusion
centers with added value as an incentive to facilitate such a network.
In October 2007 we reported that DHS's and DOJ's efforts to assist
fusion centers, such as providing access to information systems,
security clearances, guidance and technical assistance, personnel, and
funding, had begun to address a number of the challenges fusion center
directors identified to us. Several of those efforts are continuing and
evolving, including the establishment of ITACG to improve the quality
of information provided to state and local users and the release of
baseline capabilities for the operation of fusion centers. These
efforts are promising; however, it is too soon to determine the extent
to which they will address all of the challenges reported to us by
fusion center officials. It is also important for fusion center
management to understand the federal government's role with respect to
these centers since this affects state and local governments' support
to centers. In this regard, we recommended in our October 2007 report
that the federal government define and articulate its long-term fusion
center role. The National Strategy clearly articulates a vision for the
federal government's role in supporting centers--that is by helping to
sustain centers through grant funding, technical assistance, and
training. However, fusion center officials raised some concerns about
sustainability of funding and personnel as the federal government
continues work to incorporate fusion centers into the information
sharing environment and implement the National Strategy.
Mr. Chairman, this concludes my statement. I would be pleased to answer
any questions that you or other members of the subcommittee may have at
this time.
Contact Information:
For further information on this testimony, please contact Eileen
Larence at (202) 512-8777 or by e-mail at larencee@gao.gov. Individuals
making key contributions to this testimony include Mary Catherine Hult,
Tom Lombardi, and Jeffrey Niblack.
[End of section]
Footnotes:
[1] Pub. L. No. 110-53, § 511, 121 Stat. 266, 322 (2007).
[2] See Pub. L. No. 108-458, § 1016, 118 Stat. 3638, 3664-70 (2004),
amended by Pub. L. No. 110-53, § 504, 121 Stat. at 313-17.
[3] On June 2, 2005, the President issued a memorandum placing the PM-
ISE and its staff within the Office of the Director of National
Intelligence.
[4] See, e.g., Pub. L. No. 110-53 § 511, 121 Stat. at 317-24 (adding
section 210A to subtitle A, title II of the Homeland Security Act, Pub.
L. No. 107-296, 116 Stat. 2135).
[5] For purposes of this report, we use "local fusion center" to refer
to centers established by major urban areas, counties, cities, and
intrastate regions.
[6] GAO, Homeland Security: Federal Efforts Are Helping to Alleviate
Some Challenges Encountered by State and Local Information Fusion
Centers, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-35]
(Washington, D.C.: Oct. 30, 2007).
[7] Because we selected a non-probability sample of fusion centers to
include in our review, the results of our work are not generalizable to
the population of all fusion centers. However, because we selected all
state-operated fusion centers, as well as local fusion centers on the
basis of their stage of development and geographic diversity, the
information we gathered from these centers provided us with an overview
of challenges encountered and federal efforts to support the centers.
[8] Over 900 federal, state, and local law enforcement and homeland
security officials attended the conference, according to its sponsors,
which included the Office of the Director of National Intelligence,
DOJ, DHS, FBI, PM-ISE, and the Global Justice Information Sharing
Initiative.
[9] We contacted all 50 states, the District of Columbia, and 8 local
areas. However, 1 state did not plan a fusion center. For that reason,
we reported responses from 58 fusion centers--43 operational and 15 in
the planning or early stages of development.
[10] We presented information about challenges encountered by 58 fusion
centers--those in all stages of development--as they were establishing
and operating their centers. Fusion centers may have encountered more
than one challenge related to a particular area, for example, related
to guidance and training.
[11] HSIN serves as DHS's primary nationwide information-sharing tool
for communicating sensitive but unclassified homeland security
information. LEO serves as a real-time online controlled-access
communications and information-sharing data repository for sensitive
but unclassified information about, among other things, antiterrorism,
intelligence, law enforcement, and criminal justice.
[12] The Regional Information Sharing Systems is a nationwide
initiative to share sensitive but unclassified criminal intelligence
among stakeholders in law enforcement, first responders, and the
private sector.
[13] See Pub. L. No. 110-53, § 521, 121 Stat. at 328-32 (adding section
210D to subtitle A, title II of the Homeland Security Act, Pub. L. No.
107-296, 116 Stat. 2135).
[14] The 9/11 Commission Act requires that the guidelines established
by DHS for fusion centers include standards for centers to develop,
publish, and adhere to a privacy and civil liberties policy that is
consistent with federal, state, and local, law, and standards for
providing privacy and civil liberties training for all representatives
at the fusion center. Further, the act requires that DHS employees who
are detailed to fusion centers receive privacy and civil liberties
training.
[15] DHS, DOJ, Global Justice Information Sharing Initiative, Baseline
Capabilities for State and Major Urban Area Fusion Centers, A Companion
Document to the Fusion Center Guidelines (March 2008).
[16] These deployments may be to fusion centers other than the 58
centers that were included in our October 2007 report.
[17] A primary federal funding source for fusion centers is DHS's
Homeland Security Grant Program, which awards funds to state, local,
and tribal governments to enhance their ability to prepare for,
prevent, and respond to terrorist attacks and other major disasters.
[18] According to the fiscal year 2007 DHS homeland security grant
program guidance, Urban Areas Security Initiative and Law Enforcement
Terrorism Prevention Program funds could be used to hire new staff or
contractor positions to serve as intelligence analysts to enable
information and intelligence sharing capabilities. The costs associated
with hiring the new intelligence analysts were allowable for 2 years,
after which states and urban areas shall be responsible for supporting
the costs to sustain those intelligence analysts.
[End of section]
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "E-mail Updates."
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office:
441 G Street NW, Room LM:
Washington, D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Ralph Dawn, Managing Director, dawnr@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, D.C. 20548:
Public Affairs:
Chuck Young, Managing Director, youngc1@gao.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, D.C. 20548: