Skip to main content

Lapse in Appropriations

Please note that a lapse in appropriations has caused GAO to shut down its operations. Therefore, GAO will not be able to publish reports or otherwise update this website until GAO resumes operations. In addition, the vast majority of GAO personnel are not permitted to work. Consequently, calls or emails to agency personnel may not be returned until GAO resumes operations. For details on how the bid protest process will be handled during the shutdown, please see the legal decisions page. For information related to the GAO Personnel Appeals Board (PAB), please see the PAB webpage.

Homeland Security: Information Sharing Responsibilities, Challenges, and Key Management Issues

GAO-03-1165T Published: Sep 17, 2003. Publicly Released: Sep 17, 2003.
Jump To:
Skip to Highlights

Highlights

The Homeland Security Act of 2002, which created the Department of Homeland Security (DHS), brought together 22 diverse organizations to help prevent terrorist attacks in the United States, reduce the vulnerability of the United States to terrorist attacks, and minimize damage and assist in recovery from attacks that do occur. To accomplish this mission, the act established specific homeland security responsibilities for the department, which included sharing information among its own entities and with other federal agencies, state and local governments, the private sector, and others. GAO was asked to discuss the significance of information sharing in fulfilling DHS's responsibilities, emphasizing GAO's related prior analyses and recommendations for improving the federal government's information sharing efforts.

Full Report

GAO Contacts

Robert (Bob) Dacey
Chief Accountant
Applied Research and Methods

Media Inquiries

Sarah Kaczmarek
Managing Director
Office of Public Affairs

Public Inquiries

Topics

Agency missionsComputer matchingComputer securityCounterterrorismCritical infrastructure protectionEnterprise architectureGovernment information disseminationHomeland securityInformation disclosureInformation technologyInteragency relationsIntergovernmental relationsStrategic planningTerroristsTrojan horsesWater pipelines