This is the accessible text file for GAO report number GAO-05-1014T 
entitled 'Information Technology: FBI Is Building Management 
Capabilities Essential to Successful System Deployments, but Challenges 
Remain' which was released on September 14, 2005.

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as part 
of a longer term project to improve GAO products' accessibility. Every 
attempt has been made to maintain the structural and data integrity of 
the original printed product. Accessibility features, such as text 
descriptions of tables, consecutively numbered footnotes placed at the 
end of the file, and the text of agency comment letters, are provided 
but may not exactly duplicate the presentation or format of the printed 
version. The portable document format (PDF) file is an exact electronic 
replica of the printed version. We welcome your feedback. Please E-mail 
your comments regarding the contents or accessibility features of this 
document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

United States Government Accountability Office: 

GAO: 

Testimony: 

Before the Subcommittee on Science, State, Justice, Commerce, and 
Related Agencies, House of Representatives: 

For Release on Delivery: 

Expected at 10:30 a.m. EDT Wednesday, September 14, 2005: 

Information Technology: 

FBI Is Building Management Capabilities Essential to Successful System 
Deployments, but Challenges Remain: 

Statement of Randolph C. Hite, Director: 

Information Technology Architecture and Systems Issues: 

GAO-05-1014T: 

GAO Highlights: 

Highlights of GAO-05-1014T, a testimony before the Subcommittee on 
Science, State, Justice, Commerce, and Related Agencies, House of 
Representatives: 

Why GAO Did This Study: 

The Federal Bureau of Investigation (FBI) is in the process of 
modernizing its information technology (IT) systems. Replacing much of 
its 1980s-based technology with modern system applications and 
supporting technical infrastructure, this modernization is intended to 
enable the FBI to take an integrated, agencywide approach to performing 
its critical missions, such as federal crime investigation and 
terrorism prevention. At the request of the Congress, GAO has conducted 
a series of reviews of the FBI’s modernization management. 

GAO was requested to testify on the bureau’s progress to date in 
several areas of IT management. In addition, GAO discusses the 
importance of these areas for maximizing the prospects for success of 
the bureau’s ongoing and future IT system investments, including the 
FBI’s flagship Sentinel program; this program replaces the bureau’s 
failed Virtual Case File project and aims to acquire and deploy a 
modern investigative case management system. 

In this testimony, GAO relied extensively on its previous work on the 
FBI’s management of its IT processes, human capital, and tools, and it 
obtained updates on these efforts through reviews of documentation and 
interviews with responsible FBI officials, including the Chief 
Information Officer (CIO). 

What GAO Found: 

Over the last 18 months, the FBI has made important progress in 
establishing IT management controls and capabilities that GAO’s 
research and experience show are key to exploiting technology to enable 
transformation. These include centralizing IT responsibility and 
authority under the CIO and establishing and beginning to implement 
management capabilities in the areas of enterprise architecture, IT 
investment management, systems development and acquisition life cycle 
management, and IT human capital. 
* The FBI has developed an initial version of its enterprise 
architecture and is managing its architecture activities in accordance 
with many key practices, but it has yet to adopt others (such as 
ensuring that the program office has staff with appropriate 
architecture expertise). 
* The FBI is in the process of defining and implementing investment 
management policies and procedures. For example, it is performing 
assessments of existing systems to determine if any can be better used, 
replaced, outsourced, or retired, but these assessments have yet to be 
completed. 
* The bureau has issued an agencywide standard life cycle management 
directive, but it has yet to fully implement this directive on all 
projects. Also, certain key practices, such as acquisition management, 
require further development.
* The FBI has taken various steps to bolster its IT workforce, but it 
has yet to create an integrated plan based on a comprehensive analysis 
of existing and needed knowledge, skills, and abilities. According to 
the CIO, he intends to hire a contractor to perform this and develop an 
implementation plan. The CIO also intends to establish a management 
structure to carry out the plan. 

The challenge now for the FBI is to build on these foundational 
capabilities and implement them effectively on the program and project 
investments it has under way and planned, none of which is more 
important than the Sentinel program. The success of this program will 
depend on how well the FBI defines and implements its new IT management 
approaches and capabilities, particularly those associated with 
acquiring a system made up of commercial components, which Sentinel is 
to be. In this regard, it will be crucial for the FBI, among other 
things, to understand and control Sentinel requirements in the context 
of (1) its enterprise architecture, (2) the capabilities and 
interoperability of commercially available products, and the (3) 
bureau’s human capital and financial resource constraints. It will also 
be important for the FBI to prepare users for the impact of the new 
system on how they do their jobs. To the extent that the FBI does not 
take these steps, it will introduce program risks that could lead to 
problems similar to those that contributed to the failure of the 
Virtual Case File project. 

www.gao.gov/cgi-bin/getrpt?GAO-05-1014T. 

To view the full product, including the scope and methodology, click on 
the link above. For more information, contact Randolph C. Hite at (202) 
512-3439 or hiter@gao.gov. 

[End of section] 

Mr. Chairman and Members of the Subcommittee: 

We appreciate the opportunity to participate in the Subcommittee's 
hearing on the efforts of the Federal Bureau of Investigation (FBI) to 
transform itself in the wake of the attacks of September 11, 2001. As 
you are aware, a vital part of this transformation is the modernization 
of the FBI's information technology (IT) systems to support an 
agencywide approach to performing critical mission operations, such as 
the bureau's expanding intelligence activities and its long-standing 
criminal investigation and law enforcement efforts. To this end, the 
bureau has been investing more than a billion dollars in projects to 
replace its aging, inefficient IT environment with more modern networks 
and integrated data and application systems. Unfortunately, it has been 
challenged in doing so, leading in some cases to less than successful 
outcomes on key mission critical systems. 

The key to an agency's success in modernizing its IT systems, as our 
research and experience at federal agencies has shown, is 
institutionalizing a set of interrelated IT management controls and 
capabilities, including: 

* centralizing responsibility, accountability, and authority for key IT 
management functions with the agency's Chief Information Officer (CIO);

* developing and using an agencywide enterprise architecture,[Footnote 
1] or modernization blueprint, to guide and constrain IT investments;

* establishing and following a portfolio-based approach to selecting 
and controlling IT investments;

* defining and implementing a disciplined system acquisition/
development life cycle management approach; and: 

* building and sustaining an IT workforce with the necessary knowledge, 
skills, and abilities to execute this range of IT management functions. 

All these areas are interdependent and interrelated, as shown in figure 
1. If effectively established and implemented, they are keys to success 
in modernizing systems. 

Figure 1: Interrelated Keys to Successful IT Management: 

[See PDF for image]

Source: GAO. 

Note: Figure shows topics addressed in this testimony, not all key IT 
management areas. 

[End of figure]

Under the sponsorship of your Subcommittee and other congressional 
clients, we have conducted a series of reviews at the FBI over the last 
4 years that have addressed these key areas, and have made 
recommendations for improvement. Just last week, for example, we 
completed the latest in this series of reviews when we issued to your 
Subcommittee a report on the state of the FBI's enterprise architecture 
program.[Footnote 2] Our testimony today summarizes what we have 
reported relative to each of these areas; in addition, we discuss the 
importance of these capabilities for maximizing the prospects for 
success in the bureau's ongoing and future IT system programs and 
projects, such as the recently undertaken Sentinel program, which aims 
to acquire and deploy a modern investigative case management system. 

In preparing for this testimony, we drew extensively from our previous 
work[Footnote 3] on the FBI's management of its IT processes, human 
capital, and tools. In addition, we reviewed documentation and 
interviewed responsible FBI officials, including the CIO, to update our 
work. All the work on which this testimony is based was performed in 
accordance with generally accepted government auditing standards. 

Results in Brief: 

Over the last 18 months, the FBI has made important progress in 
establishing key IT modernization management controls and capabilities. 
These include centralizing IT responsibility and authority under the 
CIO and establishing and beginning to implement management capabilities 
in the areas of enterprise architecture, IT investment management, 
systems development and acquisition, and IT human capital. For example, 
the FBI is now managing development of its enterprise architecture 
program in accordance with many best practices (such as establishing a 
program office to develop the architecture and issuing a written and 
approved policy to govern this development) but it has yet to adopt 
others (such as providing adequate human capital for the program 
office). 

The challenge now for the FBI is to build on these foundational 
capabilities and effectively implement them on the many program and 
project investments it has under way and planned. In so doing, the FBI 
will be better positioned to accomplish the end goal: effectively 
leveraging technology to accomplish its transformation priorities. 

Background: 

The FBI's mission responsibilities include investigating serious 
federal crimes, protecting the nation from foreign intelligence and 
terrorist threats, and assisting other law enforcement agencies. 
Approximately 12,000 special agents and 16,000 analysts and mission 
support personnel are located in the bureau's Washington, D.C., 
headquarters and in more than 450 offices in the United States and 45 
offices in foreign countries. 

Mission responsibilities at the bureau are divided among the following 
five major organizational components. 

* Administration: manages the bureau's personnel programs, budgetary 
and financial services, records, information resources, and information 
security. 

* Counterterrorism and Counterintelligence: identifies, assesses, 
investigates, and responds to national security threats. 

* Criminal Investigations: investigates serious federal crimes and 
probes federal statutory violations involving exploitation of the 
Internet and computer systems. 

* Intelligence: collects, analyzes, and disseminates information on 
evolving threats to the United States. 

* Law Enforcement Services: provides law enforcement information and 
forensic services to federal, state, local, and international agencies. 

The components are further organized into subcomponents, such as 
divisions, offices, and other groups (hereafter referred to as 
"divisions"). Table 1 lists the components and briefly describes their 
respective divisions. 

Table 1: FBI Components and Divisions and Their Mission 
Responsibilities: 

Component: Administration: 

Division: Administrative Services Division; 
Mission responsibilities: Develop and administer personnel programs and 
services, including recruiting, conducting background investigations, 
and other administrative activities. 

Division: Finance Division; 
Mission responsibilities: Administer budget and fiscal matters, 
including financial planning, payroll services, property management, 
and procurement activities. 

Division: Office of Strategic Planning; 
Mission responsibilities: Manage the bureau's strategic planning 
activities and provide organizational resource allocation and 
management services. 

Division: Records Management Division; 
Mission responsibilities: Provide direction and oversight for all 
records policy and functions, including records maintenance and 
disposition, records review and dissemination, and Freedom of 
Information and Privacy Acts. 

Division: Security Division; 
Mission responsibilities: Ensure safe and secure work environment, 
including preventing the compromise of national security information. 

Component: Counterterrorism and Counterintelligence: 

Division: Counterintelligence Division; 
Mission responsibilities: Identify and neutralize ongoing national 
security threats, including conducting foreign counterintelligence 
investigations, coordinate investigations with the U.S. intelligence 
community, and investigate violations of federal espionage statutes. 

Division: Counterterrorism Division; 
Mission responsibilities: Prevent, disrupt, and defeat terrorist 
operations before they occur; pursue sanctions for those who have 
conducted, aided, and abetted terrorist acts; and provide crisis 
management following acts of terrorism against the U.S. and U.S. 
interests. 

Component: Criminal Investigations: 

Division: Criminal Investigative Division; 
Mission responsibilities: Investigate serious federal crimes, including 
those associated with organized crime, violent crime, white-collar 
crime, government and business corruption, and civil rights violations. 

Division: Cyber Division; 
Mission responsibilities: Probe federal statutory violations involving 
exploitation of the Internet and computer systems for criminal, foreign 
intelligence, and terrorism purposes. 

Component: Intelligence: 

Division: Office of Intelligence; 
Mission responsibilities: Collect and analyze information on evolving 
threats to the United States and ensure its dissemination within the 
FBI, to the U.S. intelligence community, and to law enforcement. 

Component: Law Enforcement Services: 

Division: Criminal Justice Information Services Division; 
Mission responsibilities: Provide information services on fingerprint 
identification, stolen automobiles, criminals, crime statistics, and 
other information to state, local, federal, and international law 
enforcement. 

Division: Critical Incident Response Group; 
Mission responsibilities: Respond to and manage crisis incidents such 
as terrorist activities, child abductions, and other repetitive violent 
crimes. 

Division: Investigative Technology Division; 
Mission responsibilities: Provide leadership and technical support to 
FBI investigative efforts, including ensuring the operational 
availability of modern technologies and the application of forensic 
examination services related to the collection, processing, and 
exploitation of digital evidence. 

Division: Laboratory Division; 
Mission responsibilities: Perform forensic examinations in support of 
criminal investigations and prosecutions, including crime scene 
searches, DNA testing, photographic surveillance, expert court 
testimony, and other technical services. 

Division: Office of International Operations; 
Mission responsibilities: Promote relations with both foreign and 
domestic law enforcement and security services, facilitate 
investigative activities where permitted, and provide managerial 
support of the Legal Attaché Program. 

Division: Office of Law Enforcement Coordination; 
Mission responsibilities: Improve coordination and information sharing 
with state and local law enforcement and public safety agencies. 

Division: Training Division; 
Mission responsibilities: Train agents and support personnel as well as 
state, local, international, and other federal law enforcement 
personnel in crime investigation, law enforcement, and forensic 
investigative techniques. 

Source: GAO analysis of FBI data. 

[End of table]

To execute its mission responsibilities, the FBI relies extensively on 
IT, and this reliance is expected to grow. For example, the bureau 
operates and maintains hundreds of computerized systems, networks, 
databases, and applications, such as: 

* the Combined DNA Index System, to support forensic examinations;

* the National Crime Information Center and the Integrated Automated 
Fingerprint Identification System, to help state and local law 
enforcement agencies identify criminals;

* the Automated Case Management System, to manage information collected 
on investigative cases;

* the Investigative Data Warehouse, to aggregate data in a standard 
format from disparate databases to facilitate content management and 
data mining; and: 

* the Terrorist Screening Database, to consolidate identification 
information about known or suspected international and domestic 
terrorists. 

According to the FBI, it also has almost 500 systems, applications, 
databases, and networks that are in operation, undergoing enhancement, 
or being developed or acquired. In particular, it has identified 18 new 
or enhancement projects that support its intelligence, investigative, 
and analyst activities. Included in these 18 is its Sentinel program, 
the FBI's effort to deliver--using commercially available software and 
hardware components--a modern automated capability for investigative 
case management and information sharing, with the goal of helping field 
agents and analysts to perform their jobs more effectively and 
efficiently. 

As we have previously reported,[Footnote 4] these ongoing and planned 
IT programs and projects are part of the FBI's systems modernization 
program. This program is based both on the bureau's long-standing 
recognition of its antiquated, nonintegrated systems environment and 
its awareness of the importance of modern, integrated IT systems to its 
transformation efforts in the wake of the September 11 attacks. 
Currently, the FBI reports that it will spend approximately $484 
million on modernization projects in fiscal year 2005 out of a total IT 
budget of $1.07 billion. 

Effective IT Management Is Critical to FBI's Ability to Successfully 
Transform: 

Technology can be a valuable tool in helping organizations transform 
and better achieve mission goals and objectives. Our research on 
leading private and public sector organizations, as well as our past 
work at federal departments and agencies, shows that successful 
organizations embrace the central role of IT as an enabler for 
enterprisewide transformation.[Footnote 5] These leading organizations 
develop and implement institutional or agencywide system modernization 
management controls to ensure that the vast potential of technology is 
effectively applied to achieving mission outcomes. Among these 
management controls are: 

* assigning IT responsibility and providing commensurate authority 
centrally with the agency's CIO,

* using a well-defined enterprise architecture as a systems 
modernization blueprint,

* following a portfolio-based approach to selecting among competing IT 
programs and projects and controlling investment in each during their 
life cycles,

* adhering to a structured and disciplined system development and 
acquisition life cycle management methodology, and: 

* employing sufficient and qualified IT human capital.[Footnote 6]

We have observed that without these types of controls and capabilities, 
organizations increase the risk that system modernization projects will 
(1) experience cost, schedule, and performance shortfalls and (2) lead 
to systems that are redundant and overlap. They also risk not achieving 
their aim of increased interoperability and effective information 
sharing. All told, this means that technology will not effectively and 
efficiently support agency mission performance and help realize 
strategic mission outcomes and goals. 

The FBI Director has recognized the importance of IT to transformation, 
and accordingly made it one of the bureau's top 10 priorities.[Footnote 
7] Consistent with this, the FBI's strategic plan contains explicit IT- 
related strategic goals, objectives, and initiatives (near-term and 
long-term) to support the collection, analysis, processing, and 
dissemination of information. 

However, as we have previously reported,[Footnote 8] the bureau's long- 
standing approach to managing IT has not always been fully consistent 
with leading practices. The effects of this approach can be seen in, 
for example, the cost and schedule shortfalls experienced on a key 
infrastructure and applications modernization program, Trilogy, and 
particularly on one of its projects (the Virtual Case File), which was 
recently terminated by the bureau. Reviews of this project identified 
management weaknesses as the cause for its cost, schedule, and 
performance shortfalls. Among these weaknesses were lack of integration 
planning, inadequately defined requirements, project management 
deficiencies, and frequent turnover of key personnel.[Footnote 9]

In place of the Virtual Case File project, the FBI launched its 
Sentinel program in early 2005 to develop what the bureau describes as 
its next-generation electronic information management system. According 
to the FBI, the system is planned to consolidate and replace its 
existing case management capabilities with an integrated, paperless 
file management and workflow system. 

FBI Is Making Progress in Establishing Key IT Modernization Management 
Capabilities: 

The FBI is making progress in establishing institutional IT 
modernization management capabilities. It has centralized IT 
responsibility and authority under the CIO, and it is establishing and 
beginning to implement management capabilities in the areas of 
enterprise architecture, IT investment management, systems development 
and acquisition, and IT human capital. Before it can effectively 
leverage technology to transform itself, the FBI will have to build on 
these capabilities and effectively implement them on its system 
investments. 

FBI Has Centralized Responsibility and Authority for IT: 

Our research on leading private and public sector organizations, as 
well as our past work at federal departments and agencies, shows that 
successful organizations adopt a corporate, or agencywide, approach to 
managing IT under the leadership and control of a senior executive-- 
commonly called a chief information officer--who operates as a full 
partner with the organizational leadership team in charting the 
strategic direction and making informed IT investment decisions. The 
Clinger-Cohen Act[Footnote 10] also mandates that major federal 
departments and agencies establish the position of CIO. As the focal 
point for IT management within an agency, the CIO is positioned to 
oversee the establishment and implementation of agencywide capabilities 
in IT management. 

In the FBI, responsibility for managing IT was historically 
decentralized and diffused. For example, we testified in March 
2004[Footnote 11] that the FBI had not provided its CIO with bureauwide 
IT management authority and responsibility, vesting these instead in 
the bureau's divisions. This is part of the reason that the FBI's IT 
environment at the time consisted of nonintegrated applications 
residing on different servers, each of which had its own unique 
databases, unable to share information with other applications or with 
other government agencies. To address this, we discussed with the 
Director in 2003 the importance of centralizing IT management 
responsibility and authority under the CIO, and we subsequently 
recommended that the CIO be provided with the responsibility and 
authority for managing IT bureauwide, including budget management 
control and oversight of IT programs and initiatives.[Footnote 12]

The FBI has since taken steps to strengthen the scope and influence of 
the CIO Office. In particular, the CIO was assigned agencywide 
responsibility, authority, and control over IT resources, including 
responsibility for preparing the bureau's IT strategic plan and 
operating budget; operating and maintaining existing systems and 
networks; developing and deploying new systems; defining and 
implementing IT management policies, procedures, and processes; and 
developing and maintaining the bureau's enterprise architecture. 

To fulfill these responsibilities, the CIO's office has begun the 
process of developing and implementing a corporatewide approach to 
managing IT. For example, the FBI reorganized the CIO Office, 
establishing four offices[Footnote 13] to carry out key institutional 
management functions, and issued an IT strategic plan in September 2004 
that outlined ongoing and planned efforts to strengthen policies and 
procedures by standardizing them across the bureau and incorporating 
best practices. Among other things, this plan provided for building 
capabilities in a number of key IT management areas, including the 
following four areas: enterprise architecture, IT investment 
management, systems development and acquisition, and IT human capital. 

FBI Is Taking Steps to Develop an Enterprise Architecture, but Much 
Work Remains To Be Done: 

As our research and evaluations have shown, it is risky to attempt to 
modernize an IT environment without using an architecture, or 
blueprint, to guide and constrain the definition, design, and 
development of IT programs and projects. An enterprise architecture 
provides systematic structural descriptions--in useful models, 
diagrams, tables, and narrative--of how a given entity operates today 
and how it plans to operate in the future, and it includes a road map 
for transitioning from today to tomorrow. Our experience with federal 
agencies has shown that attempting to modernize systems without having 
an enterprise architecture often results in systems that are 
duplicative, not well integrated, unnecessarily costly to maintain, and 
limited in terms of optimizing mission performance.[Footnote 14]

To assist agencies in effectively developing, maintaining, and 
implementing an enterprise architecture, we published a framework for 
architecture management, grounded in federal guidance and recognized 
best practices.[Footnote 15] In 2002 and again in 2003, we reported 
that the FBI did not have either an architecture to guide and constrain 
its IT investments or the means in place to develop and implement one. 
We further reported that the development of an architecture was not 
being given the priority that it deserved. Accordingly, we recommended 
that the Director make it an institutional priority, and provided a 
series of recommendations for building an architecture management 
foundation, developing and completing the architecture, and using it to 
inform IT investment decision making. 

In the last 12 months, the bureau has made important progress in 
developing its architecture. Last week we issued a congressionally 
mandated report on the state of the FBI's enterprise architecture 
efforts.[Footnote 16] In summary, we found that the FBI is now managing 
its enterprise architecture program in accordance with many best 
practices, but it has yet to adopt others. Examples of best practices 
that the bureau has implemented include the following: 

* the bureau has established a program office that is responsible for 
the development of the architecture;

* it has issued a written and approved policy governing architecture 
development; and: 

* it has ongoing efforts to complete a target architecture.[Footnote 17]

We ascribed this important progress, in part, to the demonstrated 
commitment of the FBI's top management to the enterprise architecture 
program. Nonetheless, we recognized that much remains to be 
accomplished before the FBI's enterprise architecture program will be 
mature. For example, we reported that the architecture program office 
did not yet have appropriate human resources with architecture 
expertise and that the bureau was not following a defined methodology 
for developing its architecture, both of which are foundational items. 
Also, the bureau's current and target architectures were not yet 
complete. (For instance, the program office had not completed mapping 
FBI data structures, classifications, and exchanges to the business 
processes that use the data, nor has it finished defining how the 
various IT applications currently interrelate.) Further, the bureau had 
not yet begun to develop its investment plans for transitioning from 
the current to the target architectural states. 

We also reported that the FBI had not employed effective contract 
management controls in developing its enterprise architecture, which is 
risky because the bureau is relying heavily on contractor support in 
this effort. (We discuss this contract management issue further in the 
section of this testimony dealing with system development and 
acquisition.)

Because we had already made comprehensive recommendations regarding the 
FBI's enterprise architecture program, we made no additional 
recommendations in this area. However, because of the FBI's heavy 
reliance on contractor assistance in developing its architecture and 
the state of its contract management controls, we recommended that the 
FBI employ performance-based contracting on all further architecture 
contract actions (to the maximum extent practicable) and follow 
effective contract tracking and oversight practices. 

In response, the FBI stated that it would continue to strive to develop 
a robust enterprise architecture program supported by effective 
contract management practices and cited steps under way to strengthen 
its architecture management foundation. For example, since our report 
was issued, the FBI provided us with a document that the bureau stated 
defines its enterprise architecture methodology. In addition, the 
bureau reported that it is very close to hiring staff with architecture 
expertise (four senior level technologists) for the program office. 
Further, the FBI stated that it was taking steps to increase its use of 
performance-based contracting. 

FBI Is Beginning to Apply Its New Investment Management Approach, but 
More Remains to Be Done: 

Based on our research at successful private and public sector 
organizations, we have issued an IT investment management (ITIM) 
framework[Footnote 18] that encompasses the best practices, including 
investment selection and control policies and procedures, of successful 
public and private sector organizations. Our ITIM framework is 
consistent with the Clinger-Cohen Act of 1996[Footnote 19] and 
identifies, among other things, effective policies and procedures for 
developing and using an enterprisewide collection--or portfolio--of 
investments; using such portfolios enables an organization to determine 
priorities and make decisions among competing options across investment 
categories based on analyses of the relative organizational value and 
risks of all investments. Portfolios should include three types of IT 
investments: 

* planned (proposed systems or system enhancements),

* under way (systems being developed or acquired), and: 

* completed (existing systems being operated and maintained). 

The FBI's progress over the last 3 years to define and refine an IT 
investment approach has been slow. In 2002, the bureau first focused on 
developing an approach that addressed solely IT investments and in 2003 
expanded the approach's scope to include all capital 
investments.[Footnote 20] In 2004, under the leadership of the current 
CIO, the bureau redirected its investment selection, control, and 
evaluation activities back to include IT investments only. In September 
2004, we reported that this redirected approach included one set of 
processes for new investments that are planned and under way and 
another set for the operation and maintenance of existing 
systems.[Footnote 21] At that time, the process for investments in new 
systems was still being defined, while a process for allocating 
operations and maintenance resources across existing systems had been 
developed. We also reported that the bureau was to pilot test its 
developed process on different types of investments (systems, 
applications, databases, and networks) with the goal of subsequently 
implementing the process enterprisewide. In our view, it was important 
that the implemented process be in accordance with key IT investment 
decision-making best practices (such as our ITIM framework). 
Accordingly, we made recommendations aimed at expediting implementation 
of ITIM-compliant policies and procedures. 

Since then, the FBI has taken a number of steps to strengthen its 
capability to manage IT investments. For example, in November 2004, the 
FBI established an investment review board, composed of senior 
executives, that meets about every 2 weeks to review proposed and 
ongoing investments in new systems. The CIO stated that the board 
recently completed its first evaluation of the bureau's 89 ongoing IT 
investments to, among other things, establish cost, schedule, and 
performance baselines and to begin the process of having the CIO and 
other senior executive review the projects at critical development 
milestones. The CIO also reported that the bureau has reviewed over 37 
new proposals and is using the results in preparing its fiscal year 
2007 IT budget request. Further, to establish a more defined structure 
to support the board's activities, the CIO's office recently issued an 
ITIM guide, which defines, among other things, the processes that the 
board is to follow in selecting and controlling these investments. 

In addition, the CIO's office is in the process of assessing the 
performance of existing systems (i.e., those in the operations and 
maintenance phase of their life cycle). Using cost and other criteria, 
these assessments are designed to determine which systems can be better 
used, replaced, outsourced, or retired. According to the CIO, the 
program recently completed a pilot assessment of projects in one FBI 
division, and it is currently preparing to perform similar assessments 
in the other divisions, which are scheduled to be completed by April 
2006. 

Notwithstanding these efforts, until the FBI fully implements processes 
for selecting, controlling, and evaluating all its IT investments, it 
will not be able to ensure that it is applying its resources to the 
best mix of investments to meet the goals of modernizing IT and 
transforming itself. 

The Bureau Has Moved to Standardize System Development and Acquisition 
Life Cycle Processes that Were Inconsistent across FBI Components: 

Having rigorous and disciplined IT system development and acquisition 
life cycle processes is an important component of IT management. The 
Clinger-Cohen Act recognizes the importance of such effective 
processes, and the Software Engineering Institute's (SEI) Capability 
Maturity Models™[Footnote 22] define a suite of such processes. Five 
process areas associated with systems acquisition (which collectively 
are composed of 30 key practice areas) are configuration management, 
project management, quality assurance, requirements development and 
management, and risk management. In combination with other process 
areas, these five provide a foundation for managing software-intensive 
systems in a manner that minimizes risks and increases the chances of 
systems delivering required system capabilities and benefits on time 
and within budget. 

In September 2004, we reported that the life cycle management policies 
and procedures then in place at the FBI for these five areas varied 
widely by division.[Footnote 23] On the one hand, for example, the 
policies and procedures for the six divisions that we examined 
generally addressed all the practices associated with the project 
management process area (see table 2); this process area involves 
management of project office activities so that projects are timely, 
efficient, and effective. 

Table 2: Use of Project Management Practices by Six FBI Divisions: 

Project management best practice: Identifying project management roles 
and responsibilities; 
Number of divisions with policies and procedures in place: 6 of 6. 

Project management best practice: Developing a project management plan; 
Number of divisions with policies and procedures in place: 6 of 6. 

Project management best practice: Baselining and tracking the status of 
project cost, schedule, and performance, including associated risks; 
Number of divisions with policies and procedures in place: 5 of 6. 

Project management best practice: Establishing a process to identify, 
record, track, and correct problems discovered during the acquisition; 
Number of divisions with policies and procedures in place: 5 of 6. 

Project management best practice: Periodically reviewing and 
communicating the status of project management activities and 
commitments with management and affected groups; Number of divisions 
with policies and procedures in place: 6 of 6. 

Source: GAO. 

[End of table]

On the other hand, for example, the policies and procedures for these 
six divisions generally did not address the key practices associated 
with requirements development and management process area (see table 
3); this process area involves establishing and maintaining agreement 
on system requirements. We would note that according to the CIO, it was 
a lack of bureau rigor and discipline in this area that in part caused 
the Virtual Case File project to be terminated. 

Table 3: Use of Requirements Development and Management Practices by 
Six FBI Divisions: 

Requirements development and management best practice: Identifying 
requirements development and management roles and responsibilities; 
Number of divisions with policies and procedures in place: 3 of 6. 

Requirements development and management best practice: Involving end 
users in development of and changes to requirements; Number of 
divisions with policies and procedures in place: 3 of 6. 

Requirements development and management best practice: Having a 
requirements management plan; 
Number of divisions with policies and procedures in place: 1 of 6. 

Requirements development and management best practice: Developing and 
baselining requirements, and controlling changes to them; Number of 
divisions with policies and procedures in place: 2 of 6. 

Requirements development and management best practice: Appraising 
changes to requirements for their impact on the project or IT 
environment; 
Number of divisions with policies and procedures in place: 0 of 6. 

Requirements development and management best practice: Maintaining 
traceability among requirements and other project deliverables; Number 
of divisions with policies and procedures in place: 3 of 6. 

Requirements development and management best practice: Periodically 
reviewing the status of requirements activities with management; Number 
of divisions with policies and procedures in place: 2 of 6. 

Source: GAO. 

[End of table]

Examples of requirements development and management practices that most 
divisions did not adequately address are (1) appraising changes to 
requirements for their impact on the project or the IT environment, 
which is important because it allows management and the project team to 
determine whether the benefits of changes to the requirements would be 
worth the likely cost and effect of making the changes, and (2) 
developing and baselining requirements and maintaining them under 
change control, which is important to ensuring that requirements are 
completely and correctly defined and that uncontrolled changes, 
commonly referred to as "requirements creep," are avoided. 

In our September 2005 report, we addressed another key process area 
associated with system acquisition life cycle management--contract 
management. Federal acquisition regulations and relevant IT acquisition 
management guidance recognize the importance of effectively managing 
contractor activities. According to the Federal Acquisition Regulation 
(FAR), for example, agencies are to use performance-based contracting 
to the maximum extent practicable when acquiring most 
services.[Footnote 24] Under the FAR, performance-based contracting 
includes, among other things, defining the work to be performed in 
measurable, results-oriented terms and specifying performance standards 
(quality and timeliness). The FAR and associated regulations[Footnote 
25] also require government oversight of contracts to ensure that the 
contractor performs the requirements of the contract, and the 
government receives the service as intended. Although the regulations 
do not prescribe specific methods for this oversight, other acquisition 
management guidance[Footnote 26] describes a number of practices 
associated with this activity.[Footnote 27]

However, the FBI's approach to managing its enterprise architecture 
contract did not include most of the performance-based contracting 
features described in the FAR. For example, the contract's statement of 
work did not specify the products in results-oriented, measurable 
terms. In addition, the bureau did not have plans for assuring the 
quality of the contractor's work; instead, according to bureau 
officials, they worked with the contractor to determine whether each 
deliverable was acceptable. 

In addition, in overseeing its contractor, the FBI has not employed the 
kind of effective practices specified in relevant guidance. For 
example, the bureau does not have a written policy to govern its 
tracking and oversight activities, has not designated responsibility or 
established a group for performing contract tracking and oversight 
activities, and has not developed an approved contractor monitoring 
plan. 

To address weaknesses in the FBI's systems development and acquisition 
life cycle processes, we have recommended that the FBI establish 
effective policies and procedures for such systems acquisition and 
development areas as configuration management, project management, 
quality assurance, requirements development and management, risk 
management, and contract tracking and oversight. 

Recognizing the need to strengthen and standardize its IT requirements 
and development management capabilities, the FBI has issued a 
bureauwide standard life cycle management directive with the aim of 
achieving consistent processes in the systems acquisition and 
development areas mentioned above. A second goal is to integrate these 
processes with other key IT disciplines, including those discussed in 
this testimony as well as others, such as information security 
management. CIO officials told us that they recently began implementing 
parts of the life cycle management directive across all projects. 
According to the CIO, the directive is to be fully defined and 
implemented by the end of 2006. 

The FBI acknowledges that the directive needs to be enhanced and 
extended to adequately address all relevant process areas. For example, 
FBI officials stated that they are still working to define effective 
contract management controls, such as procedures for the use of 
performance-based contracting methods and the establishment of tracking 
and oversight structures, policies, and processes. For other key 
practices, procedures have been drafted but require further 
development. 

FBI Has Developed Strategic IT Human Capital Management Policies and 
Procedures and Is Taking Steps to Implement Them: 

A strategic approach to human capital management includes viewing 
people as assets whose value to an organization can be enhanced by 
investing in them,[Footnote 28] and thus increasing both their value 
and the performance capacity of the organization. Based on our 
experience with leading organizations, we issued a model[Footnote 29] 
encompassing strategic human capital management, in which strategic 
human capital planning was one cornerstone.[Footnote 30] Strategic 
human capital planning enables organizations to remain aware of and be 
prepared for current and future needs as an organization, ensuring that 
they have the knowledge, skills, and abilities needed to pursue their 
missions. We have also issued a set of key practices for effective 
strategic human capital planning.[Footnote 31] These practices are 
generic, applying to any organization or component, such as an agency's 
IT organization. They include: 

* involving top management, employees, and other stakeholders in 
developing, communicating, and implementing a strategic workforce plan;

* determining the critical skills and competencies needed to achieve 
current and future programmatic results;

* developing strategies tailored to address gaps between the current 
workforce and future needs;

* building the capability to support workforce strategies; and: 

* monitoring and evaluating an agency's progress toward its human 
capital goals and the contribution that human capital results have made 
to achieving programmatic goals. 

As we have reported,[Footnote 32] the FBI's enterprisewide strategic 
human capital plan, issued in March 2004, includes policies and 
procedures for IT human capital.[Footnote 33] These IT policies and 
procedures are in alignment with the key practices discussed above. 
More specifically, they call for the following. 

* Top management stakeholders (e.g., the CIO, the head of the Office of 
Strategic Planning, and the head of Administration) and other 
stakeholders (e.g., section and unit chiefs) are to be involved with 
the development, communication, and implementation of the policies and 
procedures. 

* A detailed data bank is to be developed to store critical skills 
needed in the development and selection of personnel, including IT 
staff. 

* Strategies are to be defined to address workforce gaps, including 
recruiting programs that provide for tuition assistance and cooperative 
education. 

* An IT center is to be established to support workforce strategies and 
train existing personnel for future competencies and skills that will 
be needed. 

* The agency's progress is to be monitored and evaluated by tracking 
implementation plans to ensure that results are achieved on schedule. 

Since that time, the CIO stated that his office is taking steps to 
enhance its IT human capital capability. For example, it is working 
with the bureau's Training Division to identify the skills and 
abilities of the existing IT workforce and to provide training to 
enhance these skills and abilities, including having program and 
project managers work toward becoming certified in their respective 
disciplines. In addition, the CIO said that as part of reorganizing the 
CIO's office, he has created 12 senior executive and 4 senior level 
technical positions and is in the process of filling them with 
experienced and qualified staff. According to the CIO, the bureau has 
hired 8 senior executives and is in the process of hiring the others as 
well as the 4 senior technical staff. 

However, the bureau has yet to create an integrated plan of action that 
is based on a comprehensive analysis of the human capital roles and 
responsibilities needed to support the IT functions established under 
the CIO office's reorganization. Such an analysis should include an 
assessment of core competencies and essential knowledge, skills, and 
abilities, as well as linking current human capital strengths and 
weaknesses to permit gaps to be identified between current capabilities 
and those needed to perform the established IT functions. The plan 
should then describe actions needed to fill the identified gaps (that 
is, the planned combination of hiring, training, contractor support, 
and so on), along with time frames, resources, performance measures, 
and accountability structures. According to the CIO, he is in the 
process of hiring a contractor with human capital expertise to help 
identify gaps between existing skills and abilities and those that will 
be needed to successful modernize the bureau's IT. The CIO intends to 
have this effort completed, including the development of an 
implementation plan to address any gaps, by the end of calendar year 
2005. As part of this effort, the CIO stated that he is planning to 
implement a formal management structure within the Deputy CIO's office 
to monitor and evaluate human capital initiatives to ensure that 
results are achieved on schedule. 

Notwithstanding the initiatives under way and planned, the FBI's IT 
human capital situation remains a work in progress, and this is a 
significant challenge. As we have previously reported,[Footnote 34] 
when organizations implement a strategic approach to human capital 
management, how this is done, when it is done, and the basis on which 
it is done can make all the difference. With successful implementation, 
the bureau can better position itself to ensure that it has the right 
people, in the right place, at the right time to effectively modernize 
IT and transform the organization. 

Success of New IT Investments, Like Sentinel, Will Depend on How Well 
the FBI Implements its New IT Management Approaches: 

The success of the FBI in using IT to support its transformation 
efforts and in achieving its mission goals and outcomes will depend on 
how well it actually implements and institutionalizes the IT management 
structures, processes, and controls that have been or are currently 
being put in place. When the bureau's IT investments have been 
successfully delivered, and operational assets and tools are available 
to analysts and field agents to help them do their jobs better, only 
then can the mission value of technology be fully realized. 

The FBI has identified several ongoing new or enhanced system projects 
that in our view will need to employ these kinds of IT management 
capabilities in order for each to be successfully defined, designed, 
developed or acquired, and deployed. For example, the FBI reports that 
it currently has 18 IT investments that support its "investigative, 
intelligence, and analytical" line of business, which is a major 
component of how the bureau accomplishes its mission. According to the 
bureau, each of these 18 investments is benefiting from the bureau's 
newly established IT management approach and capabilities. 

Included in these 18 investments is Sentinel, the FBI's program to 
deliver an automated case management and information sharing 
capability; this is the successor to the Virtual Case File, the failed 
component of the Trilogy program. According to the FBI, Sentinel is to 
leverage commercially available technologies to consolidate and replace 
the bureau's existing case management capabilities with an integrated, 
paperless file management and workflow system, and to enhance 
information access and promote information sharing with both the law 
enforcement and intelligence communities. Thus far, the bureau reports 
it has developed detailed system requirements, a concept of operations, 
an acquisition strategy and schedule, and a notional development and 
deployment strategy involving four increments delivered over 4 years. 
In August 2005, the FBI issued a request for vendor proposals to more 
than 40 eligible companies under a National Institutes of Health 
governmentwide contracting vehicle. According to the CIO, the request 
also was provided to over 500 eligible subcontractors. Vendor proposals 
are due later this month; the goal is to issue a contract in November 
2005. 

As an FBI flagship program, Sentinel can serve as a barometer of how 
well the FBI defines and implements its new IT management approaches 
and capabilities, particularly with regard to a system that is to rely 
extensively on commercially available components (software and 
hardware). As we discuss above (and have previously reported[Footnote 
35]), there are a number of IT system management practices related to 
architecture, investment, acquisition/development, and human capital 
that are critical to delivering promised system capabilities and 
benefits, on time and within budget. Moreover, these include management 
practices that are critical to any system, whether custom-developed or 
built from commercial components, as well as certain practices unique 
to systems based on commercial components. 

Although each of these practices is relevant to Sentinel, there are 
several that we believe to be especially germane given the FBI's 
experience on the Virtual Case File, particularly with regard to 
requirements management and the bureau's reported efforts and plans 
going forward. Specifically, it is critical for the FBI to examine and 
control its requirements in the context of what capabilities are to be 
addressed through enterprise-provided services (e.g., records 
management and security) and what capabilities are to be provided 
through Sentinel. At the same time, it is essential that the bureau 
examine its requirements in the context of which capabilities can be 
provided by commercially available products and which cannot, and for 
those that cannot, how such requirements will be satisfied, if at all. 
As we and others have reported,[Footnote 36] this examination involves 
continuous but controlled analyses of trade-offs among stated system 
requirements, commercial product availability, and enterprise 
architecture constraints; it also involves such practical constraints 
as human capital and financial resources. 

Another area that is critical with respect to Sentinel is ensuring that 
decisions about the use of commercial components are based on an 
approach that includes deliberate and thorough research, analysis, and 
evaluation of components' dependencies. In this regard, it will be 
important for the FBI to ensure that it understands the behavioral 
interaction and compatibility of commercial off-the-shelf (COTS) 
components in order to select components that can be integrated in a 
predictable and standard way. We have found based on our research and 
past work[Footnote 37] that doing so requires an effective methodology 
to gain and apply such knowledge; without such a methodology, building 
a COTS-based system can quickly lapse into trial and error, which is 
fraught with risks. For example, a trial and error approach can lead to 
expensive, ad hoc modifications, customized solutions, or unnecessary 
increases in the number and complexity of interfaces--all of which 
increases costs, delays delivery, and postpones realization of expected 
benefits. An effective approach would include (1) performing gap 
analysis between requirements and component capabilities, as mentioned 
above, (2) allocating requirements among the various products for a 
given system design option, (3) defining the interactions that need to 
occur among the components, (4) documenting decisions, and (5) using 
iterative prototyping to assess the interactions among the components. 

Another very important area particularly relevant to Sentinel is 
ensuring that the project's plans explicitly provide the necessary time 
and resources for (1) integrating the commercial components with the 
FBI's existing systems and (2) preparing users for the impact that the 
business processes embedded in the COTS products will have on how the 
users will be expected to do their jobs, including potentially new 
roles and responsibilities. Available research suggests that 
insufficient attention to this organization change management issue has 
been a major cause of COTS solution implementations failing to live up 
their expectations.[Footnote 38]

Other management practices relevant to commercial component-based 
systems will be important on Sentinel, including (1) discouraging the 
modification of COTS products; (2) managing the systems configuration 
in a way that provides for evaluation, acquisition, and implementation 
of new, often frequent, releases of COTS products; and (3) ensuring 
that contractors are experienced in implementing COTS-based system 
solutions. 

In light of the importance of these and other areas, we have just 
initiated a review of Sentinel at the request of the Chairman and 
Ranking Member of the House Judiciary Committee; as part of this 
review, we plan to address many of these keys to project success. 

In closing, the FBI has made important progress, particularly in the 
last 12 months under the new CIO's leadership, in establishing certain 
IT management and control capabilities that our research and 
evaluations show are key to exploiting technology to enable 
transformation. But although the bureau has come a long way from where 
it was just 18 months ago, establishing these capabilities is not 
enough. For the FBI to effectively use technology to transform itself 
and accomplish its goals, it will need to ensure that its capabilities 
are appropriately enhanced and extended and, most important, 
effectively implemented on all IT programs and projects. Nowhere will 
this be more crucial than on the Sentinel program. Because of the FBI's 
stated approach to building Sentinel, it will be particularly important 
for the bureau to ensure that it follows the kind of acquisition 
management practices that our work has shown to be critical for 
commercial component-based systems to be successful. If it does not, 
the FBI increases the likelihood that Sentinel will encounter the same 
cost, schedule, and performance shortfalls as its predecessor, the 
Virtual Case File. 

Mr. Chairman, this concludes our statement. We would be happy to answer 
any questions that you or members of the Subcommittee may have at this 
time. 

Contact and Acknowledgments: 

If you should have any questions about this testimony, please contact 
Randolph C. Hite at (202) 512-3439 or hiter@gao.gov. Other major 
contributors to this testimony included Gary Mountjoy, Assistant 
Director; Justin Booth; Barbara Collier; Kush Malhotra; Lori Martinez; 
Teresa Neven; Warren Smith; and Teresa Tucker. 

FOOTNOTES

[1] An enterprise architecture is a set of descriptive models (e.g., 
diagrams and tables) that define, in business terms and in technology 
terms, how an organization operates today, how it intends to operate in 
the future, and how it intends to invest in technology to transition 
from today's operational environment to tomorrow's. 

[2] GAO, Information Technology: FBI Is Taking Steps to Develop an 
Enterprise Architecture, but Much Remains to Be Accomplished, GAO-05- 
363 (Washington, D.C.: Sept. 9, 2005). 

[3] GAO, Information Technology: FBI Needs an Enterprise Architecture 
to Guide Its Modernization Activities, GAO-03-959 (Washington, D.C.: 
Sept. 25, 2003); Federal Bureau of Investigation's Comments on Recent 
GAO Report on its Enterprise Architecture Efforts, GAO-04-190R 
(Washington, D.C.: Nov. 14, 2003); Information Technology: Foundational 
Steps Being Taken to Make Needed FBI Systems Modernization Management 
Improvements, GAO-04-842 (Washington, D.C.: Sept. 10, 2004); and GAO, 
Information Technology: FBI Is Taking Steps to Develop an Enterprise 
Architecture, but Much Remains to Be Accomplished, GAO-05-363 
(Washington, D.C.: Sept. 9, 2005). 

[4] GAO, Information Technology: FBI Needs an Enterprise Architecture 
to Guide Its Modernization Activities, GAO-03-959 (Washington, D.C.: 
Sept. 25, 2003); Federal Bureau of Investigation's Comments on Recent 
GAO Report on its Enterprise Architecture Efforts, GAO-04-190R 
(Washington, D.C.: Nov. 14, 2003); Information Technology: Foundational 
Steps Being Taken to Make Needed FBI Systems Modernization Management 
Improvements, GAO-04-842 (Washington, D.C.: Sept. 10, 2004); and 
Information Technology: FBI Is Taking Steps to Develop an Enterprise 
Architecture, but Much Remains to Be Accomplished, GAO-05-363 
(Washington, D.C.: Sept. 9, 2005). 

[5] GAO, Maximizing the Success of Chief Information Officers: Learning 
from Leading Organizations, GAO-01-376G (Washington, D.C.: February 
2001); Architect of the Capitol: Management and Accountability 
Framework Needed for Organizational Transformation, GAO-03-231 
(Washington, D.C.: January 2003). 

[6] Other important IT management controls are not addressed in this 
testimony, such as effective information security management. 

[7] For example, see statement of Robert S. Mueller III, Federal Bureau 
of Investigation, before the Subcommittee for the Departments of 
Commerce, Justice, and State, the Judiciary, and Related Agencies, 
Committee on Appropriations, House of Representatives (June 2002). 

[8] GAO, Information Technology: Foundational Steps Being Taken to Make 
Needed FBI Systems Modernization Management Improvements, GAO-04-842 
(Washington, D.C.: Sept. 10, 2004). 

[9] U.S. Department of Justice Office of the Inspector General, The 
Federal Bureau of Investigation's Implementation of Information 
Technology Recommendations, Audit Report 03-36 (Washington, D.C., 
September 2003); Federal Bureau of Investigation's Management of 
Information Technology Investments, Audit Report 03-09 (Washington, 
D.C.: December 2002); and Action Required on Audit Report 03-09 
(Washington, D.C.: September 2003). Statement of Glenn A. Fine, 
Inspector General, Department of Justice, before the Senate Committee 
on Appropriations, Subcommittee on Commerce, Justice, State, and the 
Judiciary (Mar. 23, 2004). 

[10] Clinger-Cohen Act of 1996, 40 U.S.C. 11101-11703. 

[11] GAO, FBI Transformation: FBI Continues to Make Progress in Its 
Efforts to Transform and Address Priorities, GAO-04-578T (Washington, 
D.C.: Mar. 23, 2004). 

[12] GAO, Information Technology: Foundational Steps Being Taken to 
Make Needed FBI Systems Modernization Management Improvements, GAO-04- 
842 (Washington, D.C.: Sept. 10, 2004). 

[13] The four offices are the Offices of IT Policy and Planning, IT 
Program Management, IT Systems Development, and IT Operations. 

[14] See for example, GAO, DOD Business Systems Modernization: 
Improvements to Enterprise Architecture Development and Implementation 
Efforts Needed, GAO-03-458, (Washington, D.C.: February 2003); 
Information Technology: DLA Should Strengthen Business Systems 
Modernization Architecture and Investment Activities, GAO-01-631 
(Washington, D.C.: June 2001); and Information Technology: INS Needs to 
Better Manage the Development of Its Enterprise Architecture, GAO/AIMD- 
00-212 (Washington, D.C.: August 2000). 

[15] GAO, Information Technology: A Framework for Assessing and 
Improving Enterprise Architecture Management (Version 1.1), GAO-03- 
584G (Washington, D.C.: April 2003). 

[16] GAO, Information Technology: FBI Is Taking Steps to Develop an 
Enterprise Architecture, but Much Remains to Be Accomplished, GAO-05- 
363 (Washington, D.C.: Sept. 9, 2005). 

[17] A target or "to be" architecture describes an enterprise's goals 
for its future business, performance, information/data, application/
service, and technology environments. A current or "as is" architecture 
describes an enterprise's current business, performance, information/
data, application/service, and technology environments. 

[18] GAO, Information Technology Investment Management: A Framework for 
Assessing and Improving Process Maturity, Exposure Draft, GAO/AIMD- 
10.1.23 (Washington, D.C.: May 2000); Information Technology Investment 
Management: A Framework for Assessing and Improving Process Maturity, 
version 1.1, GAO-04-394G (Washington, D.C.: March 2004). 

[19] [39] Clinger-Cohen Act of 1996, 40 U.S.C. §§11101-11703. 

[20] The bureau did not complete either of these two earlier efforts. 

[21] GAO, Information Technology: Foundational Steps Being Taken to 
Make Needed FBI Systems Modernization Management Improvements, GAO-04- 
842 (Washington, D.C.: Sept. 10, 2004). 

[22] Carnegie Mellon University's Software Engineering Institute has 
developed criteria, known as the Software Acquisition Capability 
Maturity Model, CMU/SEI-99-TR-002 (April 1999) and Key Practices of the 
Capability Maturity Model, CMU/SEI-93-TR-25 (February 1993) for 
determining organizations' software acquisition management and 
development effectiveness or maturity. Capability Maturity Model and 
CMM are registered in the U.S. Patent and Trademark Office. 

[23] GAO, Information Technology: Foundational Steps Being Taken to 
Make Needed FBI Systems Modernization Management Improvements, GAO-04- 
842 (Washington, D.C.: Sept. 10, 2004). 

[24] See Federal Acquisition Regulation, section 37.102(a). 

[25] See Federal Acquisition Regulation, Part 46, "Quality Assurance."

[26] See, for example, Carnegie Mellon Software Engineering Institute, 
Software Acquisition Capability Maturity Model, CMU/SEI-99-TR-002 
(April 1999). 

[27] For example, two of these are establishing a written policy for 
contract tracking and oversight and using approved contractor planning 
documents as a basis for tracking and overseeing the contractor. 

[28] See GAO, Human Capital: Attracting and Retaining a High-Quality 
Information Technology Workforce, GAO-02-113T (Washington, D.C.: Oct. 
4, 2001); A Model of Strategic Human Capital Management, GAO-02-373SP 
(Washington, D.C.: Mar. 15, 2002); Key Principles for Effective 
Strategic Workforce Planning, GAO-04-39 (Washington, D.C.: Dec. 11, 
2003). 

[29] GAO-02-373SP. 

[30] The other three are leadership; acquiring, developing, and 
retaining talent; and results-oriented organizational culture. 

[31] GAO-04-39. 

[32] GAO, Information Technology: Foundational Steps Being Taken to 
Make Needed FBI Systems Modernization Management Improvements, GAO-04- 
842 (Washington, D.C.: Sept. 10, 2004). 

[33] Federal Bureau of Investigation, FBI Strategic Human Capital Plan 
(Washington, D.C.: March 2004). 

[34] GAO, FBI Transformation: FBI Continues to Make Progress in Its 
Efforts to Transform and Address Priorities, GAO-04-578T (Washington, 
D.C.: Mar. 23, 2004). 

[35] For example, see GAO, Information Technology: DOD's Acquisition 
Policies and Guidance Need to Incorporate Additional Best Practices and 
Controls, GAO-04-722 (Washington, D.C.: July 30, 2004). 

[36] For example, see GAO, Information Technology: DOD's Acquisition 
Policies and Guidance Need to Incorporate Additional Best Practices and 
Controls, GAO-04-722 (Washington, D.C.: July 30, 2004). Also see 
Carnegie Mellon University Software Engineering Institute, Capability 
Maturity Model® Integration for Systems Engineering and Software 
Engineering, Version 1.1 (Pittsburgh, Pa.: December 2001) and The 
Capability Maturity Model: Guidelines for Improving the Software 
Process (Addison Wesley Longman, Inc.: 1994); Jonathan Adams, Srinivas 
Koushik, Guru Vasudeva, and George Galambos, Patterns for e-Business: A 
Strategy for Reuse (IBM Press: 2001); B. Craig Meyers and Patricia 
Oberndorf, Managing Software Acquisition: Open Systems and COTS 
Products (Addison-Wesley: 2001); Jeffrey A. Hoffer, Joey F. George, and 
Joseph S. Valacich, Modern Systems Analysis and Design (Addison Wesley 
Longman, Inc.: 1999); and Kurt Wallnau, Scott Hissam, and Robert 
Seacord, Building Systems from Commercial Components (Addison-Wesley: 
2002). 

[37] For example, see Carnegie Mellon University Software Engineering 
Institute, Capability Maturity Model® Integration for Systems 
Engineering and Software Engineering, Version 1.1 and The Capability 
Maturity Model: Guidelines for Improving the Software Process; Adams, 
Koushik, Vasudeva, and Galambos, Patterns for e-Business: A Strategy 
for Reuse; Meyers and Oberndorf, Managing Software Acquisition: Open 
Systems and COTS Products; Hoffer, George, and Valacich, Modern Systems 
Analysis and Design; and Wallnau, Hissam, and Seacord, Building Systems 
from Commercial Components. 

[38] For example, see GAO, Information Technology: DOD's Acquisition 
Policies and Guidance Need to Incorporate Additional Best Practices and 
Controls, GAO-04-722 (Washington, D.C.: July 30, 2004).