[House Hearing, 111 Congress]
[From the U.S. Government Printing Office]
CREATING ONE DHS: STANDARDIZING DEPARTMENT OF HOMELAND SECURITY
FINANCIAL MANAGEMENT
=======================================================================
HEARING
before the
SUBCOMMITTEE ON MANAGEMENT,
INVESTIGATIONS, AND OVERSIGHT
of the
COMMITTEE ON HOMELAND SECURITY
HOUSE OF REPRESENTATIVES
ONE HUNDRED ELEVENTH CONGRESS
FIRST SESSION
__________
OCTOBER 29, 2009
__________
Serial No. 111-42
__________
Printed for the use of the Committee on Homeland Security
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
Available via the World Wide Web: http://www.gpo.gov/fdsys/
__________
U.S. GOVERNMENT PRINTING OFFICE
57-850 PDF WASHINGTON : 2011
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC
area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC
20402-0001
COMMITTEE ON HOMELAND SECURITY
Bennie G. Thompson, Mississippi, Chairman
Loretta Sanchez, California Peter T. King, New York
Jane Harman, California Lamar Smith, Texas
Peter A. DeFazio, Oregon Mark E. Souder, Indiana
Eleanor Holmes Norton, District of Daniel E. Lungren, California
Columbia Mike Rogers, Alabama
Zoe Lofgren, California Michael T. McCaul, Texas
Sheila Jackson Lee, Texas Charles W. Dent, Pennsylvania
Henry Cuellar, Texas Gus M. Bilirakis, Florida
Christopher P. Carney, Pennsylvania Paul C. Broun, Georgia
Yvette D. Clarke, New York Candice S. Miller, Michigan
Laura Richardson, California Pete Olson, Texas
Ann Kirkpatrick,Arizona Anh ``Joseph'' Cao, Louisiana
Ben Ray Lujan, New Mexico Steve Austria, Ohio
Bill Pascrell, Jr., New Jersey
Emmanuel Cleaver, Missouri
Al Green, Texas
James A. Himes, Connecticut
Mary Jo Kilroy, Ohio
Eric J.J. Massa, New York
Dina Titus, Nevada
Vacancy
I. Lanier Avant, Staff Director
Rosaline Cohen, Chief Counsel
Michael Twinchek, Chief Clerk
Robert O'Conner, Minority Staff Director
______
SUBCOMMITTEE ON MANAGEMENT, INVESTIGATIONS, AND OVERSIGHT
Christopher P. Carney, Pennsylvania, Chairman
Peter A. DeFazio, Oregon Gus M. Bilirakis, Florida
Bill Pascrell, Jr., New Jersey Anh ``Joseph'' Cao, Louisiana
Al Green, Texas Daniel E. Lungren, California
Mary Jo Kilroy, Ohio Peter T. King, New York (Ex
Bennie G. Thompson, Mississippi (Ex Officio)
Officio)
Tamla T. Scott, Staff Director
Carla Zamudio-Dolan, Clerk
Michael Russell, Senior Counsel
Kerry Kinirons, Minority Subcommittee Lead
(II)
C O N T E N T S
----------
Page
Statements
The Honorable Christopher P. Carney, a Representative in Congress
From the State of Pennsylvania, and Chairman, Subcommittee on
Management, Investigations, and Oversight...................... 1
The Honorable Gus M. Bilirakis, a Representative in Congress From
the State of Florida, and Ranking Member, Subcommittee on
Management, Investigations, and Oversight...................... 2
The Honorable Bennie G. Thompson, a Representative in Congress
From the State of Mississippi, and Chairman, Committee on
Homeland Security:
Prepared Statement............................................. 3
Witnesses
Mr. James L. Taylor, Deputy Inspector General, Department of
Homeland Security:
Oral Statement................................................. 4
Prepared Statement............................................. 6
Ms. Kay L. Daly, Director, Financial Management and Assurance
Issues, Government Accountability Office:
Oral Statement................................................. 11
Prepared Statement............................................. 13
Ms. Peggy Sherry, Acting Chief Financial Officer, Department of
Homeland Security:
Oral Statement................................................. 20
Prepared Statement............................................. 22
CREATING ONE DHS: STANDARDIZING
DEPARTMENT OF HOMELAND SECURITY
FINANCIAL MANAGEMENT
----------
Thursday, October 29, 2009
U.S. House of Representatives,
Committee on Homeland Security,
Subcommittee on Management, Investigations,
and Oversight,
Washington, DC.
The subcommittee met, pursuant to call, at 10:00 a.m., in
Room 311, Cannon House Office Building, Hon. Christopher P.
Carney [Chairman of the subcommittee] presiding.
Present: Representatives Carney, Pascrell, Green, and
Bilirakis.
Mr. Carney [presiding]. The Subcommittee on Management,
Investigation, and Oversight will come to order. The
subcommittee is meeting today to receive testimony on
``Creating One DHS: Standardizing Department of Homeland
Security Financial Management.''
Good morning, all. Please let me begin by stating that this
subcommittee has rules, and everyone is expected to follow
those rules. One of those rules, Rule 6, Subsection D, Item 1,
states that all testimony will be received no later than 48
hours in advance of a hearing.
It appears that the Department has a hard time complying
with this rule from time to time. I know we have had a
discussion before the hearing started, but this will be my last
verbal warning to the Department. All testimony will be
received 48 hours in advance of a hearing, or it will not be
accepted.
I would like to thank Mr. Taylor and Ms. Daly for getting
their testimony in on time and apologize that they needed to
sit here while I admonished the Department.
In any event, okay, this hearing is the first in a series
of hearings the Subcommittee on Management, Investigations, and
Oversight will conduct regarding the Department of Homeland
Security's intention to create One DHS.
One DHS in part will be achieved by consolidating various
operational functions from the legacy agencies into Department-
wide systems. It has been 6 years since the Department was
established. It has yet to implement a Department-wide
integrated financial management system. DHS receives billions
of taxpayer dollars every year and to date has been unable to
account for a majority of their appropriated funding the same
way that other departments and agencies can.
Today's hearing will examine the Department's myriad
financial management systems, the steps the Department is
taking to unify its financial operations into one integrated,
standardized, auditable system, and best practices that will
ensure the Department's accounting methodologies will meet the
existing standards and protocols.
eMerge2, the Department's initial attempt at financial
management consolidation, was unsuccessful. Unfortunately, some
3 years and millions of dollars after the effort ceased, many
of the problems experienced as part of eMerge2 are being
experienced with the Department's current effort, the
Transformation and Systems Consolidation, or TASC program.
The problems include integrating the Department's myriad
financial systems, determining how the Department can construct
a system that will result in accurate and timely financial
data, and ascertaining how that the limited results of eMerge2
fit within the Department's current efforts.
The Government Accountability Office has suggested steps
the Department could take to ensure a successful TASC program,
as well as how TASC RFPs should be crafted in a way that will
ensure DHS is satisfied with the financial--excuse me--with a
final financial system and accounting system.
The Department has yet to show that it is taking any of
these recommendations into consideration. Today I hope to hear
how the Department will ensure that TASC is a success,
including a clear strategy that describes how it will be
implemented and linked to existing Department business
processes, policies, and legacy systems.
I want to thank the witnesses for their participation and
look forward to their testimony.
We will now hear from the Ranking Member, the gentleman
from Florida, Mr. Bilirakis.
Mr. Bilirakis. Thank you, Mr. Chairman. I appreciate it
very much.
I am pleased the subcommittee is meeting to consider the
Department of Homeland Security's financial management
oversight and consolidation efforts. The Department of Homeland
Security currently has 13 separate financial management
systems, down from 19 it inherited when the Department was
created in 2003. The separate financial systems result in
inconsistent data across the Department and in part contribute
to the Department's inability to obtain a clean audit of its
financial statement.
With respect to the TASC program, I am interested in
learning more about the Department's concept of operations and
migration strategy. I would also like to hear about the
Department's plans for contract oversight. This estimated cost
of the TASC contract is $450 million. As with other large
procurements at the Department, there is the possibility for
cost overruns.
It has also been suggested that this estimate understates
the total cost of this contract. By the time eMerge2 was
canceled, the Department had spent $52 million of the more than
$250 million estimated project cost. While the GAO indicated
that ending the program was prudent to cut losses, the
Department was left with little to show after such a large
expenditure.
It is my hope that the Department will use the lessons
learned from eMerge2 to ensure that the funding for TASC is
spent in the most efficient and effective way possible. I will
also note that while important, a consolidated financial system
is not a silver bullet to fix the Department's financial
management issues. The Department must have strong internal
controls in place and provide oversight over its people and
processes to ensure compliance with the relevant policies.
That said, I would like to welcome our witnesses here
today. I look forward to your insights on all of these issues.
I want to thank the Chairman. Thank you, and I yield back
the balance of my time.
Mr. Carney. I thank you, Mr. Bilirakis.
Seeing that the Chairman and Ranking Member aren't here,
other Members of the subcommittee are reminded that under
committee rules opening statements may be submitted for the
record.
[The statement of Chairman Thompson follows:]
Prepared Statement of Chairman Bennie G. Thompson
October 29, 2009
The Department of Homeland Security has one of the largest budgets
in the Federal Government.
Each year approximately $40 billion in appropriated funds flows in
and out of the Department.
Among other things, these funds are used to pay over 200,000
employees, provide disaster aid to States and local governments and
purchase the equipment used by those protecting our borders.
We owe it to taxpayers to ensure that these funds are appropriately
used, fully accounted for, and auditable.
Unfortunately, this is not the case at the Department of Homeland
Security.
Six years into several attempts at integrating its financial
management systems, and millions of dollars later, the Department is
still using thirteen different systems that cannot talk to each other,
that do not adequately reflect where funds are located and is unable to
let the Department of Treasury know, at any given moment, how much
money is left in the Department of Homeland Security budget.
Fortunately, the Department knows that the way out of this
conundrum is to integrate its systems. Unfortunately, I am concerned
that it may be heading down the same path it took when previous
attempts to integrate the Department's financial management systems
failed.
There is a saying that goes: ``If you keep doing the same thing,
you will keep getting the same result.''
Yet, once again, the Department is relying on contractors to do the
work that should be performed by the Government.
In this instance, the Department intends to allow a contractor to
define what the Department needs, then design what it will receive,
then map out the strategy for implementation.
The fact that the Department released a Request for Proposal before
first defining its financial management strategy is troublesome, and
sounds like putting the cart before the horse.
Past lessons have taught us that over-relying on contractors can
lead to lack of proper oversight, performance problems, and
skyrocketing costs.
To that end, I would urge the Department, in an effort to reduce
costs, to develop its own strategy for integrating its financial
management systems and to establish a more solid road map.
Moreover, I am greatly concerned with the findings that the GAO
will be presenting us with today.
Although the Department has received much guidance from the GAO on
the steps that must be taken to successfully integrate its financial
management systems it appears as if this advice has fallen by the
wayside.
I look forward to listening to our witnesses' testimony today
regarding what steps are being taken to correct existing deficiencies
and whether those steps are enough to prevent an unacceptable outcome.
Mr. Carney. I want to welcome our witnesses. Our first
witness is Mr. James L. Taylor, who serves as the deputy
inspector general for the Department of Homeland Security. Mr.
Taylor was selected as the deputy inspector general in October
2005. He previously served as the deputy chief financial
officer, CFO, and director for financial management at the
Department of Commerce.
Prior to his work at Commerce, Mr. Taylor held the position
of deputy chief financial officer at the Federal Emergency
Management Agency, FEMA, where he was directly responsible for
all financial operations, with expenditures of $4 billion to
$10 billion annually.
Our second witness is Ms. Kay L. Daly. Ms. Daly currently
serves as the director for financial management and assurance
issues at the Government Accountability Office. She is
responsible for financial management systems, improper
payments, contracting, cost analysis, and health care financial
management issues.
She led GAO's report on key cases of financial management
system modernization failures that highlighted the need to
follow discipline processes in software implementation, use
effective human capital management, and employ other IT
management practices.
Our third and final witness is Ms. Peggy Sherry, the acting
chief financial officer for the Department of Homeland
Security. Ms. Sherry joined the Department in 2007 as the
director of the Office of Financial Management and is
responsible for developing Department-wide financial management
policy, leading the Department's financial audits and preparing
Department-wide financial reports.
Prior to joining the Department, she served as the deputy
chief financial officer for the United States Holocaust
Memorial Museum, where she oversaw the successful conversion to
the museum's new financial management system and instituted
processes to obtain several unqualified audit options--excuse
me--several unqualified audit opinions on the museum's
financial statements.
Without objection, the witnesses' full statements will be
inserted into the record. I now ask each witness to summarize
for 5 minutes their statements, beginning with Mr. Taylor.
STATEMENT OF JAMES L. TAYLOR, DEPUTY INSPECTOR GENERAL,
DEPARTMENT OF HOMELAND SECURITY
Mr. Taylor. Thank you, Mr. Chairman.
Mr. Chairman, Ranking Member Bilirakis, and Members of the
committee, thank you for the opportunity to appear before you
today on behalf of the Homeland Security Office of Inspector
General. My testimony today will focus on the financial
management challenges facing the Department and its components
and the progress made so far in addressing these challenges.
Inspectors general are required by law to annually report
on the top management challenges facing the departments or
agencies they oversee. For DHS the Office of Inspector General
has consistently placed financial management high on that list.
However, fixing financial management at DHS will require more
than just focusing on this one area singularly.
Rather, DHS needs continuous efforts to address its
financial processes, as well as two related areas identified in
our annual management challenges report: Information technology
management as well as acquisition management.
DHS must re-engineer and standardize its underlying
financial processes so they conform to the requirements of the
CFO Act of 1990. In addition, DHS must strengthen how it
manages information technology so it is able to develop and
implement integrated systems to support redesigned financial
processes.
Finally, DHS must address long-standing deficiencies in
acquisition management to ensure it can acquire effectively the
information technology needed to meet its financial management
responsibilities.
DHS has worked hard to improve financial management over
the last 6 years, and the OIG is proud of our relationship with
the CFO's office in trying to meet these challenges. However,
significant challenges do remain.
The Department has consistently been unable to obtain an
unqualified audit opinion or any audit opinion on its financial
statements. Additionally, the OIG has to issue a separate
opinion on internal controls. DHS is the only Federal
department that is required to have a separate audit opinion on
internal controls.
That opinion has also been a disclaimer for the last few
years. In other words the Department is not yet at a point
where any opinion can be rendered on either the Department's
financial statements or its internal controls or financial
reporting.
Obtaining unqualified opinions on financial statements and
internal controls should not be the end goal. Rather, it should
be a milestone in providing management and stakeholders with
useful, timely financial data for decision-making. The annual
financial statement audit provides insight into the progress
the Department is making in resolving weaknesses in processes
and systems, and an essential part of the Department's efforts
to improve financial reporting is improving the systems which
compile and maintain financial information.
Since 2003 IT general controls have been evaluated as part
of DHS's financial statement audit. This review has included
assessing key core financial systems at FEMA, Customs and
Border Protection, TSA, Coast Guard, Federal Law Enforcement
Training Center, U.S. Immigration and Customs Enforcement, and
U.S. Citizenship and Immigration Services.
Generally, DHS's IT financial systems are fragmented, do
not share data effectively, and over the years have developed
security control weaknesses that undermine the overall
reliability. Collectively, the IT control weaknesses we
identified limit DHS's ability to ensure that critical
financial and operational data were maintained in such a manner
to ensure confidentiality, integrity, and availability.
In addition, these weaknesses negatively impacted the
internal controls over DHS's financial reporting and its
operation, and we consider them to collectively represent
material weaknesses.
DHS has recognized that it needs to improve financial
management processes, as well as the systems that support those
processes. Toward that end, DHS is moving ahead with the TASC
system already mentioned, an enterprise-wide initiative aimed
at modernizing, transforming, and integrating the financial
acquisition and asset management capabilities of DHS
components.
TASC is DHS's third attempt to address comprehensively its
long-standing financial management process and systems
problems. The first, known as eMerge, was canceled December
2005 after DHS had spent millions on what DHS officials had
determined to be a failure. The second effort ended after a
successful court challenge.
These failures illustrate the critical need for close CFO-
CIO cooperation properly identifying the requirements for any
system and the need for sound oversight of the process by
trained and experienced contracts officers and specialists.
The latest effort is a high-risk initiative that would take
years to complete. It is now estimated to cost in excess of $1
billion. We are presently completing a review of DHS's efforts
in planning and implementing TASC and plan to report on the
results of our review in a few months.
In summary, Mr. Chairman, the DHS CFO and CIO, in
conjunction with component CFOs and CIOs, are responsible for
working together to standardize DHS's core financial systems.
However, weaknesses in financial management processes and IT
security controls over the systems continue to hinder the
Department's ability to effectively produce accurate financial
information.
DHS's ability to significantly improve the quality of its
financial reporting hinges on the successful implementation of
new systems and improved business processes in order to promote
sound financial management.
Mr. Chairman, this concludes my prepared statement. Thank
you for the opportunity, and I welcome any questions from you
or Members of the subcommittee.
[The statement of Mr. Taylor follows:]
Prepared Statement of James L. Taylor
October 29, 2009
Mr. Chairman and Members of the committee: Thank you for the
opportunity to appear before you on behalf of the Department of
Homeland Security Office of Inspector General. My testimony today will
focus on the financial management challenges facing the Department and
its components, and the progress made so far in addressing these
challenges.
Inspectors general are required by law to annually report on the
top management challenges for the departments or agencies they oversee.
For DHS, the Office of Inspector General has consistently placed
financial management high on that list. However, fixing financial
management in DHS will require more than just focusing on this one
area. Rather, DHS needs to continue its efforts to address its
financial management processes, as well as two related areas identified
in our November 2008 report: Information technology (IT) management and
acquisition management. Specifically, DHS must reengineer and
standardize its underlying financial processes so they conform to the
requirements of the Chief Financial Officer Act of 1990. In addition,
DHS must strengthen how it manages information technology, so it is
able to develop and implement integrated systems that support
redesigned financial processes. Finally, DHS must address long-standing
inefficiencies in acquisition management, to ensure it can acquire
effectively the information technology needed to meet its financial
management responsibilities.
dhs financial management
DHS has worked hard to improve financial management, but
significant challenges remain. The Department consistently has been
unable to obtain an unqualified audit opinion, or any audit opinion, on
its financial statements. For fiscal year 2008, the independent
auditors issued a disclaimer on DHS' financial statements and
identified significant deficiencies which were so serious they
qualified as material weaknesses. Additionally the OIG issued a
disclaimer on DHS' Internal Control Over Financial Reporting (ICOFR).
DHS' ability to obtain an unqualified audit opinion, and provide
assurances that its system of internal control is designed and
operating effectively, is highly dependent upon business process
improvements across the Department.
Aside from being required by the Chief Financial Officer Act of
1990, financial statement audits provide insight into the status of
financial management and progress in resolving weaknesses in processes
and systems. For fiscal year 2008, the Department was able to reduce
the number of conditions leading to the independent auditors'
disclaimer of opinion on DHS' financial statements from six to three.
As a result, the Office of Financial Management and the Office of
Health Affairs no longer contribute to the disclaimer conditions and
FEMA remediated all its prior year disclaimer conditions. However,
during the fiscal year 2008 audit, new disclaimer conditions were
identified at TSA and FEMA. TSA was unable to assert that its capital
asset balances were fairly stated and FEMA was unable to assert that
its capital asset balances were fairly stated, respectively.
The Departmental material weaknesses in internal control were
primarily attributable to the Coast Guard, FEMA, and TSA. The Coast
Guard's material weaknesses, which have existed since 1994,\1\
contribute to all six of the Department's material weaknesses, while
FEMA contributed to four and TSA contributed to three. The Coast Guard
also contributes to TSA's financial systems security material weakness
due to TSA's reliance on the Coast Guard's financial systems. Although
the other components did not have material weaknesses, some had
significant deficiencies that, when combined, contributed to the
Departmental material weaknesses.
---------------------------------------------------------------------------
\1\ DOT-OIG, Significant Internal Control Weaknesses Identified in
Audits of FY 1994 and 1995, R3-CG-6-011, August 1996.
---------------------------------------------------------------------------
dhs' it financial systems
Generally, DHS' IT financial systems are fragmented, do not share
data effectively, and over the years have developed security control
weaknesses that undermine their overall reliability. Fixing these
systems and eliminating security vulnerabilities will be critical to
DHS' efforts to improve financial management.
Since 2003, IT general controls have been evaluated as a part of
DHS's financial statement audit. This review has included assessing key
core financial systems at FEMA, Customs and Border Protection (CBP),
TSA, Coast Guard, Federal Law Enforcement Training Center (FLETC), U.S.
Immigration and Customs Enforcement, and U.S. Citizenship and
Immigration Services. As a part of these reviews, controls over
applications being processed on various platforms were evaluated,
including Oracle and SAP. The objective of these audits was to evaluate
the effectiveness of IT general controls over DHS' financial processing
environment and related IT infrastructure as necessary to support the
results of the financial statement audit.
We reported in April 2009 that DHS components have taken
significant steps to improve financial system security and address
prior year IT control weaknesses, which resulted in the closure of more
than 40% of our prior year IT control findings.\2\ Additionally, some
DHS components reduced the severity of the weaknesses when compared to
findings reported in the prior year. However, access controls and
service continuity continue to be issues at several components
including FEMA, Coast Guard, and TSA. The most significant weaknesses
from a financial statement audit perspective include:
---------------------------------------------------------------------------
\2\ Information Technology Management Letter for the FY 2008 DHS
Financial Statement Audit (OIG-09-50, April 2009).
---------------------------------------------------------------------------
Excessive unauthorized access to key DHS financial
applications;
Application change control processes that are inappropriate,
not fully defined, followed, or effective; and,
Service continuity issues impacting DHS' ability to ensure
that DHS financial data is available when needed.
Collectively, the IT control weaknesses we identified limited DHS'
ability to ensure that critical financial and operational data were
maintained in such a manner to ensure confidentiality, integrity, and
availability. In addition, these weaknesses negatively impacted the
internal controls over DHS' financial reporting and its operation, and
we consider them to collectively represent a material weakness. The
information technology findings were combined into one material
weakness regarding IT for the fiscal year 2008 audit of the DHS
consolidated financial statements.
We recommended that the DHS Chief Information Officer (CIO), in
conjunction with the DHS Chief Financial Officer (CFO) and the
component CIOs and CFOs make improvements in the areas of access
controls, application software development and change controls, service
continuity, entity-wide security, system software, and segregation of
duties.
component it financial systems
For fiscal year 2008, we issued separate IT management letter
reports for FEMA, CBP, TSA, Coast Guard, and FLETC and an overall
consolidated IT management letter report that summarized the IT issues
for all seven components. Each management letter addressed the IT
security issues at each component and provided individual component
level findings and recommendations. In each of these management letters
we recommended that the component CIOs and CFOs in conjunction with the
DHS CIO and CFO work to address the issues noted in our reports.
Coast Guard
We reported in March 2009 that the Coast Guard took corrective
action to address nearly half of its prior year IT control
weaknesses.\3\ However, we continued to identify IT general control
weaknesses. The most significant weaknesses from a financial statement
audit perspective related to the development, implementation, and
tracking of financial systems coding changes, and the design and
implementation of configuration management policies and procedures.
---------------------------------------------------------------------------
\3\ Information Technology Management Letter for the United States
Coast Guard Component of the FY 2008 DHS Financial Statement Audit
(OIG-09-47, March 2009).
---------------------------------------------------------------------------
Of the 22 findings identified during fiscal year 2008 testing, 21
were repeat findings, either partially or in whole from the prior year,
and one was a new IT finding. These findings represent weakness in four
of the six key control areas. The areas impacted included Application
Software Development and Change Controls, Access Controls, Service
Continuity, and Entity-Wide Security Program Planning and Management.
The majority of the findings were inherited from the lack of properly
designed, detailed, and consistent guidance over financial system
controls.
Specifically, the findings stem from: (1) Unverified access
controls through the lack of user access privilege re-certifications,
(2) entity-wide security program issues involving civilian and
contractor background investigation weaknesses, (3) inadequately
designed and operating change control policies and procedures, (4)
patch and configuration management weaknesses within the system, and
(5) the lack of updated disaster recovery plans which reflect the
current environment identified through testing. These weaknesses may
increase the risk that the confidentiality, integrity, and availability
of system controls and Coast Guard financial data could be exploited
thereby compromising the integrity of financial data used by management
and reported in the DHS financial statements.
CBP
We reported in April 2009 that CBP took corrective action to
address prior year IT control weaknesses.\4\ For example, CBP made
improvements in how it tracks the hiring, termination, and systems
access of contracted employees within the Office of Information
Technology (OIT). However, during fiscal year 2008, identified IT
general control weaknesses continued to exist at CBP. The most
significant weaknesses, from a financial statement audit perspective,
related to controls over access to programs and data.
---------------------------------------------------------------------------
\4\ Information Technology Management Letter for the FY 2008
Customs and Border Protection Financial Statement Audit (OIG-09-59,
April 2009).
---------------------------------------------------------------------------
Although improvement was noted in the audit, many of the conditions
identified at CBP in fiscal year 2007 have not been corrected because
CBP still faces challenges related to the merging of numerous IT
functions, controls, processes, and organizational resource shortages.
During fiscal year 2008, CBP took steps to address these conditions.
Despite these improvements, CBP needs further stress on the monitoring
and enforcement of access controls. CBP needs to further emphasize the
importance of developing and implementing well-documented procedures at
the system and entity-level.
FEMA
FEMA took corrective action to address prior year IT control
weaknesses. We reported in March 2009 that FEMA made improvements by
restricting access to off-line account tables, implementing an
alternate processing site for one of its financial applications, and
improving the process for retaining National Flood Insurance Program
(NFIP) change control documentation.\5\ However, during fiscal year
2008, IT general control weaknesses at FEMA still existed. The most
significant weaknesses from a financial statement audit perspective
related to controls over access to programs and data and controls over
program changes.
---------------------------------------------------------------------------
\5\ Information Technology Management Letter for the Federal
Emergency Management Agency Component of the FY 2008 DHS Financial
Statement Audit (OIG-09-48, March 2009).
---------------------------------------------------------------------------
Of the 26 findings identified during the fiscal year 2008 testing,
15 were repeat findings, either partially or in whole from the prior
year, and 11 were new findings. These findings were representative of
five of the six key control areas. Specifically, the findings stem
from: (1) Inadequately designed and operating access control policies
and procedures relating to the granting of access to systems and
supervisor re-certifications of user access privileges, (2) lack of
properly monitored audit logs, (3) inadequately designed and operating
change control policies and procedures, (4) patch and configuration
management weaknesses within the system, and (5) the lack of tested
contingency plans. These weaknesses may increase the risk that the
confidentiality, integrity, and availability of system controls and
FEMA financial data could be exploited, thereby compromising the
integrity of financial data used by management and reported in the DHS
financial statements.
FLETC
We reported in April 2009 that FLETC made minimal progress on its
control weaknesses.\6\ Therefore, many of the prior year Findings and
Recommendations (NFR) could not be closed completely due to the
reliance on the impending Momentum application upgrade, the
decommissioning of Procurement Desktop and the installation of new
hardware that would improve the overall IT security structure at FLETC.
As a result, there was one (1) prior year NFR closed, twenty (27)
reissued NFRs, and three (3) new NFRs issued to FLETC.
---------------------------------------------------------------------------
\6\ Information Technology Management Letter for the Federal Law
Enforcement Training Center FY 2008 Financial Statement Audit (OIG-09-
63, April 2009).
---------------------------------------------------------------------------
The IT testing at FLETC disclosed matters involving the internal
controls over financial reporting and its operation that we consider to
be a significant deficiency under AICPA standards. Deficiencies in the
design and operation of FLETC's internal controls which could adversely
affect the agency's financial statements were noted. Deficiencies also
existed in entity-wide security planning, access controls, application
development and change control, system software, segregation of duties,
and service continuity that have contributed to the significant
deficiency.
TSA
In fiscal year 2008, TSA took corrective action to address prior
year IT control weaknesses. We reported in April 2009 that TSA made
improvements in testing disaster recovery procedures, reviewing audit
logs, and implementing emergency response training for all personnel
with data center access.\7\ However, IT general control weaknesses that
impact TSA's financial data remain. The most significant weaknesses
from a financial statement audit perspective related to controls over
the termination of the contract with the software support vendor, the
design and implementation of configuration management policies and
procedures, and the development, implementation, and tracking of coding
changes to the software maintained for TSA by the Coast Guard.
---------------------------------------------------------------------------
\7\ Information Technology Management Letter for the Transportation
Security Administration FY 2008 Financial Statement Audit (OIG-09-62,
April 2009).
---------------------------------------------------------------------------
Of the 15 findings identified during our fiscal year 2008 testing,
13 are repeat findings, either partially or in whole from the prior
year, and two are new IT findings. These findings represent weaknesses
in four of the six key control areas. Specifically, (1) unverified
access controls through the lack of comprehensive user access privilege
re-certifications, (2) entity-wide security program issues involving
civilian and contractor background investigation weaknesses, (3)
inadequately designed and operating change control policies and
procedures, and (4) the lack of updated disaster recovery plans which
reflect the current environment identified through testing. These
weaknesses may increase the risk that the confidentiality, integrity,
and availability of system controls and TSA financial data could be
exploited thereby compromising the integrity of financial data used by
management and reported in TSA's financial statements.
dhs it disaster recovery efforts
Following a service disruption or a disaster, DHS must be able to
recover its IT systems quickly and effectively in order to continue
essential functions, including financial management support. In May
2005, we reported on deficiencies in the Department of Homeland
Security's disaster recovery planning for information systems.\8\ We
recommended that the Department allocate the funds needed to implement
an enterprise-wide disaster recovery program for mission critical
systems, require that disaster recovery capabilities be included in the
implementation of new systems, and ensure that disaster recovery-
related documentation for mission critical systems be completed and
conform to current Government standards.
---------------------------------------------------------------------------
\8\ Disaster Recovery Planning for DHS Information Systems Needs
Improvement (OIG-05-22, May 2005).
---------------------------------------------------------------------------
We conducted a follow-up audit last year and reported in April 2009
that the Department has made progress in establishing an enterprise-
wide disaster recovery program.\9\ Specifically, the Department has
allocated funds for this program since fiscal year 2005, and by August
2008 had established two new data centers. Further, the Department now
includes contingency planning as part of the system authorization
process and it has issued guidance to ensure that contingency planning
documentation conforms to Government standards.
---------------------------------------------------------------------------
\9\ DHS' Progress in Disaster Recovery Planning for Information
Systems (OIG-09-60, April 2009).
---------------------------------------------------------------------------
While the Department has strengthened its disaster recovery
planning, more work is needed. For example, the two new data centers
need interconnecting circuits and redundant hardware to establish an
active-active processing capability.
We noted that not all critical Departmental information systems
have an alternate processing site. Further, disaster recovery guidance
does not conform fully to Government standards. Finally, risk
assessments of the data centers are outdated.
In our fiscal year 2008 report, we recommended that the Chief
Information Officer implement the necessary circuits and redundant
resources at the new data centers; ensure that critical Departmental
information systems have complete contingency planning documentation;
and conform Departmental contingency planning guidance to Government
standards. Additionally, the Department should reassess data center
risks whenever significant changes to the system configuration have
been made.
The fiscal year 2008 financial statement audit noted that service
continuity issues continue to impact DHS' ability to ensure that DHS
financial data is available when needed, including instances where the
Continuity of Operations Plan (COOP) does not include an accurate
listing of critical information technology systems, did not have
critical data files and an alternate processing facility documented,
and was not adequately tested, and various weaknesses identified in
alternate processing sites. Service continuity is one of the main IT
general control areas that continue to present a risk to financial
systems data integrity for DHS' financial systems.
Among recommendations for service continuity for DHS' financial
systems were to update the COOP to document and prioritize an accurate
listing of critical IT systems, ensure that alternate processing sites
are made operational, and test backups at least quarterly.
transformation and systems consolidation (tasc)
DHS has recognized that it needs to improve its financial
management processes, as well as the systems that support those
processes. Toward that end, DHS is moving ahead with TASC, an
enterprise-wide initiative, aimed at modernizing, transforming, and
integrating the financial, acquisition, and asset management
capabilities of DHS components. According to DHS, TASC is not an update
of legacy systems, but an implementation of integrated financial,
asset, and procurement management capabilities that will subsume many
systems and standardize business processes. The resulting system, once
implemented, is aimed at providing a real-time (providing immediate
viewing of data), web-based system (accessed from anywhere) of
integrated business processes that will be used by component financial
managers, service providers, program managers, and auditors to make
sound business decisions to support the DHS mission.
The goals and objectives of the TASC initiative are numerous and
reflect the collective input from the components. TASC also represents
an effort to leverage the work done by Office of Federal Financial
Management (OFFM) and will achieve full compliance with the rigid
standards outlined by OFFM. TASC will implement enhanced capabilities
to achieve the following goals:
Create end-to-end standardized integrated business
processes;
Support timely financial management;
Enable the acquisition of best value goods and services that
meet the Department's quality and timeliness requirements;
Enable consolidated asset management across all components;
Create a standard central accounting line.
TASC is DHS' third attempt to address comprehensively its long-
standing financial management process and system problems. The first
effort, known as the Electronically Managing Enterprise resources for
Government Effectiveness and Efficiency (e-Merge) project, was canceled
in December 2005 after DHS had spent $24 million on what DHS officials
had determined to be a failure. The second effort focused on moving DHS
components to one of two financial systems platforms: SAP and Oracle.
However, a Federal court ruled in Savantage Financial Services, Inc.
vs. United States that DHS' decision to use Oracle and SAP financial
software systems via ``Brand Name Justification'' document is improper
sole source procurement in violation of the Competition in Contracting
Act. In response to this decision, RMTO revised its financial systems
consolidation strategy to the current approach.
TASC is a high-risk initiative that will take years to complete,
potentially costing over $1 billion. We are presently completing a
review of DHS' efforts in planning and implementing TASC, and plan to
report on the results of our review in a few months.
In summary, the DHS CFO and CIO in conjunction with the component
CFOs and CIOs are responsible for working together to standardize DHS'
core financial systems. However, weaknesses in financial management
processes and IT security controls over these systems continue to
hinder the Department's ability to effectively produce accurate
consolidated financial information. DHS is currently in the processes
of developing and implementing a new financial system solution that
will modernize, transform, and integrate financial, acquisition, and
asset management information for DHS components. Once DHS addresses the
current issues in financial processing and IT security controls and
successfully develops and implements a new financial systems solution,
the Department will be able to promote overall efficiency and
effectiveness in its financial management.
Mr. Chairman, this concludes my prepared statement. Thank you for
this opportunity and I welcome any questions from you or Members of the
subcommittee.
Mr. Carney. Okay. Thank you for your testimony.
I now recognize Ms. Daly to summarize her statement for 5
minutes.
STATEMENT OF KAY L. DALY, DIRECTOR, FINANCIAL MANAGEMENT AND
ASSURANCE ISSUES, GOVERNMENT ACCOUNTABILITY OFFICE
Ms. Daly. Mr. Chairman and Ranking Member Bilirakis, thank
you very much for the opportunity to discuss the Department of
Homeland Security's current effort to implement a consolidated
Department-wide financial management system.
Since DHS began operations in March 2003, it has faced a
daunting task of trying to bring together 22 diverse agencies
and developing an integrated financial system. In June 2007 we
reported that the Department had made little progress in
integrating its existing financial management systems and made
six recommendations focused on the need for DHS to define a
Department-wide strategy and embrace discipline processes to
reduce risk.
In June 2007 DHS officials announced its new financial
management systems strategy, called the TASC program. In
January 2009 DHS issued a request for proposal for an
integrated commercial off-the-shelf software system already in
use at a Federal agency. DHS is currently evaluating the
proposals it has received and expects to award a contract in
January 2010.
Today my testimony will focus on our preliminary
observations related to DHS's implementation of the six
recommendations that we made in June 2007 and two issues that
have surfaced during our recent review that pose challenges to
the TASC program.
Regarding the six recommendations we made in June 2007, our
preliminary analysis indicates that DHS has begun to take
action toward implementation of four of the recommendations,
but all six remain open. We do recognize that DHS cannot fully
implement all of our recommendations until a contract is
awarded because of its selected acquisition approach.
DHS has taken, but not completed, actions related to the
TASC strategy and plan, a concept of operations, discipline
processes, and key human capital practices and plans for such a
systems implementation. DHS has not taken necessary actions on
two remaining recommendations to standardize business processes
across the Department and to develop detailed consolidation of
migration plans.
I would like to focus on DHS's strategy. The strategy being
taken by DHS does not appropriately consider whether the
acquired system will provide the needed functionality. For
example, the strategy does not require DHS to perform a GAAP
analysis before the system is selected and to assess the extent
to which cost-based systems used at another agency have been
customized.
Studies have shown that when an effective GAAP analysis is
not performed, program officers, and contractors have later
discovered that the selected system lacked essential
capabilities. Adding these capabilities later during
implementation required expensive custom development and
resulted in cost and schedule overruns that could have been
avoided.
While updating the status of the six prior recommendations,
we also identified two issues that pose unnecessary risk to the
success of the TASC program. The first issue is DHS's
significant reliance on contractors to define and implement the
program. The Department plans to have the selected contractor
prepare a number of key plans needed to carry out discipline
processes and define additional business processes to be
standardized and propose a migration approach.
However, DHS has not developed the necessary contractor
oversight mechanism to ensure that a significant reliance on
contractors for TASC does not result in an unfavorable outcome.
Our work on other systems acquisition and implementation
efforts has shown that placing too much reliance on contractors
can result in systems efforts plagued with serious performance
and management problems.
The second issue we identified was that the contractor
hired to perform verification and validation functions for TASC
was not independent. DHS management has agreed, and they
indicated they have restructured the contract to address our
concerns.
In conclusion, Mr. Chairman and the other Members of the
subcommittee, 6 years after the Department was established, DHS
has yet to implement the Department-wide integrated financial
system. The open recommendations from our prior report continue
to be vital to the success of the TASC program.
Given the approach DHS has selected, it will be paramount
that DHS take steps to minimize risk associated with its
strategy in contractor oversight. Failure to do so could lead
to acquiring a system that does not meet cost, schedule, and
performance goals.
So, Mr. Chairman and the other Members of the subcommittee,
this completes my prepared statement, and I would be glad to
respond to any questions you may have at this time.
[The statement of Ms. Daly follows:]
Prepared Statement of Kay L. Daly (with Nabajyoti Barkakati)
October 29, 2009
Financial Management Systems: DHS Faces Challenges to Successfully
Consolidate Its Existing Disparate Systems
Mr. Chairman and Members of the subcommittee: Thank you for the
opportunity to discuss the Department of Homeland Security's (DHS)
current effort--the Transformation and Systems Consolidation (TASC)
program--to implement a consolidated Department-wide financial
management system. Since DHS began operations in March 2003, it has
faced the daunting task of bringing together 22 diverse agencies and
developing an integrated financial management system. DHS officials
have long recognized the need to integrate their financial management
systems, which are used to account for over $40 billion in annual
appropriated funds. The Department's prior effort, known as the
Electronically Managing Enterprise Resources for Government
Effectiveness and Efficiency (eMerge2) project,\1\ was expected to
integrate financial management systems Department-wide and address
existing financial management weaknesses. However, DHS officials
terminated the eMerge2 project in December 2005, acknowledging that
this project had not been successful. In June 2007, we reported \2\ the
Department had made little progress since December 2005 in integrating
its existing financial management systems, and that, from an overall
perspective, the decision to halt its eMerge2 project was prudent. We
made six recommendations focused on the need for DHS to define a
Department-wide strategy and embrace disciplined processes to reduce
risk to acceptable levels.\3\
---------------------------------------------------------------------------
\1\ The eMerge2 project was expected to establish the strategic
direction for migration, modernization, and integration of DHS'
financial, accounting, procurement, personnel, asset management, and
travel systems, processes, and policies.
\2\ GAO, Homeland Security: Departmentwide Integrated Financial
Management Systems Remain a Challenge, GAO-07-536 (Washington, DC: June
21, 2007); and GAO, Homeland Security: Transforming Department-wide
Financial Management Systems Remains a Challenge, GAO-07-1041T
(Washington, DC: June 28, 2007).
\3\ The use of the term ``acceptable levels'' acknowledges the fact
that any systems acquisition has risks and can suffer the adverse
consequences associated with defects.
---------------------------------------------------------------------------
In June 2007, DHS officials announced its new financial management
systems strategy, called the TASC program. At that time, the TASC
program was described as the migration of other DHS component systems
to two existing financial management systems already in use at several
components. After a bid protest was filed regarding the proposed
approach, the TASC request for proposal was revised to acquire an
integrated commercial off-the-shelf software (COTS) system to be
implemented Department-wide. In January 2009 DHS issued its TASC
request for proposal for the provision of an integrated financial,
acquisition, and asset management commercial off-the-shelf software
(COTS) system already in use at a Federal agency to be implemented
Department-wide. DHS is currently evaluating the proposals received and
expects to award a contract in January 2010.
Today, our testimony will focus on our preliminary observations
related to our audit of: (1) DHS' implementation of the six
recommendations we made in June 2007, and (2) two issues that have
surfaced that pose challenges to the TASC program. We have discussed
the preliminary observations included in this testimony with DHS
officials. To address these objectives, we reviewed the January 2009
request for proposal and its attachments, such as the Statement of
Objectives and Solution Process Overview, to understand DHS' plans for
implementing the TASC program. We also reviewed other available
planning documents, such as the Acquisition Plan and the draft concept
of operations, and determined the status of these plans and others to
see if DHS had fully implemented our recommendations. We interviewed
key officials from DHS' Office of the Chief Financial Officer and its
Resource Management Transformation Office (RMTO), including its
Director and Deputy Director for elaboration and to provide additional
perspectives to the information contained in these documents. We also
reviewed the Statement of Work for an independent verification and
validation (IV&V) contractor and confirmed key information about this
contract with the Director of RMTO.
We recently provided our draft report, including recommendations,
on the results of our audit to the Secretary of Homeland Security for
review and comment. We plan to incorporate DHS' comments as appropriate
and issue our final report as a follow-up to this testimony. We
conducted this performance audit from March through October 2009 in
accordance with generally accepted Government auditing standards. Those
standards require that we plan and perform the audit to obtain
sufficient, appropriate evidence to provide a reasonable basis for our
findings and conclusions based on our audit objectives. We believe that
the evidence obtained provides a reasonable basis for our findings and
conclusions based on our audit objectives.
background
Bid protests and related litigation have resulted in changes to
DHS' approach for the TASC program and have contributed to a
significant delay in awarding a contract. The initial TASC approach was
to migrate its component systems to two financial management systems--
Oracle Federal Financials and SAP--that were already in use by several
DHS components.\4\ Figure 1 shows the key events that have occurred
affecting the TASC program. One of these key events was the filing of a
bid protest regarding DHS' initial TASC approach to migrate its
components to two financial management systems already in use. DHS
subsequently issued its January 2009 TASC request for proposal for the
provision of an integrated financial, acquisition, and asset management
COTS system already in use at a Federal agency to be implemented
Department-wide. A second bid protest was filed over this January 2009
request for proposal and the U.S. Court of Federal Claims dismissed the
protestor's complaint, allowing DHS to proceed with this request for
proposal. However, the protestor filed an appeal of this dismissal in
July 2009. DHS responded to the July 2009 appeal in September 2009 and
DHS officials indicated that the protestor responded to DHS' response
in October 2009.
---------------------------------------------------------------------------
\4\ Oracle Federal Financials was already in use within the U.S.
Coast Guard, the Transportation Security Administration, and the
Domestic Nuclear Detection Office. SAP was already in use within the
U.S. Customs and Border Protection.
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
dhs has made limited progress in implementing our prior recommendations
In June 2007, we made six recommendations \5\ to DHS to help the
Department reduce the risks associated with acquiring and implementing
a Department-wide financial management system. Our preliminary analysis
indicates that DHS has begun to take actions toward the implementation
of four of the recommendations, as shown in table 1. However, all six
recommendations remain open. We do recognize that DHS cannot fully
implement all of our recommendations until a contract is awarded
because of its selected acquisition approach.
---------------------------------------------------------------------------
\5\ GAO-07-536.
TABLE 1.--DHS' PROGRESS TOWARD ADDRESSING GAO'S RECOMMENDATIONS
----------------------------------------------------------------------------------------------------------------
Not Completed
Recommendation Completed -------------------------------------------------
Some Actions Taken No Action Taken
----------------------------------------------------------------------------------------------------------------
Clearly define and document a
Department-wide financial management
strategy and plan to move forward
with its financial management system
integration efforts.
Develop a comprehensive concept of
operations document.
Utilize and implement these specific
disciplined processes to minimize
project risk: (1) Requirements
management, (2) testing, (3) data
conversion and system interfaces,
(4) risk management, (5)
configuration management, (6)
project management, and (7) quality
assurance.
Reengineer business processes and
standardize them across the
department, including applicable
internal control.
Develop a detailed plan for migrating
and consolidating various DHS
components to an internal shared
services approach if this approach
is sustained.
Carefully consider key human capital
practices as DHS moves forward with
its financial management
transformation efforts so that the
right people with the right skills
are in place at the right time.
----------------------------------------------------------------------------------------------------------------
Source: GAO analysis of DHS information.
DHS Faces Significant Challenges To Implement Its Financial Management
Strategy and Plan
DHS has developed certain elements for its financial management
strategy and plan for moving forward with its financial system
integration efforts but it faces significant challenges in completing
and implementing its strategy. DHS has defined its vision for the TASC
program, which is to consolidate and integrate Department-wide mission-
essential financial, acquisition, and asset management systems, by
providing a seamless, real-time, web-based system to execute mission-
critical end-to-end integrated business processes. DHS has also
established several major program goals for TASC which include, but are
not limited to:
creating and refining end-to-end standard business processes
and a standard line of accounting;
supporting timely, complete, and accurate financial
management and reporting;
enabling DHS to acquire goods and services of the best value
that ensure that the Department's mission and program goals are
met; and,
enabling consolidated asset management across all
components.
DHS officials stated that this system acquisition is expected to
take a COTS-based system already configured and being used at a Federal
agency as a starting point for its efforts. This approach is different
than other financial management system implementation efforts reviewed
by GAO where an agency acquired a COTS product and then performed the
actions necessary to configure the product to meet the agency's
specific requirements.\6\
---------------------------------------------------------------------------
\6\ GAO, Business Modernization: Improvements Needed in Management
of NASA's Integrated Financial Management Program, GAO-03-507
(Washington, DC: April 30, 2003); and GAO, DOD Business Systems
Modernization: Navy ERP Adherence to Best Business Practices Critical
to Avoid Past Failures, GAO-05-858 (Washington, DC: Sept. 29, 2005).
---------------------------------------------------------------------------
Our review found that the strategy being taken by DHS does not
contain the elements needed to evaluate whether the acquired system
will provide the needed functionality or meet users' needs. For
example, it does not require DHS to: (1) Perform an analysis of the
current processes to define the user requirements to be considered when
evaluating the various systems, (2) perform a gap analysis \7\ before
the system is selected \8\ and (3) assess the extent to which the COTS-
based system used at another agency has been customized for the
respective Federal entities. Studies have shown that when an effective
gap analysis was not performed, program offices, and contractors later
discovered that the selected system lacked essential capabilities.
Furthermore, adding these capabilities required expensive custom
development, and resulted in cost and schedule overruns that could have
been avoided. \9\ Without a comprehensive strategy and plan that
considers these issues, DHS risks implementing a financial management
system that will be unnecessarily costly to maintain.
---------------------------------------------------------------------------
\7\ A gap analysis is an evaluation performed to identify the gaps
between needs and system capabilities.
\8\ Software Engineering Institute, Rules of Thumb for the Use of
COTS Products, CMU/SEI-2002-TR-032 (Pittsburgh, PA: December 2002).
\9\ U.S. Department of Defense, Commercial Item Acquisition:
Considerations and Lessons Learned (Washington, DC: June 26, 2000).
---------------------------------------------------------------------------
DHS Has Recently Developed a Concept of Operations for the TASC Program
The January 2009 request for proposal states that the selected
contractor will be required to provide a concept of operations for
TASC. This concept of operations is expected to provide an operational
view of the new system from the end users' perspective and outline the
business processes as well as the functional and technical architecture
for their proposed systems. On October 21, 2009, DHS provided us with a
concept of operations for the TASC program that we have not had the
opportunity to fully evaluate to assess whether it comprehensively
describes the new system's operations and characteristics. According to
DHS officials, this concept of operations document was prepared in
accordance with the Institute of Electrical and Electronics Engineers
(IEEE) standards.\10\ However, it is unclear how the DHS-prepared
concept of operations document will relate to the selected contractor's
concept of operations document called for in the request for proposal.
---------------------------------------------------------------------------
\10\ IEEE Guide for Information Technology--System Definition--
Concept of Operations (ConOps) Document, Standard 1362-1998.
---------------------------------------------------------------------------
According to the IEEE standards, a concept of operations is a user-
oriented document that describes the characteristics of a proposed
system from the users' viewpoint. A concept of operations document also
describes the operations that must be performed, who must perform them,
and where and how the operations will be carried out. The concept of
operations for TASC should, among other things:
define how DHS' day-to-day financial management operations
are and will be carried out to meet mission needs;
clarify which component and Department-wide systems are
considered financial management systems;
include a transition strategy that is useful for developing
an understanding of how and when changes will occur;
develop an approach for obtaining reliable information on
the costs of its financial management systems investments; and:
link DHS' concept of operations for the TASC program to its
enterprise architecture.
A completed concept of operations prior to issuance of the request
for proposal would have benefited the vendors in developing their
proposals so that they could identify and propose systems that more
closely align with DHS' vision and specific needs.
DHS Has Not Fully Incorporated Disciplined Processes into the TASC
Program
While DHS has draft risk management, project management, and
configuration management plans, DHS officials told us that other key
plans relating to disciplined processes generally considered to be best
practices will not be completed until after the TASC contract is
awarded. These other plans include the requirements management,\11\
data conversion and system interfaces,\12\ quality assurance, and
testing plans.\13\ Offerors were instructed in the latest request for
proposal to describe their testing, risk management, and quality
assurance approaches as well as component migration and training
approaches. The approaches proposed by the selected contractor will
become the basis for the preparation of these plans. While we recognize
that the actual development and implementation of these plans cannot be
completed until the TASC contractor and system have been selected, it
will be critical for DHS to ensure that these plans are completed and
effectively implemented prior to moving forward with the implementation
of the new system.
---------------------------------------------------------------------------
\11\ According to the Software Engineering Institute, requirements
management is a process that establishes a common understanding between
the customer and the software project manager regarding the customer's
business needs that will be addressed by a project. A critical part of
this process is to ensure that the requirements development portion of
the effort documents, at a sufficient level of detail, the problems
that need to be solved and the objectives that need to be achieved.
\12\ Data conversion is defined as the modification of existing
data to enable it to operate with similar functional capability in a
different environment.
\13\ Testing is the process of executing a program with the intent
of finding errors.
---------------------------------------------------------------------------
Disciplined processes represent best practices in systems
development and implementation efforts that have been shown to reduce
the risks associated with software development and acquisition efforts
to acceptable levels and are fundamental to successful system
implementations. The key to having a disciplined system development
effort is to have disciplined processes in multiple areas, including
project planning and management, requirements management, configuration
management, risk management, quality assurance, and testing. Effective
processes should be implemented in each of these areas throughout the
project life cycle because change is constant. Effectively implementing
the disciplined processes necessary to reduce project risks to
acceptable levels is hard to achieve because a project must effectively
implement several best practices, and inadequate implementation of any
one may significantly reduce or even eliminate the positive benefits of
the others.
DHS Has Not Yet Identified All Business Processes Needing Reengineering
and Standardization Across the Department
Although, DHS has identified nine end-to-end business processes
\14\ that will be addressed as part of the TASC program, the Department
has not yet identified all of its existing business processes that will
be reengineered and standardized as part of the TASC program. It is
important for DHS to identify all of its business processes so that the
Department can analyze the offerors' proposed systems to assess how
closely each of these systems aligns with DHS' business processes. Such
an analysis would position DHS to determine whether a proposed system
would work well in its future environment or whether the Department
should consider modifying its business processes. Without this
analysis, DHS will find it challenging to assess the difficulties of
implementing the selected system to meet DHS' unique needs.
---------------------------------------------------------------------------
\14\ These nine processes are Request to Procure, Procure to Pay,
Acquire to Dispose, Bill to Collect, Record to Report, Budget
Formulation to Execution, Grants Management, Business Intelligence
Reporting, and Reimbursable Management.
---------------------------------------------------------------------------
For the nine processes identified, DHS has not yet begun the
process of reengineering and standardizing those processes. DHS has
asked offerors to describe their proposed approaches for the
standardization of these nine processes to be included in the TASC
system. According to an attachment to the TASC request for proposal,
there will be additional unique business processes or sub-processes,
beyond the nine standard business processes identified, within DHS and
its components that also need to be supported by the TASC system. For
DHS' implementation of the TASC program, reengineering and
standardizing these unique business processes and sub-processes will be
critical because the Department was created from 22 agencies with
disparate processes. A standardized process that addresses, for
example, the procurement processes at the U.S. Coast Guard, Federal
Emergency Management Agency (FEMA), and the Secret Service, as well as
the other DHS components, is essential when implementing the TASC
system and will be useful for training and the portability of staff.
DHS Has Not Yet Developed Plans for Migrating the New System to its DHS
Components
Although DHS officials have stated that they plan to migrate the
new system first to its smaller components and have recently provided a
high-level potential approach it might use, DHS has not outlined a
conceptual approach or plan for accomplishing this goal throughout the
Department. Instead, DHS has requested that TASC offerors describe
their migration approaches for each of the Department's components.
While the actual migration approach will depend on the selected
system and events that occur during the TASC program implementation,
critical activities include: (1) Developing specific criteria requiring
component agencies to migrate to the new system rather than attempting
to maintain legacy business; (2) defining and instilling new values,
norms, and behaviors within component agencies that support new ways of
doing work and overcoming resistance to change; (3) building consensus
among customers and stakeholders on specific changes designed to better
meet their needs; and (4) planning, testing, and implementing all
aspects of the migration of the new system. For example, a critical
part of a migration plan for the new system would describe how DHS will
ensure that the data currently in legacy systems is fully prepared to
be migrated to the new system.
An important element of a migration plan is the prioritizing of the
conversion of the old systems to the new systems. For example, a FEMA
official stated that the component has not replaced its outdated
financial management system because it is waiting for the
implementation of the TASC program. However, in the interim, FEMA's
auditors are repeatedly reporting weaknesses in its financial systems
and reporting, an important factor to be considered by DHS when
preparing its migration plan. Because of the known weaknesses at DHS
components, it will important for DHS to prioritize its migration of
components to the new system and address known weaknesses prior to
migration where possible. Absent a comprehensive migration strategy,
components within DHS may seek other financial management systems to
address their existing weaknesses. This could result in additional
disparate financial management systems instead of the integrated
financial management system that DHS needs.
DHS Has Begun Hiring, But Has Not Developed a Human Capital Plan for
the TASC Program
While DHS' RMTO has begun recruiting and hiring employees and
contractors to help with the TASC program, the Department has not
identified the gaps in needed skills for the acquisition and
implementation of the new system. DHS officials have said that the
Department is unable to determine the adequate staff levels necessary
for the full implementation of the TASC program because the integrated
system is not yet known; however, as of May 2009, the Department had
budgeted 72 full-time equivalents (FTE) \15\ for fiscal year 2010. The
72 FTEs include 38 Government employees and 34 contract employees,
(excluding an IV&V contractor). DHS officials told us that this level
of FTEs may be sufficient for the first deployments of the new system.
---------------------------------------------------------------------------
\15\ According to OMB guidance, an FTE or work year generally
includes 260 compensable days or 2,080 hours. These hours include
straight-time hours only and exclude overtime and holiday hours.
---------------------------------------------------------------------------
According to RMTO officials, as of August 2009, RMTO had 21 full-
time Federal employees with expertise in project management, financial
business processes, change management, acquisition management, business
intelligence, accounting services, and systems engineering. In
addition, RMTO officials stated that there are seven contract workers
supporting various aspects of the TASC program. RMTO also utilizes the
services of the Office of the Chief Financial Officer and component
staff. According to RMTO officials, some of DHS' larger components,
such as Immigration and Customs Enforcement have dedicated staff to
work on the TASC program.
Many of the Department's past and current difficulties in financial
management and reporting can be attributed to the original stand-up of
a large, new, and complex Executive branch agency without adequate
organizational expertise in financial management and accounting. Having
sufficient human resources with the requisite training and experience
to successfully implement a financial management system is a critical
success factor for the TASC program.
planned tasc implementation efforts pose unnecessary risks
While updating the status of the six prior recommendations, we
identified two issues that pose unnecessary risks to the success of the
TASC program. These risks are DHS' significant reliance on contractors
to define and implement the new system and the lack of independence of
DHS' V&V function \16\ for the TASC program.
---------------------------------------------------------------------------
\16\ Institute of Electrical and Electronics Engineers Standard
1012-2004--Standard for Software Verification and Validation (June 8,
2005) states that the verification and validation processes for
projects are used to determine whether: (1) The products of a given
activity conform to the requirements of that activity and (2) the
software satisfies its intended use and user needs. This determination
may include analyzing, evaluating, reviewing, inspecting, assessing,
and testing software products and processes. The verification and
validation processes should assess the software in the context of the
system, including the operational environment, hardware, interfacing
software, operators, and users.
---------------------------------------------------------------------------
Significant Reliance Placed on Contractors to Define and Implement the
TASC Program
The Department plans to have the selected contractor prepare a
number of key documents including plans needed to carry out disciplined
processes, define additional business processes to be standardized, and
propose a migration approach. However, DHS has not developed the
necessary contractor oversight mechanisms to ensure that its
significant reliance on contractors for the TASC program does not
result in an unfavorable outcome.
Work with other systems acquisition and implementation efforts have
shown that placing too much reliance on contractors can result in
systems efforts plagued with serious performance and management
problems. For example, DHS' Office of Inspector General (OIG) recently
reported \17\ that the U.S. Customs and Border Protection (CBP) had not
established adequate controls and effective oversight of contract
workers responsible for providing Secure Border Initiative (SBI)
program support services. Given the Department's aggressive SBI program
schedule and shortages of program managers and acquisition specialists,
CBP relied on contractors to fill the staffing needs and get the
program underway. However, CBP had not clearly distinguished between
roles and responsibilities that were appropriate for contractors and
those that must be performed by Government employees. CBP also had not
provided an adequate number of contracting officer's technical
representatives (COTR) to oversee support services contractors'
performance. As a result, according to the OIG report, contractors were
performing functions that should have been performed by Government
workers. According to the OIG, this heavy reliance on contractors
increased the risk of CBP relinquishing its responsibilities for SBI
program decisions to support contractors, while remaining responsible
and accountable for program outcomes.
---------------------------------------------------------------------------
\17\ Department of Homeland Security, Office of Inspector General,
Better Oversight Needed of Support Services Contractors in Secure
Border Initiative Programs, OIG-09-80 (Washington, DC: June 17, 2009).
---------------------------------------------------------------------------
Verification and Validation (V&V) Review Function for the TASC Program
Was Not Independent
DHS' V&V contractor was not an independent reviewer because RMTO
was responsible for overseeing the contractor's work and authorizing
payment of the V&V invoices. On October 21, 2009, DHS officials
indicated that they have restructured the V&V contract to address our
concerns by changing the reporting relationship and the organization
that is responsible for managing the V&V contract. Under the previous
arrangement, the V&V contractor was reporting on work of the RMTO, the
program manager for the TASC program and the RMTO Director was serving
as the COTR \18\ for the V&V contract. As part of the COTR's
responsibilities, RMTO approved the V&V contractor's invoices for
payment. The independence of the V&V contractor is a key component to a
reliable verification and validation function.
---------------------------------------------------------------------------
\18\ COTRs are responsible for monitoring the contractor's progress
in fulfilling the technical requirements specified in the contract.
COTRs often approve invoices submitted by contractors for payment.
---------------------------------------------------------------------------
Use of the V&V function is a recognized best practice for large and
complex system development and acquisition projects, such as the TASC
program. The purpose of the V&V function is to provide management with
objective insight into the program's processes and associated work
products. For example, the V&V contractor would review system strategy
documents that provide the foundation for the system development and
operations. According to industry best practices, the V&V activity
should be independent of the project and report directly to senior
management to provide added assurance that reported results on the
project's status are unbiased.\19\ An effective V&V review process
should provide an objective assessment to DHS management of the overall
status of the project, including a discussion of any existing or
potential revisions to the project with respect to cost, schedule, and
performance. The V&V reports should identify to senior management the
issues or weaknesses that increase the risks associated with the
project or portfolio so that they can be promptly addressed. DHS
management has correctly recognized the importance of such a function
and advised us that they have taken prompt steps so that the V&V
function is now being overseen by officials in DHS' Office of the Chief
Information Officer. It is important that V&V is technically,
managerially, and financially independent of the organization in charge
of the system development and/or acquisition it is assessing.
---------------------------------------------------------------------------
\19\ To provide this objective evidence, V&V contractors analyze,
evaluate, review, inspect, assess, and test software products and
processes.
---------------------------------------------------------------------------
In conclusion, Mr. Chairman, 6 years after the Department was
established, DHS has yet to implement a Department-wide, integrated
financial management system. DHS has started, but not completed
implementation of the six recommendations we made in June 2007, aimed
at helping the Department to reduce risk to acceptable levels, while
acquiring and implementing an integrated Department-wide financial
management system. The open recommendations from our prior report
continue to be vital to the success of the TASC program. In addition,
as DHS moves toward acquiring and implementing a Department-wide
financial management system, it has selected a path whereby it is
relying heavily on contractors to define and implement the TASC
program. Therefore, adequate DHS oversight of key elements of the
system acquisition and implementation will be critical to reducing
risk. Given the approach that DHS has selected, it will be paramount
that DHS develop oversight mechanisms to minimize risks associated with
contractor-developed documents such as the migration plans, and plans
associated with a disciplined development effort including requirements
management plans, quality assurance plans, and testing plans. DHS faces
a monumental challenge in consolidating and modernizing its financial
management systems. Failure to minimize the risks associated with this
challenge could lead to acquiring a system that does not meet cost,
schedule, and performance goals.
To that end, our draft report includes specific recommendations,
including a number of actions that, if effectively implemented, should
mitigate the risks associated with DHS' heavy reliance on contractors
for acquiring and implementing an integrated Department-wide financial
management system. In addition, we also recommended that DHS designate
a COTR for the IV&V contractor that is not in RMTO, but at a higher
level of Departmental management, in order to achieve the independence
needed for the V&V function. As discussed earlier, DHS officials
advised us that they have already taken steps to address this
recommendation and we look forward to DHS expeditiously addressing our
other recommendations too.
Mr. Chairman, this completes our prepared statement. We would be
happy to respond to any questions you or other Members of the
subcommittee may have at this time.
Mr. Carney. Thank you, Ms. Daly.
I now recognize Ms. Sherry for 5 minutes.
STATEMENT OF PEGGY SHERRY, ACTING CHIEF FINANCIAL OFFICER,
DEPARTMENT OF HOMELAND SECURITY
Ms. Sherry. Thank you. Again, I would like to apologize
again to the committee for getting my testimony in late. Thank
you for your indulgence in that.
Thank you, Chairman Carney, Ranking Member Bilirakis and
Members of the committee, for the opportunity to testify before
you on the Department of Homeland Security's progress and plans
to create One DHS by standardizing financial management.
The DHS mission is to lead a unified National effort to
secure America. This requires a unified Department and an
integrated approach across our various operations, including
financial management. As you know, one of the Secretary's top
priorities is to unify the Department and to create a common
culture: One DHS, one enterprise, a shared vision with
integrated results-based operations.
We have many initiatives under way to continue to build a
One DHS culture, including our commitment to strengthening
internal controls and realigning business processes for
improved efficiency and effectiveness.
To this end I would like to thank the Congress for enacting
the Department of Homeland Security's Financial Accountability
Act. With the passage of the act, we launched an ambitious
multi-year effort to improve financial management and reporting
and to build assurances that internal controls are in place and
working effectively.
The foundation for One DHS strategy is to bring together
the varying perspectives of DHS components to build a
consolidated best practice approach to financial management. As
an example, DHS financial reporting working groups were
established recently to uniformly address financial management
and business process challenges.
Financial managers from the components work together to
identify common areas of weakness, such as accounting for
property, plant, and equipment or undelivered orders. Instead
of components developing individual action plans to address
areas of common weaknesses across the Department, they now work
together to find the best solutions that can be used by all the
components.
We continue to implement initiatives aimed at increasing
financial management competencies. This past fall we released a
DHS Financial Management Policy Manual. This on-line manual
provides Department-wide guidance on budget formulation,
execution, financial management, accounting, and reporting, and
introduces standardization throughout DHS with a focus on
strong internal controls.
We issued the third edition of the Internal Control
Playbook, which outlines our strategy and processes to
eliminate internal control weaknesses and to build management
assurances.
To further unify DHS financial management practices, we are
adopting a Department-wide standard accounting classification
structure. A common accounting line will improve our ability to
capture and report financial information in a consistent and
timely manner across the Department.
DHS received a disclaimer of opinion in its fiscal year
2008 financial statement. However, for the third consecutive
year, audit results show we continue to make steadfast
progress. Auditors noted the Department's progress in
implementing corrective actions and improving the quality and
reliability of our reporting.
Our multi-year corrective action plan led to reducing the
number of material weaknesses from 10 to seven to six in the
past 3 years. We also reduced the number of disclaimer
conditions from 10 to six to three in the past 3 years. Audit
challenges remain, but in more focused areas.
This year we have partnered with the United States Coast
Guard, Transportation Security Administration, and the Federal
Emergency Management Agency to address audit disclaimer and
material weaknesses conditions. As they make improvements on
our financial reporting and strengthen the skills of our
workforce, we continue to move forward to consolidate our
financial system, bringing forward lessons learned from our
previous effort.
Currently, DHS has 13 separate financial management
systems. These systems support different business processes,
numerous accounting lines, and have varying levels of systems
integration, with many still relying on manual processes. This
often results in inconsistent and inaccurate financial data.
DHS's ability to efficiently and effectively manage and
oversee our day-to-day operations and programs relies heavily
on our ability to have financial management systems that
produce complete, reliable, timely, and consistent financial
information for use by DHS managers and leaders.
Although modernization is complex, it is a critical element
of instituting strong financial management as called for by the
CFO Act, SFMIA, the Financial Accountability Act, and other
financial management reform legislation. As we work to address
our financial management challenges in increased transparency
and reporting, the Transformation and Systems Consolidation, or
TASC initiative, it is critical.
The Department will acquire an integrated system solution
that's already operating in the Federal space. We are in the
midst of the TASC acquisition and are on track to select a
vendor by second quarter fiscal year 2010. This important
initiative will enhance mission support and improve our ability
to report financial data in a timely and accurate way.
Financial management has come a long way at DHS, and I am
inspired by the extraordinary efforts of our dedicated staff at
headquarters and in the components to becoming One DHS. I am
committed to pursuing financial management success in the
Department. As we continue our progress to building One DHS, I
look forward to working with the GAO and the IG. Our
relationship will be able to help us improve our efforts to
build a consolidated and integrated Department.
I appreciate the support we have received from our IG, from
the GAO, this committee and Congress. Thank you for your
leadership and your continued support of the Department of
Homeland Security.
[The statement of Ms. Sherry follows:]
Prepared Statement of Peggy Sherry
October 29, 2009
Thank you Chairman Carney, Ranking Member Bilirakis, and Members of
the committee for the opportunity to testify before you on the
Department of Homeland Security's (DHS) progress and plans to create
One DHS by standardizing financial management.
DHS leads a unified National effort to secure America--this
requires a unified Department and an integrated approach across our
varying operations. The Secretary continues to prioritize unifying the
Department and creating a common culture: One enterprise, a shared
vision, with integrated results-based operations. In March, Secretary
Napolitano launched a Department-wide efficiency review to trim costs,
streamline operations, eliminate duplication, and better manage
resources across the Department. This effort includes more than two
dozen initiatives that will increase efficiency, leverage economies of
scale, create a culture of responsibility and fiscal discipline, and
save taxpayers millions of dollars.
We have many initiatives underway to continue to build one DHS
culture, including our commitment to strengthening internal controls
and realigning business processes for improved efficiencies and
effectiveness. To this end, I would like to thank Congress for enacting
the Department of Homeland Security's Financial Accountability Act.
With the passage of the act, we launched an ambitious multi-year effort
to improve financial management and reporting and build assurances that
internal controls are in place and working effectively. We have worked
to standardize business practices as well as executed systematic plans
to correct weaknesses. I look forward to continuing to work
collaboratively with Congress, the Government Accountability Office,
the DHS Office of the Inspector General, the Office of Management and
Budget, and our independent auditor to further strengthen internal
controls and improve and standardize financial management practices
across the Department.
strategies for standardizing financial management
The financial management community is employing multiple strategies
to bring together the varying perspectives of DHS components to build a
consolidated best-practice approach to financial management at DHS.
As an example, DHS financial reporting working groups were
established to uniformly address financial management and business
process challenges. Financial managers meet regularly to identify
common areas of weakness and develop strategies usable by all
components. This approach allows components to share success strategies
with other components struggling in the same area. We also created a
``Component Requirements Guide'' that contains approximately 40
standard financial reporting processes. Implementing standard processes
across the components has resulted in providing ample, reliable, timely
data and meeting financial statement submission deadlines.
Last fall, we published the first-ever DHS Financial Management
Policy Manual, which provides a standard set of financial management
policies with a focus on strong internal controls. This manual,
developed with input from all DHS components, is an on-line repository
of Department-wide guidance for program and budget formulation, budget
execution, financial management, accounting, and financial reporting.
To further unify DHS financial management practices, we are
adopting a Department-wide standard accounting classification
structure. To do this, we are defining the standard fields for the DHS
accounting line using the Common Government-wide Accounting
Classification (CGAC) structure issued by the Financial Systems
Integration Office in cooperation with the Office of Management and
Budget (OMB). A common accounting line will allow DHS to capture and
report financial information in a consistent and timely manner across
the Department. Staff from across DHS financial, budget, acquisition,
asset management, and program management communities are working
together to implement the new standard.
DHS has more than 230,000 employees, and we have more than 2,000 in
the financial management community dispersed throughout the United
States. In order to help bridge our geographic separation, my office
hosts a training session for all new employees in the DHS financial
management community. This program welcomes new employees into DHS,
provides a comprehensive introduction to financial management at DHS,
and trains employees on a common set of core competencies, including
the responsibilities of all financial managers to support and reinforce
strong internal controls and the principles of fiscal law. It also
provides an opportunity for staff in different components to meet,
share ideas, and form a valuable network with other financial
management professionals at DHS. Over the past 2 years, we have hosted
five of these events with over 450 employees attending, nearly 30
percent of whom were from outside the Washington, DC area.
strengthening internal controls to standardize and improve financial
management
DHS has been working diligently to correct its financial
weaknesses. When DHS was first stood up, there were an estimated 100
financial management systems across the 22 components. Further, we
inherited 30 significant financial reporting deficiencies, with 18
classified as material weaknesses. These conditions hampered the
Department's ability to produce timely, reliable financial data in
support of a clean audit. Over the last several years, however, the
annual financial statement audits have shown continued improvement
toward consistent and accurate financial reporting.
We have institutionalized a strong strategy, updated annually in
our Internal Control Playbook, across DHS to address the remaining
weaknesses. For each financial management weakness, we: Identify the
root cause(s); design strong, actionable plans to address the weakness;
and then track our progress against those plans. My office leads the
efforts, and I work closely with component CFOs to oversee and monitor
progress throughout the year. Our independent auditors report that the
Department continues to make good progress implementing corrective
actions and improving the quality and reliability of our financial
reporting. Consider the following accomplishments that offer validation
that our strategy is working:
DHS reduced the number of material weaknesses from 10 in
fiscal year 2006, to seven in fiscal year 2007, to six in
fiscal year 2008.
The Secretary's Financial Reporting Assurance Statement has
improved from a statement of no assurance in fiscal year 2005
to a statement that good internal controls are in place in
fiscal year 2008. For fiscal year 2009, the Department's goal
is to provide our first-ever assurance that internal controls
are working, with only a few exceptions.
The Department is on target to have five favorable opinions
on audits of individual component balance sheets in fiscal year
2009, and the goal is to have isolated the adverse conditions
that prevent completion of an audit area to one component which
has detailed multi-year plans to remedy these conditions.
Our remaining audit challenges are now contained to a few specific
areas. We continue to partner with and provide oversight of the U.S.
Coast Guard, Transportation Security Administration, and Federal
Emergency Management Agency to address the remaining audit disclaimer
and material weakness conditions. This joint effort has produced
significant improvements; for example, I expect the number of material
weaknesses at FEMA to be reduced for the second consecutive year.
Key to the Department's continued progress toward good financial
management is the ability of the components to produce consistent,
reliable financial data. An integrated, enterprise-wide financial
acquisition and asset management system will make it easier to
implement and maintain stronger internal controls and to ensure
consistent, accurate, and reliable financial information across DHS.
financial systems consolidation
DHS is moving forward with a financial system consolidation effort.
This will greatly improve the quality of and control over DHS financial
data, make the financial accounting process more efficient throughout
DHS, and reinforce standard business and financial management
practices. Currently, DHS has 13 separate financial management systems.
While we have made significant progress standardizing various aspects
of financial management in DHS, the 13 systems support different
business processes, numerous accounting lines, and have varying levels
of system integration--with many still relying on manual processes.
This often results in inconsistent and inaccurate financial data.
Further, maintaining multiple systems across the Department means
duplicative operations and maintenance costs, and high overhead when
upgrades, support services, and system changes are necessary.
As we work to address our financial management challenges and
increase transparency, consistency, and accuracy, the Transformation
and System Consolidation (TASC) initiative is critical. The Department
will acquire a proven, integrated system solution that meets Federally
defined financial business processes requirements, as issued by the
Financial Systems Integration Office in cooperation with OMB. We are in
the midst of the TASC acquisition and will select a vendor by the
second quarter of fiscal year 2010. We have also developed a strong
program management office to provide full-time, day-to-day oversight of
the integration process to help ensure success. This important
initiative will enhance mission support and improve our ability to
report financial data in a timely and accurate way.
lessons learned from previous efforts
In September 2006, the Department ended the Electronically Managing
Enterprise Resources for Government Effectiveness and Efficiency
(eMerge2) systems initiative since it failed to build the necessary
integration between the various commercial off-the-shelf software
solutions. The effort was budgeted at $252 million but was halted after
$52 million was spent on the project.
We have learned from eMerge2 and have applied those lessons to the
TASC initiative. Rather than building a new system from scratch, as was
the eMerge2 strategy, DHS is acquiring an existing, already integrated
Federal system that follows established standard Federal financial
business processes with defined key internal control requirements.
Putting in place an integrated system with standard processes will
allow us to produce data that is consistent and incorporates strong
internal controls to ensure financial transactions are properly
processed, verified, and accurately recorded. In addition, TASC will
take a phased approach to implementation rather than having the entire
Department go live at once.
Another key lesson learned from eMerge2 is the importance of having
adequate Federal staffing and strong oversight of contractor
performance. To this end, we have put in place a robust team of full-
time Federal employees with expertise in project management, systems
accounting, change management, acquisition management, business
intelligence, accounting services, and systems engineering. We also
have an on-site Independent Verification and Validation team in place
to monitor and evaluate every aspect of the program as we move forward.
conclusion
We have demonstrated our commitment to developing and executing
strong, actionable plans that improve our financial management with
strong internal controls. Consolidating our financial, asset, and
acquisition systems will accelerate and sustain Department-wide
progress in our efforts for efficiency, effectiveness, transparency,
and accountability. As DHS undertakes its transformation and system
consolidation effort, the Department's financial management
infrastructure will become more stable and will significantly
contribute to achieving the intended goals of the DHS Financial
Accountability Act.
Financial management has come a long way at DHS. I continue to be
inspired by the extraordinary efforts of our dedicated staff both at
headquarters and in the components, and I am committed to pursuing
financial management success. I appreciate the support that we have
received from our Office of Inspector General, the GAO, this committee,
and Congress. Thank you for your leadership and your continued support
of the Department of Homeland Security. I would be happy to answer any
questions you may have.
Mr. Carney. Thanks, Ms. Sherry.
I want to thank each of the witnesses for their testimony.
I remind each Member that he or she will have 5 minutes to
question the panel. I now recognize myself for 5 minutes.
Ms. Daly, let us begin with you. The news we heard is not
good. It seems like it might be improving, but we are 6 years
down the line now, over 6 years, and we are at a place where
accountability, you know, is trying to be the watchword of the
day, especially accountability for taxpayers' dollars, and we
are having a tough time with that at DHS.
From your opinion, you know, is the news improving? What
needs to be done that hasn't been done yet? What sort of time
frame are we looking at for improvement, I mean for doing
things in a standardized way that we have transparency and
accountability of taxpayers' dollars?
Ms. Daly. Mr. Chairman, I think DHS faces a monumental task
in pulling together the information needed. I am not familiar
with the time frames that they have in place, but I can assure
you from our review of the TASC program that we have certain
concerns with the strategy they are taking related to TASC and
not doing a detailed, structured GAAP analysis of the proposed
system to what they want their future business processes to be.
Without taking that particular step, I think they are
increasing their risk related to that program.
Mr. Carney. Mr. Taylor, how do you respond to that?
Mr. Taylor. Well, sir, we haven't completed our report on
TASC itself. However, in viewing the prior attempts of the
Department to try to have an integrated financial system, it
included a lack of identified requirements, clear requirements.
It included a lack of adequate oversight capabilities, the
trained contractor specialists we talked about, and it
included, as is mentioned by the committee, the over-reliance
on contractors.
If those three things still exist, then the Department is
truly in a high-risk environment for being able to implement
anything successfully.
Mr. Carney. Are we on track to fix that, Ms. Sherry?
Ms. Sherry. Thank you, sir, and yes. I appreciate the
comments from both the GAO as well as the IG and do know that
the Department is absolutely committed to working with you and
to making sure that the recommendations are fully implemented.
I do believe that we are on track, sir, to be able to
address some of these recommendations. I look forward to
working with them as they further develop their report.
We did learn quite a bit from the initial eMerge effort.
The initial eMerge initiative basically failed on the idea that
we were developing the system. What we were doing was gathering
thousands and thousands of requirements, and ultimately the
submission failed on its inability to be able to integrate
everything.
That is not the strategy the Department is implementing
currently. Instead, what we are doing is we are acquiring a
solution that is----
Mr. Carney. No, I think it was unplugged. She is doing
something down front here.
Thank you.
Mr. Taylor, the Department decided that it was going to use
a commercial off-the-shelf, or COTS, system to do this. Is that
a good idea?
Mr. Taylor. That is usually required by OMB. I have been
involved with this in the past, and when you do your own
development, you add a level of risk that most agencies are
going to find unacceptable.
Mr. Carney. So that was not a good idea, then.
Mr. Taylor. To use COTS is a good idea.
Mr. Carney. Yes, it is.
Mr. Taylor. It is. I am sorry, sir. Yes, it is. To do your
own development, to do a custom software development is a bad
idea, because then you are introducing a higher level of risk.
The COTS has been tested in the Federal environment, and there
are a number of vendors out there who can provide it and that
there was success, and there is usually an implementation you
can look at and learn from in terms of best practice.
Mr. Carney. Okay. Well, kind of along those lines, what
agencies use integrated systems that can serve as a model for
the Department's efforts? I mean, you know, we got a big
Government out there. There are probably some cases we could
have that we could point to which are the best.
Mr. Taylor. Sure, absolutely. Yes, sir. Most agencies have
been through the kind of agony, I guess, that the Department of
Homeland Security is going through now.
In my experience at the Department of Commerce, we went
through this between 1997 and 2003, implementing from a
decentralized approach to a centralized system. The Department
of Transportation has been through the same thing. I believe
Agriculture has been through it. There are a number of agencies
that have gone through this that had, and there are a number of
best practices.
There also are vendors out there in the Federal sphere or
other departments and agencies who provide these services, so
instead of having to do your own implementation, you can
purchase the support from those organizations instead of having
to do this for yourself.
Mr. Carney. Okay. I think we have a problem with the timers
here. I imagine my time is about up. I will recognize the
Ranking Member from Florida, Mr. Bilirakis, for 5 minutes, and
I guess I will be the official timekeeper here with my 12-year-
old Swiss Army watch.
Mr. Bilirakis. I won't take the 5 minutes.
Mr. Carney. There you go.
Mr. Bilirakis. Ms. Sherry, much was said about the
importance of leadership from the top to the success of the
financial consolidation efforts. Have the Secretary and deputy
secretary been briefed on TASC, the TASC initiative? Are they
supportive of the current plan?
Ms. Sherry. Yes, sir, thank you very much. Yes, we have had
the opportunity. I have had the opportunity to brief the
Secretary and the deputy secretary on not just the TASC
initiative, but also on the state of financial management at
DHS. They understand the criticality of having of having a
system solution in order to be able to move the Department
forward.
Mr. Bilirakis. So they are supportive.
Ms. Sherry. It is in line and in keeping with the One DHS
initiative that is so important to the Secretary.
Mr. Bilirakis. Okay. What impact has the lack of a
permanent under secretary for management and a permanent CFO
had on the Department's ability to implement TASC?
Ms. Sherry. Other than just making me really busy, it
really has not had much of an impact, sir. The under secretary
for management has been very engaged, and I think, as you may
or may not be aware, we actually have a deputy under secretary
for management as well, so they have been very engaged as well
as very supportive with us.
When I go back to my full-time job, or my regular job--I am
the deputy CFO also--and this is clearly a very important
initiative, and one that I will be primarily responsible for
sure, sir.
Mr. Bilirakis. Okay. How, if at all, has the Department's
financial management oversight and consolidation efforts
changed under the new administration?
Ms. Sherry. I don't really think that we have had a chance,
sir. I think that management--you know, having strong
management with the Secretary having been a former Governor, I
think that she is a very strong executive leader, and I think
that she really understands and completely supports either the
objectives and goals of my offices, you know, to continue to
standardize processes throughout the Department and to really
make financial management, good financial management, just
basic, you know, part of every day, you know, what it is that
we do, rather than something that we have to continually come
up and, you know, explain the reason why we are not doing very
well. She is very supportive of it.
Mr. Bilirakis. Can you explain why TASC will cost so much
more than eMerge2?
Ms. Sherry. I am sorry, sir. Can--why TASC would cost----
Mr. Bilirakis. Why it would cost so much more than eMerge2?
Ms. Sherry. I can't really speak to the total cost of what
eMerge2 was, sir. I know that the Department had spent about
$52 million before they actually stopped the initiative, so I
can take that for the record and possibly get back to you on
that.
Mr. Bilirakis. What controls do you have in place to make
sure the contract doesn't--there are no overruns?
Ms. Sherry. There are several things that we have got in
place currently, and I completely agree with both the GAO as
well as the IG to be able to say strong contractor oversight is
paramount. It will be paramount to the success of this
initiative, and I do believe that that may have been one of the
failings also of eMerge was the inability of the Department to
necessarily be able to, you know, make sure I have that
oversight over the contractors.
My office in particular has been staffing up very heavily
to have a very strong project management office. We have worked
with the other large acquisition efforts within the Department
to be able to really have lessons learned from them, to find
out how we should structure our PMO office.
We talked a little bit about some of the other departments
that have initiatives under way. We have done heavy outreach
with them to find out exactly what they--not only what the
lessons learned from the standpoint of what they have done
well, but also in particular what they haven't done well, so
that we can try to avoid those mistakes as well.
The other thing that we have within the Department which is
different, I think, than when the eMerge2 initiative was begun,
is a stronger oversight throughout DHS for large acquisition
projects.
We have the Management Directive 102, which really governs
the acquisition review process, where you have discipline
processes, including a--a con ops, as Ms. Daly referred to.
You have required documents that, you know, that the
project must be able to have completed, get reviewed, and to
have been accepted through the different keys throughout the
Department, as well as through the deputy secretary and in the
acquisition community within DHS, as well as having a systems
engineering lifecycle documentation and process that was really
intended to review the acquisition at every step of the
process.
So in other words, and before you are able to go to a next
particular gate, you have to go before the deputy secretary and
all the people that I just mentioned and to be able to
demonstrate why you are ready to do that.
Mr. Bilirakis. Okay. Thank you very much.
I hope I was under 5 minutes, Mr. Chairman.
Mr. Carney. Exactly 5 minutes, according to my watch.
The Chairman now recognizes my good friend from New Jersey,
Mr. Pascrell, for 5 minutes.
Mr. Pascrell. Mr. Chairman, let me start by saying this,
that if we do not address the bureaucratic questions at
Homeland Security by the next go-round, I want to commit to
you, Mr. Chairman, that I will not vote for one dime for the
Department. I want to make it very clear right now, and I want
to agree with your opening remarks about we have heard a lot of
this before. It is kind of redundant. We need a re-do here.
I don't think we need so much financial consolidation as
consolidation with a capital C. This is a bureaucracy that has
become cumbersome.
I am sorry, Mr. Taylor, we cannot make comparison to other
departments, because this Department that we are talking about
today has the responsibility, as you better than I know, to
secure the homeland. This is a different--you are comparing
apples and oranges, and I really want us to focus in on the
very nature and uniqueness of this Department.
The demands that we place on Homeland Security are
unproductive. I can remember Secretary Chertoff sitting out
there, telling us, enumerating how many committees his folks
have to answer questions for. It is ridiculous. We haven't
changed anything about that. We are wasting your time most of
the time, when we fail to see our main objective in securing
the homeland.
How many committees do you have to answer to, Mr. Taylor?
You are still counting, I am sure.
Mr. Taylor. Yes, sir, we are counting on our fingers and
toes right now. Ninety-one.
Mr. Pascrell. Ninety-one committees. Now, 91 committees.
Your request for the budget was $55 billion--correct me if I am
wrong--$55-plus billion.
Mr. Taylor. I will defer to Ms. Sherry on that.
Mr. Pascrell. Is that correct?
Ms. Sherry. Yes, sir. The net number is $42.8 billion.
Mr. Pascrell. Yes, we have a very serious problem here.
This is not going to go away with one committee hearing, but I
want to commend you for zeroing in on it and not accepting. We
don't even know the percentage of procurements in the last
administration--how many were bid. We don't even know that.
So, Mr. Chairman, I want to thank you for calling the
hearing. I really hope that people understand the importance of
this topic. Clearly, if we get a hearing on terror threats or
vulnerabilities to attack, we would probably get more attention
from the media in public and the public.
But I want to be clear when I say this. One of the greatest
threats to the Nation's security is the bureaucracy itself. We
are fighting an enemy that is not State-based. They don't have
a large bureaucratic infrastructure of multi-layered control.
Their greatest asset is the ability to operate in relative
silence and to change direction quickly in order to attack our
vulnerabilities. A bloated Homeland Security bureaucracy is
one, I believe, of our biggest vulnerabilities.
After the attacks of September 11, 2001, Members of the
Congress from both sides of the aisle pushed the Bush
administration to create this Department. I certainly think
that was the right decision, but if all we have done is to
throw over 100 Federal entities together and call it a day,
well, then I believe we have made our Nation less safe and not
more safe.
The whole point of creating a Department of Homeland
Security was not only to increase coordination, which I think
we may be getting better at, but also to streamline the process
by which a threat reported in the field can quickly and
effectively get to higher command to take action. This is what
they should be all about.
I am not convinced that we have cut down on these layers
from top to bottom. I am not convinced at all. Few things make
this point more clear than the fact that 6\1/2\ years after its
creation, the Department of Homeland Security has yet to
implement a Department-wide integrated financial management
system--6\1/2\ years later.
If we can't even keep track of all the billions of dollars
in taxpayers' funds, then how can we find the excess, how can
we find the ways, how can we possibly get rid of the bloat in
the democracy? How can we defend the republic?
I have a couple of more questions. I will come back after--
my time is up?
Mr. Carney. Very good. I don't want this to turn into a
colloquy, but I think Mr. Pascrell is exactly right. If this
was about a specific threat to the homeland, CNN would be here,
and we would have a lot more coverage. But this is actually
what Government does. This is the nuts and bolts stuff that no
one pays attention to, but is absolutely as important to
protecting the homeland as anything else that we do, so we
can't underestimate the importance of getting this right.
So, you know, we have often heard that when in the private
sector you would take organizations of the size that comprise
now DHS and put them together, it would be a 5- to 7-year
transition to get them into one sort of unit. We are at the
6\1/2\-year mark now, and we sure see the seams and the
fissures that exist.
We got to do better, and we got to it thoughtfully, but
holy cow, folks, you know, this is getting to a point where we
need to start asking the tough questions about are we secure,
more secure, than we have been? I think we probably are, but we
have got to solidify. We have got to have the foundations in
place.
So to that end, you know, hearings like this occur and
questions like these are asked. You know, folks like Mr.
Bilirakis and Mr. Pascrell and I come and, you know, we want to
make it better for everyone.
Ms. Sherry, according to the GAO's most recent audit, the
Department has taken very limited action toward implementation
of four of its recommendations and since, you know, they made
those recommendations in June 2007, about a year-and-a-half
ago, it has taken no action on the remaining two. Can you tell
me why?
Ms. Sherry. Yes, sir. Part of the reason is because we have
not selected a solution. What the Department has done is we
have taken to heart all of the recommendations and have
implemented those that we can, sir, and we will continue to
work with the GAO as well as the IG to make sure that we fully
implement all of the recommendations at the time that we have
selected the actual solution.
So, for instance, one of the recommendations was to develop
a con ops, a concept of operations, and we have done that. It
is in accordance with the IEEE standard within, you know, the
recognized standards, and what we will do is it is based on all
the information that we know currently without actually knowing
the actual solution. What we will do is we will work to update
all of them once we have actually awarded the contract.
Mr. Carney. Once again, can I ask a time frame question?
Ms. Sherry. Absolutely, sir. We are on target currently to
be able to award the contract in second quarter of 2010.
Mr. Carney. Second quarter of 2010.
Ms. Sherry. Yes, sir.
Mr. Carney. Okay. So we will certainly see you back here
roughly in that time frame and----
Ms. Sherry. I look forward to it.
Mr. Carney [continuing]. Get more accountability there.
Mr. Bilirakis, any questions?
Mr. Bilirakis. Thank you, Mr. Chairman.
Ms. Daly, your written testimony expresses concern about
the Department's reliance--I know you touched on this--on
contractors for the implementation of TASC and notes that the
Department has not developed necessary contract oversight
mechanisms. I would have hoped that the Department would have
learned from its problems with SBI.
My question is what actions would you recommend that the
Department take to enhance contract oversight?
Ms. Daly. I think the Department could take a number of
steps that are based in what the Software Engineering Institute
has recommended for these types of software implementations.
There are a number of tasks that they have planned to do in the
future, but that have not been formalized yet. A lot of these
are very important. I think what we have seen at other agencies
is that if these steps are not taken, what can happen is the
cost and schedule overruns that none of us want to occur.
One of the key examples I can give you are things such as
having a good testing plan in place. What you often see on a
system that gets rolled out is that the people that are for the
Government are relying on the contractors to develop a good
testing plan, and the Government officials need to understand
what are the right testing steps to take so that a good
comprehensive test is done that identifies all the defects so
those defects can be addressed before they are ruled out. Those
are the types of mechanisms we think would be important for the
Department to have in place.
Mr. Bilirakis. Can you comment on that, Ms. Sherry?
Ms. Sherry. Yes, sir. Thank you. We are in complete
agreement with that. I think that we have learned quite a bit
since the eMerge initiative, and we are in complete agreement
that we really do need to have strong contractor oversight.
You know, referring to some of the systems engineering
lifecycle steps, we are absolutely going to make sure that we
incorporate all of them. We will be working with the contractor
on the testing plans. We are not going to hand over simply to
the contractor to be able to do the work for us.
It is somewhat different than the SBInet initiative. Again,
absolutely we have learned from the things that we did not do
right in that initiative. But this is not a development effort,
you know, that what the Department is doing is we are acquiring
an already integrated, proven system that is working currently
in the Federal space, you know. So we will know a lot about the
system, and we will not actually be developing the system.
But we are absolutely committed to being able to use all of
those discipline processes, such as making sure that you have a
strong testing plan, working with our science and technology
group that has lots of expertise in this particular area, and
also as we come before our acquisition review board, having to
prove to them before we are able to go on to next step that we
in fact do have solid test plans.
Mr. Bilirakis. Thank you.
Mr. Taylor, the inspector general has done considerable
work in the area of Department financial management. In your
opinion does the Department have sufficient personnel in both
the financial offices and the procurement offices to provide
sufficient oversight over the systems migration in the contract
without any over reliance on contractors? That is my question.
Mr. Taylor. Without speaking directly to TASC, because we
are working on that right now, based on the work we have done
previously, we have a lot of concern about that, concerns
because the component organizations have skills deficiencies in
both procurement as well as financial management. So to layer a
very comprehensive integration effort on top of that would be
posing even more risk. So we are very concerned about that,
sir.
Mr. Bilirakis. Thank you very much. Appreciate it.
I yield back, Mr. Chairman.
Mr. Carney. Thank you.
The Chair now recognizes Mr. Green for 5 minutes.
Mr. Green. Thank you, Mr. Chairman. I thank you for--and
you, the Ranking Member, as well--for hosting this important
meeting.
I am honored to have an opportunity to speak to the
witnesses, and I thank you for being here today.
My concerns probably have been addressed, and I apologize,
because we have a Financial Services hearing that is taking
place, and we have Mr. Geithner, and we have a host of others,
and we are obviously having to deal with some of the great
issues of our time. But this does not in any way excuse me from
the issues that we have to contend with at Homeland Security.
They, too, are among the great issues of our time.
I am concerned about the means by which we can do some of
the small things. For example, we had the TWIC card issued, but
we did not have a card reader. It seems to me that that was
something that did not necessitate a real study to know that if
you are going to have the card and the reader, it would
probably be prudent--judicious, if you will--to have both the
card and the reader presented, make a debut, be put to use at
the same time.
Last time I checked, we still didn't have a reader that
would work with the cards and we are still exploring the
possibility of acquiring a reader for cards that we have
issued.
I remember when we had the former Secretary here, whom I do
not in any way intend to demean, but I do remember commitments
being made about the cards and the readers, and we never
actually got that done. So little things like that leave an
indelible memory such that it becomes difficult to get a grip
on how we can do some of these very complicated things if we
don't do these little things.
So let me ask, for fear that I may have missed something,
have we deployed the reader for the TWIC cards?
Ms. Sherry. I can find out for you, sir. I apologize. I
don't know that right off the top of my head. I will find out
and get back to you.
Mr. Green. Does the representative from GAO know?
Ms. Daly. Congressman Green, I am sorry. I am not aware of
the status of that.
Mr. Green. Okay. All right. That is one example.
Let us move to another one: P28. I had the good fortune to
be here while we had much said about P28. Most of what was said
by way of witnesses was good in the sense that P28 was supposed
to provide us with a model, a prototype that was to at some
point be replicated such that we would have this system that
allowed us to have a merging of various security devices as
well as something as simple as a fence such that we would be
able to monitor our border effectively.
The P28 didn't quite work out at build after we were billed
a lot of money. We spent a lot on P28, and it is a little bit
disappointing for us not to get the product that we paid for.
Taxpayers are demanding people, and when we spend their money,
they would like to see the results that are promised.
I am not going to ask you to give me an update on P28. I am
merely mentioning these things such that I can provide you
examples of how we clearly can do better with better
management, better oversight.
It is my hope--excuse me--it is my hope, my sincere desire
that we find a means by which we can have GAO, which plays an
important role in this process--GAO provide us with some of the
acid tests that we ultimately will have to confront at the
genesis of these operations, as opposed to what appears, from
my perch, to be an understanding that manifests itself after we
get into revelations.
Revelation is a bad time to know what is expected of you.
You ought to know what is expected of you somewhere at genesis
or shortly thereafter, so that you can perform and maybe you
will get some sort of heavenly blessing as a result of good
performance.
Unfortunately, we don't get, it seems to me, the marriage
between what GAO is going to monitor and what the contractors
are going to do by way of performance. We don't get that early
enough in the process. So my hope is that we will get that
done.
Mr. Chairman, I am 17 seconds over. I thank you, and I
yield back the balance of my time.
Mr. Carney. Thank you, Mr. Green.
Mr. Pascrell, for 5 minutes.
Mr. Pascrell. Thank you, Mr. Chairman.
Most of the bipartisan 9/11 Commission recommendations have
been addressed sooner or later in the past couple of years
except for one glaring oversight. That is what we are talking
about today: The bureaucracy in Homeland Security has not been
addressed.
I would suggest, Mr. Chairman, that the leadership of both
parties must be confronted on this particular issue. I just
gave one example before about how many committees they have to
come before and how many divisions and the total lack of
coordination, which does not help our intelligence apparatus
one iota. So I think they need to be confronted.
Ms. Sherry, I know in your testimony you talked about
Secretary Napolitano's efforts towards efficiency and effective
financial management. Can you talk specifically towards my
point and address how the new initiatives towards financial
management will lend themselves to streamlining operations in
the Department of Homeland Security?
Ms. Sherry. Yes, sir. Thanks for the question. I am happy
to address that. This initiative really does speak to the One
DHS issues that I think that you are addressing as far as the
bureaucracy. I think that we recognize that that is something
of an issue that can potentially hold us back from operating
efficiently and effectively. That is something, clearly, that
Secretary Napolitano is aware of.
Several of the things that we are going to be able to do in
this IT initiative that are outside of the actual financial
management initiatives that we have going on that I have
mentioned, such as the Financial Management Policy Manual, you
know, us having working groups where we are trying to come up
with collective solutions to common problems, some of the
things that this IT solution will do in addition to that will
be to standardize business processes throughout DHS.
There are requirements. There are FSIO standards, what are
called FSIO standards, which is done by OMB and the GSA with
input from the various agencies that basically talk about best
practices on how you do standard business processes throughout
the Government.
One of the objectives of the FMLoB initiative of the OMB is
to be able to make more standardization in some of those
processes that you can standardize that the Government, such as
paying a bill. The idea that you are going to be paying a
bill--you really shouldn't be doing it in a bunch of different
ways.
What we currently have at DHS are, you know, the different
components who pay bills differently, and the reason they have
to do that is because they maybe have different types of
systems. Some of them have legacy issues that come along with
them.
They have different integration so that in one instance you
have full integration, so once you put in a procurement or you
put in an award contract, it neatly populates your financial
system. In other components we don't have that. Well, you know,
what you do is you actually put something into the procurement
system and then you rely on a manual transfer over into your
financial system.
So the idea that we can have the integration, which will
really bring about more of that One DHS and the standardization
of the processes, and what comes along with that are internal
controls, the idea that you should have strong key internal
controls as outlined in FSIO and as has been validated through
our A123 process, which is the Federal Government's equivalent
to, like, Sarbanes-Oxley, where we go out there, where
management goes out there and we identify how are we doing
business currently, such as paying a bill and identifying
within each component what should we be doing differently, such
as having segregation of duties and, you know, so that the
person who puts in the contract and approves the contract is
not the same person who actually ends up paying the bill, so
that we can minimize the risk of fraud.
So things of that nature, sir, and IT solution in addition
to these other initiatives that we have on-going will help
bring about standardization at the Department.
Mr. Pascrell. Thank you.
Mr. Taylor, the GAO has had the management study of
Homeland Security, made recommendations. A couple of them have
not been done. We know, and I think you would agree with me,
that we are not talking about bureaucracy in the Transportation
Department. We are talking about bureaucracy in defending the
country, which is a heck of a lot more serious, it would seem
to me.
Let me ask you this. Is this Department manageable?
Mr. Taylor. Sir, I believe it is.
Mr. Pascrell. You believe it is.
Mr. Taylor. That is my personal opinion. I don't have a
report to show you from the IG's office that that concludes
this is a manageable office. We have done work on the
organization of the Department, particularly before the second
stage review that was conducted 3 years ago. We concluded there
were inefficiencies, some of which were addressed in the second
stage review. We think the Congress addressed some of the
concerns when they mandated a reorganization of FEMA and the
grants program within the Department.
Is the Department perfectly constructed in terms of
inefficiencies? Absolutely not. But there has been progress
since 6\1/2\ years ago towards making it more manageable.
Mr. Pascrell. So at this point you would say, and what you
have seen and what you have done and what your GAO has
concluded, that the Department itself could be organized
differently, perhaps, which is a problem with results that we
have gotten. Or would you say that?
Like, you know, George Kennan used to talk about democracy
in that sense. It was like a huge dinosaur that needed its tail
whacked once in a while. I think of dinosaurs when I think of
the Homeland Security Department, having been in this effort
since
9/12.
This is in my bone marrow. This is important to protecting
our neighborhoods. I am not sure that we have created the right
Erector set. I am not so sure. So I am listening and reading
what you have to put out every time you do it.
Thank you, Mr. Chairman.
Mr. Carney. Thank you, Mr. Pascrell.
Let us for a moment talk about kind of specific numbers, as
long as we have the opportunity here.
Ms. Sherry, how much do you think it is going to cost to
actually implement TASC?
Ms. Sherry. Sir, the independent Government cost estimate
is at $450 million.
Mr. Carney. Okay.
Ms. Daly, would you care to comment on that?
Ms. Daly. Our work has not examined the dollars that are
associated with this effort yet, but we plan to look into that
more in our future work for the committee.
Mr. Carney. Mr. Taylor.
Mr. Taylor. In my testimony, sir, I mentioned $1 billion.
That was the figure that was provided in testimony 3 weeks ago
by the under secretary for management. I think that includes--
being from the CFO side originally, it depends on how you
measure things. You know, is it the core financial system we
are talking about? Is it everything, including all the
components efforts?
Depending on how you measure this, the under secretary for
management saying it is a billion-dollar effort, so we are
assuming it is a billion-dollar effort.
Mr. Carney. So more than twice what Ms. Sherry thinks the
price is.
Mr. Taylor. Depending on how you measure it, yes, sir.
Mr. Carney. So are you telling me we can't even come up
with a consistent definition or consistent measures of what we
are trying to accomplish here?
Mr. Taylor. I contend that the IG's office has not been
provided with an estimate and the definition of what that
estimate includes.
Mr. Carney. Can the IG's office tell me who is in charge of
defining what it is we are trying to do here?
Mr. Taylor. Our understanding is it is CFO.
Mr. Carney. Ms. Sherry, so we are somewhere between $450
million and $1 billion to implement that. You know, from my
chair and from practically everybody in this room, how do you
get a delta that large?
Ms. Sherry. Right, sir. What I can do is I can go back see
what the $1 billion is referring to, but I think Mr. Taylor is
exactly right as far as the question that I answered, and
possibly I didn't answer the question correctly, was the
independent Government cost estimate as it relates to migration
and operation and maintenance, which is really within the
purview of this particular contract.
Things such as the hardware and the software are not
included in that number. In addition, we have developed a life
cycle cost estimate. Again, we are standing up the data center.
It will be done in our data center down in Stennis so that the
costs that are associated with that data center is not included
in this number as well.
We do have a life cycle cost estimate that we are working
on and we are going to be sharing with Ms. Daly as well as Mr.
Taylor, which I believe--and again, without knowing what was in
the billion, and I promise I will go back and look at that, I
would imagine would include some of the things that Mr. Taylor
talked about, which are not in the $450 million that I referred
to, sir.
Mr. Carney. Okay. So the $450 million does not include the
hardware, the software, the data center or the lifecycle costs.
Ms. Sherry. It includes the implementation, and it includes
operation and maintenance for the implemented solution.
Mr. Pascrell. [Inaudible.]
Mr. Carney. Boy.
Mr. Taylor, is $450 million a reasonable price for what we
are getting?
Mr. Taylor. Well, sir, I am not sure. I am still not sure
what that includes, and so we would have to look at what
exactly is included in that cost estimate, which, of course, we
haven't had a chance to review.
I will say that what you are experiencing is the problem
with these kinds of initiatives.
Mr. Carney. Yes.
Mr. Taylor. What happens is that the core financial system
itself is just a small part of the activity and a part of the
cost.
When Mr. Bilirakis asked me about the financial management
and the components, do they have the kind of resources
necessary to carry this out, we are concerned because in my
personal experience the vast majority of the effort isn't in
hooking up a new box with new software.
The vast majority of the effort is involved in changing the
business processes at the feeder level, at the component level,
so that the information coming in makes sense, not so that you
are just having a really fancy way of computing bad data.
That is where the costs are. So any estimate of cost needs
to include all those kinds of activities and the plan has to
account for the weaknesses that we have identified in our
financial statement audits in the component organizations where
this is going to fall on.
Mr. Carney. So just kind of a back of the envelope figuring
here, it may be more than $1 billion in this transition. But
once again, we don't know, because we can't define what it is
we are trying to do.
Ms. Sherry. But I mean we can define what it is that we are
trying to do, and I would absolutely agree with Mr. Taylor that
the change of management piece of it is critical and having
that governance structure in place is critical.
So these are things that are outside of that $450 million
that I am talking about, because this is stuff that the Federal
workforce will be responsible for ensuring that we do stay on
track so that when we are doing the migrations, when we are
doing the analysis to be able to determine what are our
requirements, and we do know what our requirements are relative
to what the solution is, that we make sure that we have got
strong oversight of that.
We have stood up a program management office in my office.
It has all the different disciplines in it that are required,
such as change management. You know, we have CPAs, we have
project managers, we have systems engineers, we have data
warehouse specialists, business intelligence specialists. So we
have got those. You know, we have staffed up to be able to have
those people within my office.
We are working with the larger components to set up their
own project management offices. To the idea, to the
competencies, it will be critical for them to be able to have,
you know, their ability to be able to understand what it is
that the contractor is bringing in and to be able to have that
oversight and to be able to guide the actual implementation.
Mr. Carney. Ms. Sherry, you have signed up for an
exceptionally difficult job, and I applaud your courage for
doing that. We need people of goodwill and brains to take on
this kind of thing, and I really applaud you for that.
That said, this subcommittee is going to watch very closely
where we are in the cost for TASC. That is our task to watch
the cost of TASC, to put it indelicately here. We will come
back to this.
Mr. Bilirakis.
Mr. Bilirakis. Thank you, Mr. Chairman.
Ms. Sherry, the TASC award, which you have plans to be
awarded in early 2010, is for an indefinite delivery indefinite
quantity contract. Did you consider using a firm fixed-price
contract, which would limit the risk to the Department in the
event of cost overruns? If so, why would you ultimately decide
on the IDIQ?
Ms. Sherry. Yes, sir. Thank you very much for the question.
I appreciate the opportunity to add one other point, which I
think I have not talked about, and I believe that your question
here kind of leads into the idea that the Department is
absolutely undertaking a phased approach here.
So what we are not doing, what they had done initially with
the eMerge, where they tried to bring up the entire Department
all at once with all these, you know, 8,000-plus requirements
that they had gathered, we are doing this in a very phased
approach. So with this IDIQ contract, we will allow us to be
able to do that, sir, is to be able to issue specific task
orders so that we can do this within phased approach.
We have done an awful lot of outreach to other agencies to,
like I said, to learn the things that they have done well, but
also things that they wish that they could have changed.
One of the things that we heard is that if you go right out
of the box with a firm fixed-priced contract, there is a high
likelihood, sir, that as they get in there and they start
really understanding it and doing that analysis between what is
it that you want versus what is it that the solution has and
the things that you need to change, that basically you end up
with a lot of the items that are simply out of scope.
So what you thought that you were getting with your firm
fixed price, ultimately you end up just getting an awful lot of
out of scope issues.
The way that this contract is structured allows us to be
able to work with the contractor in phased approach starting
with maybe one of the smaller entities, and we learn. Not only
does the contractor learn, but the agency learns.
My PMO will be with them every step of the way, and what we
would do is we will learn. As we build on our knowledge and our
learning curve and our competencies, it will move us, sir, into
the ability to be able to do a firm fixed-price contract. So
that is within the realm of our ability to be able to issue a
firm fixed-price task order as well, sir.
Mr. Bilirakis. Customs and Border Protection has been doing
well on its current platform. Are you concerned that moving
them onto the new TASC system will impact their performance?
Mr. Taylor. I think the CBP has clean audit opinions and
has probably one of the better installations in DHS in terms of
financial systems. However, they aren't without their own
issues. Moving even a large organization like them in a phased
approach to a centralized system would probably still in the
long run be in the best interest of that organization.
That said, depending on how you plan this, how you carry it
out, there are a lot of risks involved in it, absolutely.
Mr. Bilirakis. Also, in your written testimony you note a
number of IT control weaknesses at the component level. How
many of these weaknesses will be resolved by the migration to
TASC?
Mr. Taylor. I think it is premature to answer the question,
sir, to be honest. I mean because some of the findings are
redundant, by definition if you have three organizations with
the same three material weaknesses, then you only have the
consolidated three, so you drop it from that standpoint.
But what we do is we take the component material weaknesses
and roll them up into a consolidated, so assuming that the
system had the proper internal controls and that the internal
processing, the way that they are identified and the way
planned, then they would reduce a lot of the material weakness
findings we had.
Mr. Bilirakis. Anyone else want to comment on that?
Okay. Thank you very much.
I yield back, Mr. Chairman.
Mr. Carney. Thank you, Mr. Bilirakis.
We have time for a few more questions.
Mr. Pascrell, 5 minutes.
Mr. Pascrell. Mr. Chairman, I hope you will follow up on
the two points that we need an immediate reduction of how many
committees these folks have to report to--I just think it
doesn't make any sense--that point, with leadership. We need to
do what we have been talking about, you know, around the edge
about it.
The other thing is that bureaucracy within the Department
itself. We need to do something about it. To establish, maybe
even take another look at how our committee system sets up
within the Homeland Security Committee's subcommittees, whether
we are feeding the bureaucracy.
We started out by wanting to look into the various
financial management systems throughout Homeland Security. You
need people in the Department that are hired within the
Department, have a lot to do about implementing the mission,
and your background before you come to the Department.
This is unlike HHS and Transportation and Labor and all of
those different departments, because we are talking about a
paramilitary. We are talking about the security of the Nation.
The people we attract to the Department are going to implement
these financial mechanisms and systems, but it would seem to me
that we should spent a lot more time attracting people who have
background in security, be it in the police, be it in the
military, because this is the kind of operation that we need to
defend the country.
We are going to debate numbers. We are going to debate
words, which are most of the time meaningless unless we have
results. How can we best defend the homeland? It would mean to
me that the people we hire in the Department should have some
background, some knowledge of how military or civilian police
operate.
I hope you would take that message back to the Secretary,
because I have not had any indication so far in the last 6
months that that is at the centerpiece of the people we are
attracting into the Department.
When I hear all of this stuff, Mr. Chairman, about quotas
and make sure everybody is represented in the Department--and I
put my record up against anybody--but if they don't know
anything about security, how in God's name can they be part of
this Department?
I would like to know who they are hiring, which is just as
significant to me as the different financial mechanisms in all
of these subdivisions of this Department. I don't want to
minimize, but I want to prioritize. To me the priority is who
is operating.
So I want to thank these three folks for your service to
your country. You did a great job of answering the questions,
all of you.
I think dearly of GAO. I really do. You have made a big
difference in the Congress and how we look at things.
I hope Ms. Daly and Ms. Sherry take back to the Secretary,
who I have a great respect for, but we are not playing
tiddlywinks here. We are not playing in the sandbox. This is
serious stuff. I know it is serious for you. It is serious for
us. Thank you.
Thank you, Mr. Chairman.
Mr. Carney. Thank you, Mr. Pascrell.
We will adjourn momentarily here. We have votes, and I
think we are at the end of the string as far as the questions
go.
We have seen the theme here. We started to talk about TASC
and financial management of the Department and moving and
migrating to a different system, but it doesn't take too many
scrapes of the trowel to really expose a lot of underlying
problems here.
We are trying to get to an organization that is efficient
and agile. We have one that is very inefficient and very
cumbersome. You know, we take a lot on ourselves here in
Congress to try to get that. Certainly, in this subcommittee we
try to do that. I think you have been able to determine the
passion that many of us have for this task at hand.
But, you know, we need good people focused on the right
questions, and please, I admonish every one of you, please let
common sense prevail. Please.
I want to thank the witnesses for their testimony. I
imagine we will see you back again before too long. With that,
we are adjourned.
[Whereupon, at 11:20 a.m., the subcommittee was adjourned.]
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|