Information Technology
Terrorist Watch Lists Should Be Consolidated to Promote Better Integration and Sharing
Gao ID: GAO-03-322 April 15, 2003
Terrorist and criminal watch list systems--sometimes referred to as watchout, lookout, target, or tip-off systems--are important tools in controlling and protecting our nation's borders. The events of September 11, 2001, and other incidents since then, have highlighted the need to share these watch lists. In light of the importance of border security, GAO was asked to identify federal databases and systems that contain watch lists, the agencies that maintain and use them in protecting our nation's borders, the kind of data they contain, whether federal agencies are sharing information from these lists with each other and with state and local governments and private organizations, the structural characteristics of those lists that are automated, and whether opportunities exist to consolidate these watch lists.
Generally, the federal government's approach to using watch lists in performing its border security mission is decentralized and nonstandard, largely because these lists were developed in response to individual agencies' unique missions, including their respective legal, cultural, and systems environments. Specifically, nine federal agencies--which prior to the creation of the Department of Homeland Security (DHS) spanned the Departments of Defense, Justice, State, Transportation, and the Treasury--develop and maintain 12 watch lists. These lists include overlapping but not identical sets of data, and different policies and procedures govern whether and how these data are shared with others. As a general rule, this sharing is more likely to occur among federal agencies than between federal agencies and either state and local government agencies or private entities. Further, the extent to which such sharing is accomplished electronically is constrained by fundamental differences in the watch lists' systems architecture (that is, the hardware, software, network, and data characteristics of the systems). Two agencies identified opportunities to standardize and consolidate these lists, which GAO believes would improve information sharing. The President's homeland security strategy further recognizes the need to address the proliferation of these lists. While the Office of Homeland Security was reportedly pursuing consolidation as part of an effort to develop a border and transportation security blueprint, referred to as an enterprise architecture, the DHS Chief Information Officer told us that the department had recently taken responsibility for the blueprint. However, we were not provided enough information to evaluate these efforts.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-03-322, Information Technology: Terrorist Watch Lists Should Be Consolidated to Promote Better Integration and Sharing
This is the accessible text file for GAO report number GAO-03-322
entitled 'Information Technology: Terrorist Watch Lists Should Be
Consolidated to Promote Better Integration and Sharing' which was
released on April 30, 2003.
This text file was formatted by the U.S. General Accounting Office
(GAO) to be accessible to users with visual impairments, as part of a
longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
Report to Congressional Requesters:
April 2003:
Information Technology:
Terrorist Watch Lists Should Be Consolidated to Promote Better
Integration and Sharing:
GAO-03-322:
GAO Highlights:
Highlights of GAO-03-322, a report to Congressional Requesters
Why GAO Did This Study:
Terrorist and criminal watch list systems”sometimes referred to as
watchout, lookout, target, or tip-off systems”are important tools in
controlling and protecting our nation‘s borders. The events of
September 11, 2001, and other incidents since then, have highlighted
the need to share these watch lists. In light of the importance of
border security, GAO was asked to identify federal databases and
systems that contain watch lists, the agencies that maintain and use
them in protecting our nation‘s borders, the kind of data they contain,
whether federal agencies are sharing information from these lists with
each other and with state and local governments and private
organizations, the structural characteristics of those lists that are
automated, and whether opportunities exist to consolidate these watch
lists.
What GAO Found:
Generally, the federal government‘s approach to using watch lists in
performing its border security mission is decentralized and
nonstandard, largely because these lists were developed in response to
individual agencies‘ unique missions, including their respective legal,
cultural, and systems environments. Specifically, as shown in the
figure below, nine federal agencies”which prior to the creation of the
Department of Homeland Security (DHS) spanned the Departments of
Defense, Justice, State, Transportation, and the Treasury”develop and
maintain 12 watch lists.
These lists include overlapping but not identical sets of data, and
different policies and procedures govern whether and how these data are
shared with others. As a general rule, this sharing is more likely to
occur among federal agencies than between federal agencies and either
state and local government agencies or private entities. Further, the
extent to which such sharing is accomplished electronically is
constrained by fundamental differences in the watch lists‘ systems
architecture (that is, the hardware, software, network, and data
characteristics of the systems).
Two agencies identified opportunities to standardize and consolidate
these lists, which GAO believes would improve information sharing. The
President‘s homeland security strategy further recognizes the need to
address the proliferation of these lists. While the Office of Homeland
Security was reportedly pursuing consolidation as part of an effort to
develop a border and transportation security blueprint, referred to as
an enterprise architecture, the DHS Chief Information Officer told us
that the department had recently taken responsibility for the
blueprint. However, we were not provided enough information to evaluate
these efforts.
What GAO Recommends:
GAO recommends that the Secretary of DHS, in collaboration with the
heads of the other departments and agencies that have and use watch
lists, lead an effort to consolidate and standardize the federal
government‘s watch list structures and policies. DHS and other
departments involved in this study generally agreed with GAO‘s findings
and recommendations.
Letter:
Results in Brief:
Background:
Federal Agencies Maintain Numerous Watch Lists, Containing Varying
Types of Data, Used by Many Organizations:
Watch List Sharing Is Governed by Varying Policies and
Procedures:
Federal Agency Watch List Data Sharing and Supporting System
Architectures Vary:
Opportunities Exist for Consolidating Watch Lists and Improving
Information Sharing:
Conclusions:
Recommendations for Executive Action:
Agency Comments And Our Evaluation:
Appendixes:
Appendix I: Objectives, Scope, and Methodology:
Appendix II: Comments from the Department of Justice:
Appendix III: Comments from the Department of State:
Appendix IV: GAO‘s Survey Instrument:
Appendix V: GAO Contact and Staff Acknowledgments:
GAO Contact:
Staff Acknowledgments:
Tables:
Table 1: Departments, Agencies, and Their Watch Lists:
Table 2: Selected Architectural Characteristics of the 12 Watch List
Systems:
Figures:
Figure 1: Simplified Overview of the Border Security Process and the
Departments and Agencies Involved:
Figure 2: Simplified Diagram of the Border Security Process and the
Departments and Agencies That Use Watch Lists:
Figure 3: Simplified Diagram of the Complexity Associated with
Connecting Decentralized Databases:
Figure 4: Simplified Diagram of Central Data Store with Subsidiary
Databases:
Figure 5: Simplified Diagram of the Border Security Process, Departments
and Agencies Involved, and Watch Lists Used:
Figure 6: Types of Data Included in Watch Lists:
Figure 7: Extent of Agency Sharing of Watch List Data with Other Federal
Agencies and with State, Local, and Private Organizations:
Figure 8: Simplified Overview of the Border Security Process,
Departments and Agencies Involved, Watch Lists Used, and Sharing among
Watch Lists:
This is a work of the U.S. Government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. It may contain
copyrighted graphics, images or other materials. Permission from the
copyright holder may be necessary should you wish to reproduce
copyrighted materials separately from GAO‘s product.
Abbreviations:
DHS: Department of Homeland Security:
FBI: Federal Bureau of Investigation:
INS: Immigration and Naturalization Service:
TSA: Transportation Security Administration:
Letter April 15, 2003:
The Honorable Charles E. Grassley
Chairman
Committee on Finance
United States Senate:
The Honorable Carl Levin
Select Committee on Intelligence
United States Senate:
Terrorist and criminal watch list systems--sometimes referred to as
watchout, lookout, target, or tip-off systems--are important tools in
controlling and protecting our nation's borders. The events of
September 11, 2001, and other incidents since then, have reinforced
their importance and highlighted the need to share and use these lists.
Because watch lists are important tools in border security, you
requested that we identify:
* federal databases and systems that contain watch lists, the agencies
that maintain and use these watch lists in protecting our nation's
borders, and the kinds of data these watch lists contain;
* whether federal agencies' sharing of watch list data is governed by
policies and procedures;
* whether watch lists are (1) being exchanged among federal agencies
and between federal agencies and state, local, and private
organizations, and (2) supported by common system architectures (system
hardware, software, and data characteristics); and:
* whether opportunities exist for consolidating watch lists.
To address these objectives, using a questionnaire, we surveyed nine
agencies that perform border security functions and that, according to
our research, either develop or use watch lists. We did not
independently verify agencies' responses. Details of our objectives,
scope, and methodology are discussed in appendix I.
Results in Brief:
Generally, the federal government's approach to developing and using
terrorist and criminal watch lists in performing its border security
mission is diffuse and nonstandard, largely because these lists were
developed and have evolved in response to individual agencies' unique
mission needs and the agencies' respective legal, cultural, and
technological environments. More specifically, nine federal
agencies[Footnote 1]--which spanned the Departments of Defense,
Justice, State, Transportation, and the Treasury--have developed and
maintain 12 watch lists. These lists contain a wide variety of data;
most contain biographical data, such as name and date of birth, and a
few contain biometric[Footnote 2] data, such as fingerprints. Beyond
the nine agencies that have developed and maintain these watch lists,
about 50 other federal agencies and many state and local government
entities have access to one or more of these lists.
Nonstandardization also extends to the policies and procedures
governing whether and how agencies share watch lists. Specifically, two
of the nine federal agencies do not have such policies and procedures,
and the remaining seven have differing ones. For example, one of the
agencies' policies included guidance on sharing with other federal
agencies as well as state and local governments, but another addressed
sharing only with federal agencies. As a general rule, the federal
agencies that have watch lists share the lists among themselves.
However, half of these agencies share their respective lists with state
and local agencies, and one-fourth share them with private entities.
The extent to which such sharing is accomplished electronically is
constrained by fundamental differences in watch list system
architectures (that is, the hardware, software, network, and data
characteristics of the systems).
The number and variability of federal watch lists, combined with the
commonality of purpose of these lists, point to opportunities to
consolidate and standardize them. Appropriately exploiting these
opportunities offers certain advantages--such as faster access, reduced
duplication, and increased consistency--which can reduce costs and
improve data reliability. Some of the agencies that have developed and
maintain watch lists acknowledged these opportunities, as does the
President's homeland security strategy. To this end, Office of Homeland
Security officials stated in public forums during the course of our
review that watch list consolidation activities were under way as part
of efforts to develop a set of integrated blueprints--commonly called
an enterprise architecture[Footnote 3]--for the new Department of
Homeland Security (DHS). According to DHS's Chief Information Officer,
responsibility for the consolidation effort has been transferred to
DHS.
To strengthen our nation's homeland security capability, we are
recommending that the Secretary of DHS take a series of steps aimed at
ensuring that watch lists are appropriately and effectively
standardized, consolidated, and shared. In commenting on a draft of
this report, DHS--as well as other departments that develop and
maintain watch lists and that commented on the draft--generally agreed
with our findings and recommendations. Their comments are summarized
and evaluated in the Agency Comments and Our Evaluation section of this
report.
Background:
The President's national strategy for homeland security and the
Homeland Security Act of 2002[Footnote 4] provide for securing our
national borders against terrorists. Terrorist and criminal watch lists
are important tools for accomplishing this end.
Simply stated, watch lists can be viewed as automated databases that
are supported by certain analytical capabilities. To understand the
current state of watch lists, and the possibilities for improving them,
it is useful to view them within the context of such information
technology management disciplines as database management and enterprise
architecture management.
Overview of the President's Homeland Security Strategy and the Homeland
Security Act:
Since the September 11th terrorist attacks, homeland security--
including securing our nation's borders--has become a critical issue.
To mobilize and organize our nation to secure the homeland from attack,
the administration issued, in July 2002, a federal strategy for
homeland security.[Footnote 5] Subsequently, the Congress passed and
the President signed the Homeland Security Act, which established DHS
in January 2003. Among other things, the strategy provides for
performance of six mission areas, each aligned with a strategic
objective, and identifies major initiatives associated with these
mission areas. One of the mission areas is border and transportation
security.[Footnote 6]
For the border and transportation security mission area, the strategy
and the act specify several objectives, including ensuring the
integrity of our borders and preventing the entry of unwanted persons
into our country. To accomplish this, the strategy provides for, among
other things, reform of immigration services, large-scale modernization
of border crossings, and consolidation of federal watch lists.[Footnote
7] It also acknowledges that accomplishing these goals will require
overhauling the border security process. This will be no small task,
given that the United States shares a 5,525 mile border with Canada and
a 1,989 mile border with Mexico and has 95,000 miles of shoreline.
Moreover, each year, more than 500 million people legally enter our
country, 330 million of them noncitizens. More than 85 percent enter
via land borders, often as daily commuters.
Overview of the Border Security Process:
Our nation's current border security process for controlling the entry
and exit of individuals consists of four primary functions: (1) issuing
visas,
(2) controlling entries, (3) managing stays, and (4) controlling exits.
The federal agencies involved in these functions include the Department
of State's Bureau of Consular Affairs and its Bureau of Intelligence
and Research, as well as the Justice Department's Immigration and
Naturalization Service (INS), the Treasury Department's U.S. Customs
Service (Customs), and the Transportation Department's Transportation
Security Administration (TSA).[Footnote 8]
The process begins at the State Department's overseas consular posts,
where consular officers are to adjudicate visa applications for foreign
nationals who wish to enter the United States. In doing so, consular
officials review visa applications, and sometimes interview applicants,
prior to issuing a visa. One objective of this adjudication process is
to bar from entry any foreign national who is known or suspected to
have engaged in terrorist activity, is likely to engage in such
activity, or is a member or supporter of a known terrorist
organization.[Footnote 9]
Foreign nationals (and any other persons attempting to enter the United
States, such as U.S. citizens) are to be screened for admission into
the United States by INS or Customs inspectors. Generally, this
consists of questioning the person and reviewing entry documents. Since
October 2002, males aged 16 or over from certain countries (for
example, Iran, Iraq, Syria, and the Sudan) are also required to provide
their name and U.S. address and to be photographed and
fingerprinted.[Footnote 10] In addition, airline officials use
information provided by TSA to screen individuals attempting to travel
by air. As discussed in the next section, requirements for checking a
person against a watch list differ somewhat, depending upon whether the
person arrives at a land-, air-, or seaport.
After foreign nationals are successfully screened and admitted, they
are not actively monitored unless they are suspected of illegal
activity and come under the scrutiny of a law enforcement agency, such
as the Department of Justice's Federal Bureau of Investigation (FBI).
Also, when foreign nationals depart the country, they are not screened
unless they are males aged 16 years or over from certain countries
referenced above, or are leaving by air. According to TSA, all
passengers on departing flights are screened prior to boarding the
plane. Figure 1 is a simplified overview of the border entry/exit
process.
Figure 1: Simplified Overview of the Border Security Process and the
Departments and Agencies Involved:
[See PDF for image]
Note: Customs and TSA appear twice in this figure because they support
both entry and exit control. INS appears three times because it
supports entry control, stay management, and exit control.
[End of figure]
The Role of Watch Lists in the Border Security Process:
Watch lists are important tools that are used by federal agencies to
help secure our nation's borders. These lists share a common purpose--
to provide decisionmakers with information about individuals who are
known or suspected terrorists and criminals, so that these individuals
can either be prevented from entering the country, apprehended while in
the country, or apprehended as they attempt to exit the country. As
shown in figure 2, which builds on figure 1 by adding watch list icons
and associating them with the agencies that maintain the respective
lists, watch lists collectively support nine federal agencies in
performing the four primary functions in the border security process.
Specifically:
* When a person applies for a visa to enter the United States, State
Department consular officials are to check that person against one or
more watch lists before granting a visa.
* When a person attempts to enter the United States by air or sea, INS
or Customs officials are required to check that person against watch
lists before the person is allowed to enter the country. In addition,
when a person attempts to enter the United States by air, INS or Custom
officials check him or her against watch lists provided by TSA prior to
allowing him or her to board the plane. Persons arriving at land
borders may be checked, but there is no requirement to do so. The
exception, as previously discussed, is for males aged 16 or over from
certain countries, who are required to be checked.[Footnote 11]
* Once a watch list identifies a person as a known or suspected
terrorist, INS, Customs, or airline officials are to contact the
appropriate law enforcement or intelligence organization (for example,
the FBI), and a decision will be made regarding the person's entry and
the agency's monitoring of the person while he or she is in the
country.
* When a person exits the country by plane, airline officials are to
check that person against watch lists.
In performing these roles, the agencies use information from multiple
watch lists. For example, U.S. National Central Bureau for Interpol
officials told us that they provide information to the agencies
involved in entry control, exit control, and stay management.
Figure 2: Simplified Diagram of the Border Security Process and the
Departments and Agencies That Use Watch Lists:
[See PDF for image]
Note: Customs and TSA, along with their associated lists, appear twice
in this figure because they support both entry and exit control. INS
appears three times because its lists support entry control, stay
management, and exit control.
[End of figure]
President's Strategy Recognizes Problems with Watch Lists and Proposes
Improvements:
In addition to highlighting the importance of watch lists for border
security, the President's national strategy cites problems with these
lists, including limited sharing. According to the July 2002 strategy,
in the aftermath of the September 11th attacks it became clear that
vital watch list information stored in numerous and disparate federal
databases as not available to the right people at the right time. In
particular, federal agencies that maintained information about
terrorists and other criminals had not consistently shared it. The
strategy attributed these sharing limitations to legal, cultural, and
technical barriers that resulted in the watch lists being developed in
different ways, for different purposes, and in isolation from one
another.
To address these limitations, the strategy calls for integrating and
reducing variations in watch lists and overcoming barriers to sharing
the lists. It also calls for developing an enterprise architecture for
border security and transportation (see next section for a description
of an enterprise architecture).[Footnote 12] More specifically, the
strategy provides for developing a consolidated watch list that would
bring together the information on known or suspected terrorists
contained in federal agencies' respective lists.[Footnote 13]
Enterprise Architecture:
A Brief Description:
If properly developed, enterprise architectures provide clear and
comprehensive pictures of an entity, whether it is an organization (for
example, a federal department, agency, or bureau) or a functional or
mission area that cuts across more than one organization (for example,
grant management, homeland security, or border and transportation
security). These architectures are recognized as essential tools for
effectively and efficiently engineering business operations and the
systems and databases needed to support these operations.
More specifically, enterprise architectures are systematically derived
and captured blueprints or descriptions--in useful models, diagrams,
and narrative--of the mode of operation for a given enterprise. This
mode of operation is described in both (1) logical terms, such as
interrelated business processes and business rules, information needs
and flows, data models, work locations, and users, and (2) technical
terms, such as hardware, software, data, communications, and security
attributes and performance standards. They provide these perspectives
both for the enterprise's current, or "as is," environment and for its
target, or "to be," environment, as well as a transition plan for
moving from the "as is" to the "to be" environment.
Using enterprise architectures is a basic tenet of effective IT
management, embodied in federal guidance and commercial best
practices.[Footnote 14] When developed and used properly, these
architectures define both business operations and the technology that
supports these operations in a way that optimizes interdependencies and
interrelationships. They provide a common frame of reference to guide
and constrain decisions about the content of information asset
investments in a way that can ensure that the right information is
available to those who need it, when they need it.
Options for Enterprise Database Structures:
As discussed in the previous section, enterprise architectures
facilitate delivery of the right information to the right people at the
right time. To this end, these architectures include data models, or
logical representations of data types and their relationships, which
are used to engineer physical data "stores," or repositories. When
engineered properly, these data stores are structured in a way that
effectively and efficiently supports both shared and unique enterprise
applications, functions, and operations. The structure of these data
stores, whether they are paper records or automated databases, can take
many forms, employing varying degrees of centralization and
standardization. Associated with the structures being employed are
opportunities and limitations to effective and efficient information
exchange and use.
Generally, these structures can be viewed along a continuum. At one
extreme, databases can be nonstandard, both in terms of
metadata[Footnote 15] and the technologies that manage the data, and
they can be decentralized, meaning that they were built in isolation
from one another to support isolated or separate, "stovepiped"
applications, functions, and operations. In this case, integrating the
databases to permit information exchange requires the development of
unique, and potentially complex and costly, point-to-point interfaces
(hardware and software) that translate the data or bridge
incompatibilities in the technology. Further, the sheer number of
databases involved can exponentially increase the number of
relationships, and thus interfaces, that have to be built and
maintained. Structuring databases in this way can quickly evolve into
an overly complex, unnecessarily inefficient, and potentially
ineffective way to support mission operations. (See fig. 3 for a
simplified diagram conceptually depicting this approach to structuring
databases.):
Figure 3: Simplified Diagram of the Complexity Associated with
Connecting Decentralized Databases:
[See PDF for image]
[End of figure]
At the other extreme, databases can be structured to recognize that
various enterprise applications, functions, and operations have a need
for the same data or sets of data, even though they may need to use
them in different ways to support different mission applications,
functions, and operations. If engineered properly, these database
structures allow for greater use of standards, in terms of both data
definitions and technology, and are more centralized, although the
option exists to create subsidiary databases--known as data warehouses
and data marts--to permit more uniquely configured and decentralized
data sources to support specific and unique mission needs. Further,
since the core data in these subsidiary databases are received from a
corporate database(s), the need for interfaces to translate data or
connect incompatible technologies is greatly reduced. Structuring
databases in this way can minimize complexity and maximize efficiency
and mission effectiveness. (See fig. 4 for a simplified diagram
conceptually depicting this approach to structuring databases.):
Figure 4: Simplified Diagram of Central Data Store with Subsidiary
Databases:
[See PDF for image]
[End of figure]
Federal Agencies Maintain Numerous Watch Lists, Containing Varying
Types of Data, Used by Many Organizations:
Terrorist watch lists are developed, maintained, or used by federal,
state, and local government entities, as well as by private-sector
entities, to secure our nation's borders. Twelve such lists are
currently maintained by federal agencies. These lists contain various
types of data, from biographical data--such as a person's name and date
of birth--to biometric data--such as fingerprints.
:
Twelve Federal Watch Lists Are Maintained by Nine Agencies:
Nine federal agencies, which prior to the establishment of DHS spanned
five different cabinet-level departments, currently maintain 12
terrorist and criminal watch lists. These lists are also used by at
least 50 federal, state, and local agencies. The above-mentioned
departments are the Departments of State, Treasury, Transportation,
Justice, and Defense. Table 1 shows the departments, the associated
nine agencies that maintain watch lists, and the 12 watch lists.
Table 1: Departments, Agencies, and Their Watch Lists:
[See PDF for image]
Source: GAO.
[A] Interagency Border Inspection operates as a part of Customs'
Treasury Enforcement Communications System, commonly referred to as
TECS.
[B] INS is in the process of integrating this system with the FBI's
Integrated Automated Fingerprint Identification System.
[C] This list is part of the FBI's National Crime Information Center..
[D] Interpol (International Police Organization) is an
intergovernmental organization made up of 181 member countries for the
purpose of ensuring cooperation among the world's law enforcement
entities. It is headquartered in Lyon, France. The U.S. National
Central Bureau for Interpol, within the Justice Department, serves as
the U.S. member of Interpol and facilitates dissemination of Interpol
watch list information to federal, state, and local agencies.
[End of table]
The 12 watch lists support the federal agencies involved in the border
security process. Figure 5, which builds on figure 2, provides a
graphical representation identifying the name of each of the lists and
relating them to the agencies that maintain the lists and are involved
in performing the four border security functions: issuing visas,
controlling entries, managing stays, and controlling exits.
Figure 5: Simplified Diagram of the Border Security Process,
Departments and Agencies Involved, and Watch Lists Used:
[See PDF for image]
Notes: Customs and TSA, along with their associated lists, appear twice
in this figure because they support both entry and exit control. INS
appears three times because its systems support entry control, stay
management, and exit control.
INS also uses the Interagency Border Inspection System to control entry
and exit as well as to monitor stays.
[End of figure]
Watch Lists Contain Different Types of Data:
The 12 watch lists do not all contain the same types of data, although
some types are included in all of the lists. At the same time, some
types of data are included in only a few of the lists. More
specifically, all of the lists include the name and date of birth; 11
include other biographical information (for example, passport number
and any known aliases); 9 include criminal history (for example,
warrants and arrests); 8 include biometric data (for example,
fingerprints); 3 include immigration data (for example, visa type,
travel dates, departure country, destination country, country visited,
arrival dates, departure dates, and purpose of travel); and 2 include
financial data (for example, large currency transactions). Figure 6
shows the data types that are included in each watch list.
Figure 6: Types of Data Included in Watch Lists:
[See PDF for image]
Note: Shaded cells indicate data included in watch lists.
[End of figure]
Watch List Sharing Is Governed by Varying Policies and Procedures:
Effective sharing of information from watch lists and of other types of
data among multiple agencies can be facilitated by agencies'
development and use of well-coordinated and aligned policies and
procedures that define the rules governing this sharing. One effective
way to implement such policies and procedures is to prepare and execute
written watch list exchange agreements or memorandums of understanding.
These agreements would specify answers to such questions as what data
are to be shared with whom, and how and when they are to be shared.
Not all of the nine agencies have policies and procedures governing the
sharing of watch lists. In particular, two of the agencies reported
that they did not have any policies and procedures on watch list
sharing. In addition, of the seven that reported having such policies
and procedures, one did not require any written agreements. Further,
the policies and procedures of the seven have varied. For example, one
agency's policies included guidance on sharing with other federal
agencies as well as with state and local governments, but another's
addressed sharing only with other federal agencies. In addition, each
agency had different policies and procedures on memorandums of
understanding, ranging from one agency's not specifying any
requirements to others' specifying in detail that such agreements
should include how, when, and where data would be shared with other
parties.
The variation in policies and procedures governing the sharing of
information from watch lists can be attributed to the fact that each
agency has developed its own policies and procedures in response to its
own specific needs. In addition, the agencies reported that they
received no direction from the Office of Homeland Security identifying
the needs of the government as a whole in this area. As a result,
federal agencies do not have a consistent and uniform approach to
sharing watch list information.
Federal Agency Watch List Data Sharing and Supporting System
Architectures Vary:
The President's homeland security strategy and recent legislation call
for increased sharing of watch lists, not only among federal agencies,
but also among federal, state, and local government entities and
between government and private-sector organizations. Currently,
sharing of watch list data is occurring, but the extent to which it
occurs varies, depending on the entities involved. Further, these
sharing activities are not supported by systems with common
architectures. This is because agencies have developed their respective
watch lists, and have managed their use, in isolation from each other,
and in recognition of each agency's unique legal, cultural, and
technological environments. The result is inconsistent and limited
sharing.
Watch List Sharing Varies:
According to the President's homeland security strategy, watch list
data sharing has to occur horizontally among federal agencies as well
as vertically among federal, state, and local governments in order for
the country to effectively combat terrorism. In addition, recent
federal homeland security legislation, including the Homeland Security
Act,[Footnote 16] USA PATRIOT ACT of 2001,[Footnote 17] and the
Enhanced Border Security and Visa Entry Reform Act of 2002[Footnote 18]
require, among other things, increased sharing of homeland security
information both among federal agencies and across all levels of
government.
The degree to which watch list data are being shared is not consistent
with the President's strategy and recent legislative direction on
increased data sharing. Specifically, while federal agencies report
that they are generally sharing watch list data with each other, they
also report that sharing with organizations outside of the federal
government is limited. That is, five of the nine agencies reported that
they shared data from their lists with state and local agencies, and
three reported that they shared data with private industry. Figure 7
visually summarizes the extent to which federal agencies share watch
list data with each level of government (federal, state, and local) and
with the private sector.
Figure 7: Extent of Agency Sharing of Watch List Data with Other
Federal Agencies and with State, Local, and Private Organizations:
[See PDF for image]
[End of figure]
As noted above, federal agencies are sharing either all or some of
their watch list data with each other. However, this sharing is the
result of each agency's having developed and implemented its own
interfaces with other federal agencies' watch lists. The consequence is
the kind of overly complex, unnecessarily inefficient, and potentially
ineffective network that is associated with unstructured and
nonstandard database environments. In particular, this environment
consists of nine agencies--with 12 watch lists--that collectively
maintain at least 17 interfaces; one agency's watch list alone has at
least 4 interfaces. A simplified representation of the number of watch
list interfaces and the complexity of the watch list environment is
provided in figure 8.
Figure 8: Simplified Overview of the Border Security Process,
Departments and Agencies Involved, Watch Lists Used, and Sharing among
Watch Lists:
[See PDF for image]
Note: Several watch lists are used in more than one phase of the border
security process. For example, Customs uses the Interagency Border
Inspection System for controlling entry and for controlling exits. In
such cases, we showed the watch list interfaces under only one phase.
[End of figure]
A key reason for the varying extent of watch list sharing is the
cultural differences among the government agencies and private-sector
organizations involved in securing U.S. borders. According to the
President's strategy, cultural differences often prevent agencies from
exchanging or integrating information. We also recently reported that
differences in agencies' cultures has been and remains one of the
principal impediments to integrating and sharing information from watch
lists and other information.[Footnote 19]
Historically, legal requirements have also been impediments to sharing,
but recent legislation has begun addressing this barrier. Specifically,
the President's strategy and our past work[Footnote 20] have reported
on legal requirements, such as security, privacy, and other civil
liberty protections, that restrict effective information sharing. To
address this problem, Congress has recently passed legislation that has
significantly changed the legal framework for information sharing,
which, when fully implemented, should diminish the effect of existing
legal barriers. In particular, Congress has enacted legislation
providing for agencies to have increased access to other agencies'
information and directing more data sharing among agencies. For
example, section 701 of the USA PATRIOT ACT[Footnote 21] broadened the
goals of regional law enforcement's information sharing to cover
terrorist activities. The Enhanced Border Security and Visa Entry
Reform Act[Footnote 22] expanded law enforcement and intelligence
information sharing about aliens seeking to enter or stay in the United
States. Most recently, the Homeland Security Act[Footnote 23] provides
the newly created DHS with wide access to information held by federal
agencies relating to "threats of terrorism" against the United States.
Section 891 expresses the "sense of Congress" that "Federal, state, and
local entities should share homeland security information to the
maximum extent practicable." Further, section 892 of the Act requires
the President to prescribe and implement procedures for the sharing of
"homeland security information" among federal agencies and with state
and local agencies, and section 895 requires the sharing of grand jury
information.
Watch List Sharing Is Not Supported by a Common Architecture:
The President's homeland security strategy stresses the importance of
information sharing and identifies, among other things, the lack of a
common systems architecture--and the resultant incompatible watch list
systems and data--as an impediment to systems' interoperating
effectively and efficiently. To address this impediment, the strategy
proposes developing a "system of systems" that would allow greater
information sharing across federal agencies as well as among federal
agencies, state and local governments, private industry, and citizens.
In order for systems to work more effectively and efficiently, each
system's key components have to meet certain criteria. In particular,
their operating systems[Footnote 24] and applications[Footnote 25] have
to conform to certain standards that are in the public domain, their
databases have to be built according to explicitly defined and
documented data schemas and data models, and their networks have to be
connected. More specifically, critical system components would have to
adhere to common standards, such as open systems standards, to ensure
that different systems interoperate.[Footnote 26] One source for open
system standards is the International Organization for
Standardization.[Footnote 27] Also, these systems' data would have to
have common--or at least mutually understood--data definitions so that
data could, at a minimum, be received and processed, and potentially
aggregated and analyzed. Such data definitions are usually captured in
a data dictionary. Further, these systems would have to be connected to
each other via a telecommunications network or networks. When system
components and data do not meet such standards, additional measures
have to be employed, such as acquiring or building and maintaining
unique system interfaces (hardware and software) or using manual
workarounds. These measures introduce additional costs and reduce
efficiency and effectiveness.
The 12 automated watch list systems do not meet all of these criteria
(see table 2). For example, they use three different types of operating
systems, each of which stores data and files differently. Overcoming
these differences requires the use of software utilities to bridge the
differences between systems. Without such utilities, for example, a
Windows-based system cannot read data from a diskette formatted by a
UNIX-based system.
Table 2: Selected Architectural Characteristics of the 12 Watch List
Systems:
Watch list database: Consular Lookout and Support System; Is the
operating system compatible with all other watch list operating
systems?: No; Are the software applications compliant with open system
standards?: No; Is the data dictionary available and shared?: Yes; Is
the system connected to an external network?: Yes.
Watch list database: TIPOFF; Is the operating system compatible with
all other watch list operating systems?: No; Are the software
applications compliant with open system standards?: No; Is the data
dictionary available and shared?: Yes; Is the system connected to an
external network?: No.
Watch list database: Interagency Border Inspection System; Is the
operating system compatible with all other watch list operating
systems?: No; Are the software applications compliant with open system
standards?: No; Is the data dictionary available and shared?: Yes; Is
the system connected to an external network?: No.
Watch list database: National Automated Immigration Lookout System; Is
the operating system compatible with all other watch list operating
systems?: No; Are the software applications compliant with open system
standards?: No; Is the data dictionary available and shared?: No; Is
the system connected to an external network?: No.
Watch list database: Warrant Information Network; Is the operating
system compatible with all other watch list operating systems?: No; Are
the software applications compliant with open system standards?: No; Is
the data dictionary available and shared?: Yes; Is the system connected
to an external network?: Yes.
Watch list database: Automated Biometric Identification System; Is the
operating system compatible with all other watch list operating
systems?: No; Are the software applications compliant with open system
standards?: No; Is the data dictionary available and shared?: No; Is
the system connected to an external network?: No.
Watch list database: Violent Gang and Terrorist Organization File[A];
Is the operating system compatible with all other watch list operating
systems?: No; Are the software applications compliant with open system
standards?: No; Is the data dictionary available and shared?: Yes; Is
the system connected to an external network?: Yes.
Watch list database: Integrated Automated Fingerprint Identification
System[A]; Is the operating system compatible with all other watch list
operating systems?: No; Are the software applications compliant with
open system standards?: Yes; Is the data dictionary available and
shared?: Yes; Is the system connected to an external network?: Yes.
Watch list database: Top Ten Fugitive List; Is the operating system
compatible with all other watch list operating systems?: No; Are the
software applications compliant with open system standards?: Yes; Is
the data dictionary available and shared?: No; Is the system connected
to an external network?: Yes.
Watch list database: Interpol Terrorism Watch List; Is the operating
system compatible with all other watch list operating systems?: No; Are
the software applications compliant with open system standards?: Yes;
Is the data dictionary available and shared?: Unknown[B]; Is the system
connected to an external network?: No.
Watch list database: No-Fly List; Is the operating system compatible
with all other watch list operating systems?: No; Are the software
applications compliant with open system standards?: No; Is the data
dictionary available and shared?: No; Is the system connected to an
external network?: No.
Watch list database: Selectee List; Is the operating system compatible
with all other watch list operating systems?: No; Are the software
applications compliant with open system standards?: No; Is the data
dictionary available and shared?: No; Is the system connected to an
external network?: No.
Source: GAO.
[A] System is connected to a network, but databases are not accessible
directly from the network.
[B] Officials from the U.S. National Central Bureau for Interpol stated
that they did not know to what extent Interpol headquarters shares its
data dictionary with others.
[End of table]
Also, nine of the systems do not have software applications that comply
with open system standards. In these cases, agencies may have had to
invest time and resources in designing, developing, and maintaining
unique interfaces[Footnote 28] so that the systems can exchange data.
Further, five of the systems' databases do not have a data dictionary,
and of the remaining seven systems that do have data dictionaries, at
least one is not sharing its dictionary with other agencies. Without
both the existence and sharing of these data dictionaries, meaningful
understanding of data received from another agency could require an
added investment of time and resources to interpret and understand what
the received data mean. Moreover, aggregation and analysis of the data
received with the data from other watch lists may require still further
investment of time and resources to restructure and reformat the data
in a common way.
Last, seven of the systems are not connected to a network outside of
their agencies or departments. Our experience has shown that without
network connectivity, watch list data sharing among agencies can occur
only through manual intervention. According to several of these
agencies, the manual workarounds are labor-intensive and time-
consuming, and they limit the timeliness of the data provided. For
example, data from the TIPOFF system are shared directly with the
National Automated Immigration Lookout System through a regular update
on diskette. Those data are then transferred from the National
Automated Immigration Lookout System to the Interagency Border
Inspection System.
The President' s strategy attributes these differences to the agencies'
building their own systems to meet agency-specific mission needs,
goals, and policies, without knowledge of the information needs and
policies of the government as a whole. As noted and depicted in figure
6, this approach has resulted in an overly complex, unnecessarily
inefficient, and potentially ineffective federal watch list sharing
environment.
Opportunities Exist for Consolidating Watch Lists and Improving
Information Sharing:
As addressed in the preceding sections of this report, federal watch
lists share a common purpose and support the border security mission.
Nevertheless, the federal government has developed, maintains, and--
along with state and local governments and private entities--uses 12
separate watch lists, some of which contain the same types of data.
However, this proliferation of systems, combined with the varying
policies and procedures that govern the sharing of each, as well as the
architectural differences among the automated lists, create strong
arguments for list consolidation. The advantages of doing so include
faster access, reduced duplication, and increased consistency, which
can reduce costs and improve data reliability.
Most of the agencies that have developed and maintain watch lists did
not identify consolidation opportunities. Of the nine federal agencies
that operate and maintain watch lists, seven reported that the current
state and configuration of federal watch lists meet their mission
needs, and that they are satisfied with the level of watch list
sharing. However, two agencies supported efforts to consolidate these
lists. The State Department's Bureau of Consular Affairs and the
Justice Department's U.S. Marshals Service agreed that some degree of
watch list consolidation would be beneficial and would improve
information sharing. Both cited as advantages of consolidation the
saving of staff time and financial resources by limiting the number of
labor-intensive and time-consuming data transfers, and one also cited
the reduction in duplication of data that could be realized by
decreasing the number of agencies that maintain lists.
The President's strategy also recognizes that watch list consolidation
opportunities exist and need to be exploited. More specifically, the
strategy states that the events of September 11th raised concerns
regarding the effectiveness of having multiple watch lists and the lack
of integration and sharing among them. To address these problems, the
strategy calls for integrating the numerous and disparate systems that
support watch lists as a way to reduce the variations in watch lists
and remove barriers to sharing them.
To implement the strategy, Office of Homeland Security officials have
stated in public settings that they were developing an enterprise
architecture for border and transportation security, which is one of
the six key mission areas of the newly created DHS.[Footnote 29] They
also reported the following initial projects under this architecture
effort: (1) developing a consolidated watch list that brings together
information on known or suspected terrorists in the federal agencies'
watch lists, and (2) establishing common metadata or data definitions
for electronic watch lists and other information that is relevant to
homeland security. However, the Office of Homeland Security did not
respond to our inquiries about this effort, and thus we could not
determine the substance, status, and schedule of any watch list
consolidation activities. Since then, the DHS Chief Information Officer
told us that DHS has assumed responsibility for these efforts.
Conclusions:
Our nation's success in achieving its homeland security mission depends
in large part on its ability to get the right information to the right
people at the right time. Terrorist and criminal watch lists make up
one category of such information. To date, the federal watch list
environment has been characterized by a proliferation of systems, among
which information sharing is occurring in some cases but not in others.
This is inconsistent with the most recent congressional and
presidential direction. Our experience has shown that even when sharing
is occurring, costly and overly complex measures have had to be taken
to facilitate it. Cultural and technological barriers stand in the way
of a more integrated, normalized set of watch lists, and agencies'
legal authorities and individuals' civil liberties are also relevant
considerations. To improve on the current situation, central
leadership--spanning not only the many federal agencies engaged in
maintaining and using watch lists, but also the state and local
government and the private-sector list users--is crucial to introducing
an appropriate level of watch list standardization and consolidation
while still enforcing relevant laws and allowing agencies to
(1) operate appropriately within their unique mission environments and
(2) fulfill their unique mission needs. Currently, the degree to which
such leadership is occurring, and the substance and status of
consolidation and standardization efforts under way, are unclear. In
our view, it is imperative that Congress be kept fully informed of the
nature and progress of such efforts.
Recommendations for Executive Action:
To promote better integration and sharing of watch lists, we recommend
that DHS's Secretary, in collaboration with the heads of the
departments and agencies that have and use watch lists, lead an effort
to consolidate and standardize the federal government's watch list
structures and policies. To determine and implement the appropriate
level of watch list consolidation and standardization, we further
recommend that this collaborative effort include:
1. updating the watch list information provided in this report, as
needed, and using this information to develop an architectural
understanding of our nation's current or "as is" watch list
environment;
2. defining the requirements of our nation's target or "to be" watch
list architectural environment, including requirements that address any
agency-unique needs that can be justified, such as national security
issues and civil liberty protections;
3. basing the target architecture on achievement of the mission goals
and objectives contained in the President's homeland security strategy
and on congressional direction, as well as on opportunities to leverage
state and local government and private-sector information sources;
4. developing a near-term strategy for implementing the target
architecture that provides for the integration of existing watch lists,
as well as a longer-term strategy that provides for migrating to a more
consolidated and standardized set of watch lists;
5. ensuring that these strategies provide for defining and adopting
more standard policies and procedures for watch list sharing and
addressing any legal issues affecting, and cultural barriers to,
greater watch list sharing; and:
6. developing and implementing the strategies within the context of the
ongoing enterprise architecture efforts of each of the collaborating
departments and agencies.
In addition, we recommend that the Secretary report to Congress by
September 30, 2003, and every 6 months thereafter, on the status and
progress of these efforts, as well as on any legislative action needed
to accomplish them.
Agency Comments And Our Evaluation:
In commenting on a draft this report, three of the six departments
provided either written (Justice and State) or oral (DHS) comments. The
remaining three departments (Defense, Transportation, and Treasury)
said that they had reviewed the draft but had no comments. The Office
of Homeland Security was also provided with a draft but said that it
would not comment. The departments that provided comments generally
agreed with our findings and recommendations. They also (1) provided
technical comments, which we have incorporated as appropriate in the
report, and (2) offered department-unique comments, which are
summarized and evaluated below.
In his oral comments, DHS's Chief Information Officer stated that the
department now has responsibility for watch list consolidation.
Additionally, the Chief Information Officer generally described DHS's
plans for watch list consolidation and agreed that our recommendations
were consistent with the steps he described. In light of DHS's
assumption of responsibility for watch list consolidation, we have
modified our recommendations to direct them to the DHS Secretary.
In its written comments, Justice stated that, in addition to cultural
differences, there are other reasons why agencies do not share watch
list information, such as national security and civil liberty
requirements, and that these requirements complicate the consolidation
of watch list information. Justice also stated that, while it agrees
that there is a need to establish a common watch list architecture to
facilitate sharing, this need should not impede short-term efforts to
improve sharing. We agree with Justice's first point, which is why our
recommendations provide for ensuring that all relevant requirements,
which would include pertinent national security and civil liberty
protections, are taken into consideration in developing our nation's
watch list architectural environment. To make this more explicit, we
have modified our recommendations to specifically recognize national
security and civil liberty requirements. We also agree with Justice's
second point, and thus our recommendations also provide for pursuing
short-term, cost-effective initiatives to improve watch list sharing
while the architecture is being developed. (Justice's comments are
reprinted in app. II.):
In its written comments, State said that our report makes a number of
valuable points concerning the benefits of watch list consolidation,
enterprise architecture, and information sharing. However, State also
said that our report (1) attributed watch list differences solely to
varying agency cultures, (2) seemed to advocate a "one size fits all
approach," and (3) often makes the assumption that software and systems
architecture differences necessarily obstruct information sharing.
With respect to State's first point, our report states clearly that
watch list differences are attributable not only to varying cultural
environments, but also to each agency's unique mission needs and its
legal and technical environments as well. Concerning State's second
point, our report does not advocate a "one size fits all" solution.
Rather, our recommendation explicitly calls for DHS to lead a
governmentwide effort to, among other things, determine the appropriate
degree of watch list consolidation and standardization needed and to
consider in this effort the differences in agencies' missions and
needs. Regarding State's last point, our report does not state or
assume that differences in software and system architecture
categorically obstruct or preclude information sharing. Instead, we
state that those differences requiring additional measures--such as
building and maintaining unique system interfaces or using manual
workarounds--introduce additional costs and reduce efficiency and
effectiveness. (State's comments are reprinted in app. III.):
:
As agreed with your office, unless you publicly announce its contents
earlier, we plan no further distribution of this report until 15 days
from the date on the report. At that time, we will send copies of the
report to other congressional committees. We will also send copies to
the Directors of the Offices of Homeland Security and Management and
Budget, and the Secretaries of the Departments of Defense, Homeland
Security, Justice, State, Transportation, and the Treasury. Copies will
also be made available at our Web site at www.gao.gov.
Should you or your offices have questions on matters discussed in this
report, please contact me at (202) 512-3439. I can also be reached by
E-mail at hiter@gao.gov. An additional GAO contact and staff
acknowledgments are listed in appendix V.
Randolph C. Hite
Director, Information Technology Architecture and Systems Issues:
Signed by Randolph C. Hite:
[End of section]
Appendixes:
Appendix I: Objectives, Scope, and Methodology:
Our objectives were to identify (1) federal databases and systems that
contain watch lists, the agencies that maintain and use these watch
lists in protecting our nation's borders, and the kinds of data these
watch lists contain; (2) whether federal agencies' sharing of watch
list data is governed by policies and procedures; (3) whether watch
lists are (a) being exchanged among federal agencies and between
federal agencies and state, local, and private organizations and (b)
supported by common system architectures (system hardware, software,
and data characteristics); and (4) whether opportunities exist for
consolidating watch lists.
The scope of our work was based on the federal government's agency
structure before the formation of the Department of Homeland Security.
We focused on the agencies that use or maintain watch lists in
performing border security functions. We identified these departments
and agencies through discussions with federal government officials
knowledgeable about the U.S. border security mission area.
The specific departments and agencies included in our scope were:
* Department of Justice:
* Federal Bureau of Investigation:
* Immigration and Naturalization Service:
* U.S. Marshals Service:
* U.S. National Central Bureau for Interpol:
* Department of State:
* Bureau of Consular Affairs:
* Bureau of Intelligence and Research:
* Department of the Treasury:
* U.S. Customs Service:
* Department of Defense:
* Air Force Office of Special Investigations:
* Department of Transportation:
* Transportation Security Administration.
To address our objectives, we surveyed each of the agencies cited
above, using a data collection instrument. To develop this instrument,
we reviewed, among other things, past GAO and other reports on watch
lists and on the border security process, along with relevant guidance
on such topics as systems interoperability, enterprise architecture
management, database management, and information sharing. We used this
research to develop a series of questions designed to obtain and
aggregate information necessary to answer our objectives. We then
incorporated these questions into the questionnaire (see app. IV for a
copy of the questionnaire). We pretested the questionnaire at two
federal agencies, made adjustments based on the pretest, and then
transmitted it to the agencies cited above on July 29, 2002. Responses
from agencies were received from August 2002 through October 2002. We
did not independently verify agency responses. However, we did contact
agency officials when necessary to clarify their responses.
Next, we compiled the agencies' responses to determine the number of
watch lists being used, confirm the universe of agencies that have
lists, and determine the number of organizations that use the lists and
the kinds of data the lists contain. We also analyzed the agencies'
policies and procedures governing watch list sharing. In addition, we
reviewed the survey responses to determine the degree of sharing among
federal, state, local, and private-sector entities, and we compared the
extent of sharing with the sharing goals contained in the President's
homeland security strategy and the Homeland Security Act of 2002.
Moreover, we aggregated the agencies' descriptions of their watch list
systems architectures and analyzed them to identify similarities and
differences. We also analyzed the architectural components of the watch
list systems and compared them with the standards required for systems
to interoperate and share data efficiently and effectively. Finally, we
analyzed the agencies' responses on watch list consolidation, to
identify whether there were opportunities for consolidating watch lists
and, if so, what the benefits were of doing so.
Additionally, we reviewed the President's homeland security strategy,
homeland security legislation and agency budget requests, and other
public documents to identify federal government efforts related to
maintaining and sharing watch lists. We also attended conferences and
other public events at which Office of Homeland Security officials
spoke on homeland security enterprise architecture and watch list
standardization and consolidation efforts. We attempted to meet with
Office of Homeland Security officials, but they declined to meet with
us. As a result, we submitted written questions to the Office of
Homeland Security, but received no response.
We conducted our work at the headquarters of the nine federal agencies
identified above, in and around the Washington, D.C., metropolitan
area, from July 2002 through March 2003, in accordance with generally
accepted government auditing standards.
[End of section]
Appendix II: Comments from the Department of Justice:
U.S. Department of Justice:
Washington, D.C. 20530:
MAR 27 2003:
Joel C. Willemssen,
Managing Director, Information Technology Issues U.S. General
Accounting Office:
441 G. Street, NW Washington, DC 20548:
Dear Mr. Willemssen:
Thank you for the opportunity to review the final draft of the General
Accounting Office (GAO) report entitled "Information Technology:
Terrorist Watch Lists Should Be Consolidated to Promote Better
Integration and Sharing, GAO-03-322." The draft was reviewed by
representatives of the Department of Justice's (DOJ) Criminal Division,
Federal Bureau of Investigation, Immigration and Naturalization
Service, United States National Central Bureau, United States Marshals
Service, and Justice Management Division. On March 7, 2003 the DOJ
provided you technical comments to be incorporated in the report as
appropriate. This letter constitutes the formal comments of the DOJ,
and I request that it be included in the final report.
The DOJ generally agrees with your recommendations to promote better
integration and sharing of watch lists information. Your report
indicates that a key reason for the varying extent of watch lists
sharing is the cultural differences among the government agencies and
private sector organizations. Further, it concludes that the inability
of all interested federal, state, and local governments (and perhaps
some private sector entities) to access all existing watch lists
information is a systems architecture problem which could be solved
through the eventual integration and consolidation of all systems
containing watch lists information into one system.
In fact it needs to be recognized that in addition to cultural
differences there are national security, civil liberties, and strategic
reasons for not sharing lists and other terrorism data, which may
relate to mere suspects or even persons simply identified as of
interest, to a wide range of government or even private sector entities
with varying missions and "need to know." National Security Information
or classified information within itself complicates the total
consolidation of all watch lists information. There is no discussion of
classified information in your report and the affect it will have on a
consolidation effort due to the protection requirements such as
clearances, "need to know," protection against improper disclosure, and
handling of such data. Such concerns are in addition to and go beyond
any cultural barriers that may exist with respect to watch list
sharing.
Whereas the DOJ agrees that the long term certainly requires the
exploration of potential evolution to a common system architecture,
this may or may not lead to sharing terrorist watch lists, and the DOJ
believes this should not be an impediment to progress of sharing in the
short term. Even though impediments exist and progress has been made as
reflected in your report, the DOJ is committed to finding better and
more efficient ways of sharing information with other federal, state,
and local governments as well as the private industry organizations
that have a "need to know.":
Again, we appreciate the opportunity to comment on this report. If you
have any questions regarding our comments, please contact Vickie Sloan,
Director, Audit Liaison Office at 202-514-0469.
Sincerely,
Paul R. Corts,
Assistant Attorney General for Administration:
Signed by Paul R. Corts:
[End of section]
Appendix III: Comments from the Department of State:
United States Department of State Washington, D. C. 20520:
Dear Ms. Westin:
We appreciate the opportunity to review your draft report, "INFORMATION
TECHNOLOGY: Terrorist Watch Lists Should Be Consolidated to Promote
Better Integration and Sharing," GAO-03-322, GAO Job Code 310228.
The enclosed Department of State comments are provided for
incorporation with this letter as an appendix to the final report.
If you have any questions concerning this response, please contact
Catherine Barry, Bureau of Consular Affairs, at (202) 6 63-1 1-:
Christopher B. Burnham
Assistant Secretary and Chief Financial Officer:
Signed by Christopher B. Burnham:
Enclosure:
As stated.
cc: GAO/IT - Joel Willemssen State/OIG - Luther Atkins State/CA/VO/F -
Mike Regan:
Ms. Susan S. Westin, Managing Director, International Affairs and
Trade, U.S. General Accounting Office.
Unclassified:
Department of State Comments on GAO Draft Report INFORMATION
TECHNOLOGY: Terrorist Watch Lists Should Be Consolidated to Promote
Better Integration and Sharing, (GAO-03-322, GAO Code 310228):
The draft GAO report on terrorist watch list consolidation makes a
number of valuable points concerning the benefits of better
coordination of intelligence sharing and watchlist activities. The
Department of State has long made improved interagency information
sharing a priority and looks forward to working with other USG agencies
to make processes involved more effective and efficient. As this report
points out, advances in enterprise architecture and other shared
standards, increased coordination and, when appropriate, consolidation
of data hold the promise of future improvements.
At the same time, the report does not appear to adequately take into
account the differences in agency missions and needs that have resulted
in various systems being developed and used. The report seems to
advocate a one size fits all approach to watch lists. Cultural
differences exist, to be sure, but there are significant differences in
operating and legal environments that dictate how data is formatted and
used. Separate but linked databases structured so that all users have
access to all appropriate data while still making allowance for
differences in mission and operational focus will likely be more
effective than monolithic resources.
To imply, as the report does, that differences exist solely due to
parochialism on the part of the agencies involved is misleading.
Because each agency has a different mission, and different legal
authorities, each may have a different threshold for acting on
information about a particular individual. A law enforcement agency
will, for example, require more information to arrest someone than a
consular officer will require to deny a visa to the same person. This
will lead to different criteria for an individual to qualify for a
watch list --or a need for a consolidated watch list to contain
different codes for different agencies. Different legal authorities may
also affect what people can be in a watch list --e.g., some agencies
can maintain information on US citizens for their lawful purposes while
others may not be able to do so, given the Privacy Act and other
constraints. The broad range of activities and needs in the law
enforcement and intelligence communities will not disappear with
consolidation of watchlists. The complexities of information sharing
are the result of practical realities that cannot be addressed by
responses that are simply bureaucratic or technological in nature.
In the same vein, the report often makes the assumption that
differences in software or systems architecture necessarily obstruct
information sharing. A case in point is State's Consular Lookout and
Support System (CLASS), which runs in a mainframe environment using
specialized software unique to this system. Nonetheless, a wide range
of data is effectively taken into and shared by CLASS with a variety of
users. The differences in architecture have not prevented information
sharing. Over its 15-year history, TIPOFF (a classified clearinghouse
for terrorist threat information) has developed a number of methods for
sharing data with its multiple users, from CLASS and
INS's NAILS to the Australian and Canadian governments, no matter what
software and systems architecture was used. Development of automated
data sharing will be challenged by security restrictions and the cost
and lack of singular authority to replace agency-specific existing
legacy systems.
The report also suggests that policies and procedures should be
developed to define the rules of sharing information. The Department
agrees and wishes to note that it has been steadily working with other
agencies to create Mutual Agreements of Understanding to govern sharing
of this sensitive information.
Unclassified:
[End of section]
Appendix IV: GAO's Survey Instrument:
[See PDF for image]
[End of figure]
[End of section]
Appendix V: GAO Contact and Staff Acknowledgments:
GAO Contact:
Gary Mountjoy, (202) 512-6367.
Staff Acknowledgments:
In addition to the individual named above, Elizabeth Bernard, Neil
Doherty, Joanne Fiorino, Will Holloway, Tonia Johnson, Anh Le, Kevin
Tarmann, and Angela Watson made key contributions to this report.
(310228):
FOOTNOTES
[1] The nine agencies are the State Department's Bureau of Intelligence
and Research and Bureau of Consular Affairs; the Justice Department's
Federal Bureau of Investigation, Immigration and Naturalization
Service, U.S. Marshals Service, and U.S. National Central Bureau for
Interpol; the Department of Defense's Air Force Office of Special
Investigations; the Transportation Department's Transportation
Security Administration; and the Treasury Department's U.S. Customs
Service. Of these, the Immigration and Naturalization Service, the
Transportation Security Administration, and the U.S. Customs Service
are being incorporated into the new Department of Homeland Security.
[2] Biometrics are records of physical identification marks, such as
fingerprints and iris scans.
[3] An enterprise architecture can be viewed as a blueprint that
describes an entity's operational and technical environments. The
blueprint includes descriptive models of the entity's current and
future business and technical environments, along with a roadmap for
transitioning from the current to the future environment.
[4] P.L. 107-296.
[5] Office of Homeland Security, National Strategy for Homeland
Security (July 2002).
[6] The other critical mission areas are intelligence and warning,
domestic counterterrorism, protecting critical infrastructure,
defending against catastrophic terrorism, and emergency preparedness
and response.
[7] The strategy assigned the Federal Bureau of Investigation the
responsibility for standardizing and consolidating watch lists.
However, according to the bureau, this responsibility was subsequently
assumed by the Office of Homeland Security.
[8] Of these agencies, INS, Customs, and TSA have been incorporated
into DHS.
[9] U.S. General Accounting Office, Border Security: Visa Process
Should Be Strengthened as an Antiterrorism Tool, GAO-03-132NI
(Washington, D.C.: October 2002).
[10] The requirement to screen these individuals is part of the Justice
Department's implementation of the National Security Entry-Exit
Registration System. According to Justice, it implemented the first
phase of the system in October 2002.
[11] Inspectors are also required to check all entering vehicles'
license plates against watch lists.
[12] The President's strategy assigned the responsibility for
developing an enterprise architecture to the Critical Infrastructure
Assurance Office, which was part of the Commerce Department but is now
being incorporated into the new Department of Homeland Security.
However, according to the Critical Infrastructure Assurance Office,
this responsibility for developing homeland security enterprise
architectures was subsequently assumed by the Office of Homeland
Security.
[13] The President's strategy assigned the FBI the responsibility for
standardizing and consolidating watch lists. However, according to the
FBI, this responsibility has been transferred to the Office of Homeland
Security.
[14] For example, see Office of Management and Budget, Management of
Federal Information Resources, Circular No. A-130 (Washington, D.C.:
November 2000) and U.S. General Accounting Office, Executive Guide:
Improving Mission Performance through Strategic Information Management
and Technology: Learning from Leading Organizations, GAO/AIMD-94-115
(Washington, D.C.: May 1994).
[15] In short, metadata are "data about data." That is, they are
definitional data that describe the context, quality, condition, or
characteristics of the specific data elements in a set of data or a
database.
[16] P.L. 107-296, section 202.
[17] P.L. 107-56.
[18] P.L. 107-173.
[19] GAO-02-1122T.
[20] For example, see U.S. General Accounting Office, National
Preparedness: Integrating New and Existing Technology and Information
Sharing into an Effective Homeland Security Strategy, GAO-02-811T
(Washington, D.C.: June 2002).
[21] P. L. 107-56.
[22] P. L. 107-173.
[23] P. L. 107-296.
[24] An operating system is the program that manages all the other
programs (called applications) in a computer.
[25] An application is a program that is designed to perform a specific
function for the user or another program.
[26] Open system standards are standards, such as the ISO Open Systems
Interconnection model that, when followed, result in a computer system
that can incorporate all devices that use the same communications
facilities and protocols, regardless of make or model.
[27] The International Organization for Standardization is an
international association of member countries, each of which is
represented by its leading standard-setting organization--for example,
ANSI (American National Standards Institute) for the United States.
[28] An interface is the point at which a connection is made between
two elements, such as systems, so that they can work with one another.
[29] The President's July 2002 homeland security strategy assigns
responsibility to the Critical Infrastructure Assurance Office (in the
Commerce Department) for developing the enterprise architecture for
data sharing and to the FBI for consolidating watch lists. Officials at
these two agencies told us that their respective responsibilities were
subsequently assumed by the Office of Homeland Security.
GAO's Mission:
The General Accounting Office, the investigative arm of Congress,
exists to support Congress in meeting its constitutional
responsibilities and to help improve the performance and accountability
of the federal government for the American people. GAO examines the use
of public funds; evaluates federal programs and policies; and provides
analyses, recommendations, and other assistance to help Congress make
informed oversight, policy, and funding decisions. GAO's commitment to
good government is reflected in its core values of accountability,
integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through the Internet. GAO's Web site ( www.gao.gov ) contains
abstracts and full-text files of current reports and testimony and an
expanding archive of older products. The Web site features a search
engine to help you locate documents using key words and phrases. You
can print these documents in their entirety, including charts and other
graphics.
Each day, GAO issues a list of newly released reports, testimony, and
correspondence. GAO posts this list, known as "Today's Reports," on its
Web site daily. The list contains links to the full-text document
files. To have GAO e-mail this list to you every afternoon, go to
www.gao.gov and select "Subscribe to daily E-mail alert for newly
released products" under the GAO Reports heading.
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. General Accounting Office
441 G Street NW,
Room LM Washington,
D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470:
Public Affairs:
Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S.
General Accounting Office, 441 G Street NW, Room 7149 Washington, D.C.
20548: