Building Security
Interagency Security Committee Has Had Limited Success in Fulfilling Its Responsibilities
Gao ID: GAO-02-1004 September 17, 2002
GAO reviewed efforts by the Interagency Security Committee (ISC) to protect critical federal infrastructure since the committee was created in 1995. ISC is chaired by the General Services Administration (GSA) and comprises 14 department-level agencies and other executive agencies and officials. ISC's primary responsibilities are to (1) establish policies for security in and protection of federal facilities; (2) develop and evaluate security standards for federal facilities, develop a strategy for ensuring compliance with such standards, and oversee the implementation of appropriate security measures in federal facilities; and (3) take the steps necessary to enhance the quality and effectiveness of security and protection of federal facilities. ISC has carried out some of its responsibilities, but it has made little progress on others. During the past 7 years, ISC has developed and issued security design criteria and minimum standards for building access procedures; disseminated information to member agencies, for their consideration and implementation, on entry security technology for buildings needing the highest security levels; and through its meetings and 13 working groups, provided a forum for federal agencies to discuss security issues and share information and ideas. ISC has made little or no progress in developing and establishing policies for security in and protection of federal facilities, developing a strategy for ensuring compliance with security standards, overseeing the implementation of appropriate security in federal facilities, and developing a centralized security database of all federal facilities. Several factors have limited ISC's progress, including (1) the lack of consistent and aggressive leadership by GSA, (2) inadequate staff support and funding for ISC, and (3) ISC's difficulty in making decisions. The creation of a Department of Homeland Security (DHS) would have significant implications for ISC and its responsibilities.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-02-1004, Building Security: Interagency Security Committee Has Had Limited Success in Fulfilling Its Responsibilities
This is the accessible text file for GAO report number GAO-02-1004
entitled 'Building Security: Interagency Security Committee Has Had
Limited Success in Fulfilling Its Responsibilities' which was released
on September 24, 2002.
This text file was formatted by the U.S. General Accounting Office
(GAO) to be accessible to users with visual impairments, as part of a
longer term project to improve GAO products‘ accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
Report to Congressional Requesters:
September 2002:
Building Security:
Interagency Security Committee Has Had Limited Success in Fulfilling
Its Responsibilities:
Building Security:
GAO-02-1004:
Contents:
Letter:
Results in Brief:
Background:
ISC Has Made Limited Progress Implementing Its Responsibilities:
Implications of the Creation of DHS on ISC:
Conclusions:
Recommendations for Executive Action:
Matter for Congressional Consideration:
Scope and Methodology:
Agency Comments:
Appendix I: Executive Order 12977 of October 19, 1995:
Appendix II: Federal Executive Branch Entities with Some
Level of Independent Authority to Acquire Real Property:
Appendix III: Definition of Security Levels I through V, from
DOJ‘s Vulnerability Assessment of Federal
Facilities:
Appendix IV: ISC Participant-Identified Strengths and
Weaknesses:
Appendix V: Comments from the Social Security Administration29:
Appendix VI: Major Contributors:
Tables:
Table 1: ISC Products and Working Groups, in Relation to Its
Responsibilities:
Table 2: ISC Strengths Identified by Participating Agencies or by ISC
Agency Representatives:
Table 3: ISC Weaknesses Identified by Participating Agencies or by ISC
Agency Representatives:
Abbreviations:
AOUSC: Administrative Office of the United States Courts
CIA: Central Intelligence Agency
DHS: Department of Homeland Security
DOC: Department of Commerce
DOD: Department of Defense
DOE: Department of Energy
DOJ: Department of Justice
DOL: Department of Labor
DOS: Department of State
DOT: Department of Transportation
Education: Department of Education
EPA: Environmental Protection Agency
FPS: Federal Protective Service
GSA: General Services Administration
HHS: Department of Health and Human Services
HUD: Department of Housing and Urban Development
Interior: Department of the Interior
ISC: Interagency Security Committee
OHS: Office of Homeland Security
OMB: Office of Management and Budget
PBS: Public Buildings Service
SSA: Social Security Administration
Treasury: Department of the Treasury
USDA: Department of Agriculture
USMS: U.S. Marshals Service
USPS: U.S. Postal Service
VA: Department of Veterans Affairs:
Letter:
September 17, 2002:
The Honorable Joseph I. Lieberman, Chairman
Committee on Governmental Affairs
United States Senate:
The Honorable Robert F. Bennett
United States Senate:
In the wake of the events of September 11, 2001, you requested
information regarding critical infrastructure protection within the
federal government. In response to your October 4, 2001, letter and
discussions with your offices, we are preparing two products on federal
facility infrastructure protection. For this first report, we reviewed
the activities performed by the Interagency Security Committee (ISC)
since it was created by Executive Order 12977 in October 1995 (see app.
I). The ISC is chaired by the General Services Administration (GSA) and
comprises 14 department-level agencies and other executive agencies and
officials. It has three primary security responsibilities for
nonmilitary activities: (a) establish policies for security in and
protection of federal facilities; (b) develop and evaluate security
standards for federal facilities, develop a strategy for ensuring
compliance with such standards, and oversee the implementation of
appropriate security measures in federal facilities; and (c) take such
actions as may be necessary to enhance the quality and effectiveness of
security and protection of federal facilities. With the various recent
proposals to create a Department of Homeland Security (DHS), we have
expanded our work to include the implications of the proposed
department on ISC.[Footnote 1] The second report will discuss the
responsibilities of federal agencies to protect federal buildings they
control and/or occupy.
The objectives of this first review were (1) to determine the extent to
which the ISC had fulfilled the responsibilities established for it by
the executive order and (2) to identify the potential implications of
the proposed DHS on ISC and its responsibilities. To meet our review
objectives, we reviewed ISC documents, relevant executive orders, and
proposed DHS legislation; and we interviewed past and present GSA
officials, 17 of 21 ISC participants, and Office of Management and
Budget (OMB) representatives. We requested comments on a draft of this
report from the OMB Director, the Administrator of GSA, the Office of
Homeland Security‘s (OHS) General Counsel, and from ISC agencies
participating in the review. We received comments from 17 agencies. The
Departments of Commerce (DOC), and the Interior (Interior); the
Environmental Protection Agency (EPA); and OHS did not provide comments
on the report.
Results in Brief:
ISC has carried out some elements of its responsibilities, but it has
made little progress on several other assigned responsibilities. Over
its 7-year existence, ISC has developed and issued security design
criteria and minimum standards for building access procedures;
disseminated information to member agencies, for their consideration
and implementation, on entry security technology for buildings needing
the highest security levels; and, through its meetings and 13 working
groups, provided a forum for federal agencies to discuss security-
related issues and share information and ideas. On the other hand, ISC
has made little or no progress in other elements of its
responsibilities, such as developing and establishing policies for
security in and protection of federal facilities, developing a strategy
for ensuring compliance with security standards, overseeing the
implementation of appropriate security in federal facilities, and
developing a centralized security database of all federal facilities.
Representatives from agencies that participate on ISC had several
positive comments about the committee, such as that it provides a
vehicle for coordination and cooperation among federal agencies and a
forum for agencies to discuss security topics of common interest.
However, agency representatives also raised significant concerns about
ISC‘s overall effectiveness, the way it is operated, and the lack of
progress in certain areas. Agency representatives identified several
factors that they believe have contributed to ISC‘s limited progress.
These factors include (1) the lack of consistent and aggressive
leadership by GSA, (2) inadequate staff support and funding for ISC,
and (3) ISC‘s difficulty in making decisions. GSA, which chairs ISC,
has acknowledged these factors, promised full support, and initiated
efforts to address them, such as establishing a charter and voting
process and initiating the process to provide a full-time staff person
to support ISC.
If DHS is created, it would have significant implications for ISC and
its responsibilities.[Footnote 2] While the need for ISC, or an
organization like ISC, would likely continue with the creation of a
DHS, leadership responsibility for ISC could shift from GSA to DHS, and
ISC‘s responsibilities, role, membership, and operation could change.
Under DHS proposals, responsibility for federal building security would
be transferred from GSA and possibly other federal agencies to DHS, and
DHS‘s responsibilities could vary depending on the legislation enacted
to create DHS. GSA‘s and other federal entities‘ responsibilities for
other facilities management functions would not be affected. The
transfer of security responsibilities would separate security from
other facility management functions, such as the siting, design, and
construction of federal buildings, which play an important role in the
provision of appropriate and effective security. DHS would need to work
through ISC or some other vehicle to see that security is appropriately
integrated with other facility management functions. DHS and ISC could
also have a role in overseeing security protection for executive branch
officials for whom no single government agency or official is
responsible.
We are making recommendations to the Administrator of GSA, as chair of
the ISC, and to the Director of OMB, because of his responsibility
under Executive Order 13267 for establishing a transition planning
office for DHS. Our recommendations are aimed at addressing the
concerns that agency officials identified in the management of ISC, as
well as ensuring that coordination exists between building security and
other facility management functions, contingent upon a new DHS assuming
responsibility for federal building security. Also, ISC‘s future
depends largely on how Congress defines DHS‘s role for federal facility
security. The pending bills to create DHS would establish different
roles for DHS. Therefore, we are including as a matter for
congressional consideration that Congress clarify the scope of DHS‘s
authority and responsibilities for federal facility security in any
legislation enacted to create a DHS. Then, ISC‘s role in federal
facility security can be determined based on the legislation enacted to
create DHS. GSA and OMB concurred with our recommendations.
Background:
The federal government owns or leases more than 3.2 billion square feet
of space in 12 categories, such as office, housing, and storage space.
Office space is the largest of the 12 categories, representing about 23
percent of the total, or about 758 million square feet. The three
largest holders of owned and leased office space are GSA, with about
292 million square feet; defense agencies, with about 191 million
square feet; and the U.S. Postal Service (USPS), with about 190 million
square feet.[Footnote 3] In addition to these three agencies, over 30
other executive branch organizations have some level of authority to
purchase, own, or lease office space or buildings. (See app. II for a
listing of these organizations.) In general, agencies are responsible
for the security of the buildings they own or acquire. GSA assigns
space to many federal agencies in GSA-owned
or -leased space; for example, postal facilities are sometimes located
in GSA space. GSA sometimes delegates the security responsibility for
assigned space to the agency occupying that space.
Federal agencies provide security with their own police force or
security personnel; by contracting with the private sector for
security; or by using another agency to provide security, which in turn
may provide security with federal employees or contract guards. Within
GSA, the Federal Protective Service (FPS), which is currently a
component of the Public Buildings Service (PBS), is responsible for
primary security for GSA-owned or -leased properties. FPS may delegate
this responsibility to agencies assigned space in a GSA building. The
bills currently being considered by Congress to create DHS would
transfer FPS and its functions from GSA to DHS. It is unclear whether
FPS‘s responsibilities would remain the same under DHS or would be
expanded to include more than just GSA-owned or -leased properties,
although H.R. 5005, as passed by the House of Representatives, would
specifically give DHS the responsibility to protect buildings and
grounds and property that are owned, occupied, or secured by the
federal government, including any agency, instrumentality, or wholly
owned or mixed-ownership government corporation. In addition, the U. S.
Secret Service provides security for the White House complex and
certain other executive branch buildings. The Marshal of the Supreme
Court and the Supreme Court Police provide security for the Supreme
Court; however, the Department of Justice‘s (DOJ) U. S. Marshals
Service (USMS) and GSA provide security for other federal courts, which
may be located in federal office buildings that house several federal
agencies. The U.S. Capitol Police are responsible for the security of
the Capitol complex, including the Capitol and House and Senate office
buildings; but GSA is responsible for the security of office space it
provides to Members in their home states or districts.
According to an FPS official, FPS had a staff on board of approximately
1,135, consisting of approximately 574 uniformed officers, 108 physical
security specialists, and 453 administrative and other personnel. FPS‘s
fiscal year 2002 budget is $362.1 million, of which about $207 million
is spent on contract guard services. Additionally, GSA is slated to
spend over $300 million more from its reimbursable program for contract
guard services, according to the official.[Footnote 4] This total of
over $500 million for contract guard services will fund approximately
7,300 contract guards according to the FPS official.
The day after the April 19, 1995, bombing of the Alfred P. Murrah
federal building, the president directed DOJ to assess the
vulnerability of federal office buildings in the United States,
particularly to acts of terrorism and other forms of violence. On June
28, 1995, DOJ issued a report entitled Vulnerability Assessment of
Federal Facilities. In this report, DOJ included security levels
designated I through V for office buildings (see app. III for the
definitions of these security levels), minimum security standards for
office buildings, and, as one of its recommendations, the creation of
ISC to provide a permanent body to address continuing governmentwide
security concerns.
Prior to 1995 there were no governmentwide standards for security at
federal buildings. On October 19, 1995, Executive Order 12977
established ISC to develop, among other things, such standards for
buildings and facilities occupied by federal employees for nonmilitary
activities. The committee was to be made up of the Administrator, GSA;
representatives from the 14 department-level agencies; EPA; the Central
Intelligence Agency (CIA); OMB; the Director, USMS; the Assistant
Commissioner, FPS, GSA; the Assistant to the President for National
Security Affairs; the Director, Security Policy Board.[Footnote 5] The
executive order specified that the GSA Administrator or his designee
was to chair the committee. The President reserved the right to appoint
other federal employees to the committee. FPS was designated to provide
administrative services, funds, facilities, staff, and other support
services for ISC to the extent permitted by law and subject to the
availability of appropriations. Also subject to these provisions, other
executive departments and agencies were charged with helping to support
ISC.
ISC was established to enhance the quality and effectiveness of
security in and protection of buildings and facilities in the United
States that are occupied by federal employees for nonmilitary
activities, and to provide a permanent body to address continuing
governmentwide security for federal facilities. ISC‘s responsibilities
are to:
* establish policies for security in and protection of federal
facilities;
* develop and evaluate security standards for federal facilities,
develop a strategy for ensuring compliance with such standards, and
oversee the implementation of appropriate security measures in federal
facilities; and:
* take such actions as may be necessary to enhance the quality and
effectiveness of security and protection of federal facilities,
including but not limited to:
* encouraging agencies with security responsibilities to share
security-related intelligence in a timely and cooperative manner;
* assessing technology and information systems as a means of providing
cost-effective improvements to security in federal facilities;
* developing long-term construction standards for those locations with
threat levels or missions that require blast-resistant structures or
other specialized security requirements;
* evaluating standards for the location of, and special security
related to, day care centers in federal facilities; and:
* assisting the GSA Administrator in developing and maintaining a
centralized security database of all federal facilities.
The order also directs the GSA Administrator, through FPS, to be
responsible for monitoring federal agencies‘ compliance with ISC‘s
policies and recommendations.
ISC Has Made Limited Progress Implementing Its Responsibilities:
ISC has carried out some elements of its responsibilities, but it has
made little progress on several other responsibilities given to it by
the executive order. ISC has issued two formal products. The first, ISC
Security Design Criteria for New Federal Office Buildings and Major
Modernization Projects (ISC Security Design Criteria), was issued in
May 2001. This document contains physical security-design and
construction criteria and standards for federal buildings. The second
product, issued in July 2001, is Minimum Standards for Federal Building
Access Procedures. In 1997 ISC disseminated information on entry
security technology for buildings with high security designations to
member agencies for their consideration and implementation, if
applicable; and it developed a draft report on preparedness for
nuclear, biological, and chemical events. ISC also has been a forum for
federal agencies to discuss security-related issues and share
information and ideas. However, for a number of reasons, it has not
accomplished several elements of its responsibilities. ISC has no
governmentwide data on the extent to which it has enhanced the quality
and effectiveness of federal facility security since its inception,
although this was one of its major objectives. Consequently, several
ISC participants believe it has not been very effective or has not
lived up to its potential.
ISC records show that ISC established 13 working groups between
December 1995 and April 2002, but 11 of 13 working groups were inactive
in July 2002. At its initial meeting in December 1995, 9 working groups
were established within ISC. Eight of these working groups addressed
the various responsibilities identified in Executive Order 12977; the
ninth group was to focus on funding issues.[Footnote 6] In 1996, an
existing working group was split into 2 groups; the new working group
was called ’information systems and centralized database,“ and it
became the tenth working group. A new working group, the eleventh, was
also formed to focus on protective forces at federal facilities.
Further, as the result of congressional testimony we delivered on
security breaches,[Footnote 7] the twelfth working group was
established in 2000 to develop guidelines to improve building access
procedures.[Footnote 8] Finally, in April 2002, ISC established its
thirteenth working group to focus on the security of leased space.
Table 1 shows the areas of responsibility, the working groups
established, and products drafted or issued in each area. As the table
indicates, two products were issued by ISC and two draft products, one
addressing entry security technology and the other preparedness for
nuclear, biological, and chemical events, were not officially issued by
ISC. However, ISC disseminated the product on entry security to
participating agencies for implementation, if appropriate. GSA‘s ISC
records do not indicate what happened to the other product.
Table 1: ISC Products and Working Groups, in Relation to Its
Responsibilities:
Responsibility: Establish policies for security in and protection of
federal facilities.; Name of working group, status, and products
drafted or Issued: No information in ISC records.
Responsibility: Develop and evaluate security standards for federal
facilities, develop a strategy for ensuring compliance with such
standards, and oversee the implementation of appropriate security
measures in federal facilities.; Name of working group, status, and
products drafted or Issued: Five working groups established: (1)
Security Standards for Federal Facilities, established in 1995. No
records of products issued; working group inactive in July 2002. (2)
Oversee Implementation of Security Measures, established in 1995; no
record of products issued by ISC; working group inactive in July 2002.
(3) Protective Forces at Federal Facilities, established 1996; no
record of products issued by ISC; working group inactive in July 2002.
(4) Working group formed in June 2000 to address improving building
access procedures. Issued Minimum Standards for Federal Building Access
Procedures in 2001; working group inactive in July 2002. (5) Working
group formed April 2002 to address security of leased space; working
group active.
Responsibility: Take such actions as may be necessary to enhance the
quality and effectiveness of security and protection of federal
facilities, including but not limited to:; Name of working group,
status, and products drafted or Issued: [Empty].
Responsibility: encouraging agencies with security responsibilities to
share security-related intelligence in a timely and cooperative manner;
Name of working group, status, and products drafted or Issued: Working
group established 1995: Responsibility of Sharing Security Related
Intelligence; no record of products issued by ISC; working group
inactive in July 2002.
Responsibility: assessing technology and information systems as a means
of providing cost-effective improvements to security in federal
facilities; Name of working group, status, and products drafted or
Issued: Working group established 1995: Technology and Information
Systems for Security Improvements and Centralized Data Base; made
recommendations on entry security technology and on preparedness for
nuclear, biological, and chemical events in 1997; working group
inactive in July 2002.
Responsibility: developing long-term construction standards for those
locations with threat levels or missions that require blast-resistant
structures or other specialized security requirements; Name of working
group, status, and products drafted or Issued: Three working groups
established in 1995: (1) Long-Term Construction Standards, issued ISC
Security Design Criteria for New Federal Office Buildings and Major
Modernization Projects in May 2001; working group still active. (2)
Court Security Issues: no record of products issued by ISC; working
group inactive in July 2002. (3) Specialty/ Unique Facilities: no
record of products issued by ISC; working group inactive in July 2002.
Responsibility: evaluating standards for the location of, and special
security related to, day care centers in federal facilities; Name of
working group, status, and products drafted or Issued: Working group
established 1995: People Issues (child care, agency collocation); no
record of products issued by ISC; working group inactive in July 2002.
Responsibility: assisting the Administrator in developing and
maintaining a centralized security database of all federal facilities;
Name of working group, status, and products drafted or Issued: Working
group established 1996: Information Systems and Centralized Data Base
(separated from Technology and Information Systems for Security
Improvements); no record of products issued by ISC; working group
inactive in July 2002.
Responsibility: funding.; Name of working group, status, and products
drafted or Issued: Working group established 1995: Funding Issues; no
record of products issued by ISC; working group inactive in July 2002.
Note: We have assigned the working groups to responsibilities based on
descriptions given about the working group in ISC records and the name
of the working group or its product. ISC records do not identify which
working group was formed to meet which responsibility.
Source: ISC documents and minutes of meetings and discussions with
agency personnel involved with ISC.
[End of table]
ISC members and participating agencies have identified various
strengths and weaknesses with the way in which ISC is structured and
has operated. As examples of ISC‘s strengths, several representatives
from agencies that attend ISC meetings identified the coordination,
communication, and sharing of information among agencies on security
issues; the ability to bring together diverse security and related
expertise to address problems; and the ability to interface with the
private sector.
The reported weaknesses could help explain why ISC has made limited
progress toward meeting some of the responsibilities given to it by the
executive order. Agency representatives identified several weaknesses,
including a lack of consistent and aggressive leadership by GSA and
inadequate staff support and funding, that they said have limited ISC‘s
effectiveness. GSA‘s lack of aggressive leadership and support were
illustrated by the following:
* No charter or operating procedures been issued. The ISC perceived the
need for a charter and operating procedures, and ISC meeting minutes in
1997 indicated that a charter was ready for the GSA Administrator‘s
signature and that GSA would draft standard operating procedures to
implement the charter. Nevertheless, we found no record of an approved
charter or any operating procedures. Several ISC participants expressed
concerns about ISC‘s decisionmaking. These concerns included their
perception of ISC‘s difficulty in making decisions, the lack of agreed-
upon policies and procedures on voting and decisionmaking, and the
limited amount of influence given to smaller agencies as compared with
the larger ones.
* Although ISC has met 14 times since its inception in 1995, no
meetings were held for an approximately 18 month period, from November
1998 to June 2000.[Footnote 9]
* GSA assigned one FPS staff member to support ISC for the past several
years, and this individual supported ISC only on a part-time basis, in
addition to his other duties. According to this individual, ISC had no
independent funding. According to a former GSA official involved with
ISC, the lack of sufficient staff support and budget have adversely
affected ISC‘s success.
* Some ISC representatives point to the long time it took GSA to issue
security design criteria as an example of GSA‘s lack of leadership and
support. Although the design criteria were unanimously approved by ISC
(including GSA) in 1998, they were not officially released until May
2001. The former GSA official who delayed issuance of the security
design criteria said that although he did not know whether he had the
authority to delay issuance, he did so because he believed that the
criteria were too prescriptive and would adversely affect GSA‘s ability
to obtain properties. According to this official, GSA also did not
establish clear lines of authority within GSA concerning ISC, and did
not try hard enough to make ISC work.
* In 1997, ISC agreed to seek full membership for the USPS and the
Social Security Administration (SSA). The ISC Chairman agreed to
initiate the process of formally accepting these two as new members.
Although representatives from the USPS and SSA served on working
groups, they could not vote on ISC issues because the executive order
creating ISC did not specify these agencies as members. Although a GSA
official told us that this issue was discussed with OMB, he said that
GSA did not follow through on having the executive order changed to add
new members because GSA perceived it as a long, drawn-out process.
* Although ISC issued annual reports for 1996 and 1997 discussing such
matters as security enhancements at federal buildings and the status of
various ISC working groups, it has not issued annual reports for the
years after 1997--limiting information about ISC efforts. Furthermore,
we found no evidence that ISC has established performance goals or
measures that would enable it to determine the extent to which one of
its major objectives--enhancing the quality and effectiveness of
federal facility security--has been achieved.
* We found no records, and, when asked, GSA was unable to provide any
documents indicating that either GSA or ISC monitored federal agency
compliance with ISC‘s policies and recommendations, even though both
had been charged with this responsibility.
More recently, under GSA‘s leadership, ISC has recognized that its
success had been constrained by a number of factors; it has been
working to revitalize the committee to meet its responsibilities in
light of the September 11, 2001, terrorist attacks. At a December 2001
conference and in a December 2001 follow-up letter, a GSA official
stated that GSA is committed to reinvigorating ISC. On April 26 and
June 27, 2002, ISC had the first two business meetings in its
revitalization effort. At these meetings, ISC identified the need to
address general ISC issues, such as a charter, voting protocol, and a
new membership process. It also discussed ISC operating procedures and
agreed to meet quarterly unless an emergency meeting were needed. GSA
announced that it was seeking a full-time staff person to plan and
coordinate ISC‘s efforts.
On the programmatic side, in December 2001, GSA, ISC and the American
Institute of Architects participated in a conference entitled Better
Security-Better Design. At its April and June 2002 business meetings,
ISC established a working group to develop security standards for
leased space, and GSA and the State Department agreed to share their
alert systems with the other agencies; ISC representatives also
discussed a number of topics, such as creating one document that would
provide security criteria for new buildings, existing buildings, child
care centers, and leased space, and reducing duplication of effort
between ISC and other groups in the government looking at security
issues.
Implications of the Creation of DHS on ISC:
The creation of a DHS would have significant implications for ISC and
its responsibilities. While the need for ISC, or an organization like
ISC, would likely continue with the creation of a DHS, leadership
responsibility for ISC could shift from GSA to DHS, and ISC‘s
responsibilities, role, membership and operation could change.
Concerning ISC‘s continued existence, the need for an organization like
ISC would likely continue for several reasons. The proposed legislation
by the President and both houses of Congress calls for DHS‘s mission to
include security for and protection of the nation‘s critical
infrastructure. Over 30 federal agencies have authority to own or
acquire real property for which they have security-related
responsibilities. Various agencies, such as the Departments of the
Treasury (Treasury) and Veterans Affairs (VA), have independent police
forces. It would be difficult for DHS to develop and implement policies
and standards for the security of federal facilities without the
participation and assistance of the federal organizations that own and
occupy the facilities, given their large number, their variety, and
their dispersion.
The President‘s DHS proposal as well as the DHS bills being considered
in Congress would move FPS from GSA to DHS. With respect to the ISC‘s
leadership, such a move would likely mean that the ISC chairmanship
would shift from GSA to DHS if FPS were moved, since GSA would no
longer have the security role of FPS. Should this occur, DHS could
decide to seek a change in ISC‘s role, or the law creating DHS could
necessitate changes in ISC‘s role. The President‘s proposal and S. 2452
did not specifically address whether DHS‘s security responsibilities
for facilities would include more than just buildings that are GSA-
owned or -occupied. However, H.R. 5005, as passed by the House of
Representatives, provides that the DHS Secretary ’shall protect the
buildings, grounds and property that are owned, occupied, or secured by
the Federal Government (including any agency, instrumentality, or
wholly owned or mixed-ownership corporation thereof) and the persons on
the property.“[Footnote 10] This could include facilities controlled by
the Department of Defense (DOD), Congress, and the Judiciary. Thus, if
such a provision were included in the legislation that is enacted, DHS
would have significantly greater authority and responsibility than GSA
currently has for federal property security, and the nature of the
relationship between the ISC Chair and ISC member agencies would
change. This is because the GSA Administrator currently does not have
direct authority or responsibility for security for federal property
that GSA does not own or acquire by lease; under H.R. 5005, the DHS
secretary would have direct authority and responsibility for security
governmentwide. Moreover, the DHS Secretary, in consultation with the
GSA Administrator, could issue and enforce policies and standards
governmentwide; the GSA Administrator needs the auspices of ISC to do
this for buildings not under GSA‘s control.
It appears that ISC‘s role after DHS is established would depend
largely on the role that DHS‘s authorizing legislation assigns to DHS
for federal facility security, which differs in pending legislation, as
well as how DHS would decide to use the ISC or groups similar to ISC.
For example, if DHS were given direct overall responsibility for the
full range of federal security functions, it would appear that ISC or a
similar group would play more of an advisory/information-sharing role.
On the other hand, if DHS were directly responsible for security only
for GSA-owned and -leased space, then the ISC or a similar group might
continue to make decisions for other owned or leased space. In
addition, the specific nature of the responsibilities given to DHS
would affect the ISC. For example, DHS‘s responsibilities for federal
facility security could include one or more of the following:
policymaking, standard setting, decisionmaking, training, planning,
information/intelligence sharing, providing day-to-day security
protection, and oversight. The challenge of having DHS be directly
responsible for all of these functions for all federal facilities would
have to be considered. For those functions given to DHS, it would have
to decide which functions it would perform, which ones it might
delegate to the organization previously responsible, and which ones
would be appropriate for an organization like the ISC. The specific
language of the final legislation creating DHS and how it addresses
this issue would obviously affect ISC‘s future role.
Another possible responsibility ISC could have under a newly
established DHS would be to assist DHS in carrying out the initiatives
contained in the July 2002 Office of Homeland Security‘s National
Strategy for Homeland Security as they relate to critical
infrastructure. For example, ISC could assist in performing and
maintaining a complete and accurate assessment of the nation‘s critical
federal facilities and related infrastructure and in developing a
national infrastructure protection plan for federal facilities.
According to the strategy, this would include establishing standards
and benchmarks for infrastructure protection and providing a means for
measuring performance as related to federal facilities. In addition,
the ISC could have a role in assisting DHS to carry out its
intelligence-related responsibilities, including the sharing of threat
and risk information, as they relate to federal facilities.
Still another responsibility that could be considered for ISC is the
security protection that is provided to executive branch officials. In
July 2000, we reported that responsibility for this was divided among
many agencies, and no single agency or official was responsible for
handling issues related to the routine protection of these
officials.[Footnote 11] We said that from fiscal years 1997 through
1999, agencies reported that personnel from 27 different agencies
protected officials holding 42 executive branch positions in 31
executive branch agencies. The problems we found included lack of
specific statutory authority to provide protection, lack of
standardized threat assessments and training, and lack of a federal
organization responsible for overseeing this function on a
governmentwide basis. We recommended that the OMB Director, in
consultation with the President, designate an official or group to
assess issues related to security protection for executive branch
officials. In early 2002, an OMB representative told us that OMB had
not yet acted on our recommendation and that the Office of Homeland
Security (OHS) might be the appropriate organization to handle this
issue. Thus, this could also be an appropriate responsibility for DHS
and ISC.
After ISC‘s future role and responsibilities are determined, such
issues as membership, operating procedures, and funding and support
needs would have to be assessed. These could entail looking at the
factors and issues that we and the agency representatives had
identified as contributing to limited progress by ISC as it has existed
prior to DHS, to see whether the actions initiated by GSA addressed
them sufficiently or needed to be modified or enhanced. These include
ISC‘s charter, operating procedures, decisionmaking process,
membership, meeting schedule, funding and support, and performance
goals and measures. For example, if DHS becomes responsible for all the
facilities provided in H.R. 5005, it may be appropriate to add other
organizations besides the USPS and SSA to ISC, including government
corporations. For another example, GSA has said that it was seeking a
full-time staff member to support ISC. DHS would have to determine
whether one person would be sufficient to meet DHS‘s objectives and
schedule for ISC.
Another important responsibility that would have to be considered is
integration between security and the facility management functions.
Under DHS proposals, DHS would be responsible for property security,
but GSA and other agencies with authority to own or acquire space would
retain their responsibilities for such functions as choosing facility
locations and building design and operation. In addition, agencies will
still have to ensure that each property adequately and effectively
supports the mission of the occupying agency or other government entity
and that any security systems, procedures, or devices implemented at a
facility do not materially hamper the ability of the entity to carry
out its mission effectively.
We and a GSA official have both testified that security is a key
facilities management function: security needs to be integrated into
decisions about location, design and operation of federal
facilities.[Footnote 12] Further, in testifying on a proposal to make
FPS a separate service within GSA, GSA stated that such an action would
divorce security from other federal facility functions. According to
GSA, separating FPS from PBS would create an organizational barrier
between protection experts and the PBS asset managers, planners, and
other staff who set PBS budgets and policies for GSA‘s building
inventory. GSA said that FPS‘s budget, personnel actions, and
operational focus have been centralized to yield results that are
better than if FPS were separate. Additional concerns were raised about
security and the facilities management function in a November 1999
Symposium on Security and the Design of Public Buildings, which was
jointly sponsored by GSA and the Department of State (DOS) in
cooperation with the American Institute of Architects. Presenters
concluded that public building design processes must find innovative
ways to improve security and protect American values without creating a
fortress image. Thus, if DHS becomes responsible for the security of
federal facilities, DHS would likely not only need a mechanism like ISC
to work with GSA and other federal entities on security-related
matters; it would also need a way to ensure that building security and
other facility management functions are integrated. An organization
like ISC that comprises the affected entities could serve to promote
such integration.
Finally, in commenting on a draft of this report, DOS‘s Senior Advisor
in DOS‘s Office of Diplomatic Security raised another issue he believed
would be relevant for DHS‘s creation. This issue related to the
existing delegations of authority from GSA to various agencies that
enable them to provide their own facility protection. He believes that
these delegations are important elements of the government‘s efforts to
protect its facilities that ISC and DHS need to consider.
Conclusions:
Although ISC has carried out some of its responsibilities, it has made
little progress on others, and several participants believe that its
progress has been limited. Agency officials and ISC participants
identified factors and issues in areas such as membership, leadership,
charter, operating procedures, decisionmaking processes, meeting
frequency, and staffing and funding support that they believe have
limited ISC‘s progress. We also noted that ISC lacks performance goals
and measures. GSA has acknowledged the lack of consistent and
aggressive leadership by GSA, inadequate staff support and funding for
the ISC, and ISC‘s difficulty in making decisions and has initiated
efforts to address them. However, it is too early to tell whether these
efforts will be sufficient.
With the potential creation of a DHS, the need for ISC, or an
organization like ISC, would likely continue. The creation of DHS would
have significant implications for ISC and its responsibilities. ISC‘s
leadership, responsibilities, role, membership, and operation could
change. To deal with these possible changes, the factors and issues
that affected ISC‘s progress prior to the creation of DHS should be
considered, including the extent to which GSA has addressed these
issues. DHS‘s creation and assignment of responsibility for federal
facility security would also necessitate the need to consider how best
to integrate facility security and the other facility management
functions. Further, DHS‘s creation would raise the issue whether DHS
and ISC should be given responsibility for security protection for
executive branch officials. Finally, how Congress ultimately decides
upon DHS‘s role for federal facility security in any legislation to
create DHS would have significant implications for ISC, DHS, and other
federal agencies.
Recommendations for Executive Action:
In the short term, we recommend that the Administrator of GSA work with
ISC to ensure that actions are effectively implemented to correct the
problems identified with ISC in this report. Furthermore, given that
OMB is a current member of ISC and has been given responsibility for
heading the government‘s efforts to help establish DHS,[Footnote 13] we
recommend that the Director of OMB work with DHS, GSA, and other
appropriate entities to ensure that the issues our review has
identified are addressed by the appropriate agency or agencies that
will have the responsibility of overseeing the protection of federal
facilities and executive branch officials.
Matter for Congressional Consideration:
As Congress continues its deliberations on proposed legislation
creating DHS, it may want to clarify DHS‘s jurisdiction with respect to
the federal organizations under its purview and the specific security-
related functions for which it is responsible. Federal organizations
under DHS‘s jurisdiction could range from, exclusively, the federal
buildings now under GSA‘s control to all facilities owned, occupied, or
secured by the federal government. Limiting DHS‘s jurisdiction to
exclusively GSA-controlled properties would leave out many nonmilitary
facilities, while extending it to all property owned or occupied by the
federal government would be an enormous undertaking. The functions for
which DHS could assume responsibility could include policy and standard
setting, training, information and intelligence sharing, planning and
oversight, and the actual provision of security services. In deciding
which security-related functions DHS should be responsible for
providing, two factors for Congress to consider are the need for
integrating the security function with the day-to-day management of the
facility and the challenge that would be associated with providing day-
to-day security for all federally owned, occupied, or secured
facilities.
Scope and Methodology:
To achieve our objective of determining whether ISC had fulfilled the
duties and responsibilities established by the executive order, we
reviewed Executive Order 12977, the minutes of ISC meetings, and
available products developed by ISC. We also interviewed 17 of 21
members and participating nonmembers of ISC; FPS officials; and both
current and former GSA officials. Further, we attended the December
2001 and the April and June 2002 ISC meetings. We did not interview the
Central Intelligence Agency‘s officials, because the agency declined to
participate in our assignment. Also, we did not interview the Assistant
to the President for National Security Affairs because, being new to
the position, this person had limited knowledge of ISC and its past
efforts. Further, our report does not reflect any comments from OMB
about ISC‘s current or past operations, because an OMB official said
that OMB had not attended meetings in the past several years and did
not have time-relevant information to provide us on these matters. We
did not interview the Director of the Security Policy Board because it
has been abolished. Further, responses from several agencies were
limited by the fact that ISC representatives were new or had not
attended meetings in several years. Our review of ISC accomplishments
was constrained by the lack of detailed ISC records after 1997 and by
the turnover of agency personnel who participated in ISC activities.
Thus, our reporting of accomplishments was based on available ISC
records and the recollections of those persons whom we interviewed who
had varying lengths of experience with ISC.
To determine the implications of the creation of DHS on ISC, we
reviewed the President‘s proposal to create DHS, proposed legislation
that would create DHS, the OHS‘s July 2002 National Strategy, Executive
Order 13267, and our July 2001 report on security protection for
executive branch officials. We also discussed this issue with
representatives from OMB, GSA, and OHS.
We conducted our review of ISC between December 2001 and July 2002 in
accordance with generally accepted government auditing standards. We
received written responses from 3 agencies; oral or E-mail comments
from 14 agencies; and 4 agencies did not respond. The comments are
discussed in the following section.
Agency Comments:
We requested comments on a draft of this report from the OMB Director,
the Administrator of GSA, OHS‘s General Counsel, and ISC agencies
participating in our review. We received written responses on our draft
report from the Departments of Health and Human Services (HHS) and
Housing and Urban Development (HUD), and from SSA. HHS had no comments.
HUD and SSA generally agreed with the report‘s conclusions and
recommendations. We received oral or E-mail responses on our draft
report from GSA; the Administrative Office of the United States Courts
(AOUSC); DOD; DOJ; DOS; Treasury; VA; the Departments of Education
(Education), Energy (DOE), Labor (DOL), Transportation (DOT), and
Agriculture (USDA); OMB; and USPS. GSA, DOE, DOL, USDA, USPS, and VA
concurred with the information in our report. AOUSC, Education, DOD,
DOJ, DOT, and Treasury had no comments. OMB agreed with our
recommendation and suggested technical changes that we have made. DOS
raised several issues, which we discuss below. The DOC, Interior, EPA,
and OHS did not provide comments on the report.
GSA‘s Commissioner of the Public Buildings Service said that he
concurred with our recommendation and our view that a full resolution
of the ISC issues we identified depended on the mission and authorities
given to DHS. He also said that GSA would seek ISC member comments on
our report at its next meeting and would consult with OMB officials and
the DHS transition planning office to address the future role of the
ISC within the context of DHS.
SSA‘s Commissioner raised two issues that SSA believes the ISC needs to
consider. These are the role of the federal facilities building
security committees and the need to integrate the term ’force
protection“ into the ISC charter and operating procedures. While these
issues may be reasonable for ISC to consider, we did not address them
in our review and are not in a position to discuss them definitively.
(See app. V.):
DOS‘s Senior Advisor in the Office of Diplomatic Security raised a
question about our discussion that the ISC assume some role in security
protection of executive branch officials, considering the ISC‘s
responsibility for facility security. Our discussion on this issue
related to both DHS and ISC. If DHS is created, a role in the
protection of executive branch officials may be appropriate. He also
suggested that we provide the basis for this discussion in this report.
The basis is discussed in our report and relates to work we have
previously reported on in a separate review. He also expressed concern
about the lack of reference in our report to GSA‘s delegation of
authority to various agencies, to enable them to provide their own
facility protection. Although our report pointed out these delegations,
we have modified it to reflect his concern. He also recommended a
technical change, which we have made.
DOS‘s Director of the Office of Domestic Operations said that offices
responsible for safety and security often have opposing views and that,
in his opinion, any mechanism established to integrate security into
federal facilities should include safety offices. We did not address
this issue in our review and are therefore not in a position to comment
on it. He also pointed out the there are other entities currently
working on federal facility security issues, such as the Physical
Security Working Group and the Protective Forces Working Group, which
should be included under the DHS or ISC umbrella or should have a
specific separate mandate. While we did not address the roles of these
two groups, this appears to be a reasonable issue for DHS or ISC to
address.
As agreed with your office, unless you publicly announce the contents
of this report, we plan no further distribution until 7 days from the
report date. At that time, we will send copies of this letter to the
Ranking Minority Member of the Senate Committee on Governmental
Affairs, other appropriate congressional committees, the Director of
OMB, the Administrator of GSA, OHS, and other interested organizations.
We will also make copies available to others upon request. In addition,
the report will be available at no charge on the GAO Web site at http:/
/www.gao.gov.
Please contact Ron King or me at (202) 512-2834. Major contributors to
this report are acknowledged in appendix VI.
Bernard L. Ungar
Director, Physical Infrastructure Issues:
Signed by Bernard L. Ungar:
[End of section]
Appendix I: Executive Order 12977 of October 19, 1995:
The President:
Interagency Security Committee:
By the authority vested in me as President by the Constitution and the
laws of the United States of America, and in order to enhance the
quality and effectiveness of security in and protection of buildings
and
facilities in the United States occupied by Federal employees for
nonmilitary
activities (…‘Federal facilities‘‘), and to provide a permanent body to
address continuing government-wide security for Federal facilities, it
is hereby ordered as follows:
Section 1. Establishment. There is hereby established within the
executive branch the Interagency Security Committee (…‘Committee‘‘).
The Committee shall consist of: (a) the Administrator of General
Services (…‘Administrator‘‘);
(b) representatives from the following agencies, appointed by the
agency
heads:
(1) Department of State;
(2) Department of the Treasury;
(3) Department of Defense;
(4) Department of Justice;
(5) Department of the Interior;
(6) Department of Agriculture;
(7) Department of Commerce;
(8) Department of Labor;
(9) Department of Health and Human Services;
(10) Department of Housing and Urban Development;
(11) Department of Transportation;
(12) Department of Energy;
(13) Department of Education;
(14) Department of Veterans Affairs;
(15) Environmental Protection Agency;
(16) Central Intelligence Agency; and
(17) Office of Management and Budget;
(c) the following individuals or their designees:
(1) the Director, United States Marshals Service;
(2) the Assistant Commissioner of the Federal Protective Service of the
Public Buildings Service, General Services Administration (…‘Assistant
Commissioner‘‘);
(3) the Assistant to the President for National Security Affairs; and
(4) the Director, Security Policy Board; and
(d) such other Federal employees as the President shall appoint.
Sec. 2. Chair. The Committee shall be chaired by the Administrator, or
the designee of the Administrator.
Sec. 3. Working Groups. The Committee is authorized to establish
interagency working groups to perform such tasks as may be directed by
the Committee.
Sec. 4. Consultation. The Committee may consult with other parties,
including the Administrative Office of the United States Courts, to
perform its responsibilities under this order, and, at the discretion
of the Committee, such other parties may participate in the working
groups.
Sec. 5. Duties and Responsibilities. (a) The Committee shall:
(1) establish policies for security in and protection of Federal
facilities;
(2) develop and evaluate security standards for Federal facilities,
developa strategy for ensuring compliance with such standards, and
oversee theimplementation of appropriate security measures in Federal
facilities; and
(3) take such actions as may be necessary to enhance the quality and
effectiveness of security and protection of Federal facilities,
including butnot limited to:
(A) encouraging agencies with security responsibilities to share
security-related intelligence in a timely and cooperative manner;
(B) assessing technology and information systems as a means of
providing cost-effective improvements to security in Federal
facilities;
(C) developing long-term construction standards for those locations
with threat levels or missions that require blast resistant structures
or
other specialized security requirements;
(D) evaluating standards for the location of, and special security
related to, day care centers in Federal facilities; and
(E) assisting the Administrator in developing and maintaining a
centralized security database of all Federal facilities.
Sec. 6. Agency Support and Cooperation. (a) Administrative Support. To
the extent permitted by law and subject to the availability of
appropriations, the Administrator, acting by and through the Assistant
Commissioner, shall provide the Committee such administrative services,
funds, facilities, staff and other support services as may be necessary
for the performance of its functions under this order.
(b) Cooperation. Each executive agency and department shall cooperate
and comply with the policies and recommendations of the Committee
issued pursuant to this order, except where the Director of Central
Intelligence determines that compliance would jeopardize intelligence
sources and methods. To the extent permitted by law and subject to the
availability of appropriations, executive agencies and departments
shall provide such support as may be necessary to enable the Committee
to perform its duties and responsibilities under this order.
(c) Compliance. The Administrator, acting by and through the Assistant
Commissioner, shall be responsible for monitoring Federal agency
compliance with the policies and recommendations of the Committee.
Sec. 7. Judicial Review. This order is intended only to improve the
internal management of the Federal Government, and is not intended, and
should not be construed, to create any right or benefit, substantive or
procedural, enforceable at law by a party against the United States,
its agencies, its officers, or its employees.
Ï–:
THE WHITE HOUSE,
October 19, 1995.
[FR Doc. 95-26497
Filed 10-20-95; 2:55 pm]
Billing code 3195-01-P:
[End of section]
Appendix II: Federal Executive Branch Entities with Some Level of
Independent Authority to Acquire Real Property:
This information is from Facilities Location: Agencies Should Pay More
Attention to Cost and Rural Development Act, GAO-01-805, July 31, 2001.
Agency for International Development
American Battle Monuments Commission
Appalachian Regional Commission
Bonneville Power Administration
Broadcasting Board of Governors
Central Intelligence Agency
Department of Agriculture
Department of Commerce
Department of Defense
Department of Education
Department of Energy
Department of Health and Human Services
Department of Housing and Urban Development
Department of the Interior
Department of Justice
Department of Labor
Department of State
Department of Transportation
Department of the Treasury
Department of Veterans Affairs
Environmental Protection Agency
Federal Emergency Management Agency
General Services Administration
National Aeronautics and Space Administration
National Archives and Record Administration
National Science Foundation
National Transportation Safety Board
Panama Canal Commission
Pennsylvania Avenue Development Corporation
Securities and Exchange Commission
Smithsonian Institution
Tennessee Valley Authority
U.S. Parole Commission
U.S. Postal Service
U.S. Sentencing Commission
U.S. Trade Representative:
[End of section]
Appendix III: Definition of Security Levels I through V, from DOJ‘s
Vulnerability Assessment of Federal Facilities:
Level I:
A level I facility has 10 or fewer federal employees. In addition, the
facility likely has 2,500 or less square feet of office space and a low
volume of public contact or contact with only a small segment of the
population. A typical level I facility is a small storefront-type
operation, such as a military recruiting office.
Level II:
A level II facility has between 11 and 150 federal employees. In
addition, the facility likely has from 2,500 to 80,000 square feet; a
moderate volume of public contact; and federal activities that are
routine in nature, similar to commercial activities. A typical level II
building is the Social Security Administration Office in El Dorado,
Colorado.
Level III:
A level III facility has between 151 and 450 federal employees. In
addition, the facility likely has from 80,000 to 150,000 square feet
and a moderate to high volume of public contact. Tenant agencies may
include law enforcement agencies, courts and related agencies and
functions, and government records and archives. A typical level III
building is the Pension building, a multitenant, historical building
between 4th and 5th Streets on F Street, N.W., Washington, D.C.
Level IV:
A level IV facility has over 450 federal employees. In addition, the
facility likely has more that 150,000 square feet; a high volume of
public contact; and tenant agencies that may include high-risk law
enforcement and intelligence agencies, courts, judicial offices, and
highly sensitive government records. A typical level IV building is the
Department of Justice Building on Constitution Avenue in Washington,
D.C.
Level V:
A level V facility is a building such as the Pentagon or CIA
Headquarters that contains mission functions critical to national
security. A level V facility will be similar to a level IV facility in
terms of number of employees and square footage.
[End of section]
Appendix IV: ISC Participant-Identified Strengths and Weaknesses:
Table 2 shows the strengths identified by the participating agencies or
by their representatives to ISC. Table 3 shows the weaknesses
identified by the agencies or by their ISC representatives.
Table 2: ISC Strengths Identified by Participating Agencies or by ISC
Agency Representatives:
ISC participants‘ comments: Coordination and cooperation among federal
departments, when utilized appropriately.
ISC participants‘ comments: Provides a forum for discussing issues,
networking, and assistance in making agency security determinations.
ISC participants‘ comments: Provided a forum for exchanging ideas and
practices.
ISC participants‘ comments: Continued support of the Administration and
coordination efforts with the new Office of Homeland Security.
ISC participants‘ comments: A forum for interagency coordination of
security requirements.
ISC participants‘ comments: The broad composition of membership allows
meaningful communication among high levels of federal agencies on
topics of shared and mutual concern. ISC‘s activities should result in
effective coordination of policy and operational protocol for security
in and protection of federal facilities.
ISC participants‘ comments: Ability to bring a very wide and diverse
range of professional expertise together to address security issues
that affect the federal government. Ability as a group to interface
with and positively affect state and local agencies.
ISC participants‘ comments: Brings agencies together to work on
consensus on security issues.
ISC participants‘ comments: The group is widely diverse and there is
expertise in almost all security arenas. Also, participants are up-to-
date on the newest technology. They also interface with the private
sector, so there is coordination on security issues. This is
particularly important in the area of leased buildings.
ISC participants‘ comments: Something like ISC is needed as a forum to
bring up and discuss problems, make recommendations, gather
information, and so forth. ISC can reach a lot of people quickly.
ISC participants‘ comments: ISC has brought governmentwide security
community together and provides a forum where security ’best practices“
can be exchanged, security innovations are presented, and policies are
developed. These efforts promote a consistent and uniform approach to
how the federal government ensures a secure environment for its
employees.
ISC participants‘ comments: There is potential for this committee to
provide a permanent body to address continuing governmentwide security
for federal facilities.; * Lessons learned are exchanged by committee
members on security experiences within their government agencies.; *
Potential exists to improve communications and intelligence-sharing
with other federal agencies.; * Committee brings high-level government
professionals together to focus on the security needs of all federal
agencies.; * This committee attempts to address and meet the
requirements of the Executive Order 12977.
ISC participants‘ comments: Served as a forum for discussing and
resolving security issues common to all federal agencies.
ISC participants‘ comments: Brings all federal agencies together.
ISC participants‘ comments: Executive Order 12977 provides ISC with the
authority and responsibility to develop and issue uniform security
policies for implementation by federal agencies.
ISC participants‘ comments: ISC has representation from throughout the
Executive Branch and offers a venue for GSA to offer new security
guidelines and recommendations for interagency review and comment. It
also initially provided a means for information dissemination
immediately following the Oklahoma City bombing of the federal
building--a role since taken over by the Federal Bureau of
Investigation, to share threat data information.
ISC participants‘ comments: ISC‘s strength lies in that it provides an
opportunity to harness federal ideas and find reasonable solutions to
problems. This has been especially important since Oklahoma City.
Note: Each block represents comments from an ISC participant. However,
not all ISC participating agencies are represented in the tables,
because one agency did not respond to our questions, one agency said it
had no time-relevant data with which to answer our questions, one
agency had a new ISC representative who did not comment on strengths
and weaknesses, one agency had no positive comments, and two agencies
did not comment on the weaknesses.
Source: Oral and written comments received from agencies and their ISC
representatives.ISC Weaknesses Identified by Participating Agencies or
by ISC Agency Representatives:
Note: Each block represents comments from an ISC participant. However,
not all ISC participating agencies are represented in the tables,
because one agency did not respond to our questions, one agency said it
had no time-relevant data with which to answer our questions, one
agency had a new ISC representative who did not comment on strengths
and weaknesses, one agency had no positive comments, and two agencies
did not comment on the weaknesses.
Source: Oral and written comments received from agencies and their ISC
representatives.
[End of table]
[End of section]
Appendix V: Comments from the Social Security Administration:
SOCIAL SECURITY:
The Commissioner:
August 29, 2002:
Mr. Bernard L. Ungar:
Director, Physical Infrastructure Issues U.S. General Accounting Office
Washington, D.C. 20548:
Dear Mr. Ungar:
Thank you for the opportunity to review and comment on the draft
report, ’Building Security: Interagency Security Committee Has Had
Limited Success in Fulfilling Its Responsibilities“ (GAO-02-1004). Our
comments on the report are enclosed. If you have any questions, please
have your staff contact Trudy Williams at (410) 965-0380.
Sincerely,
Jo Anne B. Barnhart:
Signed by Jo Anne B. Barnhart:
Enclosure:
SOCIAL SECURITY ADMINISTRATIONBALTIMORE MD 21235-0001:
COMMENTS OF THE SOCIAL SECURITY ADMINISTRATION (SSA) ON THE GENERAL
ACCOUNTING OFFICE (GAO) DRAFT REPORT, ’BUILDING SECURITY: INTERAGENCY
SECURITY COMMITTEE HAS HAD LIMITED SUCCESS IN FULFILLING ITS
RESPONSIBILITIES“ (GAO-02-1004):
Recommendation 1:
GAO recommends that the Administrator of the General Services
Administration (GSA) work with the Interagency Security Committee (ISC)
to ensure that actions are effectively implemented to correct the
problems identified with ISC in the report. Furthermore, given that
Office of Management and Budget (OMB) is a current member of ISC and
has been given responsibility for heading the Government‘s efforts to
help establish the Department of Homeland Security (DHS), OMB appears
to be the appropriate agency to work with DHS, GSA, and other
appropriate entities to address the issues GAO‘s review has identified.
As part of its transition efforts to help establish the proposed DHS,
GAO recommends that the Director of OMB work with the Administrator of
GSA and other relevant Federal officials: to determine the appropriate
leadership, responsibilities, and the role for ISC, or its successor;
to take the steps necessary to see that ISC, or its successor, has an
appropriate charter, operating procedures, membership, and decision-
making process, meeting schedule, staffing and funding support, and
performance goals and measures; and to provide for the integration of
security with other facility management functions. GAO also recommends
that the Director of OMB, consistent with relevant legislation,
determine whether DHS and ISC, or its successor, are the appropriate
entities to oversee the security protection of executive branch
officials and, if so, see that this responsibility is clearly assigned
and effectively implemented.
Comment:
We agree with GAO‘s recommendations. The ISC should support the
initiatives on the starting points of contact with foreign nationals,
with the goal of protecting the nation‘s borders by assisting the DHS
in addressing physical security and critical infrastructure
requirements to prevent the entry of terrorists. This must be done
while not obstructing the legal, efficient and reliable flow of
persons, goods and services on which the economy depends.
Other Comments:
We want to highlight the comment on page 11, the second bullet,
sentences 1 and 2, that states, ’In 1997, ISC agreed to seek full
membership for the U.S. Postal Service and the Social Security
Administration (SSA)-two large federal organizations. The ISC Chairman
agreed to initiate the process of formally accepting these two as new
members.“ To date, we are still pursuing full membership in the ISC.
There is no reference in this report concerning the role the Federal
Facilities Building Security Committees should play in the process as
stated in the Department of Justice Vulnerability Assessment of Federal
Facilities, June 28, 1995: Page 4-3, (4.2.2).
This report has not addressed the need to integrate the term ’Force
Protection“ into the ISC charter and operating procedures. The DHS and
the ISC must network, coordinate and train. Furthermore, they must
understand the Department of Defense initiatives and the roles of
Emergency and First Responder Teams and local authorities in supporting
the Homeland Security objectives, Congressional Bills and the
Presidential agendas.
[End of section]
Appendix VI: Major Contributors:
Major contributors to this report include Ron King, Tom Keightley, Lisa
Wright-Solomon, John Vocino, Shirley Bates, and Michael Yacura.
[End of section]
FOOTNOTES
[1] The President‘s proposal to Congress, June 18, 2002, to create a
Department of Homeland Security; H.R. 5005, 107th Cong. (2002); S.
2452, 107th Cong. (2002).
[2] All current bills on the proposed creation of DHS would move the
Federal Protective Service from GSA to DHS. In addition to providing
security for GSA-owned and -occupied facilities, the Service also
provides the secretariat for ISC.
[3] The data on owned and leased space are taken from the GSA reports
Summary Report of Real Property Owned, June 2001, and Summary Report on
Real Property Leased, June 2001. We issued a report, U.S. General
Accounting Office, Federal Real Property: Better Governmentwide Data
Needed for Strategic Decisionmaking, GAO-02-342 (Washington, D.C.: Apr.
16 2002), concerning the accuracy of the data in GSA‘s report, Summary
Report of Real Property Owned. However, although we reported that some
of the data are outdated or incomplete, the GSA reports are the only
sources available that provide estimates of governmentwide ownership
and leasing.
[4] The reimbursable program provides security funding through payments
made by agencies assigned space in GSA-owned or -leased buildings.
[5] Appendix I contains a list of all ISC members. The Security Policy
Board no longer exists.
[6] Although funding was not listed specifically as a responsibility,
the executive order did not limit ISC to just those responsibilities
identified in the executive order.
[7] U.S. General Accounting Office, Security: Breaches at Federal
Agencies and Airports, GAO/T-OSI-00-10 (Washington, D.C.: May 25,
2000).
[8] There may have been other working groups formed. However, ISC‘s
records do not show evidence of any.
[9] Thirteen of these were regular ISC meetings. The other meeting was
a conference among ISC, GSA, and the members of the American Institute
of Architects in December 2001. There are no minutes of the June 2000
meeting, but a June meeting (no year stated) is mentioned in the
December 2000 ISC minutes. We included a June 2000 meeting in our
count.
[10] Section 2(a) of Section 906
[11] U.S. General Accounting Office, Security Protection:
Standardization Issues Regarding Protection of Executive Branch
Officials, GAO/GGD/OSI-00-139 (Washington, D.C.: July 11, 2000).
[12] U.S. General Accounting Office, Homeland Security: Proposal for
Cabinet Agency Has Merit, but Implementation Will be Pivotal to
Success, GAO-02-886T (Washington, D.C.: June 25, 2002). Statement of F.
Joseph Moravec, Commissioner of the Public Buildings Service, U.S.
General Services Administration before the Subcommittee on Technology
and Procurement Policy, Committee on Government Reform, U.S. House of
Representatives (November 1, 2001).
[13] Executive Order 13267 assigns OMB the responsibility of
establishing a Transition Planning Office for the Department of
Homeland Security.
GAO‘s Mission:
The General Accounting Office, the investigative arm of Congress,
exists to support Congress in meeting its constitutional
responsibilities and to help improve the performance and accountability
of the federal government for the American people. GAO examines the use
of public funds; evaluates federal programs and policies; and provides
analyses, recommendations, and other assistance to help Congress make
informed oversight, policy, and funding decisions. GAO‘s commitment to
good government is reflected in its core values of accountability,
integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through the Internet. GAO‘s Web site ( www.gao.gov ) contains
abstracts and full-text files of current reports and testimony and an
expanding archive of older products. The Web site features a search
engine to help you locate documents using key words and phrases. You
can print these documents in their entirety, including charts and other
graphics.
Each day, GAO issues a list of newly released reports, testimony, and
correspondence. GAO posts this list, known as ’Today‘s Reports,“ on its
Web site daily. The list contains links to the full-text document
files. To have GAO e-mail this list to you every afternoon, go to
www.gao.gov and select ’Subscribe to daily E-mail alert for newly
released products“ under the GAO Reports heading.
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. General Accounting Office
441 G Street NW,
Room LM Washington,
D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470:
Public Affairs:
Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S.
General Accounting Office, 441 G Street NW, Room 7149 Washington, D.C.
20548: