Bioterrorism

Information Technology Strategy Could Strengthen Federal Agencies' Abilities to Respond to Public Health Emergencies Gao ID: GAO-03-139 May 30, 2003

The October 2001 anthrax attacks, the recent outbreak of the virulent Severe Acute Respiratory Syndrome (SARS), and increased awareness that terrorist groups may be capable of releasing life-threatening biological agents have prompted efforts to improve our nation's preparedness for, and response to, public health emergencies--including bioterrorism. GAO was asked, among other things, to identify federal agencies information technology (IT) initiatives to support our nation's readiness to deal with bioterrorism. Specifically, we compiled an inventory of such activities, determined the range of these coordination activities with other agencies, and identified the use of health care standards in these efforts.

The six key federal agencies involved in bioterrorism preparedness and response identified about 70 planned and operational information systems in several IT categories associated with supporting a public health emergency. These encompass detection (systems that collect and identify potential biological agents from environmental samples), surveillance (systems that facilitate ongoing data collection, analysis, and interpretation of disease-related data), communications (systems that facilitate the secure and timely delivery of information to the relevant responders and decision makers), and supporting technologies (tools or systems that provide information for the other categories of systems). For example, the Centers for Disease Control and Prevention (CDC) is currently implementing its Health Alert Network, an early warning and response system intended to provide federal, state, and local agencies with better communications during public health emergencies, and the Department of Defense is using its Electronic Surveillance System for the Early Notification of Community-based Epidemics to support early identification of infectious disease outbreaks in the military by comparing analyses of data collected daily with historical trends. The extent of coordination or interaction of these systems among agencies covered a wide range--from an absence of coordination, to awareness among the agencies with no formal coordination, to formal coordination, to joint development of initiatives. IT can more effectively facilitate emergency response if standards are developed and implemented that allow systems to be interoperable. The need for common, agreed-upon standards is widely acknowledged in the health community, and activities to strengthen and increase the use of applicable standards are ongoing. For example, CDC has defined a public health information architecture, which identifies data, communication, and security standards needed to ensure the interoperability of related systems. Despite these ongoing efforts to address IT standards, many issues remain to be worked out, including coordinating the various standards-setting initiatives and monitoring the implementation of standards for health care delivery and public health. An underlying challenge for establishing and implementing such standards is the lack of an overall strategy guiding IT development and initiatives. Without such a strategy to address the development and implementation of standards, agencies may not be well positioned to take advantage of IT that could facilitate better preparation for and response to public health emergencies--including bioterrorism.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-03-139, Bioterrorism: Information Technology Strategy Could Strengthen Federal Agencies' Abilities to Respond to Public Health Emergencies This is the accessible text file for GAO report number GAO-03-139 entitled 'Bioterrorism: Information Technology Strategy Could Strengthen Federal Agencies' Abilities to Respond to Public Health Emergencies' which was released on June 30, 2003. This text file was formatted by the U.S. General Accounting Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Requesters: United States General Accounting Office: GAO: May 2003: Bioterrorism: Information Technology Strategy Could Strengthen Federal Agencies' Abilities to Respond to Public Health Emergencies: Federal Bioterrorism IT: GAO-03-139: GAO Highlights: Highlights of GAO-03-139, a report to Congressional Requesters Why GAO Did This Study: The October 2001 anthrax attacks, the recent outbreak of the virulent Severe Acute Respiratory Syndrome (SARS), and increased awareness that terrorist groups may be capable of releasing life-threatening biological agents have prompted efforts to improve our nation‘s preparedness for, and response to, public health emergencies”including bioterrorism. GAO was asked, among other things, to identify federal agencies‘ information technology (IT) initiatives to support our nation‘s readiness to deal with bioterrorism. Specifically, we compiled an inventory of such activities, determined the range of these coordination activities with other agencies, and identified the use of health care standards in these efforts. What GAO Found: The six key federal agencies involved in bioterrorism preparedness and response identified about 70 planned and operational information systems in several IT categories associated with supporting a public health emergency. These encompass detection (systems that collect and identify potential biological agents from environmental samples), surveillance (systems that facilitate ongoing data collection, analysis, and interpretation of disease-related data), communications (systems that facilitate the secure and timely delivery of information to the relevant responders and decision makers), and supporting technologies (tools or systems that provide information for the other categories of systems)”see table below. For example, the Centers for Disease Control and Prevention (CDC) is currently implementing its Health Alert Network, an early warning and response system intended to provide federal, state, and local agencies with better communications during public health emergencies, and the Department of Defense is using its Electronic Surveillance System for the Early Notification of Community-based Epidemics to support early identification of infectious disease outbreaks in the military by comparing analyses of data collected daily with historical trends. The extent of coordination or interaction of these systems among agencies covered a wide range”from an absence of coordination, to awareness among the agencies with no formal coordination, to formal coordination, to joint development of initiatives. Summary of the Systems Inventory by Agency: [See PDF for image] Source: GAO. [End of table] IT can more effectively facilitate emergency response if standards are developed and implemented that allow systems to be interoperable. The need for common, agreed-upon standards is widely acknowledged in the health community, and activities to strengthen and increase the use of applicable standards are ongoing. For example, CDC has defined a public health information architecture, which identifies data, communication, and security standards needed to ensure the interoperability of related systems. Despite these ongoing efforts to address IT standards, many issues remain to be worked out, including coordinating the various standards-setting initiatives and monitoring the implementation of standards for health care delivery and public health. An underlying challenge for establishing and implementing such standards is the lack of an overall strategy guiding IT development and initiatives. Without such a strategy to address the development and implementation of standards, agencies may not be well positioned to take advantage of IT that could facilitate better preparation for and response to public health emergencies”including bioterrorism. What GAO Recommends: In order to enhance American preparedness for public health emergencies”especially those involving bioterrorism”GAO recommends that the Secretary of Health and Human Services (HHS), in coordination with other key stakeholders, develop a strategy that includes setting priorities for IT initiatives and coordinating the development of IT standards for the health care industry. In commenting on a draft of this report, agencies concurred with our results but did not comment on the recommendations. Technical comments were incorporated as appropriate. www.gao.gov/cgi-bin/getrpt?GAO-03-139. To view the full report, including the scope and methodology, click on the link above. For more information, contact David A. Powner at (202) 512-9286 or pownerd@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: About 70 Bioterrorism-Related Information Technology Activities Identified at Six Federal Agencies: Health Care Sector Making Progress on Defining Standards, but Implementation Challenges Remain for Effective Information Sharing: Emerging Information Technologies Could Enhance Agencies' Abilities to Prepare for and Respond to Public Health Emergencies: Conclusions: Recommendations: Agency Comments and Our Evaluation: Appendix I: Objectives, Scope, and Methodology: Appendix II: CDC Biological Diseases/Agents List: Appendix III: Categories of Information Technology for Bioterrorism- Related Systems: Detection: Surveillance: Diagnostic and Clinical Management: Communications: Supporting Technology: Other Clinical Systems: Appendix IV: Department of Agriculture's Systems Inventory: Appendix V: Department of Defense's Systems Inventory: Appendix VI: Department of Energy's Systems Inventory: Appendix VII: Department of Health and Human Services' Systems Inventory: Appendix VIII: Department of Veterans Affairs' Systems Inventory: Appendix IX: Environmental Protection Agency's Systems Inventory: Appendix X: Federal Agencies' Information Technology Initiatives: Appendix XI: List of Selected Health Care Standards: Appendix XII: Comments from the Department of Defense: Appendix XIII: Comments from the Department of Energy: Appendix XIV: Comments from the Department of Health and Human Services: Appendix XV: Comments from the Department of Veterans Affairs: Appendix XVI: GAO Contacts and Acknowledgments: GAO Contacts: Acknowledgments: Tables: Table 1: Summary of the Systems Inventory by Agency: Table 2: Summary of Detection Systems by Agency: Table 3: Summary of Surveillance Systems by Agency: Table 4: Summary of Communications Systems by Agency: Table 5: Summary of Supporting Technologies by Agency: Figures: Figure 1: Local, State, and Federal Agencies Involved in Response to the Release of a Biological Agent: Figure 2: IT Needs during a Public Health Emergency: Abbreviations: AHRQ: Agency for Healthcare Research and Quality: BASIS: Biological Aerosol Sentry and Information System: CDC: Centers for Disease Control and Prevention: DHS: Department of Homeland Security: DOD: Department of Defense: DOE: Department of Energy: EPA: Environmental Protection Agency: ESSENCE: Electronic Surveillance System for Early Notification of Community-based Epidemics: FDA: Food and Drug Administration: HAN: Health Alert Network: HHS: Department of Health and Human Services: HIPAA: Health Insurance Portability and Accountability Act of 1996: IOM: Institute of Medicine: IT: information technology: NCVHS: National Committee on Vital and Health Statistics: NEDSS: National Electronic Disease Surveillance System: NHII: National Health Information Infrastructure: SARS: Severe Acute Respiratory Syndrome: USDA: United States Department of Agriculture: VA: Department of Veterans Affairs: WHO: World Health Organization: United States General Accounting Office: Washington, DC 20548: May 30, 2003: Congressional Requesters: The October 2001 anthrax attacks highlighted long-standing weaknesses in the current public health infrastructure[Footnote 1] and prompted efforts to improve our nation's preparedness for and response to public health emergencies, including bioterrorism.[Footnote 2] More recent events have further heightened awareness of and anxiety related to the consequences of potential bioterrorism or other public health emergencies. For example, on March 15, 2003, the World Health Organization issued an emergency travel advisory due to an unknown form of pneumonia now known as Severe Acute Respiratory Syndrome (SARS). Originating in China, it has infected over 7,900 people and caused at least 662 deaths worldwide--with 67 probable cases reported in the United States as of May 20, 2003. Further, terrorist organizations, such as al Qaeda, may be capable of releasing life-threatening biological agents through covert or overt attacks. These events and possibilities illustrate not only the increased chances that harmful biological agents could be intentionally released into the environment, but also the rapid and widespread effects of naturally occurring infectious diseases. Many of the activities under way to prepare for and respond to public health emergencies--including bioterrorism--are supported by information technology (IT), which can better enable public health agencies to identify naturally occurring or intentionally caused disease outbreaks and can support communications related to public health. Recent events, such as those mentioned, have led to increased action and funding for undertakings related to bioterrorism throughout the federal government. In these undertakings, it is important that the IT responsibilities and activities of federal public health entities be well planned and coordinated to effectively address the response to bioterrorism, reducing the risk of duplicating efforts and creating incompatible systems. You asked us to review federal agencies' IT efforts to support bioterrorism preparedness and response. Specifically, our objectives were to: * compile an inventory of federal agencies' current and planned IT systems and initiatives related to bioterrorism, and to identify the range of coordination activities; * identify and describe the development and use of health care IT standards for bioterrorism-related systems; and: * review the potential use of emerging information technologies to support bioterrorism preparedness and response. We focused our review on six key federal agencies that are responsible for supporting the response to bioterrorism and other public health emergencies using IT: the Department of Agriculture (USDA), the Department of Defense (DOD), the Department of Energy (DOE), the Department of Health and Human Services (HHS), the Department of Veterans Affairs (VA), and the Environmental Protection Agency (EPA). Further details about our objectives, scope, and methodology are provided in appendix I. We performed our work at USDA, DOD, HHS, VA, and EPA offices in Washington, DC; the Centers for Disease Control and Prevention (CDC) in Atlanta, GA; DeKalb County Board of Health in Decatur, GA; Lawrence Livermore and Sandia National Laboratories in Livermore, CA; Sandia National Laboratory in Albuquerque, NM; Los Alamos National Laboratory in Los Alamos, NM; Denver County Department of Health in Denver, CO; and Monroe County Department of Health in Rochester, NY, from June 2002 through March 2003, in accordance with generally accepted government auditing standards. Results in Brief: The six key federal agencies involved in bioterrorism preparedness and response have a large number of existing and planned bioterrorism- related information systems. Specifically, these agencies identified 72 information systems and supporting technologies, as well as 12 other IT initiatives. Of the 72 systems, 34 are surveillance systems, 18 are supporting technologies, 10 are communications systems, and 10 are detection systems.[Footnote 3] For example, CDC is currently implementing its Health Alert Network, an early warning and response system intended to provide federal, state, and local agencies with better communications during public health emergencies. DOD is using its Electronic Surveillance System for the Early Notification of Community-based Epidemics to support early identification of infectious disease outbreaks in the military by comparing analyses of data collected daily with historical trends. In planning or operating each of these information systems and IT initiatives, the extent of coordination or interaction between the lead agency and other related government agencies covered a wide range. Such coordination ranged from an absence of contact with other agencies, to awareness among the agencies, to formal coordination, to joint development of initiatives. For example, about 30 percent of the systems and initiatives are formally coordinated or jointly developed with other agencies. The identification and implementation of health care data, communications, and security standards--which are necessary to support the compatibility and interoperability of agencies' various IT systems- -remain incomplete across the health care sector. However, efforts in the federal government are under way to strengthen and increase the use of applicable standards throughout the nation's health information infrastructure. For example, CDC has defined a public health information architecture, which identifies public health data, communications, and security standards that are needed to ensure the interoperability of related systems. At the same time, this architecture is still evolving, and many issues--such as coordination of the various efforts to ensure consensus on standards, establishment of milestones, and implementation mechanisms--remain to be worked out. Consequently, federal agencies and others associated with the public health infrastructure cannot ensure their systems' abilities to exchange data with other systems when needed and cannot ensure effective preparation for and response to bioterrorism and other public health emergencies. For example, according to CDC officials, one of the IT challenges encountered by public health officials responding to the anthrax events of October 2001 was the issue of exchanging data between the many participants involved in the response--clinical sites, local health departments, emergency responders, state health departments, public health laboratories, and federal agencies. During this event, participants accumulated dissimilar data and principally exchanged it manually. An underlying challenge for establishing and implementing standards is that no overall strategy guides IT development and initiatives. The use of emerging information technologies to support the public health infrastructure could help to improve federal agencies' abilities to prepare for and respond to public health emergencies. Agencies have taken steps to adopt such emerging technologies. For example, Los Alamos National Laboratory is working on a Web-based system called the Forensics Internet Research Exchange, which supports the sharing of biothreat information among research and government agencies and uses public networks to securely transport private intra-agency and interagency information. However, barriers exist, such as the lack of a mechanism for identifying and prioritizing appropriate emerging information technologies for their transition into the public health community. We are making recommendations to the Secretary of Health and Human Services, in coordination with other key stakeholders, to develop a strategy for public health preparedness and response that includes setting priorities for IT initiatives and coordinating the development of IT standards for the heath care industry. We received written comments on a draft of this report from the Deputy Assistant Secretary of Defense for Chemical/Biological Defense at DOD, the Acting Associate Administrator for Management and Administration at DOE, the Acting Principal Deputy Inspector General at HHS, and the Secretary of Veterans Affairs. These four agencies generally concurred with our results but did not comment specifically on the recommendations. Technical comments were incorporated in this report as appropriate. USDA and EPA officials provided oral comments, which were also technical in nature and have been incorporated as appropriate. While DHS was not included as one of the agencies in our review because it did not exist until the end of this engagement, we provided DHS officials with the opportunity to comment on the draft of this report, which they declined. In their comments, HHS officials stated that the focus of this report on IT overemphasized its role and does not address other components of the public health infrastructure and may simplify a complex issue. As we describe in the background section of this report, IT is a tool that enables personnel to fulfill their mission. We recognize that there are other important issues about the public health infrastructure that merit attention, such as workforce capacity and training, capacity of the public health laboratories, and variation in state public health laws, among others. Background: Harmful biological agents can be released by way of the air, food, water, or insects. Their release may not be recognized for several days, during which time a communicable disease--such as smallpox--can spread to others who were not initially exposed. Some biological agents--such as anthrax and plague--produce symptoms that can easily be confused with influenza or other, less virulent illnesses, leading to a delay in diagnosis or identification. For example, the recent outbreak of the new infectious disease, SARS, whose onset includes common symptoms such as high fever, coughing, and difficulty in breathing, was not recognized until about 4 months after the first known case. Initial response to a public health emergency, including an act of bioterrorism, is generally a local responsibility that could involve multiple jurisdictions in a region, with states providing additional support when needed. Since clinicians at the local level are most likely to be the first ones to detect an incident, they and local public health officials are expected to report incidents or symptoms of suspicious illness to the state health department and other designated parties. States can provide supporting personnel, financial resources, laboratory capacity, and other assistance to local responders. Because of the many participants involved, the identification and management of bioterrorism and other public health emergencies call for effective communication and collaboration across all levels of government and the private sector. Figure 1 presents the probable series of responses to the release of a biological agent by the various players.[Footnote 4] Figure 1: Local, State, and Federal Agencies Involved in Response to the Release of a Biological Agent: [See PDF for image] [A] Health care providers can also contact state entities directly. [B] Federal departments and agencies can also respond directly to local and state entities. [C] The Strategic National Stockpile, formerly the National Pharmaceutical Stockpile, is a repository of pharmaceuticals, antidotes, and medical supplies that can be delivered to the site of a biological (or other) attack. [End of figure] Prior to the anthrax incidents in October 2001, a number of threats and hoaxes involving biological agents, and at least one successful bioterrorist act, had occurred domestically.[Footnote 5] Since that time, health care and public health officials at the federal, state, tribal, local, and international levels, as well as the private sector- -part of a complex network of people, systems, and organizations--have examined their readiness to respond to acts of bioterrorism and have found weaknesses. Among others, these weaknesses include (1) vulnerable and outdated health information systems and technologies, (2) lack of real-time surveillance and epidemiological systems, (3) ineffective and fragmented communications networks, (4) incomplete domestic preparedness and emergency response capability, and (5) communities without access to essential public health services.[Footnote 6] These reported deficiencies at local, state, and federal levels may hinder the effective detection and identification of a potentially harmful biological agent. The broad scope of bioterrorism activities brings together different professional communities with very diverse areas of expertise--the public health and medical community, the scientific community, and the intelligence and law enforcement community. The public health and medical community--consisting of public health officials, clinicians, traditional first responders, and veterinary and agricultural communities--is responsible for protecting the health of people, animals, and agricultural products. The scientific community-- consisting of human, microbial, animal, plant, and environmental researchers, among others--characterizes, develops detection systems for, and creates vaccines and treatments for diseases caused by biological agents. The intelligence and law enforcement community-- consisting of intelligence analysts, law enforcement officers, diplomatic officials, and military officers--monitor and deter terrorist movement and activity.[Footnote 7] In addition, other professions, such as drug store pharmacists and school administrators, are being identified as new players in bioterrorism preparedness and response. Public health and private laboratories are another vital part of the surveillance network because only laboratory results can definitively identify pathogens.[Footnote 8] Every state has at least one public health laboratory to support its disease surveillance activities and other public health programs. State laboratories conduct testing for routine surveillance or as part of special clinical or epidemiological studies. Independent commercial and hospital laboratories may also share with public health agencies information they have gathered through their private surveillance efforts, such as studies of patterns of antibiotic resistance or of the spread of diseases within a hospital. In addition, commercial and hospital laboratories may be required by state law or regulation to report certain findings for public health surveillance. Federal agencies have key responsibilities for bioterrorism preparedness and response. HHS has primary responsibility for coordinating the nation's response to public health emergencies, including bioterrorism. HHS divisions responsible for bioterrorism preparedness and response, and their primary responsibilities include: * The Office of the Assistant Secretary for Public Health Emergency Preparedness coordinates the department's work to oversee and protect public health, including cooperative agreements with states and local governments. States and local governments can apply for funding to upgrade public health infrastructure and health care systems to better prepare for and respond to bioterrorism and other public health emergencies. On May 9, 2003, HHS announced that guidelines have been released for the use of $1.4 billion allocated for bioterrorism cooperative agreements. It maintains a recently built command center, where it can coordinate the response to public health emergencies from one centralized location. This center is equipped with satellite teleconferencing capacity, broadband Internet hookups, and analysis and tracking software. * CDC has primary responsibility for nationwide disease surveillance for specific biological agents, and it also provides an array of scientific and financial support for state infectious disease surveillance, prevention, and control. For example, CDC administers cooperative agreements for public health preparedness totaling $870 million for fiscal year 2003. CDC has been addressing bioterrorism preparedness and response explicitly since 1998. In April 2003, CDC opened a new emergency operations center to organize and manage all emergency operations at CDC, allowing for immediate communication between CDC, HHS, DHS, as well as federal intelligence and emergency response officials, and state and local public health officials. CDC also provides testing services and consultation that are not available at the state level; training on infectious diseases and laboratory topics, such as testing methods and outbreak investigations; and grants to help states conduct disease surveillance. In addition, CDC provides state and local health departments with a wide range of technical, financial, and staff resources to help maintain or improve their ability to detect and respond to disease threats. CDC laboratories provide highly specialized tests that are not always available in state public health or commercial laboratories, and they assist states with testing during outbreaks. These laboratories help diagnose life-threatening, unusual, or exotic infectious diseases, including those that may be caused by bioterrorist attacks, such as smallpox. CDC also conducts research to develop improved diagnostic methods, and it trains laboratory staff to use them. * The Agency for Healthcare Research and Quality (AHRQ) is responsible for supporting research designed to improve the outcomes and quality of health care, reduce its costs, address safety and medical errors, and broaden access to effective services, including anti-bioterrorism research. AHRQ has initiated several major projects and activities designed to assess and enhance the linkages between the clinical care delivery system and the public health infrastructure. AHRQ-supported research focuses on emergency preparedness of hospitals and health care systems for bioterrorism and other public health events; technologies and methods to improve the linkages between the personal health care system, emergency response networks, and public health agencies; and training and information needed to prepare clinicians to recognize the symptoms of bioterrorist agents and manage patients appropriately. * The Food and Drug Administration (FDA) is responsible for safeguarding the food supply, ensuring that new vaccines and drugs are safe and effective, and conducting research on diagnostic tools and treatment of disease outbreaks. It is increasing its food safety responsibilities by improving its laboratory preparedness and food monitoring inspections in accordance with the Public Health Security and Bioterrorism Preparedness and Response Act of 2002. * The National Institutes of Health (NIH) is responsible for conducting medical research in its own laboratories and for supporting the research of nonfederal scientists in universities, medical schools, hospitals, and research institutions throughout the United States and abroad. Its National Institute of Allergy and Infectious Diseases has a program to support research related to organisms that are likely to be used as biological weapons. NIH is planning to implement a strategic plan for research on CDC's category A, B, and C biological agents.[Footnote 9] A complete list of these agents is included in appendix II. * The Health Resources Services Administration (HRSA) is responsible for improving the nation's health by ensuring equal access to comprehensive, culturally competent, quality health care. Its Bioterrorism Hospital Preparedness program administers cooperative agreements, totaling $498 million, to state and local governments to support hospitals' efforts toward bioterrorism preparedness and response. Besides HHS, other federal departments and agencies are involved in bioterrorism preparedness and response efforts, including the following: * DOD, while primarily responsible for the health and protection of its service members on the battlefield, conducts research on bioterrorism preparedness and response through agencies such as the Defense Advanced Research Projects Agency. This research supports force protection and is shared with other agencies when it may benefit the civilian population. It also has civil support responsibilities through the Joint Task Force for Civil Support, the National Guard, and the Army. * DOE's national laboratories are developing new capabilities for countering chemical and biological threats, including biological detection, modeling, and prediction. * EPA is responsible for protecting the nation's water supply from terrorist attack. In January 2003, it established a new homeland security research center. The center is assessing threat management for the water supply and environmental detectors for potential use in protecting the water supply. * USDA has become involved in bioterrorism preparedness and response because of the increasing realization that the food supply may become a vehicle for a biological attack. Biological attacks on the health of animals and plants are important because animals and plants can spread diseases and toxins that may be harmful to humans. * VA manages one of the nation's largest health care systems and is the nation's largest drug purchaser. The department purchases pharmaceuticals and medical supplies for the Strategic National Stockpile and the National Medical Response Team stockpile. The Department of Veterans Affairs Emergency Preparedness Act of 2002[Footnote 10] recently directed VA to establish at least four medical emergency preparedness centers to (1) carry out research and develop methods of detection, diagnosis, prevention, and treatment for biological and other public health and safety threats; (2) provide education, training, and advice to health care professionals inside and outside VA; and (3) provide laboratory and other assistance to local health care authorities in the event of a national emergency. At least one of VA's new centers is to focus on biological threats. On June 12, 2002, Congress passed the Public Health Security and Bioterrorism Preparedness and Response Act of 2002.[Footnote 11] The legislation requires specific activities related to bioterrorism preparedness and response. For example, it calls for steps to improve the nation's preparedness for bioterrorism and other public health emergencies by increasing coordination and planning for such events; developing priority countermeasures, such as the Strategic National Stockpile; and improving state, local, and hospital preparedness for and response to bioterrorism and other public health emergencies. It also requires HHS and USDA to enhance controls on dangerous biological agents and toxins to protect the safety of food, drugs, and drinking water. On November 25, 2002, Congress enacted legislation creating the new Department of Homeland Security (DHS).[Footnote 12] Consolidating the functions of 22 federal agencies, DHS's primary missions include (1) preventing terrorist attacks in the United States, (2) reducing America's vulnerability to terrorism, and (3) minimizing the damage from potential attacks and natural disasters. DHS was established on January 24, 2003; most of the agencies were transferred effective March 1, 2003. According to DHS, the Secretary has until January 2004 to bring all 22 agencies into the new organization. The new department is responsible for assisting all levels of government in meeting their responsibilities in domestic emergencies and other challenges--especially in dealing with incidents that are chemical or biological in nature--through planning, mitigation, preparedness, response, and recovery activities. DHS is to develop and deploy countermeasures to current and emerging terrorist threats. In conjunction with HHS, it is to coordinate the nation's preparedness and response to bioterrorism. Two of DHS's five divisions are to address preparedness and response to bioterrorism. The Emergency Preparedness and Response Division's mission includes assisting all levels of government, and others, in responding to domestic emergencies; the Science and Technology program's mission includes developing and deploying countermeasures to current and emerging terrorist threats, including bioterrorism. For fiscal year 2004, the President's budget requested $365 million to develop and implement integrated systems to reduce the probability and consequences of a biological attack on the nation's civilian population and agricultural system. DHS has inherited programs from other departments that have a bioterrorism role, such as USDA's Agricultural Research Service and Animal and Plant Health Inspection Service. We have designated the implementation and transformation of DHS as high risk and have added it to our 2003 high risk list. This designation is based on three factors. First, the implementation and transformation of DHS is an enormous undertaking that will take time to achieve in an effective and efficient manner. Second, DHS's prospective components already face a wide array of existing management and operational challenges. Finally, failure to effectively carry out DHS's mission would expose the nation to potentially very serious consequences.[Footnote 13] Role of Information Technology for Bioterrorism Preparedness and Response: IT can play an essential role in supporting federal, state, local, and tribal governments in bioterrorism readiness efforts. Development of IT builds upon the existing systems capabilities of local and state public health agencies, not only to provide routine public health functions but also to support public health emergencies, including bioterrorism. For public health emergencies in particular, the ability to quickly exchange data from provider to public health agency--or from provider to provider--is crucial in detecting and responding to naturally occurring or intentional disease outbreaks. It allows physicians to share individually identifiable information with public health agencies for use in performing public health activities. In March 2001, CDC's Public Health's Infrastructure: A Status Report acknowledged several IT limitations in the public health infrastructure. For example, basic capability for disease surveillance systems to detect and analyze disease outbreaks is lacking for several reasons. First, health care providers have traditionally used paper-or telephone-based systems to report disease outbreaks to approximately 3,000 public health agencies. This is a labor-intensive, burdensome process for local health care providers and public health officials, often resulting in incomplete and untimely data. Second, not all public health agencies have access to the Internet or to secure channels for electronically transmitting sensitive data. Several categories of IT can play vital roles during the course of an event. These categories are described in a technology assessment for AHRQ that was completed by the University of California San Francisco- Stanford Evidence-based Practice Center.[Footnote 14] These categories of IT serve different but related functions and include the following: * Detection--systems that consist of devices for the collection and identification of potential biological agents from environmental samples, which make use of IT to record and send data to a network. * Surveillance--systems that facilitate the performance of ongoing collection, analysis, and interpretation of disease-related data to plan, implement, and evaluate public health actions. * Diagnostic and clinical management--systems with potential utility for enhancing the likelihood that clinicians will consider the possibility of bioterrorism-related illness. These systems are generally designed to assist clinicians in developing a differential diagnosis for a patient who has an unusual clinical presentation. * Communications--systems that facilitate the secure and timely delivery of information to the relevant responders and decision makers so that appropriate action can be taken. * Supporting technologies--tools or systems that provide information for the other categories of systems (e.g., detection, surveillance, etc.).[Footnote 15] Recognizing the importance of IT to strengthening the public health infrastructure, RAND's Science and Technology Policy Institute held a series of workshops between November 2001 and April 2002. The workshops brought together a diverse set of stakeholders to begin the process of developing an IT infrastructure that could support bioterrorism preparedness efforts across the country.[Footnote 16] During these workshops, consensus was reached on the need for an overarching IT infrastructure to prepare for and respond to bioterrorism and other public health emergencies. RAND described the different phases of a bioterrorism event and the intensity of need for IT during each phase, and it proposed that a bioterrorism event could consist of the following phases: * Prevention and preparedness--includes reducing the possibility of a biological event by methods such as developing vaccines, conducting desktop exercises, and heightening alert status. * Event recognition--includes monitoring and detecting the release of a biological agent or identifying the first case of an illness, by methods such as using detection devices and surveillance systems and diagnosing the first case of smallpox. * Early and sustained response--includes initiating the response to the initial event and then continuing the measures required to address the longer-term impact of the exposure, such as deploying resources to contain a biological agent, identifying the source, replenishing medical supplies, ensuring surge capacity for the treatment of victims, and monitoring exposed individuals. * Recovery--includes recovering after the biological threat is under control, by measures such as providing mental health support, restocking vaccine and drug reserves, and identifying lessons learned to improve future responses. According to RAND, during the course of a bioterrorism event, IT should be capable of addressing all phases of the event. Because of the dynamic and unpredictable nature of public health emergencies, various types of IT are needed during the course of an event. These systems and the intensity of their need for IT may vary from event to event, depending on the circumstances. In addition, IT components that are required for one phase may also be critical for other phases, but the intensity of need for them may vary. These needs include consideration of the phase being supported, required capabilities for each phase, and the data required at various points in time. Figure 2 illustrates the probable intensity of need for each category of IT across the different phases. Figure 2: IT Needs during a Public Health Emergency: [See PDF for image] [End of figure] About 70 Bioterrorism-Related Information Technology Activities Identified at Six Federal Agencies: The six key federal agencies involved in bioterrorism preparedness and response have a large number of existing and planned bioterrorism- related information systems. Specifically, these agencies identified 72 information systems and supporting technologies, as well as 12 other IT initiatives. Of the 72 information systems, 34 are surveillance systems, 18 are supporting technologies, 10 are communications systems, and 10 are detection systems. Additionally, in planning or operating each of these systems and IT initiatives, the extent of coordination or interaction performed by the lead agency with other related government agencies covered a wide range of activity. Coordination varied by system and IT initiative, ranging from absence of coordination, to awareness without coordination, to formal coordination, to joint development of initiatives. For example, about 30 percent of the information systems and IT initiatives are being either formally coordinated or jointly developed with another agency. Bioterrorism-Related Systems and Initiatives Identified at Six Federal Agencies: The six federal agencies with key roles in bioterrorism preparedness and response identified 72 existing or planned information systems and supporting technologies, as well as 12 other IT initiatives.[Footnote 17] About 74 percent of these systems and IT initiatives are currently operational. The estimated costs reported for these systems exceed $63 million for fiscal year 2003.[Footnote 18] Of the 72 information systems identified, 34 are surveillance systems, 18 are supporting technologies, 10 are communications systems, and 10 are detection systems. Of the 12 IT initiatives, HHS identified 4, DOD and DOE identified 3 each, and USDA identified 2. Table 1 summarizes the number of systems by agency and IT category. Table 1: Summary of the Systems Inventory by Agency: IT categories: Detection; HHS: 0; DOD: 4[B]; DOE: 6; USDA: 0; EPA: 0; VA: 0; Total: 10. IT categories: Surveillance; HHS: 18[A]; DOD: 7; DOE: 2[A]; USDA: 6; EPA: 0; VA: 1; Total: 34. IT categories: Diagnostic and clinical management; HHS: 0; DOD: 0; DOE: 0; USDA: 0; EPA: 0; VA: 0; Total: 0. IT categories: Communications; HHS: 5; DOD: 2; DOE: 0; USDA: 3; EPA: 0; VA: 0; Total: 10. IT categories: Supporting technology; HHS: 5; DOD: 1; DOE: 6; USDA: 1; EPA: 5; VA: 0; Total: 18. IT categories: Total; HHS: 28; DOD: 14; DOE: 14; USDA: 10; EPA: 5; VA: 1; Total: 72. Source: GAO. [A] Includes integrated surveillance/communications systems. [B] Includes an integrated detection/communication system. [End of table] Agencies identified a variety of information systems and IT initiatives, such as the following: * HHS's 28 systems are largely in operation and are used for surveillance of diseases and illnesses, as well as for communications. As the lead federal agency for protecting the health and safety of the public, CDC is responsible for most of the systems included in the HHS inventory. For example, CDC is currently implementing the Health Alert Network (HAN), an early warning and response system that is intended to provide federal, state, and local health agencies with better communications during public health emergencies; additional details are provided in appendix III. * DOD, while primarily responsible for the health of its service members on the battlefield, conducts research on bioterrorism preparedness and response for force protection and shares that research with other agencies when it may benefit the civilian population. Because of the broad nature of DOD's responsibilities, it identified 14 systems in all categories. One example of a DOD System is the Electronic Surveillance System for the Early Notification of Community- based Epidemics (ESSENCE), which supports early identification of infectious disease outbreaks in the military by comparing analyses of data collected daily with historical trends; additional details are provided in appendix III. * DOE--specifically its national laboratories--has identified 14 research and development efforts for technologies to support detection systems, among others. An example is the Biological Aerosol Sentry and Information System (BASIS), a portable system of networked air-sampling units that are capable of detecting airborne biological incidents at large gatherings such as political conventions and major indoor and outdoor sporting events; additional details are provided in appendix III. * USDA's Food Safety and Inspection Service is using IT to support methods of inspection to better protect the public from foodborne illness. * EPA has five systems defined as supporting technologies--two that could potentially support surveillance activities on the safety of drinking water and three modeling and simulation tools that are used to simulate the dispersions of contaminants in water and indoor air.[Footnote 19] * VA has one information system that was developed for surveillance within its health care facilities. Appendix III provides a detailed description of the IT categories and additional information on each, while appendixes IV through IX contain detailed descriptions of the information systems and supporting technologies by agency. Appendix X contains detailed descriptions of the IT initiatives. Coordination Mixed Among the Information Systems and Initiatives Identified: In planning or operating each of these information systems and IT initiatives, the extent of coordination or interaction among the lead agency and other related government agencies covered a wide range. Such coordination ranged from a lack of contact with other agencies, to awareness, to formal coordination, to joint development of initiatives. According to CDC officials, while collaboration has improved, there are still organizational difficulties related to combining resources from multiple sources to meet common goals. It is typical for staff or contractual resources funded through one mechanism to be kept separate from those funded through another mechanism. Agencies reported that about 30 percent of systems and initiatives are being either formally coordinated or jointly developed with another agency. Of the six agencies in our review, CDC and DOE's national laboratories accounted for the majority of information systems and IT initiatives that identified formally coordinated or jointly developed initiatives. One example of a jointly developed information System is FDA's eLEXNET system. It is a secure Web-based database for sharing laboratory data on food safety among FDA, USDA, DOD, state agriculture, and state and local health laboratories. FDA also shares data with other HHS operating divisions, as well as with Customs (now part of DHS) and the Federal Bureau of Investigations (FBI). This joint effort, which is currently in the planning stage, could improve these agencies' abilities to address foodborne illnesses. In addition, CDC has several IT initiatives in coordination with state and local public health agencies. Health Care Sector Making Progress on Defining Standards, but Implementation Challenges Remain for Effective Information Sharing: To support the compatibility, interoperability, and security of federal agencies' many planned and operational IT systems, the identification and implementation of data, communications, and security standards for health care delivery and public health are essential. Although federal efforts are now under way to strengthen and increase the use of these standards, the identification and implementation of these standards remain incomplete. Several implementation challenges remain, including coordination of the various efforts to ensure consensus on standards, and establishment of milestones. Until these challenges are addressed, federal agencies cannot ensure their systems' abilities to exchange data with other systems when needed. A major consequence of not implementing such standards is the promulgation of piecemeal systems, which results in disparate systems that cannot exchange data. An underlying challenge for establishing and implementing standards is that no overall strategy guides IT development and initiatives. Key Standards for Health Care: IT standards, including data standards, enable the interoperability and portability of systems within and across organizations.[Footnote 20] As we have reported in the past, many different standards are required to develop interoperable health information systems, which reflect the complex nature of health care delivery in the United States.[Footnote 21] Vocabulary standards, which provide common definitions and codes for medical terms and determine how information will be documented for diagnoses and procedures, are one Type of data standard. Vocabulary standards are intended to lead to consistent descriptions of a patient's medical condition by all practitioners. The use of common terminology helps in the clinical care delivery process, enables consistent data analysis from organization to organization, and facilitates transmission of information. Without such standards, the terms used to describe the same diagnoses and procedures sometimes vary. For example, the condition known as hepatitis may also be described as a liver inflammation. The use of different terms to indicate the same condition or treatment complicates retrieval and reduces the reliability and consistency of data. In addition to vocabulary standards, messaging standards are also important because they provide for the uniform and predictable electronic exchange of data by establishing the order and sequence of data during transmission. Medical messaging standards dictate the segments in a specific medical transmission. For example, they might require the first segment to include the patient' s name, hospital number, and birth date. A series of subsequent segments might transmit the results of a complete blood count, one result (e.g., iron content) per segment. Messaging standards can be adopted to enable intelligible communication between organizations via the Internet or some other communications pathway. Without these standards, the interoperability of federal agencies' systems may be limited and may limit the exchange of data that are available for information sharing. In addition to vocabulary and messaging standards, there is also the need for a high degree of security and confidentiality to protect medical information from unauthorized disclosure. More detail on these and other key standards is provided in appendix XI. Need for Standards Has Been Recognized and Federal Actions are Under Way to Define and Implement Them: The need for health care data standards has been recognized for a number of years and progress has been made in defining these standards. Yet, despite these efforts, the identification and implementation of these standards remains incomplete. CDC acknowledged the need for standards specific to public health systems, and in 1995 it established the National Electronic Disease Surveillance System (NEDSS) initiative to address the limitations of current surveillance systems. These limitations included (1) the multiplicity of program-specific information systems, (2) incomplete and untimely data, (3) the unacceptable burden on health care system respondents, (4) the overwhelming volume of data to be managed by state and local health departments, and (5) the lack of state-of-the-art IT. As part of the NEDSS initiative, CDC, in collaboration with others, agreed to encourage the use of data, communications, and security standards that are required for building interoperable public health systems. CDC expects that the implementation of NEDSS will improve the reporting of disease outbreaks from the states by increasing the timeliness, accuracy, and completeness of data. According to CDC, once fully implemented, these standards are to provide the ability to merge data from laboratories with epidemiological data, in addition to providing the ability to obtain information on cross-jurisdictional outbreaks. In August 1996, Congress also recognized the need for standards to improve the Medicare and Medicaid programs in particular and the efficiency and effectiveness of the health care system in general. It passed the Health Insurance Portability and Accountability Act of 1996 (HIPAA),[Footnote 22] which calls for the industry to control the distribution and exchange of health care data and begin to adopt electronic data exchange standards to uniformly and securely exchange patient information. According to the National Committee on Vital and Health Statistics (NCVHS),[Footnote 23] significant progress has occurred on several HIPAA standards, however, the full economic benefits of administrative simplification will be realized only when all of the standards are in place.[Footnote 24] In July 2000, the NCVHS again reported on the need for standards, this time highlighting the need for uniform standards for patient medical record information. They found that major impediments to electronic exchange of patient medical information were the limited interoperability of health information systems; the limited comparability of data exchanged among providers; and the need for better data quality, accountability, and integrity.[Footnote 25] In November 2001, NCVHS issued another report outlining a strategy, which includes developing and using standards. According to NCVHS, the public health infrastructure could be strengthened through more rapid identification and implementation of existing standards and other new standards. The Institute of Medicine (IOM) and others are also reporting on the lack of national standards for the coding and classification of clinical and other health care data, and for the secure transmission and sharing of such data. Complementary to the work of NEDSS on identifying standards for public health systems, in 2001 the Office of Management and Budget created the Consolidated Health Informatics (CHI) initiative as one of its e- government projects to facilitate the adoption of data standards, among others, for health care systems within the federal government. The CHI initiative is an interagency work group led by HHS and composed of representatives from DOD, VA, and other agencies. Recognizing the need for standards to be incorporated across federal health care systems, HHS, DOD, and VA recently announced its first set of standards (e.g., HL7, LOINC) for the electronic exchange of health information to be implemented across the federal government. Once federal agencies adopt the recommended standards, they are expected to include the standards in their architectures and to build systems accordingly. This commitment is to apply to all new systems acquisition and development projects. The CHI initiative plans to announce additional standards for federal systems as the working group agrees upon them, but does not have time frames established for making these announcements. Several Standards Implementation Challenges Remain: Despite progress in defining health care IT standards, several implementation challenges--such as coordination of the various initiatives to achieve consensus on the use of standards, establishment of milestones, and development of implementation mechanisms--remain to be worked out. Currently, there are no activities or mechanisms defined to ensure coordination and consensus between these initiatives at the national level. HHS officials agree that leadership and direction are still needed to coordinate the various standards-setting initiatives and to ensure consistent implementation of standards for health care delivery and public health. Coordination of these initiatives is essential to ensure that the completion of standards development is accelerated and that consensus is obtained from all stakeholders. According to NCVHS, the process of developing health care data standards involves many diverse entities, such as individual and group practices, software developers, domain-specific professional associations, and allied health services. This fragmentation has slowed the dissemination and adoption of standards by making it difficult to convene all of the relevant stakeholders and subject matter experts in standards development meetings and to reach consensus within a reasonable period of time. Another challenge is that not all of the federal government's standards-setting initiatives have milestones associated with efforts to define and implement standards. For example, while the CHI initiative--the primary federal initiative to establish standards--has announced such initial standards and implementation requirements for health care information exchange, it has not yet established milestones for future announcements. Accordingly, it is not clear when these announcements will occur. Another challenge is that there is no mechanism to monitor the implementation of standards throughout the health care industry. In November 2001, NCVHS reported a need for a mechanism, such as compliance testing, to ensure that health care standards are uniformly adopted as part of a national strategy. NCVHS added that without an implementation mechanism and leadership at the national level, problems associated with systems' incompatibility and lack of interoperability will persist throughout the different levels of government and the private sector and, consequently, throughout the health care sector. Since that time, however, no national monitoring mechanism has yet been established. A major consequence of not implementing such standards is the promulgation of piecemeal systems, which result in disparate systems that cannot exchange data. This leads to information gaps, hindering the prompt and accurate identification of emerging biological threats- -consequently, timely detection of major public health threats is limited. For example, according to CDC officials, one of the IT challenges encountered by public health officials responding to the anthrax events of October 2001 was the issue of exchanging data among the many participants involved in the response--clinical sites, local health departments, emergency responders, state health departments, public health laboratories, and federal agencies. During this event, participants accumulated dissimilar data and principally exchanged it manually. An underlying challenge for establishing and implementing such standards is that no overall strategy guides IT development and initiatives. With no overall strategy that addresses the development and implementation of standards and associated milestones, federal agencies cannot ensure their systems' abilities to exchange data with other systems when needed and cannot ensure effective preparation for and response to bioterrorism and other public health emergencies. Emerging Information Technologies Could Enhance Agencies' Abilities to Prepare for and Respond to Public Health Emergencies: Within the public health sector, the implementation of emerging information technologies could help to strengthen agencies' technological capabilities to support the nation's ability to prepare for and respond to bioterrorism and other public health emergencies. Agencies identified several activities to research, develop, and implement emerging technologies, which were generally initiated to meet agencies' specific needs. However, barriers exist that may hinder the public health community from benefiting from the implementation of emerging information technologies. Examples of Public Health's Use of Emerging Information Technology: An emerging technology is one in which research has progressed far enough to indicate a high probability of technical success for new products and applications that might have substantial markets within approximately 10 years. Agencies identified several IT applications that incorporate the use of emerging technologies. They include commercial IT and communications solutions, along with IT that was developed specifically for the health care sector. Examples of emerging information technologies for use in public health applications include the following: * Geographic information system (GIS): [Footnote 26] GIS is being used by federal agencies to support disease and outbreak surveillance. CDC uses GIS to track the spread of infection through a community, to identify geographic areas of particular health concern, and to identify susceptible populations. The resulting information can be used in support of surveillance systems to help identify spatial clustering of abnormal events as the data are collected. GIS was used in 2001 to map data related to CDC's emergency response to the anthrax bioterrorism event, and it was used in 2002 to aid the FBI's investigation of the anthrax attack in Florida. FDA is currently using GIS technology in its food safety system, eLEXNET. * Web-based images for diagnosis: Several of CDC's systems use the Internet to enhance reporting and communications capabilities. For example, its DPDx system uses the Internet to strengthen the capabilities of laboratories to diagnose parasitic diseases. The function also enables users to obtain diagnostic assistance over the Internet by allowing laboratories to transmit images to CDC and obtain answers to inquiries, sometimes within minutes. The system increases the interaction between CDC and public health laboratories. * Data mining: [Footnote 27] DOD's ESSENCE system uses data mining technology to support early detection of infectious disease outbreaks or bioterrorism events. This system enhances public health officials' decision-making capabilities regarding events, which may be public health emergencies. * Grid computing:[Footnote 28] DOD's Army Medical Research Institute of Infectious Diseases is sponsoring a project with the support of several partner organizations to use grid-computing techniques to help find a treatment for smallpox after infection. The system will run simulated tests of molecules representing some 35 million potential drugs to see how they interact with the smallpox virus. * Computer-aided DNA signature development: DOE's Lawrence Livermore National Laboratory is developing software called KPATH, which is a computer-aided DNA signature development tool. It analyzes pathogen DNA to identify unique signatures. Once identified, these signatures can be used to assist in the process of detecting biological incidents. The results of such development efforts support an enhanced capacity for rapid identification of biological agents. * Virtual private network (VPN): DOE's Los Alamos National Laboratory is working on an Internet-based system called the Forensics Internet Research Exchange, which supports the sharing of biothreat information among research and government agencies. This System is secured through the use of a VPN. A VPN is a communication system that uses public networks to securely transport private intraorganizational and interorganizational information. While industry use of VPNs is common, only four of the systems included in our inventory use VPNs for public health-specific applications. * Public key infrastructure (PKI): CDC has begun using PKI for secure communications between public health officials using NEDSS. PKI is a system of hardware, software, policies, and people that, when fully implemented, can provide a suite of information security assurances that are important in protecting sensitive communications and transactions.[Footnote 29] * Portable biological detection unit: DOE's Sandia National Laboratory has made progress toward developing a small sampling and analysis instrument that is portable and does not require a chemist's expertise to operate. This system, mChemLab, is the first that reduces the size of large instruments to the extent that they can be taken into the field and used by first responders, such as firefighters. The device utilizes embedded software algorithms that indicate the level of threat present in the environment in which the instrument is deployed. Barriers to Better Use of Emerging Technologies: While the public health community may benefit by implementing emerging information technologies, several factors introduce barriers and risks to their successful implementation. One barrier is that emerging technologies likely have not been in use long enough for the developers to identify all areas for standardization, or for the technologies to have evolved to the point that they are interoperable with other already-existing technologies within public health. Another barrier, according to Gartner, Inc., a leading private research firm, is that the use of emerging information technologies may likely change an organization's existing business model. Therefore their implementation may introduce a significant level of risk. For these reasons, the introduction of an emerging information technology may be disruptive to existing business processes. A third possible barrier is the lack of a clearly defined mechanism for continuing research and development for emerging technologies once the results are turned over to the public health sector. For example, according to a CDC official, there is no mechanism to develop demonstration projects to identify and prove the usefulness and applicability of emerging technologies within the public health sector at the federal, state, and local levels. At the time of our review, funds for two research and development efforts that were initially identified as promising were discontinued without consideration of the project's value to the public health infrastructure. Lastly, we observed that activities related to the use of emerging technologies are often the result of independent efforts for specific purposes. Consequently agencies may not be able to share successes or lessons learned. Effectively addressing each of these barriers will be essential if the health care industry is to take full advantage of emerging information technologies. Conclusions: As concerns about the possibility of bioterrorism have been elevated, federal, state, and local public health agencies have been increasing efforts to prepare for and respond to public health emergencies. Federal agencies identified over 70 existing information systems, supporting technologies, and IT initiatives that may better support the public health infrastructure. The extent of coordination or interaction among the lead agency and other related government agencies ranged from a lack of coordination, to awareness, to formal coordination, to jointly developed initiatives. As these and future systems are pursued, leadership will be essential to set priorities for information systems, supporting technologies, and other IT initiatives to enhance the effective preparation for and response to bioterrorism and other public health emergencies. Although a number of efforts are under way, no comprehensive set of standards has been implemented sufficiently to fully support the public health infrastructure. Leadership and an overall IT strategy are important for ensuring that standards development organizations and federal agencies address remaining implementation challenges: (1) coordination of the various efforts and consensus on the use of standards, (2) establishment of milestones for defining and implementing standards, and (3) mechanisms for monitoring implementation of standards. Without a strategy to ensure coordinated efforts and consistent application of standards, federal agencies cannot ensure that their systems are compatible or interoperable and, therefore, cannot effectively support actions to manage public health emergencies through the timely and accurate exchange of information. Finally, federal agencies have begun to implement emerging technologies to strengthen the public health infrastructure. While some emerging technologies have been implemented, and others are being researched and developed, agencies cannot take full advantage of these technologies because several barriers exist. Effectively addressing each of these barriers will be essential if the health care industry is to fully leverage these emerging information technologies. Leadership will be essential to address these barriers and also to establish mechanisms for identifying and prioritizing uses of emerging technologies to better support the nation's ability to prepare for and respond to public health emergencies. Recommendations: We recommend that the Secretary of Health and Human Services, in coordination with other key stakeholders--such as the Secretaries of Defense, Homeland Security, and Veterans Affairs--establish a national IT strategy for public health preparedness and response. This IT strategy should identify steps toward improving the nation's ability to use IT in support of the public health infrastructure. More specifically, it should: * identify all federal agencies' IT initiatives, using the results of our inventory as a starting point; * set priorities for information systems, supporting technologies, and other IT initiatives; * define activities for ensuring that the various standards-setting organizations coordinate their efforts and reach further consensus on the definition and use of standards; * establish milestones for defining and implementing all standards; * create a mechanism--consistent with HIPAA requirements--to monitor the implementation of standards throughout the health care industry; and: * address existing barriers and establish mechanisms for identifying and prioritizing uses of emerging technologies that are appropriate for ensuring continued improvements to the nation's ability to prepare for and respond to public health emergencies. Agency Comments and Our Evaluation: We received written comments on a draft of this report from the Deputy Assistant Secretary of Defense for Chemical/Biological Defense at DOD, Acting Associate Administrator for Management and Administration at DOE, the Acting Principal Deputy Inspector General at HHS, and the Secretary of Veterans Affairs. These four agencies generally concurred with our results, but they did not comment specifically on the recommendations. They provided technical comments, which we have incorporated in this report as appropriate. USDA and EPA concurred with our results in their oral comments, which were primarily technical comments and incorporated as appropriate. Technical comments were generally limited to additional information or correction of information on the description of their systems included in the appendixes. While DHS was not included as one of the agencies in our review because they did not exist until the end of this engagement, we provided DHS officials with the opportunity to comment on the draft of this report, which they declined. Written comments from DOD, DOE, HHS, and VA are reproduced in appendixes XII to XV. Among its comments, HHS officials stated that the focus of this report on IT overemphasized its role and does not address other components of the public health infrastructure. As we describe in the background section of the report, IT is a tool that enables personnel to fulfill their mission. We recognize that the United States health care and public health infrastructure is a complex network of people, systems, and organizations, with participation at all levels--federal, state, tribal, local, international, and the private sector. We also recognize that there are other important issues about the public health infrastructure that merit attention, such as workforce capacity and training, capacity of the public health laboratories, variation in state public health laws, capacity of the health care delivery systems, and communication strategies for addressing the public. As agreed with your offices, unless you publicly announce its contents earlier, we plan no further distribution of this report until 30 days from the date on the report. At that time, we will send copies of the report to other congressional committees. We will also send copies of this report to the Secretaries of Agriculture, Defense, Energy, Health and Human Services, Homeland Security, and Veterans Affairs, and to the Administrator of the Environmental Protection Agency. Copies will also be made available at no charge on our Web site at www.gao.gov. If you have any questions on matters discussed in this report, please contact me at (202) 512-9286 or M. Yvonne Sanchez, Assistant Director, at (202) 512-6274. We can also be reached by E-mail at pownerd@gao.gov and sanchezm@gao.gov, respectively. Other contacts and key contributors to this report are listed in appendix XVI. David A. Powner Director (Acting), Information Technology Management Issues: Signed by David A. Powner: List of Requesters: Tom Davis Chairman, Committee on Government Reform, House of Representatives: Christopher Shays Chairman, Subcommittee on National Security, Emerging Threats, and International Relations, Committee on Government Reform, House of Representatives: Mary Bono Member, House of Representatives: Jane Harman Member, House of Representatives: Charles Norwood Member, House of Representatives: Charles Pickering Member, House of Representatives: Mac Thornberry Member, House of Representatives: Edolphus Towns Member, House of Representatives: Jim Turner Member, House of Representatives: Edward Whitfield Member, House of Representatives: [End of section] Appendix I: Objectives, Scope, and Methodology: The objectives of our review were to: * compile an inventory of current and planned bioterrorism information technology (IT) initiatives at selected federal agencies and identify the range of coordination efforts, * identify and describe the development and use of health care IT standards for bioterrorism-related systems, and: * review the potential use of emerging information technologies for bioterrorism preparedness and response. To address these objectives, we conducted our audit work at six selected federal agencies--United States Department of Agriculture (USDA), Department of Defense (DOD), Department of Energy (DOE), Department of Health and Human Services (HHS), Department of Veterans Affairs (VA), and the Environmental Protection Agency (EPA)--that we previously reported were involved with supporting public health and bioterrorism preparedness and response, which included the use of IT.[Footnote 30] We excluded federal agencies that are responsible only for law enforcement and consequence management related to other types of terrorism. To compile the inventory of current and planned IT initiatives related to bioterrorism, we met with agency officials and identified the categories of systems (e.g., detection, surveillance, diagnostic and clinical management, communications, and supporting technologies) to be included in the inventory and the data to be collected about each system. The inventory includes information systems with applications related to both public health and bioterrorism, since most systems were developed for routine public health purposes but are potentially useful during a bioterrorism event. We also created a database for collecting and analyzing the data from the selected agencies. Next we collected and compiled the inventory data and validated the consistency of the data with each agency. We also included systems that were not necessarily designed for public health purposes, but might be adapted for that function. We included other technologies, such as detection devices that include an IT component that facilitates the collection of data for surveillance systems or otherwise enable IT to perform diagnosis, management, prevention, surveillance, reporting, and communication functions. Our inventory includes information systems that support detection, surveillance, diagnostic and clinical management, communications, and supporting technologies. The inventory specifically excludes the following types of IT: * law enforcement and intelligence systems, * classified systems, * international initiatives, * military systems with no applicability to civilian populations (e.g., combat-specific systems), * distance learning and other training systems, * disease-specific surveillance systems with no potential to support bioterrorism preparedness and response, * systems designed to track agricultural terrorism, and: * consequence management systems for traditional first responders (e.g., police and firefighters). We met with and obtained documentation from representatives of several nonprofit, research, and public health professional organizations, such as the RAND Corporation, the University of California at San Francisco- Stanford Evidence-based Practice Center, and the National Association of County and City Health Officials. Based on our research and the information provided by those parties, we identified categories of IT that support public health and bioterrorism preparedness and response. To illustrate the role of different categories of IT, we also collected more detailed information about selected systems efforts. During our discussions with agency officials about the results of their inventory data, we asked about an agency's interaction and involvement with information systems and IT initiatives being led by other federal agencies. We also collected data as part of the systems inventory about jointly developed projects that included a partner outside their agency. To identify and describe the development, use, and progress of health care data, communications, and security standards, we identified ongoing federal efforts and public/private collaborations to implement standards for IT systems that could be used to support the public health infrastructure. In addition, we met with HHS officials to discuss ongoing activities and progress being made to implement the National Committee on Vital and Health Statistics' recommendations on the National Health Information Infrastructure and other standards- related initiatives. We also met with other experts from the Centers for Disease Control and Prevention and Stanford University and discussed with them the use and applicability of health care standards within the public health infrastructure. To review the potential use of emerging information technologies for bioterrorism preparedness and response, we used research from the Department of Commerce and private-sector consultants to define the term "emerging technologies" as it pertains to information technology. During discussions with agency officials, we asked about their uses and experiences with emerging information technologies, as well as barriers to their implementation. Then, we reviewed the selected agencies' use of and plans for applications specific to public health that were included in the systems inventory. [End of section] Appendix II: CDC Biological Diseases/Agents List: According to CDC, the United States public health system and primary health care providers must be prepared to address various biological agents, including pathogens that are rarely seen in the United States. CDC defines three categories of biological diseases or agents based upon the public health impact and the level of risk to the nation's security that the transmission of these agents may introduce. The categories and the associated agents are described below: Category A Diseases/Agents: High-priority agents include organisms that pose a risk to national security because they can be easily disseminated or transmitted from person to person, result in high mortality rates and have the potential for major public health impact, might cause public panic and social disruption, and require special action for public health preparedness. * Anthrax (Bacillus anthracis): * Botulism (Clostridium botulinum toxin): * Plague (Yersinia pestis): * Smallpox (Variola major): * Tularemia (Francisella tularensis): * Viral hemorrhagic fevers (filoviruses [e.g., Ebola, Marburg] and arenaviruses [e.g., Lassa, Machupo]): Category B Diseases/Agents: Second highet priority agents include those that are moderately easy to disseminate, result in moderate morbidity rates and low mortality rates, and require specific enhancements of CDC's diagnostic capacity and enhanced disease surveillance. * Brucellosis (Brucella species): * Epsilon toxin of Clostridium perfringens: * Food safety threats (e.g., Salmonella species, Escherichia coli O157:H7, Shigella): * Glanders (Burkholderia mallei): * Melioidosis (Burkholderia pseudomallei): * Psittacosis (Chlamydia psittaci): * Q fever (Coxiella burnetii): * Ricin toxin from Ricinus communis (castor beans): * Staphylococcal enterotoxin B: * Typhus fever (Rickettsia prowazekii): * Viral encephalitis (alphaviruses [e.g., Venezuelan equine encephalitis, eastern equine encephalitis, western equine encephalitis]): * Water safety threats (e.g., Vibrio cholerae, Cryptosporidium parvum): Category C Diseases/Agents: Third highest priority agents include emerging pathogens that could be engineered for mass dissemination in the future because of availability, ease of production and dissemination, and potential for high morbidity and mortality rates and major health impact. * Emerging infectious disease threats such as Nipah virus and hantavirus: [End of section] Appendix III: Categories of Information Technology for Bioterrorism- Related Systems: In addition to the phases of an event (i.e., prevention and preparedness, event recognition, early and sustained response, and recovery) there are corresponding categories of IT, which play a vital role as the event progresses. These categories of IT serve different but related functions. For the purposes of this report, we categorized systems according to their primary purposes, as defined in a technology assessment for the Agency for Healthcare Research and Quality that was completed by the University of California San Francisco-Stanford Evidence-based Practice Center.[Footnote 31] Detection: While not all detectors include IT components, detection systems collect and identify potential biological agents in environmental samples, regardless of whether anyone has been exposed to a harmful level of a contaminant. Components of a detection system can include collection systems, particulate counters or biomass indicators, rapid identification systems, and integrated collection and identification systems. In general, detection systems have three parts: (1) a sampler or collector to concentrate the aerosol and preserve samples for further analysis, (2) a trigger component (often a particulate counter or a biomass indicator) that can identify the presence of a potentially harmful biological agent, and (3) an identifier to provide specific identification of the biological agent. Biological detection technologies are in a much less mature stage of development than chemical detectors. According to a February 2001 report by the North American Technology and Industrial Base Organization (NATIBO), no single sensor detects or identifies all biological agents of interest.[Footnote 32] Several different technologies may be needed as components of a layered detection network. It is difficult to distinguish specific biological agents from naturally occurring background materials. Real-time detection and measurement of biological agents in the environment is challenging because of the number of potential agents to be identified, the complex nature of the agents themselves, the countless number of similar micro- organisms that are a constant presence in the environment, and the minute quantities of pathogen that can initiate infection. Most available systems are point detection systems that are either in the field-testing stage or still in the laboratory. The NATIBO assessment also reported that current systems for detecting biological agents are large, complex, expensive, and subject to false results. The 10 detection systems identified in the inventory include IT components. These systems make use of IT to record and send data to a network. Table 2 shows systems included in the inventory that were developed and operated by DOE and DOD for use in both military and civilian settings. Table 2: Summary of Detection Systems by Agency: Type of detector: Collector; Agency: N/A; Number of systems: 0; Status: N/A; Curent/proposed: monitored populations: N/A. Type of detector: Identifier; Agency: DOE; Number of systems: 1; Status: Pilot; Curent/proposed: monitored populations: Local and event-specific. Type of detector: Trigger; Agency: DOE; Number of systems: 1; Status: In development; Curent/proposed: monitored populations: Not available. Type of detector: Integrated collector, identifier, and trigger; Agency: DOE; Number of systems: 4; Status: In development; Curent/proposed: monitored populations: Local, environment, and large- scale civilian events. Agency: DOD; Number of systems: Number of systems: 4; Status: 2 - Operational; 2 - Pilot; Curent/proposed: monitored populations: Military facilities and personnel. Source: GAO. Note: N/A means not applicable. [End of table] One example of a detection System is the Biological Aerosol Sentry and Information System (BASIS). This is a portable system of networked air sampling units that is capable of detecting airborne biological incidents at large gatherings such as political conventions and major indoor and outdoor sporting events. In the mid-1990s, DOE's national laboratories began work to detect and prevent bioterrorism under the Chemical-Biological National Security Program. As part of that work, Lawrence Livermore and Los Alamos laboratories developed BASIS, which has been used during the Olympics and other events to collect air samples and provide information on the time, duration, amount, and types of biological releases. It uses barcodes to maintain data that link samples to filters taken from specific sampling units. These data are analyzed at field laboratories and tracked with BASIS. If a biological agent is detected, it will provide information about the Type of agent as well as where and when it was collected. BASIS also estimates exposure levels and durations to assist public health officials in identifying the population that requires treatment. It was adapted to process samples from the BioWatch program beginning in February 2003. Surveillance: Surveillance is the ongoing collection, analysis, and interpretation of disease-related data to plan, implement, and evaluate public health actions. Surveillance systems differ from detection systems in that they monitor the actual incidence of disease or illness. Without an adequate surveillance system, officials cannot know the true scope of existing health problems and may not recognize new diseases until many people have been affected. The surveillance network relies on the participation of health care providers, laboratories, state and local health departments, and other nontraditional data sources across the nation. Surveillance systems monitor and track abnormal situations that require epidemiological actions and that direct preventive measures by guiding resource allocation and assessing interventions. The most important aspect of a surveillance System is its ability to detect an outbreak at a stage when intervention may affect the expected course of events. It is the public health officials' most important tool for detecting and monitoring both existing and emerging infectious diseases. Surveillance activities may be either active or passive. Passive surveillance relies on physicians, laboratory and hospital staff, and others to take the initiative in reporting data to health departments. Passive systems may be inadequate to identify a rapidly spreading outbreak in its earliest and most manageable stage because there is a chronic history of underreporting and a time lag between diagnosis of a condition and the health department's receipt of a report. Active surveillance relies on public health officials to take the initiative to periodically contact laboratory officials to gather data. Active surveillance produces more complete information than passive, but is more costly to use for data collection activities. Timely and reliable data are essential components of public health assessment, policy development, and assurance at all levels of government; however, the current capacity of public health surveillance is weakened by gaps and fragmentation. Fragmentation has developed in surveillance systems in part because states and localities have not developed uniform data collection procedures, storage, and transmission. In February 1999, we reported on gaps in the nation's public health surveillance network for important emerging infectious diseases; and we recommended that CDC, in collaboration with state, local, and other public health officials, reach consensus on the core capabilities needed at each level of government, including IT capabilities.[Footnote 33] Another key factor shaping the development of surveillance systems is that, historically, investment in these systems has been targeted to specific programs (e.g., tuberculosis, sexually transmitted diseases, etc.), resulting in a patchwork of surveillance efforts across the spectrum of infectious disease threats and other programs. Most surveillance systems are identified by the Type of data they collect; there are eight categories of surveillance: 1. Foodborne illness surveillance--systems that collect, process, and disseminate information on foodborne pathogens or illness. In September 2001, we reported weaknesses in several of CDC's surveillance systems for foodborne illness; we reported that these systems had limited usefulness because there were gaps in the data and because CDC did not release the data in a timely manner.[Footnote 34] 2. Hospital-based surveillance--systems that collect data on hospital- acquired infections for hospital infection control officers. Their primary purpose is to track hospital acquired infections, not to identify undiagnosed infections from the community. However, hospital- based surveillance systems could play two roles in the early detection of emerging infections: the identification of a cluster of recently admitted patients, which might suggest a community-based outbreak, and the identification of a cluster of cases within the hospital that may suggest inpatients with an unrecognized communicable disease. 3. Influenza surveillance--systems that collect data on influenza-like illness. These systems are relevant to bioterrorism surveillance because many bioterrorism-related illnesses present with flu-like symptoms. Influenza surveillance could also serve as a model because these systems integrate clinical and laboratory data for the detection of influenza outbreaks and are coordinated global efforts; they fulfill needs similar to those of surveillance for bioterrorism. 4. Laboratory and antimicrobial resistance[Footnote 35] surveillance-- systems that facilitate the collection, analysis, and reporting of notifiable pathogens and of antimicrobial resistance data that could potentially facilitate the rapid detection of a biological agent. Laboratory surveillance systems are an essential component of any system for the detection of a covert bioterrorism event, both for the detection of uncommon organisms (e.g., smallpox, anthrax, and Ebola) and common organisms with unusual patterns of antimicrobial resistance. 5. Network of clinical reports--systems that collect and analyze clinical reports from individual clinicians and sentinel networks.[Footnote 36] The growth of such networks has generated a demand for information systems capable of automating data collection, analysis, reporting, and communication. 6. Syndromal surveillance--systems that collect data on the earliest signs and symptoms caused by most biological agents.[Footnote 37] Therefore, patients with these syndromes are the targets of syndromal surveillance programs. These systems are still considered experimental, and there is no widely accepted definition for any of these syndromes. As a result, syndromal surveillance systems are widely heterogeneous with respect to the syndromes under surveillance and how each syndrome is defined. 7. Zoonotic and animal disease surveillance--systems that collect, process, and disseminate information on zoonotic and animal diseases. There are concerns that a bioterrorist attack could involve the dissemination of a zoonotic illness among animal populations with the intention of infecting humans or livestock and causing economic and political/economic chaos. Early detection of such an event requires effective rapid detection systems for use by farm workers, meat inspectors, and veterinarians, with real-time reporting capabilities to public health officials. 8. Other---systems that collect sufficiently different surveillance data that they do not fit into the described categories. These systems could be valuable additions to surveillance networks that integrate data from clinicians, hospitals, and laboratories. Our inventory identifies 34 surveillance systems, which monitor and track specific categories of illness and disease. Some of CDC's surveillance systems have been used for several years and only consist of a database, while others, such as NEDSS, are more comprehensive. As table 3 indicates, 4 systems are in development, 2 are currently being evaluated as pilots, 1 is being planned, and 27 are operational. Table 3: Summary of Surveillance Systems by Agency: [See PDF for image] Source: GAO. [End of table] One example of a surveillance System is DOD's Electronic Surveillance System for the Early Notification of Community-based Epidemics (ESSENCE). ESSENCE was developed to support early identification of infectious disease outbreaks in the military, and to provide epidemiological tools for improved investigation. ESSENCE uses ambulatory data that are collected from its military hospitals and clinics and transmitted daily to a central database. By comparing the daily analyses to historical trends, it can identify patterns that suggest an infectious disease outbreak. ESSENCE uses geo-spatial data[Footnote 38] to cluster syndromic groupings based on the locations of occurrences. By getting daily reports and automatic alerts, epidemiologists can track, in near real-time, the syndromes that are being reported in a given region. It incorporates privacy algorithms and supports agent-based response using artificial intelligence software, reasoning, data mining, and visualization tools. DOD's use of electronic medical records enhances its ability to quickly collect data for syndromic surveillance. In the future, the department plans to find, analyze, and add new data sources to the system. Diagnostic and Clinical Management: For the purposes of this report, we defined these as systems with potential utility for enhancing the likelihood that clinicians consider the possibility of bioterrorism-related illness and treat patients accordingly. Diagnostic systems are generally designed to assist clinicians in developing a differential diagnosis for a patient who has an unusual clinical presentation and consist of three different types: general diagnostic decision support systems (DSS), radiology interpretation systems, and natural language processing techniques.[Footnote 39] General diagnostic DSS are those designed to assist clinicians in developing a specific diagnosis for a patient who has unusual signs and symptoms. For these systems to be useful in the event of a covert bioterrorist attack, they should prompt clinicians to consider the possibility of bioterrorism-related illness as a potential cause of the symptoms, thereby increasing the probability that the clinician will perform appropriate diagnostic testing. In addition, since many biothreat agents can cause pulmonary disease, x-rays or other radiological tests would be a common diagnostic procedure performed on patients who might benefit from either the use of radiology interpretation systems that can increase the diagnostic accuracy of radiology reports, or the use of natural language processing techniques to automate the identification of disease concepts in the free text found in diagnostic reports. Clinical management systems can also make recommendations to clinicians by abstracting clinical information from electronic medical records, applying a set of rules, and generating patient-specific management and prevention recommendations. In general, these systems are limited to institutions with electronic medical records and robust medical informatics programs. There are no known systems specifically designed to provide recommendations to clinicians or public health officials for management of a bioterrorism event. Of the systems that are known to exist, they provide recommendations at the point of care, typically when the clinician enters the electronic medical record of the patient in question. These diagnostic and clinical management systems are similar in that they both use clinical information about a patient, apply information from a knowledge base, and generate a list of possible diagnoses or a list of management recommendations. Based on this similarity, we have included them in the same category of IT. Of the federal agencies included in our review that utilize other diagnostic and clinical management systems for their health care delivery operations--DOD, VA, and HHS's Indian Health Services--none has implemented these particular applications as defined above. Communications: The purpose of communications and reporting systems is to facilitate the secure and timely delivery of information in the midst of a public health emergency to the relevant responders and decision makers, so that appropriate action can be undertaken. During a public health emergency, clinicians must be able to communicate rapidly with their patients; public health officials must be able to communicate with other local, state, and federal officials, and laboratories must be able to communicate diagnostic test results. Robust security measures that ensure patient confidentiality and resist cyber attacks are also a necessary component of any health-related communication system. Our systems inventory contains 10 communications systems. While communications within the public health community still depend largely on telephone-and paper-based systems, they are moving to Web-based and electronic data transmission. CDC is responsible for many of the communications systems under development in HHS; however, some of the systems are not yet fully implemented at the state or local levels, and this could negatively affect communication of health information to the public. As table 4 shows, all 10 of these systems are operational. Table 4: Summary of Communications Systems by Agency: Agency: DOD; Number of systems: 2; Targeted users: Navy and Marine medical officials; Status: Operational; Frequency of data exchange: 1 - Monthly; 1 - As needed; Method of data capture and exchange: Electronic. Agency: HHS; Number of systems: 5; Targeted users: Public health officials, epidemiologists, and veterinarians; Status: Operational; Frequency of data exchange: 2 - Continuous; 1 - Every 10 minutes; 2 - Daily; Method of data capture and exchange: Predominantly; Web-based. Agency: USDA; Number of systems: 3; Targeted users: USDA officials and state/federal animal health agencies; Status: Operational; Frequency of data exchange: 3 - Continuous; Method of data capture and exchange: Web-based, paper, and electronic. Source: GAO. [End of table] The Health Alert Network (HAN) is one example of a nationwide communications system that is currently being developed by CDC. HAN is to serve as a platform for (1) distribution of health alerts, (2) dissemination of prevention guidelines and other information, (3) distance learning, (4) national disease surveillance, (5) electronic laboratory reporting, and (6) communication of bioterrorism-related initiatives to strengthen preparedness at the local and state levels. HAN is intended to strengthen the capacity of state and local health departments by serving as an early warning and response system for bioterrorism and other health events. HAN provides the capacity to send urgent health alerts to local agencies via broadcast technologies, such as fax services and autodialing. HHS has awarded grants to all 50 states, 3 large cities, 3 counties, 8 territories, and the District of Columbia for HAN implementation. When completed, HAN is to provide high-speed, secure Internet connections for local health officials; on-line, Internet-and satellite-based distance learning systems; and early warning broadcast alert systems. HAN currently provides secure Internet access to two-thirds of the nation's counties, and at least 13 states have high-speed Internet access to all of their counties. State and local governments may also use CDC funding to expand HAN to community partners such as health organizations and major hospital networks. In addition to enhancing state and local communications, at the time of our review, CDC had provided grants to three local centers for public health preparedness. The centers are considered models of integrated communications and information systems across multiple sectors, advanced operational readiness assessment, and comprehensive training and evaluation. New York's Monroe County Center uses its own health alert network to link hospitals, insurers, and county health care agencies to doctors, pharmacies, and clinics for emergency and routine communications. Monroe County also developed a unified platform for the community to view and track the status of their emergency departments and the number of available beds for a specialty unit within a hospital. In addition to working on syndromic surveillance, Colorado's Denver County Center has developed a bi-directional alert communication and notification system for its public health partners and has explored the use of redundant response system tools for rapidly notifying key local public health partners in the event that traditional phone service is lost. Supporting Technology: Supporting technologies are tools or systems that provide information for the other categories of systems (e.g., detection, surveillance, etc.). During our discussions with federal officials, we found that many projects still in applied research and development are intended to support a particular component associated with a Type of system, such as detection devices. These projects offer promising techniques that are not currently in use. For example, DOE's national laboratories conduct research into new detection and surveillance techniques that, when developed, may be fully deployed into the public health infrastructure. DOE's Los Alamos National Laboratory (LANL) is conducting the Enabling Analytical and Modeling Tools for Enhanced Disease Surveillance research project. Its objective is to develop analytical tools to support public health officials in quickly identifying emerging threats so they can respond accordingly. Subsets of this research are incorporated into ongoing projects. The Forensics Internet Research Exchange is another LANL research project that is intended to connect a network of laboratories and government agencies through a secure virtual private network (VPN) so that they can share genetic sequencing data for identifying strains of biological organisms. In addition, the Defense Advanced Research Projects Agency's Bio-ALIRT program is a research project to further enable early detection of biological events from artificial or natural causes. Its objective is to scientifically determine which nontraditional data sources (e.g., human behavior) are useful in enabling early detection of potential biological attacks. More detailed descriptions of these projects are included in appendixes IV through X. Simulation and computational modeling is another important--and still developing--technology for supporting bioterrorism preparedness and response. With the increase of computational power available in today's technology, and the increasing availability of data, we may soon be able to predict the course of emerging infectious diseases. LANL is piloting the Bioreactor Simulation Tools project, which models and analyzes biological systems in order to create models for predicting the spread of a biological agent. The DOD Chemical and Biological Defense program's Joint Effects Model incorporates simulation tools (used to create a hazard prediction model) that are expected to predict environmental effects. Another DOD project, the Joint Operational Effects Federation, is leveraging existing simulation capabilities to support the prediction of chemical and biological effects at various levels of operation. DOD's simulation tools were developed for military purposes. Our inventory includes 18 systems that are identified as supporting technologies. Twelve of these systems are operational, 3 are in development and 3 are being evaluated as pilots. Table 5: Summary of Supporting Technologies by Agency: Agency: USDA; Number of systems: 1; Status: Operational. Agency: DOD; Number of systems: 1; Status: In development. Agency: DOE; Number of systems: 6; Status: 1 - Operational; 2 - In development; 3 - Pilot. Agency: HHS; Number of systems: 5; Status: Operational. Agency: EPA; Number of systems: 5; Status: Operational. Source: GAO. [End of table] Other Clinical Systems: While they are not included within the scope of our systems inventory, there are other systems that will facilitate health care delivery during an act of bioterrorism or other public health emergency. These systems--such as electronic medical records--were excluded from the scope of this review because they are neither public health systems nor were they primarily developed for biodefense. Both DOD and VA have electronic medical information systems (i.e., Composite Health Care System and Veterans Health Information Systems and Technology Architecture), which enhance their ability to automate the collection of surveillance data for systems such as ESSENCE. Automated medical information systems can play an important role for clinicians during their response to a medical emergency, in documenting the treatment of illness and its outcome, and in collecting and sharing diagnostic test results. Electronic medical records can play a role during routine surveillance by serving as important data sources for public health surveillance. The use of electronic medical records could reduce the burdensome and costly use of paper-based processes, facilitating rapid access to data critical for near real-time public health surveillance. [End of section] Appendix IV: Department of Agriculture's Systems Inventory: USDA became involved in activities concerning bioterrorism because of the increasing realization that the food supply may become a vehicle for a biological attack against the civilian population. Biological attacks on the health of animals and plants are also important to recognize because there are a number of diseases and toxins harmful to humans that can be spread by animals and plants. USDA's Homeland Security staff within the Office of the Secretary is responsible for coordinating activities on terrorism across USDA. In addition, three of USDA's services have been involved in bioterrorism research and preparedness:[Footnote 40] * Agricultural Research Service (ARS), * Animal and Plant Health Inspection Service (APHIS), and: * Food Safety Inspection Service (FSIS). ARS has conducted research to improve onsite rapid detection of biological agents in animals, plants, and food and has improved its detection capacity for diseases and toxins that could affect animals and humans. APHIS has a role in responding to biological agents that are zoonotic (i.e., capable of affecting both animals and humans). APHIS has veterinary epidemiologists to trace the source of animal exposures to diseases. FSIS provides emergency preparedness for foodborne incidents, including bioterrorism. USDA identified 10 information systems and supporting technologies. Department of Agriculture: Department of Agriculture: Animal and Plant Health Inspection Service: Emergency Response Management System (EMRS): Type of system: Surveillance: EMRS is used to manage and investigate outbreaks of animal diseases in the United States. This Web-based task management system was designed to automate many of the tasks that are routinely associated with disease outbreaks and animal emergencies. EMRS is used for routine reporting of foreign investigations of animal disease, state-specific disease outbreaks or control programs, classic national responses, or natural disasters involving animals. EMRS also has a mapping feature, which allows for real-time identification of outbreaks to enable responders to respond more quickly by providing high-resolution maps to decision makers, government agencies, and the public. The system interfaces with state and federal diagnostic laboratories for reporting test results. External collaborating partner: None: System is operational: Used primarily by state and federal animal health agencies: FY 2002 IT cost: $565,000: Est. FY 2003 IT cost: $615,000: Future plans: Integrate with U.S. Forest Service's ROSS system: Generic Disease Data Base (GDB): Type of system: Surveillance: GDB monitors progress in disease control programs, such as the brucellosis and tuberculosis programs. GDB is a core national database for animal health information. Each state has its own local GDB that is limited to its own data, unless it has obtained permission from other states to access their GDB data. There is also a national GDB at Ft. Collins, CO, which is used for the National Scrapie program. GDB is used for both domestic disease control programs and foreign animal disease investigations: External collaborating partner: None: System is operational: Used primarily by state and federal animal health agencies: FY 2002 IT cost: $550,000: Est. FY 2003 IT cost: $700,000: Future plans: Improvements to make GDB more user-friendly to better serve APHIS's needs. Food Safety Inspection Service: Automated Import Information System (AIIS): Type of system: Supporting technology: AIIS assigns reinspection tasks to import inspectors who are stationed at ports of entry. Reinspection of imported goods is based upon foreign product, plant, and country compliance histories. Restrictions on imported products ensure that various species and products do not enter the United States food supply. External collaborating partner: None: System is operational: Used primarily by import inspectors at ports of entry and circuit supervisors. FY 2002 IT cost: Not available: Est. FY 2003 IT cost: Not available: Future plans: Subsequent enhancements to AIIS will include an Intranet application for reports and systems administration, a replicated database view to support future reporting requirements, and incorporation of additional business requirements when they are defined. USDA should complete these enhancements by the end of fiscal year 2003. Consumer Complaint Monitoring System (CCMS): Type of system: Surveillance: CCMS is a database used to record, evaluate, and track all consumer complaints reported to the agency. This includes consumer complaints reported by a state or local health departments or other federal agencies. It also includes complaints that involve imported products recalled from the market. Several program areas have access to CCMS and are responsible for entering any consumer complaints that they receive into the system, including those from district offices and compliance officers, as well as the Food Safety Education and Communication staff. External collaborating partner: None: System is operational: Used primarily by USDA officials. FY 2002 IT cost: Not available: Est. FY 2003 IT cost: Not available: Future plans: Enhancing the computer programming so that CCMS will be able to exchange electronic data with public health agencies and state health departments in a secure manner using the Internet. This enhancement is expected to decrease the amount of time it takes to identify and respond to possible bioterrorism attacks and to other foodborne outbreaks. Syndromic surveillance capability will be programmed into CCMS for common foodborne illnesses and for possible bioterrorism attacks. Fast Antimicrobial Screen Test (FAST): Type of system: Surveillance: FAST stores information on tested samples and provides information on antimicrobial residues in animal tissues. Test results are used for risk assessment and decision support purposes, early detection of problem products, active food safety surveillance, and evaluation of potential threats to the American food supply. External collaborating partner: None: System is operational: Used primarily by USDA officials: FY 2002 IT cost: Not Available: Est. FY 2003 IT cost: Not available: Future plans: None; FAST will be replaced by the implementation of eSample, a system for direct data entry by inspection personnel, and by a corporate database system. Meat and Poultry Hotline (HOTLINE): Type of system: Communications: The purpose of HOTLINE is to help consumers prevent foodborne illness, specifically by answering their questions about the safe storage, handling, and preparation of meat, poultry, and egg products. Information for the system is obtained from the consumer via telephone. Administrators of the Consumer Complaint Monitoring System periodically poll the HOTLINE database and extract data. External collaborating partner: None: System is operational: Used primarily by meat and poultry hotline technical information specialists: FY 2002 IT cost: Not available: Est. FY 2003 IT cost: Not available: Future plans: The possible integration of a call distribution system with the database. The upgrade could take 5 to 10 years. Laboratory Electronic Application for Results Notification (LEARN): Type of system: Communications: LEARN transmits laboratory test results that detect the presence of pathogens and residues of drugs, pesticides, and other chemicals on specimens taken from meat, poultry, and egg products. The system facilitates and expedites the reporting of food product contamination to agency personnel and the industry, reducing the chances of public consumption. Products are randomly sampled or collected based upon suspected health hazards, and results are reported through the LEARN system. External collaborating partner: None: System is operational: Used primarily by USDA officials: FY 2002 IT cost: Not available: Est. FY 2003 IT cost: $92,185: Future plans: Continued enhancements to the existing application to improve user-friendliness and to add information and reports that are not currently included in the application. Plans also include integration of the system with a new laboratory information system and a new headquarters sample information system. Microbiological and Residue Computer Information System (MARCIS): Type of system: Surveillance: MARCIS contains sample identification information and results for analyses submitted by inspection personnel to laboratories. These samples consist of meat, poultry, and egg products; and they are analyzed to ensure that they are safe, wholesome, unadulterated, and properly labeled. The samples are tested because they bear or contain residues of drugs, pesticides, other chemicals, and microbiological pathogens. Test results are used to alert agency personnel and the industry of contaminations and threats to consumer health and the need for protective actions such as product recalls. MARCIS is also used for risk assessment and decision support purposes, improving early detection of problem products, enabling active food safety surveillance, and evaluating potential threats to the food supply. External collaborating partner: None: System is operational: Used primarily by USDA, FDA, and EPA officials: FY 2002 IT cost: Not available: Est. FY 2003 IT cost: Not available: Future plans: Replacement of MARCIS with the Laboratory Information Management System (LIMS). This replacement system will serve an analytical purpose and will populate a corporate sampling database with laboratory information. [See PDF for image] [End of figure] en Reduction Enforcement Program (PREP): Type of system: Communications: PREP schedules tests, tracks samples, and generates a series of reports concerning testing eligibility and the status of test results. It collects and stores establishment address and product information as well as establishment food safety performance. It uses the information for scheduling and requesting the collection of food samples for microbiological pathogen testing. Test results are used to alert agency personnel and the industry of contaminations and threats to consumer health and the need for protective actions, such as product recalls. PREP is also used for risk assessment and decision support purposes, improving early detection of problem products, enabling active food safety surveillance, and evaluating potential threats to the American food supply: External collaborating partner: None: System is operational: Used primarily by USDA officials: FY 2002 IT cost: Not Available: Est. FY 2003 IT cost: Not available: Future plans: Complete testing of new modules (e.g., eggs, retail, and special surveys). National Animal Health Laboratory Network (NAHLN): Type of system: Surveillance: NAHLN is to link federal and state diagnostic labs for the reporting of cases with certain clinical signs or definite diagnosis. The types of case reported will be coordinated with CDC and include the use of data: External collaborating partner: HHS/CDC: System is in planning: To be used primarily by diagnostic laboratories, and CDC and USDA officials: FY 2002 IT cost: $0: Est. FY 2003 IT cost: $250,000: Future plans: Continue development of the database for 13 laboratories in fiscal year 2003, then further development for other diagnostic laboratories in fiscal years 2004 and 2005: Source: GAO analysis of USDA data. [End of table] [End of section] Appendix V: Department of Defense's Systems Inventory: Although DOD is primarily responsible for service members in the battlefield, the department often shares its research with other agencies to benefit the civilian population. DOD's Defense Advanced Research Projects Agency has been the central research and development organization for DOD, managing and directing basic and applied research and development projects for the department. In addition, the United States Army Medical Research Institute of Infectious Diseases (USAMRIID) conducts biological research dealing with militarily relevant infectious diseases and biological agents. USAMRIID provides professional expertise on issues related to technologies and other tools to support readiness for a bioterrorist incident, and also confirms diagnostic laboratory results for CDC's Laboratory Response Network. Some of DOD's systems, particularly those developed by the Joint Program Office, are shared between the services. DOD identified 14 information systems and supporting technologies. Department of Defense: Air Force: Global Expeditionary Medical System (GEMS): Type of system: Surveillance: GEMS provides an integrated biohazard surveillance system that is capable of maintaining a global watch over Air Force personnel. It incorporates an electronic medical record as a basis for real-time data analysis. GEMS establishes records of medical encounters and rapid identification and notification of clinical events, and it integrates the symptom level surveillance that is critical for early detection of disease outbreaks and illnesses. With ongoing site and regional data review, population-specific analysis picks up disease trends to provide early warning of disease outbreaks or biological attacks. GEMS serves as the foundation for an Air Force-wide, integrated medical surveillance and command and control network. GEMS has four modules: patient encounter, theater occupational, public health deployed, and theater epidemiology. External collaborating partner: None: System is operational: Used primarily by health care providers, public health, command and control: FY 2002 IT cost: $500,000: Est. FY 2003 IT cost: Not available: Future plans: Complete infrastructure development. Lightweight Epidemiology Advanced, Detection and Emergency Response System (LEADERS): Type of system: Surveillance: LEADERS is expected to improve the ability to identify and confirm covert biological warfare incidents or significant natural disease outbreaks. LEADERS is to be a comprehensive system that supports joint military and civilian medical surveillance initiatives. External collaborating partner: None: System is in development: Used primarily by health care providers, public health, command and control: FY 2002 IT cost: Not available: Est. FY 2003 IT cost: $3,000,000: Future plans: To complete infrastructure development and to attain funding for clinical interface. The next phase will focus on development of medical surveillance algorithms for specified diseases representing the most serious bioterrorism threats. Army: Airbase/Port Detector System (Portal Shield): Type of system: Detection: The Portal Shield sensor system was developed to provide early and definitive warning of biological threats for high-value, fixed-site assets, such as air bases and port facilities. Portal Shield can detect and identify up to eight biological warfare agents simultaneously, within 25 minutes. Portal Shield uses a "smart logic" algorithm to help reduce false positives and consumables. The network can operate in a surveillance mode as well as a random or manual sample mode. In addition to the biological detection hardware, each sensor is equipped with its own meteorological station and global positioning system. External collaborating partner: None: System is operational: Used primarily by personnel at fixed asset sites (e.g., air bases and port facilities). FY 2002 IT cost: $150,000: Est. FY 2003 IT cost: $0: Future plans: Not available: Biological Integrated Detection System (BIDS): Type of system: Detection: BIDS provides early warning and identification capability in response to a large area biological warfare attack. It is a detection suite in a shelter that is mounted on a dedicated vehicle with an independent power supply. Other BIDS elements include collective protection, environmental control, and storage for supplies such as a global positioning system and radios. BIDS was designed to utilize multiple biological detection technologies in a layered, complementary manner to maximize detection and presumptive identification capabilities. BIDS is used for warning and for confirming that a biological attack has occurred. It provides presumptive identification of the biological agent being used and produces a sample for laboratory analysis. External collaborating partner: None: System is operational: Used primarily by Army reserve and active chemical companies: FY 2002 IT cost: $425,000: Est. FY 2003 IT cost: $0: Future plans: Replacement by JBPDS in fiscal year 2004 and full automation of real-time detection and identification of the full range of biological agents. Early Warning Outbreak and Response System (EWORS): Type of system: Surveillance: EWORS aids in the collection of standardized medical data, particularly for making area-specific and regional comparisons for trend analysis of the data in order to target early warning outbreak recognition of infectious diseases. EWORS provides for timely and accurate dissemination of outbreak information, leading to effective intervention measures, including investigative and containment activities. It establishes baseline measures for trend analysis that is used to differentiate outbreak from non-outbreak disease occurrence; employs a syndromic approach in contrast to disease-specific reporting classifications; and disseminates real-time information and key- function data analysis for instant and programmed interpretation. EWORS integrates public health and hospital networks and was designed as a complementary system for conventional surveillance methodologies. External collaborating partner: Indonesia's Ministry of Health: System is operational: Used primarily by national outbreak response agencies: FY 20021T cost: $200,000: Est. FY 2003 IT cost: $300,000: Future plans: Establishment of the system in the Americas and continued expansion in Southeast Asia. Electronic Surveillance System for the Early Notification of Community- based Epidemics (ESSENCE): Type of system: Surveillance: ESSENCE is used in the early detection of infectious disease outbreaks and it provides epidemiological tools for improved investigation. It collects ambulatory data from hospitals and clinics in a central database on a daily basis. Epidemiologists can track-in near real-time- the syndromes being reported in a region through a daily feed of reported data. ESSENCE uses the daily data downloads, along with traditional epidemiological analyses that using historical data for baseline comparisons and more cutting edge analytic methods such as geographic information system. Analysts have implemented an alerting algorithm methodology to detect localized outbreaks and purely temporal methods for low-level, scattered threats. DOD public health professionals use information from ESSENCE to make crucial decisions about potential health emergencies, based on verified and current information. External collaborating partner: None: System is operational: Used primarily by military health officials: FY 2002 IT cost: $400,000: Est. FY 2003 IT cost: $500,000: Future plans: Future plans include improving the interface and finding, analyzing, and adding new data sources. ESSENCE is being upgraded to incorporate the use of nontraditional civilian data sources; it is currently operational in the greater Washington, D.C. area. This expanded capability integrates both military and civilian health data with daily records of pharmacy sales, school absenteeism, and other sources, to allow for early warning of emerging infections. Embedded Common Technical Architecture (ECTA): Type of system: Supporting technology: ECTA will provide military personnel with sensor connectivity, analysis, and warning and reporting capability for Joint Service combat platforms, command and control centers, and fixed sites. External collaborating partner: None; System is in development; Used primarily by defense nuclear, biological, and chemical specialists; FY 2002 IT Cost: Not available; Est. FY 2003 IT cost: Not available; Future plans: ECTA will merge the current capabilities of the Multipurpose Integrated Chemical Agent Alarm and the JWARN system. The JWARN-ECTA will transfer data automatically from and to the actual detector and will provide commanders, units, and systems with analyzed data for disseminating warnings down to the lowest level of the battlefield. ECTA will provide additional data processing, production of reports, and access to specific information to improve the efficiency of limited personnel assets. It will consist of the hardware and software required to provide sensor connectivity and analysis between detectors and service-specific systems. Joint Biological Point Detection System (JBPDS): Type of system: Detection: JBPDS detects, identifies, samples, collects, and communicates the presence of biological warfare agents in order to enhance the survivability of U.S. forces. It consists of complementary trigger, sampler, detector and identification technologies that allow it to rapidly and automatically detect and identify biological threat agents. Its suite of tools will be capable of identifying biological warfare agents in less than 15 minutes. JBPDS is in low-rate initial production and limited procurement through fiscal year 2006. External collaborating partner: None: System is operational: Used by military health officials and other service personnel: FY 2002 IT cost: $489,000: Est. FY 2003 IT cost: $560,000: Future plans: JBPDS is scheduled to begin full production in fiscal year 2007. The next stage will focus on reducing size, weight, and power consumption while increasing system reliability. JBPDS will also identify up to 26 agents simultaneously and will interface with JWARN. Joint Warning and Reporting Network (JWARN); Air Force: Type of system: Detection/Communication. JWARN employs warning technology to collect, analyze, identify, locate, report, and disseminate information related to threats and potentially contaminated areas. It gathers information from detectors and uses this information to compute toxic corridors and attacks and to display near real-time results to onsite commanders. JWARN will be employed in making decisions about warning dissemination down to the lowest level on the battlefield and linked to a global command and control system. External collaborating partner: Military forces; System is being piloted; Used primarily by military health care providers, public health, and command and control: FY 2002 IT cost: Not available; Est. FY 2003 IT cost: Not available. Future plans: Fielding of JWARN will begin in fiscal year 2004. Plans include using the full JWARN capability to provide commanders with automatic data from sensors and detectors. Navy: Epidemiological Interactive System (EPISYS); Type of system: Surveillance. EPISYS is a program that enables rapid assessment of disease trends in order to focus research efforts of epidemiologists. It was developed to integrate Navy inpatient hospitalization data with career history and demographic data to form a single system with a flexible interface. It is capable of detecting and flagging diagnostic categories that show rates in excess of their historical threshold values. This surveillance capability allows for the early detection of increased illness rates so that intervention can be started early. Using EPISYS, users can rapidly answer basic epidemiological questions regarding disease and injury rates. System is operational; Used primarily by Navy health researchers; FY 2002 IT cost: Not available. Est. FY 2003 IT cost: Not available. Future plans: Not available. Epidemiology Wizard (EPIWIZ); Type of system: Communications; EPIWIZ is a research tool that was developed to organize SAMS data for further analysis of shipboard illness and injury data. EPIWIZ is expected to enhance the Navy's medical readiness by converting SAMS medical encounter data into surveillance information. It will provide Navy medical personnel easy access to shipboard sick-call information so they can monitor trends, prevent injuries and diseases, facilitate reporting, and enhance medical outcomes. EPIWIZ allows the user to display SAMS medical encounter data in a spreadsheet format to facilitate data analysis. This improved data analysis results in closing the gap between medical occurrence and preventative intervention. External collaborating partner: None; Used primarily by Navy health researchers; FY 2002 IT cost: Not available; Est. FY 2003 IT cost: Not available. Future plans: Not available. Field Medical Surveillance System: Type of system: Surveillance. FMSS is designed to help detect emerging health problems that might occur during foreign deployments or conflicts. FMSS can help field staff to determine incidence rates; project short-term trends; profile the characteristics of the affected population by person, time, and place; track the mode of disease transmission; and generate various graphs and reports. Once data are entered for a patient, the input is processed, and compatible diagnoses are presented in order of probability, with biological weapons agents highlighted. FMSS also provides on-line access to medical reference data and an interface to the GIDEON database--a well-known knowledge database designed to help diagnose most of the world's infectious diseases based on the patient's signs, symptoms, and laboratory findings. Many FMSS features have now transitioned over to the Navy's Medical Data Surveillance System and to other development projects. External collaborating partner: None; System is operational; Used primarily by military health officials; Est. FY 2003 IT cost: Not available. Future plans: Not available. Medical Data Surveillance System (MDSS): Type of system: Surveillance: MDSS is an interactive Web application for collecting data and identifying changes in rates of naturally occurring injuries and illnesses found within routinely collected clinical data on active duty personnel. It compiles routine reports on disease and non-battle injury rates and generates special reports to assist medical staff to investigate the onset of disease and to evaluate the effectiveness of preventive measures. By applying advanced analytic techniques, MDSS can detect shifts in disease trends and outbreaks with minimal historical information on illness patterns characteristic of the area of interest, thereby making it particularly suitable for theater operations. These techniques also facilitate ad hoc analysis. MDSS is being configured to meet certification requirements so it can be deployed aboard Navy ships. MDSS is being pilot tested in the 18 `" Medical Command in Korea and in Navy hospitals is Yokosuka, Japan and San Diego, California. External collaborating partner: None: System is a pilot: Used primarily by military health officials: FY 2002 IT cost: $750,000: Est. FY 2003 IT cost: $1,200,000: Future plans: Continued research and development at an advanced research level and testing in a deployed environment at fixed facilities and operational units. Navy Disease Reporting System (NDRS): Type of system: Communications: NDRS provides for expedient and efficient submissions of reportable events. It may also be used to track and report disease and non-battle injuries. Its main purpose is to improve the compliance, timeliness, and reliability of disease reporting. Functions have been included to assist local command with state reporting, prevention programs, and contract tracing. NDRS enables users to determine what diseases are present in a particular country, how many outbreaks have occurred, and what treatments were used. NDRS streamlines reporting and provides ready access to epidemiological data. NDRS data are used to conduct trend analysis and to pool findings with data from other services. External collaborating partner: None: System is operational: Used primarily by Navy health officials: FY 2002 IT cost: $500,000: Est. FY 2003 IT cost: $500,000: Future plans: Integration into the Navy's database for tracking medical encounters, known as the Shipboard Non-Tactical Automated Data Processing Automated Medical System (SAMS). Source: GAO analysis of DOD data: [End of section] Appendix VI: Department of Energy's Systems Inventory: DOE is developing new capabilities to counter chemical and biological threats. DOE expects the results of its research to be public and possibly lead to the development of commercial products in the domestic market. DOE's Chemical and Biological National Security Program has conducted research on biological detection, modeling and prediction, and biological foundations to support efforts in advanced detection, attribution, and medical countermeasures. Several of DOE's national research laboratories (e.g., Lawrence Livermore, Los Alamos, Oak Ridge, and Sandia) have conducted biological and environmental research related to bioterrorism preparedness and response. DOE identified 14 information systems and supporting technologies. Department of Energy: Lawrence Livermore National Laboratory (LLNL): Autonomous Pathogen Detection System (APDS): Type of system: Detection: APDS is an automated, podium-sized system that monitors the air for all three biological threat agents (bacteria, viruses, and toxins). The system has been developed to protect people in critical or high-traffic facilities and at special events. The system performs continuous aerosol collection, sample preparation, and multiplexed biological tests using advanced immunoassays to detect bacteria, viruses, and toxins. More than ten agents are assayed at once. Current R&D work is incorporating polymerase chain-reaction (PCR) techniques for detecting DNA. Single units can be operated to monitor a local space or a central conduit like an air-supply duct. In a more powerful application, a network of APDS units can be integrated with central command and control to protect larger areas. The APDS units can also be networked and integrated with other sensing and analysis systems to provide multifaceted detection and response capabilities. External collaborating partner: None: System is in development: Used primarily for special events of high value and potential fixed targets. FY 2002 IT cost: Not available: Est. FY 2003 IT cost: Not available: Future plans: APDS will move into redesign and piloting in fiscal year 2004. There will be a significant effort in communications and IT for networked instruments in field-testing and beyond. Biological Aerosol Sentry and Information System (BASIS): Type of system: Detection: BASIS is a large-area aerosol pathogen detection system. BASIS will provide early detection of biological incidents for special events, such as large assemblies and major sporting events. Planned for civilian use, it will detect a biological incident within a few hours of attack, early enough to allow public health officials to mount an effective medical response. BASIS was developed in close cooperation with federal, state, and local public health agencies to ensure support for real world operational needs. This system was adapted to process samples from the BioWatch [NOTE A] program, beginning in February 2003. External collaborating partner: None: System is operational: Used primarily for special events of high value and potential fixed targets. FY 2002 IT cost: $800,000: Est. FY 2003 IT cost: $350,000: Future plans: BASIS funding ended in fiscal year 2002. The fate of BASIS for fiscal year 2003 was unknown. Given the likelihood of additional armed conflicts, LLNL anticipates seeing BASIS simultaneously deployed at multiple sites, such as cities. [A] BioWatch is a multiagency program that involves air filter sampling to detect agents in certain cities. It is led by the Department of Homeland Security and is supported by DOE, EPA, and HHS. Computational Design of Pathogen Detection Assays (KPATH); Type of system: Supporting technology; KPATH is an automated system that analyzes pathogen DNA signatures to build and maintain unique polymerase chain reaction (PCR) detection signatures. Signatures are requested by collaborators and are used in BASIS. DNA signatures developed by KPATH are now in use in the BioWatch program.; External collaborating partner: HHS/CDC and FDA, USDA, and DOD/ USAMRIID; Used primarily by federal agencies (e.g., HHS, USDA, and DOD); FY 2002 IT cost: $2,201,200; Est. FY 2003 IT cost: $1,000,000; Future plans: KPATH will be LLNL's lead system for PCR diagnostic signature design. LLNL will continue enhancements to KPATH's DNA signature capabilities and will work on its ability to computationally predict protein signatures. Los Alamos National Laboratory (LANL); Type of system: Detection; See BASIS under Lawrence Livermore National Laboratory.; External collaborating partner: None; System is operational; Used by cities and special events; FY 2002 IT cost: $3,000,000; Est. FY 2003 IT cost: $3,000,000; Future plans: See LLNL.; Bioreactor Simulation Tools; Type of system: Supporting technology; Bioreactor Simulation Tools model and analyze biological systems (i.e., genetic networks, metabolic networks, and signal transduction networks).; External collaborating partner: None; System is being piloted; Used primarily by molecular biologists and epidemiologists; Lawrence FY 2002 IT cost: $600,000; Est. FY 2003 IT cost: $600,000; Future plans: Development of a forward-looking capability to create detailed models for fundamental processes in molecular biology.; Bio-Surveillance Analysis Feedback Evaluation and Response; (B-SAFER); Type of system: Surveillance; B-SAFER is a medical surveillance system using data from emergency departments, clinical laboratories, and nontraditional sources (e.g., RN hotline, drug information calls, ambulance services). B-SAFER recognizes an anomaly, either naturally occurring or caused by human intervention. B-SAFER is compliant with HIPAA and NEDSS.; External collaborating partner: DOD; System is in development; Used primarily by the state and local homeland security community; FY 2002 IT cost: Not available; Est. FY 2003 IT cost: Not available; Future plans: To project potential outcomes of an outbreak and the potential benefit of intervention techniques.; Flow Cytometry; Type of system: Supporting technology; Flow cytometry is used in the detection and identification of pathogens. It is a device comprised of lenses, lasers, computers and other high-tech equipment. They allow researchers to analyze, characterize, and sort thousands of biological cells, chromosomes or molecules in minutes. External collaborating partner: HHS/NIH; System is being piloted; Used primarily by public health officials, and diagnostic and research laboratory personnel; FY 2002 IT cost: $300,000; Est. FY 2003 IT cost: $100,000. Future plans: Database and data analysis tool development. OpenEMed: Type of system: Supporting technology. OpenEMed is a distributed, open architecture, open source system that supports image, audio, and graphical data, creating a virtual patient record. OpenEMed has been used with B-SAFER and New Mexico's NEDSS integrated data repository. OpenEMed includes standard service components for person lookup and identity management, dictionary queries, a clinical data repository, and HIPAA-compliant access control. This software is available for use by the public. External collaborating partner: HHS; System is operational; Used primarily by public health officials and health care providers; FY 2002 IT cost: $0; Est. FY 2003 IT cost: $0. Future plans: Not available. Reagentless Pathogen Biosensor: Type of system: Detection. This project will develop a point sensor for the detection of pathogens. This biosensor is being developed for the rapid detection of disease markers to aid in early diagnosis and could also be used for environmental and medical surveillance for homeland security. External collaborating partner: HHS/NIH, and World Health Organization (WHO); System is in development; Used primarily by medical personnel and first responders; FY 2002 IT cost: $2,000,000; Est. FY 2003 IT cost: $1,800,000. Future plans: This biosensor is being adapted for early diagnosis of common infectious diseases including respiratory viruses and tuberculosis. There is a proposal pending to adapt it to medical surveillance for the Department of Homeland Security. Oak Ridge National Laboratory (ORNL): LandScan USA; Type of system: Supporting technology. LandScan USA is expected to be a high-resolution population distribution model that will provide timely and more spatially precise population and demographic information to support geographic analyses anywhere in the United States. In addition to its application for emergency planning in case of an attack or natural disaster, it has potential uses for socioenvironmental studies, including exposure and health risk assessment, and urban sprawl estimates. It can support improved development of emergency response plans in case of an attack or natural disaster, homeland security, environmental justice analyses, exposure/risk assessment, and evaluation of risks. The data it provides includes daytime and nighttime population distribution. External collaborating partner: DOD, EPA, HHS; System is in development; Used primarily by incident commanders; FY 2002 IT cost: $600,000; Est. FY 2003 IT cost: $1,500,000. Future plans: Not available. SensorNet: Type of system: Detection. SensorNet is expected to be a comprehensive, national system for managing incidents for real-time detection, identification, and assessment of chemical, biological, radiological, and nuclear threats. It is intended to bring together and coordinate all necessary knowledge and response assets quickly and effectively. SensorNet is to consist of sensor technologies, real-time threat assessment, nationwide coverage, and nationwide real-time remote communications. SensorNet is currently under development as a standards-based architecture with encryption and access controls. External collaborating partner: NOAA; System is in development; Used primarily by first responders and personnel in intelligence, regulatory agencies and transportation; FY 2002 IT cost: $215,000; Est. FY 2003 IT cost: $230,000. Future plans: To continue operational prototypes and refine design for nationwide system. Sandia National Laboratory (SNL). Enabling Analytical and Modeling Tools for Enhanced Disease Surveillance; Type of system: Supporting technology. Enabling Analytical and Modeling Tools for Enhanced Disease Surveillance are analytical tools to detect unusual events from a natural background. These tools have been tested with influenza, respiratory illnesses, and dengue fever and are expected to be incorporated into ongoing projects. The flexibility of this project allows for tailoring to specific diseases. External collaborating partner: None; System is in development; Used primarily by public health officials; FY 2002 IT cost: $440,000; Est. FY 2003 IT cost: $0. Future plans: Provide a distributed software framework for integrating information from disparate sources; develop and integrate analytical tools for earlier detection of disease outbreaks. Intelligent Sensing Modules (ISMs); Type of system: Detection. ISMs are expected to be an intelligent integration of detection systems supporting wireless ad hoc networking. ISMs are intended to be used in support of DOD's BDI testbed, PROTECT, PROACT, and a project for the Mint. External collaborating partner: None; System is in development; User information not available; FY 2002 IT cost: $110,000; Est. FY 2003 IT cost: $210,000. Future plans: ISMs are currently under development; more capable computational components are to be integrated when available. µChemLab/CB; Type of system: Detection. µChemLab is a portable, hand-held chemical analysis system, which is fully self-contained and incorporates "lab on a chip" technologies. It is a sensitive device with fast response times in a low-power, compact package used for monitoring facilities. While µChemLab is currently being developed for chemical detection, it can also be used for biological agent detection. Portable, stand-alone devices for the analysis of chemical agents and protein biotoxins have been developed and tested at the research prototype stage. Current research is focused on improving the performance and expanding the capability of these and other such devices. External collaborating partner: DOD/JSRG; System is being piloted; Used primarily by first responders; FY 2002 IT cost: $2,732,000; Est. FY 2003 IT cost: $3,100,000. Future plans: Analysis of additional agents. Rapid Syndrome Validation Project (RSVP); Type of system: Surveillance/Communication. RSVP is designed to facilitate rapid communications. It provides early warning and response to emerging biological threats, as well as to emerging epidemics and diseases, by providing real-time clinical information about current symptoms, disease prevalence, and geographic location. RSVP provides a mechanism to inform health care providers about health alerts and to facilitate the process of collecting data on reportable diseases. RSVP is designed to overcome existing barriers to reporting suspicious or unusual symptoms in patients, and to capture clinician judgment regarding the severity of an illness and the likely category of the disease. RSVP fully supports on-line data entry, reducing the paperwork associated with reporting infectious diseases. RSVP immediately catalogs all reports in a summary, which is instantaneously available to local public health officials and physicians. External collaborating partner: None; System is operational; Used primarily by family practice doctors; FY 2002 IT cost: $403,000; Est. FY 2003 IT cost: $560,000. Future plans: Development of neural networks and maps. Source: GAO analysis of DOE data. [End of table] [End of section] Appendix VII: Department of Health and Human Services' Systems Inventory: Within HHS, six agencies work on bioterrorism issues. Combined, these agencies have a budget of $3.6 billion for bioterrorism in fiscal year 2004. HHS's Office of the Assistant Secretary for Public Health and Emergency Preparedness will have $42 million in fiscal year 2004 to direct and coordinate the implementation of HHS's bioterrorism programs and to support the Department of Homeland Security by providing health and medical leadership. CDC's bioterrorism budget for fiscal year 2004 will be $1.1 billion, $940 million of which will fund CDC's ongoing state and local preparedness program, which supports state surveillance and epidemiology capacity, laboratory capacity, communication and IT infrastructure, education and training, and health information dissemination. In addition, CDC has its own office, the Office of Terrorism Preparedness and Response, to coordinate efforts. CDC plans to upgrade its own system and laboratory capacity and to expand oversight of inter-laboratory transfers of dangerous pathogens and toxins, laboratory safety inspections, and anthrax research. The Health Resources Services Administration also provides grants to hospitals for bioterrorism preparedness and response. The Agency for Healthcare Research and Quality funded research on the use of information systems and decision support systems to enhance preparedness for the delivery of medical care in the event of a bioterrorist attack. FDA is increasing its food safety responsibilities by improving its laboratory preparedness and food monitoring and inspections in accordance with the Public Health Security and Bioterrorism Preparedness and Response Act of 2002. The National Institutes of Health is planning to implement its strategic plan for biodefense research and research agenda for CDC Category A, B, and C agents. HHS identified 28 information systems and supporting technologies. Department of Health and Human Services. Centers for Disease Control and Prevention; 122 Cities Mortality Reporting System; Centers for Disease Control and Prevention: Type of system: Surveillance; As part of CDC's national influenza surveillance effort, CDC receives weekly mortality reports from 122 cities and metropolitan areas in the United States within 2-3 weeks from the date of death. These reports summarize the total number of deaths occurring in these cities/areas each week due to pneumonia and influenza. This system provides CDC with preliminary information with which to evaluate the impact of influenza on mortality in the United States and the severity of the currently circulating virus strains. The advantage of this System is that it provides timely data 2-3 years before finalized mortality data are available from CDC's National Center for Health Statistics. Deaths are reported to CDC by place of occurrence, not by residence. This system is part of BioWatch.; External collaborating partner: 122 Cities' Registrars; System is operational; Used primarily by epidemiologists; FY 2002 IT cost: $49,070; Est. FY 2003 IT cost: $61,202; Future plans: Not available.; Active Bacterial Core Surveillance (ABCs); Type of system: Surveillance; As part of CDC's Emerging Infections Program, ABCs determines the incidence and epidemiological characteristics of invasive bacterial disease due to pathogens of public health importance, determines the molecular patterns and microbiological characteristics of disease- causing elements, and provides an infrastructure for nested special studies to identify risk factors and to evaluate prevention policies. ABCs is a population-and laboratory-based surveillance system.; External collaborating partner: None; System is operational: Used primarily by epidemiologists; FY 2002 IT cost: $78,641; Est. FY 2003 IT cost: $87,372; Future plans: Measuring the impact of newly licensed vaccines on disease and drug resistance and harnessing molecular techniques to characterize bacteria.; Bioterrorism Event Notification; Type of system: Communications; The Bioterrorism Event Notification system tracks emergency-related phone calls to CDC's Emergency Preparedness and Response Branch, which maintains the 24-by-7 emergency contact numbers for CDC. The system provides a data set that can be used to quantify the number and types of incoming requests for emergency assistance.; External collaborating partner: None; System is operational; Used primarily by CDC officials; FY 2002 IT cost: Not available; Est. FY 2003 IT cost: Not available; Future plans: Not available.; Border Infectious Disease Surveillance Project (BIDS); Type of system: Surveillance; BIDS helps public health officials to better understand and detect important infectious diseases along the U.S.-Mexico border. The system conducts active, sentinel surveillance for syndromes consistent with hepatitis and febrile-rash illness at clinical facilities on both sides of the border. As an infectious disease surveillance system combining syndromal surveillance with appropriate laboratory diagnostic testing, BIDS can directly enhance bioterrorism surveillance in this key region.; External collaborating partner: Mexico Ministry of Health; System is operational; Used primarily by state and local public health epidemiologists at the U.S.-Mexico border: FY 2002 IT cost: $30,000; Est. FY 2003 IT cost: $35,000; Future plans: Expansion of the number of sites and syndromes and complete development of the next BIDS software version, involving Web- based data entry, which will be consistent with the National Notifiable Disease Surveillance System standards.; CaliciNet; Type of system: Surveillance; CaliciNet is used to assist public health officials to more quickly identify contaminated food products associated with outbreaks by allowing for the linking of epidemiological and laboratory information from specimens that are collected as part of outbreak investigations for viral gastroenteritis. While caliciviruses are not on the CDC list of bioterrorism agents, they could be used in an attack.; External collaborating partner: None; System is operational: Used primarily by state public health officials; FY 2002 IT cost: $57,783; Est. FY 2003 IT cost: $6,586; Future plans: CaliciNet will be replaced by a larger system, which is still in the process of being named.; DPDx; Type of system: Supporting technology; DPDx uses the Internet to strengthen the level of laboratory professionals' expertise in diagnosing foodborne and other parasitic diseases. DPDx offers reference and training and diagnostic assistance. Laboratory professionals can transmit images to CDC and obtain answers to their inquiries in minutes to hours. This allows them to more efficiently address difficult diagnostic cases in normal or outbreak situations and to disseminate information more rapidly. In addition, this method substantially increases the interaction between CDC and public health laboratories.; External collaborating partner: None; System is operational; Used primarily by pathologists, laboratory technicians, and other health care workers; FY 2002 IT cost: $7,000 Est. FY 2003 IT cost: 7,000 Future plans: Training and continuing education of laboratory professionals; provision to health facilities worldwide of diagnostic assistance by CDC staff supported, when needed, by experts from other institutions; diagnostic quizzes to assess the skills of laboratory professionals; and informal, early detection of unusually clustered, atypical, or emerging parasitic diseases. Plans also include ensuring communication and functionality with all state public health departments.; Early Aberration Reporting System (EARS); Type of system: Communications; EARS is a SAS-based, Web-enabled reporting tool that allows the analysis of public health surveillance data using aberration detection methods. Its goal is to assist public health officials in the early identification of disease outbreaks, as well as bioterrorism events. It assesses whether the current number of reported cases of an event is higher than usual. EARS provides results from its aberration detection analysis, as well as quick data summaries and graphs.; External collaborating partner: None; System is operational; Used primarily by public health officials; FY 2002 IT cost: $88,000 Est. FY 2003 IT cost: $240,000 Future plans: Incorporating bioterrorism detection methods in future versions. Plans also include the implementation of a GIS system that will allow for maps of syndromic or disease events and the incorporation of additional methodologies.; Electronic Foodborne Outbreak Reporting System (EFORS) Type of System: Communications: EFORS replaces the Foodborne Disease Outbreak Surveillance System. EFORS enables a Web-based application for states to report foodborne outbreaks electronically rather than on the former paper-based system. Data are then used for annual summary reports and monitoring for multi- state outbreaks.; External collaborating partner: None; System is operational Used primarily by state and and county public health officials; FY 2002 IT cost: $156,157; Est. FY 2003 IT cost: $129,949; Future plans: Improving the database structure to allow immediate viewing of reports as changes occur. EFORS intends to provide data for estimates of the burden of foodborne illness by food commodity.; Epidemic Information Exchange (Epi-X) Type of system: Communications; Epi-X connects state and local public health officials so that they can share information about outbreaks and other acute health events, including those possibly related to bioterrorism. It is intended to provide epidemiologists and others with a secure, Web-based platform that can be used for instant emergency notification of outbreaks and requests for CDC assistance. Epi-X provides tools for searching, tracking, discussing, and reporting on diseases. EPI-X is being used in DHS's BioWatch program.; External collaborating partner: None System is operational; Used primarily by epidemiologists, veterinarians, and other relevant health professionals; FY 2002 IT cost: $1,354,828; Est. FY 2003 IT cost: $1,382,199; Future plans: Increasing its user base to ensure rapid, secure communications at all levels of public health, such as linking to CDC's Emergency Operations Center and to state and local public health departments. Plans also include linking with comparable state level systems, providing secure communication for multistate outbreak response teams, and automating the recognition of disease outbreaks across jurisdictions.; Federal Facilities Information Management System (FFIMS): Type of system: Supporting technology; FFIMS aids in collecting, managing, and analyzing data that originate outside the agency. Its primary use is as an investigative system to aid in public health assessments at specific sites. It has been most useful in the collection and analysis of voluminous environmental sampling data. FFIMS can be used to investigate an anomaly after it has been identified and to help determine the source of health outcomes or the potential risk of adverse health outcomes.; External collaborating partner: None; System is operational; Used primarily by CDC epidemiologists; FY 2002 IT cost: $1,004,986; Est. FY 2003 IT cost: $1,128,483; Future plans: Addition of remote data collection and conversion to a Web-based application.; Foodborne Disease Active Surveillance Network (FoodNet) Type of system: Surveillance; As part of CDC's Emerging Infections Program, FoodNet provides a network for responding to new and emerging foodborne diseases of national importance, monitoring the burden of foodborne diseases, and identifying the sources of specific foodborne diseases. It consists of active surveillance and a related epidemiological study, which helps public health officials better understand the epidemiology of foodborne diseases in the United States.; External collaborating partner: USDA and HHS/FDA; System is operational; Used primarily by epidemiologists and public health officials; FY 2002 IT cost: $475,500 Est. FY 2003 IT cost: $515,900; Future plans: Estimate the burden of foodborne illnesses in the United States, follow trends in the incidence of foodborne infectious disease, and attribute foodborne infections to specific food vehicles.; Geographic Information Systems (GIS): Type of system: Supporting Technology; GIS tracks the spread of environmental contamination through a community, identifies geographic areas of particular health concern, and identifies susceptible populations. Among other things, GIS can be used to help identify spatial clustering of abnormal events as the data is collected. This can assist under emergency conditions by identifying affected areas, predicting dispersion of the agent, and sharing information with personnel who are responsible for incident management.; External collaborating partner: None System is operational; Used primarily by CDC officials; FY 2002 IT cost: $2,105,977; Est. FY 2003 IT cost: $2,091,737; Future plans: Expansion of GIS services (e.g., for field-based use), integration with the Hazardous Substances Emergency Event System, and possible integration with CDC's NEDSS.; Global Emerging Infections Sentinel Network (GeoSentinel): Type of system: Surveillance GeoSentinel is a Web-and provider-based sentinel network. It consists of travel/tropical medicine clinics around the world participating in surveillance to monitor geographic and temporal trends in morbidity among travelers and other globally mobile populations. Passive surveillance and response capabilities are also extended to a broader network of GeoSentinel Network members.; External collaborating partner: International Society of Travel Medicine; System is operational; Used primarily by physicians in travel/tropical medicine clinics; FY 2002 IT cost: $59,282; Est. FY 2003 IT cost: $10,000 Future plans: Increasing the number and geography of involved clinics, expanding partnerships, and enhancing electronic infrastructure to include simultaneous conferencing in real time with all global sites in preparation for global disease outbreaks or bioterrorism threats.; Hazardous Substances Emergency Event System (HSEES) Type of system: Surveillance; HSEES collects and analyzes information on events involving hazardous substances as well as threatened releases that result in a public health action. Information about the chemical, victims, and event is recorded by state health departments and transmitted to CDC in near real time for analysis and dissemination of reports. It can be easily enhanced to collect biological agents in addition to chemical agents.; External collaborating partner: None System is operational; Used primarily by state public health officials; FY 2002 IT cost: $528,954; Est. FY 2003 IT cost: $580,666; Future plans: Inclusion of additional state health departments and integration with GIS.; Health Alert Network (HAN) Type of system: Communications; HAN is a nationwide system serving as a platform for the distribution of health alerts, dissemination of prevention guidelines and other information, distance learning, national disease surveillance, and electronic laboratory reporting, as well as for CDC's bioterrorism and related initiatives to strengthen preparedness at the local and state levels. Among other things, HAN is to provide early warning alerts and to ensure capacity to securely transmit surveillance, laboratory, and other sensitive data.; External collaborating partner: Local, state, and territorial public health agencies; System is operational; Used primarily by state public health officials; FY 2002 IT cost: $624,000; Est. FY 2003 IT cost: $624,000; Future plans: Not available.; Influenza Sentinel Provider Surveillance System: Type of System: Surveillance; The Influenza Sentinel Provider Surveillance System is one of four separate components that allows CDC to, among other things, detect changes in influenza and monitor influenza-like illness. It is accessible through the Internet and provides data on the circulation and impact of influenza year-round. It also provides information on new influenza strains in circulation that can be used to determine the components of the vaccine for the next influenza season and as a pandemic warning.; External collaborating partner: none; System is operational; Used primarily by CDC officials, physicians, state public health officials and WHO; FY 2002 IT cost: $52,623; Est. FY 2003 IT cost: $54,063 Laboratory Information Tracking System (LITS Plus (tm)) Type of system: Supporting technology: LITS Plus(TM) is a laboratory data management system, which is used to enter, edit, analyze, and report laboratory test results electronically. Users can examine all the data about a specimen, including data from all laboratories that performed tests on the specimen. It provides seamless integration of laboratory data, including laboratory instrument data and incorporates extensive laboratory data management functionality. External collaborating partner: DOD and Global AIDS Program; System is operational; Used primarily by public health, CDC, DOD, and Global AIDS officials; FY 2002 IT Cost: $1,769,098; Est. FY 2003 IT Cost: $1,831,522; Future plans: Develop and implement standardized modules in LITS Plus(TM) for all CDC Category A bioterrorism labs and to comply with CDC's Public Health Information Network. Laboratory Response Network (LRN): Type of system: Communications: LRN is an integrated network of public health and clinical laboratories that provide laboratory diagnostics and disseminated testing capacity for public health preparedness and response. It ensures that all member laboratories collectively maintain state-of-the-art biodetection and diagnostic capabilities as well as surge capacity for all biological and chemical agents likely to be used by terrorists. LRN is based on use of standard protocols and reagents, integrated data management, and secure communications. External collaborating partner: DOD, FDA, FBI, and Association of Public Health Labs; System is operational; Used primarily by state and local public health officials; FY 2002 IT cost: $385,000; Est. FY 2003 IT cost: $502,500: Future plans: Update and revise laboratory protocols for biological and chemical agents on the LRN Web site; develop new screening assays for biological agents and obtain FDA approval for in vitro diagnostic use of new rapid screening assays; link to NEDSS; expand domestic partnership; and upgrade restricted Web site for interoperability and data exchange with key clinical entities. National Botulism Surveillance: Type of system: Surveillance: The National Botulism Surveillance system compiles information on cases of foodborne and wound botulism. CDC provides clinical, epidemiological, and laboratory consultation for suspected botulism cases 24 hours a day and is the only source for antitoxin in the United States. Also, CDC conducts a yearly survey of state and territorial epidemiologists and of state public health laboratory directors to identify additional cases that have not been previously reported. External collaborating partner: None: System is operational: Used primarily by clinicians, laboratory professionals, and epidemiologists: FY 2002 IT cost: $2,000: Est. FY 2003 IT cost: $2,000: Future plans: Use electronic near real-time reporting of botulism testing results, which will be integrated with reports of clinical consultations and antitoxin releases for suspect cases and for rapid case updates. National Electronic Disease Surveillance System (NEDSS) Base System: Type of system: Surveillance: The NEDSS base system is a component of CDC's overall NEDSS initiative. It will provide a NEDSS architecture-compliant option for states to use as a platform for disease surveillance. The NEDSS base system is a CDC- developed system that provides a platform upon which many public health surveillance systems, processes, and data can be integrated in a secure environment. It will provide the foundation for state and program area needs, data collection, and processing, including the development of modules that can be used for data entry and for management of core demographic and notifiable disease data via a Web browser. The first release supports the electronic processes involved in notifiable disease surveillance and analysis, replacing the functionality currently supported by the NEDSS system. States also have the option to develop systems or elements on their own through the use of grants provided for this purpose rather than using the NEDSS base system. External collaborating partner: State, territorial, and local public health agencies as well as various public health-related professional associations: System is currently being piloted: Used primarily by state and local public health officials and CDC officials: FY 2002 IT cost: Not available: Est. FY 2003 IT cost: $27,609,000: Future plans: Additional functionality to support other programs, such as chronic disease and environmental health programs, for use by epidemiologists, laboratory personnel, and data managers from various program areas. Professional associations involvement includes the Association of State and Territorial Health Officials (ASTHO), Association of Public Health Laboratories (APHL), Council of State and Territorial Epidemiologists (CSTE), National Association of Health Data Organizations (NAHDO), National Association of County and City Officials (NACCHO), National Association for Public Health Statistics and Information Systems (NAPHSIS). National Electronic Telecommunications Systems for Surveillance (NETSS): Type of system: Surveillance: NETSS provides weekly data regarding cases of nationally notifiable diseases. It serves a supportive role for bioterrorism-related surveillance allowing the transmission of limited epidemiological information describing cases of infectious disease that may or may not be related to bioterrorism. As needed, local and state health departments can use well-established, routine NETSS information exchange protocols to augment more focused or specific bioterrorism surveillance data exchange. External collaborating partner: State, local, and territorial public health agencies, and various public health-related professional associations; System is operational; Used primarily by state public health officials, CDC officials, and health care providers; FY 2002 IT Cost: $221,400; Est. FY 2003 IT Cost: $235,000; Future plans: NETSS will be phased out as NETSS is deployed and implemented. National Molecular Subtyping Network for Foodborne Disease Surveillance (PulseNet): Type of system: Supporting technology: PulseNet is an early warning system for outbreaks of foodborne diseases. It is a national network of public health laboratories that perform DNA "fingerprinting" on foodborne bacteria. It permits rapid comparisons of these fingerprint patterns through an electronic database and provides critical data for the early recognition and timely investigation of outbreaks. External collaborating partner: USDA/FSIS, HHS/FDA, Health Canada; System is operational; Used primarily by public health officials and food regulatory agency officials; FY 2002 IT cost: $221,400; Est. FY 2003 IT cost: $235,000: Future plans: Expansion to include additional pathogens (including those that may be used by bioterrorists) and to facilitate the establishment of compatible networks in Europe, the Pacific Rim region, and Latin America. National Respiratory and Enteric Virus Surveillance System: (NREVSS): Type of system: Surveillance/Communications: NREVSS is a laboratory-based system that monitors temporal and geographic patterns associated with the detection of respiratory syncytial viruses (RSV), human parainfluenza viruses (HPIV), respiratory and enteric adenoviruses, and rotaviruses. Influenza specimen information, also reported to NREVSS, is integrated with CDC influenza surveillance. While these agents are not on the CDC list, they could be potentially used for bioterrorism. NREVSS is a Web-based and telephone dial-in system. External collaborating partner: None: System is operational: Used primarily by state public health officials and professionals: FY 2002 IT cost: $61,835: Est. FY 2003 IT cost: $2,685: Future plans: Replace the telephone dial-in functionality to be Web- based once all users have access capabilities. Plague: Type of system: Surveillance: The plague surveillance system is comprised of clinical, epidemiological, and ecologic information on presumptive and confirmed cases reported by state public health departments. Basic descriptive statistical analyses are performed on these data, such as regional-and county-specific incidence rates. Plague is also one of three internationally quarantinable diseases, and, according to the International Health Regulations, all cases must be investigated and reported to the World Health Organization in Geneva. External collaborating partner: None: System is operational: Used primarily by state and local public health officials and Indian Health Services' officials: FY 2002 IT cost: $2,350: Est. FY 2003 IT cost: $2,350: Future plans: Integrate with CDC's bioterrorism preparedness programs. Public Health Laboratory Information System (PHLIS): Type of system: Surveillance: PHLIS is designed for use in public health laboratories for the reporting and analysis of a variety of conditions of public health importance, which have a significant laboratory-testing component, e.g., salmonella. PHLIS reports standard demographic data that are associated with a laboratory isolate as well as laboratory test results, information about laboratory procedures, and outbreak-related information. External collaborating partner: None: System is operational: Used primarily by state public health officials: FY 2002 IT cost: $149,091: Est. FY 2003 IT cost: $154,160: Future plans: Not available. Statistical Outbreak Detection Algorithm (SODA): Type of system: Surveillance: SODA processes pathogen information (i.e., salmonella, shigella, and e. coli) on a daily basis to detect anomalies or unusual clusters in the reported versus expected counts at the state, regional, and national levels. Its main goal is to provide users with an interface to view reports, generate graphs and produce maps from the state, regional, and national perspectives. SODA utilizes a cumulative sums algorithm commonly used in the manufacturing industry. The output is a statistical measure that is flagged for review by CDC's foodborne staff. SODA uses general information from lab specimen data, such as date and location. External collaborating partner: None: System is operational: Used primarily by epidemiologists: FY 2002 IT cost: $112,350: Est. FY 2003 IT cost: $116,169: Future plans: Addition of other pathogens for monitoring. Unexplained Deaths and Critical Illnesses Surveillance System: Type of system: Surveillance: As part of CDC's Emerging Infections Program, the Unexplained Deaths and Critical Illnesses Surveillance System is expected to contain limited epidemiological and clinical information on previously healthy persons aged 1 to 49 years who have illnesses with possible infectious causes. It is also expected to provide active population-based surveillance through coroners and medical examiners at limited sites. National and international surveillance will be passive for clusters of unexplained deaths and illnesses. External collaborating partner: None: System is in development: Used primarily by epidemiologists: FY 2002 IT cost: $28,980: Est. FY 2003 IT cost: $37,290: Future plans: Further development of integrated data management system for clinical, epidemiological, specimen tracking, and test results data, including novel diagnostics and pathogen discovery. Food and Drug Administration: Electronic Laboratory Exchange Network (eLEXNET): Type of system: Surveillance: eLEXNET provides a Web-based system for real-time sharing of food safety laboratory data among federal, state, and local agencies. It is seamless and secure, allowing public health officials at multiple government agencies engaged in food safety activities to compare and coordinate laboratory analysis findings. It captures food safety sample and test result data from participating laboratories and uses them for risk assessment and decision-support purposes, improving early detection of problem products and enabling active food safety surveillance and evaluation of potential threats to the American food supply. External collaborating partner: USDA; DOD: System is operational: Used primarily by public health and agricultural food safety officials: FY 2002 IT cost: $5,096,000: Est. FY 2003 IT cost: $3,750,000: Future plans: Expanding participating food safety laboratory partnerships and developing an integrated short-and long-term strategic plan and communications planning approach. Source: GAO analysis of HHS data. [End of table] [End of section] Appendix VIII: Department of Veterans Affairs' Systems Inventory: VA manages one of the nation's largest health care systems and is the nation's largest drug purchaser. The department purchases pharmaceuticals and medical supplies for the Strategic National Stockpile Program and the National Medical Response Team stockpiles. VA identified one information system. Department of Veterans Affairs: Emerging Pathogens Initiative (EPI); Type of system: Surveillance. EPI identifies antibiotic-resistant and otherwise problematic pathogens within the Veterans Health Administration facilities. This information is used to help formulate plans on a national level for intervention strategies and resource needs. Results of aggregate data may also be shared with appropriate public health authorities for planning on the national level for the non-VA and private health care sectors. EPI provides general surveillance on specific pathogens and diseases. External collaborating partner: None; System is operational; FY 2002 IT Cost: Not available; Est FY 2003 IT Cost; Not available. Future plans: Addition of new diseases or organisms as they are identified. Source: GAO analysis of VA data. [End of table] [End of section] Appendix IX: Environmental Protection Agency's Systems Inventory: EPA has responsibilities to prepare for and respond to emergencies, including those related to biological materials. EPA can be involved in detection of agents by environmental monitoring and sampling. EPA is responsible for protecting the nation's water supply from terrorist attack and for prevention and control of indoor air pollution. EPA's National Homeland Security Research Center is in the process of preparing an on-line virtual library of homeland security-related documents and tools intended to assist decision making during emergency situations. Data in the library will include exposure guidelines, databases, publications, and Web sites applicable to biological, chemical, and radiological threats. EPA identified five supporting technologies. Environmental Protection Agency: Indoor Air Quality and Inhalation Exposure (IAQX) Type of system: Supporting technology: IAQX is an indoor air quality simulation package that consists of a general-purpose simulation program and a series of stand-alone, special purpose programs. Relatively simple mass transfer models are provided by the general-purpose simulation program, and more complex models are implemented by the stand-alone, special purpose simulation programs. In addition to performing conventional indoor air quality simulations, which calculate the pollutant concentration and personal exposure as a function of time, IAQX can estimate the adequate ventilation rate when certain air quality criteria need to be satisfied. This feature is useful for product stewardship and risk management. External collaborating partner: None: System is operational: Used primarily by advanced users-EPA officials and the public: FY 2002 IT cost: Not available: Est. FY 2003 IT cost: Not available: Future plans: Addition of more special purpose programs, such as models for indoor air chemistry and indoor application of pesticides. EPANET: Type of system: Supporting technology: EPANET was developed to help water utilities maintain and improve the quality of water delivered to consumers through their distribution systems. It is a computer modeling software package that can be used to simulate drinking water distribution systems and to simulate water flow patterns in those systems. The model is also used to simulate contaminant dispersion patterns if chemical or biological contaminants are introduced into a water system. It can be used to inform water utilities where critical points (valves, pumps, etc.) are located in the system and what the impact of the system would be if those points were attacked. External collaborating partner: None: System is operational: Used by EPA officials and the public: FY 2002 IT cost: Not available: Est. FY 2003 IT cost: Not available: Future plans: Not available: RISK: Type of system: Supporting technology: RISK is an indoor air quality (IAQ) model developed by the Indoor Environment Management Branch of EPA's National Risk Management Research Laboratory. It was developed as a tool to carry out the mission of the engineering portion of the EPA's indoor air research program to provide tools necessary to reduce individual exposure to and risk from indoor air pollutants. RISK uses the concepts of buildings and scenarios, including fixed information about a building (the number of rooms, the room dimensions, and the arrangement of the rooms) and changing information sources (sinks, air exchange, room-to-room flows, etc.). The model provides risk, exposure, and concentration information. RISK allows analysis of the impact of multiple pollutants on the indoor environment. Externi Collaborating Partner(s): None: System is operational: Used primarily by EPA officials and the general public: FY 2002 IT cost: Not available: Est. FY 2003 IT cost: Not Available: Future plans: Addition of more risk calculations and of models and suggested values for indoor particulate. Safe Drinking Water Accession and Review System (SDWARS): Type of system: Supporting technology: SDWARS tracks monitoring results for specific lists of unregulated chemical contaminants to indicate occurrences in public drinking water systems. Public water systems submit Unregulated Contaminant Monitoring Rule (UMCR) data elements through SDWARS for inclusion in the National Drinking Water Contaminant Occurrence Database. SDWARS is a one-entry approach to the electronic reporting process to improve reporting quality, reduce reporting errors, and reduce the time involved in investigating and correcting errors at all levels (e.g., laboratories, states, and EPA). External collaborating partner: None: System is operational: Used primarily by EPA officials and the general public: FY 2002 IT cost: $350,000: Est. FY 2003 IT cost: $300,000: Future plans: Accommodate additional contaminants, including microbial contaminants. Safe Drinking Water Information System Federal (SDWIS/FED): Type of system: Supporting technology: SDWIS/FED is a database designed and implemented by EPA to meet its needs in the oversight and management of the Safe Water Drinking Act. It contains data public water system inventory information and summary violation data submitted by states and EPA regions in conformance with reporting requirements established by statute, regulation, and guidance. External collaborating partner: None: System is operational: Used primarily by EPA officials: FY 2002 IT cost: $2,100,000: Est. FY 2003 IT cost: $1,700,000: Future plans: Replace with a new drinking water data warehouse. Source: GAO analysis of EPA data. [End of table] [End of section] Appendix X: Federal Agencies' Information Technology Initiatives: In addition to the agencies' individual systems that they identified, there are several other IT initiatives in process or being planned to better support agencies' abilities to prepare for, respond to, and communicate during public health emergency events. These projects are intended to provide integration and interoperability among systems, improve communications, and better support the public health infrastructure. Information technology initiatives; Lead agency: Collaborating agencies: Status of development: Public Health Information Network (PHIN); Lead agency: HHS/CDC; Collaborating agencies: State, territorial, and local public health agencies and various public health-related professional associations [A]; Status of development: Planning. The PHIN is an effort initiated by the CDC to provide interoperability across public health functions and organizations, such as state and federal agencies, local health departments, public health labs, vaccine clinics, clinical care, and first responders. It is intended to, among other things, (1) deliver industry standard data to public health, (2) investigate bioterrorism detection, (3) provide disease tracking analysis and response, and (4) support local, state, and national data needs. It builds on existing CDC investments from HAN, NEDSS, EPI-X, LRN, and the CDC Web. The PHIN will not replace any of these systems but will provide an "umbrella" to support the interoperability of existing CDC surveillance, communications, and reporting systems. National Electronic Disease Surveillance System (NEDSS) Architecture; Lead agency: HHS/CDC; Collaborating agencies: State, territorial, and local public health agencies and various public health-related professional associations[A]; Status of development: Development. In fiscal year 2001, CDC implemented the NEDSS architecture project to replace or enhance the interoperability of its numerous existing surveillance systems. NEDSS promotes the use of data and information standards to advance the development of efficient, integrated, and interoperable surveillance systems at the federal, state, and local levels. When completed, NEDSS will electronically integrate a wide variety of surveillance activities and will facilitate more accurate and timely reporting of disease information to CDC and state and local health departments. NEDSS is also designed to reduce provider burden in the provision of information and enhance both the timeliness and quality of information provided. The NEDSS architecture will include (1) data standards, (2) an Internet-based communications infrastructure built on industry standards, and (3) policy-level agreements on data access, sharing, burden reduction, and protection of confidentiality. National Environmental Public Health Tracking Network (NEPHTN); Lead agency: HHS/CDC; Collaborating agencies: EPA; Status of development: Planning. The NEPHTN is a collaborative effort between CDC and EPA to develop a national environmental tracking network that will (1) be standards- based; (2) allow direct electronic data reporting and linkage within and across health effect, exposure, and hazard data; and (3) be interoperable with other public health systems. Environmental public health tracking is the ongoing collection, integration, analysis, and interpretation of data about: environmental hazards, exposure to environmental hazards, and health effects potentially related to exposure to environmental hazards. The goal of environmental public health tracking is to protect communities by providing information to federal, state, and local agencies. These agencies then use this information to plan, apply, and evaluate public health actions to prevent and control environmentally related diseases. Currently, no systems exist at the state or national levels to track many of the exposures and health effects that may be related to environmental hazards. FSIS Automated Corporate Technology Suite (FACTS); Lead agency: USDA/FSIS; Collaborating agencies: None; Status of development: Planning. The FACTS initiative establishes an agencywide, integrated information management and data-sharing resource. It is intended to replace existing stovepipe application systems with a suite of components that can interact with each other and share data. FACTS is a technology suite composed of a centralized database that will (1) unite several smaller databases and projects that are interrelated and (2) provide a central point of access that will decrease data redundancy and inaccuracy. FACTS' main purpose is to support the FSIS mission by substantially improving the ability to provide information that is accurate, complete, and timely for use by agency decision makers. Although this initiative will not consolidate all food safety information systems into one system, it will allow interoperability between systems in USDA agencies and at the U.S. Customs Service. In addition, FSIS and APHIS will take major steps toward establishing an integrated data-sharing effort that will specifically define the roles of each agency and will better safeguard the United States against foreign animal diseases and food safety hazards. Biological Defense Initiative (BDI); Lead agency: DOD/DTRA; Collaborating agencies: DOE; Status of development: Cancelled. DTRA was executing the BDI program to determine the value of integrating systems with each other. This program was intended to deliver a national model for biological incidents detection capabilities and to integrate and synthesize information from exiting detectors and surveillance systems, such as BASIS, Portal Shield, RSVP, ESSENSE, and B-Safer. The intended partners in the BDI were to be CDC, Veterans Health Administration, NIH, USDA, and Interior's Fish and Wildlife Service. However, the scope of the project was drastically narrowed as a result of funding reductions--from $215 million dollars to $29 million dollars. BDI has recently been cancelled. Epidemic Outbreak Surveillance (EOS); Lead agency: DOD/Air Force; Collaborating agencies: Navy, Army, DTRA, and civilian and academic partners; Status of development: Development. EOS is a DTRA-supported initiative that leverages and tests existing and emerging biodefense technologies within a real-world testbed. The objectives of the EOS project are to (1) develop a scalable biodefense system for early threat warning, rapid threat identification, focused disease treatment, and outbreak containment and (2) enable the use of emerging technologies for testing, verification, and validation in a real-world, testbed environment. EOS is currently used to identify epidemics of infectious respiratory disease among USAF basic military trainees. It is the first diagnostic platform using DNA-based microarray technologies to be tested, verified, and validated. Bio-ALIRT; Lead agency: DOD/DARPA; Collaborating agencies: Walter Reed Army Institute for Research, academic and commercial partners; Status of development: Development. Bio-ALIRT is being developed by DARPA to scientifically determine the value of nontraditional data sources, such as human behavior, to enable the detection of a biological outbreak from artificial or natural causes up to two days earlier than with traditional means. The Bio- ALIRT program will continue to monitor nontraditional data sources, such as animal sentinels, behavioral indicators, and prediagnostic medical data, to determine which could effectively serve as early indicators of a biological pathogen release. Data sources and algorithms will be evaluated in testbeds. The knowledge and technology developed from the testbeds would be suitable for use in any syndromic surveillance system. Future plans for Bio-ALIRT include development of new techniques, such as advanced data fusion, detection, and privacy protection algorithms, to differentiate between naturally occurring and deliberate bio-releases. Program for Response Options and Technology Enhancements for Chemical/ Biological Terrorism (PROTECT); Lead agency: DOE/SNL; Collaborating agencies: None; Status of development: Development. PROTECT's objective is to protect people in public facilities, such as subways and airports, from chemical attacks. It is intended to addresses vulnerabilities of civilians that were highlighted in the 1995 chemical agent attack in the Tokyo subway system. PROTECT rapidly detects the presence of a chemical agent and transmit readings to an emergency management information system. It demonstrates the use of integrated systems for the defense of infrastructure facilities. PROTECT does not currently have a bioagent use; however, it can provide a near-term solution for 24-by-7 facility monitoring for airborne biological agent releases. PROTECT is a DOE Domestic Demonstration and Application Program (i.e., a prototype system to address specific problems in order improve infrastructure facility protection). The program takes advantage of recent advances in technology to prepare for and respond to attacks in subways, airports, and office buildings where people are concentrated. PROTECT is jointly funded by DOE and the Department of Justice. National Food Safety Laboratory System (NFSLS); Lead agency: USDA/ FSIS and; HHS/FDA; Collaborating agencies: USDA/APHIS, DOD/Army, selected state food laboratories; Status of development: Development. The NFSLS is a newly initiated project to integrate systems for sharing information. It is currently a pilot program involving federal food laboratories at FSIS, FDA, the Army, and state food laboratories in Tennessee, Florida, New Hampshire, Massachusetts, and municipal food laboratories in Milwaukee, Wisconsin, and Cincinnati, Ohio. The program will also focus on the assurance of rapid sharing of reliable data through FDA's e-LEXNET system. USDA and HHS will collaborate with federal, state, and local agencies to: (1) provide a national seamless data exchange system for food laboratory information; (2) provide an infrastructure that is portable, intuitive, and ready to exchange data from state, local, and federal databases and varying internal network designs; (3) enhance communication and collaboration among food safety partnerships; (4) provide the ability to detect, compare, and communicate current findings in food laboratory analysis; and (5) demonstrate that multiple agencies engaged in food safety regulatory activities could leverage the resources necessary to achieve the common goal of reducing the incidence of microbial foodborne illness. National Infrastructure Project; Lead agency: HHS/CDC; Collaborating agencies: None; Status of development: Development. The purpose of the National Infrastructure Project is to strengthen CDC's infrastructure and network management in order to help ensure continuity of operations for the NCEH during emergencies. Its objectives are to achieve zero latency on all network operations and to provide redundancy and higher network uptime. The center is implementing cluster technology to help achieve redundancy without latency, thus increasing the reliability of the network. Storage area networks are being used to provide logical and physical disk drives with connected servers. Other commercial tools are used to monitor the network and detect problems before they occur. NCEH is also purchasing UPS paging to allow early detection of problems within the facility. For example, pagers will go off whenever water sensors or smoke detectors are activated. NCEH has a triage plan, which includes the use of E-mails, pagers, and phone calls combined with paging systems. Forensics Internet Research Exchange (FIRE); Lead agency: DOE/LANL; Collaborating agencies: None; Status of development: Development. FIRE is an initiative to develop an internet-based research exchange system for laboratories and government agencies. It is intended to allow the sharing of biothreat information over a secure VPN. It is anticipated that the system will be able to tie identified bioagent strains to particular organizations based upon previous identification of strains and their origins. Molecular Recognition-based Real Time Detection; Lead agency: DOE/LANL; Collaborating agencies: None; Status of development: Planning. The Molecular Recognition-based Real Time Detection initiative is intended to develop new sensors for biological and chemical warfare agents. The work may provide more specific and sensitive sensors, having very low or no false positives that can be used to collect samples and provide data to information systems. Future plans include the development of single receptors for multiple bioagents or for a combination of biological and chemical agents. [End of table] Source: GAO analysis of agency data. [End of section] Appendix XI: List of Selected Health Care Standards: Several organizations have defined standards for health care data and communications. Several important standards development initiatives and the vocabulary and messaging standards that they have defined are described below: Table 6: : Standard: Health Level Seven (HL7); Description: HL7 is an ANSI- accredited standards development organization that creates message format standards. Version 2.3 provides a protocol that enables the flow of data between systems. Version 3.0 is being developed through the use of a formalized methodology involving the creation of a Reference Information Model to encompass the ability, not only to move data, but to use data once it is moved. Standard: Logical Observations Identifiers Names and Codes (LOINC); Description: LOINC is a set of code standards that identifies clinical questions, variables, and reports. It comprises a database of 15,000 variables with synonyms and cross-mappings; it covers a wide range of laboratory and clinical subject areas. The formal structure has six parts: component, property measured, time aspect, system, precision, and method. Standard: Systemized Nomenclature of Medicine (SNOMED); Description: SNOMED is a nomenclature classification for indexing medical vocabulary, including signs, symptoms, diagnoses, and procedures; it defines code standards in a variety of clinical areas called coding axes. It can identify procedures and possible answers to clinical questions that are coded through LOINC. Standard: Unified Medical Language System (UMLS); Description: The National Library of Medicine developed UMLS as a standard health vocabulary that enables cross-referencing to other terminology and classification systems and includes a metathesaurus, a semantic network, and an information sources map. Its purpose is to help health professionals and researchers retrieve and integrate electronic biomedical information from a variety of sources, irrespective of the variations in the way similar concepts are expressed in different sources and classification systems. Standard: Common Information for Public Health Electronic Reporting (CIPHER); Description: CIPHER's objective is to establish standards for the data used in surveillance, to allow for a consistent definition and a consistent implementation across programs. The following objectives have been defined for CIPHER: (1) establish consistent definitions for information collected and used by surveillance systems; (2) define standards for how questions are to be formatted and information is to be collected on surveillance case report forms; (3) identify standards for the processing of data in electronic data entry systems, including value/label displays, reference table look-ups, and a minimum level of edit-checking; (4) identify storage standards; (5) provide guidance on electronic data interchange; and (6) provide guidance on coding for the display of data in statistical analyses and reports. [End of table] Source: GAO. [End of section] Appendix XII: Comments from the Department of Defense: NUCLEAR AND CHEMICAL AND BIOLOGICAL DEFENSE PROGRAMS: ASSISTANT TO THE SECRETARY OF DEFENSE 3050 DEFENSE PENTAGON WASHINGTON, DC 20301-3050: MAY 19 2003: Mr. David A. Powner Director (Acting) Information Technology Management Issues U.S. General Accounting Office Washington, D.C. 20548: Dear Mr. Powner: This is the Department of Defense (DoD) response to the General Accounting Office (GAO) draft report, GAO-03-139, "BIOTERRORISM: Information Technology Strategy Could Strengthen Federal Agencies' Ability to Respond to Public Health Emergencies," dated April 21, 2003, (GAO Code 310432). The DoD provides the enclosed comments for accuracy and clarification. We appreciate the opportunity to review and respond to the subject draft audit report. Should you have any questions regarding this response, please contact COL Steve Lawrence at (703) 697-1797. Sincerely, Anna Johnson-Wineger, Ph.D. Deputy for Chemical/Biological Defense: Signed by Anna Johnson-Wineger: Enclosure: As stated: [End of section] Appendix XIII: Comments from the Department of Energy: Department of Energy National Nuclear Security Administration Washington, DC 20585: May 13, 2003: Mr. David A. Powner Acting Director Information Technology Issues U. S. General Accounting Office Washington, D.C. 20548: Dear. Mr. Powner: The National Nuclear Security Administration (NNSA) has reviewed the draft report, Bioterrorism: Information Technology Strategy Could Strengthen Federal Agencies' Ability to Respond to Public Health Emergencies (GAO-03-139). While there are no recommendations to the Department of Energy or the NNSA, we offer the following comments: Simply inventorying the IT systems without a more detailed description of their capabilities could obscure some of the gaps or needs in the overall infrastructure. With more information, it is possible for agencies to focus scarce resources into those areas of greatest need. We believe that the Autonomous Pathogen Detection System (APDS), developed by the Lawrence Livermore National Laboratory, should be added to the inventory either in Appendix VI or Appendix X Additionally, if it is germane to the report, NNSA, and the Department as a whole, have BioWatch and BioShield involvement. NNSA, on behalf of the Department of Energy, appreciates GAO's efforts and our opportunity to have reviewed this draft report. Sincerely, Michael C. Kane: Acting Associate Administrator for Management and Administration: Signed by Michael C. Kane: [End of section] Appendix XIV: Comments from the Department of Health and Human Services: Note: GAO comments supplementing those in the report text appear at the end of this appendix. See comment 1. See comment 6. See comment 4. See comment 2. See comment 5. See comment 3. DEPARTMENT OF HEALTH & HUMAN SERVICES Office of Inspector General: Washington, D.C. 20201: MAY 15 2003: Mr. David A. Powner: Director (Acting), Information Technology Management Issues: United States General Accounting Office Washington, D.C. 20548: Dear Mr. Powner: Enclosed are the department's comments on your draft report entitled, "Bioterrorism: Information Technology Strategy Could Strengthen Federal Agencies' Abilities to Respond to Public Health Emergencies." The comments represent the tentative position of the department and are subject to reevaluation when the final version of this report is received. The department provided several technical comments directly to your staff. The department appreciates the opportunity to comment on this draft report before its publication. Sincerely, Dennis J. Duquette: Acting Principal Deputy Inspector General: Signed by Dennis J. Duquette: Enclosure: The Office of Inspector General (OIG) is transmitting the department's response to this draft report in our capacity as the department's designated focal point and coordinator for General Accounting Office reports. The OIG has not conducted an independent assessment of these comments and therefore expresses no opinion on them. Comments of the Department of Health and Human Services on the General Accounting Office's Draft Report, "Bioterrorism: Information Technology Strategy Could Strengthen Federal Agencies' Abilities to Respond to Public Health Emergencies" (GAO-03-139): The Department of Health and Human Services (department) appreciates the opportunity to comment on the General Accounting Office's (GAO) draft report and strongly agrees that the use of emerging information technology (IT) to support the public health infrastructure could help to improve federal agencies' abilities to prepare for and respond to public health emergencies. GAO Recommendation for Executive Action: The GAO recommends that the Secretary of Health and Human Services, in coordination with the Secretary of Homeland Security, establish a national IT strategy for public health preparedness and response. This IT strategy should identify steps towards improving the nation's ability to use IT in support of the public health infrastructure. More specifically, it should: Identify all federal agencies' IT initiatives, using the results of our inventory as a starting point; Set priorities for information systems, supporting technologies, and other IT initiatives; Define activities for ensuring that the various standards-setting organizations coordinate their efforts and reach consensus on the definition and use of standards; Establish milestones for defining and implementing standards; Create a mechanism to monitor the implementation of standards throughout the health care industry; and: Address existing barriers and establish mechanisms for identifying and prioritizing uses of emerging technologies that are appropriate for ensuring continued improvements to the nation's ability to prepare for and respond to public health emergencies. Department Response: The department agrees that improvements in public health emergency preparedness and response capability, including bioterrorism related threats, will require progress on health information technology and standards and the National Health Information Infrastructure broadly. We offer the following general comments: 1. In general, the report would benefit from a clearer distinction between federal agency responsibilities, activities and authorities and those of the private health care sector and the public health system. The draft report and its recommendations tend to blur these activities as well as minimize the scope and complexity of the situation. Surveillance and public health in the United States are primarily state functions. Good progress is being made toward ensuring that: surveillance systems are compatible among the Centers for Disease Control and Prevention (CDC), local and state health departments in addition to health care providers. As a result of the Consolidated Health Informatics (CHI) initiative and several prior initiatives, agencies in the federal health care enterprise have agreed on national consensus health data standards to promote interoperability within the federal health care enterprise. Adoption of interoperability standards among federal health agencies is a major step forward and is expected to be an industry "tipping point." However, the widespread adoption of those standards in the private sector health care and the public health system generally tends to be a much more complex and difficult goal, because the federal government has little influence in most areas. 2. While we agree that more coordination across federal agencies would be helpful, the report does not adequately recognize the level of interagency coordination and success that is already underway, particularly regarding the CHI initiative and the adoption of health data interoperability standards. Instead of describing the CHI initiative as a promising model for coordination that has been successful, the report tends to minimize the CHI effort and contribution in both interagency coordination and major progress on health data interoperability standards. For example, the CDC's National Electronic Disease Surveillance System (NEDSS) and the CDC and Health Resources and Services Administration (HRSA) cooperative agreements described above all include CHI data standards. 3. Coordinated by the Office of the Assistant Secretary for Public Health Emergency Preparedness, the FY 2003 CDC and HRSA cooperative agreements for public health and hospital preparedness for bioterrorism both place emphasis on information technology (IT) interoperability and laboratory data standards, and both incorporate the same health information technology guidance to the states. 4. Emphasizing the importance of standards for data, for security, and for electronic transport has been a main theme of the CDC NEDSS activities and, more recently, for the broader Public Health Information Network (PHIN). The report, however, does not appear to recognize CDC's plans for PHIN. However, what the report categorizes as IT systems includes core activities of CDC's National Center for Infectious Disease (NCID) programs, of which IT is a part, but not the essence. The CDC made an effort to communicate this distinction to the team doing this investigation, but does not believe it is reflected in the report. For example, FoodNet is included in the analysis. A CDC-state collaborative scientific activity, FoodNet conducts surveillance for food borne diseases. It involves CDC program personnel and personnel infrastructure in 10 states. The IT is needed to exchange the data and this effort will be enhanced as implementation of NEDSS/PHIN evolves. The IT is needed to help support the FoodNet effort, but FoodNet is not an IT system. There are other examples. Failing to understand this distinction could lead to an overemphasis of the role of IT in public health surveillance, create unreasonable expectations for IT improvements, and result in potentially simplistic suggestions and solutions. The following are GAO's comments on the Department of Health and Human Service's letter dated May 15, 2003. 1. In the background section of the report, we discuss the state and local government roles in dealing with public health emergencies, using a graphic to further illustrate the different roles. In this section, we have attempted to make a clear distinction between federal responsibilities and the responsibilities of other entities involved in responding to the release of a biological agent. 2. As we stated in our report, the Consolidated Health Informatics Initiative is an interagency work group lead by HHS, which recently announced the first set of standards. While we are encouraged by the interagency coordination involved in this initiative, additional work is still needed--in defining activities for ensuring further coordination and consensus on the adoption and use of additional standards, in establishing milestones for defining and implementing all standards, and in creating a mechanism to monitor the implementation of these standards throughout the health care industry. We recognize that the adoption of standards is an issue for the entire health care industry. 3. In response to these comments, we have added information on HHS's cooperative agreements with states and local governments to the background section of the report. 4. We have included information we received about PHIN in appendix X. 5. We agree with HHS that IT is one of several components that support the core activities of public health surveillance; we discussed this in the Agency Comments and Our Evaluation section of the report. 6. While FoodNet may be a collaborative scientific activity for surveillance of foodborne diseases, it also includes an IT component for data exchange, which was reported to us by CDC officials. [End of section] Appendix XV: Comments from the Department of Veterans Affairs: THE SECRETARY OF VETERANS AFFAIRS WASHINGTON: May 12, 2003: Mr. David A. Powner Director (Acting) Information Technology Issues U.S. General Accounting Office 441 G Street, NW Washington, DC 20548: Dear Mr. Powner: The Department of Veterans Affairs (VA) has reviewed your draft report, BIOTERRORISM: Information Technology Strategy Could Strengthen Federal Agencies' Abilities to Respond to Public Health Emergencies (GAO 03- 139). VA agrees with your overall assessment that information technology can more effectively facilitate emergency response if standards are developed and implemented that allow systems to be interoperable. VA continues to partner actively with other Federal agencies, particularly the Department of Defense (DoD) and the Centers for Disease Control and Prevention (CDC), in information technology homeland security efforts. In conjunction with those two lead agencies, VA is developing the capability to provide a computerized data stream that will be transmitted daily to DoD and the CDC for contemporaneous analysis. Although the primary emphasis of the data supply will be ICD- 9-CM coding information, other demographic and patient location data will be provided, as well. The data stream, which does not include interpretable unique identifiers, will be collected and analyzed by the CDC through its BioSense program, and by the DoD through its ESSENCE program. These data could also be paired with other data streams from other sources to identify patterns in syndromes and illnesses that may not originate from natural occurrences. VA outpatient and emergency room visits will provide the source data. An operational completion date for the venture has not yet been projected. Thank you for the opportunity to comment on your draft report. Sincerely yours, Anthony J. Principi: Signed by Anthony J. Principi: [End of section] Appendix XVI: GAO Contacts and Acknowledgments: GAO Contacts: David A. Powner, (202) 512-9286, (303) 572-7316 or pownerd@gao.gov M. Yvonne Sanchez, (202) 512-6274 or sanchezm@gao.gov: Acknowledgments: In addition to those named above, Larry E. Crosland, Neil J. Doherty, Amanda C. Gill, Pamlutricia Greenleaf, Joanne Fiorino, M. Saad Khan, Teresa F. Tucker, and Caroline C. Villanueva, made key contributions to this report. FOOTNOTES [1] The public health infrastructure is the foundation that supports the planning, delivery, and evaluation of public health activities and is comprised of a well-trained workforce, effective program and policy evaluation, sufficient epidemiology and surveillance capability to detect outbreaks and monitor incidence of diseases, appropriate response capacity for public health emergencies, effective laboratories, secure information systems, and advanced communications systems. [2] Bioterrorism is the threat or intentional release of biological agents (viruses, bacteria, or their toxins) for the purpose of influencing the conduct of government, or intimidating or coercing a civilian population. [3] Surveillance systems facilitate the performance of ongoing collection, analysis, and interpretation of disease-related data. Supporting technologies are tools or systems that provide information for the other categories of systems. Communications systems facilitate the secure and timely delivery of information to the relevant responders and decision makers. Detection systems consist of devices for the collection and identification of potential biological agents from environmental samples that include an IT component that facilitates the collection of data for surveillance. [4] U.S. General Accounting Office, Bioterrorism: Preparedness Varied Across State and Local Jurisdictions, GAO-03-373 (Washington, D.C.: April 7, 2003). [5] In 1984 a group intentionally contaminated salad bars in local restaurants in Oregon with salmonella bacteria to prevent people from voting in a local election. [6] Institute of Medicine of the National Academies, The Future of the Public's Health in the 21st Century (Washington, D.C.: November 11, 2002). [7] RAND Science and Technology Policy Institute, Summit on Information Technology Infrastructure for Bioterrorism (Arlington, VA). [8] Pathogens are bacteria, viruses, parasites, or fungi that have the capability to cause disease in humans. [9] Category A agents include organisms that pose a risk to national security because they can be easily disseminated or transmitted from person to person; result in high mortality rates and have the potential for major public health impact; and require special action for public health preparedness. Category B agents include those that are moderately easy to disseminate and result in moderate morbidity rates and low mortality rates. Category C agents include emerging pathogens that could be engineered for mass dissemination in the future because of availability, ease of production and dissemination, and potential for high morbidity and mortality rates and major health impact. [10] Public Law 107-287 (November 7, 2002). [11] Public Law 107-188 (June 12, 2002). [12] Public Law 107-296 (November 25, 2002). [13] U.S. General Accounting Office, Major Management Challenges and Program Risks: Department of Homeland Security, GAO-03-102 (Washington, D.C.: January 1, 2003). [14] University of California San Francisco-Stanford Evidence-based Practice Center, Bioterrorism Preparedness and Response: Use of Information Technologies and Decision Support Systems (Stanford, CA: June 2002). A copy of the report can be downloaded at www.ahrq.gov/ clinic/evrptfiles.htm#bio-it. [15] Categorized to take into consideration research and development projects that may offer promising techniques; not part of UCSF-Stanford Technology Assessment. [16] RAND Science and Technology Policy Institute, Summit on Information Technology Infrastructure for Bioterrorism (Arlington, VA). [17] The NEDSS Base System is included in the systems inventory and the NEDSS architecture is included as an IT initiative. [18] We did not validate cost information reported by the agencies. Additionally, cost information was not reported for all the systems included in our review. [19] EPA relies largely on local water authorities to monitor the safety of water supplies and report the information to them. [20] Interoperability is the ability of two or more systems or components to exchange information and to use the information that has been exchanged. Portability is the degree to which a computer program can be transferred from one hardware configuration or software environment to another. [21] U.S. General Accounting Office, Automated Medical Records: Leadership Needed to Expedite Standards Development, GAO/IMTEC-93-17 (Washington, D.C.: April 30, 1993). [22] Public Law 104-191 (August 21, 1996). [23] A public advisory committee statutorily authorized to advise the Secretary of HHS on national health information policy. [24] National Committee on Vital and Health Statistics, Fifth Annual Report to Congress on the Implementation of the Administrative Simplification Provisions of the Health Insurance Portability and Accountability Act (Washington, D.C.: November 12, 2002). [25] National Committee on Vital and Health Statistics, Report on Uniform Patient Medical Records Information (Washington, D.C.: July 6, 2000). [26] GIS is a computer application for capturing, storing, checking, integrating, manipulating, analyzing, and displaying data related to positions on the earth's surface. Typically, a GIS is used for handling maps of one kind or another. These might be represented as several different layers where each layer holds data about a particular kind of feature (e.g., roads). Each feature is linked to a position on the graphical image of a map. [27] Data mining is the extraction of information from databases to discover hidden facts. Data mining finds patterns and relationships in data and infers rules that allow the prediction of future results. [28] Grid computing ties together geographically disparate and distributed computers to create a single massive computing resource, taking advantage of their processing power. [29] U.S. General Accounting Office, Information Security: Advances and Remaining Challenges to Adoption of Public Key Infrastructure Technology, GAO-01-277 (Washington, D.C.: February 26, 2001). [30] U.S. General Accounting Office, Bioterrorism: Federal Research and Preparedness Activities, GAO-01-915 (Washington, D.C.: September 28, 2001). [31] University of California San Francisco-Stanford Evidence-based Practice Center, Bioterrorism Preparedness and Response: Use of Information Technologies and Decision Support Systems, (Stanford, CA, June 2002). [32] North American Technology and Industrial Base Organization, A Primer on Biological Detection Technologies, (Fairfax, VA: February 2001). [33] U.S. General Accounting Office, Emerging Infectious Diseases: Consensus on Needed Laboratory Capacity Could Strengthen Surveillance, HEHS-99-26 (Washington D.C.: February 5, 1999). [34] U.S. General Accounting Office, Food Safety: CDC Is Working to Address Limitations in Several of Its Foodborne Disease Surveillance Systems, GAO-01-973 (Washington, D.C.: September 7, 2001). [35] Antimicrobial resistance is the result of microbes changing in ways that reduce or eliminate the effectiveness of drugs, chemicals, or other agents to cure or prevent infections. [36] A sentinel network is a disease surveillance program that involves the collection of health data on a routine basis by clinicians with some training in reporting communicable disease. [37] Symptoms include flu-like illness, acute respiratory distress, gastrointestinal symptoms, febrile hemorrhagic syndromes, and febrile illnesses with either dermatological or neurological findings. [38] Geo-spatial data is information that identifies the geographic location and characteristics of natural or constructed features and boundaries on the earth. This information may be derived from, among other things, remote sensing, mapping, and surveying technologies. [39] Radiology interpretation systems are those technologies that could be used to automate the interpretation of radiological images. Natural language processing is the process of converting information expressed in spoken and written human languages into computer input via specialized software. [40] Portions of ARS and APHIS are now part of DHS. GAO's Mission: The General Accounting Office, the investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through the Internet. GAO's Web site ( www.gao.gov ) contains abstracts and full-text files of current reports and testimony and an expanding archive of older products. The Web site features a search engine to help you locate documents using key words and phrases. You can print these documents in their entirety, including charts and other graphics. Each day, GAO issues a list of newly released reports, testimony, and correspondence. GAO posts this list, known as "Today's Reports," on its Web site daily. The list contains links to the full-text document files. To have GAO e-mail this list to you every afternoon, go to www.gao.gov and select "Subscribe to e-mail alerts" under the "Order GAO Products" heading. Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. General Accounting Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Public Affairs: Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S. General Accounting Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.