Information Technology

FBI Is Implementing Key Acquisition Methods on Its New Case Management System, but Related Agencywide Guidance Needs to Be Improved Gao ID: GAO-08-1014 September 23, 2008

The Federal Bureau of Investigation (FBI) is 3 years into its 6-year, $451 million program known as Sentinel, which is to replace its antiquated, paper-based, legacy systems for supporting mission-critical intelligence analysis and investigative case management activities. Because of the importance of Sentinel to the bureau's mission operations, GAO was asked to conduct a series of reviews on the FBI's management of the program. This review focuses on whether the FBI is employing effective methods in acquiring commercial solutions for Sentinel. To do so, GAO researched relevant best practices; reviewed FBI policies and procedures, program plans, and other program documents; and interviewed appropriate program officials.

The FBI's Sentinel program is implementing five key methods for acquiring commercial information technology solutions. In particular, it is managing Sentinel requirements by making sure that changes to established baselines are justified and approved on the basis of costs, benefits, and risks, and it is ensuring that different levels of requirements and related design specification and test cases are properly aligned with one another. In addition, the bureau is analyzing commercially available product alternatives in relation to requirements, costs, and other factors to ensure that the most cost-effective mix of products is being used to minimize requirement gaps. In doing so, it is taking steps to understand the dependencies among the commercial products, thus ensuring that they can interoperate effectively. Also, the bureau is not modifying the commercial products that it is selecting and using to develop Sentinel, which should allow it to minimize future maintenance costs by taking advantage of future product releases and other vendor product support. Last, it is taking steps to ensure that Sentinel integration with FBI legacy systems will occur when needed, for example, by establishing agreements with legacy system owners. Collectively, implementation of these acquisition methods should increase the chances of cost effectively delivering required Sentinel capabilities on time. However, the implementation of most of these acquisition methods is generally not governed by bureauwide policies and guidance that address all relevant practices. To the credit of program officials, this void in corporate policies and guidance has not affected Sentinel, as they are implementing all of the key practices either through reliance on their prime contractor's approaches or through Sentinel-specific plans. If policies and guidance relative to each of these methods for acquiring commercial component-based systems were incorporated into FBI-wide policies and guidance, the bureau could increase its chances of employing them on a repeatable basis across all applicable system investments.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-08-1014, Information Technology: FBI Is Implementing Key Acquisition Methods on Its New Case Management System, but Related Agencywide Guidance Needs to Be Improved This is the accessible text file for GAO report number GAO-08-1014 entitled 'Information Technology: FBI Is Implementing Key Acquisition Methods on Its New Case Management System, but Related Agencywide Guidance Needs to Be Improved' which was released on September 23, 2008. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Requesters: United States Government Accountability Office: GAO: September 2008: Information Technology: FBI Is Implementing Key Acquisition Methods on Its New Case Management System, but Related Agencywide Guidance Needs to Be Improved: GAO-08-1014: GAO Highlights: Highlights of GAO-08-1014, a report to congressional requesters. Why GAO Did This Study: The Federal Bureau of Investigation (FBI) is 3 years into its 6-year, $451 million program known as Sentinel, which is to replace its antiquated, paper-based, legacy systems for supporting mission-critical intelligence analysis and investigative case management activities. Because of the importance of Sentinel to the bureau‘s mission operations, GAO was asked to conduct a series of reviews on the FBI‘s management of the program. This review focuses on whether the FBI is employing effective methods in acquiring commercial solutions for Sentinel. To do so, GAO researched relevant best practices; reviewed FBI policies and procedures, program plans, and other program documents; and interviewed appropriate program officials. What GAO Found: The FBI‘s Sentinel program is implementing five key methods for acquiring commercial information technology solutions. In particular, it is managing Sentinel requirements by making sure that changes to established baselines are justified and approved on the basis of costs, benefits, and risks, and it is ensuring that different levels of requirements and related design specification and test cases are properly aligned with one another. In addition, the bureau is analyzing commercially available product alternatives in relation to requirements, costs, and other factors to ensure that the most cost- effective mix of products is being used to minimize requirement gaps. In doing so, it is taking steps to understand the dependencies among the commercial products, thus ensuring that they can interoperate effectively. Also, the bureau is not modifying the commercial products that it is selecting and using to develop Sentinel, which should allow it to minimize future maintenance costs by taking advantage of future product releases and other vendor product support. Last, it is taking steps to ensure that Sentinel integration with FBI legacy systems will occur when needed, for example, by establishing agreements with legacy system owners. Collectively, implementation of these acquisition methods should increase the chances of cost effectively delivering required Sentinel capabilities on time. However, the implementation of most of these acquisition methods is generally not governed by bureauwide policies and guidance that address all relevant practices (see table). To the credit of program officials, this void in corporate policies and guidance has not affected Sentinel, as they are implementing all of the key practices either through reliance on their prime contractor‘s approaches or through Sentinel- specific plans. If policies and guidance relative to each of these methods for acquiring commercial component-based systems were incorporated into FBI-wide policies and guidance, the bureau could increase its chances of employing them on a repeatable basis across all applicable system investments. Table: Extent to which FBI Has Defined and Sentinel Program Has Implemented Five Key Methods for Acquiring Commercial System Solutions: Key methods: Requirements management: Defined in FBI policy/guidance: Yes; Implemented for Sentinel: Yes. Key methods: Requirements/commercial product trade-off analysis; Defined in FBI policy/guidance: Partial; Implemented for Sentinel: Yes. Key methods: Commercial product dependency analysis; Defined in FBI policy/guidance: No; Implemented for Sentinel: Yes. Key methods: Commercial product modification; Defined in FBI policy/guidance: Partial; Implemented for Sentinel: Yes. Key methods: Legacy system integration management; Defined in FBI policy/guidance: Partial; Implemented for Sentinel: Yes. Source: GAO analysis of FBI data. [End of table] What GAO Recommends: To increase the chances of successfully delivering commercial component- based systems like Sentinel, GAO is recommending that the FBI revise its corporate policies and guidance to fully incorporate the following acquisition methods: * requirements/commercial product trade-off analysis; * commercial product dependency analysis; * commercial product modification, and; * legacy system integration management. The FBI concurred with GAO‘s findings and recommendations and stated that actions are underway and planned to address them. To view the full product, including the scope and methodology, click on [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-1014]. For more information, contact Randolph Hite (202) 512-3439 or hiter@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: Sentinel Is Implementing Key Commercial Component-Based System Acquisition Methods, but Corporate Guidance Governing These Methods Is Not Fully Defined: Conclusions: Recommendations for Executive Action: Agency Comments: Appendix I: Objective, Scope, and Methodology: Appendix II: Comments from the Federal Bureau of Investigation: Appendix III: GAO Contact and Staff Acknowledgments: Figures: Figure 1: Simplified Representation of Sentinel Incremental Acquisition Approach: Figure 2: Conceptual View of FBI IT Life Cycle: Figure 3: Sentinel Requirements Change Control Process: Abbreviations: FBI: Federal Bureau of Investigation IT: information technology SEI: Software Engineering Institute VCF: Virtual Case File: [End of section] United States Government Accountability Office: Washington, DC 20548: September 23, 2008: The Honorable Barbara Mikulski: Chair: The Honorable Richard Shelby: Ranking Member: Subcommittee on Commerce, Justice, Science, and Related Agencies: Committee on Appropriations: United States Senate: The Honorable John Conyers, Jr. Chairman: The Honorable Lamar Smith: Ranking Member: Committee on the Judiciary: House of Representatives: The Honorable F. James Sensenbrenner, Jr. House of Representatives: The Federal Bureau of Investigation (FBI) is 3 years into its 6-year, $451 million system acquisition program to replace its antiquated, paper-based legacy systems for supporting mission-critical intelligence analysis and investigative case management activities. This program, known as Sentinel, is being executed through the integration of commercially available hardware and software components in a series of phases, with each phase consisting of segments that are to provide incremental capabilities. Because of the importance of Sentinel to the bureau's mission operations, you asked us to review the FBI's management of the program. In response to your request, we have performed three incremental reviews of Sentinel that have addressed a range of system acquisition management practices. We issued reports on the results of the first two reviews in October 2006[Footnote 1] and July 2007.[Footnote 2] This report provides the results of the third review. As agreed, the objective of our third review was to determine whether the FBI is employing effective methods in acquiring commercial solutions for Sentinel. To accomplish this, we focused on the following five key information technology (IT) management areas: (1) requirements management, (2) requirements/commercial product trade-off analysis, (3) commercial product dependency analysis, (4) commercial product modification, and (5) legacy system integration. For each of the areas, we researched relevant best practices; reviewed FBI policies, procedures, and guidance; analyzed program documentation; and interviewed program management and oversight officials to determine whether they have been addressed in bureauwide policies and guidance and implemented on Sentinel. In reviewing their implementation, we focused primarily on that segment of Sentinel capabilities that was being developed at the time we began our review. We conducted this performance audit from October 2007 to September 2008 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Further details of our objective, scope, and methodology are included in appendix I. Results in Brief: For its Sentinel program, the FBI is implementing five important methods for effectively acquiring commercial IT solutions. In particular, it is managing Sentinel requirements by making sure that changes to established baselines are justified and approved on the basis of costs, benefits, and risks, and it is ensuring that different levels of requirements, and related design specification and test cases, are properly aligned with one another. In addition, the bureau is analyzing commercially available product alternatives in relation to requirements, costs, and other factors to ensure that the most cost- effective mix of products is used to minimize requirement gaps. In doing so, it is also taking steps to understand the dependencies among the commercial products to better ensure that they can interoperate effectively. Also, the bureau is not modifying the commercial products that it is selecting and using to develop Sentinel, which should allow it to minimize future maintenance costs by taking advantage of future product releases and other vendor product support. Finally, it is taking steps to ensure that Sentinel integration with FBI legacy systems will occur when needed by, for example, establishing agreements with legacy system owners. Collectively, implementation of these acquisition methods should increase the chances of cost effectively delivering required Sentinel capabilities on time. However, with the exception of requirements management, implementation of all key practices associated with these methods is generally not governed by bureauwide policies or guidance. In the absence of such policies and guidance, Sentinel program officials have recognized the need to implement the acquisition methods and, in doing so, have either relied on their prime contractor's approaches and methodologies or have created Sentinel-specific plans to guide implementation efforts. To the extent that Sentinel's efforts are institutionalized and thus made repeatable across the FBI's other IT programs through improvements to corporate policies and guidance, the FBI can increase its ability to consistently deliver successful IT programs. Accordingly, we are recommending that the FBI revise its policies and guidance to fully address a number of key practices associated with (1) requirements/ commercial product trade-off analysis, (2) commercial product dependency analysis, (3) commercial product modification, and (4) legacy system integration management. In written comments on a draft of this report, signed by the FBI Chief Information Officer and reprinted in appendix II, the bureau agreed with our findings and recommendations, and described steps underway and planned to address them. Background: The FBI serves as the primary investigative unit of the Department of Justice. Its mission includes investigating serious federal crimes, protecting the nation from foreign intelligence and terrorist threats, and assisting other law enforcement agencies. Approximately 12,000 special agents and 16,000 analysts and mission support personnel are located in the bureau's Washington, D.C., headquarters and about 70 offices in the United States and 50 offices in foreign countries. Mission responsibilities at the bureau are divided among a number of major organizational components, including: National Security: integrates investigative and intelligence activities against current and emerging national security threats and provides information and analysis for the national security and law enforcement communities. Criminal Investigations: investigates serious federal crimes and probes federal statutory violations involving exploitation of the Internet and computer systems. Law Enforcement: provides law enforcement information and forensic services to federal, state, local, and international agencies. Administration: manages the bureau's personnel programs, budgetary and financial services, records, information resources, and information security. Office of the Chief Information Officer: develops and implements the bureau's IT strategic plan and operating budget, which includes acquiring, operating, and maintaining IT assets. IT Is Instrumental to FBI Mission Operations: To execute its mission, the FBI relies extensively on the use of IT. In particular, the bureau operates and maintains hundreds of computerized systems, databases, and applications, such as the: * Combined DNA Index System, which supports forensic examinations; * National Crime Information Center and the Integrated Automated Fingerprint Identification System, which help state and local law enforcement agencies identify criminals; * Automated Case Management System, which manages information collected on investigative cases; * Investigative Data Warehouse, which aggregates data from disparate databases in a standard format to facilitate content management and data mining; and: * Terrorist Screening Database, which consolidates identification information about known or suspected international and domestic terrorists. Prior FBI Attempt to Develop an Investigative Case Management System Was Not Successful: Following the terrorist attacks in the United States on September 11, 2001, the FBI shifted its mission focus to detecting and preventing future attacks, which led to the FBI's commitment to reorganize and transform. According to the bureau, the complexity of this mission shift, along with the changing law enforcement environment, strained its existing IT environment. As a result, the bureau accelerated the IT modernization program that it had begun in September 2000. This program, later named Trilogy, was the FBI's largest IT initiative to date and consisted of three parts: (1) the Information Presentation Component to upgrade FBI's computer hardware and system software, (2) the Transportation Network Component to upgrade the agency's communication network, and (3) the User Application Component to upgrade and consolidate the bureau's five key investigative software applications. The heart of this last component became the Virtual Case File (VCF) project, which was intended to replace the obsolete Automated Case Support system. While the first two components of Trilogy are currently operating, the third component--VCF--never became operational because it was determined to be an infeasible and cost prohibitive solution. We have previously reported[Footnote 3] on reasons for VCF's failure, which included limitations in system requirements, ineffective control over changes to the system, limited oversight of contractors, and lack of continuity in certain management positions and trained staff for key program positions. Sentinel: A Brief Description: The Sentinel program began in 2005, and is intended to be both the successor to and an expansion of VCF. As we previously reported, [Footnote 4] Sentinel is to meet a pressing need for a modern, automated capability for investigative case management and information sharing to help field agents and intelligence analysts perform their jobs more effectively and efficiently. More specifically, it is to (1) provide a single point of entry for all investigative case management and paperless case management and workflow capabilities, (2) facilitate a bureauwide organizational change management program, and (3) provide intuitive interfaces that feature data relevant to individual users. Examples of specific Sentinel capabilities include leads management and evidence management; document and records management; indexed searching and electronic workflow; legacy system and external data source connectivity; training, statistical, and reporting tools; and security management. After conducting a multistep evaluation of the different governmentwide acquisition contracts available to federal agencies,[Footnote 5] the FBI issued a request for vendor proposals to more than 40 eligible companies under a National Institutes of Health contract in August 2005. In March 2006, the FBI awarded a task order to develop and integrate Sentinel to Lockheed Martin Corporation. The FBI plans to deliver defined Sentinel capabilities in four phases using commercially available software and hardware components. The specific content of each phase is to be proposed by and negotiated with the prime contractor. The general capabilities for each phase are as follows: * Phase 1: A Web-based user interface for accessing data from the Automated Case Management System and other legacy systems and a service- oriented architecture[Footnote 6] to support delivery and sharing of common services across the bureau. * Phase 2: An enterprise portal for accessing Sentinel case management capabilities, Web-application reengineering to provide faster response time, electronic authoring and approval of forms, and calendaring. * Phase 3: Online searches, integration with FBI scanners, and template management. * Phase 4: Enhanced case, evidence and crisis management, full search capability/information profile match, document authoring and workflow capabilities, fully certified FBI records management, and all case and ad hoc view capabilities. Phase 1 capabilities were deployed in June 2007 and are currently operating. Following Phase 1, the FBI, in consultation with its prime contractor, adopted a more incremental design and development approach with more frequent deliveries of capabilities. In general, each phase is to consist of segments, which are to be logically grouped and sequenced bundles of system capabilities that are to be delivered in 3- 6 month time frames. Each segment is to be further decomposed into a series of sequenced increments. Figure 1 provides a simplified representation of the relationship and timing of phases, segments, and increments. Sentinel is currently in its second phase, which is to run from October 2007 to July 2009 (22 months) and is to consist of four segments. According to the Sentinel Program Office, Segment 1 was completed in April 2008; Segment 2 began in January 2008 and is largely complete, with deployment scheduled for July 2008. The FBI is currently developing Segment 3, with deployment planned for February 2009. The FBI estimates that the four phases will cost about $451 million through fiscal year 2012. The FBI has budgeted $183 million in funding for Phase 2 (excluding operations and maintenance) and, as of July 2008, had reportedly obligated $135 million. Figure 1: Simplified Representation of Sentinel Incremental Acquisition Approach: [See PDF for image] This figure is an illustration of the Sentinel Incremental Acquisition Approach across a time line, as follows: Phase 1: February 2006 through May 2007. Phase 2: September 2007 through August 2009: * Segment 2.1 - 4 increments: September 2007 - May 2008; * Segment 2.2 - 5 increments: December 2007 - July 2008; * Segment 2.3 - 8 increments: May 2008 - March 2009; * Segment 2.4 - x increments: November 2008 - August 2009; Phase 3: March 2009 through December 2009; * 2 Segments - x increments: March 2009 - December 2009. Phase 4: October 2009 through May 2010; * 2 Segments - x increments: October 2009 through May 2010. Source: FBI data. [End of figure] To manage Sentinel, the FBI established a program office within the Office of the Chief Information Officer. The program office is led by a program manager, a deputy program manager for systems development, and a deputy program manager for organizational change management. Overview of FBI IT Acquisition Policies and Guidance: The FBI's policies and guidance governing the acquisition of IT programs such as Sentinel are contained in various documents, including its IT life-cycle management directive, which is dated August 2005 and was approved by the Chief Information Officer in January 2006.[Footnote 7] The directive provides the bureau's framework for standardized, repeatable, and sustainable management of all of its IT programs and projects. According to the directive, the framework is to be tailored to the needs and priorities associated with each program/project. The framework consists of, among other things, interrelated life-cycle phases, control gates, and reviews. The nine life-cycle phases are concept exploration, requirements development, acquisition planning, source selection, design, development and test, implementation and integration, operations and maintenance, and disposal. The life-cycle phases are associated with one or more control gates and/or program/ project reviews. They are also linked to key stakeholder processes, including information security management, and recognized system development and acquisition best practice areas. The framework's elements are discussed in more detail below and depicted in figure 2. * The seven control gates are mechanisms for executive-level control and direction, decision making, coordination, and confirmation of successful performance of activities to date. At these gates, a determination is made regarding the program/project's readiness to proceed to the next phase. Examples of control gates are system concept review, contract review board, enterprise architecture board, and technical review board. * The 14 program/project reviews determine program/project satisfaction of the directive's requirements, completion of milestones, and system design satisfaction of FBI operational needs. The review results are used to inform control gate determinations and decisions. Examples of reviews are mission needs review, system specification review, preliminary design review, and product test readiness review. * The directive has seven key stakeholder processes that are not linked to any particular phase, gate, or review. These processes reflect such management functions as enterprise architecture alignment, investment management, budget execution, acquisition management, and information security management. * The directive incorporates basic project management process areas and selected standardization process areas reflected in system development and acquisition best practices published by the Software Engineering Institute.[Footnote 8] Among the process areas addressed are configuration management, process and product quality assurance, requirements development, and risk management. According to Sentinel officials, they have tailored Version 3.0 of the directive for Sentinel, which is permitted by the guidance. However, a program official told us that a new version of the directive has been drafted. Figure 2: Conceptual View of FBI IT Life Cycle: [See PDF for image] This figure is a complex illustration of a conceptual view of FBI IT life cycle. The following information is depicted: Control gate reviews: 1; 2; 3; 4; 5; 6; 7; archives; Project reviews: 1 (relates to Control gate review 1); 2 (relates to Control gate review 2); 3, 4, 5, 6, 7, 8 (relate to Control gate review 3); 9 (relates to Control gate review 4); 10, 11 (relate to Control gate review 5); 12 (relates to Control gate review 6); 13 (relates to Control gate review 7); 14 (to archives). Life-cycle phases: Concept exploration; Requirements development; Acquisition planning; Source selection; Design; Develop and test; Implementation and integration; Operations and maintenance; Disposal. Security: Security requirements; Security certification; Security accreditation; Security reaccreditation and recertification. Stakeholder involvement: Key stakeholder tasks (throughout entire life cycle). SEI process areas: Maturity Level 2 and Maturity Level 3 process areas (throughout entire life cycle). Source: FBI data. [End of figure] In addition, the FBI's project manager's handbook,[Footnote 9] dated September 2007, provides supporting guidance for implementing the IT life-cycle management directive. The handbook identifies and defines seven primary project management practices for effectively managing IT projects within the context of the management directive. These management practices include managing requirements, performance, and systems engineering, as well as the use of program controls. Use of System Acquisition Management Best Practices Maximizes Chances for Program Success: Acquisition best practices are tried and proven methods that organizations capture in policies and guidance, define, and institutionally implement to minimize program risks and maximize the chances of program success. Using best practices can result in better outcomes--including cost savings, improved service and product quality, and ultimately, a better return on investment. For example, two software engineering analyses of nearly 200 systems acquisition projects indicated that teams using system acquisition best practices produced cost savings of at least 11 percent over similar projects conducted by teams that did not employ the kind of rigor and discipline embedded in these practices.[Footnote 10] In addition, our research shows that best practices are a significant factor in successful acquisition outcomes, including increasing the likelihood that programs and projects will be executed within cost and schedule estimates. [Footnote 11] Examples of acquisition best practices or methods that are relevant to commercial component-based systems, like Sentinel, are managing system requirements, analyzing the trade-offs between system requirements and commercial products, analyzing dependencies among commercial products, limiting modification of commercial products, and integrating commercial component-based systems with legacy systems. Prior GAO Reports Have Identified the Need for Improvements in FBI Corporate IT and Sentinel-Specific Management: Beginning in 2005, we have reported on shortfalls in the FBI's efforts to define and implement key IT management controls, such as centralizing IT responsibility and authority under the Chief Information Officer, defining and implementing an enterprise architecture, establishing IT investment management, defining and implementing systems development and acquisition practices, and strategically managing human capital, and have made recommendations to address these shortfalls that the FBI has largely agreed with. In September 2005,[Footnote 12] we reported that the FBI had taken a range of steps to establish these institutional management controls. For example, it has centralized IT responsibility and authority under the Chief Information Officer, who has taken steps to define and implement an enterprise architecture, establish IT investment management, define and implement systems development and acquisition practices, and strategically manage human capital. In doing so, the FBI recognized the importance of IT to its organizational transformation efforts, and made it one of the bureau's top 10 priorities. Consistent with this, the FBI's strategic plan contains explicit IT-related strategic goals, objectives, and initiatives (both near term and long term) to support the collection, analysis, processing, and dissemination of information. The bureau also created its earlier described life-cycle management directive to govern all phases and aspects of IT projects, including Sentinel. More recently, our reports have recognized the FBI's efforts to establish corporate management controls, and added that a key remaining challenge was to build on and further mature these capabilities and implement them effectively on each of its IT investments, including Sentinel. More specifically, we reported that the success of Sentinel will depend on how well the FBI defines and implements its new IT management approaches and capabilities. Among other things, we said that it will be crucial for the FBI to manage Sentinel requirements in the context of its architectural environment and the availability of commercial products, and to understand the capabilities and dependencies among the commercial products to minimize incompatibilities. We also said that it was crucial to prepare users for the business processes and individual role and responsibility impacts associated with implementing a commercial component-based system. As we stated at the time, not taking these steps would increase the risk of not delivering promised system capabilities and benefits on time and within budget. We also reported in October 2006 on Sentinel's implementation of IT human capital,[Footnote 13] noting that while the FBI had moved quickly to staff the Sentinel program office, it had yet to adopt a strategic approach to managing Sentinel human capital and was not treating human capital as a program risk. Accordingly, we recommended that it adopt such an approach. The FBI agreed with our recommendations. In July 2007, we reported on Sentinel's implementation of a number of key system acquisition management controls that are grounded in best practices.[Footnote 14] Specifically, we reported that the FBI was managing Sentinel according to a number of these best practices. However, we also reported, among other things, that the Sentinel cost and schedule estimates were not reliably derived, and that the bureau lacked corporate policies and guidance for cost and schedule estimating that reflected a number of best practices. Accordingly, we recommended that the FBI amend its IT handbook to incorporate these practices and that it ensure that they are implemented on all IT programs, including Sentinel. The FBI agreed with this recommendation. Sentinel Is Implementing Key Commercial Component-Based System Acquisition Methods, but Corporate Guidance Governing These Methods Is Not Fully Defined: In acquiring Sentinel, the FBI is implementing leading practices associated with effectively acquiring commercial IT solutions. For each of the five acquisition methods that we examined, key acquisition practices are being satisfied. Moreover, this is occurring even though corporate policies and guidance do not address all of the methods. In implementing them, the bureau is relying on either its prime contractor's approaches or Sentinel-specific plans. The steps that Sentinel is taking in light of this void in FBI policies and guidance are notable. To the extent that these steps can be reflected in the FBI life-cycle management directive or other corporate policies and guidance that are used to plan and execute IT investments, they can become more repeatable across all programs and projects. Key Aspects of Requirements Management Are Being Implemented: Effective requirements management is fundamental to successfully acquiring any IT system. Among other things, managing system requirements includes (1) controlling changes to requirements by establishing a baseline set of requirements and formally reviewing and approving changes to the baselines in light of expected costs, benefits, and associated risks; and (2) ensuring that the different levels of requirements (e.g., high-level operational or user requirements and detailed system and technical requirements) and their associated design specifications and test cases are aligned and consistent with one another (bidirectional traceability).[Footnote 15] The Sentinel program office has defined plans and processes governing these two vital requirements management practices. Regarding the first practice, the program office has developed a configuration management plan that, among other things, establishes a process for submitting requirements change requests and for reviewing and approving these requests. As defined, this process provides for controlling changes to requirements baselines and associated documents. Further, it provides for only allowing changes to those baselines that have traversed a series of reviews and approvals by a hierarchy of contractor and program office review boards. More specifically, a proposed change request must be technically analyzed and approved by two levels of contractor review boards before it can be submitted to the FBI for program office review. Change requests submitted to the program office are first logged in by the configuration management team and analyzed for technical content. Once the content is validated, the team assesses the request's impact on program cost, schedule, and scope, and coordinates the reviews by the two program office review boards. The Engineering Review Board assesses the impact of the proposed change and makes recommendations to the Configuration and Change Management Board, which reviews the changes and, if within its authority, approves the request. Otherwise, the program office submits the request to the FBI's enterprise review board for approval. Under the process, each board's decisions are to be based on the proposed change's costs and benefits, as well as its risks to the program's ability to meet existing cost and schedule commitments. Once a change has been approved by the FBI, it is given to the contractor for incorporation into the baseline system configuration. (See fig. 3 for a summary of this process.) To assist in implementing this process, the program office and the contractor are using a software tool that tracks and manages the change control process, ensuring that only approved changes are reflected in the baselines. We observed the operation of this tool and its capabilities, tracking one of the five actual change requests associated with Phase 2, Segment 1. In doing so, we witnessed the tool perform key functions and found that both the change control process and the tool were being implemented properly for the change request we observed. Figure 3: Sentinel Requirements Change Control Process: [See PDF for image] The change control process is illustrated as follows: Request for change: sent to: Contractor: * Contractor Engineering Review Board; * Contractor Change Control Board: sent to: FBI: * Program Office Engineering Review Board; * Program Office Change Control Board; * Enterprise Review Board: Change approved (by Program Office Change Control Board and Enterprise Review Board). Source: GAO analysis of FBI data. [End of figure] The program office's configuration management plan also describes a process for ensuring that requirements are traceable. To implement the configuration management plan and its requirements traceability process, the program office is using the above cited automated tool. This tool allows each requirement to be linked from its most conceptual, high-level definition to its most detailed, technical definition, as well as to design specifications and test cases. In effect, the tool maintains the linkages among the different levels of requirements, system design specifications, and test cases, even when the requirements change. To verify this traceability, we randomly selected 55 of the 241 Sentinel technical requirements for Sentinel Phase 2 Segment 1. We confirmed that all 55 were traceable both backwards to higher-level requirements and forward to design specifications and test results.[Footnote 16] As a result of its efforts, the program office has increased the chances that Sentinel will deliver capabilities that align with user and mission needs, and that it will not result in system capabilities that are unnecessary and not justified. Important Aspects of Effective Requirements and Commercial Product Trade-Off Analysis Are Being Employed: Analyzing the trade-offs among defined system requirements and the capabilities offered by commercial products, including the products' conformance to the organization's architectural environment, is essential to successful delivery of commercial component-based IT programs such as Sentinel. By performing such analyses, an organization can understand which system requirements can and cannot be met by commercially available, architecturally compliant components and what cost-effective alternatives are available for meeting requirements that commercial products cannot meet. To accomplish this, best practices provide for (1) performing trade-off analyses early and continuously in a system's acquisition life cycle; (2) analyzing the gaps between defined requirements and commercial component capabilities to understand component feasibility; (3) ensuring that these analyses address the relative quality and cost trade-offs among such competing variables as system requirements, operational environment (current and future), cost and schedule constraints, and commercial product availability; and (4) involving relevant stakeholders in trade-off analyses and decision making.[Footnote 17] The program office is employing key practices for analyzing trade-offs between Sentinel requirements and available commercial products. For example, the Sentinel Systems Engineering Management Plan addresses the timing of trade-off analyses, stating that they are to be performed throughout the system's engineering life cycle. Thus far, the prime contractor has prepared two Sentinel trade-off analyses during Phase 2. While the first analysis, dated November 30, 2007, was performed late, according to a program office lessons learned document,[Footnote 18] program officials told us that they have since taken steps to ensure that contractor-prepared analyses are done early and continuously. In this regard, we verified that the Phase 2 Integrated Master Schedule provides for a series of trade-off studies. Further, Sentinel's engineering management plan also requires that the trade studies evaluate the advantages and disadvantages of candidate products using objective and relevant requirements-based criteria. Both trade studies produced to date addressed this requirement by identifying gaps between relevant Sentinel requirements and the capabilities of the candidate commercial products. The first study, for example, found that only two of the evaluated products were able to satisfy a Sentinel requirement related to the versioning of reusable document templates. Both of the trade studies also discuss relative quality/cost trade-offs among competing alternatives. In particular, both describe the extent to which the candidate products meet Sentinel requirements and their compatibility with the FBI's operational environment, and both use the relative costs and capabilities of product alternatives as a selection criterion. In addition, the second study takes into account the availability of the products. According to a contractor official, trade studies include only products that are immediately available in the commercial marketplace. Further, while the above cited Sentinel lesson learned document states that the first study was performed without adequate stakeholder involvement, the second study addresses this lesson learned by involving the program office, including having the program office decide which product alternatives to pursue based on contractor recommendations. This involvement was evidenced by the fact that one version of this study reflects program office comments and input. By ensuring that its second trade study is better aligned with relevant best practices, the program office is better positioned to make informed decisions in satisfying Sentinel requirements. Key Aspects of Commercial Product Dependency Analysis Are Being Implemented: Dependency analysis is a key factor in verifying that acquisition decisions are based on deliberate and thorough research, analysis, and evaluation of commercial components' ability to interoperate effectively. The purpose of dependency analysis is to ensure that relationships between commercial products that need to interoperate as part of an integrated solution are fully understood before the products are purchased. As we have previously reported, analysis of component dependencies should be guided by a methodology that defines the activities that are to occur as part of system design. These activities include (1) allocating requirements among the various commercial components that constitute a given system design option, (2) defining the interactions among the various components to enable the successful interaction between them, and (3) using iterative prototyping to assess interactions among components.[Footnote 19] The Sentinel Program Office has relied on the prime contractor to perform these analyses using the contractor's approach and methods. Our analysis of available documentation shows that the contractor's approach and methods satisfy the key practices associated with effective commercial component dependency analysis. First, the prime contractor's requirements allocation approach calls for high-level system requirements to be allocated to program phases and segments, and for these requirements to be further decomposed into more detailed (technical) requirements and allocated to specific system components during design activities. Second, Sentinel design documents define interactions that are to occur among the system components, including technical details required for the interactions, such as message/data formatting requirements, data transfer rates, transfer protocols, and security/privacy constraints. Third, the second trade study states that selected vendors were asked to bring their software products into the prime contractor's software development facility in order to compare the products in a consistent manner. In doing so, the products were prototyped to determine how quickly and easily they could be integrated with the existing Sentinel system architecture. According to a prime contractor official, prototyping is also performed as part of product design to validate trade-off analysis decisions. Implementing the full range of activities that allow for the relationships among commercial products to be fully understood before implementation activities begin will help the program office reduce the risk of integration problems, and thus avoid cost and schedule shortfalls. Modification of Commercial Products Is Being Limited: Limiting changes to the commercial products that are used to create an IT system to only those changes that are justified on the basis of life- cycle costs and benefits is an important acquisition method. As we have previously reported,[Footnote 20] this decreases the risk of a commercial product being modified to the point that it becomes a one- of-a-kind, customized solution that is no longer supported by new releases of the vendor's product, thus becoming costly to maintain. Among other things, effectively controlling modifications to commercial components includes (1) having a defined policy or guidance governing modification of commercial products, (2) ensuring that any modification is justified on the basis of the life-cycle impact on system costs and benefits, and (3) working proactively with the product's vendor to incorporate planned modifications into the next release of the product. [Footnote 21] To the program office's credit, it has taken steps to employ each of these practices on Sentinel. First, the prime contractor's Systems Engineering Management Plan explicitly discourages the modification of commercial and government off-the-shelf IT components to the maximum extent possible. Further, senior officials, including the FBI Chief Information Officer and Sentinel Deputy Program Manager, told us that they are committed to avoiding such modifications. Second, the Systems Engineering Management Plan states that the cost/ benefit impacts of requirements changes that will involve modifying commercial products must be considered in approving any such change. This plan also provides for analyzing the total ownership costs (i.e., life-cycle costs) and schedule impact of any commercial, off-the-shelf product modifications necessary to meet Sentinel requirements, and it provides guidance for conducting these analyses. Third, program officials and prime contractor representatives told us that they intend to request that commercial product vendors incorporate needed modifications to their products into future product releases. According to Sentinel officials, their efforts to limit commercial product modifications are aimed at avoiding the pitfalls that have befallen other commercial component-based systems. They further stated that they have not modified any of the components used to date in deploying Phase 1 and 2 capabilities, and they do not intend to modify any going forward. This is important because future Sentinel segments and increments call for continued use of commercial components, thus making these practices critical to the program's success. By establishing and implementing these component modification practices on Sentinel, the program office is increasing its ability to effectively use commercial products and minimizing its exposure to cost risks. Steps Are Underway to Address Legacy System Integration: Successful delivery of a system like Sentinel requires integration with an organization's existing (i.e., legacy) systems. To effectively implement this acquisition method, it is important for a program office to ensure that the new system provides interfaces to the legacy systems and that legacy system owners are developing and testing required interfaces. According to leading practices, legacy system integration includes, among other things (1) identifying the systems to be integrated, (2) defining system interfaces, (3) working to establish the sequence and readiness of legacy systems integration, and (4) developing and testing the interfaces.[Footnote 22] The Sentinel program office has taken steps to implement these key practices, and in doing so has relied on its prime contractor to apply its own methodology for integrating legacy systems. Specifically, the Sentinel high-level system requirements identify the systems to be integrated with Sentinel. Moreover, design documents include high-level descriptions of Sentinel's intended interfaces to key FBI legacy systems, as well as interfaces to systems external to the FBI. According to program officials and prime contractor representatives, system integration planning will not occur until a specific program segment begins. Further, program officials stated that since the Phase 2 increments completed to date (i.e., Segment 1 increments) have required minimal integration with legacy or external systems, little interface definition and integration planning has yet been necessary. Program officials told us that they intend to establish agreements, ranging from informal agreements to signed memoranda of understanding, with legacy system owners to ensure that their respective systems are ready in time for integration with Sentinel. According to these officials, the specific plans governing the sequence of these systems' readiness will be developed in accordance with Sentinel's incremental development approach. Further, an official said that the first increment to involve interfaces with legacy systems is underway. Further, the development and testing of Sentinel's legacy interfaces are to be detailed during segment planning. Since the increments that have been completed to date (i.e., Segment 1 increments) have required little integration with legacy or external systems, the development and testing of interfaces have not yet been necessary. By taking steps to manage the integration of Sentinel with legacy systems, the program office will be better positioned to ensure that Sentinel is deployed on time and performs as intended. FBI Policies and Guidance Do Not Address Most Key Acquisition Methods: With the exception of the practices that relate to effective requirements management, not all of the key practices that were earlier discussed in association with (1) requirements/commercial product trade- off analysis, (2) commercial product dependency analysis, (3) commercial product modification, and (4) legacy system integration management are fully reflected in any bureauwide policy or guidance. The extent to which the practices related to each of these five acquisition methods are addressed in FBI policies and guidance is discussed below: * The FBI's life-cycle management directive addresses both requirements change control and requirements traceability. Specifically, the directive requires that projects manage and control requirements changes, including reviewing and controlling changes to baselined requirements and conducting and documenting impact analyses for any requirements change requests. The directive also speaks to the need for requirements to be traceable forward and backwards across the project life cycle, including the use of a requirements management tool that supports traceability across functions and interfaces as well as requirements tracking and reporting. * For requirements/commercial product trade-off analysis, the FBI's life-cycle management directive partially addresses key practices. Specifically, the directive includes an appendix that provides a structural template outlining the content of a trade study or analysis to help choose among competing commercial component solutions for meeting a given mission need or problem. According to the template, analyses should be undertaken early in a system's life cycle (during the concept exploration phase) and should be updated and used throughout a system's life-cycle phases. Further, its content should include, among other things, a statement of the problem being addressed or the purpose of the study, the evaluation or selection criteria and related weighting factors being used, the alternative solutions being evaluated and their characteristics, a comparative analysis of the solutions to include weighted scoring of each, and a recommended course of action. However, the directive does not explicitly address, for example, (1) analyzing the gaps between defined requirements and the capabilities of commercial component alternatives to understand each component's feasibility, (2) ensuring that the analyses' selection criteria include the relative quality and costs of competing alternatives relative to system requirements and the organization's operational environment (current and future), and (3) involving relevant stakeholders in the analysis and decision-making process. * For commercial product dependency analysis, neither the FBI's life- cycle management directive nor the related handbook addresses the key practices associated with this acquisition method. While FBI officials stated that they rely on contractors to perform the practices associated with this method because the practices are engineering oriented, it is important for the bureau to provide its program managers with policy and guidance relative to the method so that they can be positioned to effectively manage and oversee the contractors' efforts. * For commercial product modification, the FBI's Business Process Reengineering Executive Playbook[Footnote 23] partially addresses the method's associated practices. Specifically, it states that the FBI is to limit the modification of commercial component systems, adding that modifying a commercial product negates the advantages of using such systems and introduces major problems in maintaining the system's software. However, neither the FBI's life-cycle management directive nor the reengineering playbook explicitly addresses two other key practices: (1) ensuring that any modification is justified on the basis of the life-cycle impact on system costs and benefits and (2) working proactively with the product's vendor to incorporate planned modifications into the next release of the product. * For legacy system integration management, the FBI's Transition and Sequencing Plan partially addresses two key practices. Specifically, this plan recognizes the importance of identifying the legacy systems that will need to be integrated, and in particular, identifies those systems relative to Sentinel. In addition, the plan also recognizes the need to understand the dependencies among systems as a means to determining their sequencing, and, in this regard, provides time frames of when systems that are to be impacted by Sentinel will be, among other things, interfaced to it. However, the FBI's policy and guidance documents do not address the other two key practices associated with this method: (1) defining system interfaces and (2) developing and testing the interfaces. By not defining these practices in FBI corporatewide policies and guidance, the chances that they will be implemented on a repeatable basis across all bureau IT programs and projects are reduced. Conclusions: Successfully implementing large-scale IT programs depends in large part on the rigorous implementation of acquisition management best practices. For systems like Sentinel, which are to minimize the development and use of customized software, relevant best practices extend to those that are unique to commercial component-based systems. Following such practices minimizes a program's exposure to risk and helps deliver promised capabilities and benefits on time and within budget. This is especially important for the Sentinel system, which is to provide long-overdue, mission-critical intelligence and investigative services across the FBI. Employing such practices in a repeatable fashion across all programs requires that these practices be institutionally defined and that their use be enforced and measured. The FBI has, for the most part, not institutionalized defined key practices associated with requirements/ commercial product trade-off analysis, commercial product dependency analysis, commercial product modification, and legacy system integration. To the credit of Sentinel program officials, this void in corporate policies and guidance is being effectively overcome, as the program is implementing these key practices either through reliance on its prime contractor's approaches or through Sentinel-specific plans. If these Sentinel practices are successfully incorporated into FBI-wide policies and guidance, then their chances of being employed on a repeatable basis across all applicable FBI system investments will be increased. Recommendations for Executive Action: To leverage key commercial component-based acquisition methods being implemented on Sentinel, and increase the chances of these practices being implemented on all FBI IT programs, we are making four recommendations. We recommend that the FBI Director instruct the Chief Information Officer to incorporate into FBI policy or guidance each of the practices that we identified in this report as not being addressed relative to (1) requirements/commercial product trade-off analysis, (2) commercial product dependency analysis, (3) commercial product modification, and (4) legacy system integration management. Agency Comments: In written comments on a draft of this report, signed by the FBI Chief Information Officer and reprinted in appendix II, the bureau agreed with our findings and recommendations, adding that our review of Sentinel was thorough. The bureau also stated that it is committed to creating policies, procedures, and processes that are standardized, repeatable, and reflective of industry best practices, and it described steps that are either planned or underway to address our recommendations. For example, the FBI stated that it will examine or is examining its processes and procedures for analyzing and understanding gaps between defined requirements and the capabilities of commercial products, and ensuring that product selection decisions are based on the relative quality and costs of competing alternatives. We are sending copies of this report to the Chairman and Vice Chairman of the Senate Select Committee on Intelligence and the Chairman and Ranking Member of the House Permanent Select Committee on Intelligence, as well as to the Chairman and Ranking Member of the Senate Committee on the Judiciary, and the Chairman and Ranking Member of the House Committee on Appropriations, Subcommittee on Commerce, Justice, Science, and Related Agencies. We are also sending copies to the Attorney General; the Director, FBI; the Director, Office of Management and Budget; and other interested parties. In addition, the report will also be available without charge on GAO's Web site at [hyperlink, http://www.gao.gov]. Should you have any questions about matters discussed in this report, please contact me at (202) 512-3439 or by e-mail at hiter@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs Office may be found on the last page of this report. Key contributors to this report are listed in appendix III. Signed by: Randolph C. Hite: Director, Information Technology Architecture and Systems Issues: [End of section] Appendix I: Objective, Scope, and Methodology: Our objective was to determine whether the Federal Bureau of Investigation (FBI) is employing effective methods in acquiring commercial solutions for Sentinel. To accomplish this, we focused on the following five key information technology (IT) management areas: (1) requirements management, (2) requirements/commercial product trade- off analysis, (3) commercial product dependency analysis, (4) commercial product modification, and (5) legacy system integration. To address our objective, we researched relevant best practices, including published guidance from the Software Engineering Institute and GAO-issued reports associated with each of these five areas. [Footnote 24] To identify the FBI's efforts, we obtained and reviewed FBI IT management policies and guidance, including its Information Technology Life Cycle Management Directive (Version 3.0),[Footnote 25] Project Manager's Handbook, and Business Process Reengineering Executive Playbook, and compared them to the practices in each of the five IT management areas to determine the extent to which they were included in FBI guidance. We also reviewed program office and prime contractor planning and program management documentation, including the Sentinel Systems Engineering Management Plan (Version 3) and Sentinel Configuration Management Plan (Version 3). In addition, we interviewed Sentinel program officials as well as prime contractor representatives, as appropriate, to determine how the FBI had defined its approach to managing each of these five areas and how it had actually implemented them on Sentinel. In reviewing the FBI's implementation on Sentinel, we focused primarily on Phase 2, Segment 1, which was the segment being developed at the time we began our review. We also performed the following additional audit work: * For requirements management, we reviewed: (1) the Sentinel Configuration Management Plan, (2) the contractor's Requirements Satisfaction Report, and (3) the contractor's System Design Document. In addition, to determine the extent to which the requirements were traceable, we randomly selected 55 requirements from the program office's Requirement's Traceability Matrix and traced them backwards to the Sentinel System Requirements Specification and forward to design specifications and test cases. This sample was designed with a 5 percent tolerable error rate at the 95 percent level of confidence, so that if we found 0 problems in our sample we could conclude statistically that the error rate was less than 5 percent. Based upon the weight of all other factors included in our evaluation, our verification of 55 out of 55 requirements was sufficient to demonstrate traceability. Further, we tracked one of the five change requests associated with Phase 2, Segment 1 to determine whether the change had been reviewed and approved consistent with the established requirements change control process. In addition, we interviewed program officials involved in the requirements management process to discuss their roles and responsibilities for managing requirements. * For trade-off analysis, we reviewed: (1) the Sentinel Lessons Learned document, (2) the Forms Tool Capability Trade Study, (3) the Search Tool Capability Trade Study, and (4) the Design Concept Description and Architecture. In addition, we interviewed the prime contractor's Chief Architect for Sentinel to discuss trade studies. * For commercial product dependency analysis, we reviewed: (1) two Sentinel Interface Control Documents and (2) the Interface Design Document. We also reviewed the above cited trade studies with respect to efforts to prototype the interaction among commercial products that were being studied. In addition, we interviewed the prime contractor's Chief Architect for Sentinel to discuss how trade studies took commercial product dependencies into account. * For commercial product modification, we reviewed the Systems Engineering Management Plan and interviewed the FBI Chief Information Officer and Sentinel Deputy Program Manager about their commercial product modification policies. * For legacy system integration, we reviewed the Sentinel (1) Design Concept Description and Architecture, (2) Interface Design Document, (3) Software Design Document, and (4) Test and Evaluation Master Plan. In addition, we interviewed the Sentinel System Analysis Section Lead to discuss Sentinel's integration of legacy systems. To assess data reliability, we reviewed quality and access controls of the program office systems and tools used to generate the data. We also reviewed related program documentation to substantiate data provided by program officials during interviews. Further, we have also made appropriate attribution in the report to indicate the data's sources. We conducted our work from our Washington, D.C., headquarters, and at FBI headquarters and facilities in the greater Washington, D.C., metropolitan area between October 2007 and September 2008 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objective. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objective. [End of section] Appendix II: Comments from the Federal Bureau of Investigation: U.S. Department of Justice: Federal Bureau of Investigation: Washington, D.C. 20535-0001: September 2, 2008: Mr. Randolph C. Hite: Director, Information Technology Architecture and Systems Issues: Government Accountability Office: 441 G Street, N.W. Washington, D.C. 20548: Dear Mr. Hite: Re: FBI Response To GAO'S Draft Report, GAO-08-1014, FBI Is Implementing Key Acquisition Methods On Its New Case Management System, But Related Agency-Wide Guidance Needs To Be Improved: Thank you for the opportunity to review and comment on the Government Accountability Office (GAO) draft report entitled Information Technology: FBI Is Implementing Kev Acquisition Methods on Its New Case Management System. but Related Agency-wide Guidance Needs to be Improved (hereafter referred to as "the Report"). The FBI appreciates the positive response and recognition for the Sentinel Program Management Office's efforts to adhere to system acquisition management best practices for its commercial information technology software. The Report has been reviewed by the Federal Bureau of Investigation (FBI), Information and Technology Branch (ITB). This letter constitutes the formal FBI response. Based on our review of the Report, the FBI concurs with the GAO's recommendations and findings. The GAO conducted a thorough assessment of the FBI's Information Technology (IT) acquisition program management by researching relevant best practices, reviewing FBI procedures and guidance, analyzing Sentinel documentation, and reviewing policy source documents such as the Life Cycle Management Directive (version 3.0), Business Process Reengineering Executive Playbook, Transition and Sequencing Plan, and the IT Program Manager's Handbook. The FBI was aware of some of the issues prior to the audit and as a result of these findings, the FBI has initiated changes to processes and procedures and has corrected policy source documents in order to fully address the shortcomings outlined in the report. The proposed changes are outlined under the major headings below: 1. Requirements/commercial product trade-off analysis: Analyze the gaps between defined requirements and the capabilities of commercial component alternatives to understand each commercial component's viability; Ensure that the analysis selection criteria include the relative quality and costs of competing alternatives relative to system requirements and the organization's operational environment; and Involve relevant stakeholders in the analysis and decision-making process. 2. Commercial product dependency: Provide program managers with policy and guidance relative to this method to help position them to effectively manage and oversee the contractors' efforts. 3. Commercial product modification: Ensure that any modification is justified on the basis of the life- cycle impact on system costs and benefits; and; Work pro-actively with the product's vendor to incorporate planned modifications into the next release of the product. 4. Legacy system integration management: Define system interfaces; and; Develop and test the interfaces. Specific implementation steps will require further study to optimize the intended results, but the FBI will seriously weigh and select the most appropriate options to codify GAO recommendations outlined in the report in a decisive and timely manner. The FBI is committed to the goal of creating policies, procedures, and processes that are standardized, repeatable, and deliver industry best practices for sustainable management of all of the FBI's IT programs and investments. Following the GAO's recommendations will assist in minimizing program risks and maximizing the organization's ability to consistently deliver successful IT programs that support the collection, analysis, processing, and dissemination of information. Again, thank you for the opportunity to respond to the Report. Should you or your staff have questions regarding our response, please contact me at (202) 324-6165, or Mr. John M. Hope, Program Management Executive, Office of IT Program Management, {202) 324-2307. Sincerely yours, Signed by: Zalmai Azmi: Assistant Director and Chief Information Officer: [End of section] Appendix III: GAO Contact and Staff Acknowledgments: GAO Contact: Randolph C. Hite at (202) 512-3439 or hiter@gao.gov: Staff Acknowledgments: Major contributors to this report were Deborah Davis (Assistant Director), Paula Moore (Assistant Director), Carl Barden, Sharhonda Deloach, Neil Doherty, Nancy Glover, Daniel W. Gordon, Lee McCracken, Teresa Smith, Eric Trout, and Kevin Walsh. [End of section] Footnotes: [1] GAO, Information Technology: FBI Has Largely Staffed Key Modernization Program, but Strategic Approach to Managing Program's Human Capital Is Needed, [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-07-19] (Washington, D.C.: Oct. 16, 2006). [2] GAO, Information Technology: FBI Following a Number of Key Acquisition Practices on New Case Management System, but Improvements Still Needed, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-912] (Washington, D.C.: July 30, 2007). [3] GAO, Information Technology: FBI Is Building Management Capabilities Essential to Successful System Deployment, but Challenges Remain, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-1014T] (Washington, D.C.: Sept. 14, 2005). [4] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-912]. [5] Governmentwide acquisition contracts are authorized by the Clinger- Cohen Act to improve the acquisition of IT by federal agencies. These contracts are operated at the Department of Commerce, Department of Transportation, National Aeronautics and Space Administration, General Services Administration's Federal Technology Service, and National Institutes of Health. They are typically multiple-award contracts for IT that allow an indefinite quantity of goods or services (within specified limits) to be furnished during a fixed period, with deliveries scheduled through orders with the contractor. The providing agency awards the contract and other agencies issue task orders under it. [6] A service-oriented architecture is an approach for sharing functions and applications across an organization by designing them as discrete, reusable, business-oriented services. These services need to be, among other things, (1) self-contained, meaning that they do not depend on any other functions or applications to execute a discrete unit of work; (2) published and exposed as self-describing business capabilities that can be accessed and used; and (3) subscribed to via well-defined and standardized interfaces instead of unique, tightly coupled connections. Such a service orientation is thus not only intended to promote the reduced redundancy and increased integration that any architectural approach is designed to achieve, but also to provide the flexibility needed to support a quicker response to changing and evolving business requirements and emerging conditions. [7] FBI Information Technology Life Cycle Management Directive, Version 3.0 (Aug. 19, 2005). [8] Software Engineering Institute (SEI) guidance includes maturity levels that provide a set of process areas that characterize different organizational behaviors. [9] Office of IT Program Management, Project Management for the FBI, version 2 (September 2007). [10] D.E. Harter, M.S. Krishnan, and S.A. Slaughter, "Effects of Process Maturity on Quality, Cycle Time, and Effort in Software Product Development," Management Science, vol. 46, no. 4, (2000); and B.K. Clark, "Quantifying the Effects of Process Improvement on Effort," IEEE Software (November/December 2000). [11] GAO, Information Technology: DOD's Acquisition Policies and Guidance Need to Incorporate Additional Best Practices and Controls, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-722] (Washington, D.C.: July 30, 2004). [12] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-1014T]. [13] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-19]. [14] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-912]. [15] Carnegie Mellon University Software Engineering Institute, Capability Maturity Model® Integration for Development, version 1.2 (August 2006). [16] Based on the results of our random sample, the 95 percent confidence interval for the Sentinel technical requirements that are not traceable is from 0 to 5 percentage points. [17] See, for example, GAO, Business Modernization: Some Progress Made toward Implementing GAO Recommendations Related to NASA's Integrated Financial Management Program, [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-05-799R] (Washington, D.C.: Sept. 9, 2005); [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-722]; and GAO, Business Modernization: Improvements Needed in Management of NASA's Integrated Financial Management Program, [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-03-507] (Washington, D.C.: Apr. 30, 2003). [18] Sentinel Lessons Learned, version 2.6 (Feb. 15, 2008). [19] See, for example, [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-05-799R]. [20] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-722]. [21] See, for example, [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-04-722]. [22] Carnegie Mellon University Software Engineering Institute, Capability Maturity Model® Integration for Development, version 1.2 (August 2006). [23] Office of Chief Information Officer, Business Process Reengineering Executive Playbook, Business Process Management Office, Federal Bureau of Investigation. [24] Carnegie Mellon University Software Engineering Institute, Capability Maturity Model® Integration for Development, version 1.2 (August 2006); Carnegie Mellon University Software Engineering Institute, Interpreting Capability Maturity Model® Integration (CMMI®) for COTS-Based Systems (October 2003); GAO, Business Modernization: Some Progress Made toward Implementing GAO Recommendations Related to NASA's Integrated Financial Management Program, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-799R] (Washington, D.C.: Sept. 9, 2005 ); GAO, Information Technology: DOD's Acquisition Policies and Guidance Need to Incorporate Additional Best Practices and Controls, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-722], (Washington, D.C.: July 30, 2004), and GAO, Business Modernization: Improvements Needed in Management of NASA's Integrated Financial Management Program, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-507] (Washington, D.C.: Apr. 30, 2003). [25] According to a program office official, a new version of this directive has been drafted. [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office: 441 G Street NW, Room LM: Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.